CN114785477B - Color image encryption algorithm based on dynamic Henon-ITERATIVE mapping and block scrambling - Google Patents

Color image encryption algorithm based on dynamic Henon-ITERATIVE mapping and block scrambling Download PDF

Info

Publication number
CN114785477B
CN114785477B CN202210286157.XA CN202210286157A CN114785477B CN 114785477 B CN114785477 B CN 114785477B CN 202210286157 A CN202210286157 A CN 202210286157A CN 114785477 B CN114785477 B CN 114785477B
Authority
CN
China
Prior art keywords
matrix
block
chaotic
image
sequence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210286157.XA
Other languages
Chinese (zh)
Other versions
CN114785477A (en
Inventor
代高乐
葛斌
王婷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui University of Science and Technology
Original Assignee
Anhui University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui University of Science and Technology filed Critical Anhui University of Science and Technology
Priority to CN202210286157.XA priority Critical patent/CN114785477B/en
Publication of CN114785477A publication Critical patent/CN114785477A/en
Application granted granted Critical
Publication of CN114785477B publication Critical patent/CN114785477B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Image Processing (AREA)

Abstract

The invention relates to a color image encryption algorithm based on dynamic Henon-ITERATIVE mapping and block scrambling. The algorithm encrypts the color image by a method of 'blocking-scrambling-spreading'. Firstly, data obtained after the plaintext image is processed by SHA-512 is used as initial values of two groups of chaotic mappings; then, a group of chaotic sequences generated by DHIM mapping are combined with block scrambling to carry out inter-block-intra-block scrambling; and finally, performing two rounds of forward and reverse non-sequence diffusion by using another group of chaotic sequences to obtain a ciphertext image. Simulation experiments show that the algorithm is suitable for color images with any size, can effectively resist common attack means such as statistics, noise, difference and the like, and has good safety and robustness.

Description

Color image encryption algorithm based on dynamic Henon-ITERATIVE mapping and block scrambling
Technical Field
The invention relates to the technical field of encryption, in particular to a color image encryption algorithm based on dynamic Henon-ITERATIVE mapping and block scrambling.
Background
The rapid development of communication technology brings great convenience to life of people, but simultaneously, the possibility of personal privacy leakage is accompanied, and the information network security is also a popular topic. Digital images are a common information transmission medium, and are the main protection objects of privacy security, and the most direct and effective method for protecting the security of image data is image encryption. DES, RSA, IDEA, etc. are all excellent encryption algorithms, but these algorithms are generally used for text encryption, and specific encryption algorithms are required for encryption aiming at the characteristics of large data size, high redundancy and high correlation of digital images.
In recent years, the development of a chaotic random sequence causes a learner to research a chaotic encryption algorithm, and the chaotic has inherent randomness, unpredictability and high sensitivity to an initial value, so that the chaotic is widely applied to the image encryption algorithm. The randomness requirement of the image encryption algorithm on the key sequence makes chaotic mapping a new technology of the encryption algorithm.
Disclosure of Invention
The invention aims to provide a color image encryption algorithm which is based on dynamic Henon-ITERATIVE and block scrambling and is applicable to any size. The algorithm utilizes SHA-512 to generate chaos initial values and control parameters related to plaintext so as to achieve the effect of one-time pad; zero padding operation is carried out on a plaintext image to obtain an image with the size of (MxN) so as to ensure that the image can be split into T pixel blocks with the size of (L x L), the pixel positions are fully scrambled in an inter-block-intra-block scrambling mode, the pixel values are fully changed by forward and reverse diffusion, and the safety of an algorithm is improved.
The invention adopts the following technical scheme:
In order to achieve the aim of the invention, the technical scheme adopted is that the steps of a color image encryption algorithm based on dynamic Henon-ITERATIVE and block scrambling are detailed as follows:
1. preferably, the invention adopts SHA-512 technology to generate chaos initial value, and the specific operation steps are as follows:
Step one: the SHA-512 operation is carried out on the plaintext image to obtain a key with the length of 128 bits, and the key is a 16-system character string.
Step two: the key is converted into a 512-bit binary string, with each 64 bits being a set of 8-set key values k 1、k2、k3、k4、k5、k6、k7、k8.
Step three: let 8 sets of key values determine the initial values and control parameters { a 0,b0,a1,b1,x0,y0,x1,y1 } in the algorithm herein as shown in equation (1) and equation (2).
2. Preferably, the invention provides a chaotic sequence generated by dynamic Henon-ITERATIVE chaotic mapping, and the chaotic mapping expression can be expressed as follows:
Wherein, the control parameter a epsilon [ -0.25,1.5], b epsilon [0,0.3], u epsilon [3.57,4], let b=0.3, u=3.99, dynamic Henon-ITERATIVE mapping is in full mapping state between [ -1,1 ].
Step one: the initial values x 0、y0、a0 and b 0 are substituted into DHIM mapping to iterate (500+max (T, l×l)) times, L is the side length of each block, and T is the number of blocks. And discarding the previous 500 iteration results to achieve a sufficient chaotic state, and obtaining two groups of chaotic sequences A0 and B0.
Step two: the first T number of the sequence A0 is reserved, and the pseudo-random sequence A1 is obtained by processing the sequence A0 by using a formula (4) and is used for inter-block scrambling.
A1=mod(round(A0)×107,5) (4)
Where mod () is a modulo operation and round () is rounded.
Step three: b0 is processed by using formula (5) to obtain B1, and B1 is recombined into matrix P of size (l×l) for block built-in scrambling.
B1=mod(round(B0)×107,T) (5)
Wherein T is the number of the blocks.
Step four: substituting initial values x 1、y1、a1 and b 1 into DHIM mapping to iterate (500+M multiplied by N multiplied by 3) times, discarding the first 500 numbers to obtain C0 and D0, and further processing by using a formula (6) to obtain new chaotic sequences C1 and D1 for two-round diffusion.
Where abs () takes absolute value.
3. Preferably, the invention provides an 'inter-block-inter' scrambling and positive and negative two-round non-sequence diffusion for encrypting an image, which comprises the following specific implementation steps:
Step one: the color image I with the size and the side length L of the block are input, the plaintext image I' with the size (MxN) is obtained by carrying out zero padding operation on the plaintext image, the block sizes are ensured to be (L x L), and the size of L is set to be 64.
Step two: the image I' is split into three planes Ir, ig, ib and combined into a matrix S of size (mxn×3), and matrix blocking is performed, each block having size (lxl).
Step three: inter-block scrambling. The matrix S is subjected to inter-block ordering by using the index ordering of the chaotic sequence A0, and the partitioned matrix is rotated and turned according to the numerical value of the sequence A1, wherein the rule is shown in the table 1:
TABLE 1 chunking rotation inversion rules
Step four: the block is scrambled. And carrying out intra-block chaotic scrambling on pixels in each block by using the indexes sequenced by the chaotic sequence B0.
Step five: inter-block scrambling. The chaotic sequence B1 is combined into a matrix P, pixel points of each block are in one-to-one correspondence with elements in the P, cyclic shift is carried out in each block according to matrix element values in the P, and the pixels are fully scrambled in the whole matrix to finally obtain a scrambled matrix Q.
Step six: and constructing a matrix W by using the chaotic sequence C1, and performing first-round forward non-sequence diffusion on the matrix Q according to a formula (7) to obtain a matrix G. Wherein W (i, j) is the pixel value of the pseudo-random matrix; q (i, j) is the pixel value of the scrambled matrix; g (i, j) is the pixel value of the matrix after forward diffusion.
Step seven: and constructing a matrix S by using the chaotic sequence D1, and performing a second round of reverse non-sequence diffusion on the matrix G according to the formula (8) to obtain a matrix E. Wherein S (i, j) is the pixel value of the pseudo-random matrix; e (i, j) is the pixel value of the matrix after back diffusion.
Step eight: and (5) remolding the matrix E to obtain an encrypted image J.
Advantageous effects
Compared with the prior art, the invention has the beneficial effects that:
(1) The invention provides SHA-512 to process the plaintext image, and uses the obtained string of hexadecimal character strings as the basis of the initial value and control parameter of chaotic mapping, and the encryption algorithm is related to the plaintext itself according to the difference of the key values obtained by different images;
(2) The chaotic map used in the invention is dynamic Henon-ITERATIVE map, and the chaos and the sensitivity to initial values are improved;
(3) The invention uses the 'inter-block-intra-block' scrambling to fully utilize the chaotic sequence, so that the scrambling can fully change the positions of pixels and the encryption efficiency is improved; and the two rounds of diffusion algorithms with opposite forward and reverse directions reduce the correlation between adjacent pixels and improve the security of the encryption algorithm.
Drawings
FIG. 1 is a flow chart of a color image encryption algorithm for dynamic Henon-ITERATIVE mapping and block scrambling;
FIG. 2 is a bifurcation diagram of dynamic Henon-ITERATIVE mapping;
FIG. 3 is a plain text image;
Fig. 4 is a ciphertext image.
Detailed Description
The practice of the invention is described in further detail below with reference to the attached drawings and examples.
Fig. 1 is an encryption flow chart of the present method.
The programming software adopted is Matlab R2017a, and the color image with the size shown in FIG. 3 is selected as an original image I. With this method, the detailed procedure of encrypting the original image is described below.
Step one: and inputting a plaintext image and system parameters, and acquiring an initial value of the chaotic system through SHA-512 operation to be used as a key of an encryption algorithm.
Step two: and inputting the key value, substituting the key value into the chaotic map, generating two groups of chaotic sequences and further processing.
Step three: the plaintext image is split into T pieces of size (L x L), and rotation and inversion and 'inter-block-intra-block' scrambling are performed according to a chaotic sequence.
Step four: and (3) finishing two rounds of forward and reverse direction reverse non-sequence diffusion algorithms of the opposite random number groups by using equations (7-8) to obtain a final image encryption image, as shown in fig. 4.

Claims (1)

1. A color image encryption method based on dynamic Henon-ITERATIVE mapping and block scrambling is characterized in that SHA-512 is utilized to generate chaos initial values and control parameters related to plaintext so as to achieve one-time encryption effect; zero padding is carried out on a plaintext image to obtain an image with the size of (MxN) so as to ensure that the image can be split into T pixel blocks with the size of (L x L), the pixel positions are fully scrambled in an inter-block-intra-block scrambling mode, and the image is encrypted by forward and reverse two-round diffusion;
the SHA-512 technology generates a chaos initial value and a control parameter, and the specific operation steps are as follows:
step one: carrying out SHA-512 operation on the plaintext image to obtain a key with the length of 128 bits, wherein the key is a 16-system character string;
step two: converting the key into a 512-bit binary string, wherein each 64 bits is a group of 8-group key values k 1、k2、k3、k4、k5、k6、k7、k8;
step three: let 8 sets of key values determine initial values and control parameters { a 0,b0,a1,b1,x0,y0,x1,y1 } in the algorithm herein as shown in equation (1) and equation (2);
the chaotic mapping of the dynamic Henon-ITERATIVE generates a chaotic sequence, and the chaotic mapping expression can be expressed as follows:
wherein, the control parameter a epsilon [ -0.25,1.5], b epsilon [0,0.3], u epsilon [3.57,4], let b=0.3, u=3.99, dynamic Henon-ITERATIVE mapping is in full mapping state between [ -1,1 ];
Step one: substituting initial values x 0、y0、a0 and b 0 into DHIM mapping to iterate (500+max (T, L×L)) times, wherein L is the side length of each block, and T is the number of blocks; discarding the previous 500 iterative results to achieve a sufficient chaotic state and obtaining two groups of chaotic sequences A0 and B0;
Step two: the first T number of the sequence A0 is reserved, and the formula (4) is utilized to process the sequence A0 to obtain a pseudo-random sequence A1 for inter-block scrambling;
A1=mod(round(A0)×107,5) (4)
wherein mod () is a modulo operation, round () is rounded;
Step three: processing B0 by using a formula (5) to obtain B1, and recombining B1 into a matrix P with the size of (L multiplied by L) for block built-in disorder;
B1=mod(round(B0)×107,T) (5)
wherein T is the number of the blocks;
Step four: substituting initial values x 1、y1、a1 and b 1 into DHIM mapping to iterate (500+M multiplied by N multiplied by 3) times, discarding the first 500 numbers to obtain C0 and D0, and further processing by using a formula (6) to obtain new chaotic sequences C1 and D1 for two-round diffusion;
Where abs () is taken as absolute value;
The method comprises the following specific implementation steps of encrypting an image by scrambling between blocks and performing positive and negative two rounds of non-sequence diffusion:
Step one: inputting a color image I with a size and a side length L of a block, carrying out zero padding operation on a plaintext image to obtain a plaintext image I' with a size of (MxN), ensuring that the sizes of the blocks are all (L x L), and setting the size of L to be 64;
step two: splitting the image I' into three planes of Ir, ig and Ib, combining the three planes into a matrix S with the size of (MxNx3), and performing matrix blocking, wherein the size of each block is (L x L);
step three: inter-block scrambling, inter-block sorting is performed on the matrix S by using the index sorting of the chaotic sequence A0, and the partitioned matrix is rotated and turned according to the numerical value of the sequence A1, wherein the rule is shown in the table 1:
TABLE 1 chunking rotation inversion rules
Step four: the intra-block chaotic scrambling is carried out on pixels in each block by using indexes sequenced by the chaotic sequence B0;
step five: inter-block scrambling, combining the chaotic sequence B1 into a matrix P, enabling pixel points of each block to correspond to elements in the P one by one, circularly shifting in each block according to matrix element values in the P, and fully scrambling pixels in the whole matrix to finally obtain a scrambled matrix Q;
Step six: constructing a matrix W by using a chaotic sequence C1, and performing first-round forward non-sequence diffusion on a matrix Q according to a formula (7) to obtain a matrix G, wherein W (i, j) is a pixel value of a pseudo-random matrix; q (i, j) is the pixel value of the scrambled matrix; g (i, j) is the pixel value of the matrix after forward diffusion;
Step seven: constructing a matrix S by using a chaotic sequence D1, and performing a second round of reverse non-sequence diffusion on the matrix G according to a formula (8) to obtain a matrix E, wherein S (i, j) is a pixel value of a pseudo-random matrix; e (i, j) is the pixel value of the matrix after back diffusion;
step eight: and (5) remolding the matrix E to obtain an encrypted image J.
CN202210286157.XA 2022-03-22 2022-03-22 Color image encryption algorithm based on dynamic Henon-ITERATIVE mapping and block scrambling Active CN114785477B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210286157.XA CN114785477B (en) 2022-03-22 2022-03-22 Color image encryption algorithm based on dynamic Henon-ITERATIVE mapping and block scrambling

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210286157.XA CN114785477B (en) 2022-03-22 2022-03-22 Color image encryption algorithm based on dynamic Henon-ITERATIVE mapping and block scrambling

Publications (2)

Publication Number Publication Date
CN114785477A CN114785477A (en) 2022-07-22
CN114785477B true CN114785477B (en) 2024-04-30

Family

ID=82425714

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210286157.XA Active CN114785477B (en) 2022-03-22 2022-03-22 Color image encryption algorithm based on dynamic Henon-ITERATIVE mapping and block scrambling

Country Status (1)

Country Link
CN (1) CN114785477B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6345101B1 (en) * 1998-10-07 2002-02-05 Jayant Shukla Cryptographic method and apparatus for data communication and storage
CN107590394A (en) * 2017-08-10 2018-01-16 河海大学 A kind of image encryption method based on chaotic maps and bit recombination
CN108537716A (en) * 2018-01-24 2018-09-14 重庆邮电大学 A kind of color image encryption embedding grammar based on discrete domain

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040202326A1 (en) * 2003-04-10 2004-10-14 Guanrong Chen System and methods for real-time encryption of digital images based on 2D and 3D multi-parametric chaotic maps

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6345101B1 (en) * 1998-10-07 2002-02-05 Jayant Shukla Cryptographic method and apparatus for data communication and storage
CN107590394A (en) * 2017-08-10 2018-01-16 河海大学 A kind of image encryption method based on chaotic maps and bit recombination
CN108537716A (en) * 2018-01-24 2018-09-14 重庆邮电大学 A kind of color image encryption embedding grammar based on discrete domain

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
基于多混沌映射的光学图像加密算法;胡春杰;陈晓;郭银;;激光杂志;20170125(第01期);全文 *
封面 Novel quantum image compression and encryption algorithm based on DQWT and 3D hyper-chaotic Henon map;Nan-Run Zhou等;《Quantum Information Processing》;20201231;全文 *
整合神经网络置乱图像的动态自反馈混沌系统图像加密;罗海波等;《中国图象图形学报》;20181231;全文 *

Also Published As

Publication number Publication date
CN114785477A (en) 2022-07-22

Similar Documents

Publication Publication Date Title
Malik et al. Color image encryption algorithm based on hyper-chaos and DNA computing
Soleymani et al. A chaotic cryptosystem for images based on Henon and Arnold cat map
Iqbal et al. An RGB image cipher using chaotic systems, 15-puzzle problem and DNA computing
Panduranga et al. Image encryption based on permutation-substitution using chaotic map and Latin Square Image Cipher
Kumar et al. A review on various digital image encryption techniques and security criteria
Liu et al. Cryptanalysis and improvement in a plaintext-related image encryption scheme based on hyper chaos
CN108833390B (en) Matrix transformation-based packet physical layer encryption method
CN110535624A (en) A kind of medical image method for secret protection applied to DICOM format
CN114362915A (en) Image encryption method based on DNA coding technology and hyperchaotic system
CN109586895B (en) Novel color image encryption method
CN113746622A (en) Lightweight grouped text encryption method based on double two-dimensional chaotic system
CN113259089A (en) Image encryption method based on combination of chaos principle and genetic algorithm
CN114785477B (en) Color image encryption algorithm based on dynamic Henon-ITERATIVE mapping and block scrambling
AbuTaha et al. Chaos-based cryptosystems using dependent diffusion: An overview
Jamil et al. Image Encryption Based on Multi-Level Keys on RC5 Algorithm.
Alhassan et al. Enhancing image security during transmission using residue number system and k-shuffle
CN115987490A (en) Lightweight block cipher algorithm white-box construction method suitable for ARX structure
Manihira et al. Image encryption using chaotic maps and DNA encoding
CN110061832B (en) Method for realizing symmetric cipher algorithm using Chinese character as cipher
CN114143413A (en) Image data PUF (physical unclonable function) security encryption system and encryption method
Hassan et al. Henon chaotic map-based image encryption scheme using bit-level circular shift
Iqbal et al. An rgb image encryption scheme using chaotic systems, 15-puzzle problem and dna computing
CN114928434B (en) Multi-image encryption algorithm based on cascade modulation chaotic system and block scrambling-diffusion
CN117114959B (en) Image encryption method based on key feedback mechanism of multi-parameter one-dimensional chaotic system
CN116033086B (en) Reversible neural network-based image hiding method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant