CN116318615A - Image encryption method and decryption method based on combination of hyperchaotic system and DNA (deoxyribonucleic acid) coding - Google Patents

Image encryption method and decryption method based on combination of hyperchaotic system and DNA (deoxyribonucleic acid) coding Download PDF

Info

Publication number
CN116318615A
CN116318615A CN202310287279.5A CN202310287279A CN116318615A CN 116318615 A CN116318615 A CN 116318615A CN 202310287279 A CN202310287279 A CN 202310287279A CN 116318615 A CN116318615 A CN 116318615A
Authority
CN
China
Prior art keywords
image
representing
encryption
fusion
chaotic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310287279.5A
Other languages
Chinese (zh)
Other versions
CN116318615B (en
Inventor
方鹏飞
严实
赵敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shaanxi Logistics Group Industry Research Institute Co ltd
Original Assignee
Shaanxi Logistics Group Industry Research Institute Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shaanxi Logistics Group Industry Research Institute Co ltd filed Critical Shaanxi Logistics Group Industry Research Institute Co ltd
Priority to CN202310287279.5A priority Critical patent/CN116318615B/en
Publication of CN116318615A publication Critical patent/CN116318615A/en
Application granted granted Critical
Publication of CN116318615B publication Critical patent/CN116318615B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0827Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving distinctive intermediate devices or communication paths
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Image Processing (AREA)

Abstract

The invention relates to an image encryption method and a decryption method based on the combination of a hyperchaotic system and DNA (deoxyribonucleic acid) codes, wherein the encryption method comprises the following steps: obtaining a plaintext image, combining a hash function, determining an initial value of the hyper-chaotic system as a key, substituting the initial value into a model of the hyper-chaotic system to generate a cipher flow, performing circular shifting position random diffusion encryption on the image by using the cipher flow, and performing re-scrambling and diffusion encryption on the image by combining with DNA coding operation to obtain a final ciphertext image. The invention not only can solve the cycle problem of the hyper-chaotic system, but also enhances the relevance of the plaintext and the secret key, so that the encrypted ciphertext image has good attack resistance and safety.

Description

Image encryption method and decryption method based on combination of hyperchaotic system and DNA (deoxyribonucleic acid) coding
Technical Field
The invention belongs to the technical field of image encryption, and particularly relates to an image encryption method and a decryption method based on the combination of a hyper-chaotic system and DNA coding.
Background
In recent years, with the rapid development of internet communication transmission technology, image and video applications and transmission are becoming more and more widely used due to the intuitiveness, diversity and richness of information such as multimedia images, but since digital images contain a large amount of effective information such as military images, medical images and other non-public images, security at the time of information transmission becomes particularly important, and thus image information security is one of the important research directions in recent years for many students, in the related art, encryption algorithms such as DES (Data Encryption Standard ), AES (Advanced Encryption Standard, advanced encryption standard) and the like are applied to image encryption, however, these methods are not only time-consuming but also unsatisfactory.
Disclosure of Invention
In order to solve the problems in the prior art, the invention provides an image encryption method and a decryption method based on the combination of a hyper-chaotic system and DNA coding. The technical problems to be solved by the invention are realized by the following technical scheme:
the invention provides an image encryption method based on the combination of a hyperchaotic system and DNA coding, which comprises the following steps:
acquiring a gray level image of an image to be encrypted, and taking the gray level image as a plaintext image;
obtaining an initial value of a system state variable of the hyper-chaotic system according to the hash function;
generating four chaotic sequences according to the initial value of the system state variable and the model of the hyperchaotic system, and obtaining a fusion cipher stream according to the four chaotic sequences;
dividing the plaintext image into a one-dimensional image matrix, and carrying out image scrambling, diffusion and encryption on the one-dimensional image matrix to obtain a first intermediate ciphertext image;
performing cyclic shift position random diffusion encryption on the first intermediate ciphertext image according to the fusion cipher flow to obtain a second intermediate ciphertext image;
performing DNA coding encryption on the second intermediate ciphertext image according to the fusion password stream to obtain a final ciphertext image;
the model of the hyper-chaotic system is as follows:
Figure SMS_1
in the formula ,
Figure SMS_2
four preset control parameters of the hyperchaotic system are respectively represented by +.>
Figure SMS_3
Four system state variables of the hyperchaotic system are respectively represented, < ->
Figure SMS_4
Respectively representing four chaotic sequences.
In one embodiment of the present invention, obtaining an initial value of a system state variable in a hyperchaotic system according to a hash function includes:
generating 512 hash values according to the plaintext image and a hash function-512;
dividing 512 hash values into 64 sub-blocks, wherein each sub-block contains 8 hash values, and converting each sub-block into decimal numbers;
and calculating to obtain an initial value of a system state variable of the hyper-chaotic system according to the following formula:
Figure SMS_5
Figure SMS_6
in the formula ,
Figure SMS_7
respectively 64 sub-blocks->
Figure SMS_8
Indicate->
Figure SMS_9
Initial values of the system state variables.
In one embodiment of the present invention, generating four chaotic sequences according to an initial value of the system state variable and a model of the hyperchaotic system, and obtaining a fusion cipher stream according to the four chaotic sequences includes:
substituting the initial value of the system state variable into the model of the hyper-chaotic system, and generating four chaotic sequences in a cyclic iteration mode according to the preset sequence length
Figure SMS_10
The length of each chaotic sequence is +.>
Figure SMS_11
,/>
Figure SMS_12
Line number representing plain text image, ">
Figure SMS_13
Representing the number of columns of the plaintext image;
and carrying out fusion operation on the four chaotic sequences according to the following formula to obtain a fusion cipher stream:
Figure SMS_14
wherein ,
Figure SMS_15
representing a fused cryptographic stream->
Figure SMS_16
Representing the +.>
Figure SMS_17
Element(s)>
Figure SMS_18
Representing modular arithmetic, ++>
Figure SMS_19
Representing absolute value operation,/->
Figure SMS_20
Representing a rounding operation.
In one embodiment of the present invention, dividing the plaintext image into a one-dimensional image matrix, and performing image scrambling diffusion encryption on the one-dimensional image matrix to obtain a first intermediate ciphertext image, including:
performing sorting operation on the fusion cipher stream, performing scrambling diffusion encryption on the one-dimensional image matrix according to the fusion cipher stream after sorting operation to obtain a first intermediate ciphertext image,
Figure SMS_21
Figure SMS_22
in the formula ,
Figure SMS_23
representing a plain text image->
Figure SMS_24
First intermediate ciphertext image,>
Figure SMS_25
indicate->
Figure SMS_26
The number of pixels in a pixel is one,
Figure SMS_27
representing a sort operation.
In one embodiment of the present invention, performing cyclic shift position random diffusion encryption on the first intermediate ciphertext image according to the fusion cipher stream to obtain a second intermediate ciphertext image, including:
according to the fusion cipher flow, carrying out scrambling diffusion encryption on the first intermediate ciphertext image according to the following steps of obtaining an intermediate ciphertext image;
when (when)
Figure SMS_28
When (1):
Figure SMS_29
when (when)
Figure SMS_30
When (1):
Figure SMS_31
in the formula ,
Figure SMS_32
representing intermediate ciphertext image,/->
Figure SMS_33
Representing a logical exclusive-or operation;
performing cyclic shift processing on the intermediate ciphertext image to obtain a second intermediate ciphertext image,
Figure SMS_34
in the formula ,
Figure SMS_35
representing a circular left shift operation, ">
Figure SMS_36
Representing a second intermediate ciphertext image.
In one embodiment of the present invention, performing DNA encoding encryption on the second intermediate ciphertext image according to the fused ciphertext stream to obtain a final ciphertext image, including:
converting the fusion cipher stream and the second intermediate ciphertext image into DNA codes, performing logical exclusive OR encryption on the DNA codes to obtain a final ciphertext image,
Figure SMS_37
wherein ,
Figure SMS_38
representing DNA coding operations,/->
Figure SMS_39
Representing the final ciphertext image,/>
Figure SMS_40
Representing a logical exclusive or operation.
The invention provides an image decryption method based on the combination of a hyperchaotic system and DNA coding, which is used for decrypting a final ciphertext image obtained by the image encryption method in any embodiment, and comprises the following steps:
acquiring a gray image of an image to be decrypted, and taking the gray image as a ciphertext image;
performing DNA encoding decryption on the ciphertext image according to a fusion password stream obtained in an image encryption method based on the combination of the hyper-chaotic system and the DNA encoding to obtain a first intermediate decrypted image;
performing cyclic shift decryption operation on the first intermediate decrypted image to obtain a second intermediate decrypted image, performing shift operation on the second intermediate decrypted image to obtain an intermediate decrypted image,
Figure SMS_41
when (when)
Figure SMS_42
When (1):
Figure SMS_43
when (when)
Figure SMS_44
When (1):
Figure SMS_45
in the formula ,
Figure SMS_48
representing the firstIntermediate decrypted image +.>
Figure SMS_51
Representing a circular left-shift operation,
Figure SMS_53
representing a second intermediate decrypted image->
Figure SMS_47
Representing an intermediate decrypted image->
Figure SMS_50
Representing a fused cryptographic stream->
Figure SMS_52
Representing the +.>
Figure SMS_54
Element(s)>
Figure SMS_46
Indicate->
Figure SMS_49
A plurality of pixel points;
performing position shift on the intermediate ciphertext image according to the position index of the fusion password stream to obtain a final decrypted image,
Figure SMS_55
Figure SMS_56
in the formula ,
Figure SMS_57
representing the final decrypted image->
Figure SMS_58
Representing a sort operation.
Compared with the prior art, the invention has the beneficial effects that:
the invention provides an image encryption method and a decryption method based on the combination of a hyperchaotic system and DNA coding, wherein the image encryption method comprises pixels
Scrambling, pixel diffusion, cyclic shifting, DNA encoding, addition, and XOR operations. The SHA-512 function is used to construct an initial value of the hyper-chaotic system and the ordering function is used to scramble the pixel locations. Then, pixel diffusion is performed by the chaotic sequence, and then the image is encrypted using cyclic shift, DNA encoding, or the like. Finally, through analysis and comparison of the encrypted images, the encryption algorithm can be seen to have the capability of hiding the pixel statistical characteristics of the original images, in addition, the encryption algorithm has the advantages of large key space, more uniform gray value of the encrypted images, low correlation and time complexity between adjacent pixels, strong key sensitivity and excellent overall performance, so that the safety of channel transmission images is greatly improved, the encryption algorithm has good attack resistance, and has high application potential in the aspect of information safety.
The foregoing description is only an overview of the present invention, and is intended to be implemented in accordance with the teachings of the present invention, as well as the preferred embodiments thereof, together with the following detailed description of the invention, given by way of illustration only, together with the accompanying drawings.
Drawings
FIGS. 1-4 are four-channel phase diagrams of a hyperchaotic system provided by embodiments of the invention;
FIGS. 5-8 are time series diagrams of a hyperchaotic system provided by embodiments of the invention;
FIG. 9 is a Lyapunov exponent diagram of a hyperchaotic system provided by an embodiment of the invention;
FIG. 10 is an encryption flow chart of an image encryption method based on the combination of a hyperchaotic system and DNA encoding provided by an embodiment of the invention;
FIG. 11 is a decryption flow chart of an image decryption method based on the combination of a hyperchaotic system and DNA encoding, provided by the embodiment of the invention;
FIGS. 12-19 are an encryption result and a histogram of an image encryption method based on the combination of a hyperchaotic system and DNA encoding according to an embodiment of the invention;
FIGS. 20-22 are graphs showing key sensitivity encryption performance analysis results of an image encryption method based on combination of a hyperchaotic system and DNA encoding according to an embodiment of the invention;
fig. 23 to fig. 28 are graphs of correlation encryption performance analysis results of adjacent pixels of an image encryption method based on combination of a hyperchaotic system and DNA encoding according to an embodiment of the invention.
Detailed Description
In order to further explain the technical means and effects adopted by the invention to achieve the preset aim, the image encryption method and the decryption method based on the combination of the hyper-chaotic system and the DNA encoding are provided in the invention in detail by combining the drawings and the specific embodiments.
The foregoing and other features, aspects, and advantages of the present invention will become more apparent from the following detailed description of the preferred embodiments when taken in conjunction with the accompanying drawings. The technical means and effects adopted by the present invention to achieve the intended purpose can be more deeply and specifically understood through the description of the specific embodiments, however, the attached drawings are provided for reference and description only, and are not intended to limit the technical scheme of the present invention.
Example 1
Referring to fig. 10, fig. 10 is an encryption flow chart of an image encryption method based on combination of a hyperchaotic system and DNA encoding according to an embodiment of the invention, as shown in the figure, the image encryption method based on combination of a hyperchaotic system and DNA encoding of the embodiment comprises:
step 1: acquiring a gray image of an image to be encrypted, and taking the gray image as a plaintext image;
in the present embodiment, a plaintext image is set as
Figure SMS_59
The image size is +.>
Figure SMS_60
Step 2: obtaining an initial value of a system state variable of the hyper-chaotic system according to the hash function;
in an alternative embodiment, step 2 comprises:
step 2.1: generating 512 hash values according to the plaintext image and the hash function-512;
step 2.2: dividing 512 hash values into 64 sub-blocks, wherein each sub-block contains 8 hash values, and converting each sub-block into decimal numbers;
alternatively, 64 sub-blocks, i.e. 64 decimal numbers, are used
Figure SMS_61
And (3) representing.
And calculating to obtain an initial value of a system state variable of the hyper-chaotic system according to the following formula:
Figure SMS_62
(1);
Figure SMS_63
(2);
in the formula ,
Figure SMS_64
respectively 64 sub-blocks->
Figure SMS_65
Represent the firstmInitial values of the system state variables.
In this embodiment, the hash function-512 is used to generate the initial value of the chaotic system, so that a large enough password space can be provided to resist the statistical brute force attack.
Step 3: generating four chaotic sequences according to the initial value of the system state variable and the model of the hyperchaotic system, and obtaining a fusion password stream according to the four chaotic sequences;
referring to fig. 1-9 in combination, fig. 1-4 are four-channel phase diagrams of a hyperchaotic system according to an embodiment of the invention; wherein FIG. 1 is
Figure SMS_67
Phase diagram, FIG. 2->
Figure SMS_69
Phase diagram, FIG. 3->
Figure SMS_71
Phase diagram, FIG. 4->
Figure SMS_68
Phase diagram. FIGS. 5-8 are time-series diagrams of a hyperchaotic system according to embodiments of the invention, wherein FIG. 5 is +.>
Figure SMS_70
Time series diagram, FIG. 6 is->
Figure SMS_72
Time series diagram, FIG. 7 is->
Figure SMS_73
Time series chart, FIG. 8 is->
Figure SMS_66
Time series diagram. Fig. 9 is a Lyapunov exponent diagram of a hyperchaotic system according to an embodiment of the invention.
In this embodiment, the model of the hyperchaotic system is:
Figure SMS_74
(3);
in the formula ,
Figure SMS_75
four preset control parameters of the hyperchaotic system are respectively represented by +.>
Figure SMS_76
Four system state variables of the hyperchaotic system are respectively represented, < ->
Figure SMS_77
Respectively representing four chaotic sequences.
In an alternative embodiment, step 3 comprises:
step 3.1: substituting initial values of system state variables into a model of the hyper-chaotic system, and generating four chaotic sequences in a cyclic iteration mode according to a preset sequence length
Figure SMS_78
The length of each chaotic sequence is +.>
Figure SMS_79
,/>
Figure SMS_80
Line number representing plain text image, ">
Figure SMS_81
Representing the number of columns of the plaintext image;
step 3.2: and carrying out fusion operation on the four chaotic sequences according to the following steps of:
Figure SMS_82
wherein ,
Figure SMS_83
representing a fused cryptographic stream->
Figure SMS_84
Representing the +.>
Figure SMS_85
Element(s)>
Figure SMS_86
Representing modular arithmetic, ++>
Figure SMS_87
Representing absolute value operation,/->
Figure SMS_88
Representing a rounding operation.
Step 4: dividing a plaintext image into a one-dimensional image matrix, and carrying out image scrambling diffusion encryption on the one-dimensional image matrix to obtain a first intermediate ciphertext image;
in an alternative embodiment, step 4 includes:
performing sorting operation on the fusion cipher stream, performing scrambling diffusion encryption on the one-dimensional image matrix according to the following formula according to the fusion cipher stream after the sorting operation to obtain a first intermediate ciphertext image,
Figure SMS_89
(5);
Figure SMS_90
(6);
in the formula ,
Figure SMS_91
representing a plain text image->
Figure SMS_92
First intermediate ciphertext image,>
Figure SMS_93
indicate->
Figure SMS_94
Pixels>
Figure SMS_95
Representing a sort operation.
Step 5: performing cyclic shift position random diffusion encryption on the first intermediate ciphertext image according to the fusion cipher flow to obtain a second intermediate ciphertext image;
in an alternative embodiment, step 5 includes:
step 5.1: according to the fusion cipher flow, carrying out scrambling diffusion encryption on the first intermediate ciphertext image according to the following steps of obtaining an intermediate ciphertext image;
when (when)
Figure SMS_96
When (1):
Figure SMS_97
(7);
when (when)
Figure SMS_98
When (1):
Figure SMS_99
(8);
in the formula ,
Figure SMS_100
representing intermediate ciphertext image,/->
Figure SMS_101
Representing a logical exclusive-or operation;
step 5.3: performing cyclic shift processing on the intermediate ciphertext image to obtain a second intermediate ciphertext image,
Figure SMS_102
(9);
in the formula ,
Figure SMS_103
representing a circular left shift operation, ">
Figure SMS_104
Representing a second intermediate ciphertext image.
Step 6: performing DNA coding encryption on the second intermediate ciphertext image according to the fusion password stream to obtain a final ciphertext image;
in an alternative embodiment, the fused cipher stream and the second intermediate ciphertext image are converted to a DNA encoding, and the DNA encoding is logically XOR encrypted to a final ciphertext image,
Figure SMS_105
(10);
wherein ,
Figure SMS_106
representing DNA coding operations,/->
Figure SMS_107
Representing the final ciphertext image,/>
Figure SMS_108
Representing a logical exclusive or operation.
The image encryption method based on the combination of the hyperchaotic system and the DNA coding of the embodiment comprises pixel scrambling, pixel diffusion, cyclic shift, DNA coding, addition and XOR operation. The SHA-512 function is used to construct an initial value of the hyper-chaotic system and the ordering function is used to scramble the pixel locations. Then, pixel diffusion is performed by the chaotic sequence, and then the image is encrypted using cyclic shift, DNA encoding, or the like. Finally, through analysis and comparison of the encrypted images, the encryption algorithm can be seen to have the capability of hiding the pixel statistical characteristics of the original images, in addition, the encryption algorithm has the advantages of large key space, more uniform gray value of the encrypted images, low correlation and time complexity between adjacent pixels, strong key sensitivity and excellent overall performance, so that the safety of channel transmission images is greatly improved, the encryption algorithm has good attack resistance, and has high application potential in the aspect of information safety.
The embodiment also provides an image decryption method based on the combination of the hyper-chaotic system and the DNA encoding, which is used for decrypting the final ciphertext image obtained by the image encryption method. Referring to fig. 11, fig. 11 is a decryption flow chart of an image decryption method based on combination of a hyperchaotic system and DNA encoding according to an embodiment of the invention, as shown in the figure, the image decryption method based on combination of a hyperchaotic system and DNA encoding according to the embodiment of the invention comprises:
step 1: acquiring a gray image of an image to be decrypted, and taking the gray image as a ciphertext image;
in this embodiment, the image to be decrypted is the final ciphertext image obtained by the image encryption method based on the combination of the hyper-chaotic system and the DNA encoding.
Step 2: performing DNA encoding decryption on the ciphertext image according to the fusion password stream to obtain a first intermediate decrypted image;
in this embodiment, the fusion cipher stream is the fusion cipher stream obtained in the image encryption method based on the combination of the hyperchaotic system and DNA encoding
Figure SMS_109
Step 3: performing cyclic shift decryption operation on the first intermediate decrypted image to obtain a second intermediate decrypted image, performing shift operation on the second intermediate decrypted image to obtain an intermediate decrypted image,
Figure SMS_110
(11);
when (when)
Figure SMS_111
When (1):
Figure SMS_112
(12);
when (when)
Figure SMS_113
When (1):
Figure SMS_114
(13);
in the formula ,
Figure SMS_116
representing a first intermediate decrypted image->
Figure SMS_118
Representing a circular left-shift operation,
Figure SMS_121
representing a second intermediate decrypted image->
Figure SMS_117
Representing an intermediate decrypted image->
Figure SMS_120
Representing a fused cryptographic stream->
Figure SMS_122
Representing the +.>
Figure SMS_123
Element(s)>
Figure SMS_115
Indicate->
Figure SMS_119
A plurality of pixel points;
step 4: performing position shift on the intermediate ciphertext image according to the position index of the fusion password stream to obtain a final decrypted image,
Figure SMS_124
(14);
in the formula ,
Figure SMS_125
representing the final decrypted image->
Figure SMS_126
Obtained from equation (5).
Furthermore, the image encryption and decryption method based on the combination of the hyperchaotic system and the DNA code is adopted to encrypt and decrypt specific images, and the effect of encryption and decryption is described. Referring to fig. 12-19 in combination, fig. 12-19 are an encryption result and a histogram of an image encryption method based on a combination of a hyperchaotic system and DNA encoding according to an embodiment of the invention, wherein fig. 12 is a Lena plaintext image, fig. 13 is a Lena ciphertext image, fig. 14 is a Lena plaintext image histogram, and fig. 15 is a Lena ciphertext image histogram; fig. 16 is a fruit plaintext image, fig. 17 is a fruit ciphertext image, fig. 18 is a fruit plaintext image histogram, and fig. 19 is a fruit ciphertext image histogram. As can be seen from the figure, the encryption algorithm of the invention has the capability of hiding the pixel statistical characteristics of the original image, and the gray value of the encrypted image is more uniform.
Referring to fig. 20-22, fig. 20-22 are graphs of key sensitivity encryption performance analysis results of an image encryption method based on combination of a hyperchaotic system and DNA encoding according to an embodiment of the invention, wherein fig. 20 is a cup plaintext image, fig. 21 is a cup decrypted image, and fig. 22 is a cup decrypted image after fine-tuning of a key. From the figure it can be seen that the key sensitivity of the invention is strong.
Referring to fig. 23-28, fig. 23-28 are graphs of results of analysis of correlation encryption performance of adjacent pixels of an image encryption method based on combination of a hyperchaotic system and DNA encoding according to an embodiment of the invention, wherein fig. 23 is a graph of correlation of adjacent pixels in a horizontal direction of a ship plaintext image, fig. 24 is a graph of correlation of adjacent pixels in a vertical direction of a ship plaintext image, fig. 25 is a graph of correlation of adjacent pixels in a diagonal direction of a ship plaintext image, fig. 26 is a graph of correlation of adjacent pixels in a horizontal direction of a ship ciphertext image, fig. 27 is a graph of correlation of adjacent pixels in a vertical direction of a ship ciphertext image, and fig. 28 is a graph of correlation of adjacent pixels in a diagonal direction of a ship ciphertext image. It can be seen from the figure that the correlation and temporal complexity between neighboring pixels is low.
It should be noted that in this document relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that an article or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in an article or apparatus that comprises the element.
The foregoing is a further detailed description of the invention in connection with the preferred embodiments, and it is not intended that the invention be limited to the specific embodiments described. It will be apparent to those skilled in the art that several simple deductions or substitutions may be made without departing from the spirit of the invention, and these should be considered to be within the scope of the invention.

Claims (7)

1. An image encryption method based on the combination of a hyper-chaotic system and DNA coding is characterized by comprising the following steps:
acquiring a gray level image of an image to be encrypted, and taking the gray level image as a plaintext image;
obtaining an initial value of a system state variable of the hyper-chaotic system according to the hash function;
generating four chaotic sequences according to the initial value of the system state variable and the model of the hyperchaotic system, and obtaining a fusion cipher stream according to the four chaotic sequences;
dividing the plaintext image into a one-dimensional image matrix, and carrying out image scrambling, diffusion and encryption on the one-dimensional image matrix to obtain a first intermediate ciphertext image;
performing cyclic shift position random diffusion encryption on the first intermediate ciphertext image according to the fusion cipher flow to obtain a second intermediate ciphertext image;
performing DNA coding encryption on the second intermediate ciphertext image according to the fusion password stream to obtain a final ciphertext image;
the model of the hyper-chaotic system is as follows:
Figure QLYQS_1
in the formula ,
Figure QLYQS_2
four preset control parameters of the hyperchaotic system are respectively represented by +.>
Figure QLYQS_3
Four system state variables of the hyperchaotic system are respectively represented, < ->
Figure QLYQS_4
Respectively representing four chaotic sequences.
2. The image encryption method based on the combination of the hyper-chaotic system and the DNA encoding according to claim 1, wherein the obtaining the initial value of the system state variable in the hyper-chaotic system according to the hash function comprises the following steps:
generating 512 hash values according to the plaintext image and a hash function-512;
dividing 512 hash values into 64 sub-blocks, wherein each sub-block contains 8 hash values, and converting each sub-block into decimal numbers;
and calculating to obtain an initial value of a system state variable of the hyper-chaotic system according to the following formula:
Figure QLYQS_5
Figure QLYQS_6
in the formula ,
Figure QLYQS_7
respectively 64 sub-blocks->
Figure QLYQS_8
Represent the firstmInitial values of the system state variables.
3. The image encryption method based on the combination of the hyperchaotic system and the DNA encoding according to claim 2, wherein generating four chaotic sequences according to the initial value of the system state variable and the model of the hyperchaotic system, obtaining a fusion cipher stream according to the four chaotic sequences, comprises:
substituting the initial value of the system state variable into the model of the hyper-chaotic system, and generating four chaotic sequences in a cyclic iteration mode according to the preset sequence length
Figure QLYQS_9
The length of each chaotic sequence is +.>
Figure QLYQS_10
,/>
Figure QLYQS_11
Line number representing plain text image, ">
Figure QLYQS_12
Representing the number of columns of the plaintext image;
and carrying out fusion operation on the four chaotic sequences according to the following formula to obtain a fusion cipher stream:
Figure QLYQS_13
wherein ,
Figure QLYQS_14
representing a fused cryptographic stream->
Figure QLYQS_15
Representing the +.>
Figure QLYQS_16
Element(s)>
Figure QLYQS_17
Representing modular arithmetic, ++>
Figure QLYQS_18
Representing absolute value operation,/->
Figure QLYQS_19
Representing a rounding operation.
4. The image encryption method based on the combination of the hyperchaotic system and the DNA encoding according to claim 3, wherein dividing the plaintext image into a one-dimensional image matrix, and performing image scrambling diffusion encryption on the one-dimensional image matrix to obtain a first intermediate ciphertext image comprises:
performing sorting operation on the fusion cipher stream, performing scrambling diffusion encryption on the one-dimensional image matrix according to the fusion cipher stream after sorting operation to obtain a first intermediate ciphertext image,
Figure QLYQS_20
Figure QLYQS_21
in the formula ,
Figure QLYQS_22
representing a plain text image->
Figure QLYQS_23
First intermediate ciphertext image,>
Figure QLYQS_24
indicate->
Figure QLYQS_25
The number of pixels in a pixel is one,
Figure QLYQS_26
representing a sort operation.
5. The image encryption method based on the combination of the hyperchaotic system and the DNA encoding according to claim 4, wherein the performing the cyclic shift position random diffusion encryption on the first intermediate ciphertext image according to the fusion cipher stream to obtain a second intermediate ciphertext image comprises:
according to the fusion cipher flow, carrying out scrambling diffusion encryption on the first intermediate ciphertext image according to the following steps of obtaining an intermediate ciphertext image;
when (when)
Figure QLYQS_27
When (1):
Figure QLYQS_28
when (when)
Figure QLYQS_29
When (1):
Figure QLYQS_30
in the formula ,
Figure QLYQS_31
representing intermediate ciphertext image,/->
Figure QLYQS_32
Representing a logical exclusive-or operation;
performing cyclic shift processing on the intermediate ciphertext image to obtain a second intermediate ciphertext image,
Figure QLYQS_33
in the formula ,
Figure QLYQS_34
representing a circular left shift operation, ">
Figure QLYQS_35
Representing a second intermediate ciphertext image.
6. The image encryption method based on the combination of the hyperchaotic system and the DNA encoding according to claim 5, wherein the DNA encoding encryption of the second intermediate ciphertext image according to the fusion cipher stream to obtain a final ciphertext image comprises:
converting the fusion cipher stream and the second intermediate ciphertext image into DNA codes, performing logical exclusive OR encryption on the DNA codes to obtain a final ciphertext image,
Figure QLYQS_36
wherein ,
Figure QLYQS_37
representing DNA coding operations,/->
Figure QLYQS_38
Representing the final ciphertext image,/>
Figure QLYQS_39
Representing a logical exclusive or operation.
7. An image decryption method based on the combination of a hyper-chaotic system and DNA encoding, which is used for decrypting a final ciphertext image obtained by the image encryption method of any one of claims 1 to 6, comprising:
acquiring a gray image of an image to be decrypted, and taking the gray image as a ciphertext image;
performing DNA encoding decryption on the ciphertext image according to a fusion password stream obtained in an image encryption method based on the combination of the hyper-chaotic system and the DNA encoding to obtain a first intermediate decrypted image;
performing cyclic shift decryption operation on the first intermediate decrypted image to obtain a second intermediate decrypted image, performing shift operation on the second intermediate decrypted image to obtain an intermediate decrypted image,
Figure QLYQS_40
when (when)
Figure QLYQS_41
When (1):
Figure QLYQS_42
when (when)
Figure QLYQS_43
When (1):
Figure QLYQS_44
in the formula ,
Figure QLYQS_45
representing a first intermediate decrypted image->
Figure QLYQS_49
Representing a circular left-shift operation,
Figure QLYQS_51
representing a second intermediate decrypted image->
Figure QLYQS_46
Representing an intermediate decrypted image->
Figure QLYQS_48
Representing a fused cryptographic stream->
Figure QLYQS_52
Representing the +.>
Figure QLYQS_53
Element(s)>
Figure QLYQS_47
Indicate->
Figure QLYQS_50
A plurality of pixel points;
performing position shift on the intermediate ciphertext image according to the position index of the fusion password stream to obtain a final decrypted image,
Figure QLYQS_54
Figure QLYQS_55
in the formula ,
Figure QLYQS_56
representing the final decrypted image->
Figure QLYQS_57
Representing a sort operation.
CN202310287279.5A 2023-03-23 2023-03-23 Image encryption method and decryption method based on combination of hyperchaotic system and DNA (deoxyribonucleic acid) coding Active CN116318615B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310287279.5A CN116318615B (en) 2023-03-23 2023-03-23 Image encryption method and decryption method based on combination of hyperchaotic system and DNA (deoxyribonucleic acid) coding

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310287279.5A CN116318615B (en) 2023-03-23 2023-03-23 Image encryption method and decryption method based on combination of hyperchaotic system and DNA (deoxyribonucleic acid) coding

Publications (2)

Publication Number Publication Date
CN116318615A true CN116318615A (en) 2023-06-23
CN116318615B CN116318615B (en) 2023-10-13

Family

ID=86801148

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310287279.5A Active CN116318615B (en) 2023-03-23 2023-03-23 Image encryption method and decryption method based on combination of hyperchaotic system and DNA (deoxyribonucleic acid) coding

Country Status (1)

Country Link
CN (1) CN116318615B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108365947A (en) * 2018-03-05 2018-08-03 郑州轻工业学院 A kind of image encryption method based on Feistel networks Yu dynamic DNA encoding
CN108898025A (en) * 2018-06-25 2018-11-27 河南大学 New chaotic image encryption method based on dual scramble and DNA encoding
CN113225449A (en) * 2021-05-27 2021-08-06 郑州轻工业大学 Image encryption method based on chaos sequence and DNA coding
CN114584671A (en) * 2022-03-07 2022-06-03 哈尔滨工业大学(威海) Wavelet transformation image encryption method based on Henon mapping
CN114820268A (en) * 2022-04-29 2022-07-29 兰州大学 Image processing method based on discrete hyper-chaotic system and dynamic DNA (deoxyribonucleic acid) coding with diffusivity

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108365947A (en) * 2018-03-05 2018-08-03 郑州轻工业学院 A kind of image encryption method based on Feistel networks Yu dynamic DNA encoding
CN108898025A (en) * 2018-06-25 2018-11-27 河南大学 New chaotic image encryption method based on dual scramble and DNA encoding
CN113225449A (en) * 2021-05-27 2021-08-06 郑州轻工业大学 Image encryption method based on chaos sequence and DNA coding
CN114584671A (en) * 2022-03-07 2022-06-03 哈尔滨工业大学(威海) Wavelet transformation image encryption method based on Henon mapping
CN114820268A (en) * 2022-04-29 2022-07-29 兰州大学 Image processing method based on discrete hyper-chaotic system and dynamic DNA (deoxyribonucleic acid) coding with diffusivity

Also Published As

Publication number Publication date
CN116318615B (en) 2023-10-13

Similar Documents

Publication Publication Date Title
Sun et al. A novel image encryption scheme based on 7D hyperchaotic system and row-column simultaneous swapping
CN110570344B (en) Image encryption method based on random number embedding and DNA dynamic coding
CN108122188B (en) Image encryption method
CN107590842B (en) Image encryption method and device based on pixel and DNA cross dynamic chaotic password
CN107094072B (en) Mixed chaotic encryption method based on generalized Henon mapping
CN109660696A (en) A kind of new image encryption method
Fu-Yan et al. Image encryption using high-dimension chaotic system
Panwar et al. Cryptanalysis and improvement of an image encryption scheme using combination of one-dimensional chaotic maps
CN1518269A (en) Data enciphering equipment and method
Zheng et al. An image encryption algorithm based on multichaotic system and DNA coding
CN113691362A (en) Bit plane image compression encryption algorithm based on hyperchaotic system and DNA coding
Devi et al. Entropy influenced RNA diffused quantum chaos to conserve medical data privacy
CN104050617A (en) Method for image encryption based on Liu chaotic system
Hua et al. Matrix-based secret sharing for reversible data hiding in encrypted images
Es-Sabry et al. Securing images using high dimensional chaotic maps and DNA encoding techniques
CN111682932B (en) Single-round image encryption method based on mixed chaotic mapping
Shakir et al. A new four-dimensional hyper-chaotic system for image encryption
CN108521534A (en) More image encryption methods based on DNA encoding and old hyperchaos
Sam et al. An efficient quasigroup based image encryption using modified nonlinear chaotic maps
CN111597568A (en) Image encryption method of high-dimensional fractional order complex system based on distributed time lag
CN116318615B (en) Image encryption method and decryption method based on combination of hyperchaotic system and DNA (deoxyribonucleic acid) coding
Naskar et al. A robust image encryption technique using dual chaotic map
Mehmood et al. A time-efficient and noise-resistant cryptosystem based on discrete wavelet transform and chaos theory: An application in image encryption
Mostafa et al. A new chaos based medical image encryption scheme
CN114244489A (en) Image encryption method based on radial diffusion

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant