计算机科学 ›› 2014, Vol. 41 ›› Issue (9): 158-164.doi: 10.11896/j.issn.1002-137X.2014.09.030

• 信息安全 • 上一篇    下一篇

一种基于混沌的代换-置换结构图像加密算法

蔡俊,陈昕,向旭东   

  1. 北京信息科技大学计算机学院 北京100101;北京信息科技大学计算机学院 北京100101;北京科技大学计算机与通信工程学院 北京100083
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受国家自然科学基金面上项目(61370065)资助

Substitution-Permutation Network Structured Image Encryption Algorithm Based on Chaotic Map

CAI Jun,CHEN Xin and XIANG Xu-dong   

  • Online:2018-11-14 Published:2018-11-14

摘要: 近年来,随着多媒体技术的发展,互联网上数字图像相关内容和应用的比例越来越高,其安全性也日益受到人们的关注。图像的安全性,一般通过加密方法来保证。图像加密算法中,基于置乱-扩散结构的加密算法因其充分考虑图像数据二维分布的特点,特别适合图像数据的加密。然而,该加密算法存在安全性不高、扩散效率低,以及密钥扩展计算复杂度高等问题。通过引入分组密码学中的代换-置换(SP,Substitution-Permutation)结构,提出了一种基于混沌的SP结构图像加密算法SPCME,该算法采取3种策略:(1)通过混沌映射进行置换和扩散,采用AES算法的S盒进行字节代换,以增强算法安全性;(2)使用双向的置乱-扩散策略,加快扩散速度;(3)运用简单的异或和移位操作,提高密钥扩展效率。为评价该算法的性能,文中做了密钥空间分析、密钥敏感性分析、统计直方图分析、相邻像素相关性分析、信息熵分析、差分攻击分析等大量的性能分析实验。实验结果表明,该算法仅通过3轮迭代就可达到与以前提出的图像加密算法相同的安全级别,加密效率明显提高。

关键词: SP结构,图像加密,混沌,三维Arnold映射,Logistic映射

Abstract: Various image encryption algorithms based on the permutation-diffusion structure have been proposed in the past few years.However,permutation and diffusion are considered as two separate stages,making image encryption vulnerable to attacks.Moreover,the algorithms,in general,have low diffusion efficiency and high computational complexity in key scheming.To solve these problems,this paper proposed a SP(Substitution-Permutation) network image encryption algorithm based on chaotic map.The proposed algorithm adopts the following three strategies:(1) To further enhance the security of the cryptosystem,XOR and S-box operations are introduced in the beginning of each encryption round;(2) An bidirectional permutation-diffusion strategy is proposed to accelerate the spreading process;(3) Simple circular bit shift and XOR operations are used to improve the efficiency of key scheming.We conducted a rich set of cryptanalyses on the proposed algorithm,e.g.,key space analysis,key sensitivity analysis,various statistical analyses and differential analysis.Analytical results demonstrate that the proposed algorithm reaches the same security level of previously proposed counterparts in merely three iterations with high efficiency,and is thus applicable for secure image encryption.

Key words: SP network,Image encryption,Chaos,3D arnold map,Logistic map

[1] Alvarez G,Li S.Some basic cryptographic requirements for chaosbased cryptosystems[J].International Journal of Bifurcation and Chaos,2006,16(08):2129-2151
[2] 黄伟琦,陈志刚,梁涤青,等.基于多混沌系统的医学图像加密算法[J].计算机科学,2012,39(12):261-263,299
[3] Li Shu-jun,Mou Xuan-qin,Cai Yuan-long.Pseudo-random bitgenerator based on couple chaotic systems and its applications in stream-cipher cryptography[M]∥Progress in Cryptology-INDOCRYPT 2001.Springer Berlin Heidelberg,2001:316-329
[4] Liu Nian-sheng.Pseudo-randomness and complexity of binarysequences generated by the chaotic system[J].Communications in Nonlinear Science and Numerical Simulation,2011,16(2):761-768
[5] Chee C Y,Xu D.Chaotic encryption using discrete-time synchro-nous chaos[J].Physics Letters A,2006,348(3):284-292
[6] Kocarev L,Jakimoski G.Logistic map as a block encryption algorithm [J].Physics Letters A,2001,289(4):199-206
[7] Fridrich J.Symmetric ciphers based on two-dimensional chaotic maps[J].International Journal of Bifurcation and Chaos,1998,8(6):1259-1284
[8] Chen Guan-rong,Mao Yao-bin,Chui C K.A symmetric image encryption scheme based on 3D chaotic cat maps[J].Chaos,Solitons & Fractals,2004,21(3):749-761
[9] Zhu Zhi-liang,Zhang Wei,Wong K,et al.A chaos-based symmetric image encryption scheme using a bit-level permutation[J].Information Sciences,2011,181(6):1171-1186
[10] Tong Xiao-jun,Cui Ming-gen.Image encryption scheme basedon 3D baker with dynamical compound chaotic sequence cipher generator[J].Signal Processing,2009,89(4):480-491
[11] Tong Xiao-jun.Design of an image encryption scheme based on a multiple chaotic map[J].Communications in Nonlinear Science and Numerical Simulation,2012,18(7):1725-1733
[12] Rhouma R,Meherzi S,Belghith S.OCML-based colour imageencryption[J].Chaos,Solitons & Fractals,2009,40(1):309-318
[13] Xu Shu-jiang,Chen Xiu-bo,Zhang Ru,et al.An improved chaoticcryptosystem based on circular bit shift and XOR operations[J].Physics Letters A,2012,376(10):1003-1010
[14] Mazloom S,Eftekhari-Moghadam A M.Color image encrypttion based on coupled nonlinear chaotic map[J].Chaos,Solitons & Fractals,2009,42(3):1745-1754
[15] Wang Yong,Wong K,Liao Xiao-feng,et al.A chaos-based image encryption algorithm with variable control parameters[J].Chaos,Solitons & Fractals,2009,41(4):1773-1783
[16] Zhang Wei,Wong K,Yu Hai,et al.An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion[J].Communications in Nonlinear Science and Numerical Simulation,2013,18(8):2066-2080
[17] Fu Chong,Chen Jun-jie,Zou Hao,et al.A chaos-based digitalimage encryption scheme with an improved diffusion strategy[J].Optics Express,2012,20(3):2363-2378
[18] Shannon C E.Communication theory of secrecy systems [J].Bell system technical journal,1949,28(4):656-715
[19] Wang Yong,Wong K,Liao Xiao-feng,et al.A new chaos-based fast image encryption algorithm[J].Applied soft computing,2011,11(1):514-522
[20] Schneier B.Applied cryptography:protocols,algorithms,andsource code in C[M].John Wiley & Sons,2007
[21] 郭建胜,张锋.一种图像加密算法的等效密钥攻击方案[J].电子学报,2010,38(4):781-785
[22] Solak E,C,okal C,Yildiz O T,et al.Cryptanalysis of Fridrich’s chaotic image encryption[J].International Journal of Bifurcation and Chaos,2010,20(05):1405-1413
[23] Lian S,Sun J,Wang Z.A block cipher based on a suitable use of the chaotic standard map[J].Chaos,Solitons & Fractals,2005,26(1):117-129

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!