计算机科学 ›› 2022, Vol. 49 ›› Issue (8): 344-349.doi: 10.11896/jsjkx.210700235
• 信息安全 • 上一篇
周连兵1, 周湘贞2, 崔学荣3
ZHOU Lian-bing1, ZHOU Xiang-zhen2, CUI Xue-rong3
摘要: 为了提高混沌加密系统的安全性和加密速度,提出了一种联合混沌映射的轻量级压缩图像加密方案。首先,为了加速加密过程,破坏像素间的相关性,将数字图像分割为图像块,并通过在频域中的处理对其进行压缩;然后,实施2D Logistic混沌映射,用于在密钥生成、置乱和替换阶段对图像像素进重排和换位。此外,为了进一步提高安全等级,在扩散阶段利用另一种混沌映射2D Henon映射来改变置乱图像的像素值。性能评估结果表明,所提方案能够满足图像加密的安全性要求,且密钥空间大。与其他优秀方案相比,该方案能够更好地抵御统计和差分等攻击,且对生成的密钥空间改变具有高度敏感性。其中,密钥空间大小为256位,实现了约99%的NPCR值和超过15%的UACI值。
中图分类号:
[1]ZHANG S,GAO T G.An image encryption scheme based on DNA coding and permutation of hyper-image [J].Multimedia Tools and Applications,2016,75(24):17157-17170. [2]RAMANATHAN T,HOSSEN M J,SAYEED M S,et al.Survey on computational intelligence based image encryption techniques[J].Indonesian Journal of Electrical Engineering and Computer Science,2020,19(3):1428-1435. [3]FATMA Y,HAFID A,DANI H O.Peningkatan keamanan pengiriman pesan teks:kombinasi advanced encryption standard(AES) 128 dan least significant bit(LSB)[J].JUSIFO (Jurnal Sistem Informasi),2020,6(2):111-120. [4]IKHWAN A,RAOF R,EHKAN P,et al.Data security implementation using data encryption standard method for student values at the faculty of medicine,University of North Sumatra[J].Journal of Physics:Conference Series,2021,1755(1):22-33. [5]YE G D,HUANG X L.An efficient symmetric image encryption algorithm based on an intertwining logistic map [J].Neurocomputing,2017,251(19):45-53. [6]MAO J,WANG H Y,CHEN Y.Image encryption algorithmbased on dynamic key selection and multi-direction diffusion[J].Optical Technique,2018,44(3):278-286. [7]ELAMIR M M,TABANY W I,MAI S M.Hybrid image en-cryption scheme for secure E-health systems[J].Network Mo-deling Analysis in Health Informatics and Bioinformatics,2021,10(1):1727-1744. [8]DING L N,DING Q.A novel image encryption scheme based on 2D fractional chaotic map,DWT and 4D hyper-chaos[J].Electronics,2020,9(8):1280-1299. [9]LI C,LUO G,LI C.An image encryption scheme based on the three-dimensional chaotic logistic map[J].International Journal of Network Security,2019,21(1):22-29. [10]HAN S M,ZHANG W,ZHANG X,et al.Multiple image encryption method based on light field imaging theory and chaotic system[J].Acta Photonica Sinica,2020,49(3):193-202. [11]SAMAR M I,LOBNA A,AHMED A R,et al.Biomedical image encryption based on double-humped and fractional logistic maps[C]//2017 6th International Conference on Modern Circuits and Systems Technologies(MOCAST).IEEE press,2017:112-123. [12]LI M,ZHOU K,REN H,et al.Cryptanalysis of permutation-diffusion-based lightweight chaotic image encryption scheme using CPA[J].Applied Sciences,2019,9(3):95-104. [13]XIAN Y J,XIE S J,TU Y L.Multi-image encryption algorithm based on hyper-chaotic system [J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2020,32(6):1065-1074. [14]LIU Z,WANG Y.Image compression and encryption schemebased on the two-dimensional coupled map lattice model [J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2020,32(6):1048-1057. [15]YAN X X,ZHANG Q C YANG C C.Weighted attribute-based encryption scheme with traitor tracing [J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2020,32(6):1058-1064. [16]LI M,XU M,LUO J,et al.Cryptanalysis of an image encryption using 2D Henon-sine map and DNA approach[J].IEEE Access,2019,52(7):63336-63345. [17]JRIDI M,MEHER P K.Scalable approximate DCT architec-tures for effcient HEVC-compliant video coding[J].IEEE Trans. Circuits. Syst. Video Technol.,2017,27(8):1815-1825. [18]SHIHABH S,SUHAIDI S,ABDUL R R,et al.Enhancement of satellite image compression using a hybrid(DWT-DCT) algorithm[J].Sensing & Imaging,2017,18(1):30-41. [19]EEAYATIFARA R,ABDULLAHB A,ISMAIL F I.Image encryption using a synchronous permutation diffusion technique[J].Optics and Lasers in Engineering,2017,90(6):146-154. [20]WU Y,ZHOU Y,SAVERIADES G,et al.Local shannon entropy measure with statistical tests for image randomness[J].Information Science,2013,222(12):323-342. [21]ZHANG Y.A Chaotic system based image encryption schemewith identical encryption and decryption algorithm[J].Chinese Journal of Electronics,2017,26(5):1022-1031. [22]MOAFIMADANI S S, CHEN Y,TANG C.A new algorithm for medical color images encryption using chaotic systems[J].Entropy,2019,21(6):577-186. |
[1] | 蹇奇芮, 陈泽茂, 武晓康. 面向无人机通信的认证和密钥协商协议 Authentication and Key Agreement Protocol for UAV Communication 计算机科学, 2022, 49(8): 306-313. https://doi.org/10.11896/jsjkx.220200098 |
[2] | 李瑭, 秦小麟, 迟贺宇, 费珂. 面向多无人系统的安全协同模型 Secure Coordination Model for Multiple Unmanned Systems 计算机科学, 2022, 49(7): 332-339. https://doi.org/10.11896/jsjkx.210600107 |
[3] | 黄华伟, 李春华. 一种基于热带半环的密钥建立协议的安全性分析 Security Analysis of A Key Exchange Protocol Based on Tropical Semi-ring 计算机科学, 2022, 49(6A): 571-574. https://doi.org/10.11896/jsjkx.210700046 |
[4] | Renata WONG. 早期量子算法在量子通信、量子纠错等领域的应用 Application of Early Quantum Algorithms in Quantum Communication,Error Correction and Other Fields 计算机科学, 2022, 49(6A): 645-648. https://doi.org/10.11896/jsjkx.210400214 |
[5] | 袁昊男, 王瑞锦, 郑博文, 吴邦彦. 基于Fabric的电子病历跨链可信共享系统设计与实现 Design and Implementation of Cross-chain Trusted EMR Sharing System Based on Fabric 计算机科学, 2022, 49(6A): 490-495. https://doi.org/10.11896/jsjkx.210500063 |
[6] | 梁珍珍, 徐明. 基于海洋水声信道的密钥协商方案 Key Agreement Scheme Based on Ocean Acoustic Channel 计算机科学, 2022, 49(6): 356-362. https://doi.org/10.11896/jsjkx.210400097 |
[7] | 任畅, 赵洪, 蒋华. 一种量子安全拜占庭容错共识机制 Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism 计算机科学, 2022, 49(5): 333-340. https://doi.org/10.11896/jsjkx.210400154 |
[8] | 王梦宇, 殷新春, 宁建廷. 支持访问策略隐藏和密钥追踪的轻量级医疗数据共享方案 Lightweight Medical Data Sharing Scheme with Access Policy Hiding and Key Tracking 计算机科学, 2022, 49(3): 77-85. https://doi.org/10.11896/jsjkx.210800001 |
[9] | 张振超, 刘亚丽, 殷新春. 适用于物联网环境的无证书广义签密方案 New Certificateless Generalized Signcryption Scheme for Internet of Things Environment 计算机科学, 2022, 49(3): 329-337. https://doi.org/10.11896/jsjkx.201200256 |
[10] | 冯登国. 一种新的密码本原:棘轮密钥交换的定义、模型及构造 New Cryptographic Primitive: Definition, Model and Construction of Ratched Key Exchange 计算机科学, 2022, 49(1): 1-6. https://doi.org/10.11896/jsjkx.yg20220101 |
[11] | 张赛男, 李千目. 一种基于Logistic-Sine-Cosine映射的彩色图像加密算法 Color Image Encryption Algorithm Based on Logistic-Sine-Cosine Mapping 计算机科学, 2022, 49(1): 353-358. https://doi.org/10.11896/jsjkx.201000041 |
[12] | 陈海彪, 黄声勇, 蔡洁锐. 一个基于智能电网的跨层路由的信任评估协议 Trust Evaluation Protocol for Cross-layer Routing Based on Smart Grid 计算机科学, 2021, 48(6A): 491-497. https://doi.org/10.11896/jsjkx.201000169 |
[13] | 唐飞, 陈云龙, 冯卓. 基于区块链和代理重加密的电子处方共享方案 Electronic Prescription Sharing Scheme Based on Blockchain and Proxy Re-encryption 计算机科学, 2021, 48(6A): 498-503. https://doi.org/10.11896/jsjkx.201000143 |
[14] | 姜昊堃, 董学东, 张成. 改进的具有前向安全性的无证书代理盲签名方案 Improved Certificateless Proxy Blind Signature Scheme with Forward Security 计算机科学, 2021, 48(6A): 529-532. https://doi.org/10.11896/jsjkx.200700049 |
[15] | 石铁柱, 钱俊彦, 潘海玉. 模糊安全性和活性 Fuzzy Safety and Liveness Properties 计算机科学, 2021, 48(4): 31-36. https://doi.org/10.11896/jsjkx.200500036 |
|