计算机科学 ›› 2022, Vol. 49 ›› Issue (8): 344-349.doi: 10.11896/jsjkx.210700235

• 信息安全 • 上一篇    

基于双重二维混沌映射的压缩图像加密方案

周连兵1, 周湘贞2, 崔学荣3   

  1. 1 东营职业学院人工智能学院 山东 东营 257091
    2 北京航空航天大学计算机学院 北京 100191
    3 中国石油大学(华东)海洋与空间信息学院 山东 青岛 266580
  • 收稿日期:2021-07-23 修回日期:2021-10-15 发布日期:2022-08-02
  • 通讯作者: 周连兵(zlb@126.com)
  • 基金资助:
    国家自然科学基金(61902431);基于自动学习的深度置信网络及多源信息融合的复杂环境下室内定位关键技术研究

Compressed Image Encryption Scheme Based on Dual Two Dimensional Chaotic Map

ZHOU Lian-bing1, ZHOU Xiang-zhen2, CUI Xue-rong3   

  1. 1 School of Artificial Intelligence,Dongying Vocational Institute,Dongying,Shandong 257091,China
    2 School of Computer Science and Engineering,Beihang University,Beijing 100191,China
    3 College of Oceanography and Space Informatics,China University of Petroleum(East China),Qingdao,Shandong 266580,China
  • Received:2021-07-23 Revised:2021-10-15 Published:2022-08-02
  • About author:ZHOU Lian-bing,born in 1978,master,professor.His main research interests include computer network and so on.
  • Supported by:
    National Natural Science Foundation of China(61902431) and Study on the Key Technologies of IndoorLocatization in Complex Environment Based on the Automatic Learning Deep Belief Nets and Multi-source Information Fusion.

摘要: 为了提高混沌加密系统的安全性和加密速度,提出了一种联合混沌映射的轻量级压缩图像加密方案。首先,为了加速加密过程,破坏像素间的相关性,将数字图像分割为图像块,并通过在频域中的处理对其进行压缩;然后,实施2D Logistic混沌映射,用于在密钥生成、置乱和替换阶段对图像像素进重排和换位。此外,为了进一步提高安全等级,在扩散阶段利用另一种混沌映射2D Henon映射来改变置乱图像的像素值。性能评估结果表明,所提方案能够满足图像加密的安全性要求,且密钥空间大。与其他优秀方案相比,该方案能够更好地抵御统计和差分等攻击,且对生成的密钥空间改变具有高度敏感性。其中,密钥空间大小为256位,实现了约99%的NPCR值和超过15%的UACI值。

关键词: 安全性, 混沌加密系统, 加密速度, 密钥, 图像加密, 压缩图像

Abstract: In order to improve the security and encryption speed of chaotic encryption system,a lightweight compression image encryption scheme based on chaotic mapping is proposed.Firstly,in order to speed up the encryption process and destroy the correlation between pixels,the digital image is divided into image blocks and compressed by processing in the frequency domain.Then,2D Logistic chaotic mapping is implemented to rearrange and transpose image pixels in the key generation,scrambling and replacement stages.In addition,to further improve the security level,in the diffusion stage,another chaotic map 2D Henon map is used to change the pixel value of the scrambled image.Performance evaluation results show that the proposed scheme can meet the security requirements of image encryption,and the key space is large.Compared with other excellent schemes,this scheme can better resist statistical and differential attacks,and it is highly sensitive to the change of the generated key space.Its key space size is 256bits,the NPCR value is about 99%,and UACI value is more than 15%.

Key words: Chaotic encryption system, Compression image, Encryption speed, Image encryption, Key, Security

中图分类号: 

  • TN918
[1]ZHANG S,GAO T G.An image encryption scheme based on DNA coding and permutation of hyper-image [J].Multimedia Tools and Applications,2016,75(24):17157-17170.
[2]RAMANATHAN T,HOSSEN M J,SAYEED M S,et al.Survey on computational intelligence based image encryption techniques[J].Indonesian Journal of Electrical Engineering and Computer Science,2020,19(3):1428-1435.
[3]FATMA Y,HAFID A,DANI H O.Peningkatan keamanan pengiriman pesan teks:kombinasi advanced encryption standard(AES) 128 dan least significant bit(LSB)[J].JUSIFO (Jurnal Sistem Informasi),2020,6(2):111-120.
[4]IKHWAN A,RAOF R,EHKAN P,et al.Data security implementation using data encryption standard method for student values at the faculty of medicine,University of North Sumatra[J].Journal of Physics:Conference Series,2021,1755(1):22-33.
[5]YE G D,HUANG X L.An efficient symmetric image encryption algorithm based on an intertwining logistic map [J].Neurocomputing,2017,251(19):45-53.
[6]MAO J,WANG H Y,CHEN Y.Image encryption algorithmbased on dynamic key selection and multi-direction diffusion[J].Optical Technique,2018,44(3):278-286.
[7]ELAMIR M M,TABANY W I,MAI S M.Hybrid image en-cryption scheme for secure E-health systems[J].Network Mo-deling Analysis in Health Informatics and Bioinformatics,2021,10(1):1727-1744.
[8]DING L N,DING Q.A novel image encryption scheme based on 2D fractional chaotic map,DWT and 4D hyper-chaos[J].Electronics,2020,9(8):1280-1299.
[9]LI C,LUO G,LI C.An image encryption scheme based on the three-dimensional chaotic logistic map[J].International Journal of Network Security,2019,21(1):22-29.
[10]HAN S M,ZHANG W,ZHANG X,et al.Multiple image encryption method based on light field imaging theory and chaotic system[J].Acta Photonica Sinica,2020,49(3):193-202.
[11]SAMAR M I,LOBNA A,AHMED A R,et al.Biomedical image encryption based on double-humped and fractional logistic maps[C]//2017 6th International Conference on Modern Circuits and Systems Technologies(MOCAST).IEEE press,2017:112-123.
[12]LI M,ZHOU K,REN H,et al.Cryptanalysis of permutation-diffusion-based lightweight chaotic image encryption scheme using CPA[J].Applied Sciences,2019,9(3):95-104.
[13]XIAN Y J,XIE S J,TU Y L.Multi-image encryption algorithm based on hyper-chaotic system [J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2020,32(6):1065-1074.
[14]LIU Z,WANG Y.Image compression and encryption schemebased on the two-dimensional coupled map lattice model [J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2020,32(6):1048-1057.
[15]YAN X X,ZHANG Q C YANG C C.Weighted attribute-based encryption scheme with traitor tracing [J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2020,32(6):1058-1064.
[16]LI M,XU M,LUO J,et al.Cryptanalysis of an image encryption using 2D Henon-sine map and DNA approach[J].IEEE Access,2019,52(7):63336-63345.
[17]JRIDI M,MEHER P K.Scalable approximate DCT architec-tures for effcient HEVC-compliant video coding[J].IEEE Trans. Circuits. Syst. Video Technol.,2017,27(8):1815-1825.
[18]SHIHABH S,SUHAIDI S,ABDUL R R,et al.Enhancement of satellite image compression using a hybrid(DWT-DCT) algorithm[J].Sensing & Imaging,2017,18(1):30-41.
[19]EEAYATIFARA R,ABDULLAHB A,ISMAIL F I.Image encryption using a synchronous permutation diffusion technique[J].Optics and Lasers in Engineering,2017,90(6):146-154.
[20]WU Y,ZHOU Y,SAVERIADES G,et al.Local shannon entropy measure with statistical tests for image randomness[J].Information Science,2013,222(12):323-342.
[21]ZHANG Y.A Chaotic system based image encryption schemewith identical encryption and decryption algorithm[J].Chinese Journal of Electronics,2017,26(5):1022-1031.
[22]MOAFIMADANI S S, CHEN Y,TANG C.A new algorithm for medical color images encryption using chaotic systems[J].Entropy,2019,21(6):577-186.
[1] 蹇奇芮, 陈泽茂, 武晓康.
面向无人机通信的认证和密钥协商协议
Authentication and Key Agreement Protocol for UAV Communication
计算机科学, 2022, 49(8): 306-313. https://doi.org/10.11896/jsjkx.220200098
[2] 李瑭, 秦小麟, 迟贺宇, 费珂.
面向多无人系统的安全协同模型
Secure Coordination Model for Multiple Unmanned Systems
计算机科学, 2022, 49(7): 332-339. https://doi.org/10.11896/jsjkx.210600107
[3] 黄华伟, 李春华.
一种基于热带半环的密钥建立协议的安全性分析
Security Analysis of A Key Exchange Protocol Based on Tropical Semi-ring
计算机科学, 2022, 49(6A): 571-574. https://doi.org/10.11896/jsjkx.210700046
[4] Renata WONG.
早期量子算法在量子通信、量子纠错等领域的应用
Application of Early Quantum Algorithms in Quantum Communication,Error Correction and Other Fields
计算机科学, 2022, 49(6A): 645-648. https://doi.org/10.11896/jsjkx.210400214
[5] 袁昊男, 王瑞锦, 郑博文, 吴邦彦.
基于Fabric的电子病历跨链可信共享系统设计与实现
Design and Implementation of Cross-chain Trusted EMR Sharing System Based on Fabric
计算机科学, 2022, 49(6A): 490-495. https://doi.org/10.11896/jsjkx.210500063
[6] 梁珍珍, 徐明.
基于海洋水声信道的密钥协商方案
Key Agreement Scheme Based on Ocean Acoustic Channel
计算机科学, 2022, 49(6): 356-362. https://doi.org/10.11896/jsjkx.210400097
[7] 任畅, 赵洪, 蒋华.
一种量子安全拜占庭容错共识机制
Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism
计算机科学, 2022, 49(5): 333-340. https://doi.org/10.11896/jsjkx.210400154
[8] 王梦宇, 殷新春, 宁建廷.
支持访问策略隐藏和密钥追踪的轻量级医疗数据共享方案
Lightweight Medical Data Sharing Scheme with Access Policy Hiding and Key Tracking
计算机科学, 2022, 49(3): 77-85. https://doi.org/10.11896/jsjkx.210800001
[9] 张振超, 刘亚丽, 殷新春.
适用于物联网环境的无证书广义签密方案
New Certificateless Generalized Signcryption Scheme for Internet of Things Environment
计算机科学, 2022, 49(3): 329-337. https://doi.org/10.11896/jsjkx.201200256
[10] 冯登国.
一种新的密码本原:棘轮密钥交换的定义、模型及构造
New Cryptographic Primitive: Definition, Model and Construction of Ratched Key Exchange
计算机科学, 2022, 49(1): 1-6. https://doi.org/10.11896/jsjkx.yg20220101
[11] 张赛男, 李千目.
一种基于Logistic-Sine-Cosine映射的彩色图像加密算法
Color Image Encryption Algorithm Based on Logistic-Sine-Cosine Mapping
计算机科学, 2022, 49(1): 353-358. https://doi.org/10.11896/jsjkx.201000041
[12] 陈海彪, 黄声勇, 蔡洁锐.
一个基于智能电网的跨层路由的信任评估协议
Trust Evaluation Protocol for Cross-layer Routing Based on Smart Grid
计算机科学, 2021, 48(6A): 491-497. https://doi.org/10.11896/jsjkx.201000169
[13] 唐飞, 陈云龙, 冯卓.
基于区块链和代理重加密的电子处方共享方案
Electronic Prescription Sharing Scheme Based on Blockchain and Proxy Re-encryption
计算机科学, 2021, 48(6A): 498-503. https://doi.org/10.11896/jsjkx.201000143
[14] 姜昊堃, 董学东, 张成.
改进的具有前向安全性的无证书代理盲签名方案
Improved Certificateless Proxy Blind Signature Scheme with Forward Security
计算机科学, 2021, 48(6A): 529-532. https://doi.org/10.11896/jsjkx.200700049
[15] 石铁柱, 钱俊彦, 潘海玉.
模糊安全性和活性
Fuzzy Safety and Liveness Properties
计算机科学, 2021, 48(4): 31-36. https://doi.org/10.11896/jsjkx.200500036
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!