计算机科学 ›› 2016, Vol. 43 ›› Issue (Z11): 411-416.doi: 10.11896/j.issn.1002-137X.2016.11A.094

• 信息安全 • 上一篇    下一篇

基于一个新的五维离散混沌的快速图像加密算法

朱淑芹,李俊青,葛广英   

  1. 聊城大学计算机学院 聊城252059,聊城大学计算机学院 聊城252059,聊城大学物理科学与信息工程学院 聊城252059
  • 出版日期:2018-12-01 发布日期:2018-12-01
  • 基金资助:
    本文受国家自然科学基金面上项目(61573178),山东省高校智能信息处理与网络安全重点实验室资助

Fast Image Encryption Algorithm Based on Novel Five Dimensional Discrete Chaos

ZHU Shu-qin, LI Jun-qing and GE Guang-ying   

  • Online:2018-12-01 Published:2018-12-01

摘要: 结合Logistic映射和三维离散Lorenz映射,构造了一个新的五维离散混沌映射。基于该映射,提出了一个只有两轮扩散操作的图像加密算法,在第一轮扩散操作中的密钥流与明文相关,在第二轮扩散操作中的密钥流与第一轮的密文相关,这导致算法中的最终加密密钥与明文相关且密文与明文、密钥之间的关系复杂化。实验结果和安全性分析表明,该算法具有密钥空间大、密文图像统计特性良好、密文对明文和密钥非常敏感、抵抗选择明(密)文的攻击、加密速度快的优点。所提算法在图像保密通信和存储应用中将具有良好的应用前景。

关键词: 五维离散混沌,图像加密,两轮扩散,抵抗选择明(密)文的攻击

Abstract: Combining the Logistic mapping and 3D discrete Lorenz mapping,a new five dimensional discrete chaotic map was constructed.Based on the map,an image encryption algorithm with only two rounds of diffusion operation was proposed.In the first round of the diffusion operation,the key stream is related to the plaintext and the key stream in the second round diffusion operation is related to the ciphertext of first round.Therefore,the final encryption key of the algorithm is related to the plaintext and the relationship among ciphertext,plain text and key becomes complicated.Experimental results and security analysis show that the algorithm has a large key space,good statistical characteristics for ciphertext,high sensitiveness for ciphertext to plaintext and key,resistance to chosen plaintext and ciphertext,fast encryption speed.So,this algorithm has good application prospects in image secure communication and storage applications.

Key words: Five dimensional discrete chaos,Image encryption,Two rounds of diffusion operation,Resistance to choose plain (cipher) text attack

[1] Liu W B,Chen G R.A three-dimensional smooth autonomous quadratic Chaotic system generate a single four-scroll attractor[J].Int.J.Bifurc.Chaos,2004,14:1395-1403
[2] Li C B,Sprott J C.Multistability in a butterfly flow[J].Int.J.Bifurc.Chaos,2013,23:1350199-1350209
[3] 官国荣,吴成茂,贾倩.一种改进高性能Lorenz 混沌系统构造及其应用[J].物理学报,2015,64(2):31-44
[4] 朱淑芹,杨淼,张先华,等.利用Silnikov定理构造混沌系统[J].北京科技大学学报,2005,27(5):635-637
[5] Chen G,Ueta T.Yet another chaotic attractor[J].Int J Bifurcation Chaos,1999,9(7):1465-1466
[6] Lu J,Chen G.A new chaotic attractor coined[J].Int J Bifurcation Chaos,2002,12(3):659-661
[7] Cˇelikovsky′ S,Chen G.On a generalized Lorenz canonical form of chaotic systems[J].Int J Bifurcation Chaos,2002,12(8):1789-1812
[8] Lu J,Chen G,Cheng D,et al.Bridge the gap between the Lorenz system and the Chen system[J].Int J Bifurcation Chaos,2002,12(12):2917-2926
[9] Gao T,Chen Z,Yuan Z,et al.A hyperchaos generated fromChen’s system[J].Int J Mod Phys C,2006,7(4):471-478
[10] Li Y,Tang W K S,Chen G.Hyperchaos evolved from the generalized Lorenz equation[J].Int J Circ Theory,2005,33(4):235-251
[11] Chen A,Lu J,Lu J,et al.Generating hyperchaotic Lu attractor via state feedback control[J].Physica A,2006,364:103-110
[12] Wang G,Zhang X,Zhen Y,et al.A new modified hyperchaotic Lu system[J].Physica A,2006,371(2):260-272
[13] Li Y,Chen G,Tang WKS.Controlling a unified chaotic system to hyperchaotic[J].IEEE Trans Circuits Syst II,2005,52(4):204-207
[14] 韩双霜,闵乐泉,韩丹丹.一种新的混沌图像加密算法设计[J].河南科技大学学报(自然科学版),2014,5(5):37-41
[15] 韩双霜,闵乐泉,韩丹丹.一种基于三维离散混沌映射的伪随机数生器[J].华中科技大学学报(自然科学版),2013,41(8):16-19
[16] DraganLambi′c.A new discrete chaotic map based on the composition of permutations[J].Chaos,Solitons and Fractals,2015,8:245-248
[17] Wang Yong,Wong K W,Liao Xiao-feng,et al.A new chaos-based fast image encryption algorithm[J].Applied Soft Computing,2011,11(11):514-522
[18] Ye Rui-song.A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism[J].Optics Communications,2011,4:5290-5298
[19] Zhang Guo-ji,Liu Qing.A novel image encryption method based on total shuffling scheme[J].Optics Communications,2011,4:2775-2780
[20] Rudin L,Osher S,Fatemi E.Nonlinear total variation based on noise removal algorithms[J].Physica D,1992,60:259-268
[21] Sprott J C.Chaos and time-series analysis[M].Oxford:Oxford University Press,2003:513
[22] 王静,蒋国平.一种超混沌图像加密算法的安全性分析及其改进[J].物理学报,2011,0(6):83-93
[23] Behnia S,Akhshani A,Mahmodi H,et al.A Novel Algorithm for Image Encryption Based on Mixture of Chaotic Maps[J].Chaos,Solitons & Fractals,2008,5(2):408-419
[24] Rodriguez J.Computational Cryptography based on trigonome-tric algorithms and intensity superposition[J].The Imaging Science Journal,2010,58(1):61-80
[25] 卢辉斌,孙艳.基于新的超混沌系统的图像加密方案[J].计算机科学,2011,38(6):49-52

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!