计算机科学 ›› 2020, Vol. 47 ›› Issue (10): 327-331.doi: 10.11896/jsjkx.190800003

• 信息安全 • 上一篇    下一篇

基于循环移位和多混沌映射的图像加密算法

田军锋1,2, 彭静静1, 左宪禹1,2,3, 葛强1,2,3, 范明虎1,2   

  1. 1 河南大学计算机与信息工程学院 河南 开封475004
    2 河南省大数据分析与处理重点实验室 河南 开封475004
    3 河南大学数据与知识工程研究所 河南 开封475004
  • 收稿日期:2019-08-01 修回日期:2019-10-20 出版日期:2020-10-15 发布日期:2020-10-16
  • 通讯作者: 范明虎(fmh139@163.com)
  • 作者简介:tjf328@126.com
  • 基金资助:
    国家重点研发计划课题(2017YFD0301105);国家自然科学基金(U1604145,U1704122);河南省重点研发与推广专项(182102210242,182102110065,192102210096)

Image Encryption Algorithm Based on Cyclic Shift and Multiple Chaotic Maps

TIAN Jun-feng1,2, PENG Jing-jing1, ZUO Xian-yu1,2,3, GE Qiang1,2,3, FAN Ming-hu1,2   

  1. 1 College of Computer and Information Engineering,Henan University,Kaifeng,Henan 475004,China
    2 Key Laboratory of Big Data Analysis and Processing of Henan Province,Henan University,Kaifeng,Henan 475004,China
    3 Institute of Data and Knowledge Engineering,Henan University,Kaifeng,Henan 475004,China
  • Received:2019-08-01 Revised:2019-10-20 Online:2020-10-15 Published:2020-10-16
  • About author:TIAN Jun-feng,born in 1980,Ph.D,lecturer.His main research interests include digital image processing and image encryption.
    FAN Ming-hu,born in 1974,Ph.D,lecturer.His main research interests include remote sensing image and information space processing.
  • Supported by:
    National Key Research and Development Program of China (2017YFD0301105),National Natural Science Foundation of China(U1604145,U1704122) and Special Research and Development and Promotion Project of Henan Province (182102210242,182102110065,192102210096)

摘要: 利用单一混沌系统实现的加密算法结构简单且容易被攻击,采用多个混沌系统加密是提高加密系统安全性的有效措施。文中提出一种基于循环移位和多混沌映射的图像加密算法,循环移位操作可以有效地改变图像的像素值。首先,利用分段线性混沌映射(Piecewise Linear Chaotic Map,PWLCM)和Logistic映射产生不同的混沌序列,并根据不同混沌序列生成索引矩阵和循环移位数。然后,根据索引矩阵对明文图像进行置换操作,根据循环移位数对置换图像依次做左循环移位操作。最后,通过Logistic混沌序列和PWLCM混沌序列对循环移位后的图像进行置乱和扩散操作,最终得到加密图像。对图像直方图、信息熵、差分攻击、相关性进行的测试和分析结果表明,所提加密算法具有高安全性和抵御各种攻击的能力,可以应用于图像加密系统中。

关键词: 多混沌映射, 混沌加密, 索引矩阵, 图像加密, 循环移位

Abstract: The encryption algorithm implemented by a single chaotic system has a simple structure and is easy to be attacked,using multiple chaotic systems to encrypt is an effective measure to improve the security of the encryption system.A new image encryption algorithm based on cyclic shift and multiple chaotic maps was proposed,and cyclic shift operation can change the va-lues of the pixels efficiently.First,using piece-wise linear chaotic map (PWLCM) and Logistic map to generate different chaotic sequences,generating index matrix and cyclic shift number according to the different chaotic sequences.Then,the plaintext image is replaced on the basis of index matrix.The left cyclic shift operation is performed on the replacement image in turn according to the cyclic shift number.Finally,the image after cyclic shift is scrambled and diffused by Logistic chaotic sequence and PWLCM chaotic sequence.Ultimately,an encrypted image is obtained.Tests and analyses of image histogram,information entropy,diffe-rential attack and correlation were carried out.Theoretical analysis and simulation results show that this algorithm has high secu-rity,a desirable ability to resist different kinds of attacks and can be used to implement an image encryption system.

Key words: Chaotic encryption, Cyclic shift, Image encryption, Index matrix, Multiple chaotic maps

中图分类号: 

  • TP391
[1]LIAN S,SUN J,WANG Z.A block cipher based on a suitable use of the chaotic standard map[J].Chaos Soliton Fract,2005,26(1):117-129.
[2]MATTHEWS R.On the derivation of chaotic encryption algorithm[J].Cryptologia,1989,13(1):29-42.
[3]CHAI X L,GAN Z H.New Bit-level Self-adaptive Color Image Encryption Algorithm Based on Hyperchaotic System[J].Computer Science,2016,43(4):134-139.
[4]CAI J,CHEN X,XIANG X D.Substitution permutation net-work structured image encryption algorithm based on chaotic map[J].Computer Science,2014,41(9):158-164.
[5]LIU L F,MIAO S X.A new image encryption algorithm based on logistic chaotic map with varying parameter[J].Springer Plus,2016,5(1):1-12.
[6]NASIR Q,ABDLRUDHA H H.High security nested PWLCM chaotic map bit-level permutation based image encryption[J].International Journal of Communications,Network and System Sciences,2012,5(9):548-556.
[7]XU L,LI Z,LI J,et al.A novel bit-level image encryption algorithm based on chaotic maps[J].Optics and Lasers inEnginee-ring,2016,78:17-25.
[8]LI C,LI S,KWOK-TUNG L.Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps[J].Commun.Nonlinear Sci.Numer.Simul.,2011,16:837-843.
[9]LI C.Cracking a hierarchical chaotic image encryption algorithm based on permutation[J].Signal Process,2016,118:203-210.
[10]WANG X Y,ZHU X Q,WU X J,et al.Image encryption algorithm based on multiple mixed hash functions and cyclic shift[J].Optics and Lasers in Engineering,2018,107:370-379.
[11]HUA Z Y,ZHOU Y C,PUN C M,et al.2D sine Logistic modulation map for image encryption[J].Information Sciences,2015,297(10):80-94.
[12]HUA Z Y,ZHOU Y C,HUANG H J.Cosine-transform-based chaotic system for image encryption[J].Information Sciences,2019,480:403-419.
[13]ZHU S Q,LI J Q,GE G Y.New image encryption algorithm Based on new four-dimensional discrete-time chaotic map[J].Computer Science,2017,44(1):188-193.
[14]XU B,SUN Y W,LI Y,et al.Improved Encryption Algorithm Based on High-dimension Chaotic System[J].Journal of Jilin University(Information Science Edition),2012,30(1):12-17.
[15]CHENG D S,TAN X,XU Z L,et al.Dimensional Hyper-chaotic System and Bit Decomposition[J].Journal of University of Electronic Science and Technology of China,2018,47(6):906-912.
[1] 王坤姝, 张泽辉, 高铁杠.
基于Hachimoji DNA和QR分解的遥感图像可逆隐藏算法
Reversible Hidden Algorithm for Remote Sensing Images Based on Hachimoji DNA and QR Decomposition
计算机科学, 2022, 49(8): 127-135. https://doi.org/10.11896/jsjkx.210700216
[2] 周连兵, 周湘贞, 崔学荣.
基于双重二维混沌映射的压缩图像加密方案
Compressed Image Encryption Scheme Based on Dual Two Dimensional Chaotic Map
计算机科学, 2022, 49(8): 344-349. https://doi.org/10.11896/jsjkx.210700235
[3] 张赛男, 李千目.
一种基于Logistic-Sine-Cosine映射的彩色图像加密算法
Color Image Encryption Algorithm Based on Logistic-Sine-Cosine Mapping
计算机科学, 2022, 49(1): 353-358. https://doi.org/10.11896/jsjkx.201000041
[4] 班多晗, 吕鑫, 王鑫元.
基于一维混沌映射的高效图像加密算法
Efficient Image Encryption Algorithm Based on 1D Chaotic Map
计算机科学, 2020, 47(4): 278-284. https://doi.org/10.11896/jsjkx.190600059
[5] 禹峰,龚馨慧,王世红.
基于快速置换和可选择像素扩散的医疗图像加密算法的安全性分析
Cryptanalysis of Medical Image Encryption Algorithm Using High-speed Scrambling and Pixel Adaptive Diffusion
计算机科学, 2020, 47(2): 276-280. https://doi.org/10.11896/jsjkx.190100051
[6] 王丽娟, 李国东, 吕冬梅.
基于动态参数控制的混沌系统图像加密算法
Chaotic System Image Encryption Algorithm Based on Dynamic Parameter Control
计算机科学, 2019, 46(11A): 469-472.
[7] 韩雪娟, 李国东, 王思秀.
基于Logistic和超混沌结合的加密算法
Cryptographic Algorithm Based on Combination of Logistic and Hyperchaos
计算机科学, 2019, 46(11A): 477-482.
[8] 赵方正, 李成海, 刘晨, 宋亚飞.
超混沌彩色图像加密算法优化及安全性分析
Security Analysis and Optimization of Hyper-chaotic Color Image Encryption Algorithm
计算机科学, 2019, 46(11A): 483-487.
[9] 朱淑芹,王文宏,李俊青.
针对基于感知器模型的混沌图像加密算法的选择明文攻击
Chosen Plaintext Attack on Chaotic Image Encryption Algorithm Based on Perceptron Model
计算机科学, 2018, 45(4): 178-181. https://doi.org/10.11896/j.issn.1002-137X.2018.04.030
[10] 汪乐乐, 李国东.
基于游程性序列的双重混沌的图像加密算法
Double Chaotic Image Encryption Algorithm Based on Run-length Sequence
计算机科学, 2018, 45(11A): 361-366.
[11] 臧睿, 于洋.
基于对合矩阵的复合图像加密算法
Composite Image Encryption Algorithm Based on Involutory Matrix
计算机科学, 2018, 45(11A): 389-392.
[12] 汪乐乐, 李国东.
基于分数阶Fourier的双混沌加密算法
Double Chaotic Image Encryption Algorithm Based on Fractional Transform
计算机科学, 2018, 45(11A): 393-397.
[13] 朱淑芹,李俊青.
参数扰动下的混沌的图像加密方案
Image Encryption Scheme Based on Chaos with Parameter Perturbation
计算机科学, 2017, 44(Z6): 356-360. https://doi.org/10.11896/j.issn.1002-137X.2017.6A.081
[14] 朱淑芹,王文宏,孙忠贵.
对一种基于比特置乱的超混沌图像加密算法的选择明文攻击
Chosen Plaintext Attack on Image Encryption Algorithm Based on Bit Scrambling and Hyperchaos
计算机科学, 2017, 44(11): 273-278. https://doi.org/10.11896/j.issn.1002-137X.2017.11.041
[15] 朱淑芹,李俊青,葛广英.
基于一个新的四维离散混沌映射的图像加密新算法
New Image Encryption Algorithm Based on New Four-dimensional Discrete-time Chaotic Map
计算机科学, 2017, 44(1): 188-193. https://doi.org/10.11896/j.issn.1002-137X.2017.01.036
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!