计算机科学 ›› 2020, Vol. 47 ›› Issue (4): 278-284.doi: 10.11896/jsjkx.190600059

• 信息安全 • 上一篇    下一篇

基于一维混沌映射的高效图像加密算法

班多晗, 吕鑫, 王鑫元   

  1. 河海大学计算机与信息学院 南京211100
  • 收稿日期:2019-06-12 出版日期:2020-04-15 发布日期:2020-04-15
  • 通讯作者: 吕鑫(lvxin.gs@163.com)
  • 基金资助:
    国家重点研发计划课题(2018YFC0407105);国家自然科学基金-广东联合基金重点项目(U1301252)

Efficient Image Encryption Algorithm Based on 1D Chaotic Map

BAN Duo-han, LV Xin, WANG Xin-yuan   

  1. College of Computer & Information,Hohai University,Nanjing 211100,China
  • Received:2019-06-12 Online:2020-04-15 Published:2020-04-15
  • Contact: LV Xin,born in 1983,Ph.D,lecturer,is a member of China Computer Federation.His research is mainly focused on network and information security.
  • About author:BAN Duo-han,born in 1994,postgra-duate.Her main research interests include image encryption and network security.
  • Supported by:
    This work was supported by the National Key Research and Development Program of China (2018YFC0407105) and NSF-China and Guangdong Province Joint Project (U1301252)

摘要: 随着多媒体技术的发展,基于数字图像的应用日益普及,图像本身的安全问题及图像所有者的隐私问题愈发严重。不同于文本数据,数字图像作为一种二维数据,其数据量大,冗余度高,像素间相关性强,将传统的一维数据加密方法直接应用于图像加密中难以达到加密的效果。当前,基于混沌理论的加密方法是图像加密领域的主流方法之一,其往往采用置乱-扩散的经典结构,利用所生成混沌序列的高随机性保证加密结果的安全性,同时具备较高的加密效率。然而,为了进一步增强加密算法的安全性,此类方法提出了大量复杂的混沌映射,如超混沌、多级混沌等,但它们的计算复杂度较一维混沌映射有了大幅增加。对此,文中设计了一种高效的一维复合混沌映射SPM,其将Sine映射和PWLCM映射结合,扩大了混沌映射的范围并保证了结果的遍历性,在不降低安全性的前提下极大地提升了混沌序列的生成效率;基于此,提出了一种新型结构下的高效图像加密算法,该算法仅需一轮置乱-扩散-置乱过程即可完成图像的加密,相较于传统方法减少了加密的轮数,进一步提升了加密的效率。实验表明,所提方法能够有效抵御选择明文/密文攻击,相较于已有算法,加密效率平均提升了约58%,具备较强的实用性。

关键词: 单轮次加密, 复合混沌映射, 图像加密, 伪随机性, 选择明文/密文攻击

Abstract: With the development of multimedia technologies,the applications based on digital images have become more and more popular,the security issues of the image itself and the privacy problems of the image owners are more severe in current environment.Different from text,digital images data as a two-dimensional data with large volume of data,high redundancy and strong correlation between pixels.It is difficult to achieve the effect of encryption when traditional encryption method is applied directly to image encryption.At present,encryption based on chaos theory is one of the mainstream methods in the field of image encryption,which using the classical structure of scrambling-diffusion,making use of the high randomness of the chao-tic sequences to ensure the security of the encryption results,and has a high encryption efficiency at the same time.In order to further improve the security of chaotic encryption algorithms,a large number of complex chaotic maps,such as hyper-chaos and multi-level chaos,have been proposed,however,the computational complexity is much higher than that of one-dimensional chaotic maps.To solve this problem,an efficient chaotic map called SPM is designed through combining Sine map and PWLCM,which expands thechao-tic range,enhances the ergodicity and lifts up the generation speed of chaotic sequence without reducing security.Based on this,an image encryption algorithm based on a novel structure is designed.Only one round of scrambling-diffusion-scrambling is needed to complete the encryption in this method,which reduces the encryption rounds compared to traditional methods and further improves the efficiency of encryption.The fully experiments show that the proposed method can effectively resist the chosen plain-image/cipher-image attacks and the encryption efficiency is improved by about 58% on average,meaning a high practicability.

Key words: Chosen plain-image/cipher-image encryption attack, Compound chaotic map, Image encryption, One-round encryption, Pseudo-randomness

中图分类号: 

  • TP309.7
[1]ZHANG X Q,WANG M M,ZHU G L.Research on the New Development of Image Encryption Algorithms[J].Computer Engineering & Science,2012,34(5):1-6.
[2]YE G.Image scrambling encryption algorithm of pixel bit based on chaos map[J].Pattern Recognition Letters,2010,31(5):347-354.
[3]LI Y J,ZHANG R Z,GE J H,et al.Periods of the 3-ArnoldTransformation and Its Application in Image Encryption[J].Journal of University of Electronic Science and Technology of China,2015,44(2):289-294.
[4]SHAMIR A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
[5]BLAKLEY G R.Safeguarding cryptographic keys[C]//Proceedings of the National Computer Conference.1979:313-317.
[6]TIAN H Q,QUAN J C,CHENG H,et al.A Summarization about Image Information Encryption Techniques[J].Information Science,2009(1):156-160.
[7]LI T Y,YORKE J A.Period three implies chaos[J].The American Mathematical Monthly,1975,82(10):985-992.
[8]CHEN G,MAO Y,CHUI C K.A symmetric image encryption scheme based on 3D chaotic cat maps[J].Chaos,Solitons and Fractals,2004,21(3):749-761.
[9]ZHOU Y,BAO L,CHEN C L P.A new 1D chaotic system for image encryption[J].Signal Processing,2014,97:172-182.
[10]PAK C,HUANG L.A new color image encryption using combination of the 1D chaotic map[J].Signal Processing,2017,138:129-137.
[11]ARROYO D,RHOUMA R,ALVAREZ G,et al.On the security of a new image encryption scheme based on chaotic map lattices[J].Chaos:An Interdisciplinary Journal of Nonlinear Science,2008,18(3):033112.
[12]SKROBEK A.Cryptanalysis of chaotic stream cipher[J].Physics Letters A,2007,363(1/2):84-90.
[13]WANG X,TENG L,QIN X.A novel colour image encryption algorithm based on chaos[J].Signal Processing,2012,92(4):1101-1108.
[14]ARROYO D,DIAZ J,RODRIGUEZ F B.Cryptanalysis of a one round chaos-based substitution permutation network[J].Signal Processing,2013,93(5):1358-1364.
[15]HUA Z,ZHOU Y,PUN C M,et al.2D Sine Logistic modulation map for image encryption[J].Information Sciences,2015,297:80-94.
[16]ZHU C.A novel image encryption scheme based on improved hyperchaotic sequences[J].Optics Communications,2012,285(1):29-37.
[17]ÖZKAYNAK F,ÖZER A B,YAVUZ S.Cryptanalysis of a novel image encryption scheme based on improved hyperchaotic sequences[J].Optics Communications,2012,285(24):4946-4948.
[18]WEN C C,WANG Q,MIAO X N,et al.Digital Image Encryption:A Survey[J].Computer Science,2012,39(12):6-9.
[19]DENG S,ZHAN Y,XIAO D,et al.Analysis and improvement of a hash-based image encryption algorithm[J].Communications in Nonlinear Science and Numerical Simulation,2011,16(8):3269-3278.
[20]WANG X,JIN C.Image encryption using game of life permutation and PWLCM chaotic system[J].Optics Communications,2012,285(4):412-417.
[21]WOLF A,SWIFT J B,SWINNEY H L,et al.Determining Lyapunov exponents from a time series[J].Physica D:Nonlinear Phenomena,1985,16(3):285-317.
[22]ECKMANN J P,RUELLE D.Ergodic theory of chaos andstrange attractors[M]//The Theory of Chaotic Attractors.New York:Springer,1985:273-312.
[23]ALVAREZ G,LI S.Some basic cryptographic requirements for chaos-based cryptosystems[J].International Journal of Bifurcation and Chaos,2006,16(8):2129-2151.
[24]HUA Z,JIN F,XU B,et al.2D Logistic-Sine-coupling map for image encryption[J].Signal Processing,2018,149:148-161.
[25]WU Y,ZHOU Y,SAVERIADES G,et al.Local Shannon entropy measure with statistical tests for image randomness[J].Information Sciences,2013,222:323-342.
[26]WU Y,ZHOU Y,NOONAN J P,et al.Design of Image Cipher Using Latin Squares[J].Information Sciences,2014,264:317-339.
[1] 周连兵, 周湘贞, 崔学荣.
基于双重二维混沌映射的压缩图像加密方案
Compressed Image Encryption Scheme Based on Dual Two Dimensional Chaotic Map
计算机科学, 2022, 49(8): 344-349. https://doi.org/10.11896/jsjkx.210700235
[2] 张赛男, 李千目.
一种基于Logistic-Sine-Cosine映射的彩色图像加密算法
Color Image Encryption Algorithm Based on Logistic-Sine-Cosine Mapping
计算机科学, 2022, 49(1): 353-358. https://doi.org/10.11896/jsjkx.201000041
[3] 禹峰,龚馨慧,王世红.
基于快速置换和可选择像素扩散的医疗图像加密算法的安全性分析
Cryptanalysis of Medical Image Encryption Algorithm Using High-speed Scrambling and Pixel Adaptive Diffusion
计算机科学, 2020, 47(2): 276-280. https://doi.org/10.11896/jsjkx.190100051
[4] 田军锋, 彭静静, 左宪禹, 葛强, 范明虎.
基于循环移位和多混沌映射的图像加密算法
Image Encryption Algorithm Based on Cyclic Shift and Multiple Chaotic Maps
计算机科学, 2020, 47(10): 327-331. https://doi.org/10.11896/jsjkx.190800003
[5] 王丽娟, 李国东, 吕冬梅.
基于动态参数控制的混沌系统图像加密算法
Chaotic System Image Encryption Algorithm Based on Dynamic Parameter Control
计算机科学, 2019, 46(11A): 469-472.
[6] 韩雪娟, 李国东, 王思秀.
基于Logistic和超混沌结合的加密算法
Cryptographic Algorithm Based on Combination of Logistic and Hyperchaos
计算机科学, 2019, 46(11A): 477-482.
[7] 赵方正, 李成海, 刘晨, 宋亚飞.
超混沌彩色图像加密算法优化及安全性分析
Security Analysis and Optimization of Hyper-chaotic Color Image Encryption Algorithm
计算机科学, 2019, 46(11A): 483-487.
[8] 朱淑芹,王文宏,李俊青.
针对基于感知器模型的混沌图像加密算法的选择明文攻击
Chosen Plaintext Attack on Chaotic Image Encryption Algorithm Based on Perceptron Model
计算机科学, 2018, 45(4): 178-181. https://doi.org/10.11896/j.issn.1002-137X.2018.04.030
[9] 汪乐乐, 李国东.
基于游程性序列的双重混沌的图像加密算法
Double Chaotic Image Encryption Algorithm Based on Run-length Sequence
计算机科学, 2018, 45(11A): 361-366.
[10] 臧睿, 于洋.
基于对合矩阵的复合图像加密算法
Composite Image Encryption Algorithm Based on Involutory Matrix
计算机科学, 2018, 45(11A): 389-392.
[11] 汪乐乐, 李国东.
基于分数阶Fourier的双混沌加密算法
Double Chaotic Image Encryption Algorithm Based on Fractional Transform
计算机科学, 2018, 45(11A): 393-397.
[12] 朱淑芹,王文宏,孙忠贵.
对一种基于比特置乱的超混沌图像加密算法的选择明文攻击
Chosen Plaintext Attack on Image Encryption Algorithm Based on Bit Scrambling and Hyperchaos
计算机科学, 2017, 44(11): 273-278. https://doi.org/10.11896/j.issn.1002-137X.2017.11.041
[13] 朱淑芹,李俊青,葛广英.
基于一个新的四维离散混沌映射的图像加密新算法
New Image Encryption Algorithm Based on New Four-dimensional Discrete-time Chaotic Map
计算机科学, 2017, 44(1): 188-193. https://doi.org/10.11896/j.issn.1002-137X.2017.01.036
[14] 朱淑芹,李俊青,葛广英.
基于一个新的五维离散混沌的快速图像加密算法
Fast Image Encryption Algorithm Based on Novel Five Dimensional Discrete Chaos
计算机科学, 2016, 43(Z11): 411-416. https://doi.org/10.11896/j.issn.1002-137X.2016.11A.094
[15] 柴宏玉,臧鸿雁.
一种基于广义混沌同步系统的图像加密方案
Image Encryption Scheme Based on Generalized Chaotic Synchronization Systems
计算机科学, 2016, 43(8): 100-104. https://doi.org/10.11896/j.issn.1002-137X.2016.08.021
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!