[1]费 敏,李国东.基于混沌系统和双向扩散的图像加密算法[J].计算机技术与发展,2021,31(12):92-97.[doi:10. 3969 / j. issn. 1673-629X. 2021. 12. 016]
 FEI Min,LI Guo-dong.Image Encryption Algorithm Based on Chaotic System and Bidirectional Diffusion[J].,2021,31(12):92-97.[doi:10. 3969 / j. issn. 1673-629X. 2021. 12. 016]
点击复制

基于混沌系统和双向扩散的图像加密算法()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
31
期数:
2021年12期
页码:
92-97
栏目:
图形与图像
出版日期:
2021-12-10

文章信息/Info

Title:
Image Encryption Algorithm Based on Chaotic System and Bidirectional Diffusion
文章编号:
1673-629X(2021)12-0092-06
作者:
费 敏李国东
新疆财经大学 统计与数据科学学院,新疆 乌鲁木齐 830012
Author(s):
FEI MinLI Guo-dong
School of Statistics and Data Science,Xinjiang University of Finance and Economics,Urumqi 830012,China
关键词:
混沌映射明文关联双向扩散图像加密循环移位
Keywords:
chaotic mappingplaintext correlationbidirectional diffusionimage encryptioncyclic shift
分类号:
TP309. 7
DOI:
10. 3969 / j. issn. 1673-629X. 2021. 12. 016
摘要:
针对部分图像加密算法与明文无关,安全性差以及加密效率低的问题,设计一种基于分段线性混沌映射且与明文关联的图像加密算法。 首先,将初始值和参数作为密钥,迭代分段线性混沌映射,产生混沌序列;其次,利用产生的混沌序列设计一个混沌密码发生器,产生与明文图像大小相同的 4 个随机矩阵,记作 X、Y、R 和 W,运用 X 矩阵对明文做前向扩散,得到矩阵 A,再运用 R 和 W 矩阵设计一种与明文关联的置乱方法对矩阵 A 进行置乱得到矩阵 B,在置乱的过程中还进行了循环移位操作使加密效果更好;最后运用 Y 矩阵对矩阵 B 做后向扩散,得到呈现噪声样式和不再具有可视信息的最终密文图像。 通过实验仿真证明,该加密算法密钥空间大,密钥敏感性强,信息熵接近理论值 8,抗差分攻击和统计攻击能力强,得到的密文图像相邻像素相关性低,安全性高。
Abstract:
Aiming at the problems of some image encryption algorithms which are independent of plain text, poor security and low encryption efficiency,? ? ?an image encryption algorithm based on piece wise linear chaotic map and associated with plain text is designed.Firstly,the initial values and parameters are used as keys to iterate piece wise linear chaotic maps to generate chaotic sequences. Secondly,a chaotic cipher generator is designed by using the generated chaotic sequences to generate four random matrices with the same size as the plain text image,which are denoted as X , Y , R and W . Then, X is used to do forward diffusion of plain text to obtain A ,and then R and W are used to design a scrambling method associated with plain text to scramble the A and get the B . In the scrambling process,the cyclic shift operation is also carried out to make the encryption effect better. Finally, Y is used to do backward diffusion of B to obtain the final cipher text image which presents noise pattern and no longer has visual information. The experimental simulation shows that the proposed encryption algorithm has large key space,strong key sensitivity,information entropy close to the theoretical value of 8,strong ability to resist differential attacks and statistical attacks,and the adjacent pixels of the cipher text image have low correlation and high security.

相似文献/References:

[1]李东勤 林克正.基于混沌映射的半脆弱图像水印算法[J].计算机技术与发展,2008,(11):156.
 LI Dong-qin,LIN Ke-zheng.Semi - fragile Image Watermarking Algorithm Based on Chaotic Map[J].,2008,(12):156.
[2]陆大兴 廖晓峰 韩洁 李明.基于Logistic映射与排序变换的图像加密算法[J].计算机技术与发展,2007,(12):27.
 LU Da-xing,LIAO Xiao-feng,HAN Jie,et al.Picture Scrambling Algorithm Based on Logistic Mapping and Sort Transformation[J].,2007,(12):27.
[3]黄子龙 张政保 文家福 李占德.一种基于Hash函数的脆弱水印算法[J].计算机技术与发展,2011,(02):151.
 HUANG Zi-long,ZHANG Zheng-bao,WEN Jia-fu,et al.Fragile Image Watermarking Algorithm Based on Hash Function[J].,2011,(12):151.
[4]王继敏 宋玉蓉 蒋国平.基于消息网络的Hash函数构造[J].计算机技术与发展,2011,(09):24.
 WANG Ji-min,SONG Yu-rong,JIANG Guo-ping.Hash Function Construction Based on Message Network[J].,2011,(12):24.
[5]王全民,杨晶,张帅帅,等.一种基于改进果蝇优化的K-mediods聚类算法[J].计算机技术与发展,2018,28(12):17.[doi:10.3969/j.issn.1673-629X.2018.12.004]
 WANG Quanmin,YANG Jing,ZHANG Shuaishuai.A New K-mediods Clustering Algorithm Based on Improved Fruit Fly Optimization Algorithm[J].,2018,28(12):17.[doi:10.3969/j.issn.1673-629X.2018.12.004]
[6]李彦苍,杨宗瑾.基于改进引力搜索算法的桁架结构优化设计[J].计算机技术与发展,2020,30(05):49.[doi:10. 3969 / j. issn. 1673-629X. 2020. 05. 010]
 LI Yan-cang,YANG Zong-jin.Optimization Design of Truss Structure Based on Improved Gravitational Search Algorithm[J].,2020,30(12):49.[doi:10. 3969 / j. issn. 1673-629X. 2020. 05. 010]
[7]姚 远,白天皓,李亚伟.基于音频载体的特定信息隐藏算法研究[J].计算机技术与发展,2020,30(06):104.[doi:10. 3969 / j. issn. 1673-629X. 2020. 06. 020]
 YAO Yuan,BAI Tian-hao,LI Ya-wei.Research on Specific Information Hiding Algorithm Based on Audio Carrier[J].,2020,30(12):104.[doi:10. 3969 / j. issn. 1673-629X. 2020. 06. 020]
[8]宿梦梦,赵晓蕾,赵洪銮,等.多策略改进哈里斯鹰算法的交通信号配时优化[J].计算机技术与发展,2023,33(01):101.[doi:10. 3969 / j. issn. 1673-629X. 2023. 01. 016]
 SU Meng-meng,ZHAO Xiao-lei,ZHAO Hong-luan,et al.Improvement of Traffic Signal Timing Based on Harris Hawks Optimization Algorithm with Multiple Strategies[J].,2023,33(12):101.[doi:10. 3969 / j. issn. 1673-629X. 2023. 01. 016]
[9]周明伟,阚忠良*,蒋东华.结合压缩感知和新混沌映射的图像加密方案[J].计算机技术与发展,2023,33(03):63.[doi:10. 3969 / j. issn. 1673-629X. 2023. 03. 010]
 ZHOU Ming-wei,KAN Zhong-liang*,JIANG Dong-hua.Image Encryption Scheme by Combining Compressive Sensing and New Chaotic Map[J].,2023,33(12):63.[doi:10. 3969 / j. issn. 1673-629X. 2023. 03. 010]
[10]张志鹏,周井泉.基于改良蜂群算法的 Web 服务组合优化方法[J].计算机技术与发展,2024,34(03):64.[doi:10. 3969 / j. issn. 1673-629X. 2024. 03. 010]
 ZHANG Zhi-peng,ZHOU Jing-quan.Web Service Composition Optimization Method Based on Modified Artificial Bee Colony[J].,2024,34(12):64.[doi:10. 3969 / j. issn. 1673-629X. 2024. 03. 010]

更新日期/Last Update: 2021-12-10