基于一维混沌映射和类标准映射的彩色图像加密新算法
A New Color Image Encryption Algorithm Based on One-Dimensional Chaotic Mapping and Quasi-Standard Mapping
DOI: 10.12677/JISP.2017.64021, PDF, HTML, XML, 下载: 1,515  浏览: 4,700 
作者: 陈裕城, 叶瑞松*:汕头大学数学系,广东 汕头
关键词: 混沌类标准映射图像加密置乱扩散Chaos Quasi-Standard Map Image Encryption Scrambling Diffusion
摘要: 提出基于一维混沌映射和类标准映射的彩色图像加密新算法。通过改进的一维混沌映射构造出一种新的类标准映射;通过空间相位图、Lyapunov指数曲线和时间序列测试等对其进行了混沌特性分析,分析结果表明新类标准映射具有混沌参数空间大、良好的随机性等混沌特性。基于一维混沌映射和新类标准映射设计了一种彩色图像加密算法。不同于传统的置乱–扩散机制,该算法采用预先扩散–置乱–扩散结构,在预先扩散阶段采用一维混沌映射产生初始向量对明文图像进行预处理,然后利用本文构造的类标准映射产生随机数对预处理后的图像进行加密。本文算法采用一维混沌系统和多维混沌系统对图像按照依行依列的方式对明文图像进行加密,不但安全性大大提高,而且加快了加密的速度。事实上,本文提出算法的安全性能分析包括密钥空间分析、密钥敏感性分析和统计分析等均表明本文提出的加密算法具有密钥空间大、密钥敏感性强、可抵抗统计分析攻击、蛮力攻击、差分攻击、已知明文和选择明文攻击等优良特性。
Abstract: In this paper, a new color image encryption algorithm based on one-dimensional chaotic mapping and quasi-standard mapping is proposed. A new quasi-standard mapping is constructed by an improved one-dimensional chaotic map. The chaotic characteristics of the new quasi-standard mapping are analyzed by spatial phase diagram, Lyapunov exponential curve and time series test. The results show that the new quasi-standard mapping has large chaotic parameter space, good randomness and other chaotic characteristics. Then, a color image encryption algorithm is designed based on one-dimensional mapping and new quasi-standard mapping. It is different from the traditional scrambling-diffusion mechanism. The algorithm uses a pre-diffusion-scrambling-diffusion structure, which uses one-dimensional chaotic mapping creating the initial vector to preprocess the plain image in the pre-diffusion stage, and then the pre-processed image is encrypted by generating the random number and using the new quasi-standard mapping. Furthermore, we encrypt the plain image in row by row and column by column, as a result, the security is greatly improved as well as the speed of encryption is accelerated. In fact, the security performance analysis of the proposed algorithm, including key space analysis, key sensitivity analysis and statistical analysis etc., which shows that the encryption algorithm proposed has large key space, strong key sensitivity and can resist various known attacks, such as statistical analysis attack, brute-force attack, differential attack, known plaintext and chosen plaintext attack, etc.
文章引用:陈裕城, 叶瑞松. 基于一维混沌映射和类标准映射的彩色图像加密新算法[J]. 图像与信号处理, 2017, 6(4): 174-195. https://doi.org/10.12677/JISP.2017.64021

参考文献

[1] 搜狐网. 近百国遭黑客攻击罪魁祸首是一个名为“想哭”勒索软件[EB/OL]. http://www.sohu.com/a/140477115_116897, 2017-07-13.
[2] 搜狐网. 数字时代的网络安全, 美国才是最大的网络入侵者[EB/OL]. http://www.sohu.com/a/148864577_550962, 2017-07-13.
[3] 王静. 混沌数字图像加密技术研究[D]. 南京: 南京邮电大学, 2013.
[4] 李昌刚, 韩正之, 张浩然. 一种基于随机密钥及“类标准映射”的图像加密算法[J]. 计算机学报, 2003, 26(4): 465-470.
[5] 张同锋. 基于一维复合混沌映射的数字图像加密算法研究[D]: [博士学位论文]. 兰州: 兰州大学, 2016.
[6] Liu, W., Sun, K. and Zhu, C. (2016) A Fast Image Encryption Algorithm Based on Chaotic Map. Optics and Lasers in Engineering, 84, 26-36.
https://doi.org/10.1016/j.optlaseng.2016.03.019
[7] 张强, 田小平. 基于图像位平面分解的混沌加密方法研究[J]. 西安邮电学院学报, 2010, 15(5): 83-86.
[8] Robinson, R.C., 韩茂安, 邢业朋, 等. 动力系统导论[M]. 北京: 机械工业出版社, 2007.
[9] Alvarez, G. and Li, S. (2006) Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems. International Journal of Bifurcation and Chaos, 16, 2129-2151.
https://doi.org/10.1142/S0218127406015970
[10] Matthews, R. (1989) On the Derivation of a “Chaotic” Encryption Algorithm. Cryptologia, 13, 29-42.
https://doi.org/10.1080/0161-118991863745
[11] Fridrich, J. (1998) Symmetric Ciphers Based on Two-Dimensional Chaotic Maps. International Journal of Bifurcation and Chaos, 8, 1259-1284.
https://doi.org/10.1142/S021812749800098X
[12] Ye, G. and Huang, X. (2017) An Efficient Symmetric Image Encryption Algorithm Based on an Intertwining Logistic Map. Neurocomputing, 251, 45-53.
[13] Hua, Z., Zhou, Y., Pun, C.M., et al. (2015) 2D Sine Logistic Modulation Map for Image Encryption. Information Sciences, 297, 80-94.
[14] Wang, X. and Zhang, H. (2015) A Color Image Encryption with Heterogeneous Bit-Permutation and Correlated Chaos. Optics Communications, 342, 51-60.
[15] Xi, Y., Zhang, X. and Ye, R. (2016) Color Image Encryption Based on Multiple Chaotic Systems. International Journal of Network Security & Its Applications, 8, 39-50.
[16] Niyat, A.Y., Moattar, M.H. and Torshiz, M.N. (2017) Color Image Encryption Based on Hybrid Hyperchaotic System and Cellular Automata. Optics and Lasers in Engineering, 90, 225-237.
[17] Yao, L., Yuan, C., Qiang, J., et al. (2017) An Asymmetric Color Image Encryption Method by using Deduced Gyrator Transform. Optics and Lasers in Engineering, 89, 72-79.
[18] Kadir, A., Aili, M. and Sattar, M. (2017) Color Image Encryption Scheme using Coupled Hyper Chaotic System with Multiple Impulse Injections. Optik-International Journal for Light and Electron Optics, 129, 231-238.
[19] Pak, C. and Huang, L. (2017) A New Color Image Encryption using Combination of the 1D Chaotic Map. Signal Processing, 138, 129-137.
[20] Patidar, V., Pareek, N.K., Purohit, G., et al. (2011) A Robust and Secure Chaotic Standard Map Based Pseudorandom Permutation-Substitution Scheme for Image Encryption. Optics Communications, 284, 4331-4339.
[21] Ye, R. and Huang, H. (2010) Application of the Chaotic Ergodicity of Standard Map in Image Encryption and Watermarking. International Journal of Image, Graphics and Signal Processing, 2, 19.
https://doi.org/10.5815/ijigsp.2010.01.03
[22] Zhao, J., Guo, W. and Ye, R. (2014) A Chaos-Based Image Encryption Scheme using Permutation Substitution Architecture. International Journal of Computer Trends and Technology, 15, 174-185.
https://doi.org/10.14445/22312803/IJCTT-V15P137
[23] The USC-SIPI Image Database (2017). http://sipi.usc.edu/database/
[24] 张弘. 数字图像处理与分析[M]. 北京: 机械工业出版社, 2013.
[25] Laiphrakpam, D.S. and Khumanthem, M.S. (2017) Cryptanalysis of Symmetric Key Image Encryption using Chaotic Rossler System. Optik-International Journal for Light and Electron Optics, 135, 200-209.