一个基于像素置乱和比特运算的小波变换域隐藏加密图像算法
A Wavelet Transform Domain Hiding Encrypted Image Algorithm Based on Pixel Scrambling and Bit Operation
DOI: 10.12677/jisp.2025.142026, PDF,    科研立项经费支持
作者: 陈月明, 叶瑞松*:汕头大学数学系,广东 汕头
关键词: 图像加密图像隐藏混沌系统离散小波变换Image Encryption Image Hiding Chaotic System Discrete Wavelet Transform
摘要: 通过结合经典的Logistic混沌系统和Chebyshev混沌系统构造一个新的2D Chebyshev-Logistic混沌系统,对该动力系统进行了性能分析,显示其具有良好的混沌特性。由于类噪声的密文图像在传输过程中易被识别和攻击,文章将进一步利用图像本身固有的冗余性,将隐藏技术与混沌图像加密算法结合起来,提出一种基于二维离散小波变换的隐藏彩色图像加密算法。在预加密阶段,加密明文图像得到密文图像;在嵌入阶段,利用二维离散小波变换将密文图像嵌入到载体图像中,最后得到一个含密文图像信息的载体图像。论文对加密隐藏系统做了仿真实验和安全性能分析,结果表明该系统有良好的加密和信息隐藏效果。
Abstract: The classic Logistic chaotic system and the Chebyshev chaotic system are mixed to construct a new 2D Chebyshev-Logistic chaotic system. The performance analysis of the dynamic system shows that it has good chaotic characteristics. Due to the susceptibility of noisy cipher images to recognition and attack during transmission, this paper will further utilize the inherent redundancy of image itself and combine hiding technology with chaotic image encryption algorithms to propose a visually meaningful color image encryption algorithm based on 2D discrete wavelet transform. In the pre-encryption stage, the plain image is encrypted to a cipher image. In the embedding stage, a 2D discrete wavelet transform is combined to embed the cipher image into the carrier image, and finally a carrier image containing cipher information is obtained. The paper conducted simulation experiments and security performance analysis on the encryption and hiding system, and the results showed that the system has good encryption and information hiding effects.
文章引用:陈月明, 叶瑞松. 一个基于像素置乱和比特运算的小波变换域隐藏加密图像算法[J]. 图像与信号处理, 2025, 14(2): 284-298. https://doi.org/10.12677/jisp.2025.142026

参考文献

[1] 张勇. 混沌数字图像加密[M]. 北京: 清华大学出版社, 2016.
[2] Matthews, R. (1989) On the Derivation of a “Chaotic” Encryption Algorithm. Cryptologia, 13, 29-42. [Google Scholar] [CrossRef
[3] Fridrich, J. (1998) Symmetric Ciphers Based on Two-Dimensional Chaotic Maps. International Journal of Bifurcation and Chaos, 8, 1259-1284. [Google Scholar] [CrossRef
[4] Ye, R. (2011) A Novel Chaos-Based Image Encryption Scheme with an Efficient Permutation-Diffusion Mechanism. Optics Communications, 284, 5290-5298. [Google Scholar] [CrossRef
[5] Pareek, N.K., Patidar, V. and Sud, K.K. (2006) Image Encryption Using Chaotic Logistic Map. Image and Vision Computing, 24, 926-934. [Google Scholar] [CrossRef
[6] Stoyanov, B. and Kordov, K. (2015) Image Encryption Using Chebyshev Map and Rotation Equation. Entropy, 17, 2117-2139. [Google Scholar] [CrossRef
[7] Li, C., Luo, G., Qin, K. and Li, C. (2016) An Image Encryption Scheme Based on Chaotic Tent Map. Nonlinear Dynamics, 87, 127-133. [Google Scholar] [CrossRef
[8] Wang, X., Guan, N. and Yang, J. (2021) Image Encryption Algorithm with Random Scrambling Based on One-Dimensional Logistic Self-Embedding Chaotic Map. Chaos, Solitons & Fractals, 150, Article ID: 111117. [Google Scholar] [CrossRef
[9] Hua, Z. and Zhou, Y. (2016) Image Encryption Using 2D Logistic-Adjusted-Sine Map. Information Sciences, 339, 237-253. [Google Scholar] [CrossRef
[10] Tang, M., Zeng, G., Yang, Y. and Chen, J. (2022) A Hyperchaotic Image Encryption Scheme Based on the Triple Dislocation of the Liu and Lorenz System. Optik, 261, Article ID: 169133. [Google Scholar] [CrossRef
[11] Xiao, Y., Tong, X., Zhang, M. and Wang, Z. (2021) Image Lossless Encoding and Encryption Method of EBCOT Tier1 Based on 4D Hyperchaos. Multimedia Systems, 28, 727-748. [Google Scholar] [CrossRef
[12] Lai, Q., Hu, G., Erkan, U. and Toktas, A. (2023) High-efficiency Medical Image Encryption Method Based on 2D Logistic-Gaussian Hyperchaotic Map. Applied Mathematics and Computation, 442, Article ID: 127738. [Google Scholar] [CrossRef
[13] Hua, Z., Zhou, Y. and Bao, B. (2020) Two-dimensional Sine Chaotification System with Hardware Implementation. IEEE Transactions on Industrial Informatics, 16, 887-897. [Google Scholar] [CrossRef
[14] Liu, L., Jiang, D., Wang, X., Rong, X. and Zhang, R. (2021) 2D Logistic-Adjusted-Chebyshev Map for Visual Color Image Encryption. Journal of Information Security and Applications, 60, Article ID: 102854. [Google Scholar] [CrossRef
[15] Yang, Y., Wang, B., Pei, S., Zhou, Y., Shi, W. and Liao, X. (2021) Using M-Ary Decomposition and Virtual Bits for Visually Meaningful Image Encryption. Information Sciences, 580, 174-201. [Google Scholar] [CrossRef
[16] 叶瑞松, 陈月明. 一个迭代函数系统的分形混沌特性及其应用[J]. 汕头大学学报(自然科学版), 2023, 38(2): 3-30.
[17] Wong, K., Kwok, B.S. and Law, W. (2008) A Fast Image Encryption Scheme Based on Chaotic Standard Map. Physics Letters A, 372, 2645-2652. [Google Scholar] [CrossRef
[18] Shah, D., Shah, T. and Jamal, S.S. (2019) A Novel Efficient Image Encryption Algorithm Based on Affine Transformation Combine with Linear Fractional Transformation. Multidimensional Systems and Signal Processing, 31, 885-905. [Google Scholar] [CrossRef
[19] Ghebleh, M., Kanso, A. and Noura, H. (2014) An Image Encryption Scheme Based on Irregularly Decimated Chaotic Maps. Signal Processing: Image Communication, 29, 618-627. [Google Scholar] [CrossRef