[go: up one dir, main page]

CN117579756B - Image encryption method based on block selection Zigzag scrambling and rotary coding of wheel disc - Google Patents

Image encryption method based on block selection Zigzag scrambling and rotary coding of wheel disc Download PDF

Info

Publication number
CN117579756B
CN117579756B CN202311546537.3A CN202311546537A CN117579756B CN 117579756 B CN117579756 B CN 117579756B CN 202311546537 A CN202311546537 A CN 202311546537A CN 117579756 B CN117579756 B CN 117579756B
Authority
CN
China
Prior art keywords
matrix
sequence
chaotic
image
scrambling
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311546537.3A
Other languages
Chinese (zh)
Other versions
CN117579756A (en
Inventor
宋文军
齐汝宾
张勋才
刘梦蕊
郭丹蕾
韩聪慧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou University of Light Industry
Original Assignee
Zhengzhou University of Light Industry
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou University of Light Industry filed Critical Zhengzhou University of Light Industry
Priority to CN202311546537.3A priority Critical patent/CN117579756B/en
Publication of CN117579756A publication Critical patent/CN117579756A/en
Application granted granted Critical
Publication of CN117579756B publication Critical patent/CN117579756B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/448Rendering the image unintelligible, e.g. scrambling
    • H04N1/4486Rendering the image unintelligible, e.g. scrambling using digital data encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Image Processing (AREA)

Abstract

The invention provides an image encryption method based on block selection of Zigzag scrambling and rotary coding of a wheel disc, which comprises the following steps: calculating an initial value of the 4D hyper-chaotic system; carrying out iteration by taking the 4D hyper-chaotic system to obtain four chaotic sequences; selecting a coordinate value by using a value of the chaotic sequence, and scrambling a plaintext image according to a random Zigzag scrambling method to obtain a matrix P 1; dividing the matrix P 1 into small pixel blocks, converting pixel values into quaternary system, and scrambling according to a quaternary position scrambling method to obtain a pixel matrix P 2; expanding the pixel matrix P 2 into a one-dimensional sequence according to the row, and diffusing the one-dimensional sequence by using a chaotic sequence through a wheel disc rotary coding algorithm to obtain an image matrix P 3; the chaotic sequence is converted into a chaotic matrix, the chaotic sequence is sequenced, the index sequence is converted into an index matrix, and the image matrix P 3 is diffused according to the bidirectional nonsequential sequence of the index matrix by utilizing the chaotic matrix to obtain a ciphertext image. The invention can effectively resist various attacks, and has better encryption effect and high security.

Description

基于分块选取Zigzag置乱和轮盘旋转编码的图像加密方法Image encryption method based on block selection Zigzag scrambling and roulette wheel rotation coding

技术领域Technical Field

本发明涉及数字图像加密的技术领域,尤其涉及一种基于分块选取Zigzag置乱和轮盘旋转编码的图像加密方法。The present invention relates to the technical field of digital image encryption, and in particular to an image encryption method based on block selection Zigzag scrambling and roulette rotation coding.

背景技术Background Art

随着计算机技术和多媒体通信的飞速发展,大量的图像、音频和视频等信息通过云服务进行存储、共享和传输,尤其在电子商务、医学、军事等领域。然而,网络上的图像存在着多种威胁和攻击,如盗窃、篡改和伪造等。这不仅对个人造成损害,还可能导致巨大的经济和政治损失。所以,确保数字图像内容的安全成为亟需解决的重要问题。图像加密作为一种有效的图像信息安全保护方法,在数据隐藏、隐私保护等领域有着广泛的应用。然而,传统的图像加密方案加密效率较低。因此,研究安全高效的方法至关重要。With the rapid development of computer technology and multimedia communication, a large amount of information such as images, audio and video is stored, shared and transmitted through cloud services, especially in e-commerce, medicine, military and other fields. However, there are many threats and attacks on images on the Internet, such as theft, tampering and forgery. This not only causes damage to individuals, but may also lead to huge economic and political losses. Therefore, ensuring the security of digital image content has become an important issue that needs to be solved urgently. Image encryption, as an effective method for image information security protection, has a wide range of applications in data hiding, privacy protection and other fields. However, the encryption efficiency of traditional image encryption schemes is low. Therefore, it is crucial to study safe and efficient methods.

相对于传统的图像加密方法,基于混沌系统的加密方法具有更高的加密效率。因此,很多研究者提出了基于混沌系统的图像加密方案。1989年,数学家Matthews首次将混沌引入加密系统,提出并解释了混沌密码学的概念。Fairouz Belilita对一维Logistic映射进行了改进,通过扩大控制参数的混沌范围提高了混沌系统的性能,并将改进的Logistic映射应用于灰度图像的加密,得到了很好的加密效果。Ma提出了二维逻辑余弦级联映射(2D-LCCM)和三维逻辑余弦级联映射(3D-LCCM),分析了2D-LCCM和3D-LCCM的混沌性质,同时把2D-LCCM与zigzag置乱相结合进行置乱,把3D-LCCM与DNA编码算法结合进行扩散,该方案高效率和抗干扰性能强的优点,可以有效地应用于图像加密过程中。Zhang在Lorenz系统中加入一个包含正弦函数的非线性控制器,提出了具有多对称奇异吸引子和较大混沌范围的Lorenz-Sine耦合混沌系统;同时提出了一种基于混沌系统的螺旋旋转和随机排列的图像加密方案,该方案具有很好的抗差分攻击能力,此外,它对噪声攻击和裁剪具有较强的鲁棒性。Compared with traditional image encryption methods, encryption methods based on chaotic systems have higher encryption efficiency. Therefore, many researchers have proposed image encryption schemes based on chaotic systems. In 1989, mathematician Matthews first introduced chaos into encryption systems and proposed and explained the concept of chaotic cryptography. Fairouz Belilita improved the one-dimensional Logistic map, improved the performance of the chaotic system by expanding the chaotic range of the control parameters, and applied the improved Logistic map to the encryption of grayscale images, achieving good encryption results. Ma proposed two-dimensional logical cosine cascade mapping (2D-LCCM) and three-dimensional logical cosine cascade mapping (3D-LCCM), analyzed the chaotic properties of 2D-LCCM and 3D-LCCM, combined 2D-LCCM with zigzag scrambling for scrambling, and combined 3D-LCCM with DNA coding algorithm for diffusion. The scheme has the advantages of high efficiency and strong anti-interference performance, and can be effectively applied to the image encryption process. Zhang added a nonlinear controller containing a sine function to the Lorenz system and proposed a Lorenz-Sine coupled chaotic system with multi-symmetric strange attractors and a large chaotic range; at the same time, he proposed an image encryption scheme based on the spiral rotation and random permutation of the chaotic system, which has good resistance to differential attacks. In addition, it is highly robust to noise attacks and cropping.

Zigzag置乱在图像加密中的应用也是很常见的,许多研究者提出了大量基于Zigzag置乱的图像加密方案。Zhang提出了一种新的三维变换之字形扩散算法,将明文图像像素值排列成立方体形状,利用伪随机矩阵进行之字形扩散,该方案能够抵抗不同类型攻击。Wang提出了一种基于扩展之字形置乱和RNA运算的混沌图像加密算法,不仅可以处理非方阵形式的图像,而且可以从四个方向选择来确定加密过程开始的位置;该方案不仅解决了在每轮加密中某些元素总保持在相同位置的问题,同时RNA矩阵的编码规则完全由混沌序列控制,这使得操作结果更具不可预测性;实验仿真和性能分析数据表明,该加密算法具有较高的安全性能。Li等人提出了一种基于三维混沌映射的彩色图像Zigzag加密方案,实验表明,该方法具有很强的抗暴力攻击和统计攻击能力,但缺乏差分攻击分析。The application of Zigzag scrambling in image encryption is also very common. Many researchers have proposed a large number of image encryption schemes based on Zigzag scrambling. Zhang proposed a new three-dimensional transformation zigzag diffusion algorithm, which arranges the pixel values of the plaintext image into a cube shape and uses a pseudo-random matrix for zigzag diffusion. This scheme can resist different types of attacks. Wang proposed a chaotic image encryption algorithm based on extended zigzag scrambling and RNA operation, which can not only process images in non-square matrix form, but also select from four directions to determine the starting position of the encryption process; this scheme not only solves the problem that some elements always remain in the same position in each round of encryption, but also the encoding rules of the RNA matrix are completely controlled by the chaotic sequence, which makes the operation results more unpredictable; experimental simulation and performance analysis data show that the encryption algorithm has high security performance. Li et al. proposed a color image Zigzag encryption scheme based on three-dimensional chaotic mapping. Experiments show that this method has strong resistance to brute force attacks and statistical attacks, but lacks differential attack analysis.

单纯像素级置乱仅能改变像素位置,为了增强置乱效果,很多研究者提出了包含比特级置乱的图像加密算法。Xu提出了一种基于三维位矩阵和正交拉丁立方体的图像加密算法,与大多数现有的图像加密算法不同,该算法将原始图像视为三维位矩阵,并使用拉丁立方体进行置乱和扩散。三维位矩阵和拉丁立方体的结合使得该算法既达到了理想的安全水平,又具有较高的效率。Wen提出了一种基于二进制位平面提取和多重混沌映射的图像加密系统,该系统主要包括高4位平面的位级置换和低4位平面的异或扩散,具有较低的计算复杂度,但对于选择明文攻击的安全性不高,容易被破解。Simple pixel-level scrambling can only change the pixel position. In order to enhance the scrambling effect, many researchers have proposed image encryption algorithms that include bit-level scrambling. Xu proposed an image encryption algorithm based on three-dimensional bit matrix and orthogonal Latin cube. Unlike most existing image encryption algorithms, this algorithm regards the original image as a three-dimensional bit matrix and uses Latin cube for scrambling and diffusion. The combination of three-dimensional bit matrix and Latin cube enables the algorithm to achieve both an ideal security level and high efficiency. Wen proposed an image encryption system based on binary bit plane extraction and multiple chaotic mappings. The system mainly includes bit-level permutation of the upper 4 bit planes and XOR diffusion of the lower 4 bit planes. It has low computational complexity, but is not very secure against chosen plaintext attacks and is easily cracked.

扩散是图像加密的一个重要阶段,常见的是单向扩散很容易被破解。为此,一些学者提出了多向扩散的加密算法。Liu提出了基于改进DNA编码和快速扩散的彩色图像加密算法,扩散阶段分别以矩阵和矢量为扩散单元,对彩色图像的三个通道进行三维六向扩散,该方案具有较高的安全性,但加密效率不高。Hussain Muhammad提出了沿对角-反对角方向进行置乱扩散的图像加密方案,该方案对给定输入图像像素的置乱和扩散操作以并行方式进行,具有较高的安全性。但是这些扩散仍旧是按照顺序对像素值处理,易被破解。Diffusion is an important stage in image encryption. Common one-way diffusion is easy to crack. For this reason, some scholars have proposed encryption algorithms based on multi-directional diffusion. Liu proposed a color image encryption algorithm based on improved DNA coding and fast diffusion. In the diffusion stage, matrices and vectors are used as diffusion units, and three-dimensional six-way diffusion is performed on the three channels of the color image. This scheme has high security, but the encryption efficiency is not high. Hussain Muhammad proposed an image encryption scheme that performs scrambling diffusion along the diagonal-anti-diagonal direction. This scheme performs scrambling and diffusion operations on the pixels of a given input image in parallel, which has high security. However, these diffusions still process pixel values in sequence and are easy to be cracked.

发明内容Summary of the invention

针对现有图像加密方法计算复杂度稿,安全性低的技术问题,本发明提出一种基于分块选取Zigzag置乱和轮盘旋转编码的图像加密方法,对密钥和明文图像高度敏感,实现了像素级和比特级的双重置乱,打破了图像像素间的高度相关性,提升了图像加密的安全性。In view of the technical problems of high computational complexity and low security of existing image encryption methods, the present invention proposes an image encryption method based on block-selected Zigzag scrambling and roulette rotation coding, which is highly sensitive to keys and plaintext images, realizes dual-reset scrambling at the pixel level and the bit level, breaks the high correlation between image pixels, and improves the security of image encryption.

为了达到上述目的,本发明的技术方案是这样实现的:一种基于分块选取Zigzag置乱和轮盘旋转编码的图像加密方法,其步骤如下:In order to achieve the above object, the technical solution of the present invention is implemented as follows: an image encryption method based on block selection Zigzag scrambling and roulette rotation encoding, the steps of which are as follows:

步骤一:使用SHA-384算法计算大小为M×N的明文图像P的哈希值H,根据哈希值H计算4D超混沌系统的初始值;将初始值带入4D超混沌系统进行迭代得到四个混沌序列X、Y、Z和W;Step 1: Use the SHA-384 algorithm to calculate the hash value H of the plaintext image P of size M×N, and calculate the initial value of the 4D hyperchaotic system according to the hash value H; bring the initial value into the 4D hyperchaotic system for iteration to obtain four chaotic sequences X, Y, Z and W;

步骤二:选取混沌序列Z和W中多组元素并分别转化为取值小于M、小于N的元素得到序列U、V,利用序列U、V的值选取坐标值,根据随机Zigzag置乱方法置乱明文图像P得到矩阵P1Step 2: Select multiple groups of elements in the chaotic sequences Z and W and convert them into elements with values less than M and less than N to obtain sequences U and V, use the values of sequences U and V to select coordinate values, and scramble the plaintext image P according to the random Zigzag scrambling method to obtain the matrix P 1 ;

步骤三:将矩阵P1分成若干个2×2的小像素块并把每个小像素块中像素值转换成四进制,按照四进制位置乱法进行置乱得到置乱后的像素矩阵P2Step 3: Divide the matrix P1 into several 2×2 small pixel blocks and convert the pixel values in each small pixel block into quaternary, and perform scrambling according to the quaternary position scrambling method to obtain the scrambled pixel matrix P2 ;

步骤四:将混沌序列X的值映射到1-8的范围内得到序列X′,将混沌序列Y的值转化为0或1得到序列Y′;把像素矩阵P2按行展开为一维序列,轮盘旋转编码算法利用序列X′、Y′对一维序列进行扩散,把扩散后的一维序列重新转换成矩阵得到图像矩阵P3Step 4: Map the values of chaotic sequence X to the range of 1-8 to obtain sequence X′, and convert the values of chaotic sequence Y to 0 or 1 to obtain sequence Y′; expand the pixel matrix P 2 into a one-dimensional sequence by row, and use the roulette wheel encoding algorithm to diffuse the one-dimensional sequence using the sequences X′ and Y′, and convert the diffused one-dimensional sequence back into a matrix to obtain the image matrix P 3 ;

步骤五:将混沌序列Z和W分别转化为取值为0-255的序列Z1、W1并分别转化为混沌矩阵Z′、W′;将混沌序列X排序并把索引序列转换成索引矩阵,利用混沌矩阵Z′、W′将矩阵P3按索引矩阵的索引顺序双向非顺序扩散,得到密文图像C。Step 5: Convert the chaotic sequences Z and W into sequences Z1 and W1 with values ranging from 0 to 255 respectively and then convert them into chaotic matrices Z′ and W′ respectively; sort the chaotic sequence X and convert the index sequence into an index matrix, and use the chaotic matrices Z′ and W′ to diffuse the matrix P 3 bidirectionally and non-sequentially according to the index order of the index matrix to obtain the ciphertext image C.

优选地,所述计算4D超混沌系统的初始值的方法为:将明文图像输入到SHA-384算法中输出384位二进制的哈希值H,将哈希值H等分为48组二进制序列每组8位,得到Hk=h1,h2,h3,…h48,将48组二进制序列进行运算,计算4D超混沌系统的初始值x0、y0、z0、w0为:Preferably, the method for calculating the initial value of the 4D hyperchaotic system is: inputting the plaintext image into the SHA-384 algorithm to output a 384-bit binary hash value H, dividing the hash value H into 48 groups of binary sequences, each group of 8 bits, to obtain H k =h 1 ,h 2 ,h 3 ,…h 48 , performing operations on the 48 groups of binary sequences, and calculating the initial values x 0 , y 0 , z 0 , w 0 of the 4D hyperchaotic system as follows:

其中,K1~K8为中间变量,1≤i2≤8,为异或运算,mod为取模函数。Among them, K 1 ~ K 8 are intermediate variables, 1≤i2≤8, is the XOR operation, and mod is the modulo function.

优选地,所述4D超混沌系统的表达式为:Preferably, the expression of the 4D hyperchaotic system is:

其中,x、y、z、w为状态变量,为状态变量x、y、z、w的导数,a、b、c、d是影响4D超混沌系统行为的控制参数;当控制参数a=15.5、b=50、c=3.6、d=0.2时,4D超混沌系统处于超混沌状态;Among them, x, y, z, and w are state variables. are the derivatives of the state variables x, y, z, w, and a, b, c, d are the control parameters that affect the behavior of the 4D hyperchaotic system; when the control parameters a=15.5, b=50, c=3.6, d=0.2, the 4D hyperchaotic system is in a hyperchaotic state;

初始值带入4D超混沌系统中迭代1000+M×N次,舍去前1000迭代结果得到四个混沌序列X、Y、Z和W。The initial value is brought into the 4D hyperchaotic system and iterated 1000+M×N times. The first 1000 iteration results are discarded to obtain four chaotic sequences X, Y, Z and W.

优选地,所述随机Zigzag置乱方法的实现方法为是:根据序列U、V得到L对坐标值,由坐标值确定明文图像P中小矩阵的范围,并依次对L组小像素矩阵进行Zigzag置乱得到矩阵P1Preferably, the random Zigzag scrambling method is implemented by: obtaining L pairs of coordinate values according to the sequences U and V, determining the range of the small matrix in the plaintext image P by the coordinate values, and performing Zigzag scrambling on L groups of small pixel matrices in sequence to obtain the matrix P 1 ;

所述Zigzag置乱是从小像素矩阵的左上角开始,先沿垂直方向移动,然后沿对角线方向移动,不断重复这个过程,直到遍历完所有像素,将矩阵的元素按照遍历顺序提取出来排列为一维序列,再把一维序列重新转换成与小矩阵相同大小的像素矩阵。The Zigzag scrambling starts from the upper left corner of the small pixel matrix, moves vertically first, then moves diagonally, and repeats this process until all pixels are traversed, the elements of the matrix are extracted in the traversal order and arranged into a one-dimensional sequence, and then the one-dimensional sequence is converted back into a pixel matrix of the same size as the small matrix.

优选地,所述随机Zigzag置乱方法的实现方法为:在明文图像P的像素矩阵中随机选取30组小矩阵,分别对每个小矩阵进行Zigzag置乱,随机Zigzag置乱方法的步骤为:判断坐标值:如果U(i1)≠V(i1)且U(i1+1)≠V(i1+1),{min(U(i1+1),V(i1+1)),min(U(i1),V(i1))}作为小矩阵的左上顶点坐标,{max(U(i1+1),V(i1+1)),max(U(i1),V(i1))}作为小矩阵的右下顶点坐标,根据左上顶点坐标和右下顶点坐标选取明文图像对应区域的小矩阵并进行Zigzag置乱;如果U(i1)=V(i1)或U(i1+1)=V(i1+1),选取的是行数为1或列数为1的序列,将该行或该列逆序排列;重复上述步骤直到选取的30组小矩阵都完成置乱操作;得到置乱后的矩阵P1;其中,i1=1,2,3……60。Preferably, the implementation method of the random Zigzag scrambling method is: randomly select 30 groups of small matrices in the pixel matrix of the plaintext image P, and perform Zigzag scrambling on each small matrix respectively. The steps of the random Zigzag scrambling method are: determine the coordinate value: if U(i1)≠V(i1) and U(i1+1)≠V(i1+1), {min(U(i1+1),V(i1+1)),min(U(i1),V(i1))} is used as the coordinate of the upper left vertex of the small matrix, {max(U (i1+1),V(i1+1)),max(U(i1),V(i1))} as the lower right vertex coordinate of the small matrix, select the small matrix of the corresponding area of the plaintext image according to the upper left vertex coordinates and the lower right vertex coordinates and perform Zigzag scrambling; if U(i1)=V(i1) or U(i1+1)=V(i1+1), the sequence with 1 row or 1 column is selected, and the row or column is arranged in reverse order; repeat the above steps until the 30 selected small matrices are all scrambled; obtain the scrambled matrix P1 ; where i1=1,2,3……60.

优选地,所述四进制位置乱法的实现方法为:Preferably, the implementation method of the quaternary position chaos method is:

1):将矩阵P1分成若干个2×2的小像素块;1): Divide the matrix P1 into several 2×2 small pixel blocks;

2):将小像素块内的每个像素转换为四进制,每一个像素值转换为一个四位四进制数,然后把每个四进制数的四位顺序排列,每个2×2的小像素块转换为4×4的像素矩阵;2): Convert each pixel in the small pixel block into quaternary, convert each pixel value into a four-digit quaternary number, and then arrange the four digits of each quaternary number in sequence, and convert each 2×2 small pixel block into a 4×4 pixel matrix;

3):对4×4的像素矩阵进行位置乱:每个4×4的像素矩阵重新分为四个2×2子矩阵,每个2×2子矩阵进行位置乱得到新的小矩阵,每个新的小矩阵得到新的四进制数;3): shuffle the position of the 4×4 pixel matrix: each 4×4 pixel matrix is re-divided into four 2×2 sub-matrices, each 2×2 sub-matrix is shuffled to obtain a new small matrix, and each new small matrix obtains a new quaternary number;

4):将新的四进制数重新转换为十进制,得到2×2的新的小像素块;4): Convert the new quaternary number back to decimal to obtain a new 2×2 small pixel block;

5):将2×2的新的小像素块合并,得到M×N的像素矩阵P25): Merge the new 2×2 small pixel blocks to obtain an M×N pixel matrix P 2 .

所述步骤2)中顺序排列的方法为四位二进制数的四位从高到低依次按照左上、右上、左下、右下排列;The method of sequential arrangement in step 2) is to arrange the four bits of the four-bit binary number from high to low in the order of upper left, upper right, lower left, and lower right;

所述步骤3)中的位置乱为:将四个子矩阵中左上、右上、左下、右下的元素分别组成四个新的子矩阵,并分别将四个新的子矩阵放在新的小矩阵的左上、右上、左下、右下的位置,得到新的小矩阵;The position disorder in step 3) is as follows: the elements of the upper left, upper right, lower left and lower right of the four sub-matrices are respectively formed into four new sub-matrices, and the four new sub-matrices are respectively placed at the upper left, upper right, lower left and lower right positions of the new small matrix to obtain a new small matrix;

将混沌序列X值映射到1-8的范围内得到序列X′、将混沌序列Y的值转化为0或1得到序列Y′、将混沌序列Z和W分别转化为取值为0-255的序列Z1和W1的方法为:The method of mapping the chaotic sequence X value to the range of 1-8 to obtain the sequence X′, converting the chaotic sequence Y value to 0 or 1 to obtain the sequence Y′, and converting the chaotic sequences Z and W to the sequences Z1 and W1 with values of 0-255 respectively is as follows:

选取混沌序列Z和W中多组元素并分别转化为取值小于M、小于N的元素得到序列U、V的方法为:The method of selecting multiple groups of elements in chaotic sequences Z and W and converting them into elements with values less than M and less than N to obtain sequences U and V is:

其中,M和N为明文图像的行数和列数,X(i1)、Y(i1)、Z(i1)、W(i1)、X′(i1)、Y′(i1)、Z1(i1)、W1(i1)、U(i1)、V(i1)分别为混沌序列X、Y、Z和W、序列X′、Y′、Z1、W1、U、V的第i1个元素,i1=1,…,M×N。Among them, M and N are the number of rows and columns of the plaintext image, X(i1), Y(i1), Z(i1), W(i1), X′(i1), Y′(i1), Z1(i1), W1(i1), U(i1), V(i1) are the i1-th element of the chaotic sequences X, Y, Z and W, and the sequences X′, Y′, Z1, W1, U, V, respectively, and i1=1,…,M×N.

优选地,所述轮盘旋转编码算法为基于多阶轮盘旋转编码的四阶轮盘编码算法,首先将像素矩阵P2转换为一维序列,并将一维序列中的数字划分为每四个一组,每次取出一组数,把一组数中的四个数分别转换为八位二进制;按照从高位到低位的顺序将四个数的八位二进制顺时针排列在轮盘点上,且四个数按照从轮盘的外环向内环的顺序排列;接着使用序列X′和Y′控制每阶轮盘的旋转角度和方向,每个轮盘可以顺时针或逆时针旋转45×i3°,i3=1,2,3,4,5,6,7,8,旋转之后重新按列提取比特位,得到四个新的八位二进制数,将提取出的四个二进制数转换为十进制;继续提取下一组数执行相同的操作,直到所有数都完成了旋转操作,得到新的像素矩阵。Preferably, the roulette rotation encoding algorithm is a fourth-order roulette encoding algorithm based on multi-order roulette rotation encoding, firstly, the pixel matrix P2 is converted into a one-dimensional sequence, and the numbers in the one-dimensional sequence are divided into groups of four, and each group of numbers is taken out and the four numbers in the group are converted into eight-bit binary numbers respectively; the eight-bit binary numbers of the four numbers are arranged clockwise on the roulette points in order from high to low, and the four numbers are arranged in order from the outer ring to the inner ring of the roulette; then the sequence X′ and Y′ are used to control the rotation angle and direction of each order of the roulette, and each roulette can be rotated clockwise or counterclockwise 45×i3°, i3=1,2,3,4,5,6,7,8, and after rotation, the bits are extracted again by column to obtain four new eight-bit binary numbers, and the extracted four binary numbers are converted into decimal; continue to extract the next group of numbers and perform the same operation until all numbers have completed the rotation operation to obtain a new pixel matrix.

优选地,所述轮盘旋转编码算法进行扩散的方法为:Preferably, the method of diffusion of the roulette rotation encoding algorithm is:

11)将像素矩阵P2按行展开转换为一维序列,将像素值分成每四个一组,每次处理一组数;11) Convert the pixel matrix P 2 into a one-dimensional sequence by row expansion, divide the pixel values into groups of four, and process one group of numbers each time;

12):取出一组数转换为二进制,每个数转换为一个八位二进制数,将二进制数的每位按照顺序排列在轮盘的每个环上;12): Take out a set of numbers and convert them into binary. Convert each number into an eight-bit binary number and arrange each bit of the binary number in order on each ring of the roulette wheel.

13):判断序列X′和Y′的值,如果序列Y′的元素等于1则顺时针旋转,如果序列Y′的元素等于0则逆时针旋转;旋转角度等于X′×45°;13): Determine the values of sequences X′ and Y′. If the element of sequence Y′ is equal to 1, rotate clockwise. If the element of sequence Y′ is equal to 0, rotate counterclockwise. The rotation angle is equal to X′×45°.

14):将旋转后的数按列选取得到新的二进制数并转换为十进制;14): Select the rotated number by column to get a new binary number and convert it into decimal;

15):重复步骤12)-14)直到所有数都完成扩散;将扩散得到的一维序列转换为大小M×N的矩阵P315): Repeat steps 12)-14) until all numbers are diffused; convert the diffused one-dimensional sequence into a matrix P 3 of size M×N.

优选地,将混沌序列X按升序排列得到索引序列,将索引序列转换为大小为M×N的矩阵作为索引矩阵I,对矩阵P3进行双向扩散的方法为:Preferably, the chaotic sequence X is arranged in ascending order to obtain an index sequence, and the index sequence is converted into a matrix of size M×N as the index matrix I. The method of bidirectional diffusion of the matrix P 3 is:

正向扩散:Forward Diffusion:

反向扩散:Backward diffusion:

其中,n=(i-1)×N+j,i∈[1,M],j∈[1,N],Inx、Iny为索引矩阵I中序号n所对应的行、列的坐标值;为异或运算,C1(i,j)、Z′(i,j)、W′(i,j)、C(i,j)分别为中间矩阵C1、混沌矩阵Z′、W′和密文图像C的第i行、第j列的元素值。Wherein, n=(i-1)×N+j, i∈[1,M], j∈[1,N], I nx , I ny are the coordinate values of the row and column corresponding to the sequence number n in the index matrix I; is an XOR operation, C 1 (i,j), Z′(i,j), W′(i,j), and C(i,j) are the element values of the i-th row and j-th column of the intermediate matrix C 1 , the chaotic matrix Z′, W′, and the ciphertext image C, respectively.

本发明的有益效果:在现有的三维混沌系统上增加了一个状态变量,构建了一个新的四维混沌系统;经过分析测试,结果表明新的四维混沌系统的轨迹分布均匀且具有超混沌特性,参数范围广泛;使用明文图像的像素值来计算四维混沌系统初始值,使得加密方法对密钥和明文图像高度敏感;结合四维混沌系统,提出了随机选取Zigzag置乱技术和轮盘旋转扩散技术,使用提出的随机选取Zigzag置乱来打乱像素位置,每轮选取的小分块大小都不确定,增加了置乱的随机性;其次,对置乱后图像像素进行比特级置乱,实现了像素级和比特级的双重置乱,打破了图像像素间的高度相关性;在扩散阶段先使用轮盘旋转编码算法对图像进行加密,再进行一次非顺序扩散,进一步增强了加密效果。仿真实验结果表明,本发明的密钥空间大小约为2242,密文图像信息熵为7.9976bits;此外,像素数变化率和统一平均变化强度分别达到了99.6094%和33.4545%,而像素间的相关性接近于零,因此可以有效能够有效地抵御裁剪攻击和噪声攻击,这些结果表明本发明具备较好的加密效果和高度的安全性。The beneficial effects of the present invention are as follows: a state variable is added to the existing three-dimensional chaotic system, and a new four-dimensional chaotic system is constructed; after analysis and testing, the results show that the trajectory distribution of the new four-dimensional chaotic system is uniform and has hyperchaotic characteristics, and the parameter range is wide; the pixel value of the plaintext image is used to calculate the initial value of the four-dimensional chaotic system, so that the encryption method is highly sensitive to the key and the plaintext image; in combination with the four-dimensional chaotic system, a random selection Zigzag scrambling technology and a roulette rotation diffusion technology are proposed, and the proposed random selection Zigzag scrambling is used to scramble the pixel positions, and the size of the small blocks selected in each round is uncertain, which increases the randomness of the scrambling; secondly, the pixels of the scrambled image are scrambled at the bit level, and the double reset scrambling of the pixel level and the bit level is realized, breaking the high correlation between the image pixels; in the diffusion stage, the image is first encrypted using the roulette rotation encoding algorithm, and then a non-sequential diffusion is performed, which further enhances the encryption effect. The simulation experimental results show that the key space size of the present invention is about 2 242 , and the information entropy of the ciphertext image is 7.9976 bits. In addition, the pixel number change rate and the unified average change intensity reach 99.6094% and 33.4545% respectively, and the correlation between pixels is close to zero, so it can effectively resist cropping attacks and noise attacks. These results show that the present invention has good encryption effect and high security.

与现有混沌映射相比,本发明提出的四维混沌系统的轨迹分布均匀、具有超混沌特性且参数范围广泛,适合用于图像加密。本发明提出的随机选取Zigzag置乱算法可以随机选取小分块,每次选取到的像素点都由混沌序列控制,可以增强置乱的随机性。Compared with the existing chaotic mapping, the trajectory of the four-dimensional chaotic system proposed in the present invention is evenly distributed, has hyperchaotic characteristics and a wide range of parameters, and is suitable for image encryption. The randomly selected Zigzag scrambling algorithm proposed in the present invention can randomly select small blocks, and each selected pixel point is controlled by a chaotic sequence, which can enhance the randomness of the scrambling.

附图说明BRIEF DESCRIPTION OF THE DRAWINGS

为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings required for use in the embodiments or the description of the prior art will be briefly introduced below. Obviously, the drawings described below are only some embodiments of the present invention. For ordinary technicians in this field, other drawings can be obtained based on these drawings without paying creative work.

图1为本发明的流程图。FIG. 1 is a flow chart of the present invention.

图2为本发明4D超混沌系统的相图,其中,(a)为x-y空间,(b)为y-w空间,(c)为z-w空间,(d)为x-y-z空间,(e)为x-y-w空间,(f)为y-z-w空间。Figure 2 is a phase diagram of the 4D hyperchaotic system of the present invention, wherein (a) is x-y space, (b) is y-w space, (c) is z-w space, (d) is x-y-z space, (e) is x-y-w space, and (f) is y-z-w space.

图3为本发明的固定参数李雅普诺夫指数图。FIG. 3 is a fixed parameter Lyapunov index diagram of the present invention.

图4为本发明不同控制参数下的超混沌系统李雅普诺夫指数图及对应分岔图,其中,(a)为控制参数a为控制变量时超混沌系统的李雅普诺夫指数图,(b)为(a)对应的分岔图,(c)为控制参数c为控制变量时超混沌系统的李雅普诺夫指数图,(d)为(c)对应的分岔图。Figure 4 is the Lyapunov index diagram and corresponding bifurcation diagram of the hyperchaotic system under different control parameters of the present invention, wherein (a) is the Lyapunov index diagram of the hyperchaotic system when the control parameter a is the control variable, (b) is the bifurcation diagram corresponding to (a), (c) is the Lyapunov index diagram of the hyperchaotic system when the control parameter c is the control variable, and (d) is the bifurcation diagram corresponding to (c).

图5为4D超混沌系统的初值敏感性测试示意图,其中,(a)为对x0进行微小变化时的测试结果,(b)为对y0进行微小变化时的测试结果,(c)为对z0进行微小变化时的测试结果,(d)为对w0进行微小变化时的测试结果。Figure 5 is a schematic diagram of the initial value sensitivity test of the 4D hyperchaotic system, where (a) is the test result when x0 is slightly changed, (b) is the test result when y0 is slightly changed, (c) is the test result when z0 is slightly changed, and (d) is the test result when w0 is slightly changed.

图6为标准Zigzag置乱的示意图。FIG6 is a schematic diagram of standard Zigzag scrambling.

图7为本发明的随机选取Zigzag置乱的示例图。FIG. 7 is an example diagram of randomly selected Zigzag scrambling of the present invention.

图8为本发明的子矩阵置乱顺序的示意图。FIG8 is a schematic diagram of the sub-matrix scrambling order of the present invention.

图9为本发明的四进制位置乱法的示意图。FIG. 9 is a schematic diagram of the quaternary position scrambling method of the present invention.

图10为本发明的轮盘旋转编码的示意图。FIG. 10 is a schematic diagram of the roulette rotation encoding of the present invention.

图11为本发明的轮盘旋转扩散的示意图。FIG. 11 is a schematic diagram of the rotary diffusion of the roulette wheel of the present invention.

图12为本发明的双向非顺序扩散的示意图。FIG. 12 is a schematic diagram of bidirectional non-sequential diffusion of the present invention.

图13为本发明的仿真结果,其中,(a)为Bridge明文图像,(b)为Bridge密文图像,(c)为Bridge解密图像,(d)为Lena明文图像,(e)为Lena密文图像,(f)为Lena解密图像,(g)为Baboon明文图像,(h)为Baboon密文图像,(i)为Baboon解密图像,(j)为Peppers明文图像,(k)为Peppers密文图像,(l)为Peppers解密图像,(m)为Girl明文图像,(n)为Girl密文图像,(o)为Girl解密图像。Figure 13 is the simulation result of the present invention, wherein (a) is the Bridge plaintext image, (b) is the Bridge ciphertext image, (c) is the Bridge decrypted image, (d) is the Lena plaintext image, (e) is the Lena ciphertext image, (f) is the Lena decrypted image, (g) is the Baboon plaintext image, (h) is the Baboon ciphertext image, (i) is the Baboon decrypted image, (j) is the Peppers plaintext image, (k) is the Peppers ciphertext image, (l) is the Peppers decrypted image, (m) is the Girl plaintext image, (n) is the Girl ciphertext image, and (o) is the Girl decrypted image.

图14为本发明密钥敏感性的测试结果,其中,(a)为Lena明文图像,(b)为使用正确密钥加密的图像,(c)为使用x0+10-12解密的图像,(d)为使用y0+10-12解密的图像,(e)为使用z0+10-12解密的图像,(f)为使用w0+10-12解密的图像,(g)为图(c)和图(d)之间的差异图,(h)为图(c)和图(e)之间的差异图,(i)为图(c)和图(f)之间的差异图,(j)为图(d)和图(e)之间的差异图,(k)为图(d)和图(f)之间的差异图,(l)为图(e)和图(f)之间的差异图。Figure 14 is the test result of the key sensitivity of the present invention, where (a) is the Lena plaintext image, (b) is the image encrypted using the correct key, (c) is the image decrypted using x 0 +10 -12 , (d) is the image decrypted using y 0 +10 -12 , (e) is the image decrypted using z 0 +10 -12 , (f) is the image decrypted using w 0 +10 -12 , (g) is the difference image between (c) and (d), (h) is the difference image between (c) and (e), (i) is the difference image between (c) and (f), (j) is the difference image between (d) and (e), (k) is the difference image between (d) and (f), and (l) is the difference image between (e) and (f).

图15为本发明的明文图像直方图和密文图像直方图,其中,(a)为Bridge明文图像直方图,(b)为Bridge密文图像直方图,(c)为Lena明文图像直方图,(d)为Lena密文图像直方图,(e)为Baboon明文图像直方图,(f)为Baboon密文图像直方图,(g)为Peppers明文图像直方图,(h)为Peppers密文图像直方图,(i)为Girl明文图像直方图,(j)为Girl密文图像直方图。Figure 15 is the plaintext image histogram and ciphertext image histogram of the present invention, wherein (a) is the Bridge plaintext image histogram, (b) is the Bridge ciphertext image histogram, (c) is the Lena plaintext image histogram, (d) is the Lena ciphertext image histogram, (e) is the Baboon plaintext image histogram, (f) is the Baboon ciphertext image histogram, (g) is the Peppers plaintext image histogram, (h) is the Peppers ciphertext image histogram, (i) is the Girl plaintext image histogram, and (j) is the Girl ciphertext image histogram.

图16为本发明的Lena图像在各个方向上的相关性分析结果,其中,(a)为密文图像水平方向相邻像素统计,(b)为密文图像垂直方向相邻像素统计,(c)为密文图像对角线方向相邻像素统计,(d)为明文图像水平方向相邻像素统计,(e)为明文图像垂直方向相邻像素统计,(f)为明文图像对角线方向相邻像素统计。Figure 16 is the correlation analysis result of the Lena image of the present invention in various directions, where (a) is the statistics of adjacent pixels in the horizontal direction of the ciphertext image, (b) is the statistics of adjacent pixels in the vertical direction of the ciphertext image, (c) is the statistics of adjacent pixels in the diagonal direction of the ciphertext image, (d) is the statistics of adjacent pixels in the horizontal direction of the plaintext image, (e) is the statistics of adjacent pixels in the vertical direction of the plaintext image, and (f) is the statistics of adjacent pixels in the diagonal direction of the plaintext image.

图17为本发明不同强度噪声攻击的密文图像和解密图像,其中,(a)为0.05强度密文图像,(b)为0.1强度密文图像,(c)为0.15强度密文图像,(d)为0.2强度密文图像,(e)为0.05强度解密图像,(f)为0.1强度解密图像,(g)为0.15强度解密图像,(h)为0.2强度解密图像。Figure 17 shows the ciphertext images and decrypted images of noise attacks of different intensities according to the present invention, where (a) is a ciphertext image with an intensity of 0.05, (b) is a ciphertext image with an intensity of 0.1, (c) is a ciphertext image with an intensity of 0.15, (d) is a ciphertext image with an intensity of 0.2, (e) is a decrypted image with an intensity of 0.05, (f) is a decrypted image with an intensity of 0.1, (g) is a decrypted image with an intensity of 0.15, and (h) is a decrypted image with an intensity of 0.2.

图18为本发明不同裁剪攻击的密文图像和解密图像,其中,(a)为1/64裁剪密文图像,(b)为1/16裁剪密文图像,(c)为1/4裁剪密文图像,(d)为1/2裁剪密文图像,(e)为1/64裁剪解密图像像,(f)为1/16裁剪解密图像,(g)为1/4裁剪解密图像,(h)为1/2裁剪解密图像。Figure 18 shows the ciphertext images and decrypted images of different cropping attacks of the present invention, where (a) is a 1/64 cropped ciphertext image, (b) is a 1/16 cropped ciphertext image, (c) is a 1/4 cropped ciphertext image, (d) is a 1/2 cropped ciphertext image, (e) is a 1/64 cropped decrypted image, (f) is a 1/16 cropped decrypted image, (g) is a 1/4 cropped decrypted image, and (h) is a 1/2 cropped decrypted image.

具体实施方式DETAILED DESCRIPTION

下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有付出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The following will be combined with the drawings in the embodiments of the present invention to clearly and completely describe the technical solutions in the embodiments of the present invention. Obviously, the described embodiments are only part of the embodiments of the present invention, not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by ordinary technicians in this field without creative work are within the scope of protection of the present invention.

如图1所示,一种基于分块选取Zigzag置乱和轮盘旋转编码的图像加密方法,在洛伦兹混沌系统的基础上提出了一种新的四维混沌系统,并结合该四维混沌系统进行图像加密。本发明首先用明文图像和SHA-384算法获得4D超混沌系统的初始值,将初始值代入4D超混沌系统进行迭代,获得四个混沌序列;然后根据混沌序列对明文图像进行随机选取Zigzag置乱,接着将置乱后的像素矩阵分块进行位交叉置乱;之后再对置乱后的图像矩阵进行轮盘旋转编码和双向非顺序扩散,得到最终的密文图像。假设加密的明文图像P的大小为M×N,本发明详细的加密步骤如下:As shown in Figure 1, an image encryption method based on block-selected Zigzag scrambling and roulette rotation coding proposes a new four-dimensional chaotic system based on the Lorentz chaotic system, and combines the four-dimensional chaotic system to perform image encryption. The present invention first uses the plaintext image and the SHA-384 algorithm to obtain the initial value of the 4D hyperchaotic system, substitutes the initial value into the 4D hyperchaotic system for iteration, and obtains four chaotic sequences; then, the plaintext image is randomly selected for Zigzag scrambling according to the chaotic sequence, and then the scrambled pixel matrix is divided into blocks for bit cross scrambling; then, the scrambled image matrix is roulette-rotated encoded and bidirectionally non-sequentially diffused to obtain the final ciphertext image. Assuming that the size of the encrypted plaintext image P is M×N, the detailed encryption steps of the present invention are as follows:

步骤一:初始值生成:使用SHA-384算法计算大小为M×N的明文图像P的哈希值H,根据哈希值H计算4D超混沌系统的初始值x0、y0、z0、w0Step 1: Initial value generation: Use the SHA-384 algorithm to calculate the hash value H of the plaintext image P of size M×N, and calculate the initial values x 0 , y 0 , z 0 , w 0 of the 4D hyperchaotic system based on the hash value H.

本发明使用SHA-384算法生成密钥,将明文图像输入到SHA-384算法中输出384位二进制哈希值H。将哈希值H等分为48组二进制序列,每组8位,即Hk=h1,h2,h3,…h48,将这48组哈希值代入公式(1)计算出4D超混沌系统的初始值x0、y0、z0、w0,即:The present invention uses the SHA-384 algorithm to generate a key, inputs a plaintext image into the SHA-384 algorithm, and outputs a 384-bit binary hash value H. The hash value H is equally divided into 48 groups of binary sequences, each group of 8 bits, that is, H k = h 1 , h 2 , h 3 , ... h 48 , and these 48 groups of hash values are substituted into formula (1) to calculate the initial values x 0 , y 0 , z 0 , w 0 of the 4D hyperchaotic system, that is:

其中,[K1~K8]为中间变量,1≤i≤8,为异或运算。mod为取模函数。Among them, [K 1 ~K 8 ] are intermediate variables, 1≤i≤8, is the XOR operation. mod is the modulo function.

步骤二:将4D超混沌系统迭代1000+M×N次,同时舍去前1000迭代结果,得到四个混沌序列X、Y、Z和w,将四个混沌序列X、Y、Z和w进行数据处理,得到序列X′、Y′、Z′、W′和序列U、V。Step 2: Iterate the 4D hyperchaotic system 1000+M×N times and discard the first 1000 iteration results to obtain four chaotic sequences X, Y, Z and w. Perform data processing on the four chaotic sequences X, Y, Z and w to obtain sequences X′, Y′, Z′, W′ and sequences U and V.

洛伦兹混沌系统是由爱德华·洛伦兹(Edward Lorenz)于1963年提出的一种非线性动力学模型。最初用于描述大气流体运动,也被广泛应用于其他自然科学和工程学领域中,该混沌系统表达式为:The Lorenz chaotic system is a nonlinear dynamic model proposed by Edward Lorenz in 1963. It was originally used to describe the movement of atmospheric fluids and is also widely used in other natural sciences and engineering fields. The expression of this chaotic system is:

本发明在洛伦兹混沌系统基础上扩展,引入了一个新的状态变量w,并在第二个方程上增加了一个线性项,从而形成了一个4D超混沌系统,它是可逆的和离散的,具备同时生成四个更复杂的混沌序列的能力,这不仅扩大了密钥空间,还增强了使加密算法对各种攻击的抵抗力,弥补了低维混沌系统密钥空间小、行为范围有限的不足。4D超混沌系统的表达式为:The present invention expands on the Lorentz chaotic system, introduces a new state variable w, and adds a linear term to the second equation, thereby forming a 4D hyperchaotic system, which is reversible and discrete, and has the ability to generate four more complex chaotic sequences at the same time, which not only expands the key space, but also enhances the resistance of the encryption algorithm to various attacks, making up for the shortcomings of the low-dimensional chaotic system with a small key space and a limited range of behavior. The expression of the 4D hyperchaotic system is:

其中,x、y、z、w为状态变量,为状态变量x、y、z、w的导数,a、b、c、d是影响4D超混沌系统行为的控制参数。当控制参数a=15.5、b=50、c=3.6、d=0.2时4D超混沌系统的李雅普诺夫指数分别为λ1=1.3208、λ2=0.2140、λ3=-9.0862、λ4=-21.5302,其中包含两个正Lyapunov指数,四个李雅普诺夫指数之和为负值,此时4D混沌系统处于超混沌状态。Among them, x, y, z, and w are state variables. is the derivative of the state variables x, y, z, w, and a, b, c, d are the control parameters that affect the behavior of the 4D hyperchaotic system. When the control parameters a = 15.5, b = 50, c = 3.6, and d = 0.2, the Lyapunov exponents of the 4D hyperchaotic system are λ 1 = 1.3208, λ 2 = 0.2140, λ 3 = -9.0862, and λ 4 = -21.5302, which contain two positive Lyapunov exponents. The sum of the four Lyapunov exponents is a negative value. At this time, the 4D chaotic system is in a hyperchaotic state.

基于以上参数,采用4阶Runge-Kutta方法离散化后,图2绘制了超混沌系统的二维空间和三维空间的相图,从各维度的相图可以看出该4D超混沌系统有多个吸引子,是一个变化复杂的超混沌系统。Based on the above parameters, after discretization using the fourth-order Runge-Kutta method, Figure 2 plots the phase diagrams of the hyperchaotic system in two-dimensional and three-dimensional space. From the phase diagrams of each dimension, it can be seen that the 4D hyperchaotic system has multiple attractors and is a complex hyperchaotic system.

李雅普诺夫指数(LE)是一项关键的混沌系统特征指标,它由俄罗斯数学家亚历山大·列昂尼多维奇·李雅普诺夫(Alexander Lyapunov)在19世纪末提出。对于一个非线性动力系统,如果LE的值大于0,则系统具有混沌特性。如果有多个LE大于0,则系统属于超混沌系统,其混沌特性比普通混沌系统更复杂、更随机。图3为控制参数a=15.5、b=50、c=3.6、d=0.2,初始值x0=0.1、y0=0.3、z0=0.1、w0=0.1的情况下4D超混沌系统的李雅普诺夫指数图,此时4D超混沌系统有两个正的李雅普诺夫指数。The Lyapunov index (LE) is a key characteristic index of chaotic systems. It was proposed by Russian mathematician Alexander Lyapunov in the late 19th century. For a nonlinear dynamic system, if the value of LE is greater than 0, the system has chaotic characteristics. If there are multiple LEs greater than 0, the system belongs to a hyperchaotic system, and its chaotic characteristics are more complex and more random than ordinary chaotic systems. Figure 3 shows the Lyapunov index diagram of a 4D hyperchaotic system with control parameters a=15.5, b=50, c=3.6, d=0.2, and initial values x0=0.1, y0=0.3, z0=0.1, and w0=0.1. At this time, the 4D hyperchaotic system has two positive Lyapunov indexes.

为了更好地观察混沌系统中李雅普诺夫指数如何随控制参数的变化而演变,本发明在其他参数固定不变的情况下,分别将控制参数a和c作为控制变量记录下了李雅普诺夫指数变化情况,图4(a)为控制参数b=50、c=3.6、d=0.2,初始值x0=0.1、y0=0.3、z0=0.1、w0=0.1保持不变的情况下,控制参数a作为控制变量,绘制出的4D超混沌系统在参数值a∈[4,16]范围内变化的李雅普诺夫指数图。图4(c)为控制参数a=15.5、b=50、d=0.2,初始值x0=0.1、y0=0.3、z0=0.1、w0=0.1不变的情况下,控制参数c作为控制变量,绘制出的4D超混沌系统在参数值c∈[0,7]范围内的李雅普诺夫指数图。分岔图给出了混沌值相对于参数的可视化表示,图4(b)和(d)分别为其他参数不变的情况下,使控制参数a和c在一定范围内变动的分岔图,从而更好地理解混沌系统的行为。In order to better observe how the Lyapunov exponent in the chaotic system evolves with the change of control parameters, the present invention uses control parameters a and c as control variables to record the change of Lyapunov exponent when other parameters remain unchanged. Figure 4 (a) shows the Lyapunov exponent diagram of the 4D hyperchaotic system in the range of parameter value a∈[4,16] when the control parameters b=50, c=3.6, d=0.2, initial values x0=0.1, y0=0.3, z0=0.1, w0=0.1 remain unchanged, and control parameter a is used as the control variable. Figure 4 (c) shows the Lyapunov exponent diagram of the 4D hyperchaotic system in the range of parameter value c∈[0,7] when the control parameters a=15.5, b=50, d=0.2, initial values x0=0.1, y0=0.3, z0=0.1, w0=0.1 remain unchanged, and control parameter c is used as the control variable. The bifurcation diagram gives a visual representation of the chaotic value relative to the parameter. Figure 4 (b) and (d) are the bifurcation diagrams when the control parameters a and c are changed within a certain range while other parameters remain unchanged, which can better understand the behavior of the chaotic system.

混沌系统对初始值高度敏感,即使是微小的变化都可能使生成的序列完全不同。在图5的(a)、(b)、(c)、(d)中,红色线条分别为使用初始值{x0,y0,z0,w0}迭代4D超混沌系统生成的四个时间序列x、y、z、w,蓝色线条分别为使用初值{x0+10^-14,y0,z0,w0}、{x0,y0+10^-14,z0,w0}、{x0,y0,z0+10^-14,w0}、{x0,y0,z0,w0+10^-14}生成的时间序列x1、y1、z1、w1。可以看出,尽管初始值中仅有一个分量发生微小变化,但是经过多次迭代,这些微小差异迅速扩大,导致生成的轨迹变得截然不同。说明本发明提出的4D超混沌系统对初始条件极为敏感。Chaotic systems are highly sensitive to initial values, and even a slight change may make the generated sequence completely different. In Figure 5 (a), (b), (c), and (d), the red lines are the four time series x, y, z, and w generated by iterating the 4D hyperchaotic system using the initial values {x 0 , y 0 , z 0 , w 0 }, and the blue lines are the time series x1, y1, z1, and w1 generated by using the initial values {x 0 +10^-14, y 0 , z 0 , w 0 }, {x 0 , y 0 +10^-14, z 0 , w 0 }, {x 0 , y 0 , z 0 +10^-14, w 0 }, and {x 0 , y 0 , z 0 , w 0 +10^-14}. It can be seen that although only one component in the initial value changes slightly, after multiple iterations, these small differences expand rapidly, resulting in completely different generated trajectories, which indicates that the 4D hyperchaotic system proposed in the present invention is extremely sensitive to initial conditions.

混沌系统的总能量随着时间的增加而减小,相空间在系统运动的过程中也不断缩小,这被称为混沌系统的耗散性,用公式(3)和(4)定义:The total energy of a chaotic system decreases with time, and the phase space also shrinks during the system's motion. This is called the dissipative nature of a chaotic system and is defined by equations (3) and (4):

其中,t是时间,V是耗散体积,把控制参数a=15.5、b=50、c=3.6、d=0.2代入到公式(5)中计算,得到当z>-100.5时,此时混沌系统是耗散的。随着时间推移,4D超混沌系统的相空间最终趋于一点,形成一个吸引域。Where t is time, V is dissipation volume, and the control parameters a = 15.5, b = 50, c = 3.6, d = 0.2 are substituted into formula (5) to obtain When z>-100.5, At this point, the chaotic system is dissipative. As time goes by, the phase space of the 4D hyperchaotic system eventually converges to a point, forming an attraction domain.

在混沌系统中,平衡点是指系统在经过一段时间后不再发生变化的状态。平衡点分析是通过确定系统的动态方程,找到系统在稳定状态下的解。根据计算得到4D超混沌系统有1个平衡点,E1=(0,0,0,-28)。In a chaotic system, the equilibrium point refers to the state in which the system does not change after a period of time. The equilibrium point analysis is to find the solution of the system in a stable state by determining the dynamic equation of the system. According to the calculation, the 4D hyperchaotic system has 1 equilibrium point, E1 = (0, 0, 0, -28).

4D超混沌系统的雅可比矩阵如式(7)所示:The Jacobian matrix of the 4D hyperchaotic system is shown in formula (7):

由式(7)可以计算得到平衡点的特征值为-3.2,所以E1为混沌系统的稳定平衡点。From formula (7), we can calculate that the eigenvalue of the equilibrium point is -3.2, so E1 is the stable equilibrium point of the chaotic system.

NIST测试是一个由多个测试组成的统计工具,用于评估伪随机数生成器生成的二进制序列的随机性。为评估本发明提出的四维超混沌系统生成的混沌序列的随机性,生成足够长度的随机序列,并将随机序列转换为二进制位流进行测试。测试结果如表1所示。根据测试结果,生成的二进制流通过了所有测试,表明本发明提出的4D超混沌系统生成的混沌序列具有理想的随机性。The NIST test is a statistical tool consisting of multiple tests, which is used to evaluate the randomness of binary sequences generated by pseudo-random number generators. In order to evaluate the randomness of the chaotic sequence generated by the four-dimensional hyperchaotic system proposed in the present invention, a random sequence of sufficient length is generated and converted into a binary bit stream for testing. The test results are shown in Table 1. According to the test results, the generated binary stream passed all tests, indicating that the chaotic sequence generated by the 4D hyperchaotic system proposed in the present invention has ideal randomness.

表1NIST测试表Table 1 NIST test table

将初始值x0、y0、z0、w0代入4D超混沌系统中迭代1000+M×N次,舍去前1000次迭代结果以消除暂态效应,得到四个混沌序列X、Y、Z和W。用公式(8)、(9)对四个混沌序列进行数据处理,得到序列X′、Y′、Z1、W1、U、V分别用于加密和解密。Substitute the initial values x 0 , y 0 , z 0 , w 0 into the 4D hyperchaotic system and iterate 1000+M×N times. Discard the first 1000 iterations to eliminate transient effects, and obtain four chaotic sequences X, Y, Z and W. Use formulas (8) and (9) to process the four chaotic sequences and obtain sequences X′, Y′, Z1, W1, U, and V for encryption and decryption, respectively.

其中,M和N为明文图像的行数和列数,X(i1)、Y(i1)、Z(i1)、W(i1)、X′(i1)、Y′(i1)、Z1(i1)、W1(i1)、U(i1)、V(i1)分别为混沌序列X、Y、Z和W、序列X′、Y′、Z1、W1、U、V的第i1个元素,i1=1,…,M×N。公式(8)是将序列X′的值转化为1-8,将序列Y′的值转化为0和1,将序列Z1、W1的值转化为0-255,公式(9)是将序列U的值转化为1-M,将序列V的值转化为1-N,得到长度为60的序列。序列U、V用于生成Zigzag置乱小分块的顶点坐标,序列X′、Y′分别用于控制轮盘旋转角度和方向,序列Z1、W1用于非顺序扩散过程。Where M and N are the number of rows and columns of the plaintext image, X(i1), Y(i1), Z(i1), W(i1), X′(i1), Y′(i1), Z1(i1), W1(i1), U(i1), V(i1) are the i1th element of the chaotic sequences X, Y, Z and W, and the sequences X′, Y′, Z1, W1, U, and V, respectively, and i1 = 1, …, M×N. Formula (8) converts the value of the sequence X′ into 1-8, the value of the sequence Y′ into 0 and 1, and the values of the sequences Z1 and W1 into 0-255. Formula (9) converts the value of the sequence U into 1-M and the value of the sequence V into 1-N, and obtains a sequence of length 60. The sequences U and V are used to generate the vertex coordinates of the Zigzag scrambled small blocks, the sequences X′ and Y′ are used to control the rotation angle and direction of the wheel, respectively, and the sequences Z1 and W1 are used for the non-sequential diffusion process.

步骤三:利用序列U、V的像素值选取坐标值,根据随机Zigzag置乱方法置乱明文图像P得到矩阵P1Step 3: Use the pixel values of the sequences U and V to select coordinate values, and scramble the plaintext image P according to the random Zigzag scrambling method to obtain the matrix P 1 .

随机Zigzag置乱方法是:根据序列U、V得到30对坐标值,由坐标值确定明文图像P中小矩阵的范围,并依次对30组小矩阵进行Zigzag置乱得到矩阵P1The random Zigzag scrambling method is: 30 pairs of coordinate values are obtained according to the sequence U and V, the range of the small matrix in the plaintext image P is determined by the coordinate values, and the 30 groups of small matrices are Zigzag-scrambled in turn to obtain the matrix P 1 .

Zigzag置乱是一种图形变换技术,广泛应用于图像加密领域。Zigzag置乱的原理是按照特定的规则遍历像素矩阵,并将它们重新排列。具体来说,其遍历的路径是从像素矩阵左上角开始,先沿垂直方向移动,然后沿对角线方向移动,不断重复这个过程,直到遍历完所有像素,将像素值按照遍历顺序提取出来排列为一维序列,最后再把一维序列重新转换成与原图像相同大小的像素矩阵。图6为标准Zigzag置乱的效果图。Zigzag scrambling is a graphic transformation technology that is widely used in the field of image encryption. The principle of Zigzag scrambling is to traverse the pixel matrix according to specific rules and rearrange them. Specifically, the traversal path starts from the upper left corner of the pixel matrix, moves vertically first, then moves diagonally, and repeats this process until all pixels are traversed, the pixel values are extracted in the traversal order and arranged into a one-dimensional sequence, and finally the one-dimensional sequence is converted back into a pixel matrix of the same size as the original image. Figure 6 is a diagram of the effect of standard Zigzag scrambling.

传统Zigzag置乱对于已知明文攻击非常脆弱,安全性不高,所以本发明提出了随机选取Zigzag置乱方法,即在明文图像像素矩阵中随机选取若干个小分块,分别对每个小像素矩阵块进行Zigzag置乱,经多次实验发现对于256×256的图像随机选取30组小矩阵就可以使参与置乱的像素占总像素的80%,因此本发明将选择30组小像素矩阵,具体置乱步骤如下:Traditional Zigzag scrambling is very vulnerable to known plaintext attacks and has low security. Therefore, the present invention proposes a randomly selected Zigzag scrambling method, that is, randomly selecting several small blocks in the plaintext image pixel matrix, and performing Zigzag scrambling on each small pixel matrix block. After multiple experiments, it is found that for a 256×256 image, randomly selecting 30 groups of small matrices can make the pixels involved in the scrambling account for 80% of the total pixels. Therefore, the present invention will select 30 groups of small pixel matrices. The specific scrambling steps are as follows:

第一步:用公式(9)对混沌序列Z和W进行处理得到两个序列U(i1)、V(i1)(i1=1,2,3……60)用来控制小像素矩阵的大小。Step 1: Use formula (9) to process the chaotic sequences Z and W to obtain two sequences U(i1), V(i1) (i1 = 1, 2, 3...60) to control the size of the small pixel matrix.

第二步:判断坐标值:Step 2: Determine the coordinate value:

如果U(i1)≠V(i1)且U(i1+1)≠V(i1+1),{min(U(i1+1),V(i1+1)),min(U(i1),V(i1))}作为小矩阵的左上顶点坐标,{max(U(i1+1),V(i1+1)),max(U(i1),V(i1))}作为小矩阵的右下顶点坐标,根据左上顶点坐标和右下顶点坐标选取明文图像对应区域的小矩阵并进行Zigzag置乱。If U(i1)≠V(i1) and U(i1+1)≠V(i1+1), {min(U(i1+1),V(i1+1)),min(U(i1),V(i1))} are used as the coordinates of the upper left vertex of the small matrix, and {max(U(i1+1),V(i1+1)),max(U(i1),V(i1))} are used as the coordinates of the lower right vertex of the small matrix. According to the coordinates of the upper left vertex and the lower right vertex, the small matrix of the corresponding area of the plaintext image is selected and Zigzag scrambled.

如果U(i1)=V(i1)或U(i1+1)=V(i1+1),选取到的是行数为1或列数为1的序列,这时置乱方法是将该行或者是该列逆序排列。If U(i1)=V(i1) or U(i1+1)=V(i1+1), the selected sequence is a sequence with 1 row or 1 column. In this case, the scrambling method is to reverse the row or column.

第三步:重复第二步直到选取的30组像素矩阵都完成置乱操作。Step 3: Repeat step 2 until all 30 selected pixel matrices have completed the scrambling operation.

第四步:置乱结束,得到置乱后的矩阵P1Step 4: After the scrambling is completed, the scrambled matrix P 1 is obtained.

为了更好地解释本发明提出的随机选取Zigzag置乱方法,下面以一个8×8的矩阵为例,图7展示了完整的置乱过程。首先得到坐标控制的序列U={3,1,2,5,7,6,8,4},V={5,7,6,3,2,4,5,6},然后由序列U、V得到四组矩阵顶点坐标:(1,3),(7,5);(3,2),(5,6);(4,2),(6,7);(4,5),(6,8)。根据第一组坐标可以选取一个7×3的小矩阵A,A1为小矩阵A置乱后效果图,用小矩阵A1替换小矩阵A,第一组置乱结束;根据第二组坐标继续选取得到3×5的小矩阵B,对其进行Zigzag置乱得到小矩阵B1,用小矩阵B1替换矩阵B,第二组置乱结束;根据第三组坐标选取得到3×6的小矩阵C,对其进行Zigzag置乱得到小矩阵C1,用小矩阵C1替换小矩阵C,第三组置乱结束;根据第四组坐标选取得到3×4的小矩阵D,对其进行Zigzag置乱得到小矩阵D1,用小矩阵D1替换小矩阵D,置乱结束。由图7可以看到矩阵中大部分像素的位置都发生了变化,说明本发明提出的随机选取Zigzag置乱方法可以达到很好的置乱效果。In order to better explain the random selection Zigzag scrambling method proposed in the present invention, an 8×8 matrix is taken as an example, and the complete scrambling process is shown in Figure 7. First, the coordinate control sequence U={3,1,2,5,7,6,8,4}, V={5,7,6,3,2,4,5,6} is obtained, and then four sets of matrix vertex coordinates are obtained from the sequences U and V: (1,3), (7,5); (3,2), (5,6); (4,2), (6,7); (4,5), (6,8). According to the first set of coordinates, a 7×3 small matrix A can be selected, A1 is the effect diagram after the small matrix A is scrambled, and the small matrix A is replaced with the small matrix A1, and the first set of scrambling is completed; according to the second set of coordinates, a 3×5 small matrix B is selected, and a Zigzag scrambling is performed on it to obtain a small matrix B1, and the small matrix B1 replaces the matrix B, and the second set of scrambling is completed; according to the third set of coordinates, a 3×6 small matrix C is selected, and a Zigzag scrambling is performed on it to obtain a small matrix C1, and the small matrix C is replaced with the small matrix C1, and the third set of scrambling is completed; according to the fourth set of coordinates, a 3×4 small matrix D is selected, and a Zigzag scrambling is performed on it to obtain a small matrix D1, and the small matrix D is replaced with the small matrix D1, and the scrambling is completed. It can be seen from Figure 7 that the positions of most pixels in the matrix have changed, indicating that the randomly selected Zigzag scrambling method proposed in the present invention can achieve a good scrambling effect.

步骤四:将矩阵P1分成若干个2×2的小像素块并把每个分块中像素值转换成四进制,按照四进制位置乱法进行置乱得到置乱后的像素矩阵P2Step 4: Divide the matrix P1 into several 2×2 small pixel blocks and convert the pixel values in each block into quaternary, and perform scrambling according to the quaternary position scrambling method to obtain the scrambled pixel matrix P2 .

本发明提出了一种新的位级置乱方法,即四进制位置乱法,该置乱方法是先将像素矩阵分块,然后转换为四进制,再对其进行位交换,最终得到新的像素值,具体置乱过程如下:The present invention proposes a new bit-level scrambling method, namely, a quaternary position scrambling method. The scrambling method is to first divide the pixel matrix into blocks, then convert it into quaternary, and then perform bit swapping to finally obtain a new pixel value. The specific scrambling process is as follows:

第一步:将图像分成若干个2×2的小像素块,如果图像大小为M×N,那么可以得到(M×N)/4个小矩阵像素块。Step 1: Divide the image into several 2×2 small pixel blocks. If the image size is M×N, then (M×N)/4 small matrix pixel blocks can be obtained.

第二步:将小像素块内的每个像素转换为四进制,每一个像素值可以转换为一个四位四进制数,然后把每个四进制数的四位按图8顺序排列,那么每个2×2的小像素块可以转换为4×4的像素矩阵。图8中四位二进制数的四位从高到低依次按照左上、右上、左下、右下排列。Step 2: Convert each pixel in the small pixel block into quaternary. Each pixel value can be converted into a four-bit quaternary number. Then arrange the four bits of each quaternary number in the order shown in Figure 8. Then, each 2×2 small pixel block can be converted into a 4×4 pixel matrix. In Figure 8, the four bits of the four-bit binary number are arranged from high to low in the order of upper left, upper right, lower left, and lower right.

第三步:对像素矩阵进行位置乱:每个4×4的像素矩阵可以重新分为四个2×2子矩阵A、B、C、D,将每个子矩阵中Ⅰ、Ⅱ、Ⅲ、Ⅳ处对应的值分别放入子矩阵E、F、G、H中,得到新的四进制数。即将四个子矩阵中左上、右上、左下、右下的元素分别组成四个新的小矩阵,并分别将四个小矩阵放在新的矩阵的左上、右上、左下、右下的位置。Step 3: Disorder the pixel matrix: Each 4×4 pixel matrix can be re-divided into four 2×2 sub-matrices A, B, C, and D. The corresponding values of positions Ⅰ, Ⅱ, Ⅲ, and Ⅳ in each sub-matrix are placed in sub-matrices E, F, G, and H to obtain new quaternary numbers. That is, the elements of the upper left, upper right, lower left, and lower right of the four sub-matrices are respectively formed into four new small matrices, and the four small matrices are placed in the upper left, upper right, lower left, and lower right positions of the new matrix.

第四步:将置乱后的四进制数重新转换为十进制。Step 4: Convert the scrambled quaternary number back to decimal.

第五步:将2×2的小像素块合并,重新得到M×N的像素矩阵。Step 5: Merge the 2×2 small pixel blocks to regain the M×N pixel matrix.

为了更好地解释四进制位置乱过程,以一个4×4的像素矩阵为例,图9给出了其置乱过程。可以看到图像首先被分成四个大小为2×2的块,然后对其进行四进制转换,以第一个分块为例,初始值为64、123、98、101,转换为四进制分别为1000、1223、1202、1211,置乱之后得到新的四进制数分别为1111、0322、0201、0321,最后将置乱后的四进制数转换为十进制数得到85、58、33、57。其他分块置乱方法同理,最终可以看到大部分像素值都发生了变化,说明此方法可以达到很好的置乱效果。In order to better explain the quaternary position scrambling process, a 4×4 pixel matrix is taken as an example, and its scrambling process is shown in Figure 9. It can be seen that the image is first divided into four blocks of size 2×2, and then the quaternary conversion is performed. Taking the first block as an example, the initial values are 64, 123, 98, and 101, which are converted to quaternary values of 1000, 1223, 1202, and 1211 respectively. After scrambling, the new quaternary numbers are 1111, 0322, 0201, and 0321 respectively. Finally, the scrambled quaternary numbers are converted to decimal numbers to obtain 85, 58, 33, and 57. The other block scrambling methods are similar. In the end, it can be seen that most of the pixel values have changed, indicating that this method can achieve a good scrambling effect.

步骤五:把像素矩阵P2按行展开为一维序列,并用轮盘旋转编码算法进行扩散,把扩散后的一维序列重新转换成大小为M×N的矩阵记为矩阵P3Step 5: Expand the pixel matrix P 2 into a one-dimensional sequence by row, and diffuse it using the roulette wheel coding algorithm. Convert the diffused one-dimensional sequence back into a matrix of size M×N and record it as matrix P 3 .

Wu提出了二阶位罗盘扩散技术,受其启发,本发明提出了基于多阶轮盘旋转编码的四阶轮盘编码算法,首先将像素矩阵转换为一维序列,并将序列中的数字划分为每四个一组。加密时每次取出一组数,并把该组的四个数分别记为α,β,γ,δ;并将四个数转换为八位二进制,分别得到{α12345678}、{β12345678}、{γ12345678}和{δ12345678}。按照从高位到低位的顺序排列在轮盘点上,其中,α放在红色轮盘点处,β放在绿色轮盘点处,γ放在橙色轮盘点处,δ放在黄色轮盘点处。接着使用混沌序列控制每阶轮盘的旋转角度和方向,每个轮盘可以顺时针或逆时针旋转45×i°,i=1,2,3,4,5,6,7,8,旋转之后重新按列提取比特位,可以得到四个新的八位二进制数,最后将提取出的四个二进制数转换为十进制,继续提取下一组数执行相同的操作,直到所有数都完成了旋转操作,得到新的像素矩阵。以α所在环顺时针旋转45°,β环所在顺时针旋转135°,γ所在环逆时针旋转45°,δ所在环不动为例,旋转后可以得到四个新的二进制数,分别为{α86215624},{α17326735}、{α28437846}、{α31548157},图10给出了轮盘旋转编码的过程示意图。Wu proposed a second-order bit compass diffusion technology. Inspired by it, the present invention proposes a fourth-order roulette encoding algorithm based on multi-order roulette rotation encoding. First, the pixel matrix is converted into a one-dimensional sequence, and the numbers in the sequence are divided into groups of four. During encryption, a group of numbers is taken out each time, and the four numbers in the group are recorded as α, β, γ , and δ respectively; and the four numbers are converted into eight-bit binary numbers to obtain {α 12345678 }, {β 1234 ,β 5 ,β 678 }, {γ 1234 ,γ 5 ,γ 678 } and {δ 12345678 } respectively . Arrange them on the roulette wheel points in order from high to low, where α is placed at the red roulette wheel point, β is placed at the green roulette wheel point, γ is placed at the orange roulette wheel point, and δ is placed at the yellow roulette wheel point. Then use the chaotic sequence to control the rotation angle and direction of each order of the roulette wheel. Each roulette wheel can be rotated 45×i° clockwise or counterclockwise, i=1,2,3,4,5,6,7,8. After rotation, re-extract the bits by column to obtain four new eight-bit binary numbers. Finally, convert the extracted four binary numbers into decimal, and continue to extract the next group of numbers to perform the same operation until all numbers have completed the rotation operation to obtain a new pixel matrix. Taking the example of rotating the ring where α is located 45° clockwise, the ring where β is located 135° clockwise, the ring where γ is located 45° counterclockwise, and the ring where δ remains unchanged, four new binary numbers can be obtained after rotation, namely {α 86215624 }, {α 17326735 }, {α 28437846 }, {α 31548157 }. Figure 10 shows a schematic diagram of the roulette rotation encoding process.

轮盘旋转编码算法是本发明提出的扩散算法,具体加密流程如下:The roulette wheel rotation encoding algorithm is a diffusion algorithm proposed by the present invention. The specific encryption process is as follows:

第一步:由公式(8)得到两个序列X′和Y′,序列X′的值可以取1-8,序列Y′的值可以取0或1,分别用于控制轮盘旋转编码的度数和方向。Step 1: Two sequences X′ and Y′ are obtained from formula (8). The value of sequence X′ can be 1-8, and the value of sequence Y′ can be 0 or 1, which are used to control the degree and direction of the wheel rotation encoding respectively.

第二步:将像素矩阵P2按行展开转换为一维序列,由于本发明使用的轮盘一共四个环,所以将像素值分成每四个一组,每次处理一组数。Step 2: Expand the pixel matrix P2 row by row and convert it into a one-dimensional sequence. Since the roulette wheel used in the present invention has four rings in total, the pixel values are divided into groups of four, and one group of numbers is processed each time.

第三步:取出一组数将其转换为二进制,每个数可以转换为一个八位二进制数,将二进制数的每位按照顺序排列在轮盘的每个环上。Step 3: Take out a set of numbers and convert them into binary. Each number can be converted into an eight-bit binary number. Arrange each bit of the binary number in order on each ring of the roulette wheel.

第四步:判断序列X′和Y′的值,如果序列Y′的元素等于1则顺时针旋转,如果序列Y′的元素等于0则逆时针旋转;旋转角度等于X′×45°。Step 4: Determine the values of sequences X′ and Y′. If the element of sequence Y′ is equal to 1, rotate clockwise. If the element of sequence Y′ is equal to 0, rotate counterclockwise. The rotation angle is equal to X′×45°.

第五步:将旋转后的数按列选取,得到新的二进制数并将其转换为十进制。Step 5: Select the rotated numbers by column to get the new binary number and convert it to decimal.

第六步:重复第三步、第四步直到所有数都完成加密。Step 6: Repeat steps 3 and 4 until all numbers are encrypted.

第七步:将加密得到的一维序列重新转换为M×N的矩阵P3Step 7: Convert the encrypted one-dimensional sequence back into an M×N matrix P 3 .

为了更好地展示轮盘旋转编码算法,下面以一个2×2的矩阵为例,图11展示了完整的加密过程。首先得到X′={2,3,1,6},Y′={0,1,1,0}分别控制旋转方向和角度,然后将小矩阵中每个数转为二进制并将他们按顺序排列在轮盘的每个盘上,其中187对应的二进制数为10111011、98对应的二进制数为01100010、241对应的二进制数为11110001、108对应的二进制数为01101100,Y′(1)=0、X′(1)=2,所以最外盘对应的旋转方向和角度为顺时针旋转90°,同理把剩余三个盘旋转对应角度,按列提取出新的二进制数分别为11101110、00010011、11100011、10110001,最后把它们转换为十进制可以得到四个新的数,分别为238、19、227、177。In order to better demonstrate the roulette wheel rotation encoding algorithm, a 2×2 matrix is taken as an example below. FIG11 shows the complete encryption process. First, we get X′={2,3,1,6}, Y′={0,1,1,0} to control the rotation direction and angle respectively. Then, convert each number in the small matrix into binary and arrange them in order on each disk of the roulette wheel. The binary number corresponding to 187 is 10111011, the binary number corresponding to 98 is 01100010, the binary number corresponding to 241 is 11110001, and the binary number corresponding to 108 is 01101100. Y′(1)=0, X′(1)=2, so the rotation direction and angle corresponding to the outermost disk are 90° clockwise. Similarly, rotate the remaining three disks by the corresponding angles, and extract the new binary numbers by column, which are 11101110, 00010011, 11100011, and 10110001. Finally, convert them into decimal to get four new numbers, which are 238, 19, 227, and 177.

步骤六:将混沌序列X升序排序并把索引序列转换成索引矩阵,然后利用序列Z′、W′将矩阵P3按索引矩阵的索引顺序双向非顺序扩散,达到全局扩散效果,得到密文图像C。Step 6: Sort the chaotic sequence X in ascending order and convert the index sequence into an index matrix. Then use the sequences Z′ and W′ to diffuse the matrix P 3 bidirectionally and non-sequentially according to the index order of the index matrix to achieve a global diffusion effect and obtain the ciphertext image C.

加密算法应具有扩散特性。大多数图像加密算法是通过将当前像素与前一个像素值进行运算来改变像素值。然而,以固定顺序处理图像像素会导致加密性能降低,并为攻击者提供大量有用的信息来进行密码分析。为了克服这个缺点,本发明的加密方案采用非顺序扩散,使用随机访问机制来处理像素。处理顺序由混沌序列决定,不是固定的,因此,一个像素可能受到来自像素矩阵中任何像素的影响。假设图像尺寸为M×N,首先由公式(8)得到Z1、W1两The encryption algorithm should have diffusion characteristics. Most image encryption algorithms change the pixel value by operating the current pixel with the previous pixel value. However, processing image pixels in a fixed order will lead to reduced encryption performance and provide attackers with a lot of useful information for cryptanalysis. In order to overcome this shortcoming, the encryption scheme of the present invention adopts non-sequential diffusion and uses a random access mechanism to process pixels. The processing order is determined by the chaotic sequence and is not fixed. Therefore, a pixel may be affected by any pixel in the pixel matrix. Assuming that the image size is M×N, firstly, the two Z1 and W1 are obtained by formula (8):

个混沌序列,并将其转换为混沌矩阵Z、W,Z用于正向扩散,W用于反向扩散,将混沌序列X按升序排列得到对应的索引序列,并将该索引序列转换为尺寸为M×N的矩阵作为索引矩阵I。然后按照公式(10)、(11)对前文得到的像素矩阵进行双向扩散:A chaotic sequence is obtained and converted into chaotic matrices Z and W. Z is used for forward diffusion and W is used for reverse diffusion. The chaotic sequence X is arranged in ascending order to obtain the corresponding index sequence, and the index sequence is converted into a matrix of size M×N as the index matrix I. Then, bidirectional diffusion is performed on the pixel matrix obtained above according to formulas (10) and (11):

正向扩散:Forward Diffusion:

反向扩散:Backward diffusion:

其中,n=(i-1)×N+j,i∈[1,M],j∈[1,N],Imx、Iny为索引矩阵I中序号n所对应的行、列的坐标值。为异或运算,C1(i,j)、Z′(i,j)、W′(i,j)、C(i,j)分别为中间矩阵C1、混沌矩阵Z′、W′和密文图像C的第i行、第j列的元素值。Wherein, n=(i-1)×N+j, i∈[1,M], j∈[1,N], I mx , I ny are the coordinate values of the row and column corresponding to the sequence number n in the index matrix I. is an XOR operation, C 1 (i,j), Z′(i,j), W′(i,j), and C(i,j) are the element values of the i-th row and j-th column of the intermediate matrix C 1 , the chaotic matrix Z′, W′, and the ciphertext image C, respectively.

为了更好地解释非顺序扩散算法,以一个2×2的矩阵为例,图12展示了完整的扩散过程。其中,Z′={145,69,220,189}、W′={25,84,241,103},X={0.1321,0.6245,0.0125,0.3252}。首先将序列Z′、W′、x转换成2×2的矩阵,然后按索引矩阵对应的顺序使用公式(10)、(11)进行双向扩散。To better explain the non-sequential diffusion algorithm, a 2×2 matrix is taken as an example. Figure 12 shows the complete diffusion process. Among them, Z′={145,69,220,189}, W′={25,84,241,103}, X={0.1321,0.6245,0.0125,0.3252}. First, the sequence Z′, W′, x is converted into a 2×2 matrix, and then bidirectional diffusion is performed using formulas (10) and (11) in the order corresponding to the index matrix.

本发明所提加密算法是对称加密,解密算法是加密算法的逆过程。The encryption algorithm proposed in the present invention is symmetric encryption, and the decryption algorithm is the inverse process of the encryption algorithm.

一个安全的图像加密方法应该可以成功抵御所有各种攻击(如统计攻击、已知的明文攻击或已知的密文攻击等),对提出的图像加密方法进行安全性分析。使用了不同的样本图像进行详细分析,具体结果如下。A secure image encryption method should be able to successfully resist all kinds of attacks (such as statistical attacks, known plaintext attacks or known ciphertext attacks, etc.), and the security analysis of the proposed image encryption method is carried out. Different sample images are used for detailed analysis, and the specific results are as follows.

为了验证本发明的技术方案的可行性,在Matlab R2017a实验平台进行仿真。如图13所示,可以看到加密后的图像是类噪声图像,而解密图像与加密图像完全一致,说明本发明可以有效地隐藏明文信息,不失真地恢复原始图像,具有很好的加密效果。In order to verify the feasibility of the technical solution of the present invention, simulation was performed on the Matlab R2017a experimental platform. As shown in Figure 13, it can be seen that the encrypted image is a noise-like image, while the decrypted image is completely consistent with the encrypted image, indicating that the present invention can effectively hide plaintext information and restore the original image without distortion, and has a good encryption effect.

密钥空间的大小指的是在图像加密方法中使用的所有可能的密钥的集合。密钥空间的大小决定了加密算法抵抗暴力破解的能力,一般认为密钥空间越大,方法的安全性越高。当密钥空间大于2100≈1030时,加密方法可以抵御暴力攻击。本发明使用SHA-384算法生成密钥,它的密钥空间为2192,假设双精度数的计算精度为1015,本发明方案的总密钥空间约为2192×1015=2242比2100大得多,因此本发明的加密方法是安全的。The size of the key space refers to the set of all possible keys used in the image encryption method. The size of the key space determines the ability of the encryption algorithm to resist brute force cracking. It is generally believed that the larger the key space, the higher the security of the method. When the key space is greater than 2 100 ≈10 30 , the encryption method can resist brute force attacks. The present invention uses the SHA-384 algorithm to generate keys, and its key space is 2 192. Assuming that the calculation accuracy of double-precision numbers is 10 15 , the total key space of the scheme of the present invention is approximately 2 192 ×10 15 =2 242 , which is much larger than 2 100. Therefore, the encryption method of the present invention is secure.

安全的图像加密算法应该对输入的密钥高度敏感,当密钥输入错误时则无法得到正确的解密图像。在进行密钥敏感性测试时,只需对原始密钥进行微小的改动,再用其对密文图像进行解密。明文图像和解密图像之间的差异越大,密钥的敏感性就越强。A secure image encryption algorithm should be highly sensitive to the input key. If the key is entered incorrectly, the correct decrypted image cannot be obtained. When performing a key sensitivity test, only a small change is made to the original key and then the ciphertext image is decrypted. The greater the difference between the plaintext image and the decrypted image, the more sensitive the key is.

本发明测试以Lena图像为例,使用初始密钥加密之后,对初始参数x0、y0、z0、w0作微小的改动,用改动过的初始参数进行解密。结果如图14所示,从图14的(c)-(f)可以看出即使对密钥做出微小的改变,解密图像也是完全不同的。同时,图14的(g)-(l)也显示了任意两个解密图像之间差异,说明本发明所提出的加密算法具有很强的敏感性。The test of the present invention takes the Lena image as an example. After encryption with the initial key, the initial parameters x 0 , y 0 , z 0 , w 0 are slightly changed, and the modified initial parameters are used for decryption. The result is shown in FIG14 . From FIG14 (c)-(f), it can be seen that even if a slight change is made to the key, the decrypted image is completely different. At the same time, FIG14 (g)-(l) also shows the difference between any two decrypted images, indicating that the encryption algorithm proposed by the present invention has a strong sensitivity.

直方图是图像最具统计特性的特征之一,它反映了图像中灰度像素强度等级的分布情况,可能被攻击者用来提取图像信息。如果加密图像的直方图是均匀的,这意味着它不提供任何关于图像特征的信息,从而使统计攻击变得困难。因此有效的图像加密算法会生成直方图接近均匀分布密文图像,对统计攻击具有更强的鲁棒性。图15为不同图像的明文图像和密文图像的直方图,正如所看到的,加密图像直方图几乎是均匀的,所以本发明可以很好地抵抗统计攻击。The histogram is one of the most statistical features of an image. It reflects the distribution of grayscale pixel intensity levels in an image and may be used by attackers to extract image information. If the histogram of an encrypted image is uniform, it means that it does not provide any information about the image features, making statistical attacks difficult. Therefore, an effective image encryption algorithm will generate a ciphertext image with a histogram close to a uniform distribution, which is more robust to statistical attacks. Figure 15 shows the histograms of plaintext images and ciphertext images of different images. As can be seen, the encrypted image histogram is almost uniform, so the present invention can resist statistical attacks well.

卡方(χ2)检验可以进一步定量分析明文图像与相应密文图像之间的差异,可通过公式(12)计算:The chi-square (χ2) test can further quantitatively analyze the difference between the plaintext image and the corresponding ciphertext image, which can be calculated by formula (12):

式中,χ2表示方差,也直接体现密文图像直方图与理论直方图的偏差程度,fi是密文图像直方图中该灰度级像素值出现的频率,g是直方图中该灰度级像素值出现的理论频率,表示为g=(M×N)/256。选取显著性水平为0.05时,当测试密文图像的方差小于此方差,直方图近似均匀分布。表2显示了明文图像和密文图像的方差值,通过比较,密文图像的方差值远小于明文图像的方差值,这意味着密文图像的像素值的分布是均匀的。In the formula, χ2 represents the variance, which directly reflects the degree of deviation between the ciphertext image histogram and the theoretical histogram, fi is the frequency of the grayscale pixel value in the ciphertext image histogram, and g is the theoretical frequency of the grayscale pixel value in the histogram, expressed as g = (M × N) / 256. When the significance level is selected as 0.05, When the variance of the test ciphertext image is less than this variance, the histogram is approximately uniformly distributed. Table 2 shows the variance values of the plaintext image and the ciphertext image. By comparison, the variance value of the ciphertext image is much smaller than the variance value of the plaintext image, which means that the distribution of the pixel values of the ciphertext image is uniform.

表2明文图像和密文图像的方差结果Table 2 Variance results of plaintext images and ciphertext images

相关系数是图像的另一个众所周知的统计特征,可以反映图像像素之间的联系。对于普通图像,相邻像素值在水平、垂直、对角线方向存在很强的相关性。一个好的图像加密方法应该尽可能减少这种相关性。相邻像素间的相关系数可计算为The correlation coefficient is another well-known statistical feature of an image, which can reflect the connection between image pixels. For ordinary images, there is a strong correlation between adjacent pixel values in the horizontal, vertical, and diagonal directions. A good image encryption method should reduce this correlation as much as possible. The correlation coefficient between adjacent pixels can be calculated as

其中,cov(x,y)=E([x-E(x)][y-E(y)]),Rx,y是相关性系数,E(x)表示x的期望,D(x)表示x的方差,cov(x,y)表示协方差,x和y是一对像素值,N为图像中像素的总个数。如果X和Y表现出高相关性,则相关系数接近于1;否则,它接近于0。因此,相邻的两个像素序列的相关系数越小,其相关性越弱。Among them, cov(x,y)=E([xE(x)][yE(y)]), R x,y is the correlation coefficient, E(x) represents the expectation of x, D(x) represents the variance of x, cov(x,y) represents the covariance, x and y are a pair of pixel values, and N is the number of pixels in the image. The total number of pixels. If X and Y show a high correlation, the correlation coefficient is close to 1; otherwise, it is close to 0. Therefore, the smaller the correlation coefficient of two adjacent pixel sequences, the weaker their correlation. .

从明文图像和密文图像中随机选取5000对像素,分别计算它们在水平、垂直和对角线方向上相邻像素的相关性。由图16可以看出,加密后的图像完全消除了相邻像素的相关性,可以有效抵御统计攻击。此外,表3给出了不同加密图像相邻像素的相关系数。可以看出,加密后的图像的相关系数接近于0,因此本发明有效地消除了像素相关性。同时,不同加密算法下的相关性比较如表4所示。结果表明,与其他加密算法相比,本发明所提出的加密方法对明文图像相关性的破坏性更强。其中,文献[1]来自于文献[Zhen,Ping,et al."Chaos-based image encryption scheme combining DNA coding and entropy."Multimedia Tools and Applications75(2016):6303-6319.],文献[2]来自于文献[Zhang,Yong,and Ying jun Tang."A plaintext-related image encryption algorithmbased on chaos."Multimedia Tools and Applications 77.6(2018):6647-6669.],文献[3]来自于文献[Xu,Lu,et al."A novel bit-level image encryption algorithm basedon chaotic maps."Optics and Lasers in Engineering 78(2016):17-25.],文献[4]来自于文献[Wang,Tao,and Ming-hui Wang."Hyperchaotic image encryption algorithmbased on bit-level permutation and DNA encoding."Optics&Laser Technology 132(2020):106355.]。5000 pairs of pixels are randomly selected from the plaintext image and the ciphertext image, and the correlations between adjacent pixels in the horizontal, vertical and diagonal directions are calculated respectively. As can be seen from Figure 16, the encrypted image completely eliminates the correlation between adjacent pixels and can effectively resist statistical attacks. In addition, Table 3 gives the correlation coefficients of adjacent pixels of different encrypted images. It can be seen that the correlation coefficient of the encrypted image is close to 0, so the present invention effectively eliminates the pixel correlation. At the same time, the correlation comparison under different encryption algorithms is shown in Table 4. The results show that compared with other encryption algorithms, the encryption method proposed in the present invention is more destructive to the correlation of plaintext images. Among them, reference [1] comes from reference [Zhen, Ping, et al. "Chaos-based image encryption scheme combining DNA coding and entropy." Multimedia Tools and Applications 75(2016): 6303-6319.], reference [2] comes from reference [Zhang, Yong, and Ying jun Tang. "A plaintext-related image encryption algorithmbased on chaos." Multimedia Tools and Applications 77.6(2018): 6647-6669.], reference [3] comes from reference [Xu, Lu, et al. "A novel bit-level image encryption algorithm based on chaotic maps." Optics and Lasers in Engineering 78(2016): 17-25.], and reference [4] comes from reference [Wang, Tao, and Ming-hui Wang. "Hyperchaotic image encryption algorithmbased on bit-level permutation and DNA encoding." Optics&Laser Technology 132(2020): 106355.].

表3明文图像和密文图像各方向上的相关系数Table 3 Correlation coefficients of plaintext images and ciphertext images in various directions

表4密文图像相关性与其他方案对比Table 4 Comparison of ciphertext image correlation with other schemes

信息熵是信息论中衡量信息量的概念之一,在图像处理中,信息熵可以用于衡量图像的复杂性或者不确定性,反映了图像中像素值的分布情况。信息熵越高,表示图像的像素分布越平均、越随机,安全性也就越高。对于灰度图像,有256个灰度级,N=8。所以,理想的加密图像的熵应该等于8,信息熵值越接近于8,说明加密性能越好。全局信息熵的计算公式为:Information entropy is one of the concepts in information theory that measures the amount of information. In image processing, information entropy can be used to measure the complexity or uncertainty of an image, reflecting the distribution of pixel values in the image. The higher the information entropy, the more evenly and randomly distributed the pixels in the image are, and the higher the security is. For grayscale images, there are 256 gray levels, N = 8. Therefore, the entropy of an ideal encrypted image should be equal to 8. The closer the information entropy value is to 8, the better the encryption performance. The calculation formula for global information entropy is:

其中,L代表图像灰度级,mi是图像第i个像素值,P(mi)是对应的每一个灰度值出现的概率。表5显示了明文和密文图像的熵。从表5中可以看出,这些值确实接近理想值8。这证明了所提出的加密方法是安全的,可以很好地抵抗熵攻击。其中,文献[5]来自于文献[He,Chen chen,et al."An Algorithm Based on Hodgkin-Huxley Model and Latin Squarefor Image Encryption."IEEE Access 11(2023):34163-34174.],文献[6]来自于文献[Jun,Wang Ji,and Tan Soo Fun."A new image encryption algorithm based onsingle S-box and dynamic encryption step."IEEE Access 9(2021):120596-120612.],文献[7]来自于文献[Wang,Xing yuan,and Mao chang Zhao."An imageencryption algorithm based on hyperchaotic system and DNA coding."Optics&Laser Technology 143(2021):107316.]。Where L represents the grayscale of the image, mi is the i-th pixel value of the image, and P( mi ) is the probability of occurrence of each corresponding grayscale value. Table 5 shows the entropy of the plaintext and ciphertext images. It can be seen from Table 5 that these values are indeed close to the ideal value of 8. This proves that the proposed encryption method is secure and can resist entropy attacks well. Among them, reference [5] comes from reference [He, Chen chen, et al. "An Algorithm Based on Hodgkin-Huxley Model and Latin Square for Image Encryption." IEEE Access 11(2023):34163-34174.], reference [6] comes from reference [Jun, Wang Ji, and Tan Soo Fun. "A new image encryption algorithm based on single S-box and dynamic encryption step." IEEE Access 9(2021):120596-120612.], and reference [7] comes from reference [Wang, Xing yuan, and Mao chang Zhao. "An image encryption algorithm based on hyperchaotic system and DNA coding." Optics & Laser Technology 143(2021):107316.].

对于像素分布均匀的密文图像,计算出来的信息熵是准确的,但有些密文图像可能存在局部像素分布不均匀的情况,这时,计算出来的信息熵是不准确的。局部信息熵克服了全局信息熵的这一缺点,进一步提高了这一评价标准的准确性,局部信息熵的计算方法为:For ciphertext images with uniform pixel distribution, the calculated information entropy is accurate, but some ciphertext images may have uneven pixel distribution in some areas, in which case the calculated information entropy is inaccurate. Local information entropy overcomes this shortcoming of global information entropy and further improves the accuracy of this evaluation standard. The calculation method of local information entropy is:

其中,Si是密文信息熵,k是选取的组数,TB是每组的像素数。选择k为3,TB为1936,显著性水平α为0.05时,得到的局部信息熵的理想范围是[7.901515698,7.903422936]范围。如果局部信息熵的测试结果在这范围内,说明密文图像通过测试。在局部信息熵测试中,使用本发明所提加密方法分别对五幅不同的图像进行加密,进而获得它们密文图像的局部信息熵,测试结果如表6所示。可以明显看出,所有密文图像均通过局部信息熵测试,说明密文图像具有很高的随机性。Wherein, Si is the ciphertext information entropy, k is the number of selected groups, and TB is the number of pixels in each group. When k is selected as 3, TB is 1936, and the significance level α is 0.05, the ideal range of the local information entropy is [7.901515698, 7.903422936]. If the test result of the local information entropy is within this range, it means that the ciphertext image passes the test. In the local information entropy test, five different images are encrypted respectively using the encryption method proposed in the present invention, and then the local information entropy of their ciphertext images is obtained. The test results are shown in Table 6. It can be clearly seen that all ciphertext images pass the local information entropy test, indicating that the ciphertext images have a high degree of randomness.

表5明文图像、密文图像的全局信息熵和其他算法对比Table 5 Comparison of global information entropy of plaintext image and ciphertext image with other algorithms

表6密文图像局部信息熵结果Table 6 Local information entropy results of ciphertext images

抗噪声能力是测试加密方案性能的重要指标。在信息传输过程中,图像可能受到噪声的影响,噪声攻击会使密文图像受损,清晰度降低。常见的噪声攻击有高斯噪声和椒盐噪声,本发明添加不同强度的椒盐噪声进行测试。图17为加入强度为0.05、0.1、0.15、0.2的椒盐噪声进行干扰的情况下的解密图像。可以看出,在高噪声强度下,恢复的图像仍然是可见的,因此本发明提出的加密方法具有很好的鲁棒性。Noise resistance is an important indicator for testing the performance of encryption schemes. During information transmission, images may be affected by noise. Noise attacks can damage ciphertext images and reduce clarity. Common noise attacks include Gaussian noise and salt and pepper noise. The present invention adds salt and pepper noise of different intensities for testing. Figure 17 shows the decrypted image with interference from salt and pepper noise of intensities of 0.05, 0.1, 0.15, and 0.2. It can be seen that under high noise intensity, the restored image is still visible, so the encryption method proposed in the present invention has good robustness.

数字图像在互联网上传输时,可能被部分裁剪或丢失,这使得接收方很难恢复这些受损的图像。如果解密算法抗剪裁攻击的能力不强,在解密的过程中就会因为信息缺失而导致解密失败。测验加密算法抗剪裁攻击能力的方法就是将密文图像中的一部分像素值删除,再用对其进行解密,如果能很大程度的还原明文图像,说明本发明的加密方法具有很强的抗剪裁攻击能力。图18显示了分别对Lena密文图像按1/64、1/16、1/4、1/2比例裁剪后对应的解密图像。可以看出,解密后的图像仍然是可识别的,因此本发明具有良好的抗裁剪攻击能力。When digital images are transmitted on the Internet, they may be partially cropped or lost, which makes it difficult for the recipient to restore these damaged images. If the decryption algorithm is not strong in resisting cropping attacks, decryption will fail due to missing information during the decryption process. The method to test the encryption algorithm's ability to resist cropping attacks is to delete part of the pixel values in the ciphertext image and then decrypt it. If the plaintext image can be restored to a large extent, it means that the encryption method of the present invention has a strong ability to resist cropping attacks. Figure 18 shows the corresponding decrypted images after the Lena ciphertext image is cropped at a ratio of 1/64, 1/16, 1/4, and 1/2. It can be seen that the decrypted image is still recognizable, so the present invention has good resistance to cropping attacks.

差分攻击的基本思想是选择两个相似的、只改变了一个比特的明文图像,用相同的算法和密钥生成两个不同的密码图像,然后判断它们之间的区别。对于一种加密算法来说,如果只对明文图像做了微小的改变,而加密后的图像发生了很大的变化,那么新的加密方法就可以抵抗差分攻击。The basic idea of differential attack is to select two similar plaintext images with only one bit changed, generate two different cipher images with the same algorithm and key, and then judge the difference between them. For an encryption algorithm, if only a small change is made to the plaintext image, but the encrypted image changes greatly, then the new encryption method can resist differential attack.

为了检测明文更改对密文更改的影响,测量了两个参数。分别是归一化像素变化率(NPCR)和统一平均变化强度(UACI)。NPCR检测的是当明文中单个像素发生变化时,密文中出现的像素变化数。当NPCR值接近100%时,该密码对明文的变化越敏感。UACI值越大,密文对明文的变化越敏感,对差分攻击的抵抗力也就越大。NPCR和UACI的计算公式为:In order to detect the impact of plaintext changes on ciphertext changes, two parameters are measured. They are the Normalized Pixel Change Rate (NPCR) and the Uniform Average Change Intensity (UACI). NPCR detects the number of pixel changes that occur in the ciphertext when a single pixel in the plaintext changes. When the NPCR value is close to 100%, the cipher is more sensitive to changes in the plaintext. The larger the UACI value, the more sensitive the ciphertext is to changes in the plaintext, and the greater the resistance to differential attacks. The calculation formulas for NPCR and UACI are:

其中,M×N是密文图像的尺度大小,C1、C2是两个要比较的密文,D(i,j)用来判别密文C1(i,j)、C2(i,j)是否相等的,相等取0,否则取1。NPCR和UACI的理想值分别为99.6049%和33.4635%。在密钥不变的情况下,用本发明的加密方法对两个明文图像进行加密,表7、表8显示了计算出来的NPCR和UACI值以及和其他算法的比较结果。从对比结果可以看出,本发明计算得到的NPCR和UACI值,比其他大多数算法更接近理论值。其中,文献[8]来自于文献[Cun,Qi qi,et al."A new chaotic image encryption algorithm based on dynamicDNA coding and RNA computing."The Visual Computer(2023):1-20.],文献[9]来自于文献[Abbasi,Ali Asghar,Mahdi Mazinani,and Rahil Hosseini."Chaoticevolutionary-based image encryption using RNA codons and amino acid truthtable."Optics&Laser Technology 132(2020):106465.],文献[10]来自于文献[Vidhya,R.,and M.Brindha."A novel approach for Chaotic image Encryption based onblock level permutation and bit-wise substitution."Multimedia Tools andApplications81.3(2022):3735-3772.],文献[11]来自于文献[Zhou,Minjun,and Chunhua Wang."A novel image encryption scheme based on conservative hyperchaoticsystem and closed-loop diffusion between blocks."Signal Processing 171(2020):107484.],文献[12]来自于文献[Cun,Qi qi,et al."Selective image encryptionmethod based on dynamic DNA coding and new chaotic map."Optik243(2021):167286.]。Wherein, M×N is the scale of the ciphertext image, C 1 and C 2 are two ciphertexts to be compared, and D(i,j) is used to determine whether the ciphertexts C 1 (i,j) and C 2 (i,j) are equal. If they are equal, it takes 0, otherwise it takes 1. The ideal values of NPCR and UACI are 99.6049% and 33.4635%, respectively. When the key remains unchanged, the encryption method of the present invention is used to encrypt two plaintext images. Tables 7 and 8 show the calculated NPCR and UACI values and the comparison results with other algorithms. It can be seen from the comparison results that the NPCR and UACI values calculated by the present invention are closer to the theoretical values than most other algorithms. Among them, reference [8] comes from reference [Cun, Qi qi, et al. "A new chaotic image encryption algorithm based on dynamic DNA coding and RNA computing." The Visual Computer (2023): 1-20.], reference [9] comes from reference [Abbasi, Ali Asghar, Mahdi Mazinani, and Rahil Hosseini. "Chaotic evolutionary-based image encryption using RNA codons and amino acid truthtable." Optics & Laser Technology 132 (2020): 106465.], reference [10] comes from reference [Vidhya, R., and M. Brindha. "A novel approach for Chaotic image Encryption based on block level permutation and bit-wise substitution." Multimedia Tools and Applications 81.3 (2022): 3735-3772.], and reference [11] comes from reference [Zhou, Minjun, and Chunhua Wang. "A novel image encryption scheme based on conservative hyperchaotic system and closed-loop diffusion between blocks." Signal Processing 171(2020):107484.], reference [12] comes from reference [Cun, Qi qi, et al. "Selective image encryption method based on dynamic DNA coding and new chaotic map." Optik243(2021):167286.].

表7不同图像密文的NPCR和UACI值Table 7 NPCR and UACI values of different image ciphertexts

表8Lena密文图像的NPCR和UACI值及和其他算法的对比Table 8 NPCR and UACI values of Lena ciphertext images and comparison with other algorithms

MSE和PSNR是两种常用于评估图像质量的指标,MSE用于衡量两个图像之间的差异,它计算了两个图像对应像素之间差异的平均值的平方;PSNR是峰值信噪比,用于衡量加密后图像的质量。PSNR值越大,图像失真越小,图像越清晰。在测试明文和密文图像时,PSNR值越小表示加密效果越好。计算公式如(17)和(18)。MSE and PSNR are two commonly used indicators for evaluating image quality. MSE is used to measure the difference between two images. It calculates the square of the average difference between the corresponding pixels of the two images. PSNR is the peak signal-to-noise ratio, which is used to measure the quality of the encrypted image. The larger the PSNR value, the smaller the image distortion and the clearer the image. When testing plaintext and ciphertext images, the smaller the PSNR value, the better the encryption effect. The calculation formulas are as follows (17) and (18).

式中,M为图像的宽度,N为图像的长度,P为明文图像,C为密文图像,b为像素二进制字符串的长度,MSE为明文图像P与密文图像C之间的均方误差。不同明文图像加密后的MSE和PSNR值以及和其他算法的对比如表9所示。从表中的数据可以看出,本发明加密后的图像的PSNR非常小,通过和其他算法进行对比分析,也优于其他算法,说明本发明的加密方法具有很高的安全性。其中,文献[13]来自于文献[Wang,Xing yuan,and Mao changZhao."An image encryption algorithm based on hyperchaotic system and DNAcoding."Optics&Laser Technology 143(2021):107316.],文献[14]来自于文献[Wang,Xing yuan,and Xuan Chen."An image encryption algorithm based on dynamicrowscrambling and Zigzag transformation."Chaos,Solitons&Fractals 147(2021):110962.],文献[15]来自于文献[Wang,Xing yuan,Wen hua Xue,and Ju bai An."Imageencryption algorithm based on LDCML and DNA coding sequence."Multimedia Toolsand Applications 80(2021):591-614.],文献[16]来自于文献[Yousif,Sura F.,AliJ.Abboud,and Raad S.Alhumaima."A new image encryption based on bit replacing,chaos and DNA coding techniques."Multimedia Tools and Applications 81.19(2022):27453-27493.]。Wherein, M is the width of the image, N is the length of the image, P is the plaintext image, C is the ciphertext image, b is the length of the pixel binary string, and MSE is the mean square error between the plaintext image P and the ciphertext image C. The MSE and PSNR values after encryption of different plaintext images and the comparison with other algorithms are shown in Table 9. It can be seen from the data in the table that the PSNR of the encrypted image of the present invention is very small, and through comparative analysis with other algorithms, it is also better than other algorithms, indicating that the encryption method of the present invention has high security. Among them, reference [13] comes from reference [Wang, Xing yuan, and Mao changzhao. "An image encryption algorithm based on hyperchaotic system and DNA coding." Optics & Laser Technology 143 (2021): 107316.], reference [14] comes from reference [Wang, Xing yuan, and Xuan Chen. "An image encryption algorithm based on dynamic row scrambling and Zigzag transformation." Chaos, Solitons & Fractals 147 (2021): 110962.], reference [15] comes from reference [Wang, Xing yuan, Wen hua Xue, and Ju bai An. "Image encryption algorithm based on LDCML and DNA coding sequence." Multimedia Tools and Applications 80 (2021): 591-614.], and reference [16] comes from reference [Yousif, Sura F., Ali J. Abboud, and Raad S. Alhumaima. "A new image encryption based on bit replacing, chaos and DNA coding techniques."Multimedia Tools and Applications 81.19(2022):27453-27493.].

表9密文图像的PSNR和MES及与其他算法的对比Table 9 PSNR and MES of ciphertext images and comparison with other algorithms

本发明提出了一种新的4D超混沌系统,4D超混沌系统具有广泛的混沌和超混沌特性。同时,本发明设计了一种基于随机选取Zigzag置乱和轮盘旋转扩散的图像加密方法,首先根据混沌序列生成多组坐标,根据坐标对明文图像进行选取,将选取得到的小分块矩阵依次进行Zigzag置乱,其次对置乱后图像像素进行比特级置乱,像素级和比特级的双重置乱,打破了图像像素间的高度相关性;然后使用轮盘旋转扩散算法对置乱图像进行扩散,进一步加强加密效果,最后对图像像素矩阵进行双向非顺序扩散达到全局扩散的效果,得到密文图像。仿真实验验证了本发明的加密方法可以将不同灰度图像加密为无法识别的密文图像,并且使用正确的密钥可以完全恢复,能有效抵抗选择明文攻击、暴力攻击、统计分析攻击、差分攻击、裁剪攻击和噪声攻击。因此,本发明提出的加密方法具有很好的安全性能。The present invention proposes a new 4D hyperchaotic system, which has a wide range of chaotic and hyperchaotic characteristics. At the same time, the present invention designs an image encryption method based on randomly selected Zigzag scrambling and roulette rotation diffusion. First, multiple groups of coordinates are generated according to the chaotic sequence, and the plaintext image is selected according to the coordinates. The selected small block matrix is sequentially Zigzag scrambled, and then the scrambled image pixels are bit-level scrambled. The double reset scrambling at the pixel level and the bit level breaks the high correlation between the image pixels; then the roulette rotation diffusion algorithm is used to diffuse the scrambled image to further enhance the encryption effect, and finally the image pixel matrix is bidirectionally non-sequentially diffused to achieve the effect of global diffusion, and the ciphertext image is obtained. Simulation experiments verify that the encryption method of the present invention can encrypt different grayscale images into unrecognizable ciphertext images, and can be completely restored using the correct key, and can effectively resist selected plaintext attacks, brute force attacks, statistical analysis attacks, differential attacks, cropping attacks and noise attacks. Therefore, the encryption method proposed by the present invention has good security performance.

以上所述仅为本发明的较佳实施例而已,并不用以限制本发明,凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention. Any modifications, equivalent substitutions, improvements, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (6)

1. An image encryption method based on block selection Zigzag scrambling and rotary coding of a wheel disc is characterized by comprising the following steps:
step one: calculating a hash value H of a plaintext image P with the size of MxN by using an SHA-384 algorithm, and calculating an initial value of the 4D hyper-chaotic system according to the hash value H; carrying out iteration by taking the initial value into a 4D hyper-chaotic system to obtain four chaotic sequences X, Y, Z and W;
The expression of the 4D hyper-chaotic system is as follows:
wherein x, y, z, w is a state variable, and wherein, As a derivative of the state variable x, y, z, w, a, b, c, D is a control parameter that affects the behavior of the 4D hyper-chaotic system;
Step two: selecting a plurality of groups of elements in the chaotic sequence Z and the chaotic sequence W, respectively converting the elements into elements with values smaller than M and smaller than N to obtain a sequence U, V, selecting coordinate values by using the values of the sequence U, V, and scrambling a plaintext image P according to a random Zigzag scrambling method to obtain a matrix P 1;
The implementation method of the random Zigzag scrambling method comprises the following steps: obtaining L pairs of coordinate values according to the sequence U, V, determining the range of a small matrix in the plaintext image P according to the coordinate values, and sequentially carrying out Zigzag scrambling on L groups of small pixel matrixes to obtain a matrix P 1;
The Zigzag scrambling is that the Zigzag scrambling starts from the upper left corner of a small pixel matrix, moves along the vertical direction, then moves along the diagonal direction, and continuously repeats the process until all pixels are traversed, elements of the matrix are extracted and arranged into a one-dimensional sequence according to the traversing sequence, and then the one-dimensional sequence is reconverted into a pixel matrix with the same size as the small matrix;
Step three: dividing the matrix P 1 into a plurality of small pixel blocks with the size of 2 multiplied by 2, converting the pixel value in each small pixel block into quaternary system, and scrambling according to a quaternary position scrambling method to obtain a scrambled pixel matrix P 2;
The implementation method of the quaternary position disorder method comprises the following steps:
1): dividing the matrix P 1 into a plurality of small pixel blocks of 2×2;
2): converting each pixel in the small pixel block into a quaternary system, converting each pixel value into a quaternary system number, then arranging the quaternary system numbers in a quaternary sequence, and converting each 2×2 small pixel block into a 4×4 pixel matrix;
3): the 4 x 4 pixel matrix is subjected to position scrambling: dividing each 4×4 pixel matrix into four 2×2 sub-matrices again, performing position disorder on each 2×2 sub-matrix to obtain a new small matrix, and obtaining a new quaternary number by each new small matrix;
4): converting the new quaternary number into decimal again to obtain a new small pixel block of 2 multiplied by 2;
5): combining the new small pixel blocks of 2×2 to obtain a pixel matrix P 2 of m×n;
Step four: mapping the value of the chaotic sequence X into the range of 1-8 to obtain a sequence X ', and converting the value of the chaotic sequence Y into 0 or 1 to obtain a sequence Y'; expanding the pixel matrix P 2 into a one-dimensional sequence according to rows, diffusing the one-dimensional sequence by using a rotary coding algorithm of a wheel disc by using sequences X ', Y', and converting the diffused one-dimensional sequence into a matrix again to obtain an image matrix P 3;
The wheel disc rotation coding algorithm is a four-order wheel disc coding algorithm based on multi-order wheel disc rotation coding, firstly, a pixel matrix P 2 is converted into a one-dimensional sequence, numbers in the one-dimensional sequence are divided into groups of four, a group of numbers are taken out each time, and four numbers in the group of numbers are respectively converted into eight-bit binary numbers; arranging eight binary digits of four digits on the wheel count clockwise in the order from the high order to the low order, and arranging the four digits in the order from the outer ring of the wheel to the inner ring of the wheel; then using sequences X 'and Y' to control the rotation angle and direction of each wheel disc, each wheel disc can rotate clockwise or anticlockwise (45 multiplied by i 3) °, i3=1, 2,3,4,5,6,7,8, extracting bits by columns again after rotation, obtaining four new eight-bit binary numbers, and converting the extracted four binary numbers into decimal numbers; continuing to extract the next group of numbers to execute the same operation until all the numbers complete the rotation operation, so as to obtain a new pixel matrix;
Step five: converting the chaotic sequences Z and W into sequences Z1 and W1 with values of 0-255 respectively and converting the sequences Z and W into chaotic matrixes Z ', W'; the chaotic sequence X is arranged in an ascending order to obtain an index sequence, the index sequence is converted into a matrix with the size of MxN to be used as an index matrix I, and a matrix P 3 is bidirectionally and non-sequentially diffused according to the index sequence of the index matrix I by utilizing the chaotic matrices Z ', W', so that a ciphertext image C is obtained;
The method for performing bidirectional diffusion on the matrix P 3 comprises the following steps:
forward diffusion:
back diffusion:
wherein, n= (I-1) x n+j, I e [1, M ], j e [1, N ], I nx、Iny is the coordinate value of the row and column corresponding to the sequence number N in the index matrix I; For the exclusive-or operation, C 1 (i, j), Z '(i, j), W' (i, j), and C (i, j) are the element values of the intermediate matrix C 1, the chaotic matrix Z ', W', and the ith row and jth column of the ciphertext image C, respectively.
2. The image encryption method based on block selection Zigzag scrambling and wheel disc rotation encoding according to claim 1, wherein the method for calculating the initial value of the 4D hyper-chaotic system is as follows: inputting a plaintext image into an SHA-384 algorithm, outputting 384-bit binary hash value H, equally dividing the hash value H into 48 groups of binary sequences, obtaining H k=h1,h2,h3,…h48 by 8 bits of each group, performing operation on the 48 groups of binary sequences, and calculating an initial value x 0、y0、z0、w0 of the 4D hyper-chaotic system as follows:
Wherein K 1~K8 is an intermediate variable, i2 is more than or equal to 1 and less than or equal to 8, Mod is an modulo function, which is an exclusive or operation.
3. The image encryption method based on block selection Zigzag scrambling and wheel rotation encoding according to claim 1 or 2, wherein when the control parameters a=15.5, b=50, c=3.6, d=0.2, the 4D hyperchaotic system is in a hyperchaotic state;
And (3) carrying out iteration 1000+M multiplied by N times in the 4D hyperchaotic system, and discarding the previous 1000 iteration results to obtain four chaotic sequences X, Y, Z and W.
4. The image encryption method based on block selection Zigzag scrambling and wheel disc rotation encoding according to claim 1, wherein the implementation method of the random Zigzag scrambling method is as follows: 30 groups of small matrixes are randomly selected from the pixel matrix of the plaintext image P, and each small matrix is subjected to Zigzag scrambling respectively, wherein the random Zigzag scrambling method comprises the following steps: judging coordinate values: if U (i 1) noteqV (i 1) and U (i 1+1) noteqV (i 1+1), { min (U (i 1+1), V (i 1+1)), min (U (i 1), V (i 1)) } as the top left vertex coordinates of the small matrix, { max (U (i 1+1), V (i 1+1)), max (U (i 1), V (i 1)) } as the bottom right vertex coordinates of the small matrix, selecting the small matrix of the corresponding area of the plaintext image according to the top left vertex coordinates and the bottom right vertex coordinates and performing Zigzag scrambling; if U (i 1) =v (i 1) or U (i1+1) =v (i1+1), a sequence with 1 row number or 1 column number is selected, and the rows or columns are arranged in reverse order; repeating the steps until the selected 30 groups of small matrixes complete scrambling operation; obtaining a scrambled matrix P 1; wherein i1=1, 2,3 … …, 38360.
5. The image encryption method based on block selection Zigzag scrambling and rotary coding of a wheel disc according to claim 1, wherein the method of sequential arrangement in the step 2) is that four digits of quaternary numbers are sequentially arranged from high to low according to the upper left, the upper right, the lower left and the lower right;
The position disorder in the step 3) is as follows: the method comprises the steps of respectively forming elements of upper left, upper right, lower left and lower right in four submatrices into four new submatrices, and respectively placing the four new submatrices at the positions of upper left, upper right, lower left and lower right of a new small matrix to obtain a new small matrix;
Mapping the value of the chaotic sequence X to the range of 1-8 to obtain a sequence X ', converting the value of the chaotic sequence Y into 0 or 1 to obtain a sequence Y', and respectively converting the chaotic sequences Z and W into sequences Z1 and W1 with the values of 0-255, wherein the method comprises the following steps:
The method for selecting a plurality of groups of elements in the chaotic sequence Z and the chaotic sequence W and respectively converting the elements into elements with values smaller than M and smaller than N to obtain a sequence U, V comprises the following steps:
Where M and N are the number of rows and columns of the plaintext image, X (i 1), Y (i 1), Z (i 1), W (i 1), X '(i 1), Y' (i 1), Z1 (i 1), W1 (i 1), U (i 1), V (i 1) are the i1 st elements of the chaotic sequences X, Y, Z and W, the sequences X ', Y', Z1, W1, U, V, respectively, i1=1, …, mxn.
6. The image encryption method based on block selection Zigzag scrambling and wheel rotation coding according to claim 1 or 5, wherein the method for diffusing the wheel rotation coding algorithm is as follows:
11 Pixel matrix P 2 is converted into a one-dimensional sequence by line expansion, pixel values are divided into groups of four, and a group number is processed at a time;
12): taking out a group of numbers to convert into binary numbers, converting each number into an eight-bit binary number, and arranging each bit of the binary numbers on each ring of the wheel disc in sequence;
13): judging the values of the sequences X 'and Y', rotating clockwise if the element of the sequence Y 'is equal to 1, and rotating anticlockwise if the element of the sequence Y' is equal to 0; the rotation angle is equal to X' ×45°;
14): the rotated numbers are selected according to the columns to obtain new binary numbers and are converted into decimal numbers;
15): repeating steps 12) -14) until all numbers have completed diffusion; the one-dimensional sequence obtained by diffusion is converted into a matrix P 3 of size mxn.
CN202311546537.3A 2023-11-18 2023-11-18 Image encryption method based on block selection Zigzag scrambling and rotary coding of wheel disc Active CN117579756B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311546537.3A CN117579756B (en) 2023-11-18 2023-11-18 Image encryption method based on block selection Zigzag scrambling and rotary coding of wheel disc

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311546537.3A CN117579756B (en) 2023-11-18 2023-11-18 Image encryption method based on block selection Zigzag scrambling and rotary coding of wheel disc

Publications (2)

Publication Number Publication Date
CN117579756A CN117579756A (en) 2024-02-20
CN117579756B true CN117579756B (en) 2024-05-24

Family

ID=89894893

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311546537.3A Active CN117579756B (en) 2023-11-18 2023-11-18 Image encryption method based on block selection Zigzag scrambling and rotary coding of wheel disc

Country Status (1)

Country Link
CN (1) CN117579756B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118264760B (en) * 2024-05-30 2024-09-06 江西财经大学 Image encryption method, system, readable storage medium and computer
CN118631417B (en) * 2024-06-21 2025-01-07 广州大学 Image encryption method and device
CN119602925B (en) * 2024-11-15 2025-08-08 中国人民解放军海军工程大学 Hyperchaotic image encryption method based on parallel rotation scrambling of Rubik's Cube three-dimensional space

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112422268A (en) * 2020-11-10 2021-02-26 郑州轻工业大学 Image encryption method based on block scrambling and state conversion
CN116016795A (en) * 2022-12-09 2023-04-25 大连大学 Image encryption method based on variable step length extraction random number and improved ZigZag conversion
CN116233331A (en) * 2023-02-27 2023-06-06 郑州轻工业大学 Image encryption method based on block scrambling and DNA operation
CN116961904A (en) * 2023-08-09 2023-10-27 郑州轻工业大学 Enterprise information image encryption method based on double scrambling and controlled DNA coding

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5309654B2 (en) * 2008-03-31 2013-10-09 富士通株式会社 Image encryption apparatus and image decryption apparatus

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112422268A (en) * 2020-11-10 2021-02-26 郑州轻工业大学 Image encryption method based on block scrambling and state conversion
CN116016795A (en) * 2022-12-09 2023-04-25 大连大学 Image encryption method based on variable step length extraction random number and improved ZigZag conversion
CN116233331A (en) * 2023-02-27 2023-06-06 郑州轻工业大学 Image encryption method based on block scrambling and DNA operation
CN116961904A (en) * 2023-08-09 2023-10-27 郑州轻工业大学 Enterprise information image encryption method based on double scrambling and controlled DNA coding

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
一种基于Lorenz混沌系统的有效图像加密算法;全俊杰;蔡清波;;泉州师范学院学报;20200415(第02期);全文 *

Also Published As

Publication number Publication date
CN117579756A (en) 2024-02-20

Similar Documents

Publication Publication Date Title
Wang et al. Chaotic color image encryption based on 4D chaotic maps and DNA sequence
CN112084517B (en) Image encryption method based on chaotic mapping and bit-level permutation
Guo et al. Optical image encryption and authentication scheme with computational ghost imaging
CN112637441B (en) Color image compression encryption method based on compressed sensing
CN117579756B (en) Image encryption method based on block selection Zigzag scrambling and rotary coding of wheel disc
Wei et al. A fast image encryption algorithm based on parallel compressive sensing and DNA sequence
Zahmoul et al. Image encryption based on new Beta chaotic maps
Liu et al. Quantum block image encryption based on arnold transform and sine chaotification model
CN107220923B (en) Digital picture feedback encryption method based on image network
CN109756322B (en) Digital Image Encryption Method Based on DES Structure and DNA Encoding
CN107590394B (en) An Image Encryption Method Based on Chaotic Map and Bit Reorganization
Kengnou Telem et al. A simple and robust gray image encryption scheme using chaotic logistic map and artificial neural network
CN110225222B (en) Image encryption method based on 3D orthogonal Latin square and chaotic system
CN111008383B (en) An Image Encryption Method Based on Multidirectional Diffusion and DNA Encoding
CN116233331B (en) Image encryption method based on block scrambling and DNA operation
CN117440101A (en) Image encryption algorithm and electronic equipment based on multi-chaotic system and circular DNA operation
CN117499005A (en) Image encryption method based on 4D chaotic system
Shakir et al. A new four-dimensional hyper-chaotic system for image encryption
CN113691362A (en) Bit plane image compression encryption algorithm based on hyperchaotic system and DNA coding
Teng et al. Multi-image encryption algorithm based on novel spatiotemporal chaotic system and dynamical chaotic trajectories
Chen et al. Region of interest encryption based on novel 2D hyperchaotic signal and bagua coding algorithm
CN116436589A (en) Image encryption method and decryption method based on light chaos and DNA magic cube scrambling
CN109361830A (en) A plaintext-based image encryption method
CN103258313A (en) Image encryption method based on Henon mapping and magic cube transformation
Gupta et al. An Enhanced Security in Medical Image Encryption Based on Multi-level Chaotic DNA Diffusion

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant