|
基于二维斜帐篷映射和中国剩余定理的彩色图像加密算法
|
Abstract:
本文将二维斜帐篷映射与中国剩余定理相结合,提出了一种基于置换–扩散模式的高效图像加密算法。在置换过程中,该算法利用二维斜帐篷映射生成混沌序列,通过对混沌序列进行升序排列得到位置置换索引序列,用于图像像素位置的随机置乱。在扩散过程中,利用中国剩余定理对置乱后的图像颜色分量进行重构,并引入实数广义Arnold映射来改变图像颜色分量的灰度值分布。各种安全性分析都表明了本文提出的图像加密算法的有效性,能有效抵御各种攻击。
An efficient image encryption algorithm based on permutation-diffusion mode is proposed by combining 2D skew tent map with Chinese remainder theorem. In the permutation process, the algorithm uses 2D skew tent map to generate chaotic sequences and arrange the chaotic sequences in ascending order to obtain the position index sequences, which are used for random scrambling of image pixel positions. In the diffusion process, Chinese Remainder Theorem is used to reconstruct the scrambled image color components, and a generalized Arnold map with real parameters is introduced to change the gray value distribution of the image color component. All kinds of security analysis show that the image encryption algorithm proposed in this paper is effective and can effectively resist various attacks.
[1] | Stinson, D.R. (1995) Cryptography: Theory and Practice. CRC Press, Boca Raton. |
[2] | Fridrich, J. (1998) Symmetric Ciphers Based on Two-Dimensional Chaotic Maps. International Journal of Bifurcation and Chaos, 8, 1259-1284. https://doi.org/10.1142/S021812749800098X |
[3] | Ye, R. (2011) A Novel Chaos-Based Image Encryption Scheme with an Efficient Permutation-Diffusion Mechanism. Optics Communications, 284, 5290-5298. https://doi.org/10.1016/j.optcom.2011.07.070 |
[4] | Tang, Z., Song, J., Zhang, X. and Sun, R. (2016) Multiple-Image Encryption with Bit-Plane Decomposition and Chaotic Maps. Optics and Lasers in Engineering, 80, 1-11. https://doi.org/10.1016/j.optlaseng.2015.12.004 |
[5] | Ye, R. (2014) A Novel Image Encryption Scheme Based on Generalized Multi-Sawtooth Maps. Fundamenta Informaticae, 133, 87-104. https://doi.org/10.3233/FI-2014-1063 |
[6] | Ding, C., Pei, D. and Salomaa, A. (1996) Chinese Remainder Theorem (Applications in Computing, Coding, Cryptography). World Scientific, Singapore. https://doi.org/10.1142/3254 |
[7] | Zhu, H., Zhao, C. and Zhang, X. (2013) A Novel Image Encryption-Compression Scheme Usinghyper-Chaos and Chinese Remainder Theorem. Signal Process. Image Communication, 28, 670-680.
https://doi.org/10.1016/j.image.2013.02.004 |
[8] | Brindhaa, M. and Ammasai Goundenb, N. (2016) A Chaos-Based Image Encryption and Lossless Compression Algorithm Using Hash Table and Chinese Remainder Theorem. Applied Soft Computing, 40, 379-390.
https://doi.org/10.1016/j.asoc.2015.09.055 |
[9] | Ye, R. and Zhou, W. (2011) An Image Encryption Scheme Based on 2D Tent Map and Coupled Map Lattice. International Journal of Information & Communication Technology Research, 1, 344-348. |
[10] | Alvarez, G. and Li, S.J. (2006) Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems. International Journal of Bifurcation & Chaos, 16, 2129-2151. https://doi.org/10.1142/S0218127406015970 |
[11] | Wu, Y., Noonan, J.P. and Agaian, S. (2011) NPCR and UACI Randomness Tests for Image Encryption. Journal of Selected Areas in Telecommunications (JSAT), 1, 31-38. |
[12] | Shannon, C.E. (1949) Communication Theory of Secrecy Systems. Bell System Technical Journal, 28, 656-715.
https://doi.org/10.1002/j.1538-7305.1949.tb00928.x |
[13] | Petrou, Maria. Image Processing: The Fundamentals. Second Edition. Wiley, Hoboken, New Jersey, USA, 2010.
https://doi.org/10.1002/9781119994398 |
[14] | Wen, W., Zhang, Y., Su, M., et al. (2017) Differential Attack on a Hyper-Chaos-Based Image Cryptosystem with a Classic Bi-Modular Architecture. Nonlinear Dynamics, 87, 383-390. https://doi.org/10.1007/s11071-016-3049-x |