|
一个基于像素置乱和比特运算的小波变换域隐藏加密图像算法
|
Abstract:
通过结合经典的Logistic混沌系统和Chebyshev混沌系统构造一个新的2D Chebyshev-Logistic混沌系统,对该动力系统进行了性能分析,显示其具有良好的混沌特性。由于类噪声的密文图像在传输过程中易被识别和攻击,文章将进一步利用图像本身固有的冗余性,将隐藏技术与混沌图像加密算法结合起来,提出一种基于二维离散小波变换的隐藏彩色图像加密算法。在预加密阶段,加密明文图像得到密文图像;在嵌入阶段,利用二维离散小波变换将密文图像嵌入到载体图像中,最后得到一个含密文图像信息的载体图像。论文对加密隐藏系统做了仿真实验和安全性能分析,结果表明该系统有良好的加密和信息隐藏效果。
The classic Logistic chaotic system and the Chebyshev chaotic system are mixed to construct a new 2D Chebyshev-Logistic chaotic system. The performance analysis of the dynamic system shows that it has good chaotic characteristics. Due to the susceptibility of noisy cipher images to recognition and attack during transmission, this paper will further utilize the inherent redundancy of image itself and combine hiding technology with chaotic image encryption algorithms to propose a visually meaningful color image encryption algorithm based on 2D discrete wavelet transform. In the pre-encryption stage, the plain image is encrypted to a cipher image. In the embedding stage, a 2D discrete wavelet transform is combined to embed the cipher image into the carrier image, and finally a carrier image containing cipher information is obtained. The paper conducted simulation experiments and security performance analysis on the encryption and hiding system, and the results showed that the system has good encryption and information hiding effects.
[1] | 张勇. 混沌数字图像加密[M]. 北京: 清华大学出版社, 2016. |
[2] | Matthews, R. (1989) On the Derivation of a “Chaotic” Encryption Algorithm. Cryptologia, 13, 29-42. https://doi.org/10.1080/0161-118991863745 |
[3] | Fridrich, J. (1998) Symmetric Ciphers Based on Two-Dimensional Chaotic Maps. International Journal of Bifurcation and Chaos, 8, 1259-1284. https://doi.org/10.1142/s021812749800098x |
[4] | Ye, R. (2011) A Novel Chaos-Based Image Encryption Scheme with an Efficient Permutation-Diffusion Mechanism. Optics Communications, 284, 5290-5298. https://doi.org/10.1016/j.optcom.2011.07.070 |
[5] | Pareek, N.K., Patidar, V. and Sud, K.K. (2006) Image Encryption Using Chaotic Logistic Map. Image and Vision Computing, 24, 926-934. https://doi.org/10.1016/j.imavis.2006.02.021 |
[6] | Stoyanov, B. and Kordov, K. (2015) Image Encryption Using Chebyshev Map and Rotation Equation. Entropy, 17, 2117-2139. https://doi.org/10.3390/e17042117 |
[7] | Li, C., Luo, G., Qin, K. and Li, C. (2016) An Image Encryption Scheme Based on Chaotic Tent Map. Nonlinear Dynamics, 87, 127-133. https://doi.org/10.1007/s11071-016-3030-8 |
[8] | Wang, X., Guan, N. and Yang, J. (2021) Image Encryption Algorithm with Random Scrambling Based on One-Dimensional Logistic Self-Embedding Chaotic Map. Chaos, Solitons & Fractals, 150, Article ID: 111117. https://doi.org/10.1016/j.chaos.2021.111117 |
[9] | Hua, Z. and Zhou, Y. (2016) Image Encryption Using 2D Logistic-Adjusted-Sine Map. Information Sciences, 339, 237-253. https://doi.org/10.1016/j.ins.2016.01.017 |
[10] | Tang, M., Zeng, G., Yang, Y. and Chen, J. (2022) A Hyperchaotic Image Encryption Scheme Based on the Triple Dislocation of the Liu and Lorenz System. Optik, 261, Article ID: 169133. https://doi.org/10.1016/j.ijleo.2022.169133 |
[11] | Xiao, Y., Tong, X., Zhang, M. and Wang, Z. (2021) Image Lossless Encoding and Encryption Method of EBCOT Tier1 Based on 4D Hyperchaos. Multimedia Systems, 28, 727-748. https://doi.org/10.1007/s00530-021-00868-5 |
[12] | Lai, Q., Hu, G., Erkan, U. and Toktas, A. (2023) High-efficiency Medical Image Encryption Method Based on 2D Logistic-Gaussian Hyperchaotic Map. Applied Mathematics and Computation, 442, Article ID: 127738. https://doi.org/10.1016/j.amc.2022.127738 |
[13] | Hua, Z., Zhou, Y. and Bao, B. (2020) Two-dimensional Sine Chaotification System with Hardware Implementation. IEEE Transactions on Industrial Informatics, 16, 887-897. https://doi.org/10.1109/tii.2019.2923553 |
[14] | Liu, L., Jiang, D., Wang, X., Rong, X. and Zhang, R. (2021) 2D Logistic-Adjusted-Chebyshev Map for Visual Color Image Encryption. Journal of Information Security and Applications, 60, Article ID: 102854. https://doi.org/10.1016/j.jisa.2021.102854 |
[15] | Yang, Y., Wang, B., Pei, S., Zhou, Y., Shi, W. and Liao, X. (2021) Using M-Ary Decomposition and Virtual Bits for Visually Meaningful Image Encryption. Information Sciences, 580, 174-201. https://doi.org/10.1016/j.ins.2021.08.073 |
[16] | 叶瑞松, 陈月明. 一个迭代函数系统的分形混沌特性及其应用[J]. 汕头大学学报(自然科学版), 2023, 38(2): 3-30. |
[17] | Wong, K., Kwok, B.S. and Law, W. (2008) A Fast Image Encryption Scheme Based on Chaotic Standard Map. Physics Letters A, 372, 2645-2652. https://doi.org/10.1016/j.physleta.2007.12.026 |
[18] | Shah, D., Shah, T. and Jamal, S.S. (2019) A Novel Efficient Image Encryption Algorithm Based on Affine Transformation Combine with Linear Fractional Transformation. Multidimensional Systems and Signal Processing, 31, 885-905. https://doi.org/10.1007/s11045-019-00689-w |
[19] | Ghebleh, M., Kanso, A. and Noura, H. (2014) An Image Encryption Scheme Based on Irregularly Decimated Chaotic Maps. Signal Processing: Image Communication, 29, 618-627. https://doi.org/10.1016/j.image.2013.09.009 |