[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN105118017A - Gray image encryption method based on two-dimension Henon mapping - Google Patents

Gray image encryption method based on two-dimension Henon mapping Download PDF

Info

Publication number
CN105118017A
CN105118017A CN201510477482.4A CN201510477482A CN105118017A CN 105118017 A CN105118017 A CN 105118017A CN 201510477482 A CN201510477482 A CN 201510477482A CN 105118017 A CN105118017 A CN 105118017A
Authority
CN
China
Prior art keywords
image
scramble
henon
pixel value
original
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510477482.4A
Other languages
Chinese (zh)
Inventor
平萍
毛莺池
戚荣志
许峰
许国艳
吕鑫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hohai University HHU
Original Assignee
Hohai University HHU
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hohai University HHU filed Critical Hohai University HHU
Priority to CN201510477482.4A priority Critical patent/CN105118017A/en
Publication of CN105118017A publication Critical patent/CN105118017A/en
Pending legal-status Critical Current

Links

Landscapes

  • Facsimile Transmission Control (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The invention discloses a gray image encryption method based on two-dimension Henon mapping. The method comprises two processes of scrambling and diffusion. During a scrambling process, the two-dimension Henon mapping is used to realize changes of a pixel position so that correlation of the position and a gray level is eliminated. During a diffusion process, the two-dimension Henon mapping is used to change a gray value of the pixel so that a ciphertext is sensitive to a plaintext. The method of the invention has the following advantage that during two processes of the scrambling and the diffusion of gray image encryption, the two-dimension Henon mapping is used so that the gray image encryption can be high-efficiently and conveniently completed and simultaneously high safety is possessed.

Description

A kind of gray level image encryption method mapped based on two-dimentional Henon
Technical field
The present invention relates to a kind of gray level image encryption method mapped based on two-dimentional Henon, belong to the image security technology in information security field.
Background technology
Image is the important means of mankind's obtaining informations, expressing information and transmission of information.Along with the fast development of internet and multimedia technology, more and more image can be issued quickly and easily and transmit on network.Some images relating to individual privacy, trade secret or state secret are just easy to be browsed easily by malicious attacker, steal, alter, bootlegging and propagation; if do not take necessary safety precautions to these images, the serious consequence brought thus is immeasurable.Thus, the core technology that image encryption is protected as safety of image, its application is more and more extensive, and its requirement is also more and more high.Different from text message, image has that data volume is large, redundance is high, the features such as correlativity is strong between neighbor, as good in although DES, AES possess the obscuring and diffusion property of some traditional symmetric encipherment algorithms, but the efficiency that seems when image data processing is not high, effect is undesirable, these problems propose new challenge to image encryption, and we are in the urgent need to researching and developing out the encryption method of how applicable image own characteristic.
From pertinent literature both domestic and external, the method for digital image encryption can be divided three classes: based on the image encryption method of scramble, based on the image encryption method of diffusion and the image encryption method based on scramble-diffusion.Research shows, the image encryption method based on scramble-diffusion can provide higher security than first two method, but complexity is higher than first two method.
Summary of the invention
Goal of the invention: for problems of the prior art, the invention provides a kind of gray level image encryption method mapped based on two-dimentional Henon, the scramble that the method is encrypted at gray level image all adopts two-dimentional Henon to map with spreading in two processes, efficiently can complete gray level image encryption expediently, there is higher security simultaneously.
Technical scheme: a kind of gray level image encryption method mapped based on two-dimentional Henon, the concrete implementation step of the method comprises scramble and diffusion two processes, as follows:
(1) scrambling process
Step 1, determines whether original-gray image is square-shaped image, if not square-shaped image, then this original-gray image is expanded to square-shaped image, and using the image after expansion as original-gray image, be designated as P, its size is N × N number of pixel; Wherein, N is positive integer;
Step 2, setting image scrambling number of times is the parameter a of L and Henon mapping, the value of b is respectively a 0, b 0, the expression formula that Henon maps is as follows:
x ′ = 1 - ax 2 + y mod N y ′ = x + b mod N - - - ( 1 )
Wherein, the span of L is the integer between 2 ~ 10; The span of a is 1 ~ 2 128between integer, and to get rid of be wherein the number of the multiple of N; The span of b is 0 ~ 2 128between integer; (x, y) is the point coordinate in original image P, and x, y ∈ 0,1,2 ..., N-1}; (x', y') is (x, y) point coordinate after Henon mapping transformation, the point coordinate namely in ciphertext graph picture, and x', y' ∈ 0,1,2 ..., N-1};
Step 3, the Henon mapping pair original image P in step 2 is utilized to carry out scramble, the method that scramble is 1 time is: by original image P mid point (x, y) gray-scale value that place's pixel is corresponding moves to the point (x' after Henon mapping transformation, y') place, thus obtain a width scramble once after image;
Step 4, using the image after scramble 1 time as original image repeated execution of steps 3, until scramble number of times reaches the L preset, thus the scramble image after obtaining scramble L time, be designated as P ';
(2) diffusion process
Step 1, extracts the picture element matrix of scramble image P ', and the picture element matrix of two dimension is converted to the pixel sequence A of one dimension according to order from top to bottom from left to right 1, A 2..., A m, M=N 2, M is the total number of pixel, and N is the number that original image is extended to horizontal direction after square chart picture or vertical direction pixel;
Step 2, makes x 0=A 1, y 0=A 2, wherein A 1for the 1st pixel value of scramble image P ', A 2for the 2nd pixel value of scramble image P ', x 0and y 0two original states of Henon mapping respectively, then parameter is a 1, b 1henon map according to formula (1) iteration t 1secondary, produce two final states make the 1st pixel value C of ciphertext graph picture 1for 2nd pixel value C of ciphertext graph picture 2for
Step 3: make x 0=(A 3+ C 1) mod256, y 0=(A 4+ C 2) mod256, wherein A 3for the 3rd pixel value of scramble image P ', A 4for the 4th pixel value of scramble image P ', x 0and y 0two original states of Henon mapping respectively, then parameter is a 2, b 2henon map according to formula (1) iteration t 2secondary, produce two final states make the 3rd pixel value C of ciphertext graph picture 3for 4th pixel value C of ciphertext graph picture 4for
Continue by that analogy to perform, until make x 0=(A m-1+ C m-3) mod256, y 0=(A m+ C m-2) mod256, wherein A m-1for M-1 the pixel value of scramble image P ', A mfor M the pixel value of scramble image P ', x 0and y 0two original states of Henon mapping respectively, then parameter is a m/2, b m/2henon map according to formula (1) iteration t m/2secondary, produce two final states make M-1 pixel value C of ciphertext graph picture m-1for m pixel value C of ciphertext graph picture mfor
The parameter a that above-mentioned Henon maps 1, b 1, a 2, b 2..., a m/2, b m/2, and the iterations t that Henon maps 1, t 2..., t m/2produce by pseudo-random sequence generator, parameter a 1, b 1, a 2, b 2..., a m/2, b m/2span be 1 ~ 2 128between integer, iterations t 1, t 2..., t m/2span 2 ~ 10 between integer;
By the M of ciphertext graph picture pixel value C 1, C 2..., C mjust final ciphertext graph picture is obtained after being converted to the two-dimensional pixel matrix of N × N; If want to obtain scramble and diffusion process that better cipher round results and higher security can carry out many wheels.
The present invention adopts above technical scheme compared with prior art, all adopts two-dimentional Henon to map, efficiently can complete gray level image encryption expediently, have higher security simultaneously in the scramble and diffusion two processes of gray level image encryption.
Accompanying drawing explanation
Fig. 1 is original image;
Fig. 2 is ciphertext graph picture;
Fig. 3 is the histogram of original image;
Fig. 4 is the histogram of ciphertext graph picture.
Embodiment
Below in conjunction with specific embodiment, illustrate the present invention further, these embodiments should be understood only be not used in for illustration of the present invention and limit the scope of the invention, after having read the present invention, the amendment of those skilled in the art to the various equivalent form of value of the present invention has all fallen within the application's claims limited range.
This specific embodiment adopts Mathematica8 software to emulate, original image select size be 256 × 256 standard testing gray level image Lena, each pixel of image is made up of 8 bits, as shown in Figure 1.
Be encrypted Lena gray level image, its detailed process is as follows:
(1) scramble
Step 1, original-gray image Lena is square-shaped image, meets the demands, and is designated as P, wherein N=256;
Step 2, the expression formulas that setting image scrambling number of times is the parameter a of L=3 and Henon mapping, the value of b is respectively 53,170, Henon mappings are as follows:
x ′ = 1 - ax 2 + y mod N y ′ = x + b mod N - - - ( 1 )
Wherein, (x, y) is the point coordinate in original image P, and x, y ∈ 0,1,2 ..., 255}; (x', y') is (x, y) point coordinate after Henon mapping transformation, the point coordinate namely in ciphertext graph picture, and x', y' ∈ 0,1,2 ..., 255};
Step 3, the Henon mapping pair original image P in step 2 is utilized to carry out scramble, the method that scramble is 1 time is: by original image P mid point (x, y) gray-scale value that place's pixel is corresponding moves to the point (x' after Henon mapping transformation, y') place, thus obtain a width scramble once after image;
Step 4, using the image after scramble 1 time as original image repeated execution of steps 3, until scramble number of times reaches the L=3 preset, thus the scramble image after obtaining scramble 3 times, be designated as P ';
(2) spread
Step 1, extracts the picture element matrix of scramble image P ', and the picture element matrix of two dimension is converted to the pixel sequence A of one dimension according to order from top to bottom from left to right 1, A 2..., A 65536;
Step 2, makes x 0=A 1, y 0=A 2, wherein A 1for the 1st pixel value of scramble image P ', A 2for the 2nd pixel value of scramble image P ', x 0and y 0two original states of Henon mapping respectively, then parameter is a 1, b 1henon map according to formula (1) iteration t 1secondary, produce two final states make the 1st pixel value C of ciphertext graph picture 1for 2nd pixel value C of ciphertext graph picture 2for
Step 3: make x 0=(A 3+ C 1) mod256, y 0=(A 4+ C 2) mod256, wherein A 3for the 3rd pixel value of scramble image P ', A 4for the 4th pixel value of scramble image P ', x 0and y 0two original states of Henon mapping respectively, then parameter is a 2, b 2henon map according to formula (1) iteration t 2secondary, produce two final states make the 3rd pixel value C of ciphertext graph picture 3for 4th pixel value C of ciphertext graph picture 4for
Continue by that analogy to perform, until make x 0=(A 65535+ C 65533) mod256, y 0=(A 65536+ C 65534) mod256, wherein A 65535for the 65535th pixel value of scramble image P ', A 65536for the 65536th pixel value of scramble image P ', x 0and y 0two original states of Henon mapping respectively, then parameter is a 32768, b 32768henon map according to formula (1) iteration t 32768secondary, produce two final state x t32768, y t32768, make the 65535th pixel value C of ciphertext graph picture 65535for x t32768, the 65536th pixel value C of ciphertext graph picture 65536for y t32768;
The parameter a that above-mentioned Henon maps 1, b 1, a 2, b 2..., a 32768, b 32768, and the iterations t that Henon maps 1, t 2..., t 32768produce by pseudo-random sequence generator, parameter a 1, b 1, a 2, b 2..., a 32768, b 32768span be 1 ~ 2 128between integer, iterations t 1, t 2..., t 32768span 2 ~ 10 between integer;
By 65536 of ciphertext graph picture pixel value C 1, C 2..., C 65536just ciphertext graph picture is obtained, as shown in Figure 2 after being converted to the two-dimensional pixel matrix of 256 × 256;
Below in conjunction with accompanying drawing, performance evaluation is carried out to embodiment:
1, histogram analysis
Histogram is objectively responding of image information statistical law, and a good resume image should make ciphertext graph picture statistically can not provide any useful information.More satisfactory state is that the uneven distribution of original image pixels value is become being uniformly distributed of pixel value by ciphering process, makes the probability of ciphertext pixel value in whole spatial dimension impartial.Fig. 3 is the histogram of expressly gray level image Fig. 1, Fig. 4 is the histogram of ciphertext graph as Fig. 2, contrast can be found out, the histogram of ciphertext graph picture is from expressly image is completely different, its histogram distribution is smooth and distribute uniformly, and this shows the attack that the inventive method effectively can be resisted Corpus--based Method and analyzed.
2, correlation analysis
In digital picture, the correlativity of neighbor is usually very high, and one of target of image encryption is exactly reduce the correlativity of neighbor.In order to analyze the correlativity of neighbor, first in the horizontal direction, vertical direction and to respectively Stochastic choice 20000 pairs of neighbors on angular direction, then the related coefficient γ on three directions is calculated according to formula (2)-(5) xy.
E ( x ) = 1 N Σ i = 1 N x i - - - ( 2 )
D ( x ) = 1 N Σ i = 1 N ( x i - E ( x ) ) 2 - - - ( 3 )
cov ( x , y ) = 1 N Σ i = 1 N ( x i - E ( x ) ) ( y i - E ( y ) ) - - - ( 4 )
γ x y = cov ( x , y ) D ( x ) D ( y ) - - - ( 5 )
Wherein, x and y represents the pixel value of adjacent 2 pixels in image respectively.Table 1 is depicted as the related coefficient before and after encryption on three directions, the neighbor height correlation of visible original image, related coefficient is close to 1, and after encryption, neighbor related coefficient is close to 0, and statistical information is expressly diffused into random ciphertext well and has suffered.
Table 1
3, the Analysis of Entropy
Image information entropy is a kind of statistical form of feature, it reflects the number of average information in image.The one dimension entropy of image represents the quantity of information that in image, the aggregation characteristic of intensity profile comprises makes p irepresent the ratio of gray-scale value shared by the pixel of i in image, then the unitary gray level entropy defining gray level image is:
H = Σ i = 0 255 p i logp i - - - ( 6 )
The one dimension entropy of image can represent the aggregation characteristic that gradation of image distributes, and the value of image information entropy, more close to 8, illustrates that cipher round results is better.The information entropy of the present invention being encrypted to rear image is tested, and testing the result obtained is 7.9217, shows that the image encryption method described in the present invention can be good at resisting the Analysis of Entropy.

Claims (2)

1. based on the gray level image encryption method that two-dimentional Henon maps, it is characterized in that, the concrete implementation step of the method comprises scramble and diffusion two processes, as follows:
(1) scramble
Step 1, determines whether original-gray image is square-shaped image, if not square-shaped image, then this original-gray image is expanded to square-shaped image, and using the image after expansion as original-gray image, be designated as P, its size is N × N number of pixel; Wherein, N is positive integer;
Step 2, setting image scrambling number of times is the parameter a of L and Henon mapping, the value of b, and the expression formula that Henon maps is as follows:
x ′ = 1 - ax 2 + y mod N y ′ = x + b mod N - - - ( 1 )
Wherein, the span of L is the integer between 2 ~ 10; The span of a is 1 ~ 2 128between integer, and to get rid of be wherein the number of the multiple of N; The span of b is 0 ~ 2 128between integer; (x, y) is the point coordinate in original image P, and x, y ∈ 0,1,2 ..., N-1}; (x', y') is (x, y) point coordinate after Henon mapping transformation, the point coordinate namely in ciphertext graph picture, and x', y' ∈ 0,1,2 ..., N-1};
Step 3, the Henon mapping pair original image P in step 2 is utilized to carry out scramble, the method that scramble is 1 time is: by original image P mid point (x, y) gray-scale value that place's pixel is corresponding moves to the point (x' after Henon mapping transformation, y') place, thus obtain a width scramble once after image;
Step 4, using the image after scramble 1 time as original image repeated execution of steps 3, until scramble number of times reaches the L preset, thus the scramble image after obtaining scramble L time, be designated as P ';
(2) spread
Step 1, extracts the picture element matrix of scramble image P ', and the picture element matrix of two dimension is converted to the pixel sequence A of one dimension according to order from top to bottom from left to right 1, A 2..., A m, M=N 2, M is the total number of pixel, and N is the number that original image is extended to horizontal direction after square chart picture or vertical direction pixel;
Step 2, makes x 0=A 1, y 0=A 2, wherein A 1for the 1st pixel value of scramble image P ', A 2for the 2nd pixel value of scramble image P ', x 0and y 0two original states of Henon mapping respectively, then parameter is a 1, b 1henon map according to formula (1) iteration t 1secondary, produce two final states make the 1st pixel value C of ciphertext graph picture 1for 2nd pixel value C of ciphertext graph picture 2for
Step 3: make x 0=(A 3+ C 1) mod256, y 0=(A 4+ C 2) mod256, wherein A 3for the 3rd pixel value of scramble image P ', A 4for the 4th pixel value of scramble image P ', x 0and y 0two original states of Henon mapping respectively, then parameter is a 2, b 2henon map according to formula (1) iteration t 2secondary, produce two final states make the 3rd pixel value C of ciphertext graph picture 3for 4th pixel value C of ciphertext graph picture 4for
Continue by that analogy to perform, until make x 0=(A m-1+ C m-3) mod256, y 0=(A m+ C m-2) mod256, wherein A m-1for M-1 the pixel value of scramble image P ', A mfor M the pixel value of scramble image P ', x 0and y 0two original states of Henon mapping respectively, then parameter is a m/2, b m/2henon map according to formula (1) iteration t m/2secondary, produce two final states make M-1 pixel value C of ciphertext graph picture m-1for m pixel value C of ciphertext graph picture mfor
The parameter a that above-mentioned Henon maps 1, b 1, a 2, b 2..., a m/2, b m/2, and the iterations t that Henon maps 1, t 2..., t m/2produce by pseudo-random sequence generator, parameter a 1, b 1, a 2, b 2..., a m/2, b m/2span be 1 ~ 2 128between integer, iterations t 1, t 2..., t m/2span 2 ~ 10 between integer;
By the M of ciphertext graph picture pixel value C 1, C 2..., C mjust final ciphertext graph picture is obtained after being converted to the two-dimensional pixel matrix of N × N.
2. a kind of gray level image encryption method mapped based on two-dimentional Henon according to claim 1, if scramble and the diffusion process of wanting to obtain that better cipher round results and higher security can carry out many wheels.
CN201510477482.4A 2015-08-06 2015-08-06 Gray image encryption method based on two-dimension Henon mapping Pending CN105118017A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510477482.4A CN105118017A (en) 2015-08-06 2015-08-06 Gray image encryption method based on two-dimension Henon mapping

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510477482.4A CN105118017A (en) 2015-08-06 2015-08-06 Gray image encryption method based on two-dimension Henon mapping

Publications (1)

Publication Number Publication Date
CN105118017A true CN105118017A (en) 2015-12-02

Family

ID=54665992

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510477482.4A Pending CN105118017A (en) 2015-08-06 2015-08-06 Gray image encryption method based on two-dimension Henon mapping

Country Status (1)

Country Link
CN (1) CN105118017A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108021815A (en) * 2017-12-04 2018-05-11 河海大学 Image encryption method, device and electronic equipment
CN108199828A (en) * 2018-02-08 2018-06-22 广东工业大学 A kind of color image Encryption Algorithm and device
CN108629724A (en) * 2017-03-16 2018-10-09 湖南工程学院 A kind of new three-dimensional map is as encryption method
CN111479032A (en) * 2020-03-19 2020-07-31 哈尔滨工业大学(深圳)(哈尔滨工业大学深圳科技创新研究院) Color image encryption method, device and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103442157A (en) * 2013-09-04 2013-12-11 上海理工大学 Image encryption method based on Arnold transformations and Henon chaotic system
CN103971320A (en) * 2014-04-25 2014-08-06 河海大学 Image scrambling and restoring method based on Henon mapping

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103442157A (en) * 2013-09-04 2013-12-11 上海理工大学 Image encryption method based on Arnold transformations and Henon chaotic system
CN103971320A (en) * 2014-04-25 2014-08-06 河海大学 Image scrambling and restoring method based on Henon mapping

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ROHIT JOSHI 等: "Color Image Encryption using Novel Blackjack based Scrambling Scheme", 《IEEE XPLORE》 *
平萍 等: "一种基于Henon映射的图像加密算法的分析及改进", 《南京理工大学学报》 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108629724A (en) * 2017-03-16 2018-10-09 湖南工程学院 A kind of new three-dimensional map is as encryption method
CN108629724B (en) * 2017-03-16 2021-07-06 湖南工程学院 Novel three-dimensional mapping image encryption method
CN108021815A (en) * 2017-12-04 2018-05-11 河海大学 Image encryption method, device and electronic equipment
CN108021815B (en) * 2017-12-04 2020-04-14 河海大学 Image encryption method and device and electronic equipment
CN108199828A (en) * 2018-02-08 2018-06-22 广东工业大学 A kind of color image Encryption Algorithm and device
CN108199828B (en) * 2018-02-08 2021-10-01 广东工业大学 Method and device for encrypting color picture
CN111479032A (en) * 2020-03-19 2020-07-31 哈尔滨工业大学(深圳)(哈尔滨工业大学深圳科技创新研究院) Color image encryption method, device and storage medium
CN111479032B (en) * 2020-03-19 2022-05-31 哈尔滨工业大学(深圳)(哈尔滨工业大学深圳科技创新研究院) Color image encryption method, device and storage medium

Similar Documents

Publication Publication Date Title
Xian et al. Fractal sorting matrix and its application on chaotic image encryption
Chai et al. A fast chaos-based image encryption scheme with a novel plain image-related swapping block permutation and block diffusion
Zhu et al. A chaos-based symmetric image encryption scheme using a bit-level permutation
CN102693523B (en) Image two-grade encrypting method based on double-chaos system
Huang et al. Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system
Li et al. Chaotic image encryption using pseudo-random masks and pixel mapping
CN101739695A (en) Three-dimensional Arnold mapping-based image grouping encryption method
CN106339976A (en) Encryption method
CN103491279B (en) The 4-neighborhood XOR image encryption method of Hyperchaotic Lorenz system
CN107239708A (en) It is a kind of that the image encryption method converted with score field is mapped based on quantum chaos
CN107330338B (en) Color image encryption and decryption method and system based on double-chaos cross diffusion
CN107590394B (en) A kind of image encryption method based on chaotic maps and bit recombination
Wen et al. Triple-image bit-level encryption algorithm based on double cross 2D hyperchaotic map
CN107094072A (en) A kind of mixed chaos encryption method based on general Henon Map
Zhang et al. Color image encryption based on paired interpermuting planes
CN105118017A (en) Gray image encryption method based on two-dimension Henon mapping
CN109981921A (en) A kind of mixed chaos virtual optics image encryption method
CN106709854A (en) Cat mapping and chaos based image information fusion and encryption method
CN107911572A (en) The image encryption method of logistic chaos system is improved based on fractional fourier transform
CN107481180A (en) The image encryption method perceived based on cellular automata and splits' positions
CN104050617B (en) Image encryption method based on Liu chaos systems
CN106127669B (en) Based on the New chaotic image encryption method for protecting area B aker mapping
Yi et al. An algorithm of image encryption based on AES & Rossler hyperchaotic modeling
CN118250403B (en) Image encryption algorithm based on improved Hilbert scrambling
Philip An enhanced chaotic image encryption

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20151202

RJ01 Rejection of invention patent application after publication