CN105118017A - Gray image encryption method based on two-dimension Henon mapping - Google Patents
Gray image encryption method based on two-dimension Henon mapping Download PDFInfo
- Publication number
- CN105118017A CN105118017A CN201510477482.4A CN201510477482A CN105118017A CN 105118017 A CN105118017 A CN 105118017A CN 201510477482 A CN201510477482 A CN 201510477482A CN 105118017 A CN105118017 A CN 105118017A
- Authority
- CN
- China
- Prior art keywords
- image
- scramble
- henon
- pixel value
- original
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Facsimile Transmission Control (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
The invention discloses a gray image encryption method based on two-dimension Henon mapping. The method comprises two processes of scrambling and diffusion. During a scrambling process, the two-dimension Henon mapping is used to realize changes of a pixel position so that correlation of the position and a gray level is eliminated. During a diffusion process, the two-dimension Henon mapping is used to change a gray value of the pixel so that a ciphertext is sensitive to a plaintext. The method of the invention has the following advantage that during two processes of the scrambling and the diffusion of gray image encryption, the two-dimension Henon mapping is used so that the gray image encryption can be high-efficiently and conveniently completed and simultaneously high safety is possessed.
Description
Technical field
The present invention relates to a kind of gray level image encryption method mapped based on two-dimentional Henon, belong to the image security technology in information security field.
Background technology
Image is the important means of mankind's obtaining informations, expressing information and transmission of information.Along with the fast development of internet and multimedia technology, more and more image can be issued quickly and easily and transmit on network.Some images relating to individual privacy, trade secret or state secret are just easy to be browsed easily by malicious attacker, steal, alter, bootlegging and propagation; if do not take necessary safety precautions to these images, the serious consequence brought thus is immeasurable.Thus, the core technology that image encryption is protected as safety of image, its application is more and more extensive, and its requirement is also more and more high.Different from text message, image has that data volume is large, redundance is high, the features such as correlativity is strong between neighbor, as good in although DES, AES possess the obscuring and diffusion property of some traditional symmetric encipherment algorithms, but the efficiency that seems when image data processing is not high, effect is undesirable, these problems propose new challenge to image encryption, and we are in the urgent need to researching and developing out the encryption method of how applicable image own characteristic.
From pertinent literature both domestic and external, the method for digital image encryption can be divided three classes: based on the image encryption method of scramble, based on the image encryption method of diffusion and the image encryption method based on scramble-diffusion.Research shows, the image encryption method based on scramble-diffusion can provide higher security than first two method, but complexity is higher than first two method.
Summary of the invention
Goal of the invention: for problems of the prior art, the invention provides a kind of gray level image encryption method mapped based on two-dimentional Henon, the scramble that the method is encrypted at gray level image all adopts two-dimentional Henon to map with spreading in two processes, efficiently can complete gray level image encryption expediently, there is higher security simultaneously.
Technical scheme: a kind of gray level image encryption method mapped based on two-dimentional Henon, the concrete implementation step of the method comprises scramble and diffusion two processes, as follows:
(1) scrambling process
Step 1, determines whether original-gray image is square-shaped image, if not square-shaped image, then this original-gray image is expanded to square-shaped image, and using the image after expansion as original-gray image, be designated as P, its size is N × N number of pixel; Wherein, N is positive integer;
Step 2, setting image scrambling number of times is the parameter a of L and Henon mapping, the value of b is respectively a
0, b
0, the expression formula that Henon maps is as follows:
Wherein, the span of L is the integer between 2 ~ 10; The span of a is 1 ~ 2
128between integer, and to get rid of be wherein the number of the multiple of N; The span of b is 0 ~ 2
128between integer; (x, y) is the point coordinate in original image P, and x, y ∈ 0,1,2 ..., N-1}; (x', y') is (x, y) point coordinate after Henon mapping transformation, the point coordinate namely in ciphertext graph picture, and x', y' ∈ 0,1,2 ..., N-1};
Step 3, the Henon mapping pair original image P in step 2 is utilized to carry out scramble, the method that scramble is 1 time is: by original image P mid point (x, y) gray-scale value that place's pixel is corresponding moves to the point (x' after Henon mapping transformation, y') place, thus obtain a width scramble once after image;
Step 4, using the image after scramble 1 time as original image repeated execution of steps 3, until scramble number of times reaches the L preset, thus the scramble image after obtaining scramble L time, be designated as P ';
(2) diffusion process
Step 1, extracts the picture element matrix of scramble image P ', and the picture element matrix of two dimension is converted to the pixel sequence A of one dimension according to order from top to bottom from left to right
1, A
2..., A
m, M=N
2, M is the total number of pixel, and N is the number that original image is extended to horizontal direction after square chart picture or vertical direction pixel;
Step 2, makes x
0=A
1, y
0=A
2, wherein A
1for the 1st pixel value of scramble image P ', A
2for the 2nd pixel value of scramble image P ', x
0and y
0two original states of Henon mapping respectively, then parameter is a
1, b
1henon map according to formula (1) iteration t
1secondary, produce two final states
make the 1st pixel value C of ciphertext graph picture
1for
2nd pixel value C of ciphertext graph picture
2for
Step 3: make x
0=(A
3+ C
1) mod256, y
0=(A
4+ C
2) mod256, wherein A
3for the 3rd pixel value of scramble image P ', A
4for the 4th pixel value of scramble image P ', x
0and y
0two original states of Henon mapping respectively, then parameter is a
2, b
2henon map according to formula (1) iteration t
2secondary, produce two final states
make the 3rd pixel value C of ciphertext graph picture
3for
4th pixel value C of ciphertext graph picture
4for
Continue by that analogy to perform, until make x
0=(A
m-1+ C
m-3) mod256, y
0=(A
m+ C
m-2) mod256, wherein A
m-1for M-1 the pixel value of scramble image P ', A
mfor M the pixel value of scramble image P ', x
0and y
0two original states of Henon mapping respectively, then parameter is a
m/2, b
m/2henon map according to formula (1) iteration t
m/2secondary, produce two final states
make M-1 pixel value C of ciphertext graph picture
m-1for
m pixel value C of ciphertext graph picture
mfor
The parameter a that above-mentioned Henon maps
1, b
1, a
2, b
2..., a
m/2, b
m/2, and the iterations t that Henon maps
1, t
2..., t
m/2produce by pseudo-random sequence generator, parameter a
1, b
1, a
2, b
2..., a
m/2, b
m/2span be 1 ~ 2
128between integer, iterations t
1, t
2..., t
m/2span 2 ~ 10 between integer;
By the M of ciphertext graph picture pixel value C
1, C
2..., C
mjust final ciphertext graph picture is obtained after being converted to the two-dimensional pixel matrix of N × N; If want to obtain scramble and diffusion process that better cipher round results and higher security can carry out many wheels.
The present invention adopts above technical scheme compared with prior art, all adopts two-dimentional Henon to map, efficiently can complete gray level image encryption expediently, have higher security simultaneously in the scramble and diffusion two processes of gray level image encryption.
Accompanying drawing explanation
Fig. 1 is original image;
Fig. 2 is ciphertext graph picture;
Fig. 3 is the histogram of original image;
Fig. 4 is the histogram of ciphertext graph picture.
Embodiment
Below in conjunction with specific embodiment, illustrate the present invention further, these embodiments should be understood only be not used in for illustration of the present invention and limit the scope of the invention, after having read the present invention, the amendment of those skilled in the art to the various equivalent form of value of the present invention has all fallen within the application's claims limited range.
This specific embodiment adopts Mathematica8 software to emulate, original image select size be 256 × 256 standard testing gray level image Lena, each pixel of image is made up of 8 bits, as shown in Figure 1.
Be encrypted Lena gray level image, its detailed process is as follows:
(1) scramble
Step 1, original-gray image Lena is square-shaped image, meets the demands, and is designated as P, wherein N=256;
Step 2, the expression formulas that setting image scrambling number of times is the parameter a of L=3 and Henon mapping, the value of b is respectively 53,170, Henon mappings are as follows:
Wherein, (x, y) is the point coordinate in original image P, and x, y ∈ 0,1,2 ..., 255}; (x', y') is (x, y) point coordinate after Henon mapping transformation, the point coordinate namely in ciphertext graph picture, and x', y' ∈ 0,1,2 ..., 255};
Step 3, the Henon mapping pair original image P in step 2 is utilized to carry out scramble, the method that scramble is 1 time is: by original image P mid point (x, y) gray-scale value that place's pixel is corresponding moves to the point (x' after Henon mapping transformation, y') place, thus obtain a width scramble once after image;
Step 4, using the image after scramble 1 time as original image repeated execution of steps 3, until scramble number of times reaches the L=3 preset, thus the scramble image after obtaining scramble 3 times, be designated as P ';
(2) spread
Step 1, extracts the picture element matrix of scramble image P ', and the picture element matrix of two dimension is converted to the pixel sequence A of one dimension according to order from top to bottom from left to right
1, A
2..., A
65536;
Step 2, makes x
0=A
1, y
0=A
2, wherein A
1for the 1st pixel value of scramble image P ', A
2for the 2nd pixel value of scramble image P ', x
0and y
0two original states of Henon mapping respectively, then parameter is a
1, b
1henon map according to formula (1) iteration t
1secondary, produce two final states
make the 1st pixel value C of ciphertext graph picture
1for
2nd pixel value C of ciphertext graph picture
2for
Step 3: make x
0=(A
3+ C
1) mod256, y
0=(A
4+ C
2) mod256, wherein A
3for the 3rd pixel value of scramble image P ', A
4for the 4th pixel value of scramble image P ', x
0and y
0two original states of Henon mapping respectively, then parameter is a
2, b
2henon map according to formula (1) iteration t
2secondary, produce two final states
make the 3rd pixel value C of ciphertext graph picture
3for
4th pixel value C of ciphertext graph picture
4for
Continue by that analogy to perform, until make x
0=(A
65535+ C
65533) mod256, y
0=(A
65536+ C
65534) mod256, wherein A
65535for the 65535th pixel value of scramble image P ', A
65536for the 65536th pixel value of scramble image P ', x
0and y
0two original states of Henon mapping respectively, then parameter is a
32768, b
32768henon map according to formula (1) iteration t
32768secondary, produce two final state x
t32768, y
t32768, make the 65535th pixel value C of ciphertext graph picture
65535for x
t32768, the 65536th pixel value C of ciphertext graph picture
65536for y
t32768;
The parameter a that above-mentioned Henon maps
1, b
1, a
2, b
2..., a
32768, b
32768, and the iterations t that Henon maps
1, t
2..., t
32768produce by pseudo-random sequence generator, parameter a
1, b
1, a
2, b
2..., a
32768, b
32768span be 1 ~ 2
128between integer, iterations t
1, t
2..., t
32768span 2 ~ 10 between integer;
By 65536 of ciphertext graph picture pixel value C
1, C
2..., C
65536just ciphertext graph picture is obtained, as shown in Figure 2 after being converted to the two-dimensional pixel matrix of 256 × 256;
Below in conjunction with accompanying drawing, performance evaluation is carried out to embodiment:
1, histogram analysis
Histogram is objectively responding of image information statistical law, and a good resume image should make ciphertext graph picture statistically can not provide any useful information.More satisfactory state is that the uneven distribution of original image pixels value is become being uniformly distributed of pixel value by ciphering process, makes the probability of ciphertext pixel value in whole spatial dimension impartial.Fig. 3 is the histogram of expressly gray level image Fig. 1, Fig. 4 is the histogram of ciphertext graph as Fig. 2, contrast can be found out, the histogram of ciphertext graph picture is from expressly image is completely different, its histogram distribution is smooth and distribute uniformly, and this shows the attack that the inventive method effectively can be resisted Corpus--based Method and analyzed.
2, correlation analysis
In digital picture, the correlativity of neighbor is usually very high, and one of target of image encryption is exactly reduce the correlativity of neighbor.In order to analyze the correlativity of neighbor, first in the horizontal direction, vertical direction and to respectively Stochastic choice 20000 pairs of neighbors on angular direction, then the related coefficient γ on three directions is calculated according to formula (2)-(5)
xy.
Wherein, x and y represents the pixel value of adjacent 2 pixels in image respectively.Table 1 is depicted as the related coefficient before and after encryption on three directions, the neighbor height correlation of visible original image, related coefficient is close to 1, and after encryption, neighbor related coefficient is close to 0, and statistical information is expressly diffused into random ciphertext well and has suffered.
Table 1
3, the Analysis of Entropy
Image information entropy is a kind of statistical form of feature, it reflects the number of average information in image.The one dimension entropy of image represents the quantity of information that in image, the aggregation characteristic of intensity profile comprises makes p
irepresent the ratio of gray-scale value shared by the pixel of i in image, then the unitary gray level entropy defining gray level image is:
The one dimension entropy of image can represent the aggregation characteristic that gradation of image distributes, and the value of image information entropy, more close to 8, illustrates that cipher round results is better.The information entropy of the present invention being encrypted to rear image is tested, and testing the result obtained is 7.9217, shows that the image encryption method described in the present invention can be good at resisting the Analysis of Entropy.
Claims (2)
1. based on the gray level image encryption method that two-dimentional Henon maps, it is characterized in that, the concrete implementation step of the method comprises scramble and diffusion two processes, as follows:
(1) scramble
Step 1, determines whether original-gray image is square-shaped image, if not square-shaped image, then this original-gray image is expanded to square-shaped image, and using the image after expansion as original-gray image, be designated as P, its size is N × N number of pixel; Wherein, N is positive integer;
Step 2, setting image scrambling number of times is the parameter a of L and Henon mapping, the value of b, and the expression formula that Henon maps is as follows:
Wherein, the span of L is the integer between 2 ~ 10; The span of a is 1 ~ 2
128between integer, and to get rid of be wherein the number of the multiple of N; The span of b is 0 ~ 2
128between integer; (x, y) is the point coordinate in original image P, and x, y ∈ 0,1,2 ..., N-1}; (x', y') is (x, y) point coordinate after Henon mapping transformation, the point coordinate namely in ciphertext graph picture, and x', y' ∈ 0,1,2 ..., N-1};
Step 3, the Henon mapping pair original image P in step 2 is utilized to carry out scramble, the method that scramble is 1 time is: by original image P mid point (x, y) gray-scale value that place's pixel is corresponding moves to the point (x' after Henon mapping transformation, y') place, thus obtain a width scramble once after image;
Step 4, using the image after scramble 1 time as original image repeated execution of steps 3, until scramble number of times reaches the L preset, thus the scramble image after obtaining scramble L time, be designated as P ';
(2) spread
Step 1, extracts the picture element matrix of scramble image P ', and the picture element matrix of two dimension is converted to the pixel sequence A of one dimension according to order from top to bottom from left to right
1, A
2..., A
m, M=N
2, M is the total number of pixel, and N is the number that original image is extended to horizontal direction after square chart picture or vertical direction pixel;
Step 2, makes x
0=A
1, y
0=A
2, wherein A
1for the 1st pixel value of scramble image P ', A
2for the 2nd pixel value of scramble image P ', x
0and y
0two original states of Henon mapping respectively, then parameter is a
1, b
1henon map according to formula (1) iteration t
1secondary, produce two final states
make the 1st pixel value C of ciphertext graph picture
1for
2nd pixel value C of ciphertext graph picture
2for
Step 3: make x
0=(A
3+ C
1) mod256, y
0=(A
4+ C
2) mod256, wherein A
3for the 3rd pixel value of scramble image P ', A
4for the 4th pixel value of scramble image P ', x
0and y
0two original states of Henon mapping respectively, then parameter is a
2, b
2henon map according to formula (1) iteration t
2secondary, produce two final states
make the 3rd pixel value C of ciphertext graph picture
3for
4th pixel value C of ciphertext graph picture
4for
Continue by that analogy to perform, until make x
0=(A
m-1+ C
m-3) mod256, y
0=(A
m+ C
m-2) mod256, wherein A
m-1for M-1 the pixel value of scramble image P ', A
mfor M the pixel value of scramble image P ', x
0and y
0two original states of Henon mapping respectively, then parameter is a
m/2, b
m/2henon map according to formula (1) iteration t
m/2secondary, produce two final states
make M-1 pixel value C of ciphertext graph picture
m-1for
m pixel value C of ciphertext graph picture
mfor
The parameter a that above-mentioned Henon maps
1, b
1, a
2, b
2..., a
m/2, b
m/2, and the iterations t that Henon maps
1, t
2..., t
m/2produce by pseudo-random sequence generator, parameter a
1, b
1, a
2, b
2..., a
m/2, b
m/2span be 1 ~ 2
128between integer, iterations t
1, t
2..., t
m/2span 2 ~ 10 between integer;
By the M of ciphertext graph picture pixel value C
1, C
2..., C
mjust final ciphertext graph picture is obtained after being converted to the two-dimensional pixel matrix of N × N.
2. a kind of gray level image encryption method mapped based on two-dimentional Henon according to claim 1, if scramble and the diffusion process of wanting to obtain that better cipher round results and higher security can carry out many wheels.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510477482.4A CN105118017A (en) | 2015-08-06 | 2015-08-06 | Gray image encryption method based on two-dimension Henon mapping |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510477482.4A CN105118017A (en) | 2015-08-06 | 2015-08-06 | Gray image encryption method based on two-dimension Henon mapping |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105118017A true CN105118017A (en) | 2015-12-02 |
Family
ID=54665992
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510477482.4A Pending CN105118017A (en) | 2015-08-06 | 2015-08-06 | Gray image encryption method based on two-dimension Henon mapping |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105118017A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108021815A (en) * | 2017-12-04 | 2018-05-11 | 河海大学 | Image encryption method, device and electronic equipment |
CN108199828A (en) * | 2018-02-08 | 2018-06-22 | 广东工业大学 | A kind of color image Encryption Algorithm and device |
CN108629724A (en) * | 2017-03-16 | 2018-10-09 | 湖南工程学院 | A kind of new three-dimensional map is as encryption method |
CN111479032A (en) * | 2020-03-19 | 2020-07-31 | 哈尔滨工业大学(深圳)(哈尔滨工业大学深圳科技创新研究院) | Color image encryption method, device and storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103442157A (en) * | 2013-09-04 | 2013-12-11 | 上海理工大学 | Image encryption method based on Arnold transformations and Henon chaotic system |
CN103971320A (en) * | 2014-04-25 | 2014-08-06 | 河海大学 | Image scrambling and restoring method based on Henon mapping |
-
2015
- 2015-08-06 CN CN201510477482.4A patent/CN105118017A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103442157A (en) * | 2013-09-04 | 2013-12-11 | 上海理工大学 | Image encryption method based on Arnold transformations and Henon chaotic system |
CN103971320A (en) * | 2014-04-25 | 2014-08-06 | 河海大学 | Image scrambling and restoring method based on Henon mapping |
Non-Patent Citations (2)
Title |
---|
ROHIT JOSHI 等: "Color Image Encryption using Novel Blackjack based Scrambling Scheme", 《IEEE XPLORE》 * |
平萍 等: "一种基于Henon映射的图像加密算法的分析及改进", 《南京理工大学学报》 * |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108629724A (en) * | 2017-03-16 | 2018-10-09 | 湖南工程学院 | A kind of new three-dimensional map is as encryption method |
CN108629724B (en) * | 2017-03-16 | 2021-07-06 | 湖南工程学院 | Novel three-dimensional mapping image encryption method |
CN108021815A (en) * | 2017-12-04 | 2018-05-11 | 河海大学 | Image encryption method, device and electronic equipment |
CN108021815B (en) * | 2017-12-04 | 2020-04-14 | 河海大学 | Image encryption method and device and electronic equipment |
CN108199828A (en) * | 2018-02-08 | 2018-06-22 | 广东工业大学 | A kind of color image Encryption Algorithm and device |
CN108199828B (en) * | 2018-02-08 | 2021-10-01 | 广东工业大学 | Method and device for encrypting color picture |
CN111479032A (en) * | 2020-03-19 | 2020-07-31 | 哈尔滨工业大学(深圳)(哈尔滨工业大学深圳科技创新研究院) | Color image encryption method, device and storage medium |
CN111479032B (en) * | 2020-03-19 | 2022-05-31 | 哈尔滨工业大学(深圳)(哈尔滨工业大学深圳科技创新研究院) | Color image encryption method, device and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Xian et al. | Fractal sorting matrix and its application on chaotic image encryption | |
Chai et al. | A fast chaos-based image encryption scheme with a novel plain image-related swapping block permutation and block diffusion | |
Zhu et al. | A chaos-based symmetric image encryption scheme using a bit-level permutation | |
CN102693523B (en) | Image two-grade encrypting method based on double-chaos system | |
Huang et al. | Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system | |
Li et al. | Chaotic image encryption using pseudo-random masks and pixel mapping | |
CN101739695A (en) | Three-dimensional Arnold mapping-based image grouping encryption method | |
CN106339976A (en) | Encryption method | |
CN103491279B (en) | The 4-neighborhood XOR image encryption method of Hyperchaotic Lorenz system | |
CN107239708A (en) | It is a kind of that the image encryption method converted with score field is mapped based on quantum chaos | |
CN107330338B (en) | Color image encryption and decryption method and system based on double-chaos cross diffusion | |
CN107590394B (en) | A kind of image encryption method based on chaotic maps and bit recombination | |
Wen et al. | Triple-image bit-level encryption algorithm based on double cross 2D hyperchaotic map | |
CN107094072A (en) | A kind of mixed chaos encryption method based on general Henon Map | |
Zhang et al. | Color image encryption based on paired interpermuting planes | |
CN105118017A (en) | Gray image encryption method based on two-dimension Henon mapping | |
CN109981921A (en) | A kind of mixed chaos virtual optics image encryption method | |
CN106709854A (en) | Cat mapping and chaos based image information fusion and encryption method | |
CN107911572A (en) | The image encryption method of logistic chaos system is improved based on fractional fourier transform | |
CN107481180A (en) | The image encryption method perceived based on cellular automata and splits' positions | |
CN104050617B (en) | Image encryption method based on Liu chaos systems | |
CN106127669B (en) | Based on the New chaotic image encryption method for protecting area B aker mapping | |
Yi et al. | An algorithm of image encryption based on AES & Rossler hyperchaotic modeling | |
CN118250403B (en) | Image encryption algorithm based on improved Hilbert scrambling | |
Philip | An enhanced chaotic image encryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20151202 |
|
RJ01 | Rejection of invention patent application after publication |