用户名: 密码: 验证码:
基于混沌的图像加密算法的研究及硬件实现
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着网络技术的发展和信息交换的日益频繁,信息安全问题日益突出。信息技术的发展对信息安全提出了越来越高的要求,迫切需要发展新的理论和先进的技术。对图像进行加密是保证图像信息安全的重要手段之一。现有的加密算法大多数是为保护文本信息而设计的,抗破译能力不强。所以,传统的加密算法应用于图像加密有诸多弊端,大量针对图像特点的加密方案被提出。作为新的密码技术—混沌图像加密技术已引起了国内外学者浓厚的兴趣和广泛研究。混沌是一种貌似无规则的运动,指在确定性非线性系统中,不需要附加任何随机因素亦可出现类似随机的行为内在随机性。混沌具有许多值得利用的性质,如良好的伪随机特性、轨道的不可预测性、对初始状态及结构参数的极端敏感性等一系列优良特性,这些特性与密码学的许多要求是相吻合的。图像的使用越来越广泛,因其数据量大、冗余度高,已给传统密码提出了挑战,然而混沌密码在图像信息的加密上体现了强大的优势。本文对基于混沌的图像加密技术进行了研究,主要工作如下:
     首先,本文研究了混沌的基本理论,包括混沌的概念、混沌理论的形成及其发展,混沌系统的判定和主要的度量特征,重点介绍通过Lyapunov指数来判定混沌系统的方法,并在此基础上,深入研究了常用于图像信息安全的一维、二维和三维混沌映射及其特性,并介绍了几种常见的、具有代表性的图像加密方法。
     其次,在分析现有混沌加密方案的基础上,针对传统的图像加密技术是一种基于像素置乱的加密算法,该类型的算法安全性低,本文提出了一种基于改进的logistic混沌映射的超混沌彩色图像加密算法。该算法采用改进后的logistic映射对图像进行置乱加密,采用高维混沌映射再对图像进行扩散加密。仿真结果证明了该算法安全性和加密效果良好,有较大抵抗强力攻击的密钥空间,并且加密图像像素值具有类随机均匀分布特性,相邻像素的值具有零相关特性。
     再次,针对现有的混沌加密系统都是基于置乱和扩散独立进行的,本文提出了基于置乱和扩散融合的超混沌彩色图像加密系统。先利用二维logistic混沌映射迭代产生彩色图像三基色的偏移值,再用超混沌映射对图像进行扩散加密。该算法对三基色分别加密,强化了加密图像的安全性;由于是同时进行行、列全局置乱和扩散,使得相邻像素之间的相关性更小,置乱距离更大,提高了系统的复杂性,提高了破译难度。分析和仿真实验表明,该算法具有较高的加密效率,可以有效地保障加密图像的保密性和安全性。
     最后,以DSP为硬件平台,将提出的图像加密算法在DM642平台上进行算法验证。实验结果表明提出的图像加密算法具有良好的加密效果,能够较好满足视频数据加密的要求。
With development of information technology and increasing frequency of information exchange, the research on information security engineering is becoming more and more important. Because of the rapid development of information technology, it is becoming increasingly difficult to maintain a satisfactory level of information security. New information security theory and advanced technologies are required urgently. Encryption is one of the important methods to ensure images'safety. Most encryption methods are designed for text information, and some encryptions are easily to be attacked. There are many disadvantages in traditional encryptions, and a lot of encrytions for images are put forward. As a novel technology in cryptography, digital chaotic cipher has been attracted researchers dense interest and widely studeied. Chaotic dynamical system is a deterministic system and has random-like behavior. Since it is very sensitive to the initial conditions and control parameters, a large number of uncorrelated, random-like, yet deterministic and reproducible signals can be generated easily. These properties have natural affiliations with the information security technology. Challenges have been set with traditional cryptography because of the bulk data capacity and high redundancy of widely-used patterns and multimedia information, while chaotic cipher has great superiority over the encryption of multimedia information.
     In this paper, digital image encryption algorithm based on chaos has been deeply reserached. The general organization of this paper is as below.
     First, the fundamental chaos principles are introduced, including the concept of chaos, the development, formation and measurement features of chaos, especially the method of judging the chaos system through Lyapunov index, and based on the above, the characteristics of the chaotic maps of 1D,2D and 3D have been studied deeply. And several representative encryption algorithms based on chaos theory are also introduced.
     Second, considering the security of most conventional chaos based encryption algorithm is low, to solove this problem, this paper puts forward a novel image encryption algorithm based on improved logistic chaos. The improved logistic map is used to confuse the color image, and then diffuse the confused image with a four-dimensional hyper-chaotic sequence. Simulation results demonstrate that this algorithm has good encryption effect and the key space is large enough to resist the brute-force attack. For the encrypted image, the distribution of pixel values has a random-like behavior and the values of adjacent pixels satisfy zero correlation.
     Next, since most image encryption schemes based on chaos theory have independent modules for confusion and diffusion processes, this paper proposes a new kind of image encryption alogorithm utilizing integrated confusion-diffusion mechamisms. The integration allows us to incorporate chaos into the diffusion mechanism as well, a feature lacking in the traditional diffusion mechanism. First generate three values by iterating two-dimensinal logistic maps. Then, embed the confusing mechanism into diffusion by applying hyper-chaos. The algorithm has great scrambling and diffusion capability and gurantees the security of the encrypted image effectively. It improved the complexity of the encryption system and made the system more difficult to break.
     At the end of this paper, the proposed image encryption algorithm is verified on the DSP platform. Experimental results show that the proposed image encryption algorithm has good encryption effect and can meet the requirements of the video data encryption.
引文
[1]Lorenz E.N. Deterministic non-periodic flow. J. Atmospheric Sciences,1963, 20:130-141
    [2]Tien Yien L and James Y. Period three implies chaos. American Mathematical Monthly,1975,82(10):985-992
    [3]Robert M. Simple mathematical models with very complicated dynamics. Nature, 1976,261(10):459-474
    [4]Shannon.C.E. Communication theory of secrecy system. Bell Sys. Tech. J,1949, 28(4):656-715
    [5]Matthews R. On the derivation of a chaotic encryption algorithm. Cryptologia, 1989, XIII (1):29-42
    [6]冯运波,夏光升.信息安全技术发展现状.计算机安全.2002,2:11-15
    [7]L Pecora, T Caroll. Synchronization in chaotic systems. Phys, Rev, Lett,1990, 64(8):821-824
    [8]Baptista MS. Cryptography with chaos. Physics Letter A,1999,240:50-54
    [9]T. Habutsu, Y. Nishio, I. Sasase, S. Mori. in:Proc. EuroCrypt'91,1991, p,127. J
    [10]E.Biham. Cryptanalysis of the chaotic-map cryptosystem suggested at eurocrypt. Proc. Advances in Cryptology,1991:532-534
    [11]T.L.Carroll and L.M.Pecora. Sychronizing chaotic circuits. IEEE Trans. Circuits System, Volume 38, April,1991:453-456
    [12]J.C.Yen, J.I.Guo. A new chaotic key-based design for image encryption and decryption. Proceedings IEEE International Conference on Circuits and Systems, volume 4,2000:49-52
    [13]Shujun.Li, Xuan Zheng. Cryptanalysis of a chaotic image encryption method. Scottsdale, AZ, USA,2002, Proceedings IEEE International Symposium on Circuits and Systems, volume 2,2002:708-711s
    [14]T. Stojanovski, L.Kocarev. Chaos-based random number generator part analysis. IEEE Trans Circuits and Systems,2001,48(3):281-288
    [15]J. Fridrich. Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurcation and Chaos.1998,8(6):1259-1284
    [16]G.Chen, Y.B.Mao, C.K. Chui. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons, and Fractals,2004(21):749-761
    [17]Mazleena S, Subariah I, and Ismail F I. Ciphering key of chaos image encryption. In Proc, Int, Conference on Artificial Intelligence in Engineering and Technology (ICAIET'2002),2002:58-62
    [18]Mazleena S, Subariah I, and Ismail F I. Enhanced chaotic image encryption algorithm based on Baker's map. In Proc, IEEE Int. Symposium on Circuits and Systems (ISCAS'2003),2003, volume 2:508-511
    [19]Dongxu Q, Jiancheng Z, and Xiao you H. A new class of scrambling transformation and its application in the image information covering. Science in China-Series English Edition,2000,43(3):304-312
    [20]Guan Z H, Huang F, Guan W. Chaos based image encryption algorithm. Physics Letters A,2005,346:153-157
    [21]Lian S, Sun J, Wang Z. A block cipher based on a suitable use of chaotic standard map. Chaos, Solitons and Fractals,2005,26:117-129
    [22]Tong X, Cui M. Image encryption with compound chaotic sequence cipher shifting dynamically. Image vision compute,2008,26:843-850
    [23]Vinod Patidar, N.K.Pareek, K.K.Sud. A new substitution-diffusion based image cipher using chaotic standard and logistic maps. Commun Nonlinear Sci Numer Simulat 14,2009:3056-3075
    [24]Pareek NK, Patidar Vinod, Sud KK. Image encryption using chaotic logistic map. Image Vision Comput,2006,24:926-934
    [25]F.Beldhouche, U. Qidwai. Binary image encoding using 1D chaotic maps. IEEE annual technical conference,11 April 2003:39-43
    [26]Y. Mao, G Chen. Chaos-based image encryption. Handbook of computational geometry for pattern recognition, Computer Vision, Neurocomputing and Robotics, Springer-Verlag, Berlin,2003
    [27]Pareek NK, Patidar Vinod, Sud KK. Cryptography using multiple one-dimensional chaotic maps. Commun Nonlinear Simulat,2005,10:715-723
    [28]Pareek NK, Patidar Vinod, Sud KK. Discrete chaotic cryptography using external key. Physics Letters A,2003,309:75-82
    [29]Pisarschik AN. Encryption and decryption of images with chaotic map lattices. Chaos,2006,24:926-934
    [30]Kwok HS, Tang WKS. A fast image encryption system based on chaotic maps with finite precision representation. Chaos, Solitons and Fractals,2007,32: 1518-1529
    [31]Lian S. Efficient image or video encryption based on spatiotemporal chaos system. Chaos, Solitons and Fractals,2007
    [32]Behnia S, Akhshani A, Mahmodi H, Akhavan A. A novel algorithm for image encryption based on mixture of chaotic maps. Chaos, Solitons and Fractals,2008,35: 408-419
    [33]Chan C, Cheng L. The convergence properties of a clipped Hopfield network and its application in the design of key-stream generator..IEEE Trans Neural Network, 2001,12(2):340-348
    [34]Xiao Di, Liao X, Wong KW. An efficient entire chaos-based scheme for deniable authentication. Chaos, Solitons and Fractals,2005,23:1327-1331
    [35]Peng ZN, Liu WB. Color image authentication based on spatiotemporal chaos and SVD. Chaos, Solitions and Fractals,2006,
    [36]Tieming Chen, Jiamei Cai. A novel remote user authentication scheme using interacting neural network. Lecture notes in computer science, Volume 3610, Berlin, Springer,2005:1117-1120
    [37]Scott S, Alvin L, and Juicheng Y. Design and realization of a new chaotic neural encryption/decryption network. In Proc, IEEE Asia-Pacific Conference on Circuits and Systems (APCCAS'2000),2000:335-338
    [38]Juicheng Y, Jiun-in G. The design and realization of a chaotic neural signal security system. Pattern Recognition and Image Analysis (Advances in Mathematical Theory and Applications),2002,12(1):70-79
    [39]Grebogi C, Ott E, Yorke A. Roundoff-induced periodicity and the correlation dimension of chaotic attractors. Phys Rev A,1988,38:3688-3692
    [40]Bastolla U, Parisi G. Attraction basins in discretized maps. Physics Letters A, 1997,30:3757-3769
    [41]Wang SH, Liu WR, Lu HP, Kuang JY, Hu G. Periodicity of chaotic trajectories of single and coupled maps in realizations of finite computer precisions. Int J Mod Phys B,2004,18:2617-2622
    [42]Tang G, Wang S, Lu H, Hu G. Chaos-based cryptography incorporated with S-box algebraic operation. Physics Letters A,2003,318:388-398
    [43]C.X..Zhu, Z.G.Chen,W.W.Ouyang,J. Cent, Southuniversity,2006:1137-1142
    [44]Z.J.Sun, Y.Chen. China Academic Journal Electronic Publishing House, Mircroprocessors,2007:43-49
    [45]Z.J.Sun, Y.Chen, Y.X.Wang, X.F.Liao. China Academic Journal Electronic Publishing House, Computer Engineering and Design,2007:3328-3328
    [46]C.K.Huang, H.H.Nien. Multi chaotic systems based pixel shuffle for image encryption. Optics Communications,2009,6,
    [47]Wong WK, Lee LP. A modified chaotic cryptographic method. Computer Physics Communication,2001,138:234-236
    [48]易开祥,孙鑫,石教英.一种基于混沌序列的图像加密算法.计算机辅助设计与图形学学报,2000,12(9):672-676
    [49]邓浩,华一满,倪皖荪.混沌伪随机序列和数字语音保密通信.通信学报,1999,20(4):29-35
    [50]丁玮.数字图像信息安全的算法研究.北京中科院计算机研究所,2000,5
    [51]王新成.高级图形处理技术.中国科学技术出版社,2000:119-152
    [52]丁玮,齐东旭.数字图像变换及信息隐藏与伪装技术.计算机学报,1998,12(9):838-843
    [53 Josef Scharinger. Fast encryption of image data using chaotic kolmogorov flows. SPIE,1997,3022:278-289
    [54]李国富,宋瑞霞.椭圆曲线在数字图像隐藏中的应用.北方工业大学学报,2000,12(3):17-20
    [55]邹建成,李国富,齐东旭.广义Gray码及其在数字图像置乱中的应用.高校应用数学学报,2002,17(3):363-370
    [56]丁玮,闰伟齐,齐东旭.基于Arnold变换的数字图像置乱技术.计算机辅助设计与图形学学报,2001,13(4):338-341
    [57]Short KM. Signal extraction from chaotic communication. Int J Bifurcat Chaos, 1997,7(7):1579-1597
    [58]Wheeler DD. Problems with chaotic cryptosystems. Cryptologia,1989, (3): 243-250
    [59]Zhang S, Xiao X C. Prediction of chaotic time series by using adaptive higher-order nonlinear fourier infrared filter. Acta Physica Sinica,2000,49(7): 1221-1227
    [60]Kachris C, Bourbakis N, Dollas A. A reconfigurable logic-based processor for the SCAN image and video encryption algorithm. International Journal of Parallel Programming,2003,31(6):489-506
    [61]唐巍,李殿璞,陈学允.混沌理论及其应用研究.电力系统自动化.2000:67-70
    [62]黄润生,黄浩.混沌理论及其应用.武汉大学出版社.2005,11
    [63]R.L.Devancy, K.Josic and Y.Shapiro. Singular Perturbations of Quadratic Maps. International Journal of Bifurcations and Chaos.2004, (14):161-169
    [64]Roland Schmitz. Use of chaotic dynamical systems in cryptography. Journal of the Franklin Institute,2001, (338):429-441
    [65]Kohda, T, Tsuneda. A statistics of chaotic binary sequences. IEEE Transaction on Information Theory,1997,43(1):101-112
    [66]Shi Weifeng. Research on Logistic Map and Its Chaotic Characteristics. Journal, Electro-optic Technology Application, China,2004, (2):53-56
    [67]王改云,马姝靓.典型混沌系统的Matlab仿真实现.中国科技信息,2008,3:252-253
    [68]C.H. Tao, C. D. Yang. Three control strategies for the Lorenz chaotic system. Chaos, Solitons and Fractals,2008,35(5):1009-1014
    [69]王英,郑德玲,鞠磊.基于Lorenz混沌系统的数字图像加密算法.北京科技大学学报,2004,26(12):678-682
    [70]O.E.Rossler. Physics Letters A,1979,71,155
    [71]卢振泰,黎罗罗.一种新的衡量图像置乱程度的方法.中山大学学报(自然科学版),2005,44(6):126-129
    [72]李敏,费耀平.基于队列变换的数字图像置乱算法.计算机工程,2005,31(1):148-150
    [73]眭新光,罗慧.基于S盒的数字图像置乱技术.中国图像图形学报,2004,9(10):1223-1227
    [74]刘尚懿,王丽君.一种基于混沌全排列的图像置乱算法.鞍山科技大学学报,2005,28(5):356-359
    [75]刘云江,刘向东,王光兴.一类改进型基于混沌的图像置乱网络设计.中国图象图形学报,2004,9(3):360-364
    [76]秦红磊,郝燕玲,孙枫.一种基于混沌的图像置乱网络的设计.计算机工程与应用,2002,(7):104-106
    [77]Yaobin M, Guanrong C, and Shiguo L. A novel fast image encryption scheme based on 3D chaotic Baker maps. Int. J. Bifurcation and Chaos,2003,6
    [78]Guanrong C, Yaobin M, and Charles K.C. A symmetric image encryption scheme based on 3D cat maps. Chaos, Solitions and Fractals,2004,21(3):749-761
    [79]赵学峰.基于面包师变换的数字图像置乱.西北师范大学学报(自然科学版),2003,31(10):177-179
    [80]郭蔚,马辉.正交变换在图像置乱中的应用.微电子学与计算机,2003,41(4):470-473
    [81]邹建成,唐旭晖,李国富.数字图像的仿射模变换及其周期性.北方工业大学学报.2000,12(3):13-17
    [82]Freeman J, Dyson and Harold Falk. Period of a Discrete Cat Mapping.
    [83]李国富.基于正交拉丁方的数字图像置乱方法.北方工业大学学报,2001,13(1):14-17
    [84]王冬梅.奇数阶幻方变换数字图像的准周期.浙江工业大学学报,2005,03
    [85]张连俊.图像混沌加密技术分析.现代情报,2005,08
    [86]Linhua Zhang, Xiaofeng Liao. Xucbing Wang. An image encryption approach based on chaotic maps. Chaos, Solitons and Fractals,2005(24):759-765
    [87]Kai Wang, Wenjiang Pei, Liuhua Zou, Aiguo Song, Zhenya He. On the security of 3D Cat map based symmetric image encryption scheme. Physics Letters A, 2005(343):432-439
    [88]Shiguo Lian, Jinsheng Sun, Zhiquan Wang. Security analysis of a chaos-based image encryption. Physica A,2005(351):645-661
    [89]K.Satish. T, Jayakar, Charlcs Tobin, K. Madhavi et al. Chaos Based Spread Spectrum Image Steganography. IEEE Transactions on Consumer Electronics,50(2), 2004:587-590
    [90]孙世良.基于混沌理论的密码技术(硕士学位论文).哈尔滨工程大学,2006
    [91]饶妮妮.一种数字化混沌扩频序列发生器的设计.电子与信息学报,2002,24(5):702-706
    [92]Chunming Tang, Diangyi Pei, Zhoujun Liu, et al. Non-interactive and information-theoretic secure publicly verifiable secret sharing.2007:1-12
    [93]Pang Liaojun, Zhan Yang, Wang Yumin. Threshold secret sharing scheme based on ECC and its security. Journal of Xidian University,2006,33(4):572-575
    [94]V.S. Udaltsov, J.P. Goedgebuer, L. Larger, et al. Opt,Spectrosc,2003(95),114.
    [95]S. Yanchuk, T. Kapitaniak. Phys. Rev. E,2001(64):56-235
    [96]Qi G Y, Du S Z, Chen G R et al. On a four-dimensional chaotic system. Chaos, Solitons and Fractals,2005,23:1671-1682
    [97]Qi GuoYuan, Chen GuanRong. Analysis and circuit implementation of a new 4D chaotic system. Physica A,2006,352:386-397
    [98]PISARCHIK A N, ZANIN M. Image encryption with chaotically coupled chaotic maps. Physics Letters,2008(372):2645-2652
    [99]GAO Tiegang, CHEN Zengqiang. Image encryption based on a new total shuffling algorithm. Chaos, Solitons and Fractals,2008(38):213-220
    [100]SUN Fuyan, LIU Shutang, LIU Zhongqin, et al. A novel image encryption scheme based on a spatial chaos map. Chaos, Solitons and Fractals,2008(38): 631-640
    [101]HUANG Chuan-kuei, NIEN Hsiau-hsian, CHANG Shih-kuen, et al. Image encryption with chaotic random codes by grey relational grade and Taguchi method. Optics Communication,2007(280):300-310
    [102]BU Shou-liang, WANG Bing-hong. Improving the security of chaotic encryption by using a simple modulating method. Chaos, Solitons and Fractals, 2007(19):919-924
    [103]Zhanybai T, Zhusubaliyev, Erik Mosekilde. Multilayered tori in a system of two coupled logistc maps. Physics Letters A,2009(373):946-951
    [104]Takens F. Detecting strange attractors in turbulence. Lect. Notes in Math,1981, 898:366-381
    [105]Eckmann J P. Roads to turbulence in dissipative dynamics system. Rev. Mod, Phys,1981,53:643-649
    [106]WANG Xing-Yuan, LUO Chao. Dynamic Analysis of the Coupled Logistic Map. Journal of Software, Volume 17, Number 4, April,2006:729-739
    [107]Sakaguchi H, Tomita K. Bifurcation of the Couple Logistic Map. Progress of Theoretical Physics,1987,78(2):305-309
    [108]王兴元,朱伟勇,二维Logistic映象的吸引子演化.东北大学学报(自然科学版),1997,18(4):417-420

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700