网络与信息安全学报 ›› 2022, Vol. 8 ›› Issue (5): 88-97.doi: 10.11959/j.issn.2096-109x.2022058
杨宇光, 曹国栋
修回日期:
2022-05-12
出版日期:
2022-10-15
发布日期:
2022-10-01
作者简介:
杨宇光(1976- ),女,河北衡水人,北京工业大学教授、博士生导师,主要研究方向为信息安全基金资助:
Yuguang YANG, Guodong CAO
Revised:
2022-05-12
Online:
2022-10-15
Published:
2022-10-01
Supported by:
摘要:
图像加密技术在当今多媒体应用和互联网信息安全传输中发挥着重要作用,但存在一些问题。多数图像加密算法存在密文图像在传输过程中占用带宽较高、图像加密速度慢、图像加密算法没有与明文关联、没有完备密文反馈机制等问题,这些问题影响着图像加密算法的安全性和易用性。为了解决上述问题,对压缩感知技术和混沌系统进行了研究,提出了一种新的基于双混沌系统和压缩感知的明文关联的图像加密算法。采用明文图像关联密钥,将明文图像哈希值与Logistic混沌系统参数进行关联;采用离散小波变换对明文图像进行稀疏处理;通过Logistic混沌系统生成随机测量矩阵,结合压缩感知技术和随机测量矩阵对图像进行一次加密,得到中间图像;对中间图像再次进行哈希,与明文图像哈希值共同关联 Rucklidge 混沌系统初值;使用 Rucklidge 混沌系统和加密算法控制中间图像进行二次加密,得到密文图像。加密算法是一种新的明文关联加密算法,该算法使用图像自身像素值控制中间图像置乱,可以增强明文关联,建立密文反馈机制。仿真结果和性能分析表明,所提算法加密性能良好,加密后图像可按照压缩比例进行压缩,有效减小密文图像尺寸,且可以很好地抵抗已知明文攻击、选择明文攻击、差分攻击等常见攻击,优于其他常见图像加密算法。
中图分类号:
杨宇光, 曹国栋. 新的基于双混沌系统和压缩感知的图像加密算法[J]. 网络与信息安全学报, 2022, 8(5): 88-97.
Yuguang YANG, Guodong CAO. New image encryption algorithm based on double chaotic system and compressive sensing[J]. Chinese Journal of Network and Information Security, 2022, 8(5): 88-97.
表1
明文图像和密文图像不同方向上相邻像素的相关系数Table 1 Correlation coefficients of neighboring pixels in different directions for plain image and cipher image"
图像 | 明文图像 | 密文图像 | |||||
水平方向 | 垂直方向 | 对角线方向 | 水平方向 | 垂直方向 | 对角线方向 | ||
Lena | 0.972 1 | 0.984 7 | 0.956 8 | 0.001 | -0.002 4 | 0.000 8 | |
Cameramen | 0.982 4 | 0.989 6 | 0.972 2 | -0.000 2 | 0.005 2 | -0.000 8 | |
House | 0.995 6 | 0.994 5 | 0.990 4 | -0.003 3 | 0.005 2 | -0.000 7 | |
Jetplane | 0.972 7 | 0.970 3 | 0.948 7 | 0.007 4 | 0.001 1 | -0.004 5 | |
Lake | 0.975 9 | 0.976 4 | 0.961 2 | -0.001 6 | 0.000 3 | -0.005 5 | |
Livingroom | 0.946 3 | 0.952 9 | 0.912 0 | 0.000 3 | 0.000 9 | -0.007 4 | |
Woman | 0.996 4 | 0.996 9 | 0.994 5 | -0.001 | -0.002 4 | -0.001 1 | |
Peppers | 0.980 4 | 0.980 3 | 0.970 6 | -0.001 4 | -0.003 4 | 0.007 7 | |
Pirate | 0.977 5 | 0.981 3 | 0.967 0 | -0.008 5 | -0.001 5 | -0.003 5 | |
Walkbridge | 0.941 6 | 0.939 4 | 0.904 8 | 0.000 2 | -0.002 4 | 0.001 3 | |
均值 | 0.972 4 | 0.974 5 | 0.955 5 | -0.000 71 | 0.000 06 | -0.001 37 |
[1] | KAUR M , SINGH S , KAUR M ,et al. A systematic review of metaheuristic-based image encryption techniques[J]. Archives of Computational Methods in Engineering, 2022,29(5): 2563-257. |
[2] | CANDES E J , TAO T . Near-optimal signal recovery from random projections:Universal encoding strategies[J]. IEEE Transactions on Information Theory, 2006,52(12): 5406-5425. |
[3] | ORSDEMIR A , ALTUN H O , SHARMA G ,et al. On the security and robustness of encryption via compressed sensing[C]// MILCOM 2008 IEEE Military Communications Conference. 2008: 1-7. |
[4] | XU Q , SUN K , CAO C ,et al. A fast image encryption algorithm based on compressive sensing and hyperchaotic map[J]. Optics and Lasers in Engineering, 2019,12(10): 203-214. |
[5] | YE G , PAN C , DONG Y ,et al. Image encryption and hiding algo-rithm based on compressive sensing and random numbers inser-tion[J]. Signal Processing, 2020,172: 107563 |
[6] | XU Q , SUN K , HE S ,et al. An effective image encryption algo-rithm based on compressive sensing and 2D-SLIM[J]. Optics and Lasers in Engineering, 2020,134: 106178. |
[7] | WANG X , LIU C , JIANG D . A novel triple-image encryption and hiding algorithm based on chaos,compressive sensing and 3D DCT[J]. Information Sciences, 2021,574: 505-527. |
[8] | LI L , FANG Y , LIU L ,et al. Overview of compressed sensing:sensing model,reconstruction algorithm,and its applications[J]. Applied Sciences, 2020,10(17): 5909. |
[9] | AHMID M , KAZAR O . A comprehensive review of the internet of things security[J]. Journal of Applied Security Research, 2021,5(4): 1-17. |
[10] | LIU Y , ZHANG L Y , WANG J ,et al. Chosen-plaintext attack of an image encryption scheme based on modified permutation–diffusion structure[J]. Nonlinear Dynamics, 2016,84(4): 2241-2250. |
[11] | CIVINO R , BLONDEAU C , SALA M . Differential attacks:using alternative operations[J]. Designs,Codes and Cryptography, 2019,87(2): 225-247. |
[12] | KSHEERASAGAR T K , ANURADHA S , AVADHOOTHA G ,et al. Performance analysis of DS-CDMA using different chaotic se-quences[C]// 2016 International Conference on Wireless Communi-cations,Signal Processing and Networking (WiSPNET). 2016: 2421-2425. |
[13] | GONG L H , LUO H X , WU R Q ,et al. New 4D chaotic system with hidden attractors and self-excited attractors and its application in image encryption based on RNG[J]. Physica A:Statistical Me-chanics and its Applications, 2022,591: 126793. |
[14] | LIU E , TEMLYAKOV V N . The orthogonal super greedy algorithm and applications in compressed sensing[J]. IEEE Transactions on Information Theory, 2011,58(4): 2040-2047. |
[15] | MALLAT S G , ZHANG Z . Matching pursuits with time-frequency dictionaries[J]. IEEE Transactions on Signal Processing, 1993,41(12): 3397-3415. |
[16] | MOHIMANI H , BABAIE-ZADEH M , JUTTEN C . A fast approach for overcomplete sparse decomposition based on smoothed l0 norm[J]. IEEE Transactions on Signal Processing, 2008,57(1): 289-301. |
[17] | WANG X Y , ZHANG Y Q , BAO X M . A novel chaotic image encryption scheme using DNA sequence operations[J]. Optics and Lasers in Engineering, 2015,73: 53-61. |
[18] | WANG X , CHEN S , ZHANG Y . A chaotic image encryption algorithm based on random dynamic mixing[J]. Optics & Laser Technology, 2021,138: 106837. |
[19] | CHAI X L , GAN Z H , YUAN K ,et al. An image encryption scheme based on three-dimensional Brownian motion and chaotic system[J]. Chinese Physics B, 2017,26(2): 020504. |
[20] | AHMAD J , HWANG S O . A secure image encryption scheme based on chaotic maps and affine transformation[J]. Multimedia Tools and Applications, 2016,75(21): 13951-13976. |
[1] | 王艺龙, 李震宇, 巩道福, 刘粉林. 基于块邻域的图像双脆弱水印算法[J]. 网络与信息安全学报, 2023, 9(3): 38-48. |
[2] | 陈任峰, 朱鸿斌. 基于PU learning的信用卡交易安全监管研究[J]. 网络与信息安全学报, 2023, 9(3): 73-78. |
[3] | 冯冠云, 付才, 吕建强, 韩兰胜. 基于操作注意力和数据增强的内部威胁检测[J]. 网络与信息安全学报, 2023, 9(3): 102-112. |
[4] | 谢根琳, 程国振, 王亚文, 王庆丰. 基于gadget特征分析的软件多样性评估方法[J]. 网络与信息安全学报, 2023, 9(3): 161-173. |
[5] | 侯鹏, 李智鑫, 张飞, 孙旭, 陈丹, 崔毅浩, 张寒冰, 荆一楠, 柴洪峰. 金融数据安全治理智能化技术与实践[J]. 网络与信息安全学报, 2023, 9(3): 174-187. |
[6] | 肖敏, 毛发英, 黄永洪, 曹云飞. 基于属性签名的车载网匿名信任管理方案[J]. 网络与信息安全学报, 2023, 9(2): 33-45. |
[7] | 许建龙, 林健, 黎宇森, 熊智. 分布式用户隐私保护可调节的云服务个性化QoS预测模型[J]. 网络与信息安全学报, 2023, 9(2): 70-80. |
[8] | 陈训逊, 李明哲, 吕宁, 黄亮. 内禀安全:网络安全能力体系化构建方法[J]. 网络与信息安全学报, 2023, 9(1): 92-102. |
[9] | 宋佳烁, 李祯祯, 丁海洋, 李子臣. 椭圆曲线上高效可完全模拟的不经意传输协议[J]. 网络与信息安全学报, 2023, 9(1): 158-166. |
[10] | 李凤华, 李晖, 牛犇, 邱卫东. 隐私计算的学术内涵与研究趋势[J]. 网络与信息安全学报, 2022, 8(6): 1-8. |
[11] | 唐飞, 甘宁, 阳祥贵, 王金洋. 基于区块链与国密SM9的抗恶意KGC无证书签名方案[J]. 网络与信息安全学报, 2022, 8(6): 9-19. |
[12] | 白雪, 秦宝东, 郭瑞, 郑东. 基于SM2的两方协作盲签名协议[J]. 网络与信息安全学报, 2022, 8(6): 39-51. |
[13] | 刘军, 袁霖, 冯志尚. 集群网络密钥管理方案研究综述[J]. 网络与信息安全学报, 2022, 8(6): 52-69. |
[14] | 肖敏, 姚涛, 刘媛妮, 黄永洪. 具有隐私保护的动态高效车载云管理方案[J]. 网络与信息安全学报, 2022, 8(6): 70-83. |
[15] | 林佳滢, 周文柏, 张卫明, 俞能海. 空域频域相结合的唇型篡改检测方法[J]. 网络与信息安全学报, 2022, 8(6): 146-155. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|