Color image encryption algorithm based on hyperchaotic and security analysis

被引:2
作者
Zhao, Fangzheng [1 ]
Li, Chenghai [2 ]
Liu, Chen [2 ]
Song, Yafei [2 ]
机构
[1] Air Force Engn Univ, Grad Sch, Xian, Shanxi, Peoples R China
[2] Air Force Engn Univ, Air & Missile Def Coll, Xian, Shanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
hyperchaotic system; color image encryption; gray code; 2-D entropy;
D O I
10.1117/1.JEI.28.4.043011
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
According to the problems of the traditional image encryption algorithm, such as cumbersome encryption process, small keyspace, and insufficient security, a color image encryption algorithm based on a four-dimensional hyperchaotic system and using "conversion-scrambling-diffusion" mode is used. The algorithm utilizes improved Chen's hyperchaotic system. First, according to the color image correlation attribute, the gray code iteration number was calculated, and the gray code inversely transformed the pixel value. Subsequently, the chaotic sequence generated by the hyperchaotic system was used to convert the gray code converted pixel matrix. The global pixel position was scrambled, and then, the scrambled matrix was bit-operated to complete image diffusion. Finally, the ciphertext was obtained through matrix transformation. The algorithm can realize a picture and a key. Good image encryption algorithms should meet the requirements of large key-space, key sensitivity, effective resistance to violent attacks, entropy attacks, plaintext attacks, and other attacks as well as real-time requirements. The simulation experiments calculate and analyze evaluation indexes, such as key sensitivity, histogram, image information entropy, including one-dimensional entropy and two-dimensional entropy, and adjacent element correlation. The information entropies are more than 7.99, and the keyspace is larger than 10(86). The results prove that the encryption algorithm has robust security and antiattack ability. (C) 2019 SPIE and IS&T
引用
收藏
页数:9
相关论文
共 27 条
[1]  
[Anonymous], J FUYANG NORMAL U
[2]  
[Anonymous], COMPUT DIGITAL ENG
[3]  
[Anonymous], T AM MATH SOC
[4]  
[Anonymous], INT C IM AN SIGN PRO
[5]  
[Anonymous], COMPUT ENG
[6]  
[Anonymous], P 3 INT C SOFT COMP
[7]  
[Anonymous], ADV COMPUT SCI INF T
[8]  
[Anonymous], J JILIN U
[9]  
[Anonymous], 2015, INT J COMPUT APPL
[10]  
[Anonymous], 12 INT C COMP ENG SY