Journal of Computer Applications ›› 2022, Vol. 42 ›› Issue (1): 162-170.DOI: 10.11772/j.issn.1001-9081.2021071220
• Cyber security • Previous Articles
Yuan GUO, Xuewen WANG(), Chong WANG, Jinlin JIANG
Received:
2021-07-14
Revised:
2021-08-13
Accepted:
2021-08-30
Online:
2021-08-13
Published:
2022-01-10
Contact:
Xuewen WANG
About author:
GUO Yuan, born in 1974, Ph. D., professor. His research interests include optical image encryption, privacy protection.Supported by:
通讯作者:
王学文
作者简介:
郭媛(1974—),女,辽宁台安人,教授,博士,CCF会员,主要研究方向:光学图像加密、隐私保护CLC Number:
Yuan GUO, Xuewen WANG, Chong WANG, Jinlin JIANG. Nonlinear scrambling diffusion synchronization image encryption based on dynamic network[J]. Journal of Computer Applications, 2022, 42(1): 162-170.
郭媛, 王学文, 王充, 姜津霖. 基于动态网络的非线性置乱扩散同步图像加密[J]. 《计算机应用》唯一官方网站, 2022, 42(1): 162-170.
Add to citation manager EndNote|Ris|BibTeX
URL: http://www.joca.cn/EN/10.11772/j.issn.1001-9081.2021071220
图像 方向 | 明文Lena | 密文Lena | 明文 pepper | 密文pepper | 密文Set14 |
---|---|---|---|---|---|
H | 0.969 1 | 0.000 7 | 0.975 5 | 0.003 5 | -0.000 4 |
V | 0.984 0 | 4.4×10-5 | 0.980 7 | -0.001 1 | 0.000 8 |
D | 0.955 6 | -0.000 6 | 0.962 5 | -0.000 7 | -0.000 3 |
Tab.1 Pixel correlation coefficient of ciphertext image
图像 方向 | 明文Lena | 密文Lena | 明文 pepper | 密文pepper | 密文Set14 |
---|---|---|---|---|---|
H | 0.969 1 | 0.000 7 | 0.975 5 | 0.003 5 | -0.000 4 |
V | 0.984 0 | 4.4×10-5 | 0.980 7 | -0.001 1 | 0.000 8 |
D | 0.955 6 | -0.000 6 | 0.962 5 | -0.000 7 | -0.000 3 |
图像 | 信息熵 |
---|---|
Lena | 7.999 3 |
peppers | 7.999 2 |
Set14 | 7.998 9 |
Tab.2 Information entropy
图像 | 信息熵 |
---|---|
Lena | 7.999 3 |
peppers | 7.999 2 |
Set14 | 7.998 9 |
改变方式 | 比较项 | Lena | peppers | baboon | Stanwick |
---|---|---|---|---|---|
任意像素加一 | NPCR | 99.61 | 99.60 | 99.60 | 99.62 |
UACI | 33.43 | 33.43 | 33.41 | 33.42 | |
任意交换两像素 | NPCR | 99.63 | 99.61 | 99.60 | 99.60 |
UACI | 33.42 | 33.43 | 33.42 | 33.43 |
Tab.3 NPCR and UACI values
改变方式 | 比较项 | Lena | peppers | baboon | Stanwick |
---|---|---|---|---|---|
任意像素加一 | NPCR | 99.61 | 99.60 | 99.60 | 99.62 |
UACI | 33.43 | 33.43 | 33.41 | 33.42 | |
任意交换两像素 | NPCR | 99.63 | 99.61 | 99.60 | 99.60 |
UACI | 33.42 | 33.43 | 33.42 | 33.43 |
图像类型 | 信息熵 | 相关系数 | ||
---|---|---|---|---|
H | V | D | ||
全黑 | 7.999 3 | 0.000 6 | 0.000 3 | 0.001 2 |
全白 | 7.999 3 | 0.000 9 | -0.000 1 | -0.002 2 |
Tab.4 Encryption results of special images
图像类型 | 信息熵 | 相关系数 | ||
---|---|---|---|---|
H | V | D | ||
全黑 | 7.999 3 | 0.000 6 | 0.000 3 | 0.001 2 |
全白 | 7.999 3 | 0.000 9 | -0.000 1 | -0.002 2 |
图像 | 加密时间/s |
---|---|
Lena(128×128) | 0.088 |
Lena(256×256) | 0.338 |
Lena(512 ×512) | 1.716 |
Set14 | 1.517 |
Tab.5 Encryption time
图像 | 加密时间/s |
---|---|
Lena(128×128) | 0.088 |
Lena(256×256) | 0.338 |
Lena(512 ×512) | 1.716 |
Set14 | 1.517 |
算法 | 信息熵 | 相关系数 | NPCR | UCAI | ||
---|---|---|---|---|---|---|
H | V | D | ||||
文献[ | 7.999 2 | 0.002 1 | 0.000 8 | 0.000 5 | 99.60 | 33.39 |
文献[ | 7.999 2 | 0.001 6 | 0.001 4 | 0.000 9 | 99.61 | 33.42 |
本文算法 | 7.999 3 | 0.000 7 | 4.4×10-5 | -0.000 6 | 99.61 | 33.43 |
Tab.6 Performance results comparison of different algorithms
算法 | 信息熵 | 相关系数 | NPCR | UCAI | ||
---|---|---|---|---|---|---|
H | V | D | ||||
文献[ | 7.999 2 | 0.002 1 | 0.000 8 | 0.000 5 | 99.60 | 33.39 |
文献[ | 7.999 2 | 0.001 6 | 0.001 4 | 0.000 9 | 99.61 | 33.42 |
本文算法 | 7.999 3 | 0.000 7 | 4.4×10-5 | -0.000 6 | 99.61 | 33.43 |
图像大小 | 非线性度 | |
---|---|---|
本文算法 | 文献[ | |
128×128 | 5.44 | |
256×256 | 5.45 | |
512 ×512 | 5.43 |
Tab.7 Nonlinear degree of different size images
图像大小 | 非线性度 | |
---|---|---|
本文算法 | 文献[ | |
128×128 | 5.44 | |
256×256 | 5.45 | |
512 ×512 | 5.43 |
1 | WANG Y Z, YANG F F. A fractional-order CNN hyperchaotic system for image encryption algorithm[J]. Physica Scripta, 2021, 96(3): No.035209. 10.1088/1402-4896/abd50f |
2 | 李珊珊,赵莉,张红丽. 基于猫映射的图像灰度值加密[J]. 计算机应用, 2021, 41(4):1148-1152. |
LI S S, ZHAO L, ZHANG H L. Image grey level encryption based on cat map[J]. Journal of Computer Applications, 2021, 41(4): 1148-1152. | |
3 | XIAN Y J, WANG X Y. Fractal sorting matrix and its application on chaotic image encryption[J]. Information Sciences, 2021, 547:1154-1169. 10.1016/j.ins.2020.09.055 |
4 | ZHANG W, YU H, ZHAO Y L, et al. Image encryption based on three-dimensional bit matrix permutation[J]. Signal Processing, 2016, 118:36-50. 10.1016/j.sigpro.2015.06.008 |
5 | XIE E Y, LI C Q, YU S M, et al. On the cryptanalysis of Fridrich’s chaotic image encryption scheme[J]. Signal Processing, 2017, 132: 150-154. 10.1016/j.sigpro.2016.10.002 |
6 | CHEN L, MA B, ZHAO X H, et al. Differential cryptanalysis of a novel image encryption algorithm based on chaos and Line map[J]. Nonlinear Dynamics, 2017, 87(3): 1797-1807. 10.1007/s11071-016-3153-y |
7 | WANG T, WANG M H. Hyperchaotic image encryption algorithm based on bit-level permutation and DNA encoding[J]. Optics and Laser Technology, 2020, 132: No.106355. 10.1016/j.optlastec.2020.106355 |
8 | HUANG L Q, CAI S T, XIAO M Q, et al. A simple chaotic map-based image encryption system using both plaintext related permutation and diffusion[J]. Entropy, 2018, 20(7): No.535. 10.3390/e20070535 |
9 | WANG X Y, FENG L, ZHAO H Y. Fast image encryption algorithm based on parallel computing system[J]. Information Sciences, 2019, 486:340-358. 10.1016/j.ins.2019.02.049 |
10 | NOROUZI B, MIRZAKUCHAKI S, SEYEDZADEH S M, et al. A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process[J]. Multimedia Tools and Applications, 2014, 71(3):1469-1497. 10.1007/s11042-012-1292-9 |
11 | 谢国波,王添. 基于像素置乱和比特替换的混沌图像加密算法[J]. 微电子学与计算机, 2016, 33(3):80-85. 10.19304/j.cnki.issn1000-7180.2016.03.017 |
XIE G B, WANG T. A chaotic image encryption algorithm based on pixel scrambling and bit substitution[J]. Microelectronics and Computer, 2016, 33(3):80-85. 10.19304/j.cnki.issn1000-7180.2016.03.017 | |
12 | LIU L F, HAO S D, LIN J, et al. Image block encryption algorithm based on chaotic maps[J]. IET Signal Processing, 2018, 12(1): 22-30. 10.1049/iet-spr.2016.0584 |
13 | DIAB H, EL-SEMARY A M. Secure image cryptosystem with unique key streams via hyper-chaotic system[J]. Signal Processing, 2018, 142: 53-68. 10.1016/j.sigpro.2017.06.028 |
14 | 朱淑芹,王文宏,李俊青. 对像素置乱和比特替换混沌图像算法的破解[J]. 计算机应用, 2017, 37(S2):44-47. |
ZHU S Q, WANG W H, LI J Q. Breaking a chaotic image encryption algorithm based on pixel scrambling and bit substitution[J]. Journal of Computer Applications, 2017, 37(S2):44-47. | |
15 | MA Y L, LI C Q, OU B. Cryptanalysis of an image block encryption algorithm based on chaotic maps[J]. Journal of Information Security and Applications, 2020, 54: No.102566. 10.1016/j.jisa.2020.102566 |
16 | ENAYATIFAR R, ABDULLAH A H, ISNIN I F, et al. Image encryption using a synchronous permutation-diffusion technique[J]. Optics and Lasers in Engineering, 2017, 90:146-154. 10.1016/j.optlaseng.2016.10.006 |
17 | HUANG L Q, CAI S T, XIONG X M, et al. On symmetric color image encryption system with permutation-diffusion simultaneous operation[J]. Optics and Lasers in Engineering, 2019, 115:7-20. 10.1016/j.optlaseng.2018.11.015 |
18 | CHEN L, CHEN J X, MA L S, et al. Cryptanalysis of a chaotic image cipher based on plaintext-related permutation and lookup table[J]. Nonlinear Dynamics, 2020, 100(4):3959-3978. 10.1007/s11071-020-05735-y |
19 | CHEN J X, CHEN L, ZHOU Y C. Cryptanalysis of image ciphers with permutation-substitution network and chaos[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2021, 31(6):2494-2508. 10.1109/tcsvt.2020.3021908 |
20 | HUA Z Y, YI S, ZHOU Y C. Medical image encryption using high-speed scrambling and pixel adaptive diffusion[J]. Signal Processing, 2018, 144: 133-144. 10.1016/j.sigpro.2017.10.004 |
[1] | WANG Huai, WANG Zhanqing. Nonlinear constraint based quasi-homography warps for image stitching [J]. Journal of Computer Applications, 2021, 41(8): 2318-2323. |
[2] | TANG Andi, HAN Tong, XU Dengwu, XIE lei. Chaotic elite Harris hawks optimization algorithm [J]. Journal of Computer Applications, 2021, 41(8): 2265-2272. |
[3] | ZHANG Yuanjun, ZHANG Xihuang. Dynamic network representation learning model based on graph convolutional network and long short-term memory network [J]. Journal of Computer Applications, 2021, 41(7): 1857-1864. |
[4] | LI Shanshan, ZHAO Li, ZHANG Hongli. Image grey level encryption based on cat map [J]. Journal of Computer Applications, 2021, 41(4): 1148-1152. |
[5] | Huibo LI, Yunxiao ZHAO, Liang BAI. Dynamic graph representation learning method based on deep neural network and gated recurrent unit [J]. Journal of Computer Applications, 2021, 41(12): 3432-3437. |
[6] | SHEN Ziyi, WANG Weiya, JIANG Donghua, RONG Xianwei. Visual image encryption algorithm based on Hopfield chaotic neural network and compressive sensing [J]. Journal of Computer Applications, 2021, 41(10): 2893-2899. |
[7] | FENG Zikai, CHEN Lijia, LIU Mingguo, YUAN Meng’en. Nonlinear systems identification based on structural adaptive filtering method [J]. Journal of Computer Applications, 2020, 40(8): 2319-2326. |
[8] | SHI Xiaoqian, CHEN Qidong, SUN Jun, MAO Zhongjie. Adaptive distribution based quantum-behaved particle swarm optimization algorithm for engineering constrained optimization problem [J]. Journal of Computer Applications, 2020, 40(5): 1382-1388. |
[9] | XU Yansheng, ZHANG Youjie. Order preserving encryption scheme of nonlinear mapping based on random function [J]. Journal of Computer Applications, 2020, 40(10): 2986-2991. |
[10] | SHAO Hao, WANG Lunwen, DENG Jian. Important node identification method for dynamic networks based on H operation [J]. Journal of Computer Applications, 2019, 39(9): 2669-2674. |
[11] | HAN Yulan, HAN Chongzhao. Multiple extended target tracking algorithm for nonliear system [J]. Journal of Computer Applications, 2019, 39(5): 1318-1324. |
[12] | LIN Li, MENG Xuelei, SONG Zhongzhong. Optimization of intercity train operation plan considering regional coordination [J]. Journal of Computer Applications, 2019, 39(2): 598-603. |
[13] | ZHENG Hongxing, WANG Quanhui, REN Yaqun. Multi-type liner scheduling considering tidal effects [J]. Journal of Computer Applications, 2019, 39(2): 611-617. |
[14] | GE Jiangxia, QI Wentao, LAN Lin, TIAN Yu, ZHU Hegui. Two-dimensional inverse-trigonometric hyperchaotic system and its application in image encryption [J]. Journal of Computer Applications, 2019, 39(1): 239-244. |
[15] | DING Jianli, MU Tao, WANG Huaichao. Fast indoor positioning algorithm of airport terminal based on spectral regression kernel discriminant analysis [J]. Journal of Computer Applications, 2019, 39(1): 256-261. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||