Journal of Computer Applications ›› 2022, Vol. 42 ›› Issue (1): 162-170.DOI: 10.11772/j.issn.1001-9081.2021071220
Special Issue: 网络空间安全
• Cyber security • Previous Articles Next Articles
					
						                                                                                                                                                                                                                                                    Yuan GUO, Xuewen WANG( ), Chong WANG, Jinlin JIANG
), Chong WANG, Jinlin JIANG
												  
						
						
						
					
				
Received:2021-07-14
															
							
																	Revised:2021-08-13
															
							
																	Accepted:2021-08-30
															
							
							
																	Online:2021-08-13
															
							
																	Published:2022-01-10
															
							
						Contact:
								Xuewen WANG   
													About author:GUO Yuan, born in 1974, Ph. D., professor. His research interests include optical image encryption, privacy protection.Supported by:通讯作者:
					王学文
							作者简介:郭媛(1974—),女,辽宁台安人,教授,博士,CCF会员,主要研究方向:光学图像加密、隐私保护CLC Number:
Yuan GUO, Xuewen WANG, Chong WANG, Jinlin JIANG. Nonlinear scrambling diffusion synchronization image encryption based on dynamic network[J]. Journal of Computer Applications, 2022, 42(1): 162-170.
郭媛, 王学文, 王充, 姜津霖. 基于动态网络的非线性置乱扩散同步图像加密[J]. 《计算机应用》唯一官方网站, 2022, 42(1): 162-170.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2021071220
| 图像 方向 | 明文Lena | 密文Lena | 明文 pepper | 密文pepper | 密文Set14 | 
|---|---|---|---|---|---|
| H | 0.969 1 | 0.000 7 | 0.975 5 | 0.003 5 | -0.000 4 | 
| V | 0.984 0 | 4.4×10-5 | 0.980 7 | -0.001 1 | 0.000 8 | 
| D | 0.955 6 | -0.000 6 | 0.962 5 | -0.000 7 | -0.000 3 | 
Tab.1 Pixel correlation coefficient of ciphertext image
| 图像 方向 | 明文Lena | 密文Lena | 明文 pepper | 密文pepper | 密文Set14 | 
|---|---|---|---|---|---|
| H | 0.969 1 | 0.000 7 | 0.975 5 | 0.003 5 | -0.000 4 | 
| V | 0.984 0 | 4.4×10-5 | 0.980 7 | -0.001 1 | 0.000 8 | 
| D | 0.955 6 | -0.000 6 | 0.962 5 | -0.000 7 | -0.000 3 | 
| 图像 | 信息熵 | 
|---|---|
| Lena | 7.999 3 | 
| peppers | 7.999 2 | 
| Set14 | 7.998 9 | 
Tab.2 Information entropy
| 图像 | 信息熵 | 
|---|---|
| Lena | 7.999 3 | 
| peppers | 7.999 2 | 
| Set14 | 7.998 9 | 
| 改变方式 | 比较项 | Lena | peppers | baboon | Stanwick | 
|---|---|---|---|---|---|
| 任意像素加一 | NPCR | 99.61 | 99.60 | 99.60 | 99.62 | 
| UACI | 33.43 | 33.43 | 33.41 | 33.42 | |
| 任意交换两像素 | NPCR | 99.63 | 99.61 | 99.60 | 99.60 | 
| UACI | 33.42 | 33.43 | 33.42 | 33.43 | 
Tab.3 NPCR and UACI values
| 改变方式 | 比较项 | Lena | peppers | baboon | Stanwick | 
|---|---|---|---|---|---|
| 任意像素加一 | NPCR | 99.61 | 99.60 | 99.60 | 99.62 | 
| UACI | 33.43 | 33.43 | 33.41 | 33.42 | |
| 任意交换两像素 | NPCR | 99.63 | 99.61 | 99.60 | 99.60 | 
| UACI | 33.42 | 33.43 | 33.42 | 33.43 | 
| 图像类型 | 信息熵 | 相关系数 | ||
|---|---|---|---|---|
| H | V | D | ||
| 全黑 | 7.999 3 | 0.000 6 | 0.000 3 | 0.001 2 | 
| 全白 | 7.999 3 | 0.000 9 | -0.000 1 | -0.002 2 | 
Tab.4 Encryption results of special images
| 图像类型 | 信息熵 | 相关系数 | ||
|---|---|---|---|---|
| H | V | D | ||
| 全黑 | 7.999 3 | 0.000 6 | 0.000 3 | 0.001 2 | 
| 全白 | 7.999 3 | 0.000 9 | -0.000 1 | -0.002 2 | 
| 图像 | 加密时间/s | 
|---|---|
| Lena(128×128) | 0.088 | 
| Lena(256×256) | 0.338 | 
| Lena(512 ×512) | 1.716 | 
| Set14 | 1.517 | 
Tab.5 Encryption time
| 图像 | 加密时间/s | 
|---|---|
| Lena(128×128) | 0.088 | 
| Lena(256×256) | 0.338 | 
| Lena(512 ×512) | 1.716 | 
| Set14 | 1.517 | 
| 算法 | 信息熵 | 相关系数 | NPCR | UCAI | ||
|---|---|---|---|---|---|---|
| H | V | D | ||||
| 文献[ | 7.999 2 | 0.002 1 | 0.000 8 | 0.000 5 | 99.60 | 33.39 | 
| 文献[ | 7.999 2 | 0.001 6 | 0.001 4 | 0.000 9 | 99.61 | 33.42 | 
| 本文算法 | 7.999 3 | 0.000 7 | 4.4×10-5 | -0.000 6 | 99.61 | 33.43 | 
Tab.6 Performance results comparison of different algorithms
| 算法 | 信息熵 | 相关系数 | NPCR | UCAI | ||
|---|---|---|---|---|---|---|
| H | V | D | ||||
| 文献[ | 7.999 2 | 0.002 1 | 0.000 8 | 0.000 5 | 99.60 | 33.39 | 
| 文献[ | 7.999 2 | 0.001 6 | 0.001 4 | 0.000 9 | 99.61 | 33.42 | 
| 本文算法 | 7.999 3 | 0.000 7 | 4.4×10-5 | -0.000 6 | 99.61 | 33.43 | 
| 图像大小 | 非线性度 | |
|---|---|---|
| 本文算法 | 文献[ | |
| 128×128 | 5.44 | |
| 256×256 | 5.45 | |
| 512 ×512 | 5.43 | |
Tab.7 Nonlinear degree of different size images
| 图像大小 | 非线性度 | |
|---|---|---|
| 本文算法 | 文献[ | |
| 128×128 | 5.44 | |
| 256×256 | 5.45 | |
| 512 ×512 | 5.43 | |
| 1 | WANG Y Z, YANG F F. A fractional-order CNN hyperchaotic system for image encryption algorithm[J]. Physica Scripta, 2021, 96(3): No.035209. 10.1088/1402-4896/abd50f | 
| 2 | 李珊珊,赵莉,张红丽. 基于猫映射的图像灰度值加密[J]. 计算机应用, 2021, 41(4):1148-1152. | 
| LI S S, ZHAO L, ZHANG H L. Image grey level encryption based on cat map[J]. Journal of Computer Applications, 2021, 41(4): 1148-1152. | |
| 3 | XIAN Y J, WANG X Y. Fractal sorting matrix and its application on chaotic image encryption[J]. Information Sciences, 2021, 547:1154-1169. 10.1016/j.ins.2020.09.055 | 
| 4 | ZHANG W, YU H, ZHAO Y L, et al. Image encryption based on three-dimensional bit matrix permutation[J]. Signal Processing, 2016, 118:36-50. 10.1016/j.sigpro.2015.06.008 | 
| 5 | XIE E Y, LI C Q, YU S M, et al. On the cryptanalysis of Fridrich’s chaotic image encryption scheme[J]. Signal Processing, 2017, 132: 150-154. 10.1016/j.sigpro.2016.10.002 | 
| 6 | CHEN L, MA B, ZHAO X H, et al. Differential cryptanalysis of a novel image encryption algorithm based on chaos and Line map[J]. Nonlinear Dynamics, 2017, 87(3): 1797-1807. 10.1007/s11071-016-3153-y | 
| 7 | WANG T, WANG M H. Hyperchaotic image encryption algorithm based on bit-level permutation and DNA encoding[J]. Optics and Laser Technology, 2020, 132: No.106355. 10.1016/j.optlastec.2020.106355 | 
| 8 | HUANG L Q, CAI S T, XIAO M Q, et al. A simple chaotic map-based image encryption system using both plaintext related permutation and diffusion[J]. Entropy, 2018, 20(7): No.535. 10.3390/e20070535 | 
| 9 | WANG X Y, FENG L, ZHAO H Y. Fast image encryption algorithm based on parallel computing system[J]. Information Sciences, 2019, 486:340-358. 10.1016/j.ins.2019.02.049 | 
| 10 | NOROUZI B, MIRZAKUCHAKI S, SEYEDZADEH S M, et al. A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process[J]. Multimedia Tools and Applications, 2014, 71(3):1469-1497. 10.1007/s11042-012-1292-9 | 
| 11 | 谢国波,王添. 基于像素置乱和比特替换的混沌图像加密算法[J]. 微电子学与计算机, 2016, 33(3):80-85. 10.19304/j.cnki.issn1000-7180.2016.03.017 | 
| XIE G B, WANG T. A chaotic image encryption algorithm based on pixel scrambling and bit substitution[J]. Microelectronics and Computer, 2016, 33(3):80-85. 10.19304/j.cnki.issn1000-7180.2016.03.017 | |
| 12 | LIU L F, HAO S D, LIN J, et al. Image block encryption algorithm based on chaotic maps[J]. IET Signal Processing, 2018, 12(1): 22-30. 10.1049/iet-spr.2016.0584 | 
| 13 | DIAB H, EL-SEMARY A M. Secure image cryptosystem with unique key streams via hyper-chaotic system[J]. Signal Processing, 2018, 142: 53-68. 10.1016/j.sigpro.2017.06.028 | 
| 14 | 朱淑芹,王文宏,李俊青. 对像素置乱和比特替换混沌图像算法的破解[J]. 计算机应用, 2017, 37(S2):44-47. | 
| ZHU S Q, WANG W H, LI J Q. Breaking a chaotic image encryption algorithm based on pixel scrambling and bit substitution[J]. Journal of Computer Applications, 2017, 37(S2):44-47. | |
| 15 | MA Y L, LI C Q, OU B. Cryptanalysis of an image block encryption algorithm based on chaotic maps[J]. Journal of Information Security and Applications, 2020, 54: No.102566. 10.1016/j.jisa.2020.102566 | 
| 16 | ENAYATIFAR R, ABDULLAH A H, ISNIN I F, et al. Image encryption using a synchronous permutation-diffusion technique[J]. Optics and Lasers in Engineering, 2017, 90:146-154. 10.1016/j.optlaseng.2016.10.006 | 
| 17 | HUANG L Q, CAI S T, XIONG X M, et al. On symmetric color image encryption system with permutation-diffusion simultaneous operation[J]. Optics and Lasers in Engineering, 2019, 115:7-20. 10.1016/j.optlaseng.2018.11.015 | 
| 18 | CHEN L, CHEN J X, MA L S, et al. Cryptanalysis of a chaotic image cipher based on plaintext-related permutation and lookup table[J]. Nonlinear Dynamics, 2020, 100(4):3959-3978. 10.1007/s11071-020-05735-y | 
| 19 | CHEN J X, CHEN L, ZHOU Y C. Cryptanalysis of image ciphers with permutation-substitution network and chaos[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2021, 31(6):2494-2508. 10.1109/tcsvt.2020.3021908 | 
| 20 | HUA Z Y, YI S, ZHOU Y C. Medical image encryption using high-speed scrambling and pixel adaptive diffusion[J]. Signal Processing, 2018, 144: 133-144. 10.1016/j.sigpro.2017.10.004 | 
| [1] | Wentao JIANG, Wanxuan LI, Shengchong ZHANG. Correlation filtering based target tracking with nonlinear temporal consistency [J]. Journal of Computer Applications, 2024, 44(8): 2558-2570. | 
| [2] | Ying HU, Zhihuan CHEN. Trajectory tracking control of wheeled mobile robots under side-slip and slip [J]. Journal of Computer Applications, 2024, 44(7): 2294-2300. | 
| [3] | Qingyu YUAN, Tiegang GAO. Reversible information hiding based on pixel prediction and secret image sharing [J]. Journal of Computer Applications, 2024, 44(3): 780-787. | 
| [4] | Zhenyu LIU, Chaokun WANG, Gaoyang GUO. Parallel algorithm of betweenness centrality for dynamic networks [J]. Journal of Computer Applications, 2023, 43(7): 1987-1993. | 
| [5] | Jinwei PU, Qingjian GAO, Xin ZHENG, Yinghui XU. SM4 resistant differential power analysis lightweight threshold implementation [J]. Journal of Computer Applications, 2023, 43(11): 3490-3496. | 
| [6] | Xiangyu LUO, Ke YAN, Yan LU, Tian WANG, Gang XIN. Nonuniform time slicing method based on prediction of community variance [J]. Journal of Computer Applications, 2023, 43(11): 3457-3463. | 
| [7] | Shanshan HUO, Yanjun LI, Jian LIU, Yinshuang LI. Design and implementation of cipher component security criteria testing tool [J]. Journal of Computer Applications, 2023, 43(10): 3156-3161. | 
| [8] | Jingwen CAI, Yongzhuang WEI, Zhenghong LIU. GPU-based method for evaluating algebraic properties of cryptographic S-boxes [J]. Journal of Computer Applications, 2022, 42(9): 2750-2756. | 
| [9] | Xiangyu ZHANG, Yang YANG, Guohui FENG, Chuan QIN. Reversible data hiding in encrypted image based on multi-objective optimization [J]. Journal of Computer Applications, 2022, 42(6): 1716-1723. | 
| [10] | Guifang QIAO, Shouming HOU, Yanyan LIU. Facial expression recognition algorithm based on combination of improved convolutional neural network and support vector machine [J]. Journal of Computer Applications, 2022, 42(4): 1253-1259. | 
| [11] | Yang ZHONG, Renwan BI, Xishan YAN, Zuobin YING, Jinbo XIONG. Efficient homomorphic neural network supporting privacy-preserving training [J]. Journal of Computer Applications, 2022, 42(12): 3792-3800. | 
| [12] | Lingzhao WANG, Runhe QIU. Joint optimization method of full-duplex cognitive relay network based on nonlinear energy harvesting [J]. Journal of Computer Applications, 2022, 42(10): 3130-3139. | 
| [13] | Yuxian DUAN, Changyun LIU. Sparrow search algorithm based on Sobol sequence and crisscross strategy [J]. Journal of Computer Applications, 2022, 42(1): 36-43. | 
| [14] | TANG Andi, HAN Tong, XU Dengwu, XIE lei. Chaotic elite Harris hawks optimization algorithm [J]. Journal of Computer Applications, 2021, 41(8): 2265-2272. | 
| [15] | WANG Huai, WANG Zhanqing. Nonlinear constraint based quasi-homography warps for image stitching [J]. Journal of Computer Applications, 2021, 41(8): 2318-2323. | 
| Viewed | ||||||
| Full text |  | |||||
| Abstract |  | |||||