Journal of Computer Applications ›› 2022, Vol. 42 ›› Issue (1): 162-170.DOI: 10.11772/j.issn.1001-9081.2021071220
Special Issue: 网络空间安全
• Cyber security • Previous Articles Next Articles
Yuan GUO, Xuewen WANG(), Chong WANG, Jinlin JIANG
Received:
2021-07-14
Revised:
2021-08-13
Accepted:
2021-08-30
Online:
2021-08-13
Published:
2022-01-10
Contact:
Xuewen WANG
About author:
GUO Yuan, born in 1974, Ph. D., professor. His research interests include optical image encryption, privacy protection.Supported by:
通讯作者:
王学文
作者简介:
郭媛(1974—),女,辽宁台安人,教授,博士,CCF会员,主要研究方向:光学图像加密、隐私保护CLC Number:
Yuan GUO, Xuewen WANG, Chong WANG, Jinlin JIANG. Nonlinear scrambling diffusion synchronization image encryption based on dynamic network[J]. Journal of Computer Applications, 2022, 42(1): 162-170.
郭媛, 王学文, 王充, 姜津霖. 基于动态网络的非线性置乱扩散同步图像加密[J]. 《计算机应用》唯一官方网站, 2022, 42(1): 162-170.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2021071220
图像 方向 | 明文Lena | 密文Lena | 明文 pepper | 密文pepper | 密文Set14 |
---|---|---|---|---|---|
H | 0.969 1 | 0.000 7 | 0.975 5 | 0.003 5 | -0.000 4 |
V | 0.984 0 | 4.4×10-5 | 0.980 7 | -0.001 1 | 0.000 8 |
D | 0.955 6 | -0.000 6 | 0.962 5 | -0.000 7 | -0.000 3 |
Tab.1 Pixel correlation coefficient of ciphertext image
图像 方向 | 明文Lena | 密文Lena | 明文 pepper | 密文pepper | 密文Set14 |
---|---|---|---|---|---|
H | 0.969 1 | 0.000 7 | 0.975 5 | 0.003 5 | -0.000 4 |
V | 0.984 0 | 4.4×10-5 | 0.980 7 | -0.001 1 | 0.000 8 |
D | 0.955 6 | -0.000 6 | 0.962 5 | -0.000 7 | -0.000 3 |
图像 | 信息熵 |
---|---|
Lena | 7.999 3 |
peppers | 7.999 2 |
Set14 | 7.998 9 |
Tab.2 Information entropy
图像 | 信息熵 |
---|---|
Lena | 7.999 3 |
peppers | 7.999 2 |
Set14 | 7.998 9 |
改变方式 | 比较项 | Lena | peppers | baboon | Stanwick |
---|---|---|---|---|---|
任意像素加一 | NPCR | 99.61 | 99.60 | 99.60 | 99.62 |
UACI | 33.43 | 33.43 | 33.41 | 33.42 | |
任意交换两像素 | NPCR | 99.63 | 99.61 | 99.60 | 99.60 |
UACI | 33.42 | 33.43 | 33.42 | 33.43 |
Tab.3 NPCR and UACI values
改变方式 | 比较项 | Lena | peppers | baboon | Stanwick |
---|---|---|---|---|---|
任意像素加一 | NPCR | 99.61 | 99.60 | 99.60 | 99.62 |
UACI | 33.43 | 33.43 | 33.41 | 33.42 | |
任意交换两像素 | NPCR | 99.63 | 99.61 | 99.60 | 99.60 |
UACI | 33.42 | 33.43 | 33.42 | 33.43 |
图像类型 | 信息熵 | 相关系数 | ||
---|---|---|---|---|
H | V | D | ||
全黑 | 7.999 3 | 0.000 6 | 0.000 3 | 0.001 2 |
全白 | 7.999 3 | 0.000 9 | -0.000 1 | -0.002 2 |
Tab.4 Encryption results of special images
图像类型 | 信息熵 | 相关系数 | ||
---|---|---|---|---|
H | V | D | ||
全黑 | 7.999 3 | 0.000 6 | 0.000 3 | 0.001 2 |
全白 | 7.999 3 | 0.000 9 | -0.000 1 | -0.002 2 |
图像 | 加密时间/s |
---|---|
Lena(128×128) | 0.088 |
Lena(256×256) | 0.338 |
Lena(512 ×512) | 1.716 |
Set14 | 1.517 |
Tab.5 Encryption time
图像 | 加密时间/s |
---|---|
Lena(128×128) | 0.088 |
Lena(256×256) | 0.338 |
Lena(512 ×512) | 1.716 |
Set14 | 1.517 |
算法 | 信息熵 | 相关系数 | NPCR | UCAI | ||
---|---|---|---|---|---|---|
H | V | D | ||||
文献[ | 7.999 2 | 0.002 1 | 0.000 8 | 0.000 5 | 99.60 | 33.39 |
文献[ | 7.999 2 | 0.001 6 | 0.001 4 | 0.000 9 | 99.61 | 33.42 |
本文算法 | 7.999 3 | 0.000 7 | 4.4×10-5 | -0.000 6 | 99.61 | 33.43 |
Tab.6 Performance results comparison of different algorithms
算法 | 信息熵 | 相关系数 | NPCR | UCAI | ||
---|---|---|---|---|---|---|
H | V | D | ||||
文献[ | 7.999 2 | 0.002 1 | 0.000 8 | 0.000 5 | 99.60 | 33.39 |
文献[ | 7.999 2 | 0.001 6 | 0.001 4 | 0.000 9 | 99.61 | 33.42 |
本文算法 | 7.999 3 | 0.000 7 | 4.4×10-5 | -0.000 6 | 99.61 | 33.43 |
图像大小 | 非线性度 | |
---|---|---|
本文算法 | 文献[ | |
128×128 | 5.44 | |
256×256 | 5.45 | |
512 ×512 | 5.43 |
Tab.7 Nonlinear degree of different size images
图像大小 | 非线性度 | |
---|---|---|
本文算法 | 文献[ | |
128×128 | 5.44 | |
256×256 | 5.45 | |
512 ×512 | 5.43 |
1 | WANG Y Z, YANG F F. A fractional-order CNN hyperchaotic system for image encryption algorithm[J]. Physica Scripta, 2021, 96(3): No.035209. 10.1088/1402-4896/abd50f |
2 | 李珊珊,赵莉,张红丽. 基于猫映射的图像灰度值加密[J]. 计算机应用, 2021, 41(4):1148-1152. |
LI S S, ZHAO L, ZHANG H L. Image grey level encryption based on cat map[J]. Journal of Computer Applications, 2021, 41(4): 1148-1152. | |
3 | XIAN Y J, WANG X Y. Fractal sorting matrix and its application on chaotic image encryption[J]. Information Sciences, 2021, 547:1154-1169. 10.1016/j.ins.2020.09.055 |
4 | ZHANG W, YU H, ZHAO Y L, et al. Image encryption based on three-dimensional bit matrix permutation[J]. Signal Processing, 2016, 118:36-50. 10.1016/j.sigpro.2015.06.008 |
5 | XIE E Y, LI C Q, YU S M, et al. On the cryptanalysis of Fridrich’s chaotic image encryption scheme[J]. Signal Processing, 2017, 132: 150-154. 10.1016/j.sigpro.2016.10.002 |
6 | CHEN L, MA B, ZHAO X H, et al. Differential cryptanalysis of a novel image encryption algorithm based on chaos and Line map[J]. Nonlinear Dynamics, 2017, 87(3): 1797-1807. 10.1007/s11071-016-3153-y |
7 | WANG T, WANG M H. Hyperchaotic image encryption algorithm based on bit-level permutation and DNA encoding[J]. Optics and Laser Technology, 2020, 132: No.106355. 10.1016/j.optlastec.2020.106355 |
8 | HUANG L Q, CAI S T, XIAO M Q, et al. A simple chaotic map-based image encryption system using both plaintext related permutation and diffusion[J]. Entropy, 2018, 20(7): No.535. 10.3390/e20070535 |
9 | WANG X Y, FENG L, ZHAO H Y. Fast image encryption algorithm based on parallel computing system[J]. Information Sciences, 2019, 486:340-358. 10.1016/j.ins.2019.02.049 |
10 | NOROUZI B, MIRZAKUCHAKI S, SEYEDZADEH S M, et al. A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process[J]. Multimedia Tools and Applications, 2014, 71(3):1469-1497. 10.1007/s11042-012-1292-9 |
11 | 谢国波,王添. 基于像素置乱和比特替换的混沌图像加密算法[J]. 微电子学与计算机, 2016, 33(3):80-85. 10.19304/j.cnki.issn1000-7180.2016.03.017 |
XIE G B, WANG T. A chaotic image encryption algorithm based on pixel scrambling and bit substitution[J]. Microelectronics and Computer, 2016, 33(3):80-85. 10.19304/j.cnki.issn1000-7180.2016.03.017 | |
12 | LIU L F, HAO S D, LIN J, et al. Image block encryption algorithm based on chaotic maps[J]. IET Signal Processing, 2018, 12(1): 22-30. 10.1049/iet-spr.2016.0584 |
13 | DIAB H, EL-SEMARY A M. Secure image cryptosystem with unique key streams via hyper-chaotic system[J]. Signal Processing, 2018, 142: 53-68. 10.1016/j.sigpro.2017.06.028 |
14 | 朱淑芹,王文宏,李俊青. 对像素置乱和比特替换混沌图像算法的破解[J]. 计算机应用, 2017, 37(S2):44-47. |
ZHU S Q, WANG W H, LI J Q. Breaking a chaotic image encryption algorithm based on pixel scrambling and bit substitution[J]. Journal of Computer Applications, 2017, 37(S2):44-47. | |
15 | MA Y L, LI C Q, OU B. Cryptanalysis of an image block encryption algorithm based on chaotic maps[J]. Journal of Information Security and Applications, 2020, 54: No.102566. 10.1016/j.jisa.2020.102566 |
16 | ENAYATIFAR R, ABDULLAH A H, ISNIN I F, et al. Image encryption using a synchronous permutation-diffusion technique[J]. Optics and Lasers in Engineering, 2017, 90:146-154. 10.1016/j.optlaseng.2016.10.006 |
17 | HUANG L Q, CAI S T, XIONG X M, et al. On symmetric color image encryption system with permutation-diffusion simultaneous operation[J]. Optics and Lasers in Engineering, 2019, 115:7-20. 10.1016/j.optlaseng.2018.11.015 |
18 | CHEN L, CHEN J X, MA L S, et al. Cryptanalysis of a chaotic image cipher based on plaintext-related permutation and lookup table[J]. Nonlinear Dynamics, 2020, 100(4):3959-3978. 10.1007/s11071-020-05735-y |
19 | CHEN J X, CHEN L, ZHOU Y C. Cryptanalysis of image ciphers with permutation-substitution network and chaos[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2021, 31(6):2494-2508. 10.1109/tcsvt.2020.3021908 |
20 | HUA Z Y, YI S, ZHOU Y C. Medical image encryption using high-speed scrambling and pixel adaptive diffusion[J]. Signal Processing, 2018, 144: 133-144. 10.1016/j.sigpro.2017.10.004 |
[1] | Wentao JIANG, Wanxuan LI, Shengchong ZHANG. Correlation filtering based target tracking with nonlinear temporal consistency [J]. Journal of Computer Applications, 2024, 44(8): 2558-2570. |
[2] | Ying HU, Zhihuan CHEN. Trajectory tracking control of wheeled mobile robots under side-slip and slip [J]. Journal of Computer Applications, 2024, 44(7): 2294-2300. |
[3] | Qingyu YUAN, Tiegang GAO. Reversible information hiding based on pixel prediction and secret image sharing [J]. Journal of Computer Applications, 2024, 44(3): 780-787. |
[4] | Zhenyu LIU, Chaokun WANG, Gaoyang GUO. Parallel algorithm of betweenness centrality for dynamic networks [J]. Journal of Computer Applications, 2023, 43(7): 1987-1993. |
[5] | Jinwei PU, Qingjian GAO, Xin ZHENG, Yinghui XU. SM4 resistant differential power analysis lightweight threshold implementation [J]. Journal of Computer Applications, 2023, 43(11): 3490-3496. |
[6] | Xiangyu LUO, Ke YAN, Yan LU, Tian WANG, Gang XIN. Nonuniform time slicing method based on prediction of community variance [J]. Journal of Computer Applications, 2023, 43(11): 3457-3463. |
[7] | Shanshan HUO, Yanjun LI, Jian LIU, Yinshuang LI. Design and implementation of cipher component security criteria testing tool [J]. Journal of Computer Applications, 2023, 43(10): 3156-3161. |
[8] | Jingwen CAI, Yongzhuang WEI, Zhenghong LIU. GPU-based method for evaluating algebraic properties of cryptographic S-boxes [J]. Journal of Computer Applications, 2022, 42(9): 2750-2756. |
[9] | Xiangyu ZHANG, Yang YANG, Guohui FENG, Chuan QIN. Reversible data hiding in encrypted image based on multi-objective optimization [J]. Journal of Computer Applications, 2022, 42(6): 1716-1723. |
[10] | Guifang QIAO, Shouming HOU, Yanyan LIU. Facial expression recognition algorithm based on combination of improved convolutional neural network and support vector machine [J]. Journal of Computer Applications, 2022, 42(4): 1253-1259. |
[11] | Yang ZHONG, Renwan BI, Xishan YAN, Zuobin YING, Jinbo XIONG. Efficient homomorphic neural network supporting privacy-preserving training [J]. Journal of Computer Applications, 2022, 42(12): 3792-3800. |
[12] | Lingzhao WANG, Runhe QIU. Joint optimization method of full-duplex cognitive relay network based on nonlinear energy harvesting [J]. Journal of Computer Applications, 2022, 42(10): 3130-3139. |
[13] | Yuxian DUAN, Changyun LIU. Sparrow search algorithm based on Sobol sequence and crisscross strategy [J]. Journal of Computer Applications, 2022, 42(1): 36-43. |
[14] | TANG Andi, HAN Tong, XU Dengwu, XIE lei. Chaotic elite Harris hawks optimization algorithm [J]. Journal of Computer Applications, 2021, 41(8): 2265-2272. |
[15] | WANG Huai, WANG Zhanqing. Nonlinear constraint based quasi-homography warps for image stitching [J]. Journal of Computer Applications, 2021, 41(8): 2318-2323. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||