椭圆曲线与自适应DNA编码的混沌图像加密算法
Chaotic image encryption algorithm based on elliptic curve and adaptive DNA coding
- 2023年28卷第11期 页码:3428-3439
纸质出版日期: 2023-11-16
DOI: 10.11834/jig.220807
移动端阅览
浏览全部资源
扫码关注微信
纸质出版日期: 2023-11-16 ,
移动端阅览
肖定汉, 禹思敏, 王倩雪. 2023. 椭圆曲线与自适应DNA编码的混沌图像加密算法. 中国图象图形学报, 28(11):3428-3439
Xiao Dinghan, Yu Simin, Wang Qianxue. 2023. Chaotic image encryption algorithm based on elliptic curve and adaptive DNA coding. Journal of Image and Graphics, 28(11):3428-3439
目的
2
当前大多数的混沌图像加密算法采用与明文相关的对称加密方式,存在密钥冗余以及一次一密模式难以实现的问题,为此,提出一种新的椭圆曲线与自适应DNA(deoxyribonucleic acid)编码结合的混沌图像加密算法。
方法
2
算法利用椭圆曲线的公钥密码体制达成密钥共识,结合4维Lorenz超混沌系统产生共识密钥序列用于自适应DNA编码加密,在DNA编解码的扩散过程中内嵌中间密文状态反馈的动态扩散—自适应置换结构以抵抗分割攻击与选择明文攻击,加密过程的密文状态在解密端能够自适应同步,无需额外传输。
结果
2
算法的密钥空间为2
256
,足以抵抗穷举攻击。通过对多幅不同尺寸的测试图像进行仿真,比特变化率(number of bit change rate,NBCR)均接近50%,密文各方向上的相邻像素相关性均接近于0,信息熵接近理想值8,并且全部通过NIST SP800-22随机性测试以及抗差分攻击分析。其他混沌图像加密算法进行对比分析,结果表明,本文算法具有极高的实用性和安全性。
结论
2
本文算法完善了密钥冗余的问题,提高了算法的可行性,同时通过实验验证了算法的安全性,适合用于对各种尺寸的图像进行加密及相关的信息安全保障。
Objective
2
With the rapid development of computer networks, digital images, as an important part of information transmission, are also widely transmitted through the Internet. Digital images used in national administration, military defense, commercial intelligence, and other fields may contain some sensitive private information. Therefore, during its transmission, the security of an image must be considered. Chaotic systems are characterized by ergodicity, sensitivity to initial conditions, and long-term unpredictability. Therefore, many scholars use these systems in designing image encryption algorithms. To resist chosen-plaintext attacks, most traditional image encryption algorithms based on the chaotic system adopt symmetric encryption methods related to plaintext information in the process of key generation or encryption. This kind of algorithm uses the same key to encrypt and decrypt information. Before transmission, the relevant key needs to be transmitted to the receiver through a secret channel. This one-time pad mode means that the number of keys that need to be stored and transmitted increases along with the number and frequency of communications. These keys do not contain information and are redundant data that bring unnecessary burden to users. In addition, the high-frequency transmission of these keys can greatly increase the risk of exposing secret channels, thus leading to adverse effects. To solve these problems, this paper proposes a chaotic image encryption algorithm based on elliptic curve and adaptive DNA coding.
Method
2
The proposed algorithm adopts the public key cryptosystem of an elliptic curve to make the communication parties reach the key consensus without transmitting the secret private key. To reach the goal of the key consensus, the consensus element is transformed into the initial values of the improved four-dimensional hyperchaotic Lorenz system and is then combined with the four-dimensional hyperchaotic Lorenz system to generate the consensus chaotic key sequence for adaptive DNA coding encryption. This encryption process embeds dynamic diffusion and adaptive permutation structures in the diffusion process of DNA coding and decoding. The operation rules of dynamic diffusion are dynamically selected by a chaotic key sequence, and the intermediate ciphertext state is fed back in the process. Adaptive permutation reveals the characteristics of the intermediate ciphertext state, scrambles the chaotic key sequence, and then performs bit-level permutation. Therefore, this algorithm can resist segmentation and chosen-plaintext attacks. At the same time, the intermediate ciphertext state in the encryption process can be adaptively synchronized at the decryption end without additional transmission, thereby avoiding the problem of key redundancy.
Result
2
Through the simulation of three test images of different sizes, this paper tests and analyzes the security of the proposed algorithm in terms of key space, key sensitivity, adjacent pixel correlation, information entropy, NIST randomness, number of pixels change rate (NPCR), and unified averaged changed intensity (UACI). Analysis results show that the key space of the algorithm reaches 2
256
, which is sufficient to resist an exhaustive attack. The ciphertext image is extremely sensitive to the key, and a weak correlation is observed among the adjacent pixels of the ciphertext image. The information entropy of the three ciphertexts are 7.997 5, 7.999 3, and 7.999 8, which are very close to the ideal value of 8. The proposed algorithm passes all 15 sub-tests of NIST SP800-22. The test results of NPCR and UACI are also within the 0.05 confidence interval, thereby suggesting that the proposed algorithm can resist statistical and differential attacks. This algorithm is also compared with some latest chaotic image encryption algorithms. The relevant simulation tests and comparative analysis show that the chaotic image encryption algorithm has high practicability and security.
Conclusion
2
The proposed algorithm combines the public key cryptosystem and the chaotic system of an elliptic curve and improves the symmetric encryption model of the traditional chaotic image encryption algorithm into an asymmetric encryption model. The special design of this algorithm solves the problem of key redundancy, greatly improves its feasibility, and ensures its security. The security of this algorithm is verified by various experimental simulations, and the results are compared with those of other algorithms. This algorithm is suitable for encrypting privacy gray images of various sizes to ensure information and data security in the process of information communication.
图像加密椭圆曲线超混沌系统自适应DNA编码动态扩散
image encryptionelliptic curvehyperchaotic systemadaptive DNA codingdynamic diffusion
Castro J C H, Sierra J M, Seznec A, Izquierdo A and Ribagorda A. 2005. The strict avalanche criterion randomness test. Mathematics and Computers in Simulation, 68(1): 1-7 [DOI: 10.1016/j.matcom.2004.09.001http://dx.doi.org/10.1016/j.matcom.2004.09.001]
Chai X L, Bi J Q, Gan Z H, Liu X X, Zhang Y S and Chen Y R. 2020. Color image compression and encryption scheme based on compressive sensing and double random encryption strategy. Signal Processing, 176: #107684 [DOI: 10.1016/j.sigpro.2020.107684http://dx.doi.org/10.1016/j.sigpro.2020.107684]
Deng W B, Liu S, Liu F C and Huang R N. 2022. An image encryption algorithm based on compressed sensing and DNA coding. Computer Engineering and Science, 44(9): 1574-1582
邓文博, 刘帅, 刘福才, 黄茹楠. 2022. 基于压缩感知和DNA编码的图像加密算法. 计算机工程与科学, 44(9): 1574-1582 [DOI: 10.3969/j.issn.1007-130X.2022.09.007http://dx.doi.org/10.3969/j.issn.1007-130X.2022.09.007]
Fridrich J. 1998. Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos, 8(6): 1259-1284 [DOI: 10.1142/S021812749800098Xhttp://dx.doi.org/10.1142/S021812749800098X]
Ge M and Ye R S. 2019. A novel image encryption scheme based on 3D bit matrix and chaotic map with Markov properties. Egyptian Informatics Journal, 20(1): 45-54 [DOI: 10.1016/j.eij.2018.10.001http://dx.doi.org/10.1016/j.eij.2018.10.001]
Ghadirli H M, Nodehi A and Enayatifar R. 2019. An overview of encryption algorithms in color images. Signal Processing, 164: 163-185 [DOI: 10.1016/j.sigpro.2019.06.010http://dx.doi.org/10.1016/j.sigpro.2019.06.010]
He P C, Sun K H and Zhu C X. 2021. A novel image encryption algorithm based on the delayed maps and permutation-confusion-diffusion architecture. Security and Communication Networks, 2021: #6679288 [DOI: 10.1155/2021/6679288http://dx.doi.org/10.1155/2021/6679288]
Hua Z Y, Zhou Y C and Huang H J. 2019. Cosine-transform-based chaotic system for image encryption. Information Sciences, 480: 403-419 [DOI: 10.1016/j.ins.2018.12.048http://dx.doi.org/10.1016/j.ins.2018.12.048]
Kaur G, Agarwal R and Patidar V. 2020. Chaos based multiple order optical transform for 2D image encryption. Engineering Science and Technology, an International Journal, 23(5): 998-1014 [DOI: 10.1016/j.jestch.2020.02.007http://dx.doi.org/10.1016/j.jestch.2020.02.007]
Khan J S and Ahmad J. 2019. Chaos based efficient selective image encryption. Multidimensional Systems and Signal Processing, 30(2): 943-961 [DOI: 10.1007/s11045-018-0589-xhttp://dx.doi.org/10.1007/s11045-018-0589-x]
Koblitz N, Menezes A and Vanstone S. 2000. The state of elliptic curve cryptography. Designs, Codes and Cryptography, 19(2/3): 173-193 [DOI: 10.1023/A:1008354106356http://dx.doi.org/10.1023/A:1008354106356]
Li L, Abd El-Latif A A and Niu X M. 2012. Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images. Signal Processing, 92(4): 1069-1078 [DOI: 10.1016/j.sigpro.2011.10.020http://dx.doi.org/10.1016/j.sigpro.2011.10.020]
Liang H T, Zhang G D, Hou W J, Huang P Y, Liu B and Li S L. 2021. A novel asymmetric hyperchaotic image encryption scheme based on elliptic curve cryptography. Applied Sciences, 11(12): #5691 [DOI: 10.3390/app11125691http://dx.doi.org/10.3390/app11125691]
Liang X K, Tao L M and Hu B. 2019. Image hybrid encryption based on a generalized chaotic mapping and matrix nonlinear transformation. Journal of Image and Graphics, 24(3): 325-333
梁锡坤, 陶利民, 胡斌. 2019. 一类广义混沌映射和矩阵非线性变换的图像混合加密. 中国图象图形学报, 24(3): 325-33 [DOI: 10.11834/jig.180349http://dx.doi.org/10.11834/jig.180349]
Lin R G and Li S. 2021. An image encryption scheme based on Lorenz hyperchaotic system and RSA algorithm. Security and Communication Networks, 2021: #5586959 [DOI: 10.1155/2021/5586959http://dx.doi.org/10.1155/2021/5586959]
Liu H F, Zhou X F, Liang X L and Wang L H. 2022. Image encryption algorithm based on multiple chaotic systems. Journal of Shaanxi University of Science and Technology, 40(1): 188-195
刘海峰, 周雪飞, 梁星亮, 汪丽华. 2022. 基于多混沌系统的图像加密算法. 陕西科技大学学报, 40(1): 188-195 [DOI: 10.3969/j.issn.1000-5811.2022.01.028http://dx.doi.org/10.3969/j.issn.1000-5811.2022.01.028]
Luo H B, Ge B, Wang J and Wu B. 2018. Dynamic self-feedback chaotic system image encryption based on neural network scrambling image. Journal of Image and Graphics, 23(3): 346-361
罗海波, 葛斌, 王杰, 吴波. 2018. 整合神经网络置乱图像的动态自反馈混沌系统图像加密. 中国图象图形学报, 23(3): 346-361 [DOI: 10.11834/jig.170464http://dx.doi.org/10.11834/jig.170464]
Roy M, Chakraborty S, Mali K, Roy D and Chatterjee S. 2021. A robust image encryption framework based on DNA computing and chaotic environment. Microsystem Technologies, 27(10): 3617-3627 [DOI: 10.1007/s00542-020-05120-0http://dx.doi.org/10.1007/s00542-020-05120-0]
Sasikaladevi N, Geetha K, Sriharshini K and Aruna M D. 2020. H3-hybrid multilayered hyper chaotic hyper elliptic curve based image encryption system. Optics and Laser Technology, 127: #106173 [DOI: 10.1016/j.optlastec.2020.106173http://dx.doi.org/10.1016/j.optlastec.2020.106173]
Tao S, Tang C and Lei Z K. 2020. Image encryption based on vector decomposition and chaotic random phase mask. Laser and Optoelectronics Progress, 57(4): #041002
陶珊, 唐晨, 雷振坤. 2020. 基于矢量分解和混沌随机相位掩模的图像加密. 激光与光电子学进展, 57(4): #041002 [DOI: 10.3788/LOP57.041002http://dx.doi.org/10.3788/LOP57.041002]
Wang Q X, Yu S M, Guyeux C, Bahi J and Fang X L. 2015. Study on a new chaotic bitwise dynamical system and its FPGA implementation. Chinese Physics B, 24(6): #060503 [DOI: 10.1088/1674-1056/24/6/060503http://dx.doi.org/10.1088/1674-1056/24/6/060503]
Wang X Y, Zhang J J, Zhang F C and Cao G H. 2019. New chaotical image encryption algorithm based on Fisher-Yatess scrambling and DNA coding. Chinese Physics B, 28(4): #040504 [DOI: 10.1088/1674-1056/28/4/040504http://dx.doi.org/10.1088/1674-1056/28/4/040504]
Xu Q Y, Sun K H, Cao C and Zhu C X. 2019. A fast image encryption algorithm based on compressive sensing and hyperchaotic map. Optics and Lasers in Engineering, 121: 203-214 [DOI: 10.1016/j.optlaseng.2019.04.011http://dx.doi.org/10.1016/j.optlaseng.2019.04.011]
Yang Y, Wang L D, Duan S K and Luo L. 2021. Dynamical analysis and image encryption application of a novel memristive hyperchaotic system. Optics and Laser Technology, 133: #106553 [DOI: 10.1016/j.optlastec.2020.106553http://dx.doi.org/10.1016/j.optlastec.2020.106553]
Yang Y G and Pei S K. 2022. Image encryption algorithm based on double chaotic system and DNA encoding. Journal of Anhui University (Natural Science Edition), 46(5): 37-49
杨宇光, 裴帅康. 2022. 基于双混沌系统和DNA编码的图像加密算法. 安徽大学学报(自然科学版), 46(5): 37-49 [DOI: 10.3969/j.issn.1000-2162.2022.05.006http://dx.doi.org/10.3969/j.issn.1000-2162.2022.05.006]
Ye G D, Liu M and Wu M F. 2022. Double image encryption algorithm based on compressive sensing and elliptic curve. Alexandria Engineering Journal, 61(9): 6785-6795 [DOI: 10.1016/j.aej.2021.12.023http://dx.doi.org/10.1016/j.aej.2021.12.023]
Yu S M, Lü J H and Li C Q. 2016. Some progresses of chaotic cipher and its applications in multimedia secure communications. Journal of Electronics and Information Technology, 38(3): 735-752
禹思敏, 吕金虎, 李澄清. 2016. 混沌密码及其在多媒体保密通信中应用的进展. 电子与信息学报, 38(3): 735-752 [DOI: 10.11999/JEIT151356http://dx.doi.org/10.11999/JEIT151356]
Zhou H, Xie H W, Zhang H and Zhang H T. 2021. Parallel remote sensing image encryption algorithm based on chaotic map and DNA encoding. Journal of Image and Graphics, 26(5): 1081-1094
周辉, 谢红薇, 张昊, 张慧婷. 2021. 混沌系统和DNA编码的并行遥感图像加密算法. 中国图象图形学报, 26(5): 1081-1094 [DOI: 10.11834/jig.200344http://dx.doi.org/10.11834/jig.200344]
相关作者
相关机构