期刊文献+

整合ChaCha20哈希运算的分块扩散自适应图像加密算法 被引量:7

Adaptive image encryption algorithm of blocking diffusion based on the ChaCha20 hash operation
原文传递
导出
摘要 目的针对数字图像网络传输安全性和混沌加密算法自适应差的问题,提出一种基于ChaCha20哈希运算的分块扩散自适应图像加密算法(BDCH)。方法 BDCH算法首先通过分段线性混沌映射(PWLCM)产生的混沌序列填充明文图像,使其成为方形图像;其次,利用初始输入密钥及明文图像总和,通过ChaCha20哈希运算生成8×8的初始哈希矩阵,并与PWLCM混沌映射生成的伪随机序列作用,联合产生哈希密钥矩阵,PWLCM的迭代初值选取为初始密钥矩阵均值、初始密钥及明文图像归一化均值;然后,利用Arnold和PWLCM映射同步置乱扩散整幅图像,并分成互不重叠的8×8大小图像块;最后,采用哈希密钥矩阵对图像块进行两轮扩散,完成图像加密。结果灰度及彩色图像的计算机仿真与性能分析表明,BDCH算法的信息熵、峰值性噪比、密钥敏感性指标优于其他加密算法,并且解决了直接使用初始哈希矩阵会产生的弱密钥问题,密钥空间大。结论结合同步置乱扩散和哈希密钥矩阵非线性分块扩散的BDCH算法可有效抵抗各种攻击,安全性高、自适应性强,适合各种类型的灰度及彩色图像加密,潜在应用价值大。 Objective Along with the rapid development of network technology, digital images, as the main carriers of infor- mation expression, have been widely used in commercial, economic, aerospace, military, defense, and other fields. How- ever, they entail the risk of information leakage in image storage and transmission. The security problem of image data must be solved effectively. Moreover, some image algorithms have poor self-adaptability and weak keys. This paper proposes an adaptive encryption algorithm of blocking diffusion based on the ChaCha20 hash operation (BDCH) to solve these issues. Method First, BDCH translates a plain image into a square image by filling the chaotic sequences that are generated using a piece wise linear chaotic map (PWLCM). Second, a 512-bit initial key and the sum of plain-image pixels are used as in- put tothe ChaCha2 hash operation to generatean initial 8 × 8 hash matrix. The matrix is then combined with a chaotic se- quence through a PWLCM map, whose inputs consist ofthe average of the initial hash matrix, initial key, and normalized average of plainimage pixels to form an 8 × 8 hash key matrix. Third, permutation and diffusion are simultaneously imple- mented on the whole image using an Arnold map and PWLCM. The image is then segmented into an 8 × 8 array of non-o- verlapping blocks. In the end, the hash key matrix is used to diffuse the blocks with two rounds and to finish the encryption process. Result The BDCH algorithm can solve the issue of weak keys by co-producing a hash key matrix using the initial hash matrix and the PWLCM chaotic sequences, thereby increasing the key space. Plain-image information is also a part of the input keys of ChaCha20, Arnold map, and PWLCM chaotic map, thereby enhancing self-adaptability and plain text sensitivity. The simulation results and performance analysis on seven gray and color images show that the BDCH algorithm achieves a larger key space, higher sensitivity to both key and plainimages, and faster encryption speed. Conclusion The BDCH algorithm, which combines simultaneous permutation, diffusion, and hash key matrix blocking nonlinear diffusion, can effectively resist various attacks and is suitable for all kinds of grayscale and color images.
出处 《中国图象图形学报》 CSCD 北大核心 2016年第6期698-710,共13页 Journal of Image and Graphics
基金 国家自然科学基金项目(61170134 61473232 91430111)~~
关键词 ChaCha20哈希运算 置乱 扩散 分块 图像加密 ChaCha20 hash operation permutation diffusion blocking image encryption
  • 相关文献

参考文献19

  • 1Fridrich J. Symmetric ciphers based on two-dimensional chaotic maps [ J ]. International Journal of Bifurcation and Chaos, 1998, 8(6) : 1259-1284. [ DOI: 10. 1142/S0218127498000978].
  • 2Pisarchik A N, Zanin M. Image eneryption with chaotically cou- pled chaotic maps[J]. Physica D: Nonlinear Phenomena, 2008, 237 (20) : 2638-2648. [ DOI : 10. 1016/j. physd. 2008.03. 049 ].
  • 3Patidar V, Pareek N K, Sud K K. A new substitution-diffusion based image cipher using chaotic standard and logistic maps[ J]. Communications in Nonlinear Science and Numerical Simulation, 2009, 14(7) : 3056-3075. [DOI: 10. 1016/j. cnsns. 2008.11. 005 ].
  • 4Wang Y, Wong K W, Liao X F, et al. A chaos-based image en- cryption algorithm with variable control parameters [ J ]. Chaos, Solitons& Fractals, 2009, 41 (4) : 1773-1753. [ DOI:10. 1016/ j. chaos. 2008.07. 031 ].
  • 5Huang X L, Ye G D. An efficient self-adaptive model for chaotic image encryption algorithm [ J ]. Communications in Nonlinear Science and Numerical Simulation, 2014, 19 (12) : 4094-4104, [DOI :10. 1016/j. cnsns. 2014.04. 012].
  • 6Zhang W, Wong K W, Yu H, et al. An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion[J]. Communications in Nonlinear Science and Numeri- cal Simulation, 2013, 18(8) : 2066-2080. [DOI:10. 1016/j. cnsns. 2012.12. 012 ].
  • 7Zhang Y S, Xiao D. An image encryption scheme based on rota- tion matrix bit-level permutation and block diffusion [ J ]. Com- munications in Nonlinear Science and Numerical Simulation, 2014, 19(1) : 74-82. [DOI:10. 1016/j. cnsns. 2013. 06. 031 ].
  • 8徐亚,张绍武.基于Arnold映射的分块双层自适应扩散图像加密算法[J].中国图象图形学报,2015,20(6):740-748. 被引量:29
  • 9Arroyo D, Li S J, AmigO J M, et al. Comment on "Image en- cryption with chaotically coupled chaotic maps" [J]. Physica D: Nonlinear Phenomena, 2010, 239 (12) : 1002-1006. [ DOI : 10. 1016/j, physd. 2010.02. 010].
  • 10RhoumaR, Solak E, Belghith S. Cryptanalysis of a new substitu- tion-diffusion based image cipher [ J]. Communications in Non- linear Science and Numer/cal Simulation, 2010, 15 (7) : 1887-1892. [DOI : 10. 1016/j. ensns. 2009.07. 0071.

二级参考文献13

  • 1Zhmag W, Wong K W, Yu H, et al. An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion[ J]. Communications in Nonlinear Science and Numer- ical Simulation, 2013, 18(8) : 2066-2080.
  • 2Wena C, Wanga Q, Liub X, et al. An image encryption algo- rithm based on scrambling and chaos [ J]. Joumal of Information & Computational Science, 2013, 17(10) :5725-5733.
  • 3Pareek N K, Patidar V, Sud K K. Diffusion-substitution based gray image encryption scheme [ J ]. Digital Signal Processing, 2013, 23(3) : 894-901.
  • 4Eslami Z, Bakhshandeh A. An improvement over an image en- cryption method based on total shuffling[ J]. Optics Communi- cations, 2013, 286 : 51-55.
  • 5Zhang L Y, Hu X, Liu Y, et al. A chaotic image encryption scheme owning temp-value feedback [ J ]. Communications in Nonlinear Science and Numerical Simulation, 2014, 19 ( 10 ) :3653 -3659.
  • 6Zhou Y, Bao L, Chen C. A new 1D chaotic system for image en- cryption[J]. Signal Processing, 2014, 97: 172-182.
  • 7Ye G, Wong K W. An image encryption scheme based on time- delay and hyperehaotie system J]. Nonlinear Dynamics, 2013, 71(1-2) : 259-267.
  • 8Wang J, Jiang G P. Image scrambling and mixing encryption al- gorithm based on hyper-ehaotic system [ C ]//Proceedings of the 32nd Chinese Control Conference. Xi'an: IEEE, 2013: 459- 464.
  • 9Peng J, Jin S, Lei L, et al. Research on a novel image encryp- tion algorithm based on the hybrid of chaotic maps and DNA en- coding[ C]// Proceedings of the 12th IEEE International Con- ference on Cognitive Informaties & Cognitive Computing. New York : IEEE, 2013 : 403-408.
  • 10杨华千,廖晓峰,Kwok-Wo Wong,张伟,韦鹏程.基于SPIHT的图像加密与压缩关联算法[J].物理学报,2012,61(4):29-36. 被引量:9

共引文献28

同被引文献56

引证文献7

二级引证文献41

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部