[1]牛莹,张勋才.基于Duffing映射与遗传操作的图像加密方法[J].郑州大学学报(工学版),2019,40(04):11.[doi:10.13705/j.issn.1671-6833.2019.04.014]
 Niu Ying,Zhang Xuncai.Image Encryption Algorithm of Based on Duffing Map and Genetic Operators[J].Journal of Zhengzhou University (Engineering Science),2019,40(04):11.[doi:10.13705/j.issn.1671-6833.2019.04.014]
点击复制

基于Duffing映射与遗传操作的图像加密方法()
分享到:

《郑州大学学报(工学版)》[ISSN:1671-6833/CN:41-1339/T]

卷:
40卷
期数:
2019年04期
页码:
11
栏目:
出版日期:
2019-07-10

文章信息/Info

Title:
Image Encryption Algorithm of Based on Duffing Map and Genetic Operators
作者:
牛莹张勋才
1. 郑州轻工业学院建筑环境工程学院;2. 郑州轻工业学院电气信息工程学院
Author(s):
1. School of Architectural Environment Engineering, Zhengzhou Institute of Light Industry; 2. School of Electrical and Information Engineering, Zhengzhou Institute of Light Industry
关键词:
图像加密Duffing映射遗传操作DNA编码核酸序列库
Keywords:
image encryptionDuffing mappinggenetic manipulationDNA codeNucleic acid sequence library
DOI:
10.13705/j.issn.1671-6833.2019.04.014
文献标志码:
A
摘要:
本文提出了一种基于混沌系统和遗传操作的图像加密方案。首先,使用SHA-3算法计算明文图像的哈希值,作为混沌系统的初始值输入密钥。其次,利用混沌映射对初始条件的敏感性与伪随机性,迭代Logistic映射得到伪随机序列并生成希尔矩阵,对图像进行置乱与置换;再次,结合Duffing映射与DNA编码技术,利用遗传操作在位水平上,实现像素的选择、交叉与变异来完成像素的扩散与置乱,显著增加算法的破译难度。最后,通过与混沌序列进行双向异或运算,进一步增强算法的混淆和扩散特性。实验和安全性分析结果表明,该算法对密钥的敏感性强,能有效抵抗统计攻击和差分攻击等。具有很好的安全性和应用潜力。实现图像加密效果及性能得到显著提升.
Abstract:
In this paper, an image encryption scheme based on chaos system and genetic operation is proposed. First, the sha-3 algorithm is used to calculate the hash value of the plain-text image as the initial value of the chaotic system. Secondly, using the sensitivity of chaotic map to initial conditions and pseudo-randomness, the pseudo-random sequence generated by Logistic map generates hill matrix, and the image is scrambled and replaced. Thirdly, combining Duffing mapping and DNA coding technology, pixel selection, crossover and mutation can be realized at the level of genetic manipulation to complete pixel diffusion and scrambling, which significantly increases the difficulty of decoding the algorithm. Finally, the confusion and diffusion characteristics of the algorithm are further enhanced by bidirectional XOR with chaotic sequences. Experimental and security analysis results show that the algorithm is sensitive to key and can effectively resist statistical attack and differential attack. It has good security and application potential. The image encryption effect and performance are improved significantly.
更新日期/Last Update: 2019-07-29