[go: up one dir, main page]

CN114362918B - Image encryption method based on central law and three-dimensional bit plane - Google Patents

Image encryption method based on central law and three-dimensional bit plane Download PDF

Info

Publication number
CN114362918B
CN114362918B CN202210030022.7A CN202210030022A CN114362918B CN 114362918 B CN114362918 B CN 114362918B CN 202210030022 A CN202210030022 A CN 202210030022A CN 114362918 B CN114362918 B CN 114362918B
Authority
CN
China
Prior art keywords
bit plane
dimensional
matrix
rna
dimensional matrix
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210030022.7A
Other languages
Chinese (zh)
Other versions
CN114362918A (en
Inventor
张晓强
田婧希
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China University of Mining and Technology CUMT
Original Assignee
China University of Mining and Technology CUMT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China University of Mining and Technology CUMT filed Critical China University of Mining and Technology CUMT
Priority to CN202210030022.7A priority Critical patent/CN114362918B/en
Publication of CN114362918A publication Critical patent/CN114362918A/en
Application granted granted Critical
Publication of CN114362918B publication Critical patent/CN114362918B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Complex Calculations (AREA)

Abstract

A large number of images are generated and distributed throughout the various fields each day. In order to protect image information from being stolen in the network transmission process, an image encryption method based on a genetic center rule and a three-dimensional bit plane is provided. The invention simulates a genetic center rule and defines a three-dimensional bit plane. Firstly, converting an original image into an 8-bit binary image and converting the 8-bit binary image into a standard three-dimensional matrix; secondly, replacing the three-dimensional matrix by rotating bit planes and replacing between the bit planes; thirdly, coding a chaotic three-dimensional matrix into a DNA code, introducing RNA mutation by simulating a genetic center rule, and combining with chaos to realize diffusion; finally, an encrypted image is obtained by an RNA decoding operation. Experimental results and method analysis show that the method has strong safety and good performance.

Description

Image encryption method based on central rule and three-dimensional bit plane
Technical Field
The present invention relates to an information encryption technology, and in particular, to an image encryption method.
Background
In recent years, security problems of networks and information systems have been increasingly emphasized, and images have become important information carriers in daily life of people. It can intuitively and vividly transmit a large amount of information and is widely applied to the fields of communication, military and medical treatment. However, due to the openness of the internet, information is easily intercepted or leaked during network transmission. Data hiding and image encryption are common methods of maintaining image security, but the former suffers from some limitations due to insufficient embedding capability, in contrast to image encryption which can effectively protect images. Therefore, how to encrypt an image effectively and securely becomes very important.
Because the image has the characteristics of large data capacity and high correlation between pixels and data redundancy, the traditional data encryption algorithm cannot encrypt the digital image. In recent years, various encryption methods based on chaos have been proposed, such as chaos-based image encryption, compressed sensing-based image encryption, genetic algorithm-based image encryption. With the advent of the big data age, the network information transmission capability is improved, and the requirements on the efficiency and the security of the encryption method are further improved.
In order to protect image information from being stolen and improve the security and efficiency of encryption in the network transmission process, an image encryption method based on a central rule and a three-dimensional bit plane is provided. The method simulates a central rule, defines a three-dimensional bit plane and improves the safety and the high efficiency of the encryption process.
Disclosure of Invention
The purpose of the invention is that: in order to protect image information from being stolen and improve the security and efficiency of encryption in the network transmission process, an image encryption method based on a central rule and a three-dimensional bit plane is provided.
The technical scheme of the invention is as follows: in order to achieve the aim of the invention, the adopted technical scheme is an image encryption method based on a central rule and a three-dimensional bit plane, and the encryption steps are detailed as follows:
Step 1: constructing a three-dimensional matrix: the interactive image is I, the size is m multiplied by n, each pixel value in the I is converted into an 8-bit binary value, and the I can be constructed into a three-dimensional matrix C multiplied by d by C= [ C ij],cij =0 or 1 through zero padding operation, wherein d is a positive integer, d 3 is more than or equal to 8mn, and d takes the smallest value;
step 2: generating a key: calculating 256-bit hash value K of I by using SHA-256 secure hash algorithm, dividing the 256-bit hash value K into blocks according to 8 bits, obtaining K=k 1, k2,…, k32, randomly selecting c 1, c2, c3, c4, c5, c6 as external key input, and calculating an initial value u 0,v0 and a control parameter mu of a two-dimensional Logistic adjustment Sine Map (Two Dimension Logistic-Adjusted-Sine Map, 2D-LASM) shown in formula (4) and an initial value x 0, y0, z0 and control parameters a, b and c of a three-dimensional Sine chaotic system shown in formula (5) by using a key generator shown in formulas (1) - (3); u 0, v0,μ, x0, y0, z0, a, b, c are keys;
, (1)
Wherein ∈ represents an exclusive or operation;
, (2)
, (3)
Wherein mod ()' represents a modulo operation;
, (4)
Wherein μ ε [0, 1] is the control parameter, u 0, v0 ε (0, 1) is the initial value;
, (5)
wherein a, b, c epsilon [1, 4] is a control parameter, x 0, y0, z0 epsilon [0,1] is an initial value;
Step 3: generating a chaotic sequence: according to the initial value X 0, y0, z0 and the control parameters a, b and c, iterating the three-dimensional Sine chaotic system 1000+d times shown in the formula (5), discarding the previous 1000 iteration values, and generating 3 chaotic sequences X, Y and Z with the lengths d; according to the initial value U 0,v0 and the control parameter mu, 2D-LASM1000+d 3/2 times shown in the iterative formula (4), discarding the previous 1000 iterative values, and generating 2 chaotic sequences U and V with the lengths of D 3/2;
step 4: three-dimensional bit plane scrambling: three-dimensional bit plane sets of C are respectively scrambled by using X, Y and Z, wherein the three-dimensional bit plane sets comprise an X bit plane set P x={px (i), a Y bit plane set P y={py (i) and a Z bit plane set P z={pz (i), and a three-dimensional scrambling matrix P 6 can be finally obtained; the specific operation is as follows: using X and formulas (6) - (9), rotating and scrambling P x={px (i),
[X1, S1]=sort(x(i)),i=1, 2,…, d, (6)
T1=mod(floor(x(i)×1016), 4)×90, (7)
Wherein, sort (-) is an ascending sort function, floor (-) is a downward rounding function, X (i) ∈x, X 1 is a new sequence after sorting, S 1 is an index value of X 1;
P1(i, :, :)=imrotate(C(i, :, :), t1(i)),i=1, 2,…, d, (8)
Wherein imrotatet ()' is a rotation function, C (i,:) is the ith X bit plane of C, t 1(i)∈T1 is the rotation angle value of the bit plane, t 1 (i) takes the value of 0 degrees, 90 degrees, 180 degrees or 270 degrees, and P 1 (i,:) is the ith X bit plane of the three-dimensional matrix P 1;
P2(i, :, :)=P1(s1(i), :, :),i=1, 2,…, d, (9)
wherein s 1(i)∈S1,P2 (i,:) is the ith X-bit plane of the three-dimensional matrix P 2;
using Y and formulas (10) - (13), rotate and scramble P y={py (i) },
[Y1, S2]=sort(y(i)),i=1, 2,…, d, (10)
T2=mod(floor(y(i)×1016), 4)×90, (11)
Wherein Y (i) ∈y, Y 1 is the new sequence after sorting, S 2 is the index value of Y 1;
P3(:, i, :)=imrotate(P2(:, i, :), t2(i)),i=1, 2,…, d, (12)
Wherein P 2 (: i,:) is the ith Y-bit plane of the three-dimensional matrix P 2, and t 2(i)∈T2,P3 (: i,:) is the ith Y-bit plane of the three-dimensional matrix P 3;
P4(:, i, :)=P3(:, s2(i), :),i=1, 2,…, d, (13)
Wherein s 2(i)∈S2,P4 (: i,:) is the ith Y-bit plane of the three-dimensional matrix P 4;
Using Z and equations (14) - (17), rotate and scramble P z={pz (i) },
[Z1, S3]=sort(z(i)),i=1, 2,…, d, (14)
T3=mod(floor(z(i)×1016), 4)×90, (15)
Wherein Z (i) ∈z, Z 1 is the new sequence after ordering, S 3 is the index value of Z 1;
P5(:, :, i)=imrotate(P4(:, :, i), t3(i)),i=1, 2,…, d, (16)
Wherein P 4 (: i) is the ith Z-bit plane of the three-dimensional matrix P 4, and t 3(i)∈T3,P5 (: i) is the ith Z-bit plane of the three-dimensional matrix P 5;
P6(:, :, i)=P5(:, :, s3(i)),i=1, 2,…, d, (17)
Wherein s 3(i)∈S3,P6 (: i) is the ith Z bit plane of the three-dimensional matrix P 6;
step 5: DNA coding: the DNA coding rules are as follows:
And (3) calculating:
li=mod(sum(P6(i, :, :), 8),i=1, 2,…, d, (18)
wherein P 6 (i,:)) is the ith X bit plane of the three-dimensional matrix P 6, sum is a summation function, and the ith X bit plane of P 6 is encoded according to the first i encoding rules in the DNA encoding rules, so as to obtain a three-dimensional DNA encoding matrix P 7 with the size of d/2X d;
step 6: transcription of DNA: the DNA transcription rules are:
According to the DNA transcription rule, P 7 is transcribed to obtain a three-dimensional RNA matrix P 8 with the size of d/2×d×d;
step 7: RNA variation: the RNA mutation rule is as follows:
u is integer by means of formula (19),
U1=floor(mod(U×1016, 4), (19)
U 1 is an integer chaotic sequence, the value of which is 0,1,2 or 3, corresponds to four modes of RNA variation, and converts U 1 into a matrix U 2 with the size of d/2 x d according to a certain rule; RNA variation was performed on P 8 using U 2 and equation (20),
P9(w1, w2, w3)=Mutation(P8(w1, w2, w3), U2(w1, w2, w3)), (20)
Wherein w 1=1, 2,…, d/2,w2=1, 2,…, d,w3 =1, 2, …, d, mutation (x, y) indicates that the base x is mutated according to the y-th Mutation mode of the RNA Mutation rule, so as to obtain an RNA Mutation matrix P 9 with the size of d/2×d×d;
step 8: RNA translation: the RNA translation rules are:
According to the RNA translation rule, translating the P 9 to obtain a three-dimensional matrix P 10 with the size of d/2 multiplied by d;
Step 9: RNA calculation: the RNA encoding rule is:
The RNA exclusive OR rule is:
The first d 2/8 elements of V are selected to form a chaotic subsequence V 1, V 1 is integer by using a formula (21),
V2=floor(mod(V1×1016, 256), (21)
Wherein V 2 is the generated integer chaotic sequence; v 2 is encoded according to the 1 st RNA encoding rule, so that a two-dimensional RNA matrix V 3 with the size of d 2/8 multiplied by 4 can be obtained; according to a certain rule, V 3 is converted into a matrix V 4 with the size of d/2 x d; performing a diffusion operation as shown in formula (22) to obtain a diffusion matrix P 11 with a size of d/2×d×d;
, (22)
wherein ☉ denotes an RNA exclusive OR operation, P 10 (j:) is the j-th X-bit plane of the three-dimensional matrix P 10, and P 11 (j:) is the j-th X-bit plane of the three-dimensional matrix P 11;
step 10: and (3) RNA decoding: the RNA decoding rules are:
And (3) calculating:
ri=mod(sum(P11(:, :, i), 8),i=1, 2,…, d, (23)
Wherein P 11 (: i) is the ith Z bit plane of the three-dimensional matrix P 11; decoding the ith Z bit plane of P 11 according to the r i decoding rules in the RNA decoding rules to obtain a decoding matrix C p with the size of d multiplied by d; and (3) removing zero elements added in the step (1) in the matrix, and converting 8-bit binary values in the matrix into decimal pixel values to obtain an encryption image E with the size of m multiplied by n.
In the decryption process, the same chaotic sequence is used for decrypting the encrypted image, so that the original image can be restored, and the decryption process is the inverse process of the encryption process.
The beneficial effects are that: in order to protect image information from being stolen and improve the security and efficiency of encryption in the network transmission process, an image encryption method based on a central rule and a three-dimensional bit plane is provided, and the following five points are mainly contributed: (1) Three-dimensional bit planes are defined, a three-dimensional scrambling mode is designed, and a plurality of bit planes can be scrambled synchronously; (2) Generating an initial value and a control parameter of the chaotic system by the SHA-256 hash value of the plaintext image and the external parameter; (3) The central rule including DNA coding, transcription, translation and amino acid synthesis is simulated, so that the image encryption is tightly combined with the biological genetic process; (4) Introducing RNA mutation in the encryption process, simulating the mutation process in the nature, and further improving the safety of the encryption method by mutation mode and position randomness, and combining RNA operation with the RNA matrix generated by chaos to realize further diffusion; (5) Experimental results and method analysis verify the feasibility and safety of the proposed method.
Drawings
Fig. 1: an encryption flow chart;
Fig. 2: an original image;
fig. 3: the image is encrypted.
Detailed Description
The practice of the invention is described in further detail below with reference to the attached drawings and examples.
Fig. 1 is an encryption flow chart of the present method.
The programming software used was Matlab R2016a and the Lena gray scale image of size 512 x 512 shown in fig. 2 was selected as the subject.
Step 1: constructing a three-dimensional matrix: inputting 1 image of Lena gray scale with size 512×512 as plaintext image I, converting each pixel value in I into 8-bit binary value, by means of the zero-filling operation, I can be constructed to be 128X 128 in size x 128 three-dimensional matrix c= [ C ij],cij =0 or 1.
Step 2: generating a key: calculating 256-bit hash value K of I by using SHA-256 secure hash algorithm, dividing the hash value K into blocks according to 8 bits to obtain K=k 1, k2,…, k32, selecting c1=0.6723,c2=0.1839,c3=0.2343,c4=0.0928,c5=0.5623,c6=0.2613 as external key input, and calculating initial value u 0, v0 of 2D-LASM and control parameter mu, and initial value x 0, y0, z0 of the three-dimensional Sine chaotic system and control parameters a, b and c by using a key generator.
Step 3: generating a chaotic sequence: according to the initial value X 0, y0, z0 and the control parameters a, b and c, iterating the three-dimensional Sine chaotic system 1128 times, and discarding the previous 1000 iteration values, 3 chaotic sequences X, Y and Z with the lengths of 128 can be generated; according to the initial value U 0,v0 and the control parameter mu, 2D-LASM1049576 times are iterated, and the previous 1000 iteration values are discarded, so that 2 chaotic sequences U and V with the lengths of 1048576 can be generated.
Step 4: three-dimensional bit plane scrambling: three-dimensional bit plane sets of C, including X bit plane set P x={px (i), Y bit plane set P y={py (i) and Z bit plane set P z={pz (i), are scrambled with X, Y and Z, respectively, to finally obtain a three-dimensional scrambling matrix P 6.
Step 5: DNA coding: by using the formula (18), the ith X bit plane of P 6 is encoded according to the first i coding rules in the DNA coding rules, so as to obtain a three-dimensional DNA coding matrix P 7 with the size of 64×128×128.
Step 6: transcription of DNA: according to the DNA transcription rule, P 7 is transcribed to obtain a three-dimensional RNA matrix P 8 with the size of 64×128×128.
Step 7: RNA variation: u 1 is an integer chaotic sequence of U, the value of U is 0,1,2 or 3, and the four modes correspond to RNA variation; according to a certain rule, U 1 is converted into a matrix U 2 with the size of 64 multiplied by 128, and RNA mutation is carried out on P 8 by using U 2, so that an RNA mutation matrix P 9 with the size of 64 multiplied by 128 can be obtained.
Step 8: RNA translation: according to the RNA translation rule, P 9 is translated to obtain a three-dimensional matrix P 10 with the size of 64 multiplied by 128.
Step 9: RNA calculation: the first 2048 elements of V are selected to form an integer chaotic sequence with a chaotic subsequence V 1,V2 being V 1; v 2 is encoded according to the 1 st RNA encoding rule, so that a two-dimensional RNA matrix V 3 with the size of 2048 multiplied by 4 can be obtained; according to a certain rule, V 3 is converted into a matrix V 4 with the size of 64 multiplied by 128; the diffusion operation is performed on P 10 by using V 4, and a diffusion matrix P 11 with a size of 64×128×128 can be obtained.
Step 10: and (3) RNA decoding: according to the (i) th decoding rule of the RNA decoding rules by using the formula (23), decoding the ith Z bit plane of P 11, a size of 128×128 can be obtained a decoding matrix C p of x 128; the zero elements added in step 1 in the matrix are removed, and the 8-bit binary values in the matrix are converted into decimal pixel values, so that an encrypted image E with the size of 512×512 can be obtained, as shown in fig. 3.
In the decryption process, the same chaotic sequence is utilized to decrypt the encrypted image E, so that the original image can be restored, and the decryption process is the inverse process of the encryption process.

Claims (2)

1.基于中心法则和三维位平面的图像加密方法,其特征在于,包括如下步骤:1. An image encryption method based on the central law and a three-dimensional bit plane, characterized in that it comprises the following steps: 步骤1:构建三维矩阵:令交互图像为I,大小为m×n,将I中每个像素值都转换为8位二进制值,通过补零操作,可将I构建成一个大小为d×d×d的三维矩阵C=[c ij ],c ij =0或1,其中d为正整数,满足d 3≥8mn,且d取值最小;Step 1: Construct a three-dimensional matrix: Let the interactive image be I with a size of m × n . Convert each pixel value in I into an 8-bit binary value. Through the zero-filling operation, I can be constructed into a three-dimensional matrix C = [ c ij ] with a size of d × d × d , where c ij = 0 or 1, where d is a positive integer that satisfies d 3 ≥ 8 mn and d takes the minimum value. 步骤2:生成密钥:利用SHA-256安全散列算法,计算I的256位哈希值K,将其按照每8位划分成块,可得K=k 1, k 2,…, k 32,并随机选取c 1, c 2, c 3, c 4, c 5, c 6作为外部密钥输入,利用公式(1)-(3)所示的密钥生成器,计算公式(4)所示的二维Logistic调整正弦映射(TwoDimension Logistic-Adjusted-Sine Map,2D-LASM)的初始值u 0v 0和控制参数μ,以及公式(5)所示的三维Sine混沌系统的初始值x 0, y 0, z 0和控制参数a, b, cu 0, v 0,μ, x 0, y 0,z 0, a, b, c为密钥;Step 2: Generate key: Use the SHA-256 secure hash algorithm to calculate the 256 - bit hash value K of I , divide it into blocks of 8 bits each, and obtain K=k1 , k2 ,…, k32 . Randomly select c1 , c2 , c3 , c4 , c5 , c6 as external key inputs. Use the key generator shown in formulas (1)-(3) to calculate the initial values u0 , v0 and control parameters μ of the two-dimensional Logistic-Adjusted-Sine Map (2D-LASM) shown in formula (4), as well as the initial values x0, y0, z0 and control parameters a, b, c of the three - dimensional Sine chaotic system shown in formula ( 5) ; u0 , v0 , μ , x0 , y0 , z0 , a , b , c are the keys ; , (1) , (1) 其中,⊕表示异或运算;Among them, ⊕ represents the exclusive OR operation; , (2) , (2) , (3) , (3) 其中,mod(•)表示取模运算;Where, mod (•) represents the modulo operation; , (4) , (4) 其中,μ∈[0, 1]为控制参数,u 0, v 0∈(0, 1)为初始值;Among them, μ ∈[0, 1] is the control parameter, u 0 , v 0 ∈(0, 1) is the initial value; , (5) , (5) 其中,a, b, c∈[1, 4]为控制参数,x 0, y 0, z 0∈[0, 1]为初始值;Among them, a , b , c ∈[1, 4] are control parameters, x 0 , y 0 , z 0 ∈[0, 1] are initial values; 步骤3:生成混沌序列:根据初始值x 0, y 0, z 0和控制参数a, b, c迭代公式(5)所示的三维Sine混沌系统1000+d次,舍弃前1000次迭代值,可产生3个长度均为d的混沌序列XYZ;根据初始值u 0v 0和控制参数μ,迭代公式(4)所示的2D-LASM1000+d 3/2次,舍弃前1000次迭代值,可产生2个长度均为d 3/2的混沌序列UVStep 3: Generate chaotic sequences: Iterate the three-dimensional Sine chaotic system shown in formula (5) 1000+ d times according to the initial values x 0 , y 0 , z 0 and control parameters a , b , c, and discard the first 1000 iteration values to generate three chaotic sequences X , Y and Z with a length of d ; iterate the 2D-LASM shown in formula (4) 1000+ d 3 /2 times according to the initial values u 0 , v 0 and control parameters μ , and discard the first 1000 iteration values to generate two chaotic sequences U and V with a length of d 3 /2; 步骤4:三维位平面置乱:利用XYZ,分别置乱C的三维位平面集,包括X位平面集P x ={p x (i)},Y位平面集P y ={p y (i)}和Z位平面集P z ={p z (i)},最终可得三维置乱矩阵P 6;具体操作为:利用X和公式(6)-(9),旋转和置乱P x ={p x (i)},Step 4: Three-dimensional bit plane scrambling: Use X , Y and Z to scramble the three-dimensional bit plane sets of C , including the X bit plane set Px = { px ( i )}, the Y bit plane set Py = {py ( i )} and the Z bit plane set Pz = { pz ( i )}, and finally obtain the three-dimensional scrambled matrix P6 ; the specific operation is: use X and formulas (6)-(9) to rotate and scramble Px = { px ( i )}, [X 1, S 1]=sort(x(i)),i=1, 2,, d, (6)[ X 1 , S 1 ] =sort ( x ( i )), i= 1, 2, , d , (6) T 1 =mod(floor(x(i)×1016), 4)×90, (7) T 1 =mod ( floor ( x ( i )×10 16 ), 4)×90, (7) 其中,sort(•)是升序排序函数,floor(•)是向下取整函数,x(i)∈XX 1为排序后的新序列,S 1X 1的索引值;Among them, sort (•) is the ascending sorting function, floor (•) is the floor rounding function, x ( i )∈ X , X 1 is the new sequence after sorting, and S 1 is the index value of X 1 ; P 1(i, :, :)=imrotate(C(i, :, :), t 1(i)),i=1, 2,, d, (8) P 1 ( i , :, :) =imrotate ( C ( i , :, :), t 1 ( i )), i= 1, 2, , d , (8) 其中,imrotatet(•)是旋转函数,C(i, :, :)为C的第iX位平面,t 1(i)∈T 1为位平面的旋转角度值,t 1(i)取值为0°,90°,180°或270°,P 1(i, :, :)为三维矩阵P 1的第iX位平面;where imrotatet (•) is the rotation function, C ( i , :, :) is the i- th X- bit plane of C , t 1 ( i )∈ T 1 is the rotation angle value of the bit plane, t 1 ( i ) takes the value of 0°, 90°, 180° or 270°, and P 1 ( i , :, :) is the i- th X -bit plane of the three-dimensional matrix P 1 ; P 2(i, :, :)=P 1(s 1(i), :, :),i=1, 2,, d, (9) P 2 ( i , :, :) =P 1 ( s 1 ( i ), :, :), i= 1, 2, , d , (9) 其中,s 1(i)∈S 1P 2(i, :, :)为三维矩阵P 2的第iX位平面;Where, s 1 ( i )∈ S 1 , P 2 ( i , :, :) is the i- th X -plane of the three-dimensional matrix P 2 ; 利用Y和公式(10)-(13),旋转和置乱P y ={p y (i)},Using Y and formulas (10)-(13), rotate and scramble P y ={ p y ( i )}, [Y 1, S 2]=sort(y(i)),i=1, 2,, d, (10)[ Y 1 , S 2 ] =sort ( y ( i )), i= 1, 2, , d , (10) T 2 =mod(floor(y(i)×1016), 4)×90, (11) T 2 =mod ( floor ( y ( i )×10 16 ), 4)×90, (11) 其中,y(i)∈YY 1为排序后的新序列,S 2Y 1的索引值;Among them, y ( i )∈ Y , Y 1 is the new sequence after sorting, S 2 is the index value of Y 1 ; P 3(:, i, :)=imrotate(P 2(:, i, :), t 2(i)),i=1, 2,, d, (12) P 3 (:, i , :) =imrotate ( P 2 (:, i , :), t 2 ( i )), i= 1, 2, , d , (12) 其中,P 2(:, i, :)为三维矩阵P 2的第iY位平面,t 2(i)∈T 2P 3(:, i, :)为三维矩阵P 3的第iY位平面;Wherein, P 2 (:, i , :) is the i- th Y -bit plane of the three-dimensional matrix P 2 , t 2 ( i )∈ T 2 , P 3 (:, i , :) is the i- th Y -bit plane of the three-dimensional matrix P 3 ; P 4(:, i, :)=P 3(:, s 2(i), :),i=1, 2,, d, (13) P 4 (:, i , :) =P 3 (:, s 2 ( i ), :), i= 1, 2, , d , (13) 其中,s 2(i)∈S 2P 4(:, i, :)为三维矩阵P 4的第iY位平面;Where, s 2 ( i )∈ S 2 , P 4 (:, i , :) is the i- th Y -bit plane of the three-dimensional matrix P 4 ; 利用Z和公式(14)-(17),旋转和置乱P z ={p z (i)},Using Z and formulas (14)-( 17 ), rotate and scramble Pz = { pz ( i )}, [Z 1, S 3]=sort(z(i)),i=1, 2,, d, (14)[ Z 1 , S 3 ] =sort ( z ( i )), i= 1, 2, , d , (14) T 3 =mod(floor(z(i)×1016), 4)×90, (15) T 3 =mod ( floor ( z ( i )×10 16 ), 4)×90, (15) 其中,z(i)∈ZZ 1为排序后的新序列,S 3Z 1的索引值;Among them, z ( i )∈ Z , Z 1 is the new sequence after sorting, S 3 is the index value of Z 1 ; P 5(:, :, i)=imrotate(P 4(:, :, i), t 3(i)),i=1, 2,, d, (16) P 5 (:, :, i ) =imrotate ( P 4 (:, :, i ), t 3 ( i )), i= 1, 2, , d , (16) 其中,P 4(:, :, i)为三维矩阵P 4的第iZ位平面,t 3(i)∈T 3P 5(:, :, i)为三维矩阵P 5的第iZ位平面;Wherein, P 4 (:, :, i ) is the i- th Z- bit plane of the three-dimensional matrix P 4 , t 3 ( i )∈ T 3 , P 5 (:, :, i ) is the i -th Z -bit plane of the three-dimensional matrix P 5 ; P 6(:, :, i)=P 5(:, :, s 3(i)),i=1, 2,, d, (17) P 6 (:, :, i ) =P 5 (:, :, s 3 ( i )), i= 1, 2, , d , (17) 其中,s 3(i)∈S 3P 6(:, :, i)为三维矩阵P 6的第iZ位平面;Where, s 3 ( i )∈ S 3 , P 6 (:, :, i ) is the i- th Z -plane of the three-dimensional matrix P 6 ; 步骤5:DNA编码:DNA编码规则为:Step 5: DNA encoding: The DNA encoding rules are: 计算:calculate: l i =mod(sum(P 6(i, :, :), 8),i=1, 2,, d, (18) l i =mod ( sum ( P 6 ( i , :, :), 8), i= 1, 2, , d , (18) 其中,P 6(i, :, :))为三维矩阵P 6的第iX位平面,sum(•)是求和函数,根据DNA编码规则中第l i 个编码规则,对P 6的第iX位平面进行编码,可得一个大小为d/2×d×d的三维DNA编码矩阵P 7Wherein, P 6 ( i , :, :)) is the i- th X -bit plane of the three-dimensional matrix P 6 , sum (•) is the summation function, and according to the l i -th coding rule in the DNA coding rule, the i- th X- bit plane of P 6 is encoded to obtain a three-dimensional DNA coding matrix P 7 of size d /2× d × d ; 步骤6:DNA转录:DNA转录规则为:Step 6: DNA transcription: The rules of DNA transcription are: 依照DNA转录规则,对P 7进行转录,可得一个大小为d/2×d×d的三维RNA矩阵P 8According to the DNA transcription rules, P 7 is transcribed to obtain a three-dimensional RNA matrix P 8 of size d /2 × d × d ; 步骤7:RNA变异:RNA变异规则为:Step 7: RNA mutation: The RNA mutation rules are: 利用公式(19)将U整数化,Using formula (19) to convert U into an integer, U 1 =floor(mod(U×1016, 4), (19) U 1 =floor ( mod ( U ×10 16 , 4), (19) 其中,U 1为产生的整数化混沌序列,取值为0,1,2或3,对应RNA变异的四种模式,按照某种规则,将U 1转换成一个大小为d/2×d×d的矩阵U 2;利用U 2和公式(20),对P 8发生RNA变异,Among them, U 1 is the generated integer chaotic sequence, with values of 0, 1, 2 or 3, corresponding to the four modes of RNA mutation. According to a certain rule, U 1 is converted into a matrix U 2 of size d /2× d × d . Using U 2 and formula (20), RNA mutation is performed on P 8 . P 9(w 1, w 2, w 3)=Mutation(P 8(w 1, w 2, w 3), U 2(w 1, w 2, w 3)), (20) P 9 ( w 1 , w 2 , w 3 ) =Mutation ( P 8 ( w 1 , w 2 , w 3 ), U 2 ( w 1 , w 2 , w 3 )), (20) 其中,w 1 =1, 2,, d/2,w 2 =1, 2,, dw 3 =1, 2,, dMutation(x, y)表示碱基x根据RNA变异规则的第y个变异模式进行突变,可得一个大小为d/2×d×d的RNA突变矩阵P 9Wherein, w 1 = 1, 2, , d /2, w 2 = 1, 2, , d , w 3 = 1, 2, , d , Mutation ( x , y ) means that base x mutates according to the yth mutation pattern of the RNA mutation rule, and an RNA mutation matrix P 9 of size d /2× d × d can be obtained; 步骤8:RNA翻译:RNA翻译规则为:Step 8: RNA translation: The RNA translation rules are: 根据RNA翻译规则,对P 9进行翻译,可得一个大小为d/2×d×d的三维矩阵P 10According to the RNA translation rules, P 9 is translated to obtain a three-dimensional matrix P 10 of size d /2 × d × d ; 步骤9:RNA计算:RNA编码规则为:Step 9: RNA calculation: The RNA encoding rule is: RNA异或规则为:The RNA XOR rule is: 选取V的前d 2/8个元素构成混沌子序列V 1,利用公式(21)将V 1整数化,Select the first d 2 /8 elements of V to form the chaotic subsequence V 1 , and use formula (21) to integerize V 1 , V 2 =floor(mod(V 1×1016, 256), (21) V 2 =floor ( mod ( V 1 ×10 16 , 256), (21) 其中,V 2为产生的整数化混沌序列;按照第1种RNA编码规则对V 2进行编码,可得一个大小为d 2/8×4的二维RNA矩阵V 3;按照某种规则,将V 3转换成一个大小为d/2×d的矩阵V 4;执行如公式(22)所示的扩散操作,可得一个大小为d/2×d×d的扩散矩阵P 11Wherein, V 2 is the generated integer chaotic sequence; according to the first RNA encoding rule, V 2 is encoded to obtain a two-dimensional RNA matrix V 3 of size d 2 /8×4; according to a certain rule, V 3 is converted into a matrix V 4 of size d /2× d ; performing the diffusion operation shown in formula (22), a diffusion matrix P 11 of size d /2× d × d is obtained; , (22) , (twenty two) 其中,☉表示RNA异或运算,P 10(j, :, :)为三维矩阵P 10的第jX位平面,P 11(j, :, :)为三维矩阵P 11的第jX位平面;Wherein, ☉ represents RNA XOR operation, P 10 ( j , :, :) is the j -th X -bit plane of the three-dimensional matrix P 10 , and P 11 ( j , :, :) is the j -th X -bit plane of the three-dimensional matrix P 11 ; 步骤10:RNA解码:RNA解码规则为:Step 10: RNA decoding: The RNA decoding rules are: 计算:calculate: r i =mod(sum(P 11(:, :, i), 8),i=1, 2,, d, (23) r i =mod ( sum ( P 11 (:, :, i ), 8), i= 1, 2, , d , (23) 其中,P 11(:, :, i)为三维矩阵P 11的第iZ位平面;根据RNA解码规则中第r i 个解码规则,对P 11的第iZ位平面进行解码,可得一个大小为d×d×d的解码矩阵C p ;去掉矩阵中步骤1添加的零元素,将矩阵中8位二进制值转换为十进制像素值,可得一个大小为m×n的加密图像EWherein, P 11 (:, :, i ) is the i- th Z -bit plane of the three-dimensional matrix P 11 ; according to the r i- th decoding rule in the RNA decoding rule, the i - th Z -bit plane of P 11 is decoded to obtain a decoding matrix C p of size d × d × d ; the zero elements added in step 1 in the matrix are removed, and the 8-bit binary values in the matrix are converted into decimal pixel values, to obtain an encrypted image E of size m × n . 2.根据要求1所述的方法,其特征在于:所述步骤4中,三维位平面包括X位平面,Y位平面和Z位平面;其中,X位平面是由0/1构成的三维矩阵中所有第1维度X坐标值相等的元素构成的位平面;Y位平面是由0/1构成的三维矩阵中所有第2维度Y坐标值相等的元素构成的位平面;Z位平面是由0/1构成的三维矩阵中所有第3维度Z坐标值值相等的元素构成的位平面。2. The method according to claim 1, characterized in that: in step 4, the three-dimensional bit plane includes an X bit plane, a Y bit plane and a Z bit plane; wherein the X bit plane is a bit plane composed of all elements with equal X coordinate values in the first dimension in a three-dimensional matrix composed of 0/1; the Y bit plane is a bit plane composed of all elements with equal Y coordinate values in the second dimension in a three-dimensional matrix composed of 0/1; and the Z bit plane is a bit plane composed of all elements with equal Z coordinate values in the third dimension in a three-dimensional matrix composed of 0/1.
CN202210030022.7A 2022-01-12 2022-01-12 Image encryption method based on central law and three-dimensional bit plane Active CN114362918B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210030022.7A CN114362918B (en) 2022-01-12 2022-01-12 Image encryption method based on central law and three-dimensional bit plane

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210030022.7A CN114362918B (en) 2022-01-12 2022-01-12 Image encryption method based on central law and three-dimensional bit plane

Publications (2)

Publication Number Publication Date
CN114362918A CN114362918A (en) 2022-04-15
CN114362918B true CN114362918B (en) 2024-11-26

Family

ID=81108462

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210030022.7A Active CN114362918B (en) 2022-01-12 2022-01-12 Image encryption method based on central law and three-dimensional bit plane

Country Status (1)

Country Link
CN (1) CN114362918B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114938266A (en) * 2022-07-04 2022-08-23 中国矿业大学 Multi-image encryption method based on multi-directional scanning model and DNA mask operation

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111080506A (en) * 2020-01-06 2020-04-28 中国矿业大学 Multi-image encryption method based on bit plane and chaos
CN113612899A (en) * 2021-07-26 2021-11-05 中国矿业大学 Image encryption method based on RNA and pixel depth

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107392970B (en) * 2017-07-12 2020-12-04 湖北民族学院 A digital image encryption method based on bit plane and high-dimensional chaotic system
CN107610037A (en) * 2017-09-29 2018-01-19 重庆第二师范学院 A kind of image encryption method and device for merging more chaotic maps and DNA encoding
CN112422268B (en) * 2020-11-10 2021-08-20 郑州轻工业大学 An image encryption method based on block scrambling and state transition

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111080506A (en) * 2020-01-06 2020-04-28 中国矿业大学 Multi-image encryption method based on bit plane and chaos
CN113612899A (en) * 2021-07-26 2021-11-05 中国矿业大学 Image encryption method based on RNA and pixel depth

Also Published As

Publication number Publication date
CN114362918A (en) 2022-04-15

Similar Documents

Publication Publication Date Title
CN113297606B (en) Color quantum image encryption and decryption method based on multiple chaos and DNA operation
CN112422266B (en) Hyperchaotic encryption method based on Joseph traversal and bit plane reconstruction
CN1086260C (en) variable key encryption system
CN109376540B (en) An Image Encryption Method Based on Duffing Mapping and Genetic Operation
CN113225449A (en) Image encryption method based on chaos sequence and DNA coding
CN107220923B (en) Digital picture feedback encryption method based on image network
CN112202984A (en) Ciphertext domain reversible information hiding method based on error correction redundancy
CN113691362B (en) Bit plane image compression encryption method based on hyperchaotic system and DNA coding
CN112769545B (en) Image Encryption Method Based on Adjacent Pixel Joseph Transform and Mealy State Machine
CN113612899A (en) Image encryption method based on RNA and pixel depth
CN113099069B (en) Multi-image encryption method based on three-dimensional spiral model
CN113129196A (en) Image encryption method based on DNA sequence and memristor chaos
CN113132079B (en) Multi-image encryption method and decryption method
CN111865553A (en) Multi-audio encryption method based on chaos and Zigzag transform
CN117527984A (en) Image encryption method based on sine and cosine two-dimensional chaotic system
CN114362918B (en) Image encryption method based on central law and three-dimensional bit plane
CN114726497A (en) Fractal sequencing and DNA chaotic image encryption method based on multi-target mayflies optimization
Alhassan et al. Enhancing image security during transmission using residue number system and k-shuffle
CN115103080B (en) Image encryption method and system based on DNA triploid variation
CN114882893B (en) Audio encryption method based on DNA convolution
CN116318615B (en) Image encryption method and decryption method based on combination of hyperchaotic system and DNA (deoxyribonucleic acid) coding
CN112182610A (en) An image encryption method, device, equipment and storage medium
Li et al. A novel image encryption algorithm based on cellular automata and chaotic system
CN115150059B (en) Image encryption method based on RNA coding and three-dimensional dynamic S-box
CN116436589A (en) Image encryption method and decryption method based on light chaos and DNA magic cube scrambling

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant