光子学报, 2019, 48 (7): 0710002, 网络出版: 2019-07-31   

一种混合混沌虚拟光学图像加密方法

irtual Optical Image Encryption Method Based on Hybrid Chaotic System
作者单位
齐齐哈尔大学 计算机与控制工程学院, 黑龙江 齐齐哈尔 161006
摘要
用共参数的两种混沌系统生成可置换传统双随机相位编码系统中随机相位模板的新模板.将明文图像编码为相位信息, 克服原双随机相位编码系统对第一块相位模板不敏感的缺陷; 构建可产生均匀非相关随机序列的广义Fibonacci混沌系统, 生成均匀分布的相位模板进行图像加密, 提高密钥传输效率及系统对密钥的敏感性; 对一次加密得到的复值图像, 采用提取其振幅及相位的替代操作进行再加密, 解决其像素值不能通过按位“异或”进行替代的问题,使密文图像分布更均匀, 信息熵达到7.995 8, 能有效抵御统计分析攻击.在二次加密中, 将产生加密模板的混沌初值与一次加密得到的密文联系, 像素数改变率达到0.995 239, 更接近理想期望值, 增强了系统对明文的敏感性, 有效抵御选择明文攻击.仿真实验表明,该方法有效增加了密钥空间和密钥敏感性, 提高了加密系统加密效率和安全性.
Abstract
In this paper, two chaotic systems with common parameters were used to generate new templates that could replace the random phase templates of the traditional double random phase encoding system. The plaintext image was encoded as phase information to overcame the insensitivity of the first random phase template of the original traditional double random phase encoding system. A generalized Fibonacci chaotic system, which could generate uniform and unrelated random sequences, was constructed to generate evenly distributed phase templates for image encryption and improve the efficiency of key transmission and the sensitivity of the keys. The complex-valued image obtained by the first encryption was replaced by extracting its original amplitude and phase for re-encryption. Therefore the problem that the pixel values of the complex-valued image could not be substituted by bitwise-operation of "xor"was solved, and the pixel value distribution of the ciphertext image became more uniform. The entropy of information reached 7.995 8, which could effectively resist statistical analysis attacks. In the second encryption, the chaotic initial value of the encryption template was connected with the first encryption ciphertext. The number of pixels change rate of 0.995 239 was closer to the ideal expected value. The connection enhanced the sensitivity of the plaintext and the ability of the resistance to choice plaintext attack. Simulation results show that this method can effectively increase the key space and the sensitivity of the keys. Moreover the encryption efficiency and the security of the encryption system are improved effectively.
参考文献

[1] DOHERTY N F, TAJUDDIN S T. Towards a user-centric theory of value-driven information security compliance[J]. Information Technology & People,2018,31(2) :348-367.

[2] REFREGIER P, JAVIDI B. Optical image encryption based on input and Fourier plane random encoding[J]. Optical Letters, 1995, 20(7) :767-769.

[3] 彭翔, 汤红乔, 田劲东.双随机相位编码光学加密系统的唯密文攻击[J]. 物理学报, 2007, 56(5): 2629-2635.

    PENG Xiang, TANG Hong-qiao, TIAN Jin-dong. Ciphertext-only attack on double random phase encodingoptical encryption system [J]. Acta Physica Sinica, 2007, 56(5) :2629-2635.

[4] 彭翔, 张鹏,位恒政,等.双随机相位加密系统的已知明文攻击[J]. 物理学报, 2006, 55(3): 1130-1135.

    PENG Xiang, ZHANG Peng, WEI Heng-zheng, et al. Known plaintext attack on double phase encoding encryption technique [J]. Acta Physica Sinica, 2006, 55(3): 1130-1135.

[5] PENG X, ZHANG P, WEI H Z, et al. Known-plaintext attack on optical encryption based on double random phase keys [J]. Optics Letters, 2006, 31(8) :1044-1046.

[6] AZOUG S E,BOUGUEZEL S, OPTCOM J, et al. A non-linear preprocessing for opto-digital image encryption using multiple-parameter discrete fractional Fourier transform[J]. Optics Communications, 2016, 359(1):85-94.

[7] WANG Q, GUO Q, LEI L ,et al. Single-beam image encryption using spatially separated ciphertexts based on interference principle in the Fresnel domain[J]. Optics Communications, 2014, 333:151-158.

[8] 韩超, 万芮, 刘洋. 基于计算全息图的双重加密算法研究[J].中国激光, 2015, 42(9): 292-297.

    HAN Chao,WANG Rui,LIU Yang,et al. A double encryption algorithm research based on computer generated hologram [J]. Chinese Journal of Lasers, 2015, 42(9): 292-297.

[9] 曾大奎,马利红,刘健,等.基于两步正交相移干涉的振幅图像光学加密技术[J]. 光子学报, 2012, 41(1):72-76.

    ZENG Da-kui, MA Li-hong, LIU Jian, et al. Amplitude image optical encryption based on two-step-only quadrature phase-shifting interferometry[J]. Acta Photonica Sinica, 2012, 41(1):72-76.

[10] KONG D, SHEN X . Multiple-image encryption based on optical wavelet transform and multichannel fractional Fourier transform[J]. Optics & Laser Technology, 2014, 57 (4):343-349.

[11] 常杰. 基于分数傅里叶变换的双图像光学加密技术研究[D].哈尔滨:哈尔滨工程大学,2013.

    CHANG Jie .Research on double image optical encryption in the fractional fourier-domain[D].Harbin: Harbin Engineering University, 2013.

[12] 朱薇,杨庚,陈蕾,等.基于小波变换和改进双随机相位编码的多图像加密算法[J].南京邮电大学学报(自然科学版),2014,34(5):87-92.

    ZHU Wei, YANG Geng, CHEN Lei, et al. Multiple-image encryption based on wavelet transform and improved double random phase encoding[J]. Journal of Nanjing University of Posts and Telecommunications(Natural Science) ,2014,34(5):87-92.

[13] 朱薇, 杨庚, 陈蕾,等.基于混沌的改进双随机相位编码图像加密算法[J].光学学报, 2014, 34(6): 66-76.

    ZHU Wei, YANG Geng, CHEN Lei, et al. An improved image encryption algorithm based on double random phase coding and chaos[J] .Acta Optica Sinica, 2014, 34(6): 66-76.

[14] 孙杰.基于多混沌系统的双图像光学加密算法[J].光学技术,2017,43(3):279-283.

    SUN Jie.Double optical images encryption method based on chaotic systems[J].Optical Technique,2017,43(3):279-283.

[15] 曹光辉,胡凯,佟维.基于Logistic均匀分布图像置乱方法[J].物理学报,2011,60(11):133-140.

    CAO Guang-hui, HU Kai, TONG Wei.Image scrambling based on Logistic uniform distribution [J]. Acta Physica Sinica, 2011,60(11):133-140.

[16] 郭龙. 基于混沌的保密视频通信系统的研究与设计[D].广州:广东工业大学, 2015.

    GUO Long. Research and design of secure communication system based on chaos[D].Guangdong: Guangdong University of Technology, 2015.

[17] RANJEET K S,BINOD K,DILIP K S,et al. Level by level image compression-encryption algorithm based on quantum chaos map[J]. Journal of King Saud University - Computer and Information Sciences, https://doi.org/10.1016/j.jksuci.2018.05.12.

[18] ZHANG Hao, WANG Xing-yuan, WANG Si-wei, et al. Application of coupled map lattice with parameter q in image encryption[J]. Optics and Lasers in Engineering, 2017, 88: 65-74.

[19] 苏祥, 杨庚. 基于耦合锯齿混沌映射的虚拟光学加密系统[J]. 计算机技术与发展, 2014(1): 167-171.

    SU Xiang,YANG Geng. An encryption system of virtual optical lens imaging based on coupled sawtooth chaos map [J]. Computer Technology and Development, 2014,24 (1): 167-171.

[20] FARAJALLAH M, ASSAD S E, DEFORGES O. Cryptanalyzing an image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion[J].Multimedia Tools & Applications, 2018 ,18 (1):1-24.

郭媛, 许鑫, 敬世伟, 杜松英. 一种混合混沌虚拟光学图像加密方法[J]. 光子学报, 2019, 48(7): 0710002. GUO Yuan, XU Xin, JING Shi-wei, DU Song-ying. irtual Optical Image Encryption Method Based on Hybrid Chaotic System[J]. ACTA PHOTONICA SINICA, 2019, 48(7): 0710002.

本文已被 4 篇论文引用
被引统计数据来源于中国光学期刊网
引用该论文: TXT   |   EndNote

相关论文

加载中...

关于本站 Cookie 的使用提示

中国光学期刊网使用基于 cookie 的技术来更好地为您提供各项服务,点击此处了解我们的隐私策略。 如您需继续使用本网站,请您授权我们使用本地 cookie 来保存部分信息。
全站搜索
您最值得信赖的光电行业旗舰网络服务平台!