首页 | 本学科首页   官方微博 | 高级检索  
     检索      

基于Logistic-Sine-Cosine映射的图像加密算法
引用本文:黄佳鑫,赵凯悦,李佳文,李珊珊.基于Logistic-Sine-Cosine映射的图像加密算法[J].科学技术与工程,2023,23(27):11713-11721.
作者姓名:黄佳鑫  赵凯悦  李佳文  李珊珊
作者单位:School of Information Engineering, Chang’an University
基金项目:国家自然科学基金(61402051);陕西省自然基金(2016JM6076)
摘    要:为了提高数字图像加密的速度和算法的安全性,提出了基于Fridrich框架的加密算法。通过Fisher-Yates变换置乱原始图像打破像素间的强相关性,再利用滤波器在RGB平面上进行滤波得到密文。Logistic-Sine-Cosine复合混沌系统具有良好的混沌特性,且时间复杂度低。密钥由输入参数和明文的SHA-512值共同决定,对明文高度敏感。二维滤波器扩散效果良好,其滤波器模板由明文和密钥决定并引入了伪随机像素值,在提升扩散效果的同时增强了系统抗差分攻击的能力。仿真结果表明,密文图像像素分布近似均匀、像素关联性弱、密钥空间足够大、密钥敏感性高,能够有效抵抗暴力、裁剪、差分等常见攻击,具有较高的安全性,且算法时间复杂度较低。

关 键 词:图像加密    Logistic-Sine-Cosine映射    Fisher-Yates置乱    滤波器扩散    SHA-512(secure  hash  algorithm-512)
收稿时间:2023/2/2 0:00:00
修稿时间:2023/9/12 0:00:00

Image Encryption Algorithm Based on Logistic-Sine-Cosine Mapping
Huang Jiaxin,Zhao Kaiyue,Li Jiawen,Li Shanshan.Image Encryption Algorithm Based on Logistic-Sine-Cosine Mapping[J].Science Technology and Engineering,2023,23(27):11713-11721.
Authors:Huang Jiaxin  Zhao Kaiyue  Li Jiawen  Li Shanshan
Abstract:Aiming at improving the speed and security of digital image encryption, an encryption algorithm based on the Fridrich framework is proposed. The Fisher-Yates transform is used to scramble the original image to break the strong correlation between pixels, and then the filter is used to filter the image on the RGB plane to obtain the ciphertext. Logistic-Sine-Cosine compound chaotic system has good chaotic characteristics and low time complexity. The key is determined by the input parameters and the plaintext SHA-512 value, and is highly sensitive to the plaintext. The two-dimensional filter diffuses well, its filter template is determined by plaintext and key , and pseudo random pixel value is introduced to improve the diffusion effect and enhance the system''s resistance to differential attacks at the same time. Simulation results show that the ciphertext image has an approximately uniform pixel distribution, weak pixel correlation, a large key space and high key sensitivity. The algorithm can resist common attacks such as brute force attack, cropping attack and differential attack with high security and low time complexity.
Keywords:image encryption      Logistic-Sine-Cosine mapping      Fisher-Yates scrambling      filter diffusion      SHA-512(secure hash algorithm-512)
点击此处可从《科学技术与工程》浏览原始摘要信息
点击此处可从《科学技术与工程》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号