一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁添加留言。我們將盡快給您答復。謝謝您的支持!

姓名
郵箱
手機號碼
標題
留言內(nèi)容
驗證碼

基于變步長約瑟夫遍歷和DNA動態(tài)編碼的圖像加密算法

牛瑩 張勛才

?,? 張勛才. 基于變步長約瑟夫遍歷和DNA動態(tài)編碼的圖像加密算法[J]. 電子與信息學報, 2020, 42(6): 1383-1391. doi: 10.11999/JEIT190849
引用本文: ?,? 張勛才. 基于變步長約瑟夫遍歷和DNA動態(tài)編碼的圖像加密算法[J]. 電子與信息學報, 2020, 42(6): 1383-1391. doi: 10.11999/JEIT190849
Ying NIU, Xuncai ZHANG. Image Encryption Algorithm of Based on Variable Step Length Josephus Traversing and DNA Dynamic Coding[J]. Journal of Electronics & Information Technology, 2020, 42(6): 1383-1391. doi: 10.11999/JEIT190849
Citation: Ying NIU, Xuncai ZHANG. Image Encryption Algorithm of Based on Variable Step Length Josephus Traversing and DNA Dynamic Coding[J]. Journal of Electronics & Information Technology, 2020, 42(6): 1383-1391. doi: 10.11999/JEIT190849

基于變步長約瑟夫遍歷和DNA動態(tài)編碼的圖像加密算法

doi: 10.11999/JEIT190849 cstr: 32379.14.JEIT190849
基金項目: 國家自然科學基金(61602424, U1804262),河南省重點研發(fā)與推廣專項(202102210177, 192102210134)
詳細信息
    作者簡介:

    ?,摚号?,1982年生,副教授,研究方向為生物信息處理與信息安全

    張勛才:男,1981年生,副教授、研究方向為智能信息處理與優(yōu)化控制

    通訊作者:

    張勛才 zhangxuncai@pku.edu.cn

  • 中圖分類號: TP301; TN918.4

Image Encryption Algorithm of Based on Variable Step Length Josephus Traversing and DNA Dynamic Coding

Funds: The National Natural Science Foundation of China (61602424, U1804262), The Key Research and Development Program of Henan Province (202102210177, 192102210134)
  • 摘要: 數(shù)字圖像傳輸和存儲的安全問題已成為信息安全研究的熱點。該文提出一種基于變步長約瑟夫遍歷和DNA動態(tài)編碼的圖像加密方法。首先將混沌映射產(chǎn)生的隨機序列作為約瑟夫遍歷的變步長,改進約瑟夫遍歷問題,并采用改進的約瑟夫遍歷對圖像像素位置進行置亂;其次,動態(tài)選擇DNA編碼規(guī)則,對圖像像素進行DNA編碼,并與給定的DNA序列進行堿基運算;DNA編碼規(guī)則的動態(tài)選擇,很好地解決了DNA編碼規(guī)則少所帶來的安全隱患,提高了算法的安全性。最后通過密文反饋和混沌系統(tǒng)迭代來進一步增強算法的混淆和擴散特性。實驗和安全性分析結(jié)果表明,該算法不僅對密鑰的敏感性強,而且能有效抵御統(tǒng)計性分析和窮舉分析等攻擊操作。
  • 圖  1  約瑟夫置亂效果

    圖  2  加密流程圖

    圖  3  原始圖像和密文圖像

    圖  4  原始圖像和密文圖像的直方圖統(tǒng)計

    圖  5  被裁剪的密文圖像和解密圖像

    表  1  8種編碼規(guī)則

    12345678
    00AACGCGTT
    01CGAATTCG
    10GCTTAAGC
    11TTGCGCAA
    下載: 導出CSV

    表  2  異或運算規(guī)則

    XORACGT
    AACGT
    CCATG
    GGTAC
    TTGCA
    下載: 導出CSV

    表  3  加法運算規(guī)則

    ADDACGT
    AACGT
    CCGTA
    GGTAC
    TTACG
    下載: 導出CSV

    表  4  減法運算規(guī)則

    SUBACGT
    AATGC
    CCATG
    GGCAT
    TTGCA
    下載: 導出CSV

    表  5  加密密鑰敏感性(%)

    初始值NPCRUACI
    $ {x}'_{0} $+10–1099.595633.5652
    $ {y}'_{0} $+10–1099.610933.3368
    $ {z}'_{0} $+10–1099.626133.5378
    下載: 導出CSV

    表  6  密鑰的解密敏感性分析(%)

    初始值NPCRUACI
    $ {x}'_{0} $+10–1099.604834.6094
    $ {y}'_{0} $+10–1099.595634.4388
    $ {x}'_{0} $+10–1099.552934.5867
    下載: 導出CSV

    表  7  原始圖像發(fā)生微小改變時NPCR和UACI的值(%)

    圖像NPCRUACI
    Lena99.537833.3080
    Cameraman99.620933.5080
    Brain99.537533.6244
    White99.628433.8780
    下載: 導出CSV

    表  8  直方圖的χ2分布統(tǒng)計

    原始圖像χ2分布密文圖像χ2分布檢測結(jié)果
    Lena39851.3281239.0847通過
    Cameraman161271.875212.0456通過
    Brain1044635.67258.3025通過
    下載: 導出CSV

    表  9  原始圖像和密文圖像各方向的相關(guān)系數(shù)

    圖像相關(guān)系數(shù)
    原始圖像密文圖像
    水平
    方向
    垂直
    方向
    對角線
    方向
    水平
    方向
    垂直
    方向
    對角線
    方向
    Cameraman0.95400.90870.8813–0.00700.00830.0013
    Brain0.99650.99590.9942–0.00380.00510.0042
    下載: 導出CSV

    表  10  原始圖像和密文圖像的信息熵

    圖像信息熵
    原始圖像密文圖像
    Lena6.87947.9873
    Cameraman6.90467.9976
    Brain5.03297.9970
    White07.9970
    下載: 導出CSV

    表  11  Cameraman圖像遭受數(shù)據(jù)丟失攻擊后解密圖像的各項指標

    裁剪面積相關(guān)性NPCRUACI
    水平垂直對角線
    原圖0.95010.92310.901100
    1/640.91450.86890.86491.75480.6277
    1/160.80750.77540.74426.62232.3429
    1/40.46670.45070.435225.70199.0683
    下載: 導出CSV

    表  12  常用加密算法的安全性能列舉

    CameramanNPCR
    (%)
    UACI(%)信息熵相關(guān)系數(shù)
    水平垂直對角線
    文獻[18]99.598633.45617.99710.0047–0.00660.0031
    文獻[21]99.562031.1169
    文獻[19]99.604733.50507.9963–0.00740.0069–0.0191
    本文方法99.627733.57157.9971–0.00700.00830.0013
    下載: 導出CSV
  • BEHNIA S, AKHSHANI A, MAHMODI H, et al. A novel algorithm for image encryption based on mixture of chaotic maps[J]. Chaos, Solitons & Fractals, 2008, 35(2): 408–419. doi: 10.1016/j.chaos.2006.05.011
    SHANNON C E. Communication theory of secrecy systems[J]. The Bell System Technical Journal, 1949, 28(4): 656–715. doi: 10.1002/j.1538-7305.1949.tb00928.x
    ?ZKAYNAK F. Brief review on application of nonlinear dynamics in image encryption[J]. Nonlinear Dynamics, 2018, 92(2): 305–313. doi: 10.1007/s11071-018-4056-x
    CHEN G R, MAO Y B, and CHUI C K. A symmetric image encryption scheme based on 3D chaotic cat maps[J]. Chaos, Solitons & Fractals, 2004, 21(3): 749–761. doi: 10.1016/j.chaos.2003.12.022
    WANG Xinyuan, WANG Xiaojuan, ZHAO Jianfeng, et al. Chaotic encryption algorithm based on alternant of stream cipher and block cipher[J]. Nonlinear Dynamics, 2011, 63(4): 587–597. doi: 10.1007/s11071-010-9821-4
    LEIER A, RICHTER C, BANZHAF W, et al. Cryptography with DNA binary strands[J]. Biosystems, 2000, 57(1): 13–22. doi: 10.1016/S0303-2647(00)00083-6
    SHIMANOVSKY B, FENG J, and POTKONJAK M. Hiding Data in DNA[M]. PETITCOLAS F A P. Information Hiding. Berlin: Springer, 2008: 373–386. doi: 10.1007/3-540-36415-3_24.
    BONEH D, DUNWORTH C, and LIPTON R J. Breaking DES Using a Molecular Computer[M]. LIPTON R J and BAUM E B. DNA Based Computers I. Providence: American Mathematical Society, 1996: 37–65.
    GEHANI A, LABEAN T, and REIF J. DNA-based Cryptography[M]. JONOSKA N, P?UN G, and ROZENBERG G. Aspects of Molecular Computing. Berlin: Springer, 2003: 233–249. doi: 10.1007/978-3-540-24635-0_12.
    CLELLAND C T, RISCA V, BANCROFT C. Hiding messages in DNA microdots[J]. Nature, 1999, 399(6736): 533–534. doi: 10.1038/21092
    LE GOFF G C, BLUM L J, and MARQUETTE C A. Shrinking Hydrogel-DNA spots generates 3D microdots arrays[J]. Macromolecular Bioscience, 2013, 13(2): 227–233. doi: 10.1002/mabi.201200370
    WANG Yanfeng, HAN Qinqin, CUI Guangzhao, et al. Hiding messages based on DNA sequence and recombinant DNA technique[J]. IEEE Transactions on Nanotechnology, 2019, 18: 299–307. doi: 10.1109/TNANO.2019.2904842
    ZHANG Yinan, WANG Fei, CHAO Jie, et al. DNA origami cryptography for secure communication[J]. Nature Communications, 2019, 10: 5469. doi: 10.1038/s41467-019-13517-3
    NAMASUDRA S, DEVI D, KADRY S, et al. Towards DNA based data security in the cloud computing environment[J]. Computer Communications, 2020, 151: 539–547. doi: 10.1016/j.comcom.2019.12.041
    ZHANG Xuncai, ZHOU Zheng, and NIU Ying. An image encryption method based on the feistel network and dynamic DNA encoding[J]. IEEE Photonics Journal, 2018: 3901014. doi: 10.1109/JPHOT.2018.2859257
    WANG Xingyuan, ZHANG Yingqian, and ZHAO Yuanyuan. A novel image encryption scheme based on 2-D logistic map and DNA sequence operations[J]. Nonlinear Dynamics, 2015, 82(3): 1269–1280. doi: 10.1007/s11071-015-2234-7
    CHAI Xiuli, CHEN Yiran, and BROYDE Lucie. A novel chaos-based image encryption algorithm using DNA sequence operations[J]. Optics and Lasers in Engineering, 2017, 88: 197–213. doi: 10.1016/j.optlaseng.2016.08.009
    WANG Xingyuan, ZHU Xiaoqiang, and ZHANG Yingqian. An image encryption algorithm based on Josephus traversing and mixed chaotic map[J]. IEEE Access, 2018, 6: 23733–23746. doi: 10.1109/ACCESS.2018.2805847
    郭毅, 邵利平, 楊璐. 基于約瑟夫和Henon映射的比特位圖像加密算法[J]. 計算機應用研究, 2015, 32(4): 1131–1137. doi: 10.3969/j.issn.1001-3695.2015.04.041

    GUO Yi, SHAO Liping, and YANG Lu. Bit-level image encryption algorithm based on Josephus and Henon chaotic map[J]. Application Research of Computers, 2015, 32(4): 1131–1137. doi: 10.3969/j.issn.1001-3695.2015.04.041
    梁靜, 李紅菊, 趙鳳, 等. 一種構(gòu)造GC常重量DNA碼的方法[J]. 電子與信息學報, 2019, 41(10): 2423–2427. doi: 10.11999/JEIT190070

    LIANG Jing, LI Hongju, ZHAO Feng, et al. A method for constructing GC constant weight DNA codes[J]. Journal of Electronics &Information Technology, 2019, 41(10): 2423–2427. doi: 10.11999/JEIT190070
    CHAI Zongqian, LIANG Shili, HU Guorong, et al. Periodic characteristics of the Josephus ring and its application in image scrambling[J]. EURASIP Journal on Wireless Communications and Networking, 2018, 2018(1): 162. doi: 10.1186/s13638-018-1167-5
  • 加載中
圖(5) / 表(12)
計量
  • 文章訪問數(shù):  3584
  • HTML全文瀏覽量:  1140
  • PDF下載量:  171
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2019-10-31
  • 修回日期:  2020-05-03
  • 網(wǎng)絡(luò)出版日期:  2020-05-19
  • 刊出日期:  2020-06-22

目錄

    /

    返回文章
    返回