Image encryption and decryption communication algorithm based on two-dimensional lag complex logistic map
11734435 · 2023-08-22
Assignee
Inventors
- Fangfang ZHANG (Shandong, CN)
- Fengying Ma (Shandong, CN)
- Maoyong Cao (Shandong, CN)
- Xue Zhang (Shandong, CN)
- Zhengfeng Li (Shandong, CN)
Cpc classification
G06F21/6209
PHYSICS
International classification
Abstract
In the field of image encryption and decryption, in order to solve the problem of small key space in the encryption process caused by low dimension of one-dimensional chaotic map and few initial values and control parameters, the present disclosure provides an image encryption and decryption communication algorithm based on two-dimensional lag complex Logistic map, which expands the variables of one-dimensional Logistic map from the real number domain to the complex number domain, improves the dimension of the mapping system, increases the number of keys, and expands the mapping range, wherein the new mapping system is more sensitive to small disturbances of initial values and parameters, which can break the strong correlation between pixels in the original image, so that the pixels of the encrypted image are uniformly distributed in the whole plane, and the features of the original image are hidden.
Claims
1. A method for image encryption based on two-dimensional lag complex Logistic map, the method being performed at a sending terminal, the method comprising the steps of: (a) reading a M×N dimensional grayscale image X to be encrypted, expressing the value of each pixel point in X by eight binary numbers, that is, dividing the value into eight bit planes; and taking the upper four-bit plane as H, and the lower four-bit plane as L, wherein each bit plane is a binary matrix of M×N; (b) taking the value range of parameter b of the two-dimensional lag complex Logistic mapping system as [1.69,2), taking parameter a as a real number that can be positive or negative, taking the values of a and b in the range, giving any initial value to the system, and iterating the system N=N.sub.0+2×M×N times, where N.sub.0∈N*, and abandoning the previous N.sub.0 iteration tracks to avoid instantaneous effect, so as to obtain four chaotic sequences x, x.sub.1, x.sub.2, x.sub.3 with length 2×M×N, where
2. The method according to claim 1, wherein the parameter of the two-dimensional lag complex Logistic mapping system is a=2, b=1.94.
3. The method according to claim 1, wherein the initial system value in step (b) is (0.2,0.4,0.1), and the initial system value in step (f) is (0.3,0.5,0.2).
4. The method according to claim 1, wherein the parameters in step (b) and step (f) are N.sub.0=250.
5. The method according to claim 1, wherein the parameter a of the two-dimensional lag complex Logistic mapping system is in the range of (−4,7].
6. A method for image decryption based on two-dimensional lag complex Logistic map corresponding to the encryption method according to claim 1, the method being performed at the receiving terminal, the method comprising the steps of: (a1) dividing the grayscale image E received from the sending terminal into eight bit planes, wherein the lower four-bit plane and the upper four-bit plane are Clow and Chigh respectively; (b1) selecting the same initial parameters and initial values as those in the image encryption communication algorithm based on the two-dimensional lag complex Logistic map according to claim 1 to iterate the system to obtain chaotic sequences: x, x.sub.1, x.sub.2, x.sub.3 and x′, x′.sub.1, x′.sub.2, x′.sub.3, position sequences: T.sub.1, T.sub.2, T.sub.3, T.sub.4, T.sub.−1, T.sub.−2, T.sub.−3, T.sub.−4, T′.sub.1, T′.sub.2, T′.sub.3, T′.sub.4, T′.sub.−1, T′.sub.−2, T′.sub.−3, T′.sub.−4, and f.sub.−1, f.sub.−2, T.sub.f1, T.sub.f2; (c1) inversely scrambling Clow by using T′.sub.−1, T′.sub.−2, T′.sub.−3, T′.sub.−4 to obtain Chow; inversely scrambling Clow and Chigh by using T.sub.f1 and T.sub.f2 to obtain clow and chigh; (d1) inversely diffusing the bit planes by the formula Hp=(chigh−f.sub.−2−Clow) mod 2 to obtain the bit plane Hp, and then inversely scrambling Hp using T′.sub.1, T′.sub.2, T′.sub.3, T′.sub.4 to obtain the upper four-bit binary value H of a plaintext image; (e1) scrambling H using the position sequence T′.sub.−1, T′.sub.−2, T′.sub.−3, T′.sub.−4 to obtain the bit plane HH; (f1) implementing inverse diffusion operation by the formula Lp=(clow−f.sub.−1−HH) mod 2 to obtain the bit plane Lp, and then inversely scrambling Lp using T.sub.1, T.sub.2, T.sub.3, T.sub.4 to obtain the lower four-bit binary image L of a plaintext image; (g1) integrating L and H to obtain a binary image P=[L;H] of a plaintext (h1) finally, restoring the pixel value of each pixel point to obtain the final grayscale image X.
7. The method according to claim 6, wherein the parameter of the two-dimensional lag complex Logistic mapping system is a=2, b=1.94.
8. The method according to claim 6, wherein the initial system value in step (b1) is (0.2,0.4,0.1), and the initial system value-in step (f1) is (0.3,0.5,0.2).
9. The method according to claim 6, wherein the parameters in step (b1) and step (f1) are N.sub.0=250.
10. The method according to claim 6, wherein the parameter a of the two-dimensional lag complex Logistic mapping system is in the range of (−4,7].
11. The method according to claim 6, wherein the initial parameter is a=2, b=1.94.
12. The method according to claim 7, wherein the initial parameter is a=2, b=1.94.
13. The method two dimensional lag complex Logistic map according to claim 8, wherein the initial parameter is a=2, b=1.94.
14. The method according to claim 9, wherein the initial parameter is a=2, b=1.94.
15. The method according to claim 10, wherein the initial parameter is a=2, b=1.94.
16. The method according to claim 6, wherein the initial values are (0.2,0.4,0.1) and (0.3,0.5,0.2), respectively.
17. The method according to claim 7, wherein the initial values are (0.2,0.4,0.1) and (0.3,0.5,0.2), respectively.
18. The method according to claim 8, wherein the initial values are (0.2,0.4,0.1) and (0.3,0.5,0.2), respectively.
19. The method according to claim 9, wherein the initial values are (0.2,0.4,0.1) and (0.3,0.5,0.2), respectively.
20. A method for image encryption and decryption based on two-dimensional lag complex Logistic map, comprising the steps of: encrypting, at the sending terminal, the grayscale image X to be encrypted by using the encryption method according to claim 1 to obtain the finally encrypted grayscale image E; transmitting, at the sending terminal, the finally encrypted grayscale image E to the receiving terminal through the wireless network; and at the receiving terminal, receiving the finally encrypted grayscale image E, and decrypting the finally encrypted grayscale image E by using the decryption method according to claim 6 to obtain the grayscale image X to be encrypted.
Description
DETAILED DESCRIPTION
(1) The technical scheme in the embodiments of the present disclosure will be described clearly and completely hereinafter. Obviously, the described embodiments are only some embodiments of the present disclosure, rather than all of the embodiments. Based on the embodiments of the present disclosure, all other embodiments obtained by those skilled in the art without paying creative labor belong to the scope of protection of the present disclosure.
(2) The present disclosure starts with one-dimensional Logistic map, expands its variables from real number domain to complex number domain, and adds an unknown parameter for amplitude modulation, thereby constructing a two-dimensional lag complex chaotic system with two unknown parameters, which is referred to as 2D-LCLM (two-dimensional lag-complex logistic map) for short, and is applied to digital image encryption communication.
(3) The expression of 2D-LCLM is shown in (1), which is evolved from the most basic Logistic map x.sub.n+1=bx.sub.n(1−x.sub.n):
(4)
(5) where w.sub.n=x.sub.n+jy.sub.n is a complex variable, z.sub.n represents a constant sequence, and a and b are both system parameters in which a is a real number and b is a positive real number. The real part and the imaginary part of w.sub.n are expanded to obtain:
(6)
(7) When 1.69≤b<2, the system is in a chaotic state, and when b≥2, the chaotic boundary crisis occurs in the system. The parameter has nothing to do with whether the system is chaotic or not, and is only used to adjust the amplitude of the mapping system.
(8) 2D-LCLM expands the variables of one-dimensional Logistic map from the real number domain to the complex number domain, improves the dimension of the mapping system, increases the number of keys and expands the mapping range, wherein the new mapping system is more sensitive to small disturbances of initial values and parameters. The parameters a and b can control the chaotic characteristics and amplitudes of the system, respectively.
(9) When applying 2D-LCLM to digital image encryption communication, the initial values and parameters of 2D-LCLM at the sending terminal are first set, the chaotic map is iterated, and the pseudo-random sequences generated by iteration are used to replace and scramble the pixels in the image, so as to break the strong correlation between adjacent pixels in the original image and realize image encryption. The encrypted image is transmitted to the receiving terminal through wireless network, and the receiving terminal sets the same chaotic initial values and parameters as the sending terminal, that is, the keys of the sending terminal and the receiving terminal are synchronized, so as to decrypt the image.
Embodiment 1
(10) An image encryption communication algorithm based on two-dimensional lag complex Logistic map comprises the steps of:
(11) S1, reading a M×N dimensional grayscale image X to be encrypted, expressing the value of each pixel point in X by eight binary numbers, that is, dividing the value into eight bit planes; and taking the upper four-bit plane as H, and the lower four-bit plane as L, wherein each bit plane is a binary matrix of M×N;
(12) S2, when b=1.94, the chaotic system has the best performance for image encryption, and the range of parameter a will decrease with the increase of b, but the range always includes intervals (−4,7], so that the parameter of the two-dimensional lag complex Logistic mapping system is a=2, b=1.94, and the initial system value is (0.2,0.4,0.1), iterating the system N=250+2×M×N times, abandoning the previous 250 iteration tracks to avoid instantaneous effect, so as to obtain four chaotic sequences x, x.sub.1, x.sub.2, x.sub.3 with length 2×M×N, where
(13)
sorting the previous M×N numbers of the four chaotic sequences in an ascending order to obtain the position sequences T.sub.1, T.sub.2, T.sub.3, T.sub.4; then sorting the later M×N numbers of the four chaotic sequences in an ascending order to obtain the position sequences T.sub.−1, T.sub.−2, T.sub.−3, T.sub.−4;
(14) S3, scrambling the lower four-bit plane L by using the position sequences T.sub.1, T.sub.2, T.sub.3, T.sub.4 to obtain a new lower four-bit plane Lp; scrambling the upper four-bit plane H by using the position sequences T.sub.−1, T.sub.−2, T.sub.−3, T.sub.−4 to obtain a new upper four-bit plane HH;
(15) S4, performing modulo operation on the chaotic sequence x.sub.1 according to the formula f.sub.1=└|x.sub.1|*10.sup.15 mod256┘ to obtain a matrix f.sub.1 containing M×N decimal numbers; dividing f.sub.1 into eight bit planes by converting decimal numbers to binary numbers; taking the lower four-bit plane as f.sub.−1, and then sorting the sequence in f.sub.−1 in an ascending order to obtain the position sequence T.sub.f1;
(16) S5, superposing and performing modulo operation on a plurality of bit planes according to the formula clow=(f.sub.−1+Lp+HH)mod2 to obtain a new binary matrix clow, wherein mod is a complementary function; scrambling clow using T.sub.f1 to obtain Clow;
(17) S6, keeping the parameters of the system unchanged, re-taking the initial value (0.3,0.5,0.2), iterating the system N=250+2×M×N times, and abandoning the previous 250 iteration tracks to avoid instantaneous effect, so as to obtain four chaotic sequences which is denoted as x′, x′.sub.1, x′.sub.2, x′.sub.3 with length 2×M×N, where
(18)
sorting the previous M×N numbers of the chaotic sequences in an ascending order to obtain the position sequences T′.sub.1, T′.sub.2, T′.sub.3, T′.sub.4; then sorting the later M×N numbers of the chaotic sequences in an ascending order to obtain the position sequences T.sub.1, T.sub.2, T.sub.3, T.sub.4;
(19) S7, scrambling the upper four-bit plane H by using the position sequences T′.sub.1, T′.sub.2, T′.sub.3, T′.sub.4 to obtain a new upper four-bit plane Hp; scrambling Clow by using the position sequences T′.sub.1, T′.sub.−2, T′.sub.−3, T′.sub.−4 to obtain the final encrypted lower four-bit plane Clow′;
(20) S8, performing modulo operation on the chaotic sequence x.sub.2 according to the formula f.sub.2=└|x.sub.2|*10.sup.15 mod256┘ to obtain a matrix f.sub.2 containing M×N decimal numbers; dividing f.sub.2 into eight bit planes by converting decimal numbers to binary numbers; taking the lower four-bit plane as f.sub.−2, and then sorting the sequence in f.sub.−2 in an ascending order to obtain the position sequence T.sub.f2;
(21) S9, superposing and performing modulo operation on a plurality of bit planes according to the formula chigh=(f.sub.−2+Hp+Clow′)mod2 to obtain a new binary matrix chigh; scrambling chigh using T.sub.f2 to obtain the final encrypted upper four-bit plane Chigh;
(22) S10, integrating Clow′ and Chigh to obtain a final binary image P.sub.1=[Clow′;Chigh], and then restoring the pixel value of each pixel point in P.sub.1 to obtain the finally encrypted grayscale image E.
Embodiment 2
(23) An image decryption communication algorithm based on two-dimensional lag complex Logistic map comprises the steps of:
(24) S1, dividing a grayscale image E into eight bit planes, wherein the lower four-bit plane and the upper four-bit plane are Clow′ and Chigh, respectively; that is to say, the final encrypted grayscale image E is divided into eight bit planes, the lower four-bit plane is Clow′, and the upper four-bit plane is Chigh; the upper four-bit plane is also referred to as the finally encrypted upper four-bit binary image, and the lower four-bit plane is also referred to as the scrambled lower four-bit binary image;
(25) S2, selecting the same initial parameters and initial values as those in the image encryption communication algorithm based on the two-dimensional lag complex Logistic map according to claim 1 to iterate the 2D-LCLM to obtain chaotic sequences: x, x.sub.1, x.sub.2, x.sub.3 and x′, x′.sub.1, x′.sub.2, x′.sub.3, position sequences: T.sub.1, T.sub.2, T.sub.3, T.sub.4, T.sub.−1, T.sub.−2, T.sub.−3, T.sub.−4, T′.sub.−1, T′.sub.−2, T′.sub.−3, T′.sub.−4, T.sub.f1 and T.sub.f2 and four-bit planes f.sub.−1, f.sub.−2; the same initial parameters are a=2, b=1.94, and the initial values are (0.2,0.4,0.1) and (0.3,0.5,0.2), respectively.
(26) S3, inversely scrambling Clow′ by using T′.sub.−1, T′.sub.−2, T′.sub.−3, T′.sub.−4 to obtain Clow; inversely scrambling Clow and Chigh by using T.sub.f1 and T.sub.f2 to obtain clow and chigh; that is to say, inversely scrambling Clow by using T.sub.f1 to obtain a new binary matrix clow, and inversely scrambling Chigh by using T.sub.f2 to obtain a new binary matrix chigh;
(27) S4, inversely diffusing the bit planes by the formula Hp=(chigh−f.sub.−2−Clow′)mod2 to obtain the upper four-bit plane Hp, and then inversely scrambling Hp using T′.sub.1, T′.sub.2, T′.sub.3, T′.sub.4 to obtain the upper four-bit binary value H of a plaintext image; wherein the upper four-bit binary image H is the upper four-bit plane H in Embodiment 1;
(28) S5, scrambling H using the position sequences T.sub.−1, T.sub.−2, T.sub.−3, T.sub.−4 to obtain the upper four-bit plane HH;
(29) S6, implementing inverse diffusion operation by the formula Lp=(clow−f.sub.−1−HH)mod2 to obtain the lower four-bit plane Lp, and then inversely scrambling Lp using T.sub.1, T.sub.2, T.sub.3, T.sub.4 to obtain the lower four-bit binary image L of a plaintext image; wherein the lower four-bit binary image L is the lower four-bit plane L in Embodiment 1;
(30) S7, integrating L and H to obtain a binary image P=[L; H] of a plaintext image;
(31) S8, finally, restoring the pixel value of each pixel point in P to obtain the final grayscale image X.
Embodiment 3
(32) An image encryption and decryption communication algorithm based on two-dimensional lag complex Logistic map comprises the steps of:
(33) encrypting the grayscale image X to be encrypted by using the encryption communication algorithm of embodiment 1 to obtain the finally encrypted grayscale image E;
(34) decrypting the finally encrypted grayscale image E by using the decryption communication algorithm of embodiment 2 to obtain the grayscale image X to be encrypted.
(35) The same parts in Embodiment 3 as those in Embodiments 1 and 2 will not be discussed in detail.
(36) In this paper, a specific example is applied to illustrate the principle and implementation of the present disclosure, and the explanation of the above embodiments is only used to help understand the method and its core idea of the present disclosure. At the same time, according to the idea of the present disclosure, there will be some changes in the specific implementation and application scope for those skilled in the art. To sum up, the contents of this specification should not be construed as limiting the present disclosure.