全文预览已结束
下载本文档
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
AHYPERCHAOSBASEDIMAGEENCRYPTIONALGORITHMCHENZAIPING,LIHAIFEN,DONGENZENG,DUYANGTIANJINKEYLABORATORYFORCONTROLTHEORYIMAGEENCRYPTIONSECURITYANALYSISKEYSPACEIINTRODUCTIONWITHTHEDEVELOPMENTOFNETWORKTECHNOLOGYANDMULTIMEDIATECHNOLOGY,ECOMMERCE,ELECTRONICADVERTISING,VIDEOANDOTHERTYPESOFNETWORKSERVICESANDMODEOFOPERATIONFORTHEBUSINESSEARNEDPROFITSATTHESAMETIMEHOWEVER,THEINTERNETMULTIMEDIAINFORMATIONTOBRINGCONVENIENCETOPEOPLEBUTALSOEXPOSEDMOREANDMORESERIOUSSECURITYPROBLEMSFOREXAMPLEMULTIMEDIAWORKSOFCOPYRIGHTINFRINGEMENT,ILLEGALCOPIESOFSOFTWARETOSOLVETHISPROBLEM,MANYENCRYPTIONALGORITHMSHAVEBEENPROPOSED18AMONGTHEM,CHAOSBASEDALGORITHMSHASSUGGESTEDANEWANDEFFICIENTWAYTODEALWITHTHEINTRACTABLEPROBLEMOFFASTANDHIGHLYSECUREIMAGEENCRYPTION,ANDITHASBEENPROVEDTHATINMANYASPECTSAGOODENCRYPTIONSHOULDINCLUDETHEFOLLOWINGASPECTSFIRSTLY,THEKEYMUSTHAVESENSITIVITYTOTHECIPHERKEYSSECOND,THEKEYSPACESHOULDBELARGEENOUGHTOMAKEBRUTEFORCEATTACKSINFEASIBLE9HYPERCHAOSHASMORETHANONEPOSITIVELYAPUNOVEXPONENT,ANDTHEREAREMORECOMPLEXDYNAMICALCHARACTERISTICSTHANCHAOS,THEREFORETHESTUDYOFHYPERCHAOSBASEDENCRYPTIONALGORITHMSMAYBEMOREVALUABLETHEENCRYPTIONALGORITHMSECURECOMMUNICATIONSCHEMESBASEDONHYPERCHAOTICSYSTEMSWASPROPOSED10,BUTNOWTHEREISALITTLESTUDYINTHEHYPERCHAOSENCRYPTIONALGORITHMINTHISPAPER,ANEWENCRYPTIONALGORITHMISPROPOSEDTHISENCRYPTIONALGORITHMOFIMAGEHASTHEADVANTAGESOFLARGEKEYSPACEANDHIGHSECURITYIITHEPROPOSEDENCRYPTIONALGORITHMAAHYPERCHAOTICCHENSSYSTEMINTHEPROPOSEDENCRYPTIONSCHEME,ANEWHYPERCHAOTICSYSTEMGENERATEDFROMCHENSCHAOTICSYSTEMISUSEDINKEYSCHEMING,WHICHISMODELEDBY11UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020RWYZWBZXYZCWXZDXYWXYAX1WHEREX,Y,ZANDWARESTATEVARIABLES,A,B,C,DANDRAREPARAMETERS,WHENA35,B3,C12,D7AND0085R0789,THESYSTEMISHYPERCHAOTICTHEHYPERCHAOSATTRACTORSARESHOWNINFIG1201510505101520252520151050510152025201510505101520250510152025303540FIGURE1CHENSHYPERCHAOTICATTRACTORAXYPLANE,BXZPLANEWHENA35,B3,C12,D7ANDR06ASTHEHYPERCHAOSHASTWOPOSITIVELYAPUNOVEXPONENTS,SOTHEPREDICTIONTIMEOFAHYPERCHAOTICSYSTEMISSHORTERTHANTHATOFACHAOTICSYSTEM,ASARESULT,ITISSAFERTHANCHAOSINSECURITYALGORITHMBIMAGEENCRYPTIONBASEDONSHUFFLINGMATRIXIMAGEVALUEHASSTRONGCORRELATIONSAMONGADJACENTPIXELSINORDERTODISTURBTHEHIGHCORRELATIONAMONGPIXELS,ANIMAGESHUFFLINGMATRIXISUSEDTOSHUFFLETHEPOSITIONOFTHEPLAINIMAGEWEASSUMETHATTHEDIMENSIONOFTHEPLAINIMAGEISNM,THEPOSITIONMATRIXOFPIXELIS,IPJI,MJMI2,1,2,1,WHERE,IPJISTANDSFORTHEGREYVALUEOFTHEIMAGETHEPROCEDUREOFSHUFFLINGIMAGEISDESCRIBEDASFOLLOWSSTEP1FORHYPERCHAOTICSYSTEM,GIVENINITIALVALUE,IWIZIYIX,AFTERDOINGSOMEITERATIONSFOREACHITERATION,WECANGETFOURVALUES,IWIZIYIXWHEREMI2,1REPRESENTSTHEITHITERATIONOFTHEHYPERCHAOTICSYSTEMTHENLET1,0,2,1,10MOD14MIXMIMIXIXUNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF02021,0,2,1,10MOD14MIYMIMIYIY3UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF0201,0,2,1,10MOD14MIZMIMIZIZUNIF020UNIF020UNIF020UNIF02042010SECONDINTERNATIONALCONFERENCEONINTELLIGENTHUMANMACHINESYSTEMSANDCYBERNETICS9780769541518/1026002010IEEEDOI101109/IHMSC20101472021881,0,2,1,10MOD14MIWMIMIWIWUNIF020UNIF020UNIF0205STEP2GENERATEMBYUSINGTHEFOLLOWINGFORMULAUNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF0206,MODIXMUNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF0206AS5,0M,SOFROMTABLE1,WECANSELECTTHECORRESPONDINGGROUPTHATAREUSEDTOPERFORMSHUFFLINGMATRIXIFMEQUALSTOTHESERIALNUMBEROFSEQUENCEOFTHEGROUPFOREXAMPLE,IF2M,THENCHOOSEIXANDIWSTEP3WHENWEGETIXANDIW,THESEDATACANBEREORDEREDINTHEFORMOFIX,WHEREJXIX,MJ2,1,IFJI,THENREARRANGETHEROWOFMATRIXPI,JACCORDINGTOIX,THATIS,MOVETHE1XTOTHEFIRSTROW,2XTOTHESECONDROW,THUSANEWIMAGEPOSITIONMATRIXXJIP,ISGENERATEDBASEDONROWTRANSFORMATIONSTEP4FOREVERYROWOFTHENEWMATRIXXJIP,WEWILLSHUFFLETHECOLUMNPOSITIONOFTHEIMAGEFORIW,THESEDATACANBEREORDEREDINTHEFORMOFIW,WHEREJWIW,IFJI,THENREARRANGETHEDATAOFEVERYCOLUMNFORTHEFIRSTROWOFMATRIXXJIP,ACCORDINGTOIW,MOVETHE1WTOTHEFIRSTCOLUMN,2WTOTHESECONDCOLUMN,THUSANEWCOLUMNTRANSFORMATIONOFTHEFIRSTROWOFMATRIXWXJIP,ISGENERATEDSTEP5FORTHENEWWXJIP,GOTOEQ5,STEP4TODOCOLUMNTRANSFORMATIONFORTHESECONDROW,TILLTHELASTROWTRANSFORMATIONISFINISHED,THUSANEWIMAGETOTALSHUFFLINGMATRIXWXJIP,ISPRESENTEDTABLEIDIFFERENTCOMBINATIONOFSTATESSERIALNUMBERCOMBINATIONOFSTATES0,IYIX1,IZIX2,IWIX3,IZIY4,IWIY5,IWIZCENCRYPTIONALGORITHMDESIGNFORTHEHYPERCHAOTICCHENSSYSTEMAFTERWEGETTHESHUFFLINGMATRIXWXJIP,THEHYPERCHAOSISUSEDTOENCRYPTTHESHUFFLEIMAGETHEENCRYPTIONSCHEMEISBASEDONTHECOMBINATIONOFSTATEVARIABLESOFTHEABOVEHYPERCHAOTICSYSTEMONEOFTHEFOURVARIABLESARECOMBINEDDIFFERENTLY,WHICHMAYPRODUCEFOURDIFFERENTCOMBINATIONS,WHICHISGIVENINTABLE2STEP1THESYSTEMON1ISITERATEDFOR0NTIMESSTEP2THEHYPERCHAOTICSYSTEMISITERATED,ASARESULT,FOURFRACTIONWILLBEGENERATEDTHESEDECIMALVALUESAREPREPROCESSEDFIRSTLYASFOLLOWS256,10MODX14IXABSFLOORIXABSIUNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF0207256,10MODY14IYABSFLOORIYABSIUNIF020UNIF020UNIF020UNIF020UNIF020UNIF0208256,10MODZ14IZABSFLOORIZABSI9UNIF020UNIF020UNIF020UNIF020UNIF020256,10MODW14IWABSFLOORIWABSIUNIF020UNIF02010WHEREMI2,1REPRESENTSTHEITERATIONOFTHEHYPERCHAOTICSYSTEMWHEREXABSRETURNSTHEABSOLUTEVALUEOFXXFLOORRETURNSTHEVALUEOFXTOTHENEARESTINTEGERSLESSTHANOREQUALTOX,MODYXRETURNSTHEREMAINDERAFTERDIVISIONSTEP3GENERATEIXUSINGTHEFOLLOWINGFORMULAMODXI,4IXUNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF02011SO3,0IXFROMTABLE2,WHEREIXREPRESENTSTHEITHITERATIONOFTHEHYPERCHAOTICSYSTEMWECANSELECTTHECORRESPONDINGGROUPTHATISUSEDTOPERFORMENCRYPTIONOPERATIONIFIXEQUALSTOTHESERIALNUMBEROFSEQUENCEOFTHEGROUPFOREXAMPLE,IF1IX,THENIYISUSEDTODOENCRYPTIONACCORDINGTOTHEFOLLOWINGFORMULAUNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020IYIPIWUNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF02012THEPROCESSDOESNOTENDUNTILTHESET2,1NMPPPPISALLENCRYPTEDTHENTHEENCRYPTEDPIXELSET2,1NMWWWWISWRITTENTOTHECIPHERIMAGETHEDECRYPTIONALGORITHMISSIMILARTOTHEENCRYPTIONALGORITHMITISFORTHEENCRYPTEDIMAGE,FIRSTLY,DECRYPTTHEIMAGEUSINGHYPERCHAOTICSYSTEMWITHTHESAMEPARAMETERSANDINITIALVALUESASTHATUSEDINENCRYPTION,WEWILLGETTHEORIGINALIMAGETHESEIMAGESWILLBESHOWINTHEFIG2TABLEIIDIFFERENTCOMBINATIONOFSTATESOFHYPERCHAOSSERIALNUMBERCOMBINATIONOFSTATES0IX1IY2IZ3IW0501001502002500100200300400500600700800AB2031890501001502002500100200300400500600CD0501001502002500100200300400500600700800EF0501001502002500100200300400500600GHFIGURE2IMAGEENCRYPTIONANDDECRYPTIONEXPERIMENTALRESULTAORIGINALIMAGE,BORIGINALIMAGEHISTOGRAM,CCIPHEREDIMAGE,DCIPHEREDIMAGEHISTOGRAM,EDECRYPTEDIMAGE,FDECRYPTEDIMAGEHISTOGRAM,GDECRYPTEDIMAGEWITHDIFFERENTINITIALVALUE,HERRORDECRYPTEDIMAGEHISTOGRAMIIISECURITYANALYSISSECURITYISAMAJORISSUEOFACRYPTOSYSTEMAGOODENCRYPTIONALGORITHMSHOULDBESENSITIVETOTHESECRETKEYS,ANDHAVELARGEKEYSPACETORESISTALLKINDSOFKNOWNATTACKSSOMESECURITYANALYSISHASBEENPERFORMEDONTHEPROPOSEDIMAGEENCRYPTIONSCHEMEAKEYSPACEANALYSISINTHEALGORITHM,THEINITIALVALUESOFHYPERCHAOTICSYSTEMAREUSEDASSECRETKEYS,IFTHEPRECISIONIS1014,THEKEYSPACESIZEIS1070MOREOVER,THEINITIALITERATIONNUMBERN0,THEKEYHAVELARGEENOUGHASTHESECRETKEYSTHISISENOUGHTORESISTALLKINDSOFBRUTEFORCEATTACKSBKEYSENSITIVITYTESTSEVERALKEYSENSITIVITYTESTSAREPERFORMEDFIG3ILLUSTRATETHESENSITIVITYOFOURSCHEMETOTHESECRETKEYNWZYX,X102,Y101,Z113,W111ANDN300FIG3AISTHEDECRYPTEDIMAGEWITHALLTHEPARAMETERSTOBESAMEASTHATUSEDINENCRYPTIONALGORITHMEXCEPTW110000001FIG3BISTHEDECRYPTEDIMAGEWITHADIFFERENTINITIALITERATIONTIMESN301SOITCANBECONCLUDEDTHATHYPERCHAOSENCRYPTIONALGORITHMISSENSITIVETOTHEKEY,ASMALLCHANGEOFTHEKEYWILLGENERATEACOMPLETELYTHESEIMAGESWERESHOWNINFIGURE3ABFIGURE3IMAGEENCRYPTIONANDDECRYPTIONEXPERIMENTALRESULTADECRYPTEDIMAGEWITHDIFFERENTINITIALVALUE,BDECRYPTEDIMAGEWITHDIFFERENTINITIALVALUECSTATISTICALANALYSIS1HISTOGRAMTHEFIGUREISTHEORIGINALIMAGEANDTHEENCRYPTEDIMAGEHISTOGRAM,FROMFIG2WECANSEETHEENCRYPTEDIMAGEHASUNIFORMHISTOGRAM,WHICHMEANSTHATITISAGOODENCRYPTIONALGORITHM2RELATIVITYANALYSISTOTESTTHECORRECTIONBETWEENTWOADJACENTPIXELSINPLAINIMAGEANDCIPHEREDIMAGE,THEFOLLOWINGPROCEDUREWASCARRIEDOUTFIRST,RANDOMLYSELECT512PAIRSOFTWOADJACENTPIXELSFROMANIMAGETHEN,CALCULATETHECORRELATIONCOEFFICIENTOFEACHPAIRBYUSINGTHEFOLLOWINGFORMULAS12,COVYEYXEXEYXUNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF02013UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020,COVYDXDYXRXYUNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF02014UNIF020UNIF020UNIF020UNIF020UNIF020NIIXNXE11UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF02015NIIXEXNXD121UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF020UNIF02016UNIF0201,COV1YEYXEXNYXINII17WHEREXANDYAREGREYVALUESOFTWOADJACENTPIXELSINTHEIMAGETHESEIMAGESWERESHOWNINFIGURE420419040608010012014016018020022020406080100120140160180200220THERELATIVITYRELATIONOFORIGINALIMAGEPIXELGRAYVALUELOCATIONX,YPIXELGRAYVALUELOCATIONX,Y1050100150200250300050100150200250300THERELATIVITYRELATIONOFCIPHEREDIMAGEPIXELGRAYVALUELOCATIONX,YPIXELGRAYVALUELOCATIONX,Y1ABFIGURE4SHOWTHERELATIVITYRELATIONOFORIGINALANDTHEENCRYPTEDIMAGEARELATIVITYRELATIONOFORIGINALIMAGE,BRELATIVITYRELATIONOFENCRYPTEDIMAGEACCORDINGTOTHEABOVEIMAGESHOWSTHECORRELATIONDISTRIBUTIONOFTWOVERTICALDIRECTIONADJACENTPIXELSINTHEORIGINALIMAGEANDTHATINTHECIPHEREDIMAGETHECORRELATIONCOEFFICIENTSARE09650AND00579TABLEIIICORRELATIONCOEFFICIENTSOFTWOADJACENTPIXELSINTWOIMAGESDIRECTIONPLAINIMAGECIPHEREDIMAGEHORIZONTAL0965000579VERTICAL0945600256DIAGONAL0923700014FROMTABLE3,WEFINDTHATALLTHERELATIVITYCOEFFICIENTSOFENCRYPTEDELEMENTSAREREDUCEDGREATLYTHEENCRYPTIONALGORITHMCANDESTRUCTRELATIVITYEFFECTIVELYDANTICUTTINGTESTINTHEPROCESSOFTRANSMISSION,IMAGEMAYBEDAMAGED,THUSCAUSINGLOSSOFIMAGEINFORMATIONINTHISPAPER,THEENCRYPTIONALGORITHMISINANENCRYPTEDUNDERTHECONDITIONSOFLACKOFINFORMATIONCANSTILLBERECOVEREDMAJORINFORMATIONASSHOWNINFIG5AANDFIG5B,ALTHOUGHENCRYPTEDIMAGESHAVEBEENCUTINSOMEDEGREE,THEDECRYPTEDIMAGEHASMINORNOISE,BUTITDOESNTINFLUENCETHEOVERALLIMAGEITPROVESTHATTHISMETHODCANINACERTAINEXTENTBERESTOREDBYMALICIOUSDAMAGEABFIGURE5IMAGEBEINGCUTANDDECRYPTEDIMAGEACUTINTOPLEFT,BDECRYPTEDTHROUGHTHEABOVEEXPERIMENTSWECANSEE,THISALGORITHMCANRESISTAGAINSTNOISEATTACK,CUTTINGATTACK,ANDHASASTRONGROBUSTNESSIVCONCLUSIONSINTHISPAPER,ANEWIMAGEENCRYPTIONALGORITHMBASEDONHYPERCHAOSISPROPOSED,ITUSESANIMAGESHUFFLINGMATRIXTOSHUFFLETHEPIXELPOSITIONSOFTHEPLAINIMAGEANDTHENTHESTATESCOMBINATIONOFHYPERCHAOSISUSEDTOCHANGETHEGREYVALUESOFTHESHUFFLEDIMAGESOMESECURITYANALYSISSUCHASKEYSPACEANALYSIS,KEYSENSITIVITYANALYSIS,CORRELATIONANALYSISOFTWOADJACENTPIXELSISGIVENTOSHOWTHATTHEPROPOSEDCRYPTOSYSTEMHASAHIGHSECURITYLEVELACKNOWLEDGMENTTHEAUTHORSACKNOWLEDGEWITHTHANKSTHEFINANCIALSUPPORTBYTIANJINDEVELOPMENTFOUNDATIONOFSCIENCEANDTECHNOLOGYKEYPROJECTGRANT10ZCKFGX03000,TIANJINSCIENCEANDTECHNOLOGYFOUNDATIONPROJECTGRANT09ZXCXGX19300,CHINANATIONALINNOVATIONFUNDFORTECHNOLOGYBAS
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2026清华大学基础医学院彭敏实验室招聘科研助理2人备考题库带答案详解(综合卷)
- 2026江西赣州市全南县公用市政建设集团有限公司招聘1人备考题库附答案详解【预热题】
- 2026内蒙古霍林河机场管理有限责任公司招聘工作人员3人备考题库含答案详解(a卷)
- 2026四川宜宾酒股份有限公司下属子公司第一批员工招聘9人备考题库附答案详解(研优卷)
- 2026湖北宜昌市“招才兴业”教育系统事业单位校园专项招聘7人备考题库(三峡大学站)及参考答案详解
- 2026山东德州市宁津县招聘教师23人备考题库带答案详解(基础题)
- 2026广东佛山市顺德区乐从第一实验学校(教务文员)招聘1人备考题库附答案详解【轻巧夺冠】
- 2026湖北武汉市第三医院骨干人才及成熟型人才招聘备考题库(b卷)附答案详解
- 2026江苏南京大学SZYJ20260014生物医学工程学院招聘备考题库【夺分金卷】附答案详解
- 2026青海天蓝新能源材料有限公司招聘2人备考题库附完整答案详解【各地真题】
- 拖拉机犁地合同范本
- 农民告别千年古税课件
- 宠物医院实习答辩
- 中医门诊病历书写规范模板
- 银行笔试行测题库及答案
- 全屋定制基本知识培训资料
- 2025年保安证考试100题及答案
- 神经外科危重患者护理
- 赛迪译丛2025年第36期(总第711期):赢得人工智能竞赛:美国人工智能行动计划
- 道路改造工程施工方案(3篇)
- 【装饰装修】技术部分(投标方案)
评论
0/150
提交评论