• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于三维混沌系统和V型置乱的图像加密方法

Image Encryption Method Based on Three-Dimensional Chaotic Systems and V-Shaped Scrambling.

作者信息

Wang Lei, Song Wenjun, Di Jiali, Zhang Xuncai, Zou Chengye

机构信息

Department of Mechanical and Electrical Engineering, Henan Vocational College of Water Conservancy and Environment, Zhengzhou 450002, China.

School of Computer and Communication Engineering, Zhengzhou University of Light Industry, Zhengzhou 450002, China.

出版信息

Entropy (Basel). 2025 Jan 17;27(1):84. doi: 10.3390/e27010084.

DOI:10.3390/e27010084
PMID:39851704
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11765058/
Abstract

With the increasing importance of securing images during network transmission, this paper introduces a novel image encryption algorithm that integrates a 3D chaotic system with V-shaped scrambling techniques. The proposed method begins by constructing a unique 3D chaotic system to generate chaotic sequences for encryption. These sequences determine a random starting point for V-shaped scrambling, which facilitates the transformation of image pixels into quaternary numbers. Subsequently, four innovative bit-level scrambling strategies are employed to enhance encryption strength. To further improve randomness, DNA encoding is applied to both the image and chaotic sequences, with chaotic sequences directing crossover and DNA operations. Ciphertext feedback is then utilized to propagate changes across the image, ensuring increased complexity and security. Extensive simulation experiments validate the algorithm's robust encryption performance for grayscale images, yielding uniformly distributed histograms, near-zero correlation values, and an information entropy value of 7.9975, approaching the ideal threshold. The algorithm also features a large key space, providing robust protection against brute force attacks while effectively resisting statistical, differential, noise, and cropping attacks. These results affirm the algorithm's reliability and security for image communication and transmission.

摘要

随着在网络传输过程中保护图像安全的重要性日益增加,本文介绍了一种新颖的图像加密算法,该算法将三维混沌系统与V形置乱技术相结合。所提出的方法首先构建一个独特的三维混沌系统来生成用于加密的混沌序列。这些序列确定V形置乱的随机起始点,这有助于将图像像素转换为四元数。随后,采用四种创新的位级置乱策略来增强加密强度。为了进一步提高随机性,对图像和混沌序列都应用了DNA编码,混沌序列指导交叉和DNA操作。然后利用密文反馈在整个图像中传播变化,确保增加复杂性和安全性。大量的仿真实验验证了该算法对灰度图像的强大加密性能,产生了均匀分布的直方图、接近零的相关值以及7.9975的信息熵值,接近理想阈值。该算法还具有较大的密钥空间,能有效抵御暴力攻击,同时有效抵抗统计、差分、噪声和裁剪攻击。这些结果证实了该算法在图像通信和传输方面的可靠性和安全性。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/613e/11765058/1bb09b2b4afc/entropy-27-00084-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/613e/11765058/a10c55ad6345/entropy-27-00084-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/613e/11765058/f35932eaf44b/entropy-27-00084-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/613e/11765058/826b08e66c38/entropy-27-00084-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/613e/11765058/7ed44ba8c7f8/entropy-27-00084-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/613e/11765058/2ec045aadda2/entropy-27-00084-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/613e/11765058/6c072b746ffe/entropy-27-00084-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/613e/11765058/7fd96a993402/entropy-27-00084-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/613e/11765058/aa93589866e0/entropy-27-00084-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/613e/11765058/6c3c35158ee5/entropy-27-00084-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/613e/11765058/b330076d4ea8/entropy-27-00084-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/613e/11765058/2b097272c6bd/entropy-27-00084-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/613e/11765058/9b45a95afad5/entropy-27-00084-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/613e/11765058/75d869e386ce/entropy-27-00084-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/613e/11765058/1bb09b2b4afc/entropy-27-00084-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/613e/11765058/a10c55ad6345/entropy-27-00084-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/613e/11765058/f35932eaf44b/entropy-27-00084-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/613e/11765058/826b08e66c38/entropy-27-00084-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/613e/11765058/7ed44ba8c7f8/entropy-27-00084-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/613e/11765058/2ec045aadda2/entropy-27-00084-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/613e/11765058/6c072b746ffe/entropy-27-00084-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/613e/11765058/7fd96a993402/entropy-27-00084-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/613e/11765058/aa93589866e0/entropy-27-00084-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/613e/11765058/6c3c35158ee5/entropy-27-00084-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/613e/11765058/b330076d4ea8/entropy-27-00084-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/613e/11765058/2b097272c6bd/entropy-27-00084-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/613e/11765058/9b45a95afad5/entropy-27-00084-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/613e/11765058/75d869e386ce/entropy-27-00084-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/613e/11765058/1bb09b2b4afc/entropy-27-00084-g014.jpg

相似文献

1
Image Encryption Method Based on Three-Dimensional Chaotic Systems and V-Shaped Scrambling.基于三维混沌系统和V型置乱的图像加密方法
Entropy (Basel). 2025 Jan 17;27(1):84. doi: 10.3390/e27010084.
2
Image encryption scheme based on improved four-dimensional chaotic system and evolutionary operators.基于改进的四维混沌系统和进化算子的图像加密方案
Sci Rep. 2024 Mar 25;14(1):7033. doi: 10.1038/s41598-024-57756-x.
3
Image Encryption Using a New Hybrid Chaotic Map and Spiral Transformation.基于新型混合混沌映射和螺旋变换的图像加密
Entropy (Basel). 2023 Nov 5;25(11):1516. doi: 10.3390/e25111516.
4
A Novel Chaotic Image Encryption Algorithm Based on Latin Square and Random Shift.基于拉丁方和随机置换的新型混沌图像加密算法。
Comput Intell Neurosci. 2021 Sep 6;2021:2091053. doi: 10.1155/2021/2091053. eCollection 2021.
5
Multi-Image Encryption Algorithm Based on Cascaded Modulation Chaotic System and Block-Scrambling-Diffusion.基于级联调制混沌系统和分块置乱扩散的多图像加密算法
Entropy (Basel). 2022 Jul 31;24(8):1053. doi: 10.3390/e24081053.
6
Medical image encryption algorithm based on a new five-dimensional three-leaf chaotic system and genetic operation.基于新型五维三叶混沌系统和遗传操作的医学图像加密算法。
PLoS One. 2021 Nov 29;16(11):e0260014. doi: 10.1371/journal.pone.0260014. eCollection 2021.
7
Multiple image encryption algorithm using channel randomization and multiple chaotic maps.基于通道随机化和多重混沌映射的多重图像加密算法
Sci Rep. 2024 Dec 23;14(1):30597. doi: 10.1038/s41598-024-79282-6.
8
A Bit Shift Image Encryption Algorithm Based on Double Chaotic Systems.一种基于双混沌系统的位平面图像加密算法
Entropy (Basel). 2021 Aug 30;23(9):1127. doi: 10.3390/e23091127.
9
Secure image communication based on two-layer dynamic feedback encryption and DWT information hiding.基于双层动态反馈加密和 DWT 信息隐藏的安全图像通信。
PLoS One. 2024 Aug 27;19(8):e0300228. doi: 10.1371/journal.pone.0300228. eCollection 2024.
10
A Novel Image Encryption Algorithm Based on Improved Arnold Transform and Chaotic Pulse-Coupled Neural Network.一种基于改进型阿诺德变换和混沌脉冲耦合神经网络的新型图像加密算法。
Entropy (Basel). 2022 Aug 10;24(8):1103. doi: 10.3390/e24081103.

本文引用的文献

1
Image encryption scheme based on improved four-dimensional chaotic system and evolutionary operators.基于改进的四维混沌系统和进化算子的图像加密方案
Sci Rep. 2024 Mar 25;14(1):7033. doi: 10.1038/s41598-024-57756-x.
2
Key dependent information confidentiality scheme based on deoxyribonucleic acid (DNA) and circular shifting.基于脱氧核糖核酸(DNA)和循环移位的密钥相关信息保密方案
Heliyon. 2023 Dec 12;10(1):e23572. doi: 10.1016/j.heliyon.2023.e23572. eCollection 2024 Jan 15.
3
An Image Encryption Algorithm Based on Improved Hilbert Curve Scrambling and Dynamic DNA Coding.
一种基于改进希尔伯特曲线置乱和动态DNA编码的图像加密算法
Entropy (Basel). 2023 Aug 8;25(8):1178. doi: 10.3390/e25081178.
4
Cascade Chaotic System With Applications.级联混沌系统及其应用。
IEEE Trans Cybern. 2015 Sep;45(9):2001-12. doi: 10.1109/TCYB.2014.2363168. Epub 2014 Oct 30.