Font Size: a A A

Research On Image Encryption Technology Based On Multi Chaotic System And DNA

Posted on:2023-03-16Degree:MasterType:Thesis
Country:ChinaCandidate:Y P ZhangFull Text:PDF
GTID:2568306800466714Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Under the background of information age,information networks all over the world are linked together to form a global Internet.Massive data is transmitted in digital form on the network.Image form is widely used in network transmission because of its intuitive and vivid visual effect,good data carrying capacity and transmission cost.Some unencrypted images may be illegally accessed by unauthorized hackers during transmission,resulting in privacy disclosure.In order to ensure the security of network information and ensure the security and integrity of transmitted data,image encryption research came into being,but the traditional encryption schemes have poor effect in practical application,because these schemes were originally used to encrypt text information,and they are not suitable for images.Therefore,researchers have carried out further research and began to propose many image encryption schemes based on chaotic mapping combined with chaos theory.This paper focuses on the research of chaotic mapping and image encryption,designs a new model of constructing high-dimensional cyclic symmetric chaotic system,and verifies it with theory and examples.Then,an image encryption scheme based on new chaotic system 3D-CSLM and DNA computing is proposed,and its encryption performance is simulated.Aiming at the problems of small range of chaotic parameters,single chaotic trajectory and obvious characteristics,and insufficient complexity of chaotic sequence of some existing one-dimensional chaotic maps,a theoretical model of constructing high-dimensional cyclic symmetric chaotic system based on classical one-dimensional chaotic maps is proposed in this paper.The proposed model retains the simple structure of the original chaotic map,uses the previous mapping variable correlation to control the variable value of the next mapping,and makes continuous iterative mapping,so that each mapping is connected end to end to build a cycle.Through the theoretical verification of the cyclic symmetry,initial value sensitivity and boundedness of the proposed model,the feasibility of the model in this paper is proved.This paper also applies two classical one-dimensional chaotic maps to the new model,and proposes a three-dimensional cyclic symmetric chaotic system based on logistic map and Chebyshev map,which is named 3D-CSLM and 3D-CSCM.The experimental analysis of their chaotic performance is carried out.The experimental contents include phase space distribution,mapping bifurcation diagram,Lyapunov exponent,approximate entropy and so on.The experimental results show that their chaotic performance is effectively improved.In order to verify the practicability and effectiveness of the high-dimensional cyclic symmetric chaotic system model,3D-CSLM is applied to image encryption,and an image encryption algorithm based on 3D-CSLM and DNA computing is designed.The algorithm uses the newly proposed 3D-CSLM to generate the chaotic sequence used in encryption,which ensures the complexity and security of the algorithm.Take plain-image association measures,count the pixel value of the original plain-image,and participate in the image encryption step after processing the statistical value,so as to improve the ability of the algorithm to resist selection attack.Combined with DNA calculation,the image data is converted,the two-dimensional matrix is transformed into DNA sequence by DNA coding,and then DNA operation is carried out to realize image pixel diffusion.After DNA decoding,XOR operation is carried out to complete encryption.Simulation results show that this algorithm has good encryption effect,high security and can effectively resist all kinds of attacks.
Keywords/Search Tags:Chaotic mapping, Image encryption, Information security, High dimensional chaotic model, DNA Computing
PDF Full Text Request
Related items