Advanced Search
Volume 43 Issue 12
Dec.  2021
Turn off MathJax
Article Contents
Chunbiao LI, Yunnan ZHAO, Yaning LI, Sixiao KONG. An Image Encryption Algorithm Based on Logistic Chaotic Mapping with Sinusoidal Feedback and Its FPGA Implementation[J]. Journal of Electronics & Information Technology, 2021, 43(12): 3766-3774. doi: 10.11999/JEIT200575
Citation: Chunbiao LI, Yunnan ZHAO, Yaning LI, Sixiao KONG. An Image Encryption Algorithm Based on Logistic Chaotic Mapping with Sinusoidal Feedback and Its FPGA Implementation[J]. Journal of Electronics & Information Technology, 2021, 43(12): 3766-3774. doi: 10.11999/JEIT200575

An Image Encryption Algorithm Based on Logistic Chaotic Mapping with Sinusoidal Feedback and Its FPGA Implementation

doi: 10.11999/JEIT200575
Funds:  The National Natural Science Foundation of China (61871230), The Nature Science Foundation of Jiangsu Province (BK20181410)
  • Received Date: 2020-07-13
  • Rev Recd Date: 2021-03-28
  • Available Online: 2021-06-02
  • Publish Date: 2021-12-21
  • Digital image encryption algorithm based on chaos is widely used because of its large key space and high key sensitivity. The sinusoidal feedback is introduced into the classical Logistic mapping to form a new discrete mapping, and the chaotic behavior of the mapping is analyzed. The chaotic mapping is used to derive the discrete chaotic encryption sequence, and the encryption sequence is enlarged and rounded to enhance its pseudo-randomness. The pseudo-randomness of encrypted sequences is tested by NIST (National Institute of Standards and Technology) test method. The pseudo-random sequence is XOR (Exclusive OR) with the original image to realize image encryption. Numerical simulation results show that the new encryption algorithm has better encryption effect, and its key shows better sensitivity and pseudo-randomness. Finally, hardware encryption for this algorithm is realized based on FPGA (Field Programmable Gate Array) platform.
  • loading
  • [1]
    LI Chengqing, ZHANG Yun, Xie E Y. When an attacker meets a cipher-image in 2018: A year in review[J]. Journal of Information Security and Applications, 2019, 48: 102361. doi: 10.1016/j.jisa.2019.102361
    [2]
    张慧奔. 基于混沌图像加密算法的研究[D]. [硕士论文], 电子科技大学, 2015.

    ZHANG Huiben. Chaotic image encryption algorithm research[D]. [Master dissertation], University of Electronic Science and Technology of China, 2015.
    [3]
    YOON J W and KIM H. An image encryption scheme with a pseudorandom permutation based on chaotic maps[J]. Communications in Nonlinear Science and Numerical Simulation, 2010, 15(12): 3998–4006. doi: 10.1016/j.cnsns.2010.01.041
    [4]
    PENG Yuexi, SUN Kehui, and HE Shaobo. Dynamics analysis of chaotic maps: From perspective on parameter estimation by meta-heuristic algorithm[J]. Chinese Physics B, 2020, 29(3): 030502. doi: 10.1088/1674-1056/ab695c
    [5]
    徐红梅, 郭树旭. 基于符号相对熵的Logistic混沌系统时间不可逆性分析[J]. 电子与信息学报, 2014, 36(5): 1242–1246. doi: 10.3724/SP.J.1146.2013.01262

    XU Hongmei and GUO Shuxu. Time irreversibility analysis of logistic chaos system based on symbolic relative entropy[J]. Journal of Electronics &Information Technology, 2014, 36(5): 1242–1246. doi: 10.3724/SP.J.1146.2013.01262
    [6]
    郑继明, 汤智睿, 邓建秀, 等. 基于Logistic混沌映射的数字图像加密算法[J]. 科技与创新, 2018(18): 8–11. doi: 10.15913/j.cnki.kjycx.2018.18.008

    ZHEN Jiming, TANG Zhirui, DENG Jianxiu, et al. Digital image encryption algorithm based on Logistic chaotic map[J]. Science and Technology &Innovation, 2018(18): 8–11. doi: 10.15913/j.cnki.kjycx.2018.18.008
    [7]
    陈志刚, 梁涤青, 邓小鸿, 等. Logistic混沌映射性能分析与改进[J]. 电子与信息学报, 2016, 38(6): 1547–1551. doi: 10.11999/JEIT151039

    CHEN Zhigang, LIANG Diqing, DENG Xiaohong, et al. Performance analysis and improvement of Logistic chaotic mapping[J]. Journal of Electronics &Information Technology, 2016, 38(6): 1547–1551. doi: 10.11999/JEIT151039
    [8]
    陶红. 基于Logistic混沌序列的图像加密设计[D]. [硕士论文], 东南大学, 2018.

    TAO Hong. Design of image encryption algorithm based on Logistic chaotic sequence[D]. [Master dissertation], Southeast University, 2018.
    [9]
    齐红涛, 苏涛. 基于FPGA的高速AD采样设计[J]. 航空兵器, 2010(1): 35–39. doi: 10.19297/j.cnki.41-1228/tj.2010.01.009

    QI Hongtao and SU Tao. Design of high AD sampling based on FPGA[J]. AERO Weaponry, 2010(1): 35–39. doi: 10.19297/j.cnki.41-1228/tj.2010.01.009
    [10]
    MAY R M. Simple mathematical models with very complicated dynamics[J]. Nature, 1976, 261(5560): 459–467. doi: 10.1038/261459a0
    [11]
    高智中, 李会芳. Logistic的混沌分析及其控制[J]. 运城学院学报, 2006, 24(2): 12–14. doi: 10.15967/j.cnki.cn14-1316/g4.2006.02.006

    GAO Zhizhong and LI Huifang. Chaos analysis and chaos controlling of Logistic map[J]. Journal of Yuncheng University, 2006, 24(2): 12–14. doi: 10.15967/j.cnki.cn14-1316/g4.2006.02.006
    [12]
    张双红. Logistic模型的Matlab计算与可视化[J]. 吉林师范大学学报: 自然科学版, 2009, 30(3): 97–99. doi: 10.16862/j.cnki.issn1674-3873.2009.03.024

    ZHANG Shuanghong. Calculation and visualization of Logistic model by using Matlab[J]. Jilin Normal University Journal:Natural Science Edition, 2009, 30(3): 97–99. doi: 10.16862/j.cnki.issn1674-3873.2009.03.024
    [13]
    罗利军, 李银山, 李彤, 等. 李雅普诺夫指数谱的研究与仿真[J]. 计算机仿真, 2005, 22(12): 285–288. doi: 10.3969/j.issn.1006-9348.2005.12.080

    LUO Lijun, LI Yinshan, LI Tong, et al. Research and simulation of Lyapunov’s exponents[J]. Computer Simulation, 2005, 22(12): 285–288. doi: 10.3969/j.issn.1006-9348.2005.12.080
    [14]
    毛骁骁, 孙克辉, 刘文浩. 基于分数阶统一混沌系统的图像加密算法[J]. 传感器与微系统, 2017, 36(6): 138–141. doi: 10.13873/j.1000-9787(2017)06-0138-04

    MAO Xiaoxiao, SUN Kehui, and LIU Wenhao. Image encryption algorithm based on fractional order unified chaotic system[J]. Transducer and Microsystem Technologies, 2017, 36(6): 138–141. doi: 10.13873/j.1000-9787(2017)06-0138-04
    [15]
    李付鹏, 刘敬彪, 王光义, 等. 基于混沌集的图像加密算法[J]. 电子与信息学报, 2020, 42(4): 981–987. doi: 10.11999/JEIT190344

    LI Fupeng, LIU Jingbiao, WANG Guangyi, et al. An image encryption algorithm based on chaos set[J]. Journal of Electronics &Information Technology, 2020, 42(4): 981–987. doi: 10.11999/JEIT190344
    [16]
    马上, 刘剑锋, 杨泽国, 等. 基于余数系统与置换多项式的高速长周期伪随机序列生成方法[J]. 电子与信息学报, 2018, 40(1): 42–49. doi: 10.11999/JEIT170421

    MA Shang, LIU Jianfeng, YANG Zeguo, et al. A method of generating high speed and long period pseudo-random sequence based on residue number system and permutation polynomial[J]. Journal of Electronics &Information Technology, 2018, 40(1): 42–49. doi: 10.11999/JEIT170421
    [17]
    肖成龙, 孙颖, 林邦姜, 等. 基于神经网络与复合离散混沌系统的双重加密方法[J]. 电子与信息学报, 2020, 42(3): 687–694. doi: 10.11999/JEIT190213

    XIAO Chenglong, SUN Ying, LIN Bangjiang, et al. Double encryption method based on neural network and composite discrete chaotic system[J]. Journal of Electronics &Information Technology, 2020, 42(3): 687–694. doi: 10.11999/JEIT190213
    [18]
    郭媛, 周艳艳, 敬世伟. 基于图像重组和比特置乱的多图像加密[J]. 光子学报, 2020, 49(4): 0410002. doi: 10.3788/gzxb20204904.0410002

    GUO Yuan, ZHOU Yanyan, and JING Shiwei. Multiple-image encryption based on image recombination and bit scrambling[J]. Acta Photonica Sinica, 2020, 49(4): 0410002. doi: 10.3788/gzxb20204904.0410002
    [19]
    刘旭. 基于深度学习对一类混沌图像加密算法进行安全性分析[D]. [硕士论文], 南京邮电大学, 2019.

    LIU Xu. Security analysis of a class of chaotic image encryption algorithm based on deep learning[D]. [Master dissertation], Nanjing University of Posts and Telecommunications, 2019.
    [20]
    向滔. 基于混沌的数字图像加密算法的分析与设计[D]. [硕士论文], 重庆大学, 2014.

    XIANG Tao. Analysis and designs of digital image encryption algorithm based on chaos[D]. [Master dissertation], Chongqing University, 2014.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(16)  / Tables(3)

    Article Metrics

    Article views (1121) PDF downloads(144) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return