Font Size: a A A

Chaotic Image Encryption Algorithm Based On DNA Computing And Bit Level Permutation And Information Synchronization Control Strategy Of Pinning Pulse Cluster

Posted on:2022-02-15Degree:MasterType:Thesis
Country:ChinaCandidate:K LiuFull Text:PDF
GTID:2480306539981439Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the advent of the Internet wave and its rapid development,the digital era has officially arrived,and digital technology has also been rapidly developed and applied to our lives.In the digital age,we get more and more information.In the face of a variety of information,it is difficult for us to take more time to extract and process the effective information.Digital image is a good solution to this problem.Image storage data is large and concentrated,which can easily let us extract the desired information.Because of this,digital images have become the primary target of illegal attackers.The pictures we send may be illegally intercepted or tampered at any time on the open network.The traditional encryption technology in the original design is mainly aimed at text data,digital image strong correlation,high redundancy and other characteristics are difficult to adapt to the traditional encryption technology.However,the emergence of chaos theory and its application make the security of image more secure.Many secure chaotic image encryption methods have been proposed one after another.The main content of this paper is the combination of chaotic mapping and DNA computing to encrypt the image,and then based on the need to send the secret key stream,the information synchronization control technology is studied.Finally,an encryption small program is designed based on this encryption scheme.This paper proposes a chaotic image encryption algorithm based on deoxyribonucleic acid(DNA)computation and bit level permutation.Firstly,SHA-256 hash function is used to generate the initial value of chaotic system,which can effectively resist the chosen plaintext attack.Secondly,the image is indexed and scrambled by Logistic chaotic map.Then,the fourth-order Rossler chaotic map is used to replace the scrambled image.Then,the Hamming distance is used to update the key to generate four groups of chaotic sequences,which are converted into DNA sequences according to the 8 coding rules of DNA.Then,the R,G and B components of the image are added,subtracted and XOR to achieve full diffusion.Finally,the R,G and B components are restored to the pixel level and combined to obtain the final encrypted image.In this paper,the encryption scheme is simulated,and its performance is tested and analyzed from many aspects.All the results show that the algorithm has good security performance,and has a certain competitiveness compared with other algorithms.In this paper,we study the synchronization of impulsive pinned clusters in complex dynamic networks.Based on Lyapunov stability and impulsive differential equation theory,it is proved that our pinning impulsive control strategy is correct and effective for realizing cluster synchronization when the sufficient conditions given in the theorem are satisfied,and it can conveniently synchronize the secret key flow and chaotic sequence information sent by communication twin transmitters in complex dynamic network.In addition,the simulation results show that the control strategy is very effective and convenient.This paper designs a small program based on chaotic image encryption algorithm.Firstly,the visual encryption interface is designed by using guide of MATLAB software.Secondly,write various functions,such as import image function,encryption function and export encryption image function.The most important is to embed the encryption and decryption algorithm into the callback function of this program,so that the small program can encrypt the image simply and quickly.Finally,a simple round of encryption is carried out for the designed small program.From the encryption process,it can be seen that this program is simple to operate and has certain practicability.
Keywords/Search Tags:chaotic encryption, bitlevel permutation, complex network, synchronization technology, DNA computing
PDF Full Text Request
Related items