| With the development of science and technology,digital technology has been integrated into people’s daily life.People increasingly rely on Internet communication to learn,work and live.As the main information transmission medium,digital image plays an important role in daily communication.Therefore,ensuring the security and integrity of digital images in the process of information transmission has become the focus of current research.In order to meet the needs of the society for image encryption systems,it is very urgent to design and develop image encryption methods with excellent performance.However,the traditional image encryption cryptosystem commonly used at present often has limitations and is difficult to meet the current requirements of image encryption security.Therefore,researchers use chaotic systems to encrypt images.Therefore,the research focus of this paper is to optimize the chaotic mapping and image encryption,build a new chaotic system model that can generate pseudorandom sequences,and verify it theoretically and experimentally,design a digital image encryption and decryption scheme based on the new chaotic system,and carry out various simulation experiments on it.Specifically,this paper proposes a new chaotic system CIM based on one-dimensional Chebyshev and Iterative mapping,which has better chaotic characteristics,including larger chaotic range and higher complexity.In order to verify the security and practicability of the newly proposed CIM chaotic system model,this paper proposes a new image encryption algorithm,in which the magic square theorem is introduced to exchange pixel positions,and the quadtree and DNA coding are used in the diffusion link to exchange bits of scrambled images.Through several simulation experiments,the results show that the image encryption algorithm proposed in this paper has good encryption effect,high security and complexity,and can resist various attacks.Finally,this paper designs a small encryption program with a visual interface,uses MATLAB software to develop and design function modules,and embeds the image encryption algorithm proposed in this paper in the function functions of the program,so that users can easily and quickly encrypt and decrypt images. |