• Acta Physica Sinica
  • Vol. 69, Issue 4, 040502-1 (2020)
Zhi-Ben Zhuang1, Jun Li2, Jing-Yi Liu1, and Shi-Qiang Chen3、*
Author Affiliations
  • 1School of Science, Hubei Mimzu University, Enshi 445000, China
  • 2School of Information Engineering, Hubei Minzu University, Enshi 445000, China
  • 3School of Advanced Materials and Mechatronic Engineering, Hubei Minzu University, Enshi 445000, China
  • show less
    DOI: 10.7498/aps.69.20191342 Cite this Article
    Zhi-Ben Zhuang, Jun Li, Jing-Yi Liu, Shi-Qiang Chen. Image encryption algorithm based on new five-dimensional multi-ring multi-wing hyperchaotic system[J]. Acta Physica Sinica, 2020, 69(4): 040502-1 Copy Citation Text show less
    Lyapunov exponent diagram.
    Fig. 1. Lyapunov exponent diagram.
    Bifurcation diagram of system (2) variation with .
    Fig. 2. Bifurcation diagram of system (2) variation with .
    Time series diagram: (a) time series; (b) time series; (c) time series; (d) time series; (e) time series
    Fig. 3. Time series diagram: (a) time series; (b) time series; (c) time series; (d) time series; (e) time series
    Three-dimensional phase diagram: (a) Three-dimensional map; (b) Three-dimensional map; (c) Three-dimensional map; (d) Three-dimensional map; (e) Three-dimensional map; (f) Three-dimensional map; (g) Three-dimensional map; (h) Three-dimensional map; (i) Three-dimensional map; (j) Three-dimensional map.
    Fig. 4. Three-dimensional phase diagram: (a) Three-dimensional map; (b) Three-dimensional map; (c) Three-dimensional map; (d) Three-dimensional map; (e) Three-dimensional map; (f) Three-dimensional map; (g) Three-dimensional map; (h) Three-dimensional map; (i) Three-dimensional map; (j) Three-dimensional map.
    Two-dimensional plane phase diagram: (a) flat; (b) flat; (c) flat; (d) flat; (e) flat; (f) flat; (g) flat.
    Fig. 5. Two-dimensional plane phase diagram: (a) flat; (b) flat; (c) flat; (d) flat; (e) flat; (f) flat; (g) flat.
    Digital image encryption and decryption experiment: (a) Original Lena image; (b) encrypted Lena image; (c) decrypted Lena image; (d) original baboon image; (e) encrypted baboon image; (f) decrypted baboon image; (g) original boat image.; (h) encrypted boat image; (i)decrypted boat image.
    Fig. 6. Digital image encryption and decryption experiment: (a) Original Lena image; (b) encrypted Lena image; (c) decrypted Lena image; (d) original baboon image; (e) encrypted baboon image; (f) decrypted baboon image; (g) original boat image.; (h) encrypted boat image; (i)decrypted boat image.
    Histogram of plaintext and ciphertext images (a) Plaintext Lena image histogram; (b) ciphertext Lena image histogram; (c) plaintext baboon image histogram; (d) ciphertext baboon image histogram; (e) plaintext boat image histogram; (f) ciphertext boat image histogram.
    Fig. 7. Histogram of plaintext and ciphertext images (a) Plaintext Lena image histogram; (b) ciphertext Lena image histogram; (c) plaintext baboon image histogram; (d) ciphertext baboon image histogram; (e) plaintext boat image histogram; (f) ciphertext boat image histogram.
    Key sensitivity tests: (a) Plain-image; (b) cipher with key ; (c) cipher with key ; (d) right decrypted ; (e) decrypted with ; (f) decryptedwith.
    Fig. 8. Key sensitivity tests: (a) Plain-image; (b) cipher with key ; (c) cipher with key ; (d) right decrypted ; (e) decrypted with ; (f) decrypted with .
    Correlation analysis chart in three directions before and after baboon image encryption: (a), (b) Diagonally adjacent; (c), (d) horizontally adjacent; (e), (f) vertically adjacent.
    Fig. 9. Correlation analysis chart in three directions before and after baboon image encryption: (a), (b) Diagonally adjacent; (c), (d) horizontally adjacent; (e), (f) vertically adjacent.
    Anti-shear attack capability analysis chart: (a) Ciphertext before cutting; (b) ciphertext after cutting; (c) decrypted image before cutting; (d) decrypted image after cutting.
    Fig. 10. Anti-shear attack capability analysis chart: (a) Ciphertext before cutting; (b) ciphertext after cutting; (c) decrypted image before cutting; (d) decrypted image after cutting.
    Anti-noise attack capability analysis chart: (a) Ciphertext before adding noise; (b) ciphertext after adding noise; (c) decrypted image before adding noise; (d) decrypted image after adding noise.
    Fig. 11. Anti-noise attack capability analysis chart: (a) Ciphertext before adding noise; (b) ciphertext after adding noise; (c) decrypted image before adding noise; (d) decrypted image after adding noise.
    图像Lena图像Baboon图像Boat图像
    原图像7.46447.37137.1267
    密文图像7.99947.99947.9993
    文献[11] 7.99927.9993
    文献[12] 7.99947.9993
    文献[13] 7.99717.9993
    文献[14] 7.9960
    文献[15] 7.99937.9993
    文献[16] 7.99937.9992
    文献[17] 7.9974
    Table 1.

    Information entropy analysis table of plain text and encrypted image.

    明文图像与加密图像的信息熵分析表

    图像总像素数不动点数不动点比
    Lena图像26214410150.39%
    Baboon图像26214410140.39%
    Boat图像2621449990.38%
    Table 2.

    Encrypted image fixed point ratio analysis table.

    加密图像不动点比分析表

    图像Lena图像Baboon图像Boat图像
    灰度平均变化值73.193770.858974.8383
    Table 3.

    Grayscale average change value analysis table.

    灰度平均变化值分析表

    图像lena图像baboon图像boat图像
    指标NPCRUACINPCRUACINPCRUACI
    本文算法0.99640.33400.99620.33460.99580.3344
    文献[13] 0.99620.33470.99600.3340
    文献[14] 0.99570.3508
    文献[15] 0.99610.33470.99610.3347
    文献[16] 0.99620.33440.99610.3349
    Table 4.

    Key sensitivity test result table.

    密钥敏感性测试结果表

    图像水平方向相关系数垂直方向相关系数对角线方向相关系数
    明文图像密文图像明文图像密文图像明文图像密文图像
    Lena0.9762–0.00840.96590.04610.94680.0131
    Baboon0.7204–0.00500.8264–0.00740.7046–0.0322
    boat0.96210.01060.82520.00870.8327–0.0423
    Table 5.

    Plaintext image and ciphertext image correlation coefficient test result table.

    明文图像与密文图像相关系数测试结果表

    Zhi-Ben Zhuang, Jun Li, Jing-Yi Liu, Shi-Qiang Chen. Image encryption algorithm based on new five-dimensional multi-ring multi-wing hyperchaotic system[J]. Acta Physica Sinica, 2020, 69(4): 040502-1
    Download Citation