Author Affiliations
1School of Science, Hubei Mimzu University, Enshi 445000, China2School of Information Engineering, Hubei Minzu University, Enshi 445000, China3School of Advanced Materials and Mechatronic Engineering, Hubei Minzu University, Enshi 445000, Chinashow less
Fig. 1. Lyapunov exponent diagram.
Fig. 2. Bifurcation diagram of system (2) variation with
.
Fig. 3. Time series diagram: (a)
time series; (b)
time series; (c)
time series; (d)
time series; (e)
time series
Fig. 4. Three-dimensional phase diagram: (a)
Three-dimensional map; (b)
Three-dimensional map; (c)
Three-dimensional map; (d)
Three-dimensional map; (e)
Three-dimensional map; (f)
Three-dimensional map; (g)
Three-dimensional map; (h)
Three-dimensional map; (i)
Three-dimensional map; (j)
Three-dimensional map.
Fig. 5. Two-dimensional plane phase diagram: (a)
flat; (b)
flat; (c)
flat; (d)
flat; (e)
flat; (f)
flat; (g)
flat.
Fig. 6. Digital image encryption and decryption experiment: (a) Original Lena image; (b) encrypted Lena image; (c) decrypted Lena image; (d) original baboon image; (e) encrypted baboon image; (f) decrypted baboon image; (g) original boat image.; (h) encrypted boat image; (i)decrypted boat image.
Fig. 7. Histogram of plaintext and ciphertext images (a) Plaintext Lena image histogram; (b) ciphertext Lena image histogram; (c) plaintext baboon image histogram; (d) ciphertext baboon image histogram; (e) plaintext boat image histogram; (f) ciphertext boat image histogram.
Fig. 8. Key sensitivity tests: (a) Plain-image; (b) cipher
with key
; (c) cipher
with key
; (d) right decrypted
; (e) decrypted
with
; (f) decrypted
with
.
Fig. 9. Correlation analysis chart in three directions before and after baboon image encryption: (a), (b) Diagonally adjacent; (c), (d) horizontally adjacent; (e), (f) vertically adjacent.
Fig. 10. Anti-shear attack capability analysis chart: (a) Ciphertext before cutting; (b) ciphertext after cutting; (c) decrypted image before cutting; (d) decrypted image after cutting.
Fig. 11. Anti-noise attack capability analysis chart: (a) Ciphertext before adding noise; (b) ciphertext after adding noise; (c) decrypted image before adding noise; (d) decrypted image after adding noise.
图像 | Lena图像 | Baboon图像 | Boat图像 | 原图像 | 7.4644 | 7.3713 | 7.1267 | 密文图像 | 7.9994 | 7.9994 | 7.9993 | 文献[11]
| 7.9992 | 7.9993 | — | 文献[12]
| 7.9994 | 7.9993 | — | 文献[13]
| 7.9971 | — | 7.9993 | 文献[14]
| 7.9960 | — | — | 文献[15]
| 7.9993 | 7.9993 | — | 文献[16]
| 7.9993 | 7.9992 | — | 文献[17]
| 7.9974 | — | — |
|
Table 1. Information entropy analysis table of plain text and encrypted image.
明文图像与加密图像的信息熵分析表
图像 | 总像素数 | 不动点数 | 不动点比 | Lena图像 | 262144 | 1015 | 0.39% | Baboon图像 | 262144 | 1014 | 0.39% | Boat图像 | 262144 | 999 | 0.38% |
|
Table 2. Encrypted image fixed point ratio analysis table.
加密图像不动点比分析表
图像 | Lena图像 | Baboon图像 | Boat图像 | 灰度平均变化值 | 73.1937 | 70.8589 | 74.8383 |
|
Table 3. Grayscale average change value analysis table.
灰度平均变化值分析表
图像 | | lena图像 | | baboon图像 | | boat图像 | 指标 | NPCR | UACI | NPCR | UACI | NPCR | UACI | 本文算法 | | 0.9964 | 0.3340 | | 0.9962 | 0.3346 | | 0.9958 | 0.3344 | 文献[13]
| | 0.9962 | 0.3347 | | — | — | | 0.9960 | 0.3340 | 文献[14]
| | 0.9957 | 0.3508 | | — | — | | — | — | 文献[15]
| | 0.9961 | 0.3347 | | 0.9961 | 0.3347 | | — | — | 文献[16]
| | 0.9962 | 0.3344 | | 0.9961 | 0.3349 | | — | — |
|
Table 4. Key sensitivity test result table.
密钥敏感性测试结果表
图像 | 水平方向相关系数 | | 垂直方向相关系数 | | 对角线方向相关系数 | 明文图像 | 密文图像 | 明文图像 | 密文图像 | 明文图像 | 密文图像 | Lena | 0.9762 | –0.0084 | | 0.9659 | 0.0461 | | 0.9468 | 0.0131 | Baboon | 0.7204 | –0.0050 | 0.8264 | –0.0074 | 0.7046 | –0.0322 | boat | 0.9621 | 0.0106 | 0.8252 | 0.0087 | 0.8327 | –0.0423 |
|
Table 5. Plaintext image and ciphertext image correlation coefficient test result table.
明文图像与密文图像相关系数测试结果表