
Anti-Attack Color Image Encryption Scheme Based on Hopfield Network “Pseudo Attractor” and Alternating Quantum Random Walk
SONG Zhao-yang, WANG Yi-nuo, WANG Hao-wen, MA Hong-yang
ACTA ELECTRONICA SINICA ›› 2023, Vol. 51 ›› Issue (8) : 2030-2042.
Anti-Attack Color Image Encryption Scheme Based on Hopfield Network “Pseudo Attractor” and Alternating Quantum Random Walk
The secure transmission of image information has attracted wide attention in the field of the Internet in recent years. We propose an attack-resistant color image encryption scheme that combines the pseudo-attractor property of Hopfield network with the probability distribution matrix of alternating quantum random walk. We find that by controlling the accuracy parameters of the Hopfield network state matrix, one sub-block M 1 of the 4-block probability distribution matrices generated by the alternating quantum random walk is involved in the encryption as a pseudo-random number matrix. And when the training matrix and the input matrix of Hopfield network are one of the 2 diagonal sub-blocks of the 4-block matrix M 1, respectively, the pseudo-attractor can be generated. The matrix form of this pseudo-attractor, after processing by tensor calculation and binary conversion, can be used as a key matrix to generate an encrypted image based on adaptive permutation of pixel value ordering on the spatial domain and confusion of element values for the original image. The key matrix is a critical part of image encryption, and a key matrix with excellent statistical properties can obviously improve the effectiveness of image encryption. In the statistical characteristic test, the encryption scheme proposed in this paper achieves an average information entropy of 7.999 4, an average value of 99.621 8% of the number of pixels changed rate (NPCR), an average of 33.537 9% of the uniform average change intensity (UACI), and an average correlation decreases to 0.003 9. Our encryption scheme is also tested in the presence of various noise simulations to verify its robustness against common noise and attack interference in practical applications.
information security / image encryption / neural network / Hopfield network / quantum random walk {{custom_keyword}} /
表1 相关性分析 |
图像 | 加密状态 | 通道 | Horizontal | Vertical | Diagonal |
---|---|---|---|---|---|
Lena | 加密前 | Red | 0.980 1 | 0.988 9 | 0.966 8 |
Green | 0.971 1 | 0.984 3 | 0.958 5 | ||
Blue | 0.928 8 | 0.955 8 | 0.914 6 | ||
加密后 | Red | 0.003 7 | 0.006 2 | 0.005 6 | |
Green | 0.006 2 | 0.003 1 | 0.003 3 | ||
Blue | 0.003 9 | 0.001 5 | 0.002 4 | ||
Lemon | 加密前 | Red | 0.919 0 | 0.934 3 | 0.895 1 |
Green | 0.876 5 | 0.894 7 | 0.828 4 | ||
Blue | 0.983 1 | 0.980 0 | 0.965 0 | ||
加密后 | Red | 0.001 1 | 0.005 1 | 0.007 4 | |
Green | 0.002 3 | 0.004 8 | 0.004 1 | ||
Blue | 0.000 9 | 0.003 1 | 0.005 7 | ||
Sakura | 加密前 | Red | 0.905 7 | 0.892 0 | 0.791 8 |
Green | 0.925 1 | 0.910 2 | 0.826 6 | ||
Blue | 0.918 0 | 0.900 4 | 0.803 0 | ||
加密后 | Red | 0.003 7 | 0.006 1 | 0.002 4 | |
Green | 0.003 8 | 0.002 1 | 0.001 8 | ||
Blue | 0.003 5 | 0.000 8 | 0.011 6 |
表2 信息熵分析 |
图像 | 通道 | 信息熵/bit |
---|---|---|
Lena加密后 | Red | 7.999 3 |
Green | 7.999 3 | |
Blue | 7.999 4 | |
Lemon加密后 | Red | 7.999 6 |
Green | 7.999 5 | |
Blue | 7.999 3 | |
Sakura加密后 | Red | 7.999 4 |
Green | 7.999 3 | |
Blue | 7.999 6 |
表3 密钥敏感度分析 |
图像 | 通道 | NPCR/% | UACI/% |
---|---|---|---|
Lena | Red | 99.618 9 | 33.516 3 |
Green | 99.630 6 | 33.548 8 | |
Blue | 99.615 5 | 33.496 8 | |
Lemon | Red | 99.598 3 | 33.576 6 |
Green | 99.631 1 | 33.532 7 | |
Blue | 99.623 8 | 33.546 9 | |
Sakura | Red | 99.642 2 | 33.551 7 |
Green | 99.612 5 | 33.543 9 | |
Blue | 99.623 3 | 33.527 7 |
1 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
2 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
3 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
4 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
5 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
6 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
7 |
韩力群. 人工神经网络理论、设计及应用[M]. 2版. 北京: 化学工业出版社, 2007.
{{custom_citation.content}}
{{custom_citation.annotation}}
|
8 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
9 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
10 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
11 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
12 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
13 |
徐子同, 高涛, 于正同, 等. 基于离散型Hopfield神经网络的图像加密算法[J]. 计算机技术与发展, 2021, 31(6): 106-111.
{{custom_citation.content}}
{{custom_citation.annotation}}
|
14 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
15 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
16 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
17 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
18 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
19 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
20 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
21 |
高飞, 温巧燕, 秦素娟, 等. 基于对称密钥的量子公钥密码[J]. 中国科学: 物理学 力学 天文学, 2010, 40(1): 26-32.
{{custom_citation.content}}
{{custom_citation.annotation}}
|
22 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
23 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
24 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
25 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
26 |
JOHN, WATROUS, . Quantum simulations of classical random walks and undirected graph connectivity[J]. Journal of Computer and System Sciences, 2001, 62(2): 376-391.
{{custom_citation.content}}
{{custom_citation.annotation}}
|
27 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
28 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
29 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
30 |
王一诺, 宋昭阳, 马玉林, 等. 基于DNA编码与交替量子随机行走的彩色图像加密算法[J]. 物理学报, 2021, 70(23): 32-41.
{{custom_citation.content}}
{{custom_citation.annotation}}
|
31 |
丁群, 陆哲明, 孙晓军. 基于神经网络密码的图像加密[J]. 电子学报, 2004, 32(4): 677-679.
{{custom_citation.content}}
{{custom_citation.annotation}}
|
32 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
33 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
34 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
35 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
36 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
37 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
38 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
39 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
40 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
41 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
42 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
43 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
44 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
45 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
{{custom_ref.label}} |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
/
〈 |
|
〉 |