FOLLOWUS
1.Third Surveying and Mapping Institute of Hunan Province, Changsha 410000, China
2.Hunan Engineering Research Center of Geographic Information Security and Application, Changsha 410000, China
3.School of Information and Electrical Engineering, Hunan University of Science and Technology, Xiangtan 411201, China
‡Corresponding author
收稿日期:2023-11-07,
修回日期:2024-04-08,
纸质出版日期:2025-03
Scan QR Code
段佳, 胡娈运, 肖求美, 等. 基于Chaos-LSTM与混沌序列增殖的地理信息数据加密系统[J]. 信息与电子工程前沿(英文版), 2025,26(3):427-440.
Jia DUAN, Luanyun HU, Qiumei XIAO, et al. A geographic information encryption system based on Chaos-LSTM and chaos sequence proliferation[J]. Frontiers of information technology & electronic engineering, 2025, 26(3): 427-440.
段佳, 胡娈运, 肖求美, 等. 基于Chaos-LSTM与混沌序列增殖的地理信息数据加密系统[J]. 信息与电子工程前沿(英文版), 2025,26(3):427-440. DOI: 10.1631/FITEE.2300755.
Jia DUAN, Luanyun HU, Qiumei XIAO, et al. A geographic information encryption system based on Chaos-LSTM and chaos sequence proliferation[J]. Frontiers of information technology & electronic engineering, 2025, 26(3): 427-440. DOI: 10.1631/FITEE.2300755.
针对传统混沌加密算法中混沌系统状态与初始状态及参数关联性强,可能导致混沌序列存在周期性的问题,结合混沌系统和LSTM神经网络构建了Chaos-LSTM模型。针对计算机的有限计算精度效应会使长混沌序列出现周期性,使其不适宜对数据量大的对象进行加密的问题,构建了混沌序列增殖(CSP)算法。结合二者,提出了基于Chaos-LSTM与混沌序列增殖的地理信息数据加密通信系统。首先,通过Chaos-LSTM模型输出具有较高谱熵(SE)复杂度的混沌序列;然后,选取较短的混沌序列,通过CSP算法增殖出匹配加密对象的混沌加密序列,并对增殖序列进行随机性分析与测试;最后,以地理图片信息为加密对象,将混沌增殖序列与扩散算法以及置乱算法结合构成加密算法,并将加密系统在ZYNQ平台中实现。软件测试与硬件实验表明该系统具有良好的保密性能与可拓展性,能用于多种加密对象的保密通信,具备良好的应用价值。
In response to the strong correlation between the chaotic system state and initial state and parameters in traditional chaotic encryption algorithms
which may lead to periodicity in chaotic sequences
the chaos long short-term memory (Chaos-LSTM) model is constructed by combining chaotic systems with LSTM neural networks. The chaos sequence proliferation (CSP) algorithm is constructed to address the problem that the limited computational accuracy of computers can lead to periodicity in long chaotic sequences
making them unsuitable for encrypting objects with large amounts of data. By combining the Chaos-LSTM model and CSP algorithm
a geographic information encryption system is proposed. First
the Chaos-LSTM model is used to output chaotic sequences with high spectral entropy (SE) complexity. Then
a shorter chaotic sequence is selected and proliferated using the CSP algorithm to generate chaotic proliferation sequences that match the encrypted object; a randomness analysis is conducted and testing is performed on it. Finally
using geographic images as encryption objects
the chaotic proliferation sequence
along with the scrambling and diffusion algorithms
are combined to form the encryption system
which is implemented on the ZYNQ platform. The system’s excellent confidentiality performance and scalability are proved by software testing and hardware experiments
making it suitable for the confidentiality peers of various encryption objects with outstanding application value.
Alexan W , Elkandoz M , Mashaly M , et al. , 2023 . Color image encryption through chaos and KAA map . IEEE Access , 11 : 11541 - 11554 . https://doi.org/10.1109/ACCESS.2023.3242311 https://doi.org/10.1109/ACCESS.2023.3242311
Cao Y , Zhao YL , Wang Q , et al. , 2022 . The evolution of quantum key distribution networks: on the road to the Qinternet . IEEE Commun Surv Tutor , 24 ( 2 ): 839 - 894 . https://doi.org/10.1109/COMST.2022.3144219 https://doi.org/10.1109/COMST.2022.3144219
Chen X , Qian S , Yu F , et al. , 2020 . Pseudorandom number generator based on three kinds of four-wing memristive hyperchaotic system and its application in image encryption . Complexity , 2020 : 8274685 . https://doi.org/10.1155/2020/8274685 https://doi.org/10.1155/2020/8274685
De la Fraga LG , Mancillas-López C , Tlelo-Cuautle E , 2021 . Designing an authenticated Hash function with a 2D chaotic map . Nonl Dyn , 104 ( 4 ): 4569 - 4580 . https://doi.org/10.1007/s11071-021-06491-3 https://doi.org/10.1007/s11071-021-06491-3
De la Fraga LG , Ovilla-Martínez B , Tlelo-Cuautle E , 2023 . Echo state network implementation for chaotic time series prediction . Microprocess Microsyst , 103 : 104950 . https://doi.org/10.1016/j.micpro.2023.104950 https://doi.org/10.1016/j.micpro.2023.104950
Gabr M , Korayem Y , Chen YL , et al. , 2023 . R 3 —rescale, rotate, and randomize: a novel image cryptosystem utilizing chaotic and hyper-chaotic systems . IEEE Access , 11 : 119284 - 119312 . https://doi.org/10.1109/ACCESS.2023.3326848 https://doi.org/10.1109/ACCESS.2023.3326848
Gonzalez-Zapata AM , De la Fraga LG , Ovilla-Martinez B , et al. , 2023 . Enhanced FPGA implementation of echo state networks for chaotic time series prediction . Integration , 92 : 48 - 57 . https://doi.org/10.1016/j.vlsi.2023.05.002 https://doi.org/10.1016/j.vlsi.2023.05.002
Hosseinzadeh R , Zarebnia M , Parvaz R , 2019 . Hybrid image encryption algorithm based on 3D chaotic system and choquet fuzzy integral . Opt Laser Technol , 120 : 105698 . https://doi.org/10.1016/j.optlastec.2019.105698 https://doi.org/10.1016/j.optlastec.2019.105698
Irfan M , Ali A , Khan MA , et al. , 2020 . Pseudorandom number generator (PRNG) design using hyper-chaotic modified robust logistic map (HC-MRLM) . Electronics , 9 ( 1 ): 104 . https://doi.org/10.3390/electronics9010104 https://doi.org/10.3390/electronics9010104
Jia YQ , Shelhamer E , Donahue J , et al. , 2014 . Caffe: convolutional architecture for fast feature embedding . Proc 22 nd ACM Int Conf on Multimedia , p. 675 - 678 . https://doi.org/10.1145/2647868.2654889 https://doi.org/10.1145/2647868.2654889
Lin HR , Wang CH , Cui L , et al. , 2022 . Hyperchaotic memristive ring neural network and application in medical image encryption . Nonl Dyn , 110 ( 1 ): 841 - 855 . https://doi.org/10.1007/s11071-022-07630-0 https://doi.org/10.1007/s11071-022-07630-0
Liu XC , Mou J , Zhang YS , et al. , 2024 . A new hyperchaotic map based on discrete memristor and meminductor: dynamics analysis, encryption application, and DSP implementation . IEEE Trans Ind Electron , 71 ( 5 ): 5094 - 5104 . https://doi.org/10.1109/TIE.2023.3281687 https://doi.org/10.1109/TIE.2023.3281687
Lorenz EN , 1963 . Deterministic nonperiodic flow . J Atmos Sci , 20 ( 2 ): 130 - 141 . https://doi.org/10.1175/1520-0469(1963)020<0130:DNF>2.0.CO;2 https://doi.org/10.1175/1520-0469(1963)020<0130:DNF>2.0.CO;2
Man ZL , Li JQ , Di XQ , et al. , 2021 . Double image encryption algorithm based on neural network and chaos . Chaos Sol Fract , 152 : 111318 . https://doi.org/10.1016/j.chaos.2021.111318 https://doi.org/10.1016/j.chaos.2021.111318
Martins P , Sousa L , Mariano A , 2017 . A survey on fully homomorphic encryption: an engineering perspective . ACM Comput Surv , 50 ( 6 ): 83 . https://doi.org/10.1145/3124441 https://doi.org/10.1145/3124441
Murillo-Escobar MA , Meranza-Castillón MO , López-Gutiérrez RM , et al. , 2019 . Suggested integral analysis for chaos-based image cryptosystems . Entropy , 21 ( 8 ): 815 . https://doi.org/10.3390/e21080815 https://doi.org/10.3390/e21080815
Murillo-Escobar MA , Cruz-Hernández C , Cardoza-Avendaño L , et al. , 2022 . Multibiosignal chaotic encryption scheme based on spread spectrum and global diffusion process for e-health . Biomed Signal Process Contr , 78 : 104001 . https://doi.org/10.1016/j.bspc.2022.104001 https://doi.org/10.1016/j.bspc.2022.104001
Pareschi F , Rovatti R , Setti G , 2012 . On statistical tests for randomness included in the NIST SP800-22 test suite and based on the binomial distribution . IEEE Trans Inform Forens Secur , 7 ( 2 ): 491 - 505 . https://doi.org/10.1109/TIFS.2012.2185227 https://doi.org/10.1109/TIFS.2012.2185227
Rehman AU , Liao XF , Ashraf R , et al. , 2018 . A color image encryption technique using exclusive-OR with DNA complementary rules based on chaos theory and SHA-2 . Optik , 159 : 348 - 367 . https://doi.org/10.1016/j.ijleo.2018.01.064 https://doi.org/10.1016/j.ijleo.2018.01.064
Sahu HK , Jadhav V , Sonavane S , et al. , 2016 . Cryptanalytic attacks on international data encryption algorithm block cipher . Defence Sci J , 66 ( 6 ): 582 - 589 . https://doi.org/10.14429/dsj.66.10798 https://doi.org/10.14429/dsj.66.10798
Teh JS , Alawida M , Sii YC , 2020 . Implementation and practical problems of chaos-based cryptography revisited . J Inform Secur Appl , 50 : 102421 . https://doi.org/10.1016/j.jisa.2019.102421 https://doi.org/10.1016/j.jisa.2019.102421
Tezcan C , 2022 . Key lengths revisited: GPU-based brute force cryptanalysis of DES, 3DES, and PRESENT . J Syst Archit , 124 : 102402 . https://doi.org/10.1016/j.sysarc.2022.102402 https://doi.org/10.1016/j.sysarc.2022.102402
Tlelo-Cuautle E , Díaz-Muñoz JD , González-Zapata AM , et al. , 2020 . Chaotic image encryption using Hopfield and Hindmarsh–Rose neurons implemented on FPGA . Sensors , 20 ( 5 ): 1326 . https://doi.org/10.3390/s20051326 https://doi.org/10.3390/s20051326
Ullah S , Zheng JB , Din N , et al. , 2023 . Elliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive survey . Comput Sci Rev , 47 : 100530 . https://doi.org/10.1016/j.cosrev.2022.100530 https://doi.org/10.1016/j.cosrev.2022.100530
Wan YJ , Gu SQ , Du BX , 2020 . A new image encryption algorithm based on composite chaos and hyperchaos combined with DNA coding . Entropy , 22 ( 2 ): 171 . https://doi.org/10.3390/e22020171 https://doi.org/10.3390/e22020171
Wu XJ , Kan HB , Kurths J , 2015 . A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps . Appl Soft Comput , 37 : 24 - 39 . https://doi.org/10.1016/j.asoc.2015.08.008 https://doi.org/10.1016/j.asoc.2015.08.008
Wu XJ , Wang DW , Kurths J , et al. , 2016 . A novel lossless color image encryption scheme using 2D DWT and 6D hyperchaotic system . Inform Sci , 349-350 : 137 - 153 . https://doi.org/10.1016/j.ins.2016.02.041 https://doi.org/10.1016/j.ins.2016.02.041
Xiong PY , Jahanshahi H , Alcaraz R , et al. , 2021 . Spectral entropy analysis and synchronization of a multi-stable fractional-order chaotic system using a novel neural network-based chattering-free sliding mode technique . Chaos Sol Fract , 144 : 110576 . https://doi.org/10.1016/j.chaos.2020.110576 https://doi.org/10.1016/j.chaos.2020.110576
Xu SC , Wang XY , Ye XL , 2022 . A new fractional-order chaos system of Hopfield neural network and its application in image encryption . Chaos Sol Fract , 157 : 111889 . https://doi.org/10.1016/j.chaos.2022.111889 https://doi.org/10.1016/j.chaos.2022.111889
Yan S , Gu Z , Park JH , et al. , 2023 . Synchronization of delayed fuzzy neural networks with probabilistic communication delay and its application to image encryption . IEEE Trans Fuzzy Syst , 31 ( 3 ): 930 - 940 . https://doi.org/10.1109/TFUZZ.2022.3193757 https://doi.org/10.1109/TFUZZ.2022.3193757
Yu F , Zhang ZN , Shen H , et al. , 2022 . FPGA implementation and image encryption application of a new PRNG based on a memristive Hopfield neural network with a special activation gradient . Chin Phys B , 31 ( 2 ): 020505 . https://doi.org/10.1088/1674-1056/ac3cb2 https://doi.org/10.1088/1674-1056/ac3cb2
Yu Y , Si XS , Hu CH , et al. , 2019 . A review of recurrent neural networks: LSTM cells and network architectures . Neur Comput , 31 ( 7 ): 1235 - 1270 . https://doi.org/10.1162/neco_a_01199 https://doi.org/10.1162/neco_a_01199
关联资源
相关文章
相关作者
相关机构