Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

283results about How to "Large key space" patented technology

Three-dimensional Arnold mapping-based image grouping encryption method

The invention relates to a three-dimensional Arnold mapping-based image grouping encryption method, which is characterized by comprising the following steps: firstly, adopting an Amold mapping extended to three dimensions to construct an S box; then, performing sorting scrambling on a chaotic sequence generated by a Chebyshev mapping; and finishing the encryption operation through multi-iteration. The theoretical analysis and experimental result prove that the three-dimensional Arnold mapping-based image grouping encryption method has the advantages of large key space, high sensitivity, high speed, excellent safety, strong attack resistance, and the like. Compared with other similar methods, the three-dimensional Arnold mapping-based image grouping encryption method guarantees the safety and has higher speed, and is more applicable for graphic data encryption. The main superiority of the method is that: the method has enough key space to resist an exhaustive attack, and the change of a key at any bit can completely change an initial value and the parameters of the chaotic sequence. Therefore, the sensitivity of the key is greatly improved; any useful information cannot be exposed by the statistical property; and the relativity of adjacent pixels of an intensity diagram is small and the attack resistance is strong.
Owner:NORTHWESTERN POLYTECHNICAL UNIV

Image encryption method based on Feistel network and dynamic DNA encoding

The invention provides an image encryption method based on a Feistel network and dynamic DNA encoding. The method comprises the following steps: computing a Hash value of an original plaintext image by using a Keccak algorithm, and taking the Hash value as an initial value of a hyper-chaotic Chen system, generating a Hill encryption matrix by using a chaotic sequence generated by the hyper-chaoticChen system so as to replace pixels of an original image; realizing image pixel value diffusion by using the DNA encoding operation as a F function of the Feistel network, and a DNA sequence base asa key of the Feistel network; and performing further diffusion through ciphertext feedback. Through three turns of chaotic scrambling-DNA encoding-Feistel conversion-DNA decoding, the ciphertext randomness and attack resistance are stronger, the scrambling conversion of the image pixel location and the diffusion of the pixel value are realized, and the encryption turn is reduced due to repeated scrambling and DNA encoding and decoding. Through the image encryption method provided by the invention, the image can be effectively encrypted, the plaintext sensitivity is strong, the plaintext attack, the differential attack and the statistical attack can be effectively resisted
Owner:ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY

Image encryption method based on chaotic mapping and bit-level replacement

The invention provides an image encryption method based on chaotic mapping and bit-level replacement. The method comprises the following steps: converting a grayscale image into an image matrix; iterating 2D-LSCM mapping to generate a chaotic sequence and mapping the chaotic sequence into a matrix, and returning a position index to perform pixel position exchange on the image matrix after descending sorting of each row; sequentially exchanging the lowest three bits in every two pixel bits to obtain an information fusion sequence of the image; performing iteration on the Logistic mapping to generate a chaotic sequence, and performing operation on the information fusion sequence and the chaotic sequence to obtain a pixel replacement column of the image; and performing pixel diffusion on thepixel replacement sequence of the image by using a chaotic sequence and a ciphertext diffusion technology to obtain an encrypted image. The chaotic mapping and scrambled images are used for replacement operation, the differential attack resistance is enhanced through bit information fusion operation and an image pixel-based diffusion method, the secret key space is large enough, violent attack canbe better resisted, and good safety is achieved.
Owner:ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY

Image encryption algorithm based on memoristor hyper-chaotic system, cellular automaton and DNA calculation

ActiveCN106023052AImprove securityEnhanced resistance to brute force attacksImage data processing detailsChosen-plaintext attackCellular automation
The invention relates to an image encryption algorithm based on memoristor hyper-chaotic system, cellular automaton and DNA calculation. First of all, a four-dimensional memoristor hyper-chaotic system based on a Chua circuit is employed, at the same time, a secret key is generated by enabling a plaintext image on an SHA256 function; a pseudo random sequence generated by the chaos system is taken as a basis of DNA dynamic encoding, rules of cellular dynamic evolution are determined according to a DNA matrix after diffusion, and in an encryption process, partitioning processing is performed on the image; and finally, the image is encrypted through a pseudo DNA calculation method, and diffusion operation is carried out while the image is scrambled. According to the invention, on one hand, secret key space is increased and the capability of the algorithm in fending off violent attacks is enhanced; and on the other hand, the secret key is enabled to be generated through close reliance on a plaintext, the capability of the algorithm in fending off plaintext attacks is improved, the capability of fending off exhausive attacks is higher, parallel calculation is facilitated, the operation efficiency is further improved, and the security of the algorithm is improved.
Owner:HENAN UNIVERSITY

Image encryption method based on memristive chaotic system, elementary cellular automaton (ECA) and compression perception

The invention belongs to the field of image encryption, and particularly relates to an image encryption method based on a memristive chaotic system, an elementary cellular automaton (ECA) and compression perception. The method includes: firstly, carrying out discrete wavelet transform on an image, and then obtaining a sparse coefficient matrix; then adopting a zigzag scrambling method to carry out scrambling on the sparse coefficient matrix, and then utilizing the elementary cellular automaton for scrambling operation; and finally, using a measurement matrix, which is generated by the memristive chaotic system, to carry out compression perception on the image after scrambling to obtain a final ciphertext image. The plaintext image generates initial values of the chaotic system and an initial configuration of the cellular automaton through being applied to SHA-512 functions, and correlation between an algorithm and the plaintext image is enhanced. According to the method, image encryption technology of combining the elementary cellular automaton and compression perception is adopted , the elementary cellular automaton is utilized to carry out scrambling on the image, the image is encrypted while image compression is realized through compression perception, the amount of transmitted data is reduced, and image information leakage is prevented. The method has higher safety performance.
Owner:HENAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products