Color image encrypting method based on multi-chaos system

A color image, encryption method technology, applied in image data processing, image data processing, instruments, etc., can solve problems such as difficulty in resisting known plaintext attacks, and achieve strong anti-attack ability, high key sensitivity, and key space. big effect

Inactive Publication Date: 2009-12-16
NORTHWESTERN POLYTECHNICAL UNIV
View PDF0 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

LI Shu-jun, ZHENGXuan explored and analyzed the security of image encryption methods, and pointed out that some methods are difficult to resist known plaintext attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Color image encrypting method based on multi-chaos system
  • Color image encrypting method based on multi-chaos system
  • Color image encrypting method based on multi-chaos system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention will be further described now in conjunction with accompanying drawing:

[0030] Digital image Input_image, with M W×H Indicates that w is the width of the image, h is the height of the image, both in pixels, and w×h=n. A pixel P of an image consists of three 8-bit values. The value key of the double type used below 1 key 5 provided by the user.

[0031] The specific encryption process is as follows (seefigure 1 , of which steps 7-9 can be referred to at the same time figure 2 ):

[0032] 1. Record the gray value of each pixel of the image Input_image as a two-dimensional matrix P (x,y) , the P (x,y) Perform S box transformation and convert the transformation result into a one-dimensional pixel array P (h×x+y) , namely P 0 , P 1 , P 2 , P 3 ,…P n , denoted as sequence {P i}.

[0033] 2. Use the key key 1 Iterate as the initial value of the Chebychev map, exclude the first 100 values, and take the sequence {X c}, where X c ∈(-1, 1...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a color image encrypting method based on a multi-chaos system, which is technically characterized in that the gray value of each pixel of an Input-image is recorded as a two-dimensional matrix P(x,y), S box transformation is performed to the P(x,y), and a transformation result is transformed into a pile of pixel groups P(h*x+y), i.e. P0, P1, P2, P3, to Pn, and the pixel groups are recorded as a sequence Pi; XOR operation is performed to each value of {XL1'} and {XL2'} and each pixel in Pi, i.e. Pi'=Pi +XL2'+XL1', thereby finishing the encrypting process. The invention has the advantages of large key space, high key sensitivity, good security and strong anti-attack ability. The security of the method can be completely independent of the attribute of an image and is especially suitable for the condition with higher security requirement.

Description

technical field [0001] The invention relates to a color image encryption method based on a multi-chaotic system, belongs to the encryption technology in the field of information security, and is a digital encryption scheme for color images realized by using electronic computer technology and chaotic mapping. Background technique [0002] Modern technology is changing with each passing day, which has greatly promoted the prosperity of the Internet. With the rapid development of the Internet, network security issues are becoming more and more serious, and the information security situation is not optimistic. In recent years, various new types of viruses have emerged one after another, and network attacks have occurred frequently, making it impossible to guard against, causing huge losses to network users all over the world. Therefore, information security issues are gradually becoming the focus of attention. [0003] Cryptography is considered to be the most economical and i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00
Inventor 张云鹏左飞翟正军焦会琴
Owner NORTHWESTERN POLYTECHNICAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products