Method for encrypting and decrypting image based on cellular automata

A cellular automaton and image technology, applied in the field of information security, can solve problems such as failing to consider algorithm fault tolerance and decryption failure

Inactive Publication Date: 2012-06-27
HOHAI UNIV
View PDF3 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This type of method has good confusion and diffusion performance, but fails to consider the fault tolerance of the algorithm. When the cipher

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for encrypting and decrypting image based on cellular automata
  • Method for encrypting and decrypting image based on cellular automata
  • Method for encrypting and decrypting image based on cellular automata

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The present invention will be described in further detail below in conjunction with accompanying drawing and embodiment, and given embodiment is in order to explain the technical characteristic and function characteristic of the method of the present invention, rather than limit the scope of the present invention.

[0051] The embodiment of the present invention adopts Mathematica 8 software to carry out emulation, and the plaintext image selects the standard test gray-scale image "Lena" that size is 256 * 256, and each pixel of the image is made up of 8 bits, as Figure 5 shown.

[0052] The steps of the encryption method are as follows:

[0053] First, use the Import function of Mathematica to extract the pixel matrix I of the plaintext image 256×256 , and then convert each row of the pixel matrix into 256 binary sequences B 1 , B 2 , B 3 ,...,B 256 , the length of each binary sequence is 2048 bits. Set the number of iterations d=512. Then, use Mathematica's Ra...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for encrypting and decrypting an image based on cellular automata, and belongs to an image security technology in the field of information security. The encryption method comprises the following steps of: extracting a pixel matrix of a plaintext image, and converting each line of the pixel matrix into a binary sequence; and performing two round chain cycle iterations on each line of the image by using a plurality of cellular automata, and converting iteration results into corresponding pixel matrixes to obtain a ciphertext image. In each iteration process, iteration frequency is set in advance, and a rule number used in each iteration process is generated by a pseudorandom sequence generator. The decryption process is an inverse process of encryption, and the using sequence of a rule number is reverse to the sequence of the rule number in an encryption process. The method has the advantages that a complex and unpredictable relationship among a plaintext, a secret key and a ciphertext is generated by using the chain cycle iterations of the cellular automata, the image security is ensured in a network transmission process, and the method has certain fault-tolerant capability.

Description

Technical field: [0001] The invention relates to an image encryption and decryption method based on cellular automata, which belongs to the image security technology in the field of information security. Background technique: [0002] Images are an important means for human beings to obtain information, express information and transmit information. With the rapid development of the Internet and multimedia technology, more and more images can be published and transmitted conveniently and quickly on the Internet. Some images involving personal privacy, commercial secrets or state secrets are easily browsed, stolen, tampered, illegally copied and disseminated by malicious attackers. If the necessary security protection measures are not taken for these images, the resulting serious consequences is immeasurable. Therefore, image encryption, as the core technology of image security protection, is more and more widely used, and its requirements are getting higher and higher. Dif...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04N1/44
Inventor 平萍王宇许峰王志坚
Owner HOHAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products