Image two-grade encrypting method based on double-chaos system

An encryption method and double-chaos technology, applied in image data processing, image data processing, instruments, etc., can solve problems such as difficulty for attackers to identify original images, weak security functions, small key space, etc., and achieve enhanced resistance to known plaintext Attack capability, overcoming the small key space, and expanding the effect of the key space

Inactive Publication Date: 2012-09-26
SOUTH CHINA UNIV OF TECH
View PDF3 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The former achieves image encryption by changing the gray value of the original image pixels, and the latter scrambles the arrangement of the original image pixel positions, making it difficult for attackers to identify the original image, thereby achieving the purpose of image encryption, but the traditional two types of encryption The encryption key of the method has nothing to do with the plaintext image, and it is difficult to resist the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image two-grade encrypting method based on double-chaos system
  • Image two-grade encrypting method based on double-chaos system
  • Image two-grade encrypting method based on double-chaos system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0051] Example

[0052] like figure 1 Shown is an image secondary encryption method based on a double chaotic system of the present invention, comprising the following steps:

[0053] S1: Obtain the plaintext image, and use the plaintext image to generate an auxiliary key w. The specific method is: set the size of the plaintext image to be encrypted as M×N, sum the gray values ​​of all the pixels of the plaintext image, and sum up the 20001 Take the remainder to get a secondary key w between [0, 20000], the formula is as follows:

[0054]

[0055] In the formula, represents the gray value of the corresponding pixel in the image, , Indicates the coordinates of the pixel, the M indicates that there are M pixels in the horizontal direction of the plaintext image, and N indicates that there are N pixels in the vertical direction of the plaintext image.

[0056] S2: Use the auxiliary key w to combine the Chebyshev map and the Logistic map double chaotic system to g...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an image two-grade encrypting method based on a double-chaos system, relating to the field of image encrypting systems. The adopted method comprises the steps of creating an auxiliary key by a plaintext image firstly; creating a two-dimension chaos scrambling matrix by the auxiliary key combined with the double-chaos system of the Chebyshev mapping and Logistic mapping to dually scramble the position and grey level of the pixels of plaintext image so as to realize the encryption of images. According to the image two-grade encrypting method, the auxiliary key based on the plaintext image is introduced to expand key space and correlate the key with the plaintext, so that the ability of the image encryption system for resisting attack of the known plaintext is enhanced; and meanwhile, the complicated characteristics of dynamics of the double-chaos system is utilized to dually scramble the position and grey level of the plaintext image, with good encryption effect and high security.

Description

technical field [0001] The invention relates to the fields of image processing and information security, in particular to an image secondary encryption method based on a double chaotic system. Background technique [0002] With the rapid development of multimedia communication technology, the demand for the transmission of a large amount of image information is also increasing, and image security and confidentiality technology has become more and more important. Image information itself has the characteristics of large amount of data and high data correlation. Traditional encryption methods for text information, such as Data Encryption Standard (DES), International Data Encryption Algorithm, RSA Asymmetric Encryption Algorithm, etc., are not completely suitable for image encryption. . Due to the characteristics of initial value sensitivity, aperiodicity, nonlinearity and unpredictability of chaotic systems, image encryption methods based on chaos have advantages in security...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06T1/00
Inventor 郑宜峰许坤丰古立全郑丽菲莫少君
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products