Image two-grade encrypting method based on double-chaos system
An encryption method and double-chaos technology, applied in image data processing, image data processing, instruments, etc., can solve problems such as difficulty for attackers to identify original images, weak security functions, small key space, etc., and achieve enhanced resistance to known plaintext Attack capability, overcoming the small key space, and expanding the effect of the key space
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0051] Example
[0052] like figure 1 Shown is an image secondary encryption method based on a double chaotic system of the present invention, comprising the following steps:
[0053] S1: Obtain the plaintext image, and use the plaintext image to generate an auxiliary key w. The specific method is: set the size of the plaintext image to be encrypted as M×N, sum the gray values of all the pixels of the plaintext image, and sum up the 20001 Take the remainder to get a secondary key w between [0, 20000], the formula is as follows:
[0054]
[0055] In the formula, represents the gray value of the corresponding pixel in the image, , Indicates the coordinates of the pixel, the M indicates that there are M pixels in the horizontal direction of the plaintext image, and N indicates that there are N pixels in the vertical direction of the plaintext image.
[0056] S2: Use the auxiliary key w to combine the Chebyshev map and the Logistic map double chaotic system to g...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap