Color image encryption method based on chaos sequence and hyper-chaos system

A technology of chaotic sequence and encryption method, which is applied in image data processing, image data processing, instruments, etc., and can solve problems such as ignoring mutual influence

Inactive Publication Date: 2014-01-01
HENAN UNIVERSITY
View PDF2 Cites 66 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The reference document with the patent application number 201210366647.7 discloses a color image encryption and decryption method based on a multi-fractional chaotic system. The primary color componen

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Color image encryption method based on chaos sequence and hyper-chaos system
  • Color image encryption method based on chaos sequence and hyper-chaos system
  • Color image encryption method based on chaos sequence and hyper-chaos system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0075] Embodiment 1: in the present embodiment, the programming software that adopts is Matlab7.0, selects attached image 3 The Lena standard color image with a size of 256×256 (M×N) shown in (a) is the experimental object. The specific process of encrypting the Lena color image is as follows:

[0076] 1. Input the original Lena color image, and use I=imread('Lena.bmp') to read the image information. Separate the R, G, and B three primary color components of the color image I to obtain three image matrices I_R MN =I(1:256,1:256,1), I_G MN = I(1:256, 1:256, 2) and I_B MN =I(1:256, 1:256, 3).

[0077] 2. Change each pixel in the above-mentioned three-primary color component matrix into an 8-bit binary string to obtain three binary matrices I_R with a size of 256×2048 8MN , I_G 8MN and I_B 8MN , then put the I_R 8MN , I_G 8MN and I_B 8MN , according to I_R 8MN , I_G 8MN and I_B 8MN The sequence is arranged vertically from top to bottom, and a new binary image matrix ...

Embodiment 2

[0152] Embodiment 2: in the present embodiment, the programming software that adopts is Matlab7.0, selects attached Figure 7 The Peppers standard color image shown in (a) with a size of 512×512 (M×N) is the experimental object, and the basic process of encrypting the Peppers color image is:

[0153] 1) Input the original color image I with the size of 512×512, separate the R, G, B three primary color components I_R of the image I MN , I_G MN and I_B MN , the size of each component matrix is ​​512×512, and the pixel value is between 0 and 255;

[0154] 2) Use the one-dimensional chaotic system to generate a chaotic sequence for scrambling, perform bit-level joint scrambling on the original color image I, and obtain an image I with a size of 512×512 after scrambling 6 , see attached Figure 7 (b);

[0155] 3) The scrambled image I 6 Decomposed into R, G, B three primary color components I 6 _R MN , I 6 _G MN and I 6 _B MN , and converted into three sequences of leng...

Embodiment 3

[0178] Embodiment 3: in the present embodiment, the programming software that adopts is Matlab7.0 equally, selects attached Figure 11 The color image shown in (a) with a size of 500×377 (M×N) is the experimental object, and the basic process of encrypting the color image is as follows:

[0179] 1) The input image size is the original color image I of 500×377, separate the R, G, B three primary color components I_R of the image I MN , I_G MN and I_B MN , the size of each component matrix is ​​500×377, and the pixel value is between 0 and 255;

[0180] 2) Use the one-dimensional chaotic system to generate a chaotic sequence for scrambling, perform bit-level joint scrambling on the original color image I, and obtain an image I with a size of 500×377 after scrambling 6 , see attached Figure 11 (b);

[0181] 3) The scrambled image I 6 Decomposed into R, G, B three primary color components I 6 _R MN , I 6 _G MN and I 6 _B MN , and converted into three sequences of leng...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a color image encryption method based on a chaos sequence and a hyper-chaos system. The color image encryption method mainly comprises the following steps: an original color image is subjected to bit level united scrambling to obtain a scrambled image; the scrambled image is decomposed into three primary color components, that is R, G and B, and the hyper-chaos system is used for generating an encryption matrix which is used for encrypting the scrambled image; all pixel values of the three primary color components of the scrambled image are changed by utilizing the encryption matrix in combination with plaintext information and information of the three primary color components, united diffusion is conducted to obtain the three primary color components of the image after the united diffusion, and therefore a final encrypted image is obtained. By means of the color image encryption method, a secret key space is greatly enlarged, the safety, the encryption effect and the sensitivity of a secret key are higher, the anti-attack ability is stronger, and hardware implementation is easier.

Description

technical field [0001] The invention relates to a color image encryption method based on a chaotic sequence and a hyperchaotic system. Background technique [0002] With the wide application of multimedia information technology, multimedia data is widely spread and stored on the Internet. Therefore, in order to effectively protect user information from illegal use, the fundamental measure to be taken is information confidentiality transmission and storage. Traditional encryption algorithms such as International Data Encryption Algorithm (IDEA) and Advanced Encryption Standard (AES) are designed for one-dimensional data streams and are relatively unsuitable for image data encryption. The reason is that images Class information has the characteristics of large amount of data, strong correlation between data, and high redundancy. Therefore, when the above-mentioned traditional encryption algorithm is used for encryption, the encryption efficiency is not high. [0003] Chaos re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06T1/00
Inventor 柴秀丽武相军周福娜孔庆梅甘志华史春晓郭峻言刘媛王艳娜
Owner HENAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products