Asymmetric image encryption and decryption method based on quantum cell neural network system

A neural network and asymmetric technology, applied in the field of information security, can solve problems such as key interception and cracking

Inactive Publication Date: 2014-01-08
CHANGCHUN UNIV OF SCI & TECH
View PDF3 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The present invention provides an asymmetric image encryption and decryption method based on the quantum cellular ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Asymmetric image encryption and decryption method based on quantum cell neural network system
  • Asymmetric image encryption and decryption method based on quantum cell neural network system
  • Asymmetric image encryption and decryption method based on quantum cell neural network system

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach 1

[0048] Specific implementation mode 1. Combination Figure 1 to Figure 3 Description of this embodiment, based on the asymmetric encryption and decryption method of the quantum cellular neural network hyperchaotic system, the encryption process of this method is realized by the following steps:

[0049] A1. Select the 256×256 “Lena” image, image 3 A is used as the original plaintext image PI.

[0050] B1, with initial conditions

[0051] x 1 (0)=0.1901,x 2 (0)=-184.3,x 3 (0)=0.123,x 4 (0)=-147.32,x 5 (0)=0.113,x 6 (0)=-197.85 and control parameter ω 01 =0.28,ω 02 =0.4,ω 03 =0.28,ω 04 =0.35,ω 05 =0.28,ω 06 =0.25 iterative three-cell quantum cellular neural network drive system, (initial conditions and control parameters can be arbitrarily selected by the encryptor). Get the image scrambling control parameters, the number of iterations and the image diffusion key matrix.

[0052] C1. Use the scrambling control parameters and iteration times obtained in B1 to scra...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an asymmetric image encryption and decryption method based on a quantum cell neural network system, and relates to the technical field of information security. The defect that a secret key of an existing cryptosystem is intercepted and cracked is overcome. The asymmetric image encryption and decryption method comprises an image encryption process and an image decryption process. A function projection synchronization method is used for conducting synchronization on two three-cell-coupling quantum cell neural network super mixing degree systems with unknown control parameters and unknown initial conditions. A synchronous control rule and a parameter update rule of the systems are given according to the Lyapunov theory. According to the synchronization method, a set of asymmetric image encryption and decryption methods are designed, and a system real-time model is given. In the decryption process, image decryption is accurately conducted on the condition of unknown control parameters and unknown initial conditions. An attacker is effectively prevented from intercepting the secret key.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an asymmetric image encryption and decryption method based on a quantum cellular neural network hyperchaotic system. Background technique [0002] The prevalence of the Internet and wireless networks has enabled almost all devices to achieve network interconnection and transmit data between each other. While bringing great convenience to people's work and life, it also increases the security risks of computers and information systems. Therefore, information security has become increasingly important. In recent years, the rapid growth of broadband communication has promoted the increase of multimedia information transmission on the Internet, especially various applications such as personal identification of digital images, digital signatures, and access control. In order to ensure the security and privacy of digital images on the Internet, image encryption technolog...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/28
Inventor 底晓强杨华民李锦青
Owner CHANGCHUN UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products