Multi-image encryption method based on fractional mellin transform

A technology of Merlin transformation and encryption method, which is applied in the field of information security, can solve the problems of weak resistance to attack and inability to effectively resist chosen plaintext attacks, and achieve the effect of enhancing security

Inactive Publication Date: 2014-02-19
NANCHANG UNIV
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most of the typical image encryption systems based on transformations are linear systems, which are weak against attacks compared with nonlinear encryption systems
This is because the functional relationship between plaintext, ciphertext, and key in a linear encryption system is relatively simple, which cannot effectively resist common attacks such as chosen plaintext attacks and known plaintext attacks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-image encryption method based on fractional mellin transform
  • Multi-image encryption method based on fractional mellin transform
  • Multi-image encryption method based on fractional mellin transform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] Embodiment 1: Spectrum cutting and splicing are performed on multiple images.

[0042] The specific process of spectrum cutting and splicing described in the present invention is as follows:

[0043] Step 1: Perform Zigzag scanning on n two-dimensional matrices respectively to form n one-dimensional matrices, which is beneficial to spectrum cutting.

[0044] Step 2: Cut the front elements in the n one-dimensional matrices respectively, because the front elements in the one-dimensional matrix represent the DC component and the low frequency part of the image. The cutting factor is generally set to M×N / n.

[0045] Step 3: Stitch all the cut elements together to form a one-dimensional matrix containing M×N elements, and convert it into a two-dimensional matrix with a size of M×N by row (or column), so as to realize multiple Image Compression.

[0046]When there are 8 images to be encrypted, 12.5% ​​of the DC components and low-frequency coefficients in the discrete cosi...

Embodiment 2

[0047] Embodiment 2: Image encryption based on multi-order fractional Merlin transform.

[0048] Perform different orders of fractional Merlin transform on different regions of the image f(x,y). Since the fractional Merlin transform is convenient for ring processing, the sub-image f i (x, y), i=1, 2, . . . , N are annular regions with different inner radii and outer radii. Taking N=4 as an example, decompose f(x,y) into 4 ring domains. Such as figure 2 As shown, these rings are all centered on the center of the picture, where f 1 (x,y) is the radius r 1 circle, f 2 (x,y) is the inner radius r 1 The outer radius is r 2 ring domain, f 3 (x,y) is the inner radius r 2 The outer radius is r 3 ring domain, f 4 (x,y) is the inner radius r 3 The outer radius is r 4 ring domain, where r 4 It is the distance from the center of the image to the top corner of the image. to f i carry on p i Order fractional Merlin transform to get g i , where i=1,2,...,N.

[0049] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a multi-image encryption method based on fractional mellin transform. The method includes the steps of compressing multiple images according to a frequency spectrum cutting and splicing method, then, dividing an image obtained through compression into a plurality of sub-images according to an annular domain, conducting fractional mellin transform on all the sub-images, encrypting a fractional mellin transform outcome into a cryptograph image through magnitude and phase encoding, taking transform degrees of fractional mellin transform as secret keys, and taking a center coordinate for coordinate transform, an inner radius of the annular domain for implementation of transform and an outer radius of the annular domain for implementation of transform as secondary secret keys. According to the multi-image encryption method, the multiple images are compressed through the real-value characteristics of fractional cosine transform, and therefore overweight transmission loads are avoided, and the requirement for instantaneity of image data transmission is met. Fractional mellin transform is then conducted on the image obtained through compression, the fractional order characteristic, the nonlinear characteristic and the like of the fractional cosine transform are fully utilized, and the multi-image encryption method has quite high robustness in terms of clipping prevention and noise prevention. The nonlinear operation is introduced into an encryption system while multi-image encryption transmission can be ensured, and safety of the encryption system is enhanced.

Description

technical field [0001] The patent of the present invention belongs to the field of information security technology, and in particular relates to multi-image compression and encryption technology. Background technique [0002] With the rapid development of network multimedia technology, communication technology and transmission technology, hidden dangers of network information security inevitably arise. Information security has become a problem that people cannot ignore. Image encryption is an important research direction in information security. As an important way of expression in multimedia information, images are widely used in various fields due to their vivid and intuitive features. [0003] Image encryption originated from the early classical encryption theory, and its purpose is to hide the real information of the image itself, so that the thief cannot obtain the original image after obtaining the ciphertext, and the authorized receiver can use the pre-agreed key and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00H04N1/32
Inventor 周南润潘书敏胡利云张文全
Owner NANCHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products