Image encryption and decryption method based on improved Joseph traversal and generalized Henon mapping

An encryption method and image technology, which can be used in image communication, digital transmission systems, electrical components, etc., and can solve the problems of limited replacement parameters and limited number of replacements.

Active Publication Date: 2014-07-16
江苏瀚洋精工科技有限公司
View PDF2 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The classic Joseph problem is easy to solve using mathematical induction, and the number of generated permutations is very limited due to the limited permutation parameters

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image encryption and decryption method based on improved Joseph traversal and generalized Henon mapping
  • Image encryption and decryption method based on improved Joseph traversal and generalized Henon mapping
  • Image encryption and decryption method based on improved Joseph traversal and generalized Henon mapping

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0085] The present invention is described in detail below in conjunction with accompanying drawing and specific embodiment:

[0086] 1. Improved Joseph traversal mapping:

[0087] The Joseph traversal map is derived from the Joseph problem. It describes a game in which N people form a circle, start counting from the first person, and continuously eliminate the Mth person until the last person is left.

[0088] The classic Joseph problem can be pressed 1,2,…N→f Josephus-1 (N,M) produces a permutation on 1,2,...N, where N is the number of people, M is the final value of the count, and Josephus-1 (6,5) as an example, the element sequence 1,2,3,4,5,6 can be replaced with 5,4,6,2,3,1.

[0089] Xiang Desheng and others will f Josephus-1 (N,M) expands to f Josephus-2 (N,S,M), where S is the starting point of reporting, and f Josephus-2 (6,2,5) as an example, the element sequence 1,2,3,4,5,6 can be replaced with 6,5,1,3,4,2.

[0090] due to f Josephus-2 The disturbance added by ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an image encryption and decryption method based on improved Joseph traversal and generalized Henon mapping. An SHA-1 value of an image to be encrypted and encryption parameters selected by a user are combined to serve as a secret key, generalized Henon mapping is driven to randomly disturb the initial position, the counting-off interval and the counting-off direction of Joseph traversal mapping used for position point permutation, so that different encryption images and encryption parameters correspond to different position point permutation processes in essence; coupling of all the encryption steps is enhanced, different encryption processes are started according to different images to be encrypted, so that selective plain text attacks are effectively resisted, and the image encryption and decryption method has large secret key space and is easy to implement and low in cost.

Description

technical field [0001] The invention belongs to the intersection fields of information security, nonlinear dynamics and digital image signal processing, and relates to a digital image bit encryption and decryption method, in particular to an image encryption and decryption method based on improved Joseph traversal and generalized Henon mapping. Background technique [0002] In recent years, with the development of computer and network technology, more and more images are transmitted on the network, which brings a series of security risks while providing convenience to users. Improper use and malicious tampering of image information will not only involve personal privacy issues, but also bring serious negative impacts on society. The core technology to protect image information is digital image encryption. [0003] The current typical image encryption method mainly continues the permutation and confusion encryption structure proposed by Fridrich J in 1998. The so-called perm...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N1/32H04L9/00
Inventor 邵利平郭毅杨璐
Owner 江苏瀚洋精工科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products