Image encryption compression method based on discrete quantum walk and Chinese remainder theorem

A Chinese remainder theorem and encryption compression technology, applied in the field of information security, can solve problems such as inefficiency and insecurity, and achieve the effects of low ciphertext correlation, high security, and large key space

Inactive Publication Date: 2014-07-30
BEIJING UNIV OF TECH
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most of these methods fail to exploit the properties of chaotic systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image encryption compression method based on discrete quantum walk and Chinese remainder theorem
  • Image encryption compression method based on discrete quantum walk and Chinese remainder theorem
  • Image encryption compression method based on discrete quantum walk and Chinese remainder theorem

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.

[0019] An image encryption and compression method based on discrete quantum walk and Chinese remainder theorem, the flow chart is as follows figure 1 shown, including the following steps:

[0020] Step 1, generate a key matrix, the specific method is as follows:

[0021] (1) Select the key ((α,β), r), and run the single-particle one-dimensional discrete QRW on the line to generate a probability distribution. Here, α, β represent the coefficients of the initial coin state and satisfy the normalization condition |α| 2 +|β| 2 =1. r is the step size of QRW.

[0022] (2) Multiply all the values ​​in the probability distribution by 108 and modulo 256 to form a random sequence S={S 1, S 2, ..., S M×N}, where M and N are the height and width of the plaintext image I, respectively.

[0023] Step 2, image encryption and compression pro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an image encryption compression method based on a discrete quantum walk and a Chinese remainder theorem. The method comprises two phases: a secret key generation phase, i.e., generating probability distribution by use of a linear single particle one-dimensional discrete quantum random walk (QRW), and converting the probability distribution into a secret key matrix capable of encryption; and an image encryption compression phase, i.e., compressing an image by use of the generated secret key matrix and the Chinese remainder theorem. XOR operation is performed on an obtained encryption secret key and an original image, afterwards, Arnold transformation is performed on an obtained image. Diffusion and compression are carried out on a scrambling image according to a given compression ratio k by use of the Chinese remainder theorem. Compared to an image encryption compression scheme based on chaos and optics, the method provided by the invention has higher safety and better compression performance. The greatest advantage of the algorithm is that a theoretical infinite large secret key space can be generated so as to oppose a violent attack capability. Various performance comparisons indicate that the algorithm is better than prior research and can better satisfy actual demands.

Description

technical field [0001] The invention belongs to the field of information security, relates to image encryption compression technology, in particular to a novel image encryption compression method based on discrete quantum walk and Chinese remainder theorem. Background technique [0002] With the rapid development of the Internet, the secure transmission of image data is challenged because it can be easily intercepted by attackers. In addition, due to some inherent characteristics of images, such as huge data capacity, high redundancy, and strong correlation between adjacent pixels, images usually need to be compressed to exchange information efficiently. In this context, scholars at home and abroad have carried out research on joint encryption and compression. [0003] A practical image encryption and compression method should provide good encryption and compression performance. Although various image encryption and compression methods have been proposed, most of them have...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N19/463H04N19/48H04N19/88
Inventor 杨宇光田举张明鸥
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products