Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Color image encryption method based on SHA-384 function, spatiotemporal chaotic system, quantum chaotic system and neural network

A SHA-384, spatiotemporal chaos technology, applied in image data processing, image data processing, instruments, etc., can solve problems such as increasing hardware overhead, not using encryption algorithms, and less periodic orbits

Active Publication Date: 2015-05-13
HENAN UNIVERSITY
View PDF2 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, scrambling and encrypting the high four bits and low four bits of the image pixel without distinction will undoubtedly greatly increase the hardware overhead, prolong the encryption time, and do not use the actual application of the encryption algorithm.
[0004] Most of the chaotic encryption algorithms studied in the past are based on low-dimensional chaotic systems. Although low-dimensional chaotic systems have the advantage of short calculation time due to their simple form, due to the limitation of limited calculation accuracy, low-dimensional chaotic systems have small periods and few periodic orbits. Insufficient, and the space-time chaos system can perfectly solve these problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Color image encryption method based on SHA-384 function, spatiotemporal chaotic system, quantum chaotic system and neural network
  • Color image encryption method based on SHA-384 function, spatiotemporal chaotic system, quantum chaotic system and neural network
  • Color image encryption method based on SHA-384 function, spatiotemporal chaotic system, quantum chaotic system and neural network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0078] Embodiment 1: in the present embodiment, the programming software that adopts is Matlab R2009a, selects Figure 4 The LenaRGB standard color image with a size of 512×512 shown in (a) is the experimental object. The specific process of encrypting the LenaRGB color image is as follows:

[0079] 1. Input the original LenaRGB color image, use I 0 =imread('LenaRGB.bmp') reads the image information, and uses the SHA-384 function to process the original color image I 0 Perform calculations to obtain a set of 384-bit hash values ​​as keys, and convert the 384-bit hash values ​​from binary to hexadecimal to obtain 96 hexadecimal numbers, namely B5E9C5E D D3B C800F62C F A894A A B F A D17B29B5D B C7089315438D26728A607F41F72B70A7D1133F62B A E427C C E78097029. Divide the hash value into 3 groups on average, each group has 32 hexadecimal numbers, convert each group of elements into decimal numbers, and calculate the sum of each group of elements Sum(j), where j=1,2,3 , calculate x...

Embodiment 2

[0170] Embodiment 2: in the present embodiment, the programming software that adopts is Matlab R2009a, selects the attached Figure 8 The Fruits color image with a size of 480×512 shown in (a) is the experimental object, and the process of encrypting the color image is as follows:

[0171] 1. The input image size is the original color image I of 480×512 0 , with I 0 =imread('Fruits.bmp') read image information. Using the SHA-384 function to the original color image I 0 Perform calculations to obtain a set of 384-bit hash values ​​as keys, convert the 384-bit hash values ​​from binary to hexadecimal, and obtain 96 hexadecimal numbers, namely B C86B B7315F58B6575C E85C C55B3983635F0B B41D0A66088F B4D F9D D8B67D F49E F83B9381441B8B8218E3D A34E D A7677. Divide the hash value into 3 groups on average, each group has 32 hexadecimal numbers, convert each group of elements into decimal numbers, and calculate the sum of each group of elements Sum(j) (j=1,2,3) , calculate x by the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a color image encryption method based on an SHA-384 function, a spatiotemporal chaotic system, a quantum chaotic system and a neural network. The method includes the steps that an original color image I0 is calculated through the SHA-384 function, a Hash value is obtained as a secret key, the Hash value, a CML and one-dimension Logistic chaotic mapping are utilized for generating a chaos sequence, bit-level line-column scrambling is carried out on high four-digit images of components of three primary colors of the I0 through the chaos sequence, and a scrambled image I1 is obtained; the Logistic quantum chaotic system is utilized for generating a chaos sequence for encrypting the scrambled image, and is combined with the neural network to carry out parallel diffusion processing on all pixel values of components of three primary colors of the I1, and a final encrypted image I2 is obtained. By the method, the space of the secret key is greatly enlarged, the safety, encryption effect and secret key sensibility are higher, the attack resistance capacity is higher, the scrambling process and the encryption time are shorter, and hardware implementation is easier.

Description

technical field [0001] The invention relates to an encryption method, in particular to a color image encryption method based on SHA-384 function, space-time chaos system, quantum chaos system and neural network. Background technique [0002] With the rapid development of multimedia and network technology, more and more multimedia information, such as audio, video, and especially image information, needs to be transmitted through the network, and the subsequent information security and confidentiality issues are becoming more and more important. Image information has the characteristics of large data volume, strong correlation between adjacent pixels, and high redundancy. Traditional encryption methods, such as DES, AES, and RSA, are designed for one-dimensional data and are mainly used for encryption of text information. Not suitable for encryption of image data. The chaotic system has the characteristics of randomness, determinism, ergodicity, and high sensitivity to the i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06T1/00
Inventor 柴秀丽丁文珂孔庆梅甘志华史春晓王俊朱长江程云龙
Owner HENAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products