A Composite Chaotic Image Encryption Method Using Plaintext to Construct Initial Key

An initial key and plaintext image technology, applied in image data processing, image data processing, instruments, etc., can solve the problems of encryption algorithm key not being extremely sensitive, unable to resist differential attacks, long encryption time period, etc., to achieve differential resistance Attacks, enhanced algorithm sensitivity, and increased encryption effects

Inactive Publication Date: 2017-06-30
DONGHUA UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Most of the existing chaotic encryption systems are basically based on hyperchaotic systems or cascading of several three-dimensional chaotic systems. Although they can expand their key space and effectively resist brute force attacks, they still have certain defects in confidentiality.
For example, for hyper-chaotic systems, the encryption time period is too long and the calculation is more complicated; although compound chaotic encryption expands the key space, its encryption algorithm is not extremely sensitive to plaintext and keys; at the same time, some compound chaotic systems are building There is no inherent correlation in the process of encryption algorithm. Their composition is only applied in quantity, which can only expand the key space, so it cannot resist differential attacks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Composite Chaotic Image Encryption Method Using Plaintext to Construct Initial Key
  • A Composite Chaotic Image Encryption Method Using Plaintext to Construct Initial Key
  • A Composite Chaotic Image Encryption Method Using Plaintext to Construct Initial Key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to make the present invention more comprehensible, preferred embodiments are described in detail below with accompanying drawings.

[0024] The invention provides a compound chaotic image encryption method for constructing an initial key in plain text, the steps of which are as follows:

[0025] Step 1. Realize image preprocessing according to plaintext image pixel values ​​and initial given values, and determine iteration initial values, including:

[0026] Step 1.1, take any horizontal, vertical and diagonal arbitrary majority of plaintext image pixels to form three series of numbers;

[0027] Step 1.2. Add the numbers in the three series obtained in step 1.1 to obtain three numerical values, and then calculate the modulus of 1000 to obtain R, C, and H;

[0028] Step 1.3, take three initial values ​​arbitrarily, denoted as X 10 , X 20 , X 30 , the value range of each initial value is between [-1, 1], and it is accurate to four decimal places;

[0029] St...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a composite chaotic image encryption method for constructing an initial key in plain text, which is characterized in that the steps are as follows: step 1, realizing image preprocessing according to plain text image pixel values ​​and initial given values, and determining the initial iteration value; step 2 1. Using the composite chaotic system to scramble and diffuse the plaintext image respectively, so as to achieve the purpose of encrypting the plaintext image. The advantage of the present invention is that: the existing encryption methods basically focus on the scrambling and diffusion of images, and the realization of the present invention lies in the processing of the initial key. This improvement further improves the design of a security Factors to be aware of for reliable encryption algorithms.

Description

technical field [0001] The invention relates to a composite chaotic image encryption method based on an initial key generated from a plaintext image, and belongs to the technical fields of communication electronics and image signal processing. Background technique [0002] With the rapid development of Internet of Things information technology, network transmission has become convenient and fast, and more and more information and communications are transmitted in the network. Image is widely used in information transmission because it can intuitively and clearly reflect the content and meaning of the transmitted information, and better convey the intention and purpose. However, for the transmission of images, due to their inherent particularity (including confidentiality and privacy), encryption must be performed during transmission to prevent information theft and data tampering. Image encryption is an important branch of image processing. In recent years, more and more sc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06T1/00
Inventor 刘仕辉仇润鹤
Owner DONGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products