Image encryption method based on chaotic system and insertion-deletion model

A technology of chaotic systems and encryption methods, applied in image data processing, image data processing, instruments, etc., can solve problems such as biochemical reaction models that are not considered, and achieve the effects of resisting attacks, ensuring high security, and high parallel computing capabilities

Active Publication Date: 2015-04-29
DALIAN UNIV
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although some encryption methods based on the above have improved the security of the image transmission process to a certain extent, these algorithms only focus on basic sequence operations such as addition and XOR operations of DNA sequences, and do not consider specific biochemical reactions. Model

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image encryption method based on chaotic system and insertion-deletion model
  • Image encryption method based on chaotic system and insertion-deletion model
  • Image encryption method based on chaotic system and insertion-deletion model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] The embodiments of the present invention are implemented on the premise of the technical solutions of the present invention, and detailed implementation methods and specific operation processes are given, but the protection scope of the present invention is not limited to the following embodiments.

[0051] Step 1: Convert the original grayscale of size (m,n) picture The image is converted into a binary matrix; according to the second rule of DNA sequence encoding, the binary matrix is ​​encoded, and a DNA sequence matrix DA with a size of (m, n×4) can be obtained;

[0052] Step 2: Given any initial value x 0 ,y 0 ,z 0 , and then add them to the Hamming distance, Hamming inverse distance, and Hamming complement distance converted to decimals between 0-1 to get a new initial value x 1 ,y 1 ,z 1 , at x 1 ,y 1 ,z 1 and system parameters σ, ρ, β, use the Lorenz chaotic map to generate three chaotic sequences x=(x 1 ,x 2 ,...,x 4n ), y=(y 1 ,y 2 ,...,y 4n ), z=...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of image encryption, and designs an image encryption method based on a chaotic system and an insertion-deletion model. According to the method, the Hamming distance, the Hamming inverse distance and the Hamming feeding distance are introduced into the generating process of initial values of the chaotic system; in addition, when the method is used for encrypting or decrypting an image, positions of image pixel values are scrambled through the insertion-deletion model; finally, XOR operation of a DNA sequence is applied to diffusing the image pixel values. It can be obtained from simulation results and safety analysis that the method has the good encryption effect and can resist various attacks of an intruder. According to the problem emphatically solved, the basic thought of the insertion-deletion model in DNA calculation is applied to image encryption.

Description

technical field [0001] The invention relates to a chaotic system and an insertion-deletion model, in particular to encrypting an original image by using the chaotic system and the insertion-deletion model, which belongs to the field of image encryption. Background technique [0002] In recent years, digital images have been widely used in network transmission as a kind of information carrier. However, due to the openness of the network and the sharing of information, it is easy for attackers to intercept the information, so people have taken a series of measures to ensure the security of image transmission, among which image encryption is the most effective way. Due to the characteristics of image information redundancy and two-dimensional data, traditional text encryption methods such as DES, AES, IDEA, etc. are no longer suitable for image encryption. Therefore, the image encryption technology based on modern cryptosystem, the image encryption technology based on matrix t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00
Inventor 周昌军牛红叶王宾张强
Owner DALIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products