Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multi-chaos system based method of encrypting images related to plaintext

A chaotic system and encryption method technology, applied in the field of information security, can solve the problems of unpredictability, inability to effectively resist attack technology, and low security of low-dimensional cryptographic systems.

Active Publication Date: 2015-07-01
BEIHANG UNIV
View PDF3 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Most of the chaotic image encryption techniques studied in the past are based on low-dimensional discrete chaotic maps. Although low-dimensional chaotic maps have the advantage of low computational overhead, due to their simple form, small key space, and low complexity of iteration sequences, low-dimensional cryptography System security is not high
However, although the existing image encryption technologies using high-dimensional chaotic systems have larger key spaces and more complex and unpredictable nonlinear behaviors, most of their key stream generation methods are relatively independent and have nothing to do with plaintext image information. , the generation of the ciphertext image depends solely on the key, which makes it impossible to effectively resist common attack techniques, such as differential attack techniques
At the same time, the image encryption technology using multiple chaotic systems also has the above problems to varying degrees

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-chaos system based method of encrypting images related to plaintext
  • Multi-chaos system based method of encrypting images related to plaintext
  • Multi-chaos system based method of encrypting images related to plaintext

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The specific implementation steps are as figure 1 The overall structure diagram and Image 6 The method flow chart is as follows:

[0047] Step 1: Obtain the pixel data information of the plaintext image, and convert the pixel data information of the plaintext image into a sequence of plaintext images Calculate the sum of the pixel values ​​of all pixels in the plaintext image, and calculate the average pixel value of the pixels, and perform normalization on the obtained average pixel value to obtain the initial value e of the tent chaos map as the seed key Ⅰ. Use the tent chaotic map to iterate L times to obtain a random sequence of real numbers Generating Keystream I Go to step 2;

[0048] Step 2: Read a sequence of random real numbers Rearrange the values ​​of this random sequence of real numbers from small to large to obtain a new sequence of real numbers Record the replacement subscript sequence in it plaintext image sequence according to The repla...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a multi-chaos system based method of encrypting images related to plaintext and belongs to the field of information security. The method combining the plaintext-related scrambling technique, the multi-chaos system and a sensor model includes: scrambling plaintext images by means of the plaintext related scrambling technique based on tent chaotic mapping, subjecting the images to primary diffusion by means of chaotic piecewise linear mapping, and performing secondary diffusion by the combination of a Chen's high-dimensional hyper-chaotic system and the sensor model to finally generate ciphertext images. The algorithm structure of scrambling, diffusion and diffusion is used, relevance between the plaintext and keys is established, key space is enlarged, scrambling effect is better, diffusion degree is higher, and the ability to resist common attacks, such as exhaustive attack, statistical attach and differential attach is achieved. The method is applicable to image information processing and implementation of encryption techniques of other multimedia messages and also applicable to hardware static encryption and industrial productions, such as computer receiving or transmitting ports.

Description

technical field [0001] The invention relates to a digital image encryption method in information transmission, chaos control and synchronous design technology, and belongs to the field of information security. Background technique [0002] With the wide application of multimedia information processing technology and the rapid development of Internet and cloud computing technology, multimedia data is increasingly widely spread and stored among Internet or cloud computing nodes, and information security issues have attracted more and more attention. For multimedia data such as images and videos, due to the large amount of data of this type of information and the strong correlation between adjacent data, traditional encryption technology, as a general data encryption method, is inefficient for the encryption of image information. Low, can not meet the real-time needs. However, chaotic signals have complex characteristics such as extreme sensitivity to initial conditions, aperi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00
Inventor 张筱姜鑫郭炳晖郑志明王成启
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products