Hyper-chaotic system-based secret key dynamic selection image encryption algorithm

An encryption algorithm and hyper-chaotic technology, applied in image data processing, image data processing, computing, etc., can solve problems such as increasing hardware complexity, image security vulnerabilities, and reducing the security of image encryption algorithms

Active Publication Date: 2015-09-02
HENAN UNIVERSITY
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the currently used image encryption algorithms have the following problems: First, in the scrambling stage, most encryption algorithms lack the connection with the plaintext, although some encryption algorithms consider the connection with the plaintext, but when a certain pixel When a change occurs, the scrambling effect still cannot spread to the entire image, and the scrambling effect only affects the pixels behind the pixel change, so that the stealer can find the scrambling law through a simple comparison, which makes There are huge loopholes in the security of images; second, digital images are discrete finite point sets composed of pixels one by one, and will return to the original state after multiple times of scrambling and transformation, so as long as the stealer knows the encryption algorithm , it can be decrypted violently, and through multiple iterations, the plaintext image will be obtained within a limited number of steps; third, no matter in the scrambling stage or in the diffusion stage, for different images, as long as the initial value is the same as the control parameter , the key used for encryption is the same, the key cannot be dynamically selected according to the difference of plaintext pixels, and the corresponding chaotic system must generate the key in the scrambling and diffusion stages, which not only increases the system cost, and reduces the security of the image encryption algorithm; fourth, in the past, the low-dimensional chaotic system is generally used to encrypt the image, and the chaotic sequence generated by the low-dimensional chaotic system is only formed through simple repeated iterations, and the security is not good enough. And the calculation accuracy of the computer may also lead to the chaotic sequence of the low-dimensional chaotic system having a relatively short periodicity and poor randomness, which provides a breakthrough for the cracking of the image
The Chinese patent application number 201310412691.1 discloses a color image encryption method based on chaotic sequence and hyperchaotic system. In the scrambling stage of image encryption, the method uses the chaotic sequence generated by the one-dimensional chaotic system to scramble the image pixels. The scrambling process lacks the connection with the plaintext. In the diffusion stage, the hyperchaotic system is used to generate the key used for diffusion, which increases the overhead of the system and increases the complexity of the hardware. Its security needs to be improved.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hyper-chaotic system-based secret key dynamic selection image encryption algorithm
  • Hyper-chaotic system-based secret key dynamic selection image encryption algorithm
  • Hyper-chaotic system-based secret key dynamic selection image encryption algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0062] Embodiment one, a kind of image encryption algorithm based on the key dynamic selection of hyperchaotic system, comprises the following steps:

[0063] Step 1. Input a grayscale image with an image size of M×N, and arrange the pixels of the grayscale image into a one-dimensional image array P from left to right and from top to bottom;

[0064] Step 2. Use the hyperchaotic system to generate chaotic sequences, and group the chaotic sequences to obtain the grouping vector A i , i∈[0,5];

[0065] Step 3. In combination with the KSSG dynamic selection mechanism dependent on the plaintext, according to the variable index1=T1%6, i=index1, dynamically select A for generating the scrambling key i , T1 is the calculation formula based on plaintext pixels y 0 = 0 ; if max ...

Embodiment 2

[0070] Embodiment 2: To further introduce the technical solution of the present invention in combination with specific images, see figure 1 As shown, the programming software adopted in this embodiment is Matlab R2014a, select the attached Figure 8 The lena grayscale image shown in (a) with a size of 512×512 is the experimental object, and the process of encrypting the lena grayscale image is as follows:

[0071] 1. Input the lena grayscale image with the original size of 512×512, use I 0 =imread('lena.bmp') read image information. Then the image I 0 According to the order from left to right and from top to bottom, they are arranged into a one-dimensional image array, denoted as P.

[0072] 2. In this paper, Chen's hyperchaotic system is used to generate the encryption key, and its equation expression is as follows:

[0073] x · = a ...

Embodiment 3

[0179] Embodiment three: in the present embodiment, the programming software that adopts is Matlab R2014a, selects the attached Figure 11 The grayscale image of boats with a size of 256×205 shown in (a) is the experimental object, and the process of encrypting the image is as follows:

[0180] (1) Input the boats grayscale image with the original size of 256×205, use I 0 =imread('boats.bmp') read image information. Then the image I 0 According to the order from left to right and from top to bottom, they are arranged into a one-dimensional image array, denoted as P.

[0181] (2) Use the hyperchaotic system to generate chaotic sequences, and then group the chaotic sequences.

[0182] (3) Combining the plaintext-dependent KSSG dynamic selection mechanism and KS dynamic selection mechanism to generate a scrambling key, and perform forward scrambling encryption on the original plaintext image array P to obtain an image array, denoted as P1.

[0183] (4) Combining the KSSG dyna...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a hyper-chaotic system-based secret key dynamic selection image encryption algorithm. The algorithm mainly comprises the following steps of arranging original plaintext images into an image array P, using a hyper-chaotic system to generate a chaotic sequence, and performing grouping; generating a forward scrambling secret key K1 with the combination of a KSSG and KS dynamic selection mechanism based on a plaintext and performing forward scrambling of the P to obtained P1; generating a forward diffusion secret key K2 with the combination the KSSG and KS dynamic selection mechanism and performing forward diffusion of the P1 to obtain a P2; generating a backward scrambling secret key K3 with the combination of the KSSG and KS dynamic selection mechanism and performing backward scrambling of the P2 to obtain a P3; and generating a backward diffusion secret key K4 with the combination the KSSG and KS dynamic selection mechanism, performing forward diffusion of the P3 to obtain a P4, and performing regrouping of the P4 to obtain a final cryptograph image. The abovementioned method provided by the invention increases the secret key space, enables the security, the encryption effect and the secret key sensitivity to be higher and the anti-attach performance to be stronger, and is easy in hardware implementation.

Description

technical field [0001] The invention relates to an image encryption method, in particular to an image encryption algorithm based on dynamic key selection of a hyperchaotic system. Background technique [0002] Today, with the rapid development of smart devices, the Internet of Things, high-definition multimedia, and network technology, the transmission of most information in our lives, such as documents, audio, video, and especially image information, is inseparable from the support of the network. On the one hand, the network brings convenience to people's life, but on the other hand, some criminals will use the network to steal information, which brings great hidden dangers to people's information security, so the security and safety of information in the process of network transmission Confidentiality issues are also more and more people's attention and attention. Generally speaking, image information has the same characteristics, and they all have the characteristics of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00
Inventor 柴秀丽杨康王俊甘志华高育林程云龙
Owner HENAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products