A Method for Constructing Image Password Based on Neuron Chaotic Response Coding

An image password and construction method technology, applied in electrical components, digital transmission systems, transmission systems, etc., can solve the problems of users being unable to verify the identity of the system, poor security, and easy to leak, so as to reduce the risk of interception and not easy to leak. , high-complexity effects

Active Publication Date: 2018-05-04
HANGZHOU DIANZI UNIV +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This identity authentication mechanism has the following problems: ①The user’s password is stored in the system in plain text, which is easy to leak; ②The user enters the password in plain text to the system, and the attacker can intercept the user’s password from the communication line. ;③ The user cannot verify the identity of the system, and may be deceived by a false system to obtain the correct password or other valuable information
Therefore, using this method for identity authentication is relatively simple and convenient, but the security is extremely poor.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Method for Constructing Image Password Based on Neuron Chaotic Response Coding
  • A Method for Constructing Image Password Based on Neuron Chaotic Response Coding
  • A Method for Constructing Image Password Based on Neuron Chaotic Response Coding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] combined with figure 1 , the specific implementation steps of the present invention are:

[0032] Step (1) The user first enters the user name that has been authenticated and registered by the system, and the system will automatically convert the user name to the corresponding user number ID_N. digit password M 1 ; m is a positive integer;

[0033] Step (2) The system converts the digital password M entered by the user into 1 Perform logarithmic transformation, as shown in formula (1).

[0034]

[0035] will transform the result x 1 As the initial value of the position in the x direction of the three-dimensional space of the Lorenz system, other parameters of the Lorenz system and the initial values ​​of the y and z directions are automatically generated by the identity authentication system, and the Lorenz system is shown in formula (2).

[0036]

[0037] In this implementation example, a=10, b=28, c=8 / 3, the initial value of y is equal to 2, and the initial...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for constructing image passwords based on neuron chaotic response encoding. Firstly, the invention converts the digital passwords into the position initial values ​​of the Lorenz system through logarithmic transformation, and obtains the chaotic time series; combined with the user number, the temporal chaos The sequence is linearly transformed to obtain a low-level time series to construct a chaotic square wave excitation signal; the excitation signal is used as the input current of the Hodgkin-Huxley neuron to encode the chaotic response of the neuron, and the moment when the neuron pulse is emitted is recorded; finally Obtain the time interval sequence of neuron pulse firing, convert the one-dimensional time interval sequence into a two-dimensional image code through grayscale mapping, and according to the row and column parameters of the image code. The invention makes full use of the chaotic initial value sensitivity of the Lorenz system and the chaotic parameter sensitivity of the pulse distribution of the neuron model, ensures the irreversibility of the image password, and effectively enhances the security of the identity authentication system.

Description

technical field [0001] The invention belongs to an identity authentication system, and relates to an image password construction method based on neuron chaotic response coding, which is applied to the identity authentication system in combination with digital passwords, and can solve the problem of poor security of traditional passwords and passwords. Background technique [0002] Identity authentication is used to identify user identities and is the main way for users to protect their privacy and property. Today, when the Internet enters the era of big data, the identity authentication mechanism has become an important part of network security technology. The password mechanism is the most basic and widely used identity authentication mechanism. The system establishes a username / password for each legal user. When a user logs in to the system, the user enters his username and password, and the system compares it with the stored username and password to determine whether the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00
Inventor 范影乐方芳郭斌李晓春
Owner HANGZHOU DIANZI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products