DNA dynamic coding based colored image encryption method
A color image and encryption method technology, which is applied in the fields of instruments, computing, and electrical digital data processing, etc., can solve problems such as the inability to directly promote color image encryption, expensive biological experimental equipment, and weak ability of algorithms to resist exhaustive attacks.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0058] Embodiment one, a kind of color image encryption method based on DNA dynamic coding, comprises the following steps:
[0059] Step 1. Input an 8-bit color image P of size M×N 1 , separating the color image P 1 The RGB three-primary color components of , get the component matrix P 1 _R MN ,P 1 _G MN ,P 1 _B MN , the size of each component matrix is M×N, and the component matrix P 1 _R MN ,P 1 _G MN ,P 1 _B MN Sort by row to get a plaintext grayscale image P of size M×3N 2 ;
[0060] Step 2. Use the SHA256 function to process the plaintext color image P 1 Perform calculations to obtain a group of 256-bit hash values as the image key Key, convert the 256-bit image key Key into 32 decimals, and divide them into four groups on average, which are used to calculate the scrambling process and the diffusion process. Initial state values and parameters of the CML chaotic system;
[0061] Step 3. Bring the initial state value and parameters of the CML chaotic ...
Embodiment 2
[0068] Embodiment two: see figure 1 As shown, it is basically the same as Embodiment 1, except that the step 2 specifically includes the following content:
[0069] Step 2.1. Use the LTS mapping as the local mapping of the CML chaotic system sub-model, and the LTS mapping is defined as:
[0070] f ( x ) = { ( r x ( 1 - x ) + ( 4 - ...
Embodiment 3
[0099] Embodiment three, see Figure 2~4As shown, the programming software used is MatlabR2014a, and the lena color image with a size of 256×256 is selected as the experimental object. The process of encrypting the lena color image is as follows:
[0100] Step 1. Input lena color image with original size 256×256, use P 1 =imread('lena.bmp') reads the image information and separates the color image P 1 The three primary color components of R, G, and B get the component matrix P 1 _R MN , P 1 _G MN , P 1 _B MN , and the size of each component matrix is 256×256, then the image P 1 The three component matrix P of 1 _R MN , P 1 _G MN , P 1 _B MN Sort by row to get a grayscale image P of size 256×768 2 .
[0101] Step 2. Use the SHA256 function to process the plaintext color image P 1 Perform calculations to obtain a group of 256-bit hash values and use it as the image key Key, then convert the 256-bit Key to 32 decimal numbers, and then divide them into four gro...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com