DNA dynamic coding based colored image encryption method

A color image and encryption method technology, which is applied in the fields of instruments, computing, and electrical digital data processing, etc., can solve problems such as the inability to directly promote color image encryption, expensive biological experimental equipment, and weak ability of algorithms to resist exhaustive attacks.

Active Publication Date: 2015-11-11
HENAN UNIVERSITY
View PDF3 Cites 36 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most of the existing DNA-based encryption algorithms need to be operated in biological experiments. Due to the expensive biological experimental equipment, the difficulty in controlling the experimental environment, and the high sensitivity of the experiment, the encryption methods based on DNA cryptography are more theoretical than practical. Most of the currently known DNA-based encryption algorithms are mainly aimed at text information or grayscale image information. Considering the correlation between the RGB components of col...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • DNA dynamic coding based colored image encryption method
  • DNA dynamic coding based colored image encryption method
  • DNA dynamic coding based colored image encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0058] Embodiment one, a kind of color image encryption method based on DNA dynamic coding, comprises the following steps:

[0059] Step 1. Input an 8-bit color image P of size M×N 1 , separating the color image P 1 The RGB three-primary color components of , get the component matrix P 1 _R MN ,P 1 _G MN ,P 1 _B MN , the size of each component matrix is ​​M×N, and the component matrix P 1 _R MN ,P 1 _G MN ,P 1 _B MN Sort by row to get a plaintext grayscale image P of size M×3N 2 ;

[0060] Step 2. Use the SHA256 function to process the plaintext color image P 1 Perform calculations to obtain a group of 256-bit hash values ​​as the image key Key, convert the 256-bit image key Key into 32 decimals, and divide them into four groups on average, which are used to calculate the scrambling process and the diffusion process. Initial state values ​​and parameters of the CML chaotic system;

[0061] Step 3. Bring the initial state value and parameters of the CML chaotic ...

Embodiment 2

[0068] Embodiment two: see figure 1 As shown, it is basically the same as Embodiment 1, except that the step 2 specifically includes the following content:

[0069] Step 2.1. Use the LTS mapping as the local mapping of the CML chaotic system sub-model, and the LTS mapping is defined as:

[0070] f ( x ) = { ( r x ( 1 - x ) + ( 4 - ...

Embodiment 3

[0099] Embodiment three, see Figure 2~4As shown, the programming software used is MatlabR2014a, and the lena color image with a size of 256×256 is selected as the experimental object. The process of encrypting the lena color image is as follows:

[0100] Step 1. Input lena color image with original size 256×256, use P 1 =imread('lena.bmp') reads the image information and separates the color image P 1 The three primary color components of R, G, and B get the component matrix P 1 _R MN , P 1 _G MN , P 1 _B MN , and the size of each component matrix is ​​256×256, then the image P 1 The three component matrix P of 1 _R MN , P 1 _G MN , P 1 _B MN Sort by row to get a grayscale image P of size 256×768 2 .

[0101] Step 2. Use the SHA256 function to process the plaintext color image P 1 Perform calculations to obtain a group of 256-bit hash values ​​and use it as the image key Key, then convert the 256-bit Key to 32 decimal numbers, and then divide them into four gro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to a DNA dynamic coding based colored image encryption method, comprising: obtaining a key through a colored plain-text image; by the key, calculating an initial value and a parameter of a chaotic system used in scrambling and diffusion processes; substituting the initial value and the parameter to the chaotic system for iteration to obtain W1 and W2, obtaining a scrambling matrix K from W1, obtaining an integer matrix Y and an index matrix Ind from W2, and performing DNA coding on Y according to the index matrix Ind; and performing scrambling on the plain-text image row by row by using the matrix K, then performing coding and diffusion until all rows finish DNA coding, and finally performing decoding and recomposing on a DNA matrix, to obtain a final colored ciphertext image. According to the method, a function SHA256 is used to generate the key, so that the key space is expanded; the generation of the key depends on a plain-text, so that plain-text attack can be effectively resisted; chaotic characteristics are combined with DNA dynamic coding, so that the security is further improved; and meanwhile, scrambling and diffusion operations are performed according to the row of images, so that parallel computing is facilitated and the efficiency is improved.

Description

technical field [0001] The invention relates to a color image encryption method, in particular to a color image encryption method based on DNA dynamic coding. Background technique [0002] In today's information age, the use of computers and various smart terminals has greatly accelerated the dissemination of information, and the transmission of most information in our lives, such as documents, audio, video, especially image information, is far from Do not open network support. On the one hand, the network brings convenience to people's life, but on the other hand, some criminals will use the network to steal information, which brings great hidden dangers to people's information security, so the security and safety of information in the process of network transmission Confidentiality issues are also more and more people's attention and attention. Due to the characteristics of randomness, determinism, ergodicity and high sensitivity to initial values, chaotic systems have b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60
CPCG06F21/602
Inventor 柴秀丽甘志华李征杨康高育林程云龙段修庆
Owner HENAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products