Color Image Encryption Method Based on DNA Dynamic Coding
A technology of color image and encryption method, which is applied in the fields of instruments, computing, and electrical digital data processing.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0058] Embodiment one, a kind of color image encryption method based on DNA dynamic coding, comprises the following steps:
[0059] Step 1. Input an 8-bit color image P of size M×N 1 , separating the color image P 1 The RGB three-primary color components of , get the component matrix P 1 _R MN ,P 1 _G MN ,P 1 _B MN , the size of each component matrix is M×N, and the component matrix P 1 _R MN ,P 1 _G MN ,P 1 _B MN Sort by row to get a plaintext grayscale image P of size M×3N 2 ;
[0060] Step 2. Use the SHA256 function to process the plaintext color image P 1 Perform calculations to obtain a group of 256-bit hash values as the image key Key, convert the 256-bit image key Key into 32 decimals, and divide them into four groups on average, which are used to calculate the scrambling process and the diffusion process. Initial state values and parameters of the CML chaotic system;
[0061] Step 3. Bring the initial state value and parameters of the CML chaotic ...
Embodiment 2
[0068] Embodiment two: see figure 1 As shown, it is basically the same as Embodiment 1, except that the step 2 specifically includes the following content:
[0069] Step 2.1. Use the LTS mapping as the local mapping of the CML chaotic system sub-model, and the LTS mapping is defined as:
[0070] The chaotic sequence is generated by the CML chaotic system, and the specific expression is as follows:
[0071]
[0072] in, In the formula, n=1, 2,..., n is the time index or state index, i, j, k are the position index of the image grid, is the state value of the i-th grid in space-time n in the CML model, and 1≤j≤L, 1≤k≤L, i=1,2,...,L, L is the number of coupled mapping grids in the CML chaotic system, p,q,ε∈[0,1],η∈ [0,1] is the parameter value of the CML model;
[0073] Step 2.2. Use the SHA256 function to color the plaintext image P 1 Perform calculations to obtain a set of 256-bit hash values as image keys, then convert the 256-bit hash values to 32 decimal num...
Embodiment 3
[0099] Embodiment three, see Figure 2-4As shown, the programming software used is Matlab R2014a, and the lena color image with a size of 256×256 is selected as the experimental object. The process of encrypting the lena color image is as follows:
[0100] Step 1. Input lena color image with original size 256×256, use P 1 =imread('lena.bmp') reads the image information and separates the color image P 1 The three primary color components of R, G, and B get the component matrix P 1 _R MN , P 1 _G MN , P 1 _B MN , and the size of each component matrix is 256×256, then the image P 1 The three component matrix P of 1 _R MN , P 1 _G MN , P 1 _B MN Sort by row to get a grayscale image P of size 256×768 2 .
[0101] Step 2. Use the SHA256 function to process the plaintext color image P 1 Perform calculations to obtain a group of 256-bit hash values and use it as the image key Key, then convert the 256-bit Key to 32 decimal numbers, and then divide them into four gr...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com