Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Decryption method used for image data secure transmission

A technology for secure transmission and image data, which is applied in the field of decryption for secure transmission of image data, can solve problems such as poor image correlation damage, weak anti-reconstruction and anti-destructive attacks, and achieve the effect of increasing encryption speed

Active Publication Date: 2015-11-11
XIANGTAN UNIV
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The currently commonly used chaotic image encryption transmission system simply uses linear chaotic sequences to perform chaotic encryption on image sequences. This method has poor correlation damage to images and weak anti-reconstruction and anti-destruction attacks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Decryption method used for image data secure transmission
  • Decryption method used for image data secure transmission
  • Decryption method used for image data secure transmission

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present invention. Rather, they are merely examples of apparatuses and methods consistent with aspects of the invention as recited in the appended claims.

[0037] figure 1 A flowchart showing an encryption method for secure transmission of image data according to an embodiment of the present invention, including the following steps:

[0038] Step S10, obtaining the image plaintext matrix A;

[0039] Step S20, performing 3D chaotic encryption on the image plaintext matrix A to obtain the image ciphertext E;

[0040] Step S30, performing ECC encry...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application relates to a decryption method used for image data secure transmission, comprising the following steps: acquiring an encrypted file; acquiring an encrypted 3D secret key and an image cipher text E from the encrypted file according to an ECC (Elliptic Curves Cryptography)cipher text end mark in the encrypted file; performing ECC decryption for the encrypted 3D secret key to obtain a 3D secret key; and performing 3D chaotic decryption for the image cipher text E by using the 3D secret key to obtain an image clear text matrix A. The technical solution of the decryption method of the application combines the advantages of chaotic encryption and ECC encryption, and effectively improves encryption speed, encryption efficiency and security of a traditional image encryption method.

Description

technical field [0001] This application relates to image encryption processing, in particular to a decryption method for secure transmission of image data. Background technique [0002] In the information age with highly developed network technology, pictures, as an important network information transmission medium, are widely used in medical, military, social and other fields, and the security problems of its transmission process have become increasingly prominent. Image information is different from text information and has its own information characteristics, such as strong correlation, large data volume, and high redundancy. [0003] The currently commonly used chaotic image encryption transmission system simply uses linear chaotic sequences to perform chaotic encryption on image sequences. This method has poor correlation damage to images, and weak anti-reconstruction and anti-destruction attacks. Contents of the invention [0004] In order to overcome the problems e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00H04N13/00
Inventor 吴亚联龙辉胡洪波龚能雷天齐
Owner XIANGTAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products