Image encryption method based on two-dimensional compression perception and chaotic system

An encryption method and chaotic system technology, applied in the field of information security, can solve problems such as poor anti-noise ability, fast reconstruction speed, low reconstruction accuracy, etc., and achieve good robustness, resistance to noise interference, and small key consumption Effect

Inactive Publication Date: 2016-01-13
NANCHANG UNIV
View PDF1 Cites 34 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Its advantage is faster reconstruction speed, but its disadvanta

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image encryption method based on two-dimensional compression perception and chaotic system
  • Image encryption method based on two-dimensional compression perception and chaotic system
  • Image encryption method based on two-dimensional compression perception and chaotic system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The present invention will be further described below in conjunction with the embodiments and drawings, but the protection scope of the present invention should not be limited thereby.

[0040] This implementation scheme is divided into two steps: the first step is based on the generation of the measurement matrix controlled by the chaotic system to realize the measurement encryption to obtain the measured value; the second step is to implement scrambling and diffusion controlled by the chaotic system according to the ring range to obtain the ciphertext. The specific steps of this embodiment are as follows:

[0041] Step 1: Select the discrete symlet8 wavelet to construct the sparse basis Ψ, and perform two-dimensional discrete wavelet sparse on the image I(x, y) with a size of N×N, and obtain

[0042] A=Ψ T I(x,y) T Ψ(11)

[0043] Take the initial value of x 01 ,y 01 The two-dimensional sine-logistic chaotic map of the following iterations

[0044]

[0045] Amon...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an image encryption method based on a two-dimensional compression perception and chaotic system. A wavelet sparse basis is used to carry out sparse representation of an image to generate a sparse matrix, then a random sequence generated by a two-dimensional sine-logistic chaotic system iteration is used to generate a measurement matrix, the measurement matrix is used to carry out compression measurement of the sparse matrix, and a preliminary compression encrypted image which is an intermediate result is obtained. In order to enhance the attack resistance ability of the system, the chaotic system is used again to generate a chaotic series to carry out pixel scrambling and cyclic shift operations on the intermediate result, and a final encryption map is obtained. According to the method, the two-dimensional sine-logistic chaotic system is used, the sequence randomness is increased, and the scrambling effect of the image is enhanced. The key space is expanded, the safety of an encryption system is enhanced, an excessive ciphertext data quantity is avoided, and a good encryption effect is achieved.

Description

technical field [0001] The invention belongs to the technical field of information security and relates to image encryption and image compression technologies. Background technique [0002] With the rapid development of the Internet, more and more images need to be transmitted on the network, which has made image security issues increasingly prominent. Therefore, when storing or transmitting important images, in order to ensure the security of important images, it is necessary to utilize effective image encryption technology. Image encryption generally makes the original image information into information similar to random noise through operations such as scrambling and diffusion. Therefore, these encrypted information are unrecognizable to network eavesdroppers whose keys are unknown, and can be used by authorized parties. The key and the decryption method decrypt the ciphertext to obtain the decrypted image, thereby effectively protecting the image information in transmis...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06T1/00G06T9/00
Inventor 周南润杨建平龚黎华谢新文
Owner NANCHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products