Multiple image encryption method based on pwlcm chaos

An encryption method and image technology, applied in the direction of image communication, electrical components, etc., can solve problems such as low efficiency, and achieve the effects of high security, small amount of calculation, and strong key sensitivity

Inactive Publication Date: 2018-03-06
CHINA UNIV OF MINING & TECH
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Purpose of the present invention: Aiming at the problem of low efficiency when encrypting multiple images by most existing single image encryption methods, a multiple image encryption method based on PWLCM chaos is proposed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multiple image encryption method based on pwlcm chaos
  • Multiple image encryption method based on pwlcm chaos
  • Multiple image encryption method based on pwlcm chaos

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Embodiments of the present invention will be further described in detail below in conjunction with specific drawings and examples.

[0032] Encryption flowchart of multiple image encryption method based on PWLCM chaos, such as figure 1 shown.

[0033] The programming software used is Matlab 7.0, select figure 2 The nine gray images of the same size of 512×512 are the experimental objects. Using the multiple image encryption method based on PWLCM chaos, the specific process of encrypting nine interactive images is as follows:

[0034] 1. To encrypt 9 gray interactive images of the same size of 512×512, that is, I 1 , I 2 ,..., I 9 , the sender Alice converts 9 interactive images into a large image in a certain order, which can be expressed as

[0035]

[0036] Such as image 3 shown.

[0037] 2. Randomly select x 0 = 0.28153489126924 and p 1 = 0.44537834013456 respectively as the initial value and control parameters of the PWLCM chaotic system, using the ch...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A multi-image encryption method based on piecewise linear chaotic map (PWLCM) belongs to the field of information encryption, and aims to solve the problems that most of the conventional image encryption methods take a single image as an encryption object, and cannot adapt to mass image encryption, and the encryption efficiency of the conventional image encryption methods is relatively low. Being different to the conventional image encryption methods, the multi-image encryption method takes multiple images as encryption objects, and adopts the steps of converting the multiple images into a single large image, encrypting the single large image, and converting the encrypted single large image into multiple encrypted images, so as to protect contents in the multiple images. The multi-image encryption method comprises the key steps of combining k interactive images into a large image, encrypting the large image according to PWLCM to obtain an encrypted large image, dividing the encrypted large image into k encrypted images, and naming the k encrypted images sequentially according to a chaotic sequence generated based on PWLCM. Test results show that the method is easy to implement, the encryption effect is favorable, the encryption efficiency and security are high, and communication security of contents of any multiple images can be protected simultaneously.

Description

technical field [0001] The invention relates to an information encryption technology, in particular to an image encryption method. Background technique [0002] In many fields such as politics, military affairs, and commerce, the security of network information has become increasingly important. In recent years, the development trend of network security has shown: (1) Computer viruses emerge in endlessly; (2) Hacker attacks are increasing year by year; (3) There are security loopholes in the system; (4) The military of various countries has stepped up research on information warfare. Network leaks occur from time to time, which have a major impact on the privacy of personal communications, business secrets of enterprises, and national security and stability. Therefore, network information security is an important issue that needs to be solved urgently in the development of the Internet. [0003] In many fields such as military discovery, natural disaster monitoring, traffi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04N1/32
CPCH04N1/32272
Inventor 张晓强王雪松程玉虎
Owner CHINA UNIV OF MINING & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products