Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Image Encryption and Decryption Method Based on Probability Interval Division and Dynamic Probability Event

A technology of probability interval and encryption method, which is applied in the direction of encryption device with shift register/memory, image data processing, image data processing, etc.

Active Publication Date: 2019-01-22
SHAANXI NORMAL UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the literature (Benyamin Norouzi et al., 2014 and Li Yuanyuan et al., 2013) strengthened the association between the key and the plaintext, the plaintext can only exert influence on the parameters of the image encryption link, but cannot specifically change the encryption link experienced. In the actual use process, there are still relatively large security risks
[0007] Among the applied invention patents (Shao Liping, Guo Yi, Yang Lu. Image encryption and decryption method based on improved Joseph traversal and generalized Henon mapping [P]. China, State Intellectual Property Office of the People's Republic of China, Invention Patent, 201410145368.7) , we use the SHA-1 value of the image to be encrypted and the encryption parameters selected by the user as the key to drive the generalized Henon map to the starting position, report interval and report direction of the improved Joseph traversal map for site replacement Random perturbation is carried out, so that different encrypted images and encryption parameters correspond to different site replacement processes; this method enhances the coupling of each encryption link, and different images to be encrypted start different encryption processes, so it can effectively resist Selective plaintext attack, the proposed method strengthens the association between the key and the plaintext, but the plaintext can only exert influence on the parameters of the image encryption link, but cannot specifically change the encryption link experienced

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image Encryption and Decryption Method Based on Probability Interval Division and Dynamic Probability Event
  • Image Encryption and Decryption Method Based on Probability Interval Division and Dynamic Probability Event
  • Image Encryption and Decryption Method Based on Probability Interval Division and Dynamic Probability Event

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0156] The present invention is described below in conjunction with specific embodiment:

[0157] Taking JAVA jdk1.8.0_20 as the case implementation environment, the implementation of the present invention will be described in detail in conjunction with the accompanying drawings, but not limited to this implementation case, where figure 1 is the flowchart of the encryption method, figure 2 is the flowchart of the decryption method.

[0158] Encryption process:

[0159] Step 1: Select image A, such as image 3 As shown, it is a 256×256 grayscale image Lena, and the encrypted image A=(a i,j ) m×n The corresponding 40-bit hexadecimal SHA-1 value is S SHA-1 =4D27B479AC001B2D07EB2D784659E520DD2E6672, and connect them end to end. Determined by the user not to repeat the starting point G 0 ,G 1 ,G 2 ∈ {0,1,2,...,39}, map it to a sequence of hexadecimal numbers

[0160] For example: G 0 =8,G 1 =16,G 2 = 36 t=65536;

[0161] Step 2: Put Mapped to the initial value ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an image encryption and decryption method based on probability interval division and dynamic probability events. The method comprises steps of during encryption, firstly mapping secret key parameters and SHA-1 values of to-be-encrypted images to different probability encryption sections; carrying out random screening on to-be-encrypted pixels based on the secret key parameters and the SHA-1 values; and executing and writing different probability encryption events into corresponding pixel positions according to the probability sections where the probability encryption events fall. In order to improve safety, an SHA-1 value remapping process is added for dividing the probability sections, screening the to-be-encrypted pixels and carrying out stochastic disturbance on encryption; and by adding an overall situation encryption process related to SHA-1 update values and user secret keys, performance of an image encryption algorithm is enhanced. The method also comprises steps of during decryption, firstly recovering encrypted parameters; then finishing overall decryption; and at last executing inverse decryption operation on randomly screened pixels. Compared with the prior art, different pixels and secret keys correspond to different encryption processes, so the method is highly safe.

Description

technical field [0001] The invention belongs to the cross-research field of information security and digital image signal processing, relates to a digital image encryption and decryption method, in particular to an image encryption and decryption method based on probability interval division and dynamic probability events. Background technique [0002] In recent years, with the development of computer and network technology, more and more images are transmitted on the network, which brings a series of security risks while providing convenience to users. Improper use or malicious tampering of images not only involves personal privacy, but also has a serious negative impact on society. The core technology to ensure the security of digital images is digital image encryption. [0003] Since Robert Matthews, 1989 (Robert Matthews.On the derivation of a “chaotic” encryption algorithm[J].Cryption, 1989, 13(1):29-42) put forward the idea of ​​chaotic encryption, the image encryptio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04L9/06H04L9/08H04L29/06G06T1/00
CPCG06T1/00H04L9/001H04L9/002H04L9/0618H04L9/0861H04L63/0428H04L63/06H04L63/1441
Inventor 邵利平唐子龙
Owner SHAANXI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products