Image encryption method based on Hash function and inserting-deleting model

A technology of hash function and encryption method, which is applied in image data processing, image data processing, instruments, etc., to achieve the effect of improving stability, high storage density, and improving encryption efficiency

Inactive Publication Date: 2016-06-15
DALIAN UNIV
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the image encryption technology based on DNA computing only uses DNA as the operating object, and the realization of this technology requires a good laboratory environment, but the actual conditions cannot meet this condition, so researchers combine the chaotic system with DNA computing Combine to encrypt the image

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image encryption method based on Hash function and inserting-deleting model
  • Image encryption method based on Hash function and inserting-deleting model
  • Image encryption method based on Hash function and inserting-deleting model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] In order to further understand the image encryption method based on the hash function and the insertion-deletion model, the present invention will be further described below in conjunction with the accompanying drawings.

[0046] The detailed steps are as follows:

[0047] S1, the original image (see attached image 3 ) into matrix A(m,n), and then get hash table B and hash matrix C(m,n) through hash function H(key)=keymod3, where key is the pixel value of the original image, and hash table The size of is determined by the key.

[0048] S2. Use the hash table B and the hash matrix C to scramble the pixel values ​​of the image

[0049] count1=count2=count3=size(C,2),

[0050] When C(i,j)=0, if B(1,count1)≠0, then D(i,j)=B(1,count1), count1=count1-1;

[0051] When C(i,j)=1, if B(2,count2)≠0, then D(i,j)=B(2,count2), count2=count2-1;

[0052] When C(i,j)=2, if B(3,count3)≠0, then D(i,j)=B(3,count3), count3=count3-1;

[0053] where D(m,n) is the scrambled matrix.

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an image encryption method based on the Hash function and an inserting-deleting model and relates to the field of image encryption. The Hash function and an inserting-deleting model of DNA computing are introduced to an image encryption processing. First, operating pixel values by use of the Hash function to obtain a Hash table; scrambling the pixel values according to the Hash table and then performing DNA coding to a scrambled matrix; in addition, the method makes full use of the advantages of the inserting-deleting model; the inserting-deleting model is applied in spreading the pixel values of the image. Simulation results and security analysis show that the method not only has large cipher code space and high sensitivity, but also can resist exhaustive attacks, statistical attacks, and differential attacks, etc., and has good encryption effect. The method is stressed on applying the Hash function and the inserting-deleting model in image encryption.

Description

technical field [0001] The invention relates to a hash function and an insertion-deletion model, in particular to encrypting an original image with the hash function and the insertion-deletion model, which belongs to the field of image encryption. Background technique [0002] Nowadays, with the development of multimedia technology, we can enjoy electronic information conveniently. At the same time, images are widely used in network transmission, but protecting the security of image information in transmission has become an urgent problem to be solved. Therefore, researchers have proposed many image encryption technologies based on chaotic systems and DNA computing to address this problem. These technologies are different from traditional encryption technologies because images have the characteristics of high redundancy, strong correlation, and computational complexity. Therefore, traditional encryption techniques are not suitable for image encryption. [0003] Due to the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00
CPCG06T1/0021
Inventor 周昌军牛红叶王玲冷方奥
Owner DALIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products