Unlock instant, AI-driven research and patent intelligence for your innovation.

A Dynamic Probabilistic and Space-Frequency Domain Composite Image Selective Encryption and Decryption Method

An encryption method and selective technology, applied in image data processing, image data processing, instruments, etc., can solve problems such as spatial pixel overflow, encryption strategy irrelevant to the image to be encrypted, and loose coupling

Active Publication Date: 2019-03-05
SHAANXI NORMAL UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Wang Lihua, 2010 and Nidhi Taneja, 2011 both convert the image to the frequency domain and select specific frequency domain coefficients for encryption. In the frequency domain, selecting frequency domain coefficients with different importance can effectively control the visual quality of the image, but at the same time Encryption of frequency domain coefficients will also change the amplitude space of frequency domain coefficients, resulting in spatial domain pixel overflow and incorrect decryption
[0008] In addition to the above problems, selective image encryption also has security problems that exist in traditional image encryption, such as loose coupling of permutation and obfuscation processes, and the specific encryption strategy has nothing to do with the image to be encrypted.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Dynamic Probabilistic and Space-Frequency Domain Composite Image Selective Encryption and Decryption Method
  • A Dynamic Probabilistic and Space-Frequency Domain Composite Image Selective Encryption and Decryption Method
  • A Dynamic Probabilistic and Space-Frequency Domain Composite Image Selective Encryption and Decryption Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0158] The present invention is described below in conjunction with specific embodiment:

[0159]Taking JAVA jdk1.8.0_20 as the implementation environment of the case, the implementation mode of the present invention will be described in detail in conjunction with the accompanying drawings, but not limited to this implementation case, where figure 1 is the encryption flow chart, figure 2 is the decryption flow chart;

[0160] The encryption process is as follows:

[0161] Step 1: Select image A such as image 3 As shown, it is a grayscale image face of 256×256, and the image to be encrypted is A=(a i,j ) m×n ,i=0,1,...,m-1, j=0,1,...,n-1 corresponding to the 40-bit hexadecimal MD5 value S MD5 =, SHA-1 value

[0162] S SHA-1 =, will S MD5 and S SHA-1 Concatenated into a hexadecimal sequence S ms = S MD5 ||S SHA-1 =i > 72 ,i=0,1,...,71 and initialize the encrypted event subscript index sequence S id for S id =, set encryption times t=10000, initial iteration cont...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an image selective encryption and decryption method based on dynamic probability and space-frequency domain compositing. The MD5 value and SHA-1 value of a to-be-encrypted image are composited to improve the impact resistance of a single Hash feature, and intermediate key parameters are generated through close coupling to a user key to carry out probability interval division, probability generation and to-be-encrypted pixel screening and to determine a probabilistic encryption event and transform parameters. The designed encryption event includes a space domain and frequency domain replacement operation to improve the efficiency of encryption and avoid the influence of frequency domain coefficient overflow on the recovery of the visual quality of the image. According to the method, the encryption features of the to-be-encrypted image and the user key are updated, so that the key parameters under the condition of different number of encryption times differ greatly and are closely associated with the features of the to-be-encrypted image and the user key, and image visual quality and frequency domain overflow filtering control can be carried out through a preset encryption threshold. For decryption, an intermediate key set needs to be restored first, and then, the screened pixel blocks are decrypted reversely.

Description

technical field [0001] The invention belongs to the cross-research field of information security and digital image signal processing, relates to an image encryption and decryption method, in particular to an image selective encryption and decryption method based on dynamic probability and space-frequency domain compounding. Background technique [0002] Traditional image encryption is usually aimed at the entire image and is used to convert the entire image into an unrecognizable random dense image, which not only brings high computational costs, but also masks almost all features of the image to be encrypted except the size. In many practical applications, it is often not necessary to encrypt the entire image, but only to encrypt selected bit planes, regions, and some pixels of the image, and at the same time, it is necessary to provide some features of the original image to give potential More experience for users in exchange for greater commercial benefits, and the image ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06T1/00
CPCG06T1/0021
Inventor 邵利平唐子龙
Owner SHAANXI NORMAL UNIV