Adaptive selection encryption method based on salient area

A technology of self-adaptive selection and encryption method, applied in the encryption device with shift register/memory, secure communication through chaotic signals, digital data protection, etc., can solve the problems of encryption redundancy and security instability, and achieve algorithmic Compatible formats, ensuring confidentiality, and improving the effect of attack resistance

Active Publication Date: 2016-09-28
SICHUAN CHANGHONG ELECTRIC CO LTD
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, edge detection is sensitive to texture, so some unstable edge blocks in non-important areas will also be encrypted to cause encryption redundancy. On the other hand, only edge

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Adaptive selection encryption method based on salient area
  • Adaptive selection encryption method based on salient area
  • Adaptive selection encryption method based on salient area

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to make the purpose, technical solution and advantages of the present invention clearer, the specific implementation manners of the present invention will be clearly and completely described below.

[0045] figure 1 A schematic diagram of the salient region-based adaptive selection encryption method provided by Embodiment 1 of the present invention. Such as figure 1 As shown, the method includes the following steps (1) to (8), and the above steps will be described in detail below.

[0046] (1) Perform saliency detection on the image and mark the saliency region.

[0047] This step performs saliency detection on the original image to obtain a saliency map, and marks the saliency region of the original image according to the saliency map. Specifically, this step uses the TASE saliency detection method to perform saliency detection on the image to obtain a saliency map. The method first performs non-linear diffusion on the image according to the total variation...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the image selection encryption technical field, and provides an adaptive selection encryption method based on salient areas; the method comprises the following steps: carrying out saliency detection for an image and tagging salient areas; forming a chaotic sequence P; converting a plaintext image color space to YCbCr, and carrying out partitioning diffusion scrambling on the image; executing a DCT conversion and quantification process; forming a DC coefficient matrix MDC and an AC coefficient matrix MAC; executing adaptive encryption for the MDC and MAC; respectively carrying out component encryption for Y, Cb, and Cr; finishing residual coding steps. The method uses saliency detection to determine image salient areas, and selects salient areas for emphasized encryption; compared with edge detection, the novel encryption mode can better ensure image important area security, thus improving image anti-attaching property.

Description

technical field [0001] The invention belongs to the technical field of image selection encryption, in particular to an adaptive selection encryption method based on a salient region. Background technique [0002] In recent years, with the rapid development of computers, mobile terminals and Internet technologies, high-definition multimedia images have become one of the most popular forms of multimedia. Therefore, the safe transmission and storage of multimedia images becomes particularly important. Encryption is a very effective solution. At present, there are two mainstream research ideas: airspace image encryption technology and compressed image encryption technology. [0003] The spatial domain image encryption regards the image as two-dimensional data for operation, and encrypts it on the basis of no compression. The basic spatial domain encryption ideas can be divided into three categories: pixel position transformation, pixel gray value change and the combination of t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60H04L9/00H04L9/06
CPCG06F21/602H04L9/001H04L9/0625H04L9/065
Inventor 翟栋
Owner SICHUAN CHANGHONG ELECTRIC CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products