Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Image Encryption Method Based on Memristor Hyperchaotic System, Cellular Automata and DNA Computing

A technology of cellular automaton and encryption method, which is applied in the field of image encryption based on memristive hyperchaotic system, cellular automata and DNA computing, which can solve the difficulty in realizing DNA encryption, lack of connection between algorithms and plaintext, and insufficient security advanced questions

Active Publication Date: 2017-06-13
HENAN UNIVERSITY
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to overcome the deficiencies in the prior art, the present invention proposes an image encryption method based on memristive hyperchaotic systems, cellular automata and DNA calculations, which overcomes the small key space, low security and algorithmic problems of low-dimensional chaotic systems. The shortcoming of lack of connection with plaintext also eliminates the disadvantages of weak anti-exhaustive attack ability of DNA fixed coding rules and the difficulty of DNA encryption through complex biological operations, and has stronger anti-exhaustive attack ability, and in the process of encryption In this method, the image is divided into blocks, which is convenient for parallel computing and improves efficiency; the image is encrypted by the pseudo-DNA calculation method, which gets rid of the complicated biological experiment operation, and the algorithm is based on bit-level encryption. At the same time, the diffusion operation is carried out, which improves the security of the algorithm

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image Encryption Method Based on Memristor Hyperchaotic System, Cellular Automata and DNA Computing
  • Image Encryption Method Based on Memristor Hyperchaotic System, Cellular Automata and DNA Computing
  • Image Encryption Method Based on Memristor Hyperchaotic System, Cellular Automata and DNA Computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0081] Embodiment one, see figure 1 As shown, an image encryption method based on memristive hyperchaotic system, cellular automata and DNA computing includes the following steps:

[0082] Step 1. Use the SHA256 function to calculate the plaintext image P with a size of M×N, obtain a set of 256-bit hash values ​​and use it as the image key Key, and convert the 256-bit image key Key into 32 decimals number k 1 , k 2 ,...,k 32 , to calculate the initial state value of the memristive hyperchaotic system based on the Chua circuit;

[0083] Step 2. Bring the obtained initial state value into the memristive hyperchaotic system for iteration, and obtain 4 state value matrices X=[x 1,1 ,x 1,2 ,...,x 1,4MN ], Y=[y 1,1 ,y 1,2 ,...,y 1,4MN ], Z=[z 1,1 ,z 1,2 ,...,z 1,4MN ], W=[w 1,1 ,w 1,2 ,...,w 1,4MN ], modify the state value matrix X, Y, Z to get the matrix X1=[x' 1,1 ,x′ 1,2 ,...,x′ 1,4MN ], Y1=[y' 1,1 ,y′ 1,2 ,...,y′ 1,4MN ], Z1=[z' 1,1 ,z' 1,2 ,...,z' 1,4MN ...

Embodiment 2

[0099] Embodiment two, see figure 1 As shown, an image encryption method based on memristive hyperchaotic system, cellular automata and DNA computing includes the following steps:

[0100] Step 1. Use the SHA256 function to calculate the plaintext image P with a size of M×N, obtain a set of 256-bit hash values ​​and use it as the image key Key, and convert the 256-bit image key Key into 32 decimals number k 1 , k 2 ,...,k 32 , calculate the initial state value of the memristive hyperchaotic system based on the Chua circuit, the specific expression of the memristive hyperchaotic system based on the Chua circuit is:

[0101]

[0102] , where h(x)=m 1 x+0.5(m 0 -m 1 )×(|x+1|-|x-1|), x, y, z, w represent the state variables of the memristive hyperchaotic system, a, b, c, d, e, m 0 、m 1 is the control parameter of the memristive hyperchaotic system, and when a=30, b=36, d=2.5, e=3.5, m 0 =-0.5, m 1 =-0.1 and c∈[0.073,0.162], the system is in a super chaotic state; an...

Embodiment 3

[0139] Embodiment three, see Figure 2 (a) ~ 4 (b) As shown, in this embodiment, the programming software used is MatlabR2014a, and the Lena grayscale image with a size of 256×256 is selected as the experimental object. The specific encryption process is as follows:

[0140] Step 1. Input the Lena grayscale image with the original size of 256×256, use P=imread('lena.bmp') to read the image information, use the SHA256 function to calculate the plaintext image P, and obtain a set of 256-bit hashes Value and use it as the image key Key, and then convert the 256-bit Key to 32 decimal numbers k 1 , k 2 ,...,k 32 , the specific steps used to calculate the initial state value of the memristive hyperchaotic system are as follows:

[0141]1.1) The memristive hyperchaotic system based on the Chua circuit is used to generate the pseudo-random sequence required by the encryption algorithm, and its expression is as follows:

[0142]

[0143] , where: h(x)=m 1 x+0.5(m 0 -m 1 )×(|x...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an image encryption algorithm based on memoristor hyper-chaotic system, cellular automaton and DNA calculation. First of all, a four-dimensional memoristor hyper-chaotic system based on a Chua circuit is employed, at the same time, a secret key is generated by enabling a plaintext image on an SHA256 function; a pseudo random sequence generated by the chaos system is taken as a basis of DNA dynamic encoding, rules of cellular dynamic evolution are determined according to a DNA matrix after diffusion, and in an encryption process, partitioning processing is performed on the image; and finally, the image is encrypted through a pseudo DNA calculation method, and diffusion operation is carried out while the image is scrambled. According to the invention, on one hand, secret key space is increased and the capability of the algorithm in fending off violent attacks is enhanced; and on the other hand, the secret key is enabled to be generated through close reliance on a plaintext, the capability of the algorithm in fending off plaintext attacks is improved, the capability of fending off exhausive attacks is higher, parallel calculation is facilitated, the operation efficiency is further improved, and the security of the algorithm is improved.

Description

technical field [0001] The invention relates to the field of image encryption, in particular to an image encryption method based on memristive hyperchaotic system, cellular automaton and DNA calculation. Background technique [0002] Today, with the rapid development and popularization of smart terminal devices, most of the information in our lives, such as pictures shared on Weibo, video conversations using WeChat, etc., must be transmitted through the network. Due to its vivid, simple, intuitive and other advantages, images have developed into an indispensable means of communication in our lives. However, people's research on network security has not reached an absolutely reliable point, so there are huge security holes in the transmission of images in the network. News reports that information has been leaked are also common, so ensuring the security of information in network transmission has become a problem that researchers must face. Generally speaking, the images to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06T1/00
CPCG06T1/0021
Inventor 柴秀丽刘鹏飞贾培艳甘志华杨康张苗辉
Owner HENAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products