Image encryption method based on hybrid balanced second-order reversible two-dimensional cellular automata

An encryption method and hybrid technology, applied in the field of information security, can solve the problems of large data volume, encryption efficiency and performance can not achieve ideal results, high redundancy, etc., achieve huge key space, increase diffusion and confusion sex, the effect of increasing confusion

Active Publication Date: 2016-10-26
SUN YAT SEN UNIV +2
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the large amount of data, high redundancy, and strong correlation between pixels in the image itself, t...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image encryption method based on hybrid balanced second-order reversible two-dimensional cellular automata
  • Image encryption method based on hybrid balanced second-order reversible two-dimensional cellular automata
  • Image encryption method based on hybrid balanced second-order reversible two-dimensional cellular automata

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] Such as figure 1 As shown, an image encryption method based on a hybrid equilibrium second-order reversible two-dimensional cellular automata includes the following steps:

[0038] S1: Perform pixel scrambling on the three RGB channels of the image I to be encrypted to obtain a 0-1 matrix I' of N×24M;

[0039] S2: divide the 0-1 matrix I' matrix of N * 24M into several 0-1 matrix groups of 8 * 16;

[0040] S3: Construct a hybrid balanced second-order reversible two-dimensional cellular automaton to perform encryption iterations on each matrix group;

[0041] S4: Combine the encrypted packets into an encrypted image.

[0042] The specific process of step S1 is as follows:

[0043] Use 8bit to represent a pixel value in a color channel, and arrange the pixel values ​​in the image I with a size of N×M in the order of R channel-G channel-B channel until the end of the pixel byte sequence of image I to obtain a N×24M 0-1 matrix I'.

[0044] The specific process of step ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an image encryption method based on a hybrid balanced second-order reversible two-dimensional cellular automata. The method comprises the following steps: pixel scrambling is performed on an R channel, a G channel and a B channel of an image I needing to be encrypted, and then an N*24M 0-1 matrix is obtained; the N*24M 0-1 matrix is divided into a plurality of 8*16 0-1 matrix sub groups; the hybrid balanced second-order reversible two-dimensional cellular automata is constructed, and an encryption iteration is performed on each matrix sub group; and the sub groups after encryption are combined to form an encrypted image.

Description

technical field [0001] The invention relates to the field of information security, and more specifically, to an image encryption method based on a mixed-type equilibrium second-order reversible two-dimensional cellular automaton. Background technique [0002] With the opening and growth of the Internet, the role of information security is self-evident. Especially in the military, financial, commercial, and medical fields, the requirements for information security are higher. Image encryption algorithm is an integral part of information security. Commonly used image encryption methods include adaptive image encryption, image encryption based on chaotic systems, blind source separation image encryption methods and digital watermarking algorithms. Due to the large amount of data, high redundancy, and strong correlation between pixels of the image itself, the traditional encryption method cannot achieve the desired effect in terms of encryption efficiency and performance. Co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06T1/00
CPCG06T1/00
Inventor 李恺彭安基印鉴
Owner SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products