Plaintext feature-based double-chaos image encryption method

An encryption method and plaintext image technology, applied in image data processing, image data processing, instruments, etc., can solve the problems of ineffective resistance to differential attacks, statistical characteristic analysis, image encryption cannot effectively resist attacks, etc., and achieve encryption effect Good, improve security, and resist differential attacks

Inactive Publication Date: 2017-01-11
GUANGDONG UNIV OF TECH
View PDF4 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, only using one-dimensional chaotic system to encrypt images cannot effectively resist common attacks, while hyper-chaotic systems have better chaotic characteristics and randomness, and are favored by more scholars, and are widely used in chaotic image encryption.
However, some current image encryption methods mainly have problems such as inability to effectively resist differential attacks, statistical characteristic analysis, and chosen plaintext (ciphertext) attacks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Plaintext feature-based double-chaos image encryption method
  • Plaintext feature-based double-chaos image encryption method
  • Plaintext feature-based double-chaos image encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0013] The double-chaotic image encryption method based on the characteristics of the plaintext itself in this embodiment can process the plaintext image into a ciphertext image, and the encryption method includes scrambling the image pixel positions of the plaintext image and bit bits of the image pixel values scramble.

[0014] Wherein the scrambling of the image pixel position and the bit scrambling of the image pixel value include:

[0015] Step1 separates the three primary colors of the plaintext image, and stores the pixel values ​​of the RGB three primary colors into three two-dimensional arrays of R[m][n], G[m][n], and B[m][n] respectively Inside, the number of iterations N is calculated using the sum of all color components of the original graphic and m, n:

[0016] N=mod(sum,256)+m+n (3);

[0017] Step2 uses the key key1 as the initial value of the Chebyshev chaotic system to iterate the Chebyshev mapping;

[0018] Step3 takes the value after N iterations as the i...

Embodiment 2

[0028] Through the chaotic system, the global scrambling of the pixel position of the plaintext image is performed, and then the pixel value diffusion operation is performed to change the pixel value, so as to achieve the encryption of the plaintext image. The encryption process can be mainly divided into the following two steps: first, image pixel position scrambling; second, image pixel value bit position scrambling. Specific steps are as follows:

[0029] 1. Image position scrambling

[0030] Step1 separates the three primary colors of the plaintext image A, and stores the pixel values ​​of the RGB three primary colors into the three two-dimensional R[m][n], G[m][n], and B[m][n] respectively. In the array, use the sum of all color components of the original graphics and m, n to calculate the number of iterations N by formula (3).

[0031] N=mod(sum,256)+m+n (3)

[0032] Step2 uses the key key1 as the initial value x of the Chebyshev chaotic system 0 , the parameter k=6 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a plaintext feature-based double-chaos image encryption method. According to the method, Logistic mapping and Chebyshev mapping are combined; a key is generated by means of the balance of the Chebyshev mapping; the parameters of the Logistic mapping are controlled, so that a plurality of different Logistic sequences can be generated to carry out overall scrambling on color components in an image; and diffusion operation is performed scrambled image pixels, so that plaintext information can be better hidden. As indicated by an experimental simulation result, the method can not only resist statistical characteristic analysis and differential attack, but also can resist selective plaintext (ciphertext) attack, and has the advantages of good encryption effect, large key space and the like.

Description

technical field [0001] The invention belongs to the field of image encryption, in particular to a double-chaotic image encryption method for images based on the characteristics of plaintext itself. Background technique [0002] Information security is a comprehensive science that specializes in protecting information from safe and legal use. It covers cryptography, mathematics, computer science, information theory and other disciplines. Encryption technology is a common method to protect information from illegal infringement. Safe core technology. Image encryption technology is the key technology to solve the problem of image information security. Due to the continuous development of science and technology and the continuous innovation of cryptanalysis theory, many traditional image encryption technologies have been unable to resist various hacker attacks. Some high-performance Computers are capable of breaking some encryption schemes in a short amount of time. Because the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00
Inventor 谢国波王添
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products