Cellular automata and chaotic mapping-based digital image encryption method and decryption method thereof
A technology of chaotic mapping and encryption method, which is applied in image data processing, image data processing, instruments, etc., and can solve problems such as not satisfying real-time performance, potential safety hazards, and increasing time
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0060] Example 1
[0061] Such as figure 1 , A digital image encryption method based on cellular automata and chaotic mapping, the basic process is:
[0062] (1) Key generation stage;
[0063] (2) Image preprocessing stage;
[0064] (3) Pixel position scrambling stage;
[0065] (4) Evolution stage of cellular automata;
[0066] (5) Determine the number of iteration conditions according to step (4), and output the result.
[0067] The steps (1) to (5) are described in detail below:
[0068] The steps of the step (1) are as follows:
[0069] Key generation stage. Choose a binary bit stream with a length of 288 bits as the key to generate the coefficients of the 3D chaotic mapping, the number of iterations, and the rule number of the cellular automata evolution rule. The key generation algorithm is: the first 7×32 bits, each 32 bits represents an integer, which is used as the six coefficients of the 3D chaotic mapping (a x a y a z b x b y b z ) And the number of iterations t, the last 64 bit...
Example Embodiment
[0109] Example 2
[0110] Such as Figure 4 , The basic process of a confidential method of digital image encryption method based on cellular automata and chaotic mapping is:
[0111] (1) Key generation stage;
[0112] (2) Image preprocessing stage;
[0113] (3) Pixel reverse iteration stage;
[0114] (4) Chaotic map inverse operation stage;
[0115] (5) Execute steps (3) and (4) cyclically, determine the number of iteration conditions, and output the result.
[0116] The steps (1) to (5) are described in detail below:
[0117] The steps of the step (1) are as follows:
[0118] Key generation stage. Using the same 288-bit binary stream key key as the encryption stage, the parameters of the 3D chaotic mapping and the rule number of the 2D second-order cellular automata are generated in the same way as the encryption stage.
[0119] The steps of the step (2) are as follows:
[0120] Image preprocessing stage. Use formula (1) to preprocess the image in the same way as the encryption stage, and...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap