Cellular automata and chaotic mapping-based digital image encryption method and decryption method thereof

A technology of chaotic mapping and encryption method, which is applied in image data processing, image data processing, instruments, etc., and can solve problems such as not satisfying real-time performance, potential safety hazards, and increasing time

Inactive Publication Date: 2017-02-01
SUN YAT SEN UNIV
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Digital image encryption is different from traditional data encryption. It mainly has the following characteristics: (1) Digital images represent information with their visual images, so they have a larger amount of information than text information. Therefore, it takes more time to encrypt it using classical encryption algorithms. For a long time, the encryption efficiency is not high
(2) Digital images are stored in the data format of a two-dimensional matrix. When encrypting them, most algorithms cannot use this feature for parallel processing, but need to perform preprocessing, rearrangement and other operations, which greatly increases the time. Reduced encryption efficiency
(3) Unlike text and other information, images allow a certain degree of distortion during encryption and decryption due to their visual characteristics
[0005] At present, traditional scrambling algorithms such

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cellular automata and chaotic mapping-based digital image encryption method and decryption method thereof
  • Cellular automata and chaotic mapping-based digital image encryption method and decryption method thereof
  • Cellular automata and chaotic mapping-based digital image encryption method and decryption method thereof

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0060] Example 1

[0061] Such as figure 1 , A digital image encryption method based on cellular automata and chaotic mapping, the basic process is:

[0062] (1) Key generation stage;

[0063] (2) Image preprocessing stage;

[0064] (3) Pixel position scrambling stage;

[0065] (4) Evolution stage of cellular automata;

[0066] (5) Determine the number of iteration conditions according to step (4), and output the result.

[0067] The steps (1) to (5) are described in detail below:

[0068] The steps of the step (1) are as follows:

[0069] Key generation stage. Choose a binary bit stream with a length of 288 bits as the key to generate the coefficients of the 3D chaotic mapping, the number of iterations, and the rule number of the cellular automata evolution rule. The key generation algorithm is: the first 7×32 bits, each 32 bits represents an integer, which is used as the six coefficients of the 3D chaotic mapping (a x a y a z b x b y b z ) And the number of iterations t, the last 64 bit...

Example Embodiment

[0109] Example 2

[0110] Such as Figure 4 , The basic process of a confidential method of digital image encryption method based on cellular automata and chaotic mapping is:

[0111] (1) Key generation stage;

[0112] (2) Image preprocessing stage;

[0113] (3) Pixel reverse iteration stage;

[0114] (4) Chaotic map inverse operation stage;

[0115] (5) Execute steps (3) and (4) cyclically, determine the number of iteration conditions, and output the result.

[0116] The steps (1) to (5) are described in detail below:

[0117] The steps of the step (1) are as follows:

[0118] Key generation stage. Using the same 288-bit binary stream key key as the encryption stage, the parameters of the 3D chaotic mapping and the rule number of the 2D second-order cellular automata are generated in the same way as the encryption stage.

[0119] The steps of the step (2) are as follows:

[0120] Image preprocessing stage. Use formula (1) to preprocess the image in the same way as the encryption stage, and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a cellular automata and chaotic mapping-based digital image encryption method and a decryption method thereof. The encryption method includes the following steps that: a 288-bit key is utilized to generate chaotic mapping parameters and cellular automaton evolution rules which are required by an encryption algorithm; pre-processing such as three-dimensional decomposition and blocking, is carried out on an original image; 3D chaotic mapping is adopted to scramble pixel positions; cross-exclusive-OR operation is performed on image blocks to be encrypted; and a 2D second-order cellular automata used for generating boundaries, which is provided by the present invention, is utilized to carry out iterative encryption on an unfolded plaintext, pixels are mixed, and iteration is repeated until an iteration requirement is satisfied; and reverse pre-processing is carried out, and blocked ciphertext images are combined into a ciphertext image.

Description

technical field [0001] The invention relates to the field of digital image processing, in particular to a digital image encryption and decryption method based on cellular automata and chaotic mapping. Background technique [0002] Digital images represent information with their visual effects, which have a large amount of data, high correlation between pixels, and high requirements for real-time encryption. Classical cryptography methods cannot meet this requirement well. Therefore, the technology for digital image encryption has attracted widespread attention of scholars, and has gradually become an important branch of cryptography. [0003] Digital image encryption is different from traditional data encryption. It mainly has the following characteristics: (1) Digital images represent information with their visual images, so they have a larger amount of information than text information. Therefore, it takes more time to encrypt it using classical encryption algorithms. In ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06T1/00
CPCG06T1/0021
Inventor 单汇丰陈炬桦
Owner SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products