A Hyperchaotic Image Encryption Method

An encryption method and hyper-chaotic technology, applied in image data processing, image data processing, instruments, etc., can solve the problems of time-consuming, low encryption efficiency, transmission and distribution difficulties, etc., achieve wide application prospects, resist classic attacks, improve Effects of bad traits

Active Publication Date: 2020-09-29
GUANGDONG UNIV OF TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] For example, there are great difficulties in transmitting and distributing the one-time pad key; the bit encryption method needs to convert all pixel values ​​into binary for image encryption, so the encryption efficiency is relatively low and time-consuming; the mathematical model encryption method requires Compared with the factors considered, it is not conducive to the realization of the encryption algorithm; and the pixel correlation coefficient in the DNA sequence encryption method is relatively high, and it is easy to be decrypted by an attacker

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Hyperchaotic Image Encryption Method
  • A Hyperchaotic Image Encryption Method
  • A Hyperchaotic Image Encryption Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The specific implementation steps are as figure 1 The encryption flow chart is shown.

[0045] The present invention will realize image encryption, first will realize the initialization process of key, as figure 2 shown.

[0046] The encryption key K is mainly composed of a 400-bit binary auxiliary key K 1 , enter key X 0 , Y 0 It consists of three parts.

[0047] Step 1: First, the length of 400-bit binary auxiliary key K 1 Divide into ten binary units with a length of 40 bits, K 10 , K 11 ,...,K 19 .

[0048] Step 2: Enter key X 0 , Y 0 As the initial key of Hyperhenon mapping, as shown in formula (1), where c=1.76, d=0.1, and X 0 , Y 0 Take a value between (0,1) to generate a set of hyperchaotic sequences for diffusion operations.

[0049]

[0050] k=0, 1, 2, ... (1)

[0051] in completion figure 2 After the key initialization process, proceed to figure 1 During the image encryption process, an intermediate bit ciphertext matrix is ​​also genera...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention puts forward a novel hyper-chaotic image encryption method which is mainly used in the field of gray image encryption. The algorithm mainly comprises the following steps: first, a plain image of which the size is N*M is segmented into M column vector groups, the pixels in the obtained vector groups are converted into bits to get 8*M vector groups, and scrambling operation is carried out; then, the obtained scrambled pixel values are re-mapped to an interval [0, 255] to get an intermediate cipher text; and finally, diffusion operation is carried out on a chaotic sequence generated by a Hyperhenon chaotic system and the intermediate cipher text to get a final cipher text. Experimental simulation shows that the algorithm not only can improve the disadvantages of a low-dimensional chaotic system and resist statistical characteristic attack and differential attack, but also can effectively resist four classic attacks, well hide plaintext information and achieve a good encryption effect.

Description

technical field [0001] The invention belongs to a grayscale image encryption method, in particular to a hyperchaotic image encryption method. Background technique [0002] With the rapid development of computer networks, more and more pictures are transmitted in the network, which has aroused people's attention to the problem of safe transmission of pictures. Nowadays, scholars at home and abroad pay great attention to how to encrypt pictures during image transmission. [0003] Due to the strong correlation of pixels of the image itself, high redundancy and large data volume, it is difficult to apply the traditional text encryption method to image encryption. In recent years, experts have pointed out that chaotic systems have the characteristics of high sensitivity to initial conditions, positive Lyapunov exponent, fractal and fractal dimensions, etc., which can be applied to image encryption, and some chaotic image encryption methods have gradually been proposed: such as on...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06T1/00
CPCG06T1/0021
Inventor 谢国波姜先值王朝阳
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products