Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Image encryption method and image decryption method with visual security and data security based on compressed sensing

A technology of compressed sensing and data security, which is applied in the field of decryption and image addition, can solve the problems of anti-chosen plaintext attack and poor known plaintext attack, improve the secret key space, enhance the ability to resist violent attacks, and improve the ability to attack Effect

Active Publication Date: 2017-04-26
HENAN UNIVERSITY
View PDF3 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the encryption algorithm, the scrambling process has nothing to do with the plaintext, which means that the same scrambling vector is used for different plaintext image encryption, and the algorithm has poor resistance to chosen plaintext attacks and known plaintext attacks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image encryption method and image decryption method with visual security and data security based on compressed sensing
  • Image encryption method and image decryption method with visual security and data security based on compressed sensing
  • Image encryption method and image decryption method with visual security and data security based on compressed sensing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0078] Example 1, see figure 1 As shown, an image encryption method based on compressed sensing for visual security and data security includes the following steps:

[0079] Step 1. Use the SHA 256 hash function to calculate the plaintext image P of size m×n to obtain the image secret key, and calculate the initial value of the one-dimensional skew tent chaotic map and zigzag scrambling;

[0080] Step 2. Use discrete wavelet transform to sparse the plaintext image P to obtain the coefficient matrix P1; scramble the coefficient matrix P1 according to the zigzag path to obtain the scrambled matrix P2; modify the matrix P2 by preset threshold TS , Get the corrected matrix P3;

[0081] Step 3. Use one-dimensional skew tent chaotic mapping to generate a measurement matrix Φ for compressed sensing, and measure matrix P3 to obtain a measurement value matrix P4, where the compression rate of the plaintext image P is expressed as CR, and the size of the measurement matrix Φ Is M×N, then M=CR×...

Embodiment 2

[0085] Example two, see figure 2 As shown, an image encryption method based on compressed sensing for visual security and data security includes the following contents:

[0086] 1. Use the SHA 256 hash function to calculate the plaintext image P of size m×n to obtain the image secret key, and calculate the initial value of the one-dimensional skew tent chaotic map and zigzag scrambling; calculate the one-dimensional skew tent chaotic map And the initial value of zigzag scrambling, including: converting the image secret key key to 32 decimal numbers k 1 , K 2 ,..., k 32 , And calculate the parameters and initial values ​​of the one-dimensional skew tent chaotic map, and the initial position coordinates of the zigzag scrambling.

[0087] Preferably, the one-dimensional skew tent chaotic map is expressed as:

[0088]

[0089] Among them, r∈(0,1) is the system parameter, z∈(0,1) is the state variable of the chaotic system; and according to the formula:

[0090]

[0091] To calculate the ...

example 1

[0135] Example 1, see Figure 4~7 As shown, in this embodiment, the programming software used is Matlab R2014a, and a Lena gray image with a size of 512×512 is selected as the experimental object. The specific encryption process is as follows: Step 1: Input the Lena gray with the original size of 512×512 Use P=imread('Lena.bmp') to read the image information, and use the SHA 256 hash function to calculate the plaintext image P to obtain a set of 256-bit hash values ​​and use it as the image secret key. Then convert the 256-bit key into 32 decimal numbers k 1 , K 2 ,..., k 32 , And then calculate the parameters and initial values ​​of the one-dimensional skew tent chaotic map, and the specific steps of the initial position coordinates required for zigzag scrambling are as follows:

[0136] 1.1) The expression of the one-dimensional skew tent chaotic map used in the present invention is:

[0137]

[0138] Among them, r∈(0,1) is the system parameter, z∈(0,1) is the state variable of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an image encryption method and an image decryption method with visual security and data security based on compressed sensing. The image encryption method comprises the steps of: firstly, utilizing an SHA 256 hash function to obtain a 256-bit hash value of a plaintext image as an image secret key, and calculating initial numerical values of one-dimensional skew tent chaotic mapping and zigzag scrambling; carrying out sparse processing on the plaintext image, and carrying out zigzag scrambling on a coefficient matrix; and then utilizing the one-dimensional skew tent chaotic mapping to generate a measurement matrix, measuring and quantifying a scrambling matrix to obtain a compressed and encrypted image, and embedding the image into a carrier image with visual significance to obtain a final ciphertext image with visual significance. The image encryption method realizes the visual security and data security of the plaintext image, has large secret key space, is highly sensitive to plaintext, has higher capacity of resisting brute-force attack, chosen-plaintext attack and known-plaintext attack, does not need an additional storage space, and can transmit and store the ciphertext image quickly and effectively.

Description

Technical field [0001] The present invention relates to the technical field of image encryption and decryption, in particular to an image encryption and decryption method based on compressed sensing based on visual security and data security. Background technique [0002] With the rapid development of digital technology and network technology, more and more multimedia data is generated, transmitted through the network and stored on platforms such as cloud servers. Digital data contains a lot of information. For example, a picture of a military oil depot can not only tell us its size and quantity, but also its approximate location; a face photo can not only reveal his or her appearance, but also Approximate age and physical condition. Therefore, in medical imaging systems, military imaging systems, and video conferences, protecting the security of image data has attracted widespread attention. Image encryption is a method that can effectively protect data security. [0003] At pre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06T1/00
CPCG06T1/0021
Inventor 甘志华韩道军朱长江柴秀丽路杨符翔龙郑晓宇
Owner HENAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products