Unlock instant, AI-driven research and patent intelligence for your innovation.

A Color Image Encryption Method Based on Jigsaw Strategy and Chaotic System

A chaotic system and color image technology, applied in the field of image processing, can solve the problem of insufficient image anti-attack ability

Inactive Publication Date: 2019-12-17
DALIAN UNIV OF TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The purpose of the present invention is to solve the problem of insufficient anti-attack ability of the image encrypted by the algorithm in the prior art, and propose a color image encryption method based on puzzle strategy and chaotic system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Color Image Encryption Method Based on Jigsaw Strategy and Chaotic System
  • A Color Image Encryption Method Based on Jigsaw Strategy and Chaotic System
  • A Color Image Encryption Method Based on Jigsaw Strategy and Chaotic System

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] The flow of the encryption algorithm is as follows:

[0048] 1) Convert the color image to its R, G, B component matrix, the length is M*N and the value range is (0, 255).

[0049]2) The three component matrices are formed into a two-dimensional matrix rgb with 3 rows of M*N columns as shown in Table 2. The first row of the matrix rgb is composed of pixels of R; the second row is composed of pixels of G; The three rows are made up of B's ​​pixels.

[0050] Table 2 Pixel component distribution of two-dimensional array rgb

[0051]

[0052] 3) Calculate the image pixel sum according to formula (6), and also calculate the sum rsum, gsum, and bsum of the pixel values ​​of the three component matrices respectively.

[0053]

[0054] 4) Iterative formula (1) obtains all the parameters required by the algorithm, and its initial value is generated by formula (4), but the hash value should be obtained by using the sum of pixel values ​​and formula (3) in advance, borrowi...

Embodiment 2

[0083] combined with Figure 5 The decryption of the present invention is explained as follows:

[0084] The encryption algorithm of the present invention is inverse, that is, image decryption is the inverse process of image encryption.

[0085] 1) The user gets the key, and uses the formula (1)-(5) described above to generate all the key sequences x i (j), i ∈ [1, MN], j ∈ [1, 12].

[0086] 2) Convert the ciphertext image into a two-dimensional integer array, and each row is its R, G, and B component matrix called Re, Ge, Be.

[0087] 3) according to d i The three components of the ciphertext image can be decoded and a scrambled image can be obtained. The Re, Ge, Be components can be converted to Rc, Gc and Bc components using the following formulas.

[0088]

[0089]

[0090]

[0091] Among them, the value of i is reduced from MN to 1. At the end of the above operation, we must obtain the correct key value according to the following formula.

[0092] Re 0 =Rc...

Embodiment 3

[0102] combine Image 6 And list data to analyze the algorithm as follows:

[0103] exist Image 6 Among them, (a) represents the original color image, (b) represents the scrambled color image, (c) represents the encrypted color image, (d) represents the R component of the encrypted color image, and (e) represents the encrypted The G component of the color image, (f) represents the B component of the encrypted color image.

[0104] Table 3 information entropy

[0105]

[0106] Table 4 Correlation of adjacent pixels

[0107]

[0108] Table 5 NPCR and UACI values ​​and comparison of ciphertext image when the plaintext image changes one bit

[0109]

[0110]

[0111] Table 6 Comparison with recent encryption algorithms

[0112]

[0113]The more regular a system is, the smaller its information entropy is, and vice versa, the more chaotic it is, the greater it will be. The information entropy in Table 3 is all close to 8 to illustrate that the image after encry...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of image processing, relates to a color image encryption algorithm based on a jigsaw strategy and a chaotic system and aims to to solve the problem that in the prior art, an image encrypted through an algorithm has insufficient anti-attack ability. First, the chaotic system or a nonlinear equation is used for generating a key sequence to be used in the algorithm, and an initial value of the algorithm is acquired according to a hash algorithm; second, the key sequence is used for scrambling positions of image pixels according to a set jigsaw mode to obtain a scrambled image; last, the scrambled image is dispersed, and finally a ciphertext image is obtained. According to the algorithm, all parameters are generated through coupled map lattices, the initial value part of the algorithm is provided according to the version 5 of the message digest algorithm, the sum of pixel values of an original image is used in the algorithm in order to achieve higher security and complexity, and an experiment result shows that the algorithm can resist common attacks and has good security.

Description

technical field [0001] The invention belongs to the field of image processing, and relates to a color image encryption method based on a mosaic strategy and a chaotic system. Background technique [0002] With the advent of the era of big data and the convenience of information communication, people pay more and more attention to its privacy protection, so data encryption has become particularly important, and because images can carry a lot of information and can express people's wishes more vividly, so the The protection of image data is more concerned in many applications. [0003] Due to some innate characteristics of images, high correlation between pixels, a large amount of data redundancy and special coding, the encryption of images is different from traditional data encryption. Classical methods such as AES and 3DES can no longer meet the needs of image encryption. , which is why it was replaced with a more encrypted mode. Researchers explore and use emerging and mo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06T1/00
CPCG06T1/0021
Inventor 卢志茂刘清文范冬梅
Owner DALIAN UNIV OF TECH