Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Method of Image Encryption Based on Clustering and Chaos

An encryption method and technology of clustering algorithm, applied in the field of image encryption based on clustering and chaos, can solve the problems of insufficient anti-attack ability and low sensitivity, and achieve enhanced key sensitivity, enhanced chaos degree, and enhanced plaintext sensitivity. sexual effect

Inactive Publication Date: 2019-09-27
DALIAN UNIV OF TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to get rid of those rigid rules and solve the problems of low sensitivity and insufficient anti-attack ability. The present invention uses a typical k-means clustering algorithm to assist in the design of an image encryption algorithm, and proposes an image encryption algorithm based on clustering and chaos. encryption method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Method of Image Encryption Based on Clustering and Chaos
  • A Method of Image Encryption Based on Clustering and Chaos
  • A Method of Image Encryption Based on Clustering and Chaos

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] 1. The following combination figure 1 The encryption of the present invention is described in more detail

[0036] The flow of the encryption algorithm is as follows:

[0037] 1) First calculate the sum of all pixel values ​​​​of the image P, and use formula (2) and formula (3) to generate the initial value x of the chaotic system 0 ,y 0 , xx 0 and yy 0 ;

[0038] 2) Use the initial value x 0 ,y 0 and formula (1) to generate the chaotic sequence (u i ,v i ), with xx 0 ,yy 0 and formula (2) to generate the cluster center sequence for k-means clustering operation.

[0039] 3) For any point l i =(ui ,v i ), use the k-means algorithm to cluster the chaotic sequence, and divide these points into k classes, which are cl 1 ,cl 2 ,Λ,cl k , and record the classification result l of each point i ∈cl j ,i∈[1,MN],j∈[1,k];

[0040] 4) Convert P to a one-dimensional sequence p 1 p 2Λ p MN , traverse the classification result k, and then start from the first pixe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of image processing, is specifically applied in the process of image encryption, and relates to an image encryption method based on clustering and chaos. Firstly, the present invention regards each pixel of an image as a "point", uses a chaotic system or a nonlinear equation to generate the coordinates of each "point", and achieves the purpose of image confusion through the clustering results of the k-means clustering algorithm . The image is then diffused using the sequence of keys generated by the chaotic system. In order to enhance the key sensitivity and plaintext sensitivity, the secure hash algorithm is used as an auxiliary tool to generate the initial value of the chaotic map. The invention enhances the key sensitivity and plaintext sensitivity, the correlation between pixels is strongly eliminated, and the degree of chaos is enhanced. Experimental results show that the method can resist common attacks and has good security.

Description

technical field [0001] The invention relates to the field of image processing, is specifically applied in the process of image encryption, and relates to an image encryption method based on clustering and chaos. Background technique [0002] The research of cloud computing and big data is in full swing, and the mobile Internet is developing deeply. More and more people use pictures to record the details of life and work, so it is more important to ensure its security. However, due to the large amount of information, high redundancy, and strong correlation between adjacent pixels in images, traditional encryption algorithms such as DES, AES, and RSA cannot meet the encryption requirements of mathematical images. As an important branch of nonlinear science, chaos has its own unique characteristics: sensitivity to initial conditions, pseudo-randomness, etc., which make it widely studied, especially in image encryption. Today, many encryption algorithms are built by their autho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06T9/00G06K9/62
CPCG06T9/00G06F18/23213
Inventor 卢志茂刘清文范冬梅
Owner DALIAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products