Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Self-recovery image encryption and decryption method combining zero watermarks and block classification fusion

An encryption method and zero-watermark technology, applied in the field of self-recovery image encryption and decryption, can solve the problems of limited ability to resist attacks, limited attention to the ability of encrypted images to resist attacks, and lack of ability to repair after attacks.

Active Publication Date: 2017-05-31
SHAANXI NORMAL UNIV
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Although a large number of image encryption methods have been proposed, the existing image encryption methods usually focus on how to effectively and safely construct encryption strategies, while the attention to the anti-attack ability of encrypted images is relatively limited. Although some image encryption methods have certain anti-attack Ability, but the ability to resist attacks is very limited and the image encryption methods given above do not have the ability to repair after the attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Self-recovery image encryption and decryption method combining zero watermarks and block classification fusion
  • Self-recovery image encryption and decryption method combining zero watermarks and block classification fusion
  • Self-recovery image encryption and decryption method combining zero watermarks and block classification fusion

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0165] The experimental test environment is Windows 10 operating system, the CPU is Inter(R)Core(TM)i5-6600, the main frequency is 3.31GHz, the memory is 8.00GB, and the experimental coding language is Java jdk1.8.0_65. The embodiment of the invention is described in detail, but not limited to this implementation case, where figure 1 is the encryption flow chart, figure 2 is the recovery flow chart. The specific implementation steps of the embedding method are as follows:

[0166] Step 1: Note that the resolution is m×n original image A, and satisfy (m)mod4=0, (n)mod4=0, divide A into 4×4 non-overlapping small blocks A u,v , u=0,1,...,(m / 4)-1, v=0,1,...,(n / 4)-1, and the number of subdivided blocks is bm×bn, then bm=m / 4 ,bn=n / 4, input user given parameter x 0 ∈(0,1) and μ 0 ∈[3.57,4]; for example: take image 3 is the original image, the original image is an 8-bit grayscale image Lena with a resolution of 512×512, where m=512, n=512, bm=m / 4=128, bn=n / 4=128, input user gi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a self-recovery image encryption and decryption method combining zero watermarks and block classification fusion. During encryption, first, small blocks are divided into four types according to a frequency domain alternation coefficient of the small blocks in an image to be encrypted, and corresponding alternating current and direct current coefficients are reserved to serve as a restoration reference matrix; second, main information of the small blocks which are scrambled in position and auxiliary information of an original position reference matrix are fused, and authentication information of the fused small blocks is acquired according to an encoding matrix; third, direct current components and the block types of the scrambled small blocks before fusion and the authentication information of the fused small blocks are used as the zero watermarks stored in a third public trust party; and last, the image is reconstructed from the fused small blocks, and global position scrambling is performed to generate an encrypted image. During recovery, first, the fused small blocks are reconstructed, the main information and auxiliary information authentication relation and zero watermark recovery main information are utilized, and a decrypted image is reconstructed. Compared with existing methods, the method can be used for effectively encrypting the image and performing a certain recovery against a channel attack, thereby having higher application value.

Description

technical field [0001] The invention belongs to the cross field of image security and image signal processing, relates to an image encryption and decryption method, in particular to a self-restoring image encryption and decryption method combined with zero watermark and block classification fusion. Background technique [0002] For image encryption, several image encryption methods have been proposed: [0003] ① An image encryption method that confuses and encrypts images by changing pixel values, for example: Peng Zaiping, 2014 (Peng Zaiping, Wang Chunhua, Lin Yuan, etc. A new type of four-dimensional multi-wing hyperchaotic attractor and its application in image encryption Research in [J]. Acta Physica Sinica, 2014, 63(24): 240506-1–240506-10) and Zhu Congxu et al., 2012 (Zhu Congxu, Sun Kehui. Cryptanalysis and improvement of a class of hyperchaotic image encryption algorithms[J ]. Acta Physica Sinica, 2012, 61(12):12503-1-12503-12) XOR-encrypts image pixel values ​​by g...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00
CPCG06T1/0028G06T1/0042G06T2201/0052G06T2201/0061
Inventor 邵利平何思雨
Owner SHAANXI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products