Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption method for multiple color images based on complete ternary tree structure

A color image and encryption method technology, applied in the fields of information security and optical information processing, can solve the problems of large space, degraded image quality of decryption, limited encryption capacity of encryption system, etc.

Inactive Publication Date: 2017-06-13
TIANJIN UNIV
View PDF8 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When the color picture encrypted by this method is transmitted in the Internet channel, it occupies a large space, which reduces the transmission efficiency
Finally, in some existing double (color) image or multiple (color) image encryption methods, the encryption and decryption processes for different images are usually the same, and the keys corresponding to different images are usually the same; this makes these encryption methods vulnerable to some Special Attacks Against Keys
In addition, there is crosstalk noise in some existing multi-(color) image encryption methods, which leads to a serious decline in the quality of the decrypted image, making the encryption capacity of the encryption system very limited

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method for multiple color images based on complete ternary tree structure
  • Encryption method for multiple color images based on complete ternary tree structure
  • Encryption method for multiple color images based on complete ternary tree structure

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0096] A multi-color image encryption method based on a complete ternary tree structure, the schematic diagram of the encryption system is as follows figure 1 and figure 2 shown. The encryption module is used as the branch node and the root node of the complete ternary tree, and the three color channels of the color image are used as the leaf nodes connecting the branch nodes. Different color images correspond to different encryption modules and have different encryption and decryption processes.

[0097] (1) The encryption and decryption process in the encryption module (such as figure 1 shown) as follows:

[0098] 1) Encryption process:

[0099] The first step is to decompose the color image f to be encrypted into three color channels f of R, G, and B r , f g and f b ; then, put f r and f b synthesized into a complex image, namely

[0100] f rb =f r +j·f b , (1)

[0101] Among them, j represents the imaginary number operator, · represents the number multiplicat...

Embodiment 2

[0143] The scheme in embodiment 1 is verified for feasibility below in conjunction with specific accompanying drawings, see the following description for details:

[0144] Adopt the encryption method provided by the implementation of the present invention to 3 color images (such as image 3 Shown) After encryption, the obtained encrypted image is as follows Figure 4 shown.

[0145] Depend on Figure 4 It can be seen that any information of the original image is hidden. When all the keys are correct, the decrypted image is as follows Figure 5 shown. Depend on Figure 5 It can be seen that the original image can be completely restored. It shows that the encryption and decryption of grayscale images using this system is successful.

[0146] In addition, when one key is wrong and other keys are correct, the decryption result is as follows: Figure 6 (a)-6(f). It can be seen that the security of the system can be guaranteed.

[0147] Figure 7 are three decrypted image...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical fields of information security and optical information processing and provides a new image encryption method. Through the method, multiple password attacks such as known-plaintext attacks and chosen-plaintext attacks can be effectively resisted. Besides, the method has strong abilities in resisting violent attacks, statistical attacks, noise attacks, shear attacks, etc. The adopted technical scheme is an encryption method for multiple color images based on a complete ternary tree structure. According to the method, in an encryption system based on the complete ternary tree structure, encryption modules serve as branch nodes and root nodes of a complete ternary tree, three color channels of the color images serve as leaf nodes connected with the branch nodes, different color images correspond to different encryption paths and master keys, and therefore different decryption paths are available. The method is mainly applied to information security and optical information processing.

Description

technical field [0001] The invention relates to the technical fields of information security and optical information processing, in particular to a multi-color image encryption method based on a complete ternary tree structure. Background technique [0002] As one of the most popular multimedia forms at present, digital images are widely used in the fields of politics, economy, military affairs, education and so on. In today's highly developed Internet technology, how to protect digital images from tampering, illegal copying and dissemination has important practical significance. The research on image encryption technology has become one of the hotspots in the field of information security. [0003] Because optical information processing technology has the advantages of high processing speed, high parallelism, and fast realization of convolution and correlation operations, etc., the use of optical methods for digital image encryption has aroused great interest in recent yea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06T1/00
CPCG06T1/0021
Inventor 唐晨苏永钢
Owner TIANJIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products