Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Chaotic image encryption method with plaintext-related key flow generation mechanism

A technology of encryption method and generation mechanism, which can be applied in image data processing, image data processing, computer security devices, etc.

Inactive Publication Date: 2017-06-30
NORTHEASTERN UNIV
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This is because for the second round of encryption, the intermediate ciphertext generated by the first round of encryption is equivalent to the plaintext operated by the second round of encryption, so each round of encryption needs to re-iterate the chaotic system to generate an independent key stream. Otherwise, the decryption operation cannot be completed
This reduces the operating efficiency of the system to a certain extent

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Chaotic image encryption method with plaintext-related key flow generation mechanism
  • Chaotic image encryption method with plaintext-related key flow generation mechanism
  • Chaotic image encryption method with plaintext-related key flow generation mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] The present invention will be further described in detail below in conjunction with the accompanying drawings of the specification.

[0068] Encrypt common images in an international standard test image library (such as figure 2 Shown). The image is a 24-bit color image with a width W=512 and a height H=512.

[0069] The specific encryption algorithm is as follows:

[0070] Step 1: Expand the image pixels to be encrypted into a one-dimensional array from left to right and top to bottom, denoted as imgData={p 0 ,p 1 ,...,P 3×H×W-1 }, where p 0 ,p 1 ,p 2 The pixel value of the three color components of red, green and blue representing the first point, p 3 ,p 4 ,p 5 The pixel values ​​of the three color components of red, green, and blue representing the second point, and so on.

[0071] Here, the plaintext image array imgData={39,46,66,...}.

[0072] Step 2: Perform a scrambling operation on the plaintext image. The basic idea is: exchange each pixel in the plaintext image arra...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a chaotic image encryption method with a plaintext-related key flow generation mechanism. The method is implemented based on a 'confusion-diffusion' architecture. A confusion algorithm is based on a pixel point exchange mechanism, and the location of an exchange target is generated by logistic chaotic mapping. A diffusion key flow is generated based on a generalized Lorenz-Like system, and a plaintext-related key flow element quantization mechanism is introduced. The mechanism enhances the ability of an encryption system to resist known plaintext and chosen plaintext attacks, speeds up the diffusion process, and can reduce the number of rounds of diffusion needed to achieve the desired diffusion performance. Compared with the existing key flow and plaintext related technologies, the problem that a chaotic sequence cannot be reused in multiple rounds of encryption is solved, and the computational load is lower. The results of cryptographic analysis show that the encryption method presented by the invention is of high security.

Description

Technical field [0001] The invention relates to the technical field of chaotic image encryption, in particular to a chaotic image encryption method with a key stream generation mechanism related to plain text. Background technique [0002] In recent years, with the rapid development of multimedia and computer network technology, digital images as the most intuitive information carrier have become an important means for people to communicate information. More and more digital images are spread in open networks represented by the Internet and wireless networks, which greatly facilitates the access and sharing of information. At the same time, the transmission of image information in many sensitive fields such as commerce, finance, medical care, scientific research, military, and politics in an open network environment has huge security risks. It often encounters various potential human attacks, including information Illegal acquisition, tampering and publishing, etc. cause huge lo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00G06F21/60
CPCG06F21/602G06T1/00
Inventor 付冲郑宇何兴文
Owner NORTHEASTERN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products