Chaotic image encryption method with plaintext-related key flow generation mechanism
A technology of encryption method and generation mechanism, which can be applied in image data processing, image data processing, computer security devices, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0067] The present invention will be further described in detail below in conjunction with the accompanying drawings of the specification.
[0068] Encrypt common images in an international standard test image library (such as figure 2 Shown). The image is a 24-bit color image with a width W=512 and a height H=512.
[0069] The specific encryption algorithm is as follows:
[0070] Step 1: Expand the image pixels to be encrypted into a one-dimensional array from left to right and top to bottom, denoted as imgData={p 0 ,p 1 ,...,P 3×H×W-1 }, where p 0 ,p 1 ,p 2 The pixel value of the three color components of red, green and blue representing the first point, p 3 ,p 4 ,p 5 The pixel values of the three color components of red, green, and blue representing the second point, and so on.
[0071] Here, the plaintext image array imgData={39,46,66,...}.
[0072] Step 2: Perform a scrambling operation on the plaintext image. The basic idea is: exchange each pixel in the plaintext image arra...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com