Image encryption method based on projection synchronization of hyperchaotic system

An encryption method and ultra-chaotic technology, applied in the field of information technology security, can solve problems such as inability to resist chosen plaintext attacks and known plaintext attacks, increasing communication expenses, and confusing operations of missing image pixel positions.

Active Publication Date: 2017-08-01
SHAANXI NORMAL UNIV
View PDF3 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the research on image encryption algorithm based on chaos synchronization has the following characteristics: (1) use the chaos synchronization sequence to simply change the image pixel value, but lack the confusion operation of the image pixel position, which will not be able to effectively guarantee the security; ( 2) In the diffusion stage, the chaotic synchronous sequence is used to replace the image pixel values, and in the image confusion stage, Cat mapping and standard mapping are introduced to scramble the image pixel positions. The introduction of these mappings in the confusion process makes the encryption method cumbersome and requires additional (3) In the scrambling-diffusion image encryption framework, the replacement of pixel values ​​and pixel position confusion in most encryption algorithms are linear operations in essence, and the key stream and scrambling transformation always remain the same. changes, which will not be able to resist attacks such as chosen plaintext attacks and known plaintext

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image encryption method based on projection synchronization of hyperchaotic system
  • Image encryption method based on projection synchronization of hyperchaotic system
  • Image encryption method based on projection synchronization of hyperchaotic system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0109] Experimental environment: The hardware testing platform of this experiment is: Inter(R) Core(TM) i7-4500U CPU, main frequency 1.8Ghz, memory 8.0GB; software platform is: Windows10 operating system and Matlab2012a. The simulation image adopts the Lena image whose gray scale is 256 and the size is 256×256.

[0110] Embodiments of the present invention will be further described below in conjunction with the accompanying drawings.

[0111] The image encryption method based on the hyperchaotic system projection synchronization of the present invention includes the process of encrypting and decrypting the original plaintext image.

[0112] The encryption process specifically includes the following steps:

[0113] 1), plaintext image quantization processing: for the original plaintext image whose pixels are m×n and the gray scale level is G, obtain its two-dimensional pixel value matrix A, and use the original plaintext image as the current image;

[0114] In this embodiment...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an image encryption method based on the projection synchronization of a hyperchaotic system. The method comprises the steps of plaintext image quantifying and ciphertext image quantifying. The first step comprises generating of a hyperchaotic sequence of a hyperchaotic driving system, image row scrambling, image column scrambling, image diffusing, circulation image row scrambling, image column scrambling, multiple rounds of image diffusing, and a ciphertext image is acquired. The second step comprises ciphertext image quantifying, generating of a hyperchaotic sequence of a hyperchaotic response system, time acquiring, column scrambling index and line scrambling index valuing, image inverse diffusing, image inverse column scrambling, image inverse row scrambling, circulation image inverse diffusing, image inverse column scrambling, multiple rounds of image inverse row scrambling, and a decrypted image is acquired. According to the invention, a feedback mechanism with the current image is introduced; the row (column) scrambling address code and the key matrix are dynamically changed in each round of encryption; experiments show that the method has the advantages of good encryption effect, high security and large key space, can resist selected plaintext attacks, known plaintext attacks and various statistical attacks.

Description

technical field [0001] The invention relates to the field of information technology security, in particular to an image encryption method based on hyperchaotic system projection synchronization. Background technique [0002] The rapid development of network communication technology, cloud computing and big data has continuously created new challenges to image encryption technology. The natural connection between the characteristics of cryptography and the characteristics of chaotic systems has made the research on image encryption based on chaotic systems attract great attention recently, which mainly includes image encryption systems using chaos theory and image encryption systems based on chaos synchronization. Compared with the image encryption technology based on chaos theory, the research on image encryption technology based on chaos synchronization is still very limited. At present, the research on image encryption algorithm based on chaos synchronization has the foll...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06T9/00H04L9/00
CPCG06T9/00H04L9/001
Inventor 杨晓丽
Owner SHAANXI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products