Digital image feedback encryption method based on image network

An encryption method and digital image technology, which is applied in the field of information technology security, can solve the problems of encryption algorithms that are difficult to know plaintext attacks and chosen plaintext attacks, and the statistical characteristics of plaintext and ciphertext are not complicated enough.

Active Publication Date: 2017-09-29
SHAANXI NORMAL UNIV
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the existing CML-based encryption technology, it has the following characteristics: 1) The CML model is formed by a one-dimensional Logistic map on the grid point and is formed by nearest neighbor coupling, which makes the correlation of the chaotic sequence on adjacent grid points stronger; 2) The key stream is constructed based on the chaotic sequence generated by CML, and the key stream is used to directly diffuse the image to form a ciphertext image. This lack of obfuscation process for the pixel position of the plaintext image makes the statistical characteristics between the plaintext and the ciphertext It is not complicated enough; 3) In the multi-round diffusion operation, the static encryption algorithm is adopted, and the key stream remains unchanged only depending on a chaotic sequence, which makes the encryption algorithm difficult to resist known plaintext attacks and chosen plaintext attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital image feedback encryption method based on image network
  • Digital image feedback encryption method based on image network
  • Digital image feedback encryption method based on image network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0101] Experimental environment: The hardware testing platform of this experiment is: Inter(R) Core(TM) i7-4500U CPU, main frequency 1.8Ghz, memory 8.0GB; software platform is: Windows10 operating system and Matlab2012a. The simulation image uses a Lena image with a gray level of 256 and a size of 256×256.

[0102] Embodiments of the present invention will be further described below in conjunction with the accompanying drawings.

[0103] The digital image feedback encryption method based on the image network that the present embodiment provides includes figure 1 The encryption process shown and figure 2 The decryption process shown includes the following steps:

[0104] 1) For a digital plaintext image with pixels h×w and gray level G, obtain its two-dimensional pixel value matrix PI_1, and convert the two-dimensional pixel value matrix PI_1 into a three-dimensional pixel value matrix PI_2, whose size is t×t×t, when When it is an integer, otherwise fix(·) represents ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a digital image feedback encryption method based on an image network. The method comprises the following steps of processing a digital plaintext image; constructing the image network in which a node is a super-chaotic system and a non-neighbor connection mode is possessed; through three-dimensional Arnold, converting a scrambling image, wherein a scrambling matrix is driven by image-network space-time chaotic display and a current plaintext image; combining feedback information of the current plaintext image and a cryptograph image and carrying out image diffusion processing; alternatively operating scrambling and diffusion multiple times and acquiring the cryptograph image. In an encryption system, a scrambling-diffusion alternative-operated loop iteration structure is designed; during an encryption process, plaintext and cryptograph feedback mechanisms are introduced; and during each encryption, the used scrambling matrix and a secret key flow are dynamically changed and are different. An experiment result shows that the encryption method possesses high safety and high efficiency; and a capability of resisting various plaintext attacks, statistics attacks, violence attacks and difference attacks is high.

Description

technical field [0001] The invention relates to the field of information technology security, in particular to a digital image feedback encryption method based on an image network. Background technique [0002] Today is an information age. Relevant scientific research and statistics show that about 75% of the information that humans obtain from the outside world comes from images. Images transmitted in a network environment are vulnerable to third-party theft, tampering, illegal copying and dissemination. Therefore, the secure transmission and encryption of images has always been concerned by people. [0003] Scrambling and diffusion are the basic principles to realize the security of image encryption algorithm. According to the encryption method, the encryption method can be roughly divided into: the encryption method based on the traditional cryptosystem, the encryption method based on the scrambling transformation, the encryption method based on the chaos theory, etc. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00
CPCG06T1/0021
Inventor 杨晓丽孙中奎
Owner SHAANXI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products