Quantum chaos-based parallel image encryption method
An encryption method and quantum technology, applied in image data processing, image data processing, instruments, etc., can solve problems such as insufficient correlation between plaintext and ciphertext, insufficient key space, uneven histogram, etc. attack, improve the encryption rate, resist the effect of differential attack
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0051] The specific implementation steps are as figure 1 The encryption flow chart is shown as follows:
[0052] Use A to represent a grayscale image of size m×n, and perform the following parallel diffusion process:
[0053] Step 1: First enter the initial key x of the Lorenz chaotic map1 、x 2 、x 3 , substitute into formula (1) for 200 iterations
[0054] Generation, and then discard the results of the first 200 iterations, continue to iterate, and get a new chaotic sequence M=(x 1 , x 2 , x 3 ,...,x m ).
[0055]
[0056] where x 1 、x 2 、x 3 ----state variables; a, b, c ---- system parameters. When taking a=8 / 3, b=10, c=28, the system is in a chaotic state.
[0057] Step 2: Input Chen transformed initial key x 4 、x 5 、x 6 , substitute into formula (2) for 200 iterations, and then discard
[0058] The results of the first 200 iterations continue to iterate to obtain a new chaotic sequence N=(x 1 , x 2 , x 3 ,...,x % ).
[0059]
[0060] where x 4 、...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com