Quantum chaos-based parallel image encryption method

An encryption method and quantum technology, applied in image data processing, image data processing, instruments, etc., can solve problems such as insufficient correlation between plaintext and ciphertext, insufficient key space, uneven histogram, etc. attack, improve the encryption rate, resist the effect of differential attack

Inactive Publication Date: 2017-10-24
GUANGDONG UNIV OF TECH
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method can well solve the shortcomings of uneven histogram, insufficient correlation between plaintext and ciphertext, insufficient key space, and slow encryption speed, so as to achieve a good encryption effect.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum chaos-based parallel image encryption method
  • Quantum chaos-based parallel image encryption method
  • Quantum chaos-based parallel image encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The specific implementation steps are as figure 1 The encryption flow chart is shown as follows:

[0052] Use A to represent a grayscale image of size m×n, and perform the following parallel diffusion process:

[0053] Step 1: First enter the initial key x of the Lorenz chaotic map1 、x 2 、x 3 , substitute into formula (1) for 200 iterations

[0054] Generation, and then discard the results of the first 200 iterations, continue to iterate, and get a new chaotic sequence M=(x 1 , x 2 , x 3 ,...,x m ).

[0055]

[0056] where x 1 、x 2 、x 3 ----state variables; a, b, c ---- system parameters. When taking a=8 / 3, b=10, c=28, the system is in a chaotic state.

[0057] Step 2: Input Chen transformed initial key x 4 、x 5 、x 6 , substitute into formula (2) for 200 iterations, and then discard

[0058] The results of the first 200 iterations continue to iterate to obtain a new chaotic sequence N=(x 1 , x 2 , x 3 ,...,x % ).

[0059]

[0060] where x 4 、...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a quantum chaos-based parallel image encryption method. The invention aims to solve the defects of a current traditional serial chaotic encryption algorithm. According to the method of the invention, a sequence generated by hyperchaotic Lorenz mapping and Chen mapping is used as an input sequence for parallel encryption; a generated intermediate ciphertext is adopted as the input of quantum logistic mapping; three-dimensional Baker scrambling operation is performed; and therefore, plaintext information can be hidden. As indicated by experimental simulation, the encryption speed of the algorithm of the invention is higher than that of the traditional serial encryption algorithm, the algorithm of the invention can effectively resist statistical attacks and differential attacks to achieve a very good encryption effect.

Description

technical field [0001] The invention belongs to a grayscale image encryption method, more specifically, a novel super-chaotic image encryption method is designed. Background technique [0002] With the rapid development of Internet technology, the transmission of image information has become an indispensable link in people's lives. However, the security risks in the image transmission process using the Internet as a carrier have attracted more and more attention from scholars at home and abroad. Image information itself has strong correlation and redundancy, while traditional encryption methods, such as Data Encryption Standard (DES), Triple-Data Encryption Standard (3-DES), International Data Encryption Algorithm (IDEA), Improved Encryption Standard ( AES) and RSA (RivestShamir-Adleman), are designed for text information encryption, not suitable for image encryption. [0003] In recent years, experts have proposed many new image encryption technologies, such as hyperchaoti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00
CPCG06T1/0021
Inventor 谢国波姜先值
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products