Color image encryption and decryption method and system based on double-chaos cross diffusion

A color image, cross-diffusion technology, applied in image data processing, image data processing, instruments, etc., can solve problems such as large amount of information, high redundancy, and poor security.

Pending Publication Date: 2017-11-07
HENGYANG NORMAL UNIV
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When traditional encryption algorithms encrypt images, they first need to convert the image data into one-dimensional data, and then convert it into two-dimensional or three-dimensional data when decrypting. At the same time,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Color image encryption and decryption method and system based on double-chaos cross diffusion
  • Color image encryption and decryption method and system based on double-chaos cross diffusion
  • Color image encryption and decryption method and system based on double-chaos cross diffusion

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0060] The present invention will be further described below in conjunction with the drawings and embodiments.

[0061] The following explains from the theoretical basis:

[0062] The general definition of Logistic chaotic mapping is shown in formula (1):

[0063] x n+1 =μx n (1-x n ), x n ∈(0,1) (1)

[0064] Where x n It is the nth iteration of Logistic chaotic mapping. When the system parameter μ∈(3.5699456,4], the input and output of Logistic mapping are all distributed on (0,1), and Logistic mapping is in a chaotic state.

[0065] The general definition of ChebyShev chaotic map is shown in formula (2):

[0066] x n+1 =cos(karccos(x n )), x n ∈[-1,1] (2)

[0067] Where k≥2, the initial value of the system iteration is determined by the key entered by the user.

[0068] The specific implementation steps are as figure 1 The color image encryption method is shown in the flowchart, including key initialization, image encryption and pixel diffusion.

[0069] Input color image I, the image siz...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a color image encryption and decryption method and system based on double chaotic cross-diffusion. First, the parameters of Logistic and ChebyShev iterations are randomly generated, and then the initial key required for Logistic and ChebyShev iterations is input, and the transient state is eliminated by multiple iterations. Afterwards, Logistic and ChebyShev are used to iterate three times, and the results of the iterations are used as the initial keys for encryption, thereby actually increasing the key space. Then take the pixel in the picture, if the value corresponding to the pixel position is an odd number, use ChebyShev iteration to get the encryption key, otherwise use Logistic iteration to get the encryption key, so as to reduce the correlation between adjacent pixels. Then use the three channels of R, G, and B of this pixel to perform XOR operation with the R', G', and B' of the previous encrypted pixel to diffuse. The present invention reduces the number of iterations on the premise of ensuring safety, can reduce encryption time, and improves efficiency, and is especially suitable for image encryption of mobile devices such as mobile phones and tablet computers that require high real-time performance.

Description

technical field [0001] The invention relates to the field of image encryption, in particular to a color image encryption and decryption method and system based on double chaotic cross-diffusion. Background technique [0002] With the rapid development of information technology, more and more image data are transmitted on the network, and the privacy, security and reliability of image information have been paid more and more attention by people. For this reason, encrypted transmission is required. When traditional encryption algorithms encrypt images, they first need to convert the image data into one-dimensional data, and then convert it into two-dimensional or three-dimensional data when decrypting. At the same time, because image data also has the characteristics of large amount of information and high redundancy, Therefore, the traditional encryption algorithm encrypts and decrypts the image, which has low efficiency and poor security. [0003] Image encryption based on...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06T1/00
CPCG06F21/602G06T1/0021Y02D30/50
Inventor 焦铬段凯文戴志伟
Owner HENGYANG NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products