Lorenz system optimal sequence and K-L transform-based image encryption method

An encryption method and K-L transformation technology, applied in the field of image encryption based on the optimal sequence of the Lorenz system and K-L transformation, can solve the problems of image encryption speed defects, etc., to avoid insufficient security, improve security, and improve algorithm speed Effect

Inactive Publication Date: 2017-11-10
李望舒
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The image replacement algorithm is not as fast as the image scrambling operation in terms of speed, especially when the image replacement method adopts the block encryption method, there are obvious defects in the image encryption speed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Lorenz system optimal sequence and K-L transform-based image encryption method
  • Lorenz system optimal sequence and K-L transform-based image encryption method
  • Lorenz system optimal sequence and K-L transform-based image encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0059] An image encryption method based on Lorenz system optimal sequence and K-L transformation, the steps are as follows:

[0060] 1. The steps of the image encryption algorithm:

[0061] (1) Generation of the optimal sequence of the Lorenz system

[0062] The system model of the three-dimensional Lorenz chaotic system equation is a ternary first-order nonlinear differential equation, and its system equation is:

[0063]

[0064] where a, b, c are real parameters limited within a certain range of variation, and x, y, z are variables of the equation.

[0065] The Lorenz chaotic system is a continuous chaotic system, so if we want to use the Lorenz chaotic system to obtain the chaotic sequence used in the encrypted image, we must first discretize the chaotic system, considering the hardware implementation, the complexity of the algorithm, and the speed of operation And resource occupation and other factors, choose Euler's method (Euler) to discretize the Lorenz chaotic sy...

Embodiment 2

[0103] The process implemented in the hardware of Embodiment 1

[0104] (1) Establish a cross-compilation environment in the Linux system on the PC side. The process is to write and compile the application program on the PC side, also known as the host computer, and then cross-compile the executable program and transplant it. Go to the target machine, that is, the binary file that can run in the embedded development board, and burn the binary file into the embedded development board. Therefore, the establishment of a cross-compilation environment is the basis for implementing embedded programs. Its specific development model is as follows: figure 2 shown.

[0105] (2) Cut out the kernel and root file system in the Linux system, and transplant them to the embedded development board after cross-compilation to realize the most basic embedded development environment.

[0106] (3) Before realizing the image encryption of the embedded ARM platform, all programming should be impl...

Embodiment 3

[0116] Select a color image with a size of 256×256 and encrypt it. After encryption, use the same method to obtain the decryption result. The encryption and decryption results are as follows: Figure 5 Shown:

[0117] According to the encryption results, it can be seen intuitively that the encrypted image is unrecognizable from the original image, and the distribution is relatively uniform. The decrypted image is exactly the same as the original image. For the pixel correlation we want to improve, an intuitive data analysis and The analysis of the simulation image also analyzes the horizontal, vertical and diagonal components of the R, G, and B color components of the image respectively. The data analysis results are shown in the following table:

[0118] Table 1 Correlation coefficient values ​​of adjacent pixels

[0119]

[0120] According to the calculation result table, the encryption algorithm improved by K-L transformation has a great improvement in pixel correlation...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a Lorenz system optimal sequence and K-L transform-based image encryption method. A Lorenz chaotic system is selected as a key generator. Meanwhile, a K-L transform method is introduced, so that the performance of an encryption result in adjacent pixel correlation testing is effectively improved. The method is realized more easily in subsequent hardware implementation. Finally a Lorenz system optimal sequence and K-L transform-based image encryption algorithm proposed in the method is obtained. Very good balance is achieved between algorithm security and algorithm speed. The encryption algorithm is simple and easy to realize; the problem of relatively low speed of an image replacement algorithm is solved; the problem of low security of an image scrambling algorithm is avoided; the very good balance is achieved between the algorithm security and the algorithm speed; and image pixel correlation indexes are further improved, so that the finally obtained image encryption algorithm is further improved in security.

Description

technical field [0001] The invention relates to an image encryption method based on the optimal sequence of Lorenz system and K-L transformation. Background technique [0002] In modern technological life, the speed of network information dissemination is getting faster and faster. Digital images are widely used as information carriers to achieve information transmission due to their characteristics of easy copying and dissemination. However, the information carried in the process of transmitting images is limited Security is more worthy of attention, so the digital image encryption algorithm came into being. The significance of digital image encryption is to prevent information interceptors from identifying the information conveyed in the image. Through the digital image encryption algorithm, the digital image can be visually invisible. recognition effect. Although digital images are also a kind of information, they are different from data information. First, the amount of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00
CPCG06T1/0092
Inventor 丁群张琦冯凯黄欣
Owner 李望舒
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products