Image Encryption Method Based on Lorenz System Optimal Sequence and K-L Transformation

A technology of K-L transformation and encryption method, which is applied in the field of image encryption based on the optimal sequence of the Lorenz system and K-L transformation, can solve the problems of image encryption speed defects, etc., and achieve the effects of avoiding insufficient security, improving security, and good algorithm speed

Inactive Publication Date: 2021-02-05
李望舒
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The image replacement algorithm is not as fast as the image scrambling operation in terms of speed, especially when the image replacement method adopts the block encryption method, there are obvious defects in the image encryption speed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image Encryption Method Based on Lorenz System Optimal Sequence and K-L Transformation
  • Image Encryption Method Based on Lorenz System Optimal Sequence and K-L Transformation
  • Image Encryption Method Based on Lorenz System Optimal Sequence and K-L Transformation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0059] An image encryption method based on Lorenz system optimal sequence and K-L transformation, the steps are as follows:

[0060] 1. The steps of the image encryption algorithm:

[0061] (1) Generation of the optimal sequence of the Lorenz system

[0062] The system model of the three-dimensional Lorenz chaotic system equation is a ternary first-order nonlinear differential equation, and its system equation is:

[0063]

[0064] where a, b, c are real parameters limited within a certain range of variation, and x, y, z are variables of the equation.

[0065] The Lorenz chaotic system is a continuous chaotic system, so if we want to use the Lorenz chaotic system to obtain the chaotic sequence used in the encrypted image, we must first discretize the chaotic system, considering the hardware implementation, the complexity of the algorithm, and the speed of operation And resource occupation and other factors, choose Euler's method (Euler) to discretize the Lorenz chaotic sy...

Embodiment 2

[0103] The process implemented in the hardware of Embodiment 1

[0104] (1) Establish a cross-compilation environment in the Linux system on the PC side. The process is to write and compile the application program on the PC side, also known as the host computer, and then cross-compile the executable program and transplant it. Go to the target machine, that is, the binary file that can run in the embedded development board, and burn the binary file into the embedded development board. Therefore, the establishment of a cross-compilation environment is the basis for implementing embedded programs. Its specific development model is as follows: figure 2 shown.

[0105] (2) Cut out the kernel and root file system in the Linux system, and transplant them to the embedded development board after cross-compilation to realize the most basic embedded development environment.

[0106] (3) Before realizing the image encryption of the embedded ARM platform, all programming should be impl...

Embodiment 3

[0116] Select a color image with a size of 256×256 and encrypt it. After encryption, use the same method to obtain the decryption result. The encryption and decryption results are as follows: Figure 5 Shown:

[0117] According to the encryption results, it can be seen intuitively that the encrypted image is unrecognizable from the original image, and the distribution is relatively uniform. The decrypted image is exactly the same as the original image. For the pixel correlation we want to improve, an intuitive data analysis and The analysis of the simulation image also analyzes the horizontal, vertical and diagonal components of the R, G, and B color components of the image respectively. The data analysis results are shown in the following table:

[0118] Table 1 Adjacent pixel correlation coefficient value

[0119]

[0120] According to the calculation result table, the encryption algorithm improved by K-L transformation has a great improvement in pixel correlation compar...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an image encryption method based on a Lorenz system optimal sequence and K-L transformation, and a Lorenz chaotic system is selected as a key generator. At the same time, the K-L transformation method is introduced, which effectively improves the performance of the encryption result in the adjacent pixel correlation test. At the same time, this method is relatively easy to implement in subsequent hardware implementations, and finally the Lorenz-based system proposed in this paper is obtained. The image encryption algorithm of optimal sequence and K-L transformation has achieved a good balance between algorithm security and algorithm speed. The encryption algorithm of the present invention is simple and easy to implement, solves the problem of slow image replacement algorithm speed, and at the same time avoids the problem of insufficient security of the image scrambling algorithm, and achieves a good balance between algorithm security and algorithm speed The balance of the image; the index of image pixel correlation is further improved, and the security of the finally obtained image encryption algorithm is further improved.

Description

technical field [0001] The invention relates to an image encryption method based on the optimal sequence of Lorenz system and K-L transformation. Background technique [0002] In modern technological life, the speed of network information dissemination is getting faster and faster. Digital images are widely used as information carriers to achieve information transmission due to their characteristics of easy copying and dissemination. However, the information carried in the process of transmitting images is limited Security is more worthy of attention, so the digital image encryption algorithm came into being. The significance of digital image encryption is to prevent information interceptors from identifying the information conveyed in the image. Through the digital image encryption algorithm, the digital image can be visually invisible. recognition effect. Although digital images are also a kind of information, they are different from data information. First, the amount of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06T1/00
CPCG06T1/0092
Inventor 丁群张琦冯凯黄欣
Owner 李望舒
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products