Unlock instant, AI-driven research and patent intelligence for your innovation.

Image Encryption Method Based on DNA Code and Chaos

An encryption method and DNA sequence technology, applied in the field of image encryption, can solve the problems of low encryption efficiency and weak security, and achieve the effect of good encryption effect, high security and protection.

Active Publication Date: 2021-06-25
CHINA UNIV OF MINING & TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Purpose of the present invention: Aiming at the problem of low encryption efficiency or weak security of most existing image encryption methods, an image encryption method based on DNA coding and chaos is proposed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image Encryption Method Based on DNA Code and Chaos
  • Image Encryption Method Based on DNA Code and Chaos
  • Image Encryption Method Based on DNA Code and Chaos

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] Embodiments of the present invention will be further described in detail below in conjunction with specific drawings and examples.

[0051] Figure 6 It is an encryption flowchart of an image encryption method based on DNA coding and chaos.

[0052] The programming software used is Matlab 7.0, select Figure 7 The gray image of Lenna with a size of 512×512 is shown as the experimental object. Using the image encryption method based on DNA coding and chaos, the specific process of encrypting interactive images is as follows.

[0053] 1. Using SHA-256, calculate the hash hash value K=ebaab36371358eb0208846d09 b5530ef7835b1af2129e55aa2fafcbcd9b93f0d (hexadecimal representation) of the interactive image Lenna, and combine the given initial value x' of two two-dimensional Logistic maps 0 =0.3643, y' 0 =0.1126, z' 0 =0.1564 and q' 0 =0.2538 According to the formula (2)-(5), calculate the initial value x of two two-dimensional Logistic maps 0 , y 0 , z 0 and q 0 .

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An image encryption method based on DNA coding and chaos belongs to the field of information encryption. Leakage incidents of image product content are on the rise, the improvement of computing power, the enhancement of hacker attack ability, and the convenience of copying and dissemination of digital images have brought new challenges to the security of digital images. At present, many image encryption methods are either not safe or efficient, which is unsatisfactory. The present invention performs scrambling and diffusion operations in the DNA coding domain of the interactive image, and performs XOR exclusive OR operation in the pixel domain to achieve the purpose of hiding the interactive image information, thereby realizing the protection of the image content. The main innovations are as follows: combined with the characteristics of digital images, a hybrid operation based on DNA coding is designed; based on the hybrid operation, a new image encryption method is designed. The experimental results show that this method has high security and good encryption effect, which can ensure the safe and reliable transmission of images under the network platform.

Description

technical field [0001] The invention relates to an information encryption technology, in particular to an image encryption method. Background technique [0002] In many fields such as politics, military affairs, and commerce, the security of network information has become increasingly important. In recent years, the development trend of network security has shown: (1) Computer viruses emerge in endlessly; (2) Hacker attacks are increasing year by year; (3) There are security loopholes in the system; (4) The military of various countries has stepped up research on information warfare. Network leaks occur from time to time, which have a major impact on the privacy of personal communications, business secrets of enterprises, and national security and stability. Therefore, network information security is one of the important issues that need to be solved urgently in the development of the Internet. [0003] Digital images are intuitive, vivid and vivid. It contains more infor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06T1/00H04L9/00
CPCG06T1/005H04L9/001
Inventor 张晓强
Owner CHINA UNIV OF MINING & TECH