Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Digital Image Encryption Method Based on Chen System and Cellular Automata

An encryption method and digital image technology, applied in image data processing, image data processing, instruments, etc., can solve the problems of low security and poor test effect, and achieve the effect of high security and good encryption effect

Active Publication Date: 2020-03-24
NORTHEASTERN UNIV LIAONING
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

2. Low security
Existing algorithms tend to have better data in some tests, and poor results in other tests

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Digital Image Encryption Method Based on Chen System and Cellular Automata
  • A Digital Image Encryption Method Based on Chen System and Cellular Automata
  • A Digital Image Encryption Method Based on Chen System and Cellular Automata

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] Embodiment 1: Evaluate the validity of this method

[0032] Digital images in BMP format such as Lena, peppers, and baboon are selected for testing and analysis. The sizes of the above images are all 512*512 pixels. The test environment is: CPU: Intel Core 3.4GHz; memory: 8GB; hard disk: 240GB; operating system: Windows 7 Ultimate; compilation environment: Visual Studio 2010, OpenCV 2.4; programming language: C++; the specific steps are as follows:

[0033] Step 1: Use the Logistic map to input the first three secret keys key1, key2, key3 to generate three random real number sequences rla, gla, bla, whose length is N*N, where N is the height and width of the image. The three sequences rla, gla, bla are further quantized into integer random sequences qrla, qgla, qbla in the range [0,255].

[0034] Step 2: Calculate the value of each random sequence number of updates. The calculation formula is shown in formula (6):

[0035]

[0036] Where total_r total_g total_b...

Embodiment 2

[0051] Example 2: Taking the histogram as an example to analyze the encryption effect

[0052] An important indicator to measure the performance of an encryption algorithm is the histogram. The histogram reflects the distribution of pixels in an image. Since the plaintext usually has a certain degree of intelligibility, its histogram cannot be evenly distributed, and it often presents some kind of volatility. For the ciphertext, it is usually not necessary to be intelligible, and the information of the plaintext needs to be effectively hidden, so the histogram of the ciphertext often has the characteristics of uniform distribution. This makes it impossible for attackers to obtain effective information from the histogram of the image.

Embodiment 3

[0053] Embodiment 3: Taking the correlation coefficient as an example to analyze the method

[0054] The correlation coefficient of plaintext images is usually very high, that is, adjacent pixels usually have very similar pixel values. A good encryption algorithm should be able to significantly reduce the correlation of adjacent pixels in the ciphertext, making the correlation coefficient close to 0. Table 1 lists the correlation coefficient of the ciphertext obtained after encrypting the lena graph as the plaintext.

[0055] Table 1 Correlation coefficient analysis

[0056]

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention proposes a digital image encryption method based on Chen system and cellular automata. By combining the respective characteristics of the low-dimensional chaotic system Logisitc map and the high-dimensional chaotic system Chen system, as well as the forward and reverse bidirectional diffusion mechanism and the intergenerational diffusion mechanism of cellular automata, this algorithm has the characteristics of good encryption effect and high security. It can be applied to various digital multimedia terminals and servers to encrypt single digital images or batch digital images in real time.

Description

technical field [0001] The invention belongs to the technical field of digital image security, mainly relates to information protection, information security technology and encryption technology in the field of digital multimedia information, and specifically relates to a set of digital image security methods based on Chen system and cellular automata. [0002] technical background [0003] Most of the existing digital image encryption adopts the scrambling diffusion framework proposed by American scientist Fridrich in 1997. Researchers have proposed a series of encryption algorithms based on this framework. In this type of encryption algorithm, each round of encryption includes two main steps, namely, the scrambling phase and the diffusion phase. In the scrambling phase, the plaintext to be encrypted is first regarded as a two-dimensional matrix. The position of each element in the matrix is ​​the abscissa and ordinate of the current matrix, and the value of each element i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06T1/00
CPCG06T1/0021
Inventor 张伟朱志良于海赵玉丽
Owner NORTHEASTERN UNIV LIAONING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products