Image encryption method based on heterogeneous chaos and keccak hash function

A technology of hash function and encryption method, which is applied in the direction of secure communication through chaotic signals, image communication, digital transmission system, etc., and can solve problems such as inapplicable image encryption

Inactive Publication Date: 2018-06-05
SHANDONG NORMAL UNIV
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But it doesn't work for image encryption because the keystream n

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image encryption method based on heterogeneous chaos and keccak hash function
  • Image encryption method based on heterogeneous chaos and keccak hash function
  • Image encryption method based on heterogeneous chaos and keccak hash function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0123] It should be pointed out that the following detailed description is exemplary and intended to provide further explanation to the present application. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs.

[0124] It should be noted that the terminology used here is only for describing specific implementations, and is not intended to limit the exemplary implementations according to the present application. As used herein, unless the context clearly dictates otherwise, the singular is intended to include the plural, and it should also be understood that when the terms "comprising" and / or "comprising" are used in this specification, they mean There are features, steps, operations, means, components and / or combinations thereof.

[0125] SHA-3

[0126] A hash function is a compression mapping function that can compress information of any le...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an image encryption method based on heterogeneous chaos and a keccak hash function. The method includes the following steps: taking all image pixels of an image to be encryptedas input values of the keccak hash function, separately taking output values as initial values of a hyperchaotic Lorenz system and a hyperchaotic Chen system, and separately obtaining a first chaoticsequence and a second chaotic sequence; extending the image to be encrypted from a two-dimensional image to a three-dimensional space; iterating the first chaotic sequence and the second chaotic sequence to generate a pseudo random sequence, and then transforming the pseudo random sequence to obtain a location coordinate for disturbing the pixels; constructing a cipher substitution box S-Box according to the first chaotic sequence, and then selecting the execution order of three encryption strategies of the three-dimensional space according to the output values of the cipher substitution boxS-Box; and performing iteration for the set number of times, and finally reconstructing the image from the three-dimensional space into the two-dimensional image to obtain the encrypted image.

Description

technical field [0001] The invention relates to an image encryption method based on heterogeneous chaos and keccak hash functions. Background technique [0002] With the rapid development of the Internet and the popularity of smart phones, the security and privacy of users are increasingly threatened. In the era of cloud storage, image security is becoming more and more important. Considering the characteristics of large amount of data and strong correlation between adjacent pixels, traditional encryption methods are not suitable for image encryption. Moreover, the application of new technologies such as cloud computing and big data analysis makes the original encryption algorithm easy to be cracked. Therefore, it is necessary to study a new type of secure cryptographic system to meet the security requirements of today's era. [0003] A chaotic map is a complex nonlinear dynamical system. Due to its periodicity, sensitivity to initial conditions, and good randomness of p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04N1/32H04L9/00
CPCH04L9/001H04N1/32272
Inventor 骆超
Owner SHANDONG NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products