Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Image encryption method for decryption area limitation using directed area and poker mapping

An encryption method and technology for playing cards, which are applied to encryption devices with shift registers/memory, image communication, and secure communication through chaotic signals, etc., and can solve the problems that the key does not consider the limitation of decryption position and potential safety hazards.

Active Publication Date: 2018-06-15
SHAANXI NORMAL UNIV
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] Guo Yi, 2015, Yang Lu, 2014, Shao Liping, 2015 and Shao Liping, 2016 Compared with the traditional image encryption algorithm, by introducing the plaintext features of the image to be encrypted, the strategy’s ability to resist chosen / known plaintext attacks is improved, but Same as traditional image encryption methods: Peng Zaiping, 2014, Zhang X, 2014, Liu X, 2016, Parvin Z, 2016, Liu Y, 2016, ZhangX, 2017, Jain A, 2016, Pareek N K, 2013, Zhang X, 2016, Hua Like Z, 2015, Zhu H, 2016, Xu L, 2016, Tang Z, 2016, the security of the key is considered without considering the limitation of the decryption position, so that the encrypted image can be decrypted at any position, instead of only It can only be decrypted in a specific location, so there is a big security risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image encryption method for decryption area limitation using directed area and poker mapping
  • Image encryption method for decryption area limitation using directed area and poker mapping
  • Image encryption method for decryption area limitation using directed area and poker mapping

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0198] The following takes JAVA jdk1.8.0_131 as the case implementation environment, and describes the implementation of the present invention in detail in conjunction with the accompanying drawings, but is not limited to this implementation case, where figure 1 is the flow chart of the encryption process, figure 2 Is the flow chart of the decryption process.

[0199] The concrete implementation steps of image encryption method:

[0200] Step 1: record the image to be encrypted as A=(a i,j ) m×n , set the decryption location of the user (x 0 ,y 0 ,z 0 ) ∈ region, according to formula (1) to obtain the smallest outsourcing cuboid of the region region where x min ,x max ,y min ,y max ,z min ,z max Respectively represent the starting and ending ranges of the corresponding x-axis, y-axis, and z-axis coordinates on the cuboid;

[0201] Suppose the selected image matrix to be encrypted is Set the decryption location of the user (x 0 ,y 0 ,z 0 ) ∈ region, assuming...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an image encryption method for decryption area limitation using a directed area and poker mapping. The method is characterized in that firstly, a stable point of the minimum epiboly is obtained through the minimum epiboly of a decryption position, a random triangle is generated through the stable point, an MD5 value and an SHA-1 value of an image to be encrypted, and a userkey, and intermediate encryption parameters are generated through the direction area of the triangle; an initial value and parameter values of chaotic mapping are generated through the intermediate encryption parameters, and the chaotic mapping is driven to generate a random image with the same size as the image to be encrypted; and poker mapping scrambling and overall xor encryption are carried out on randomly selected lines and rows of the image to be encrypted through the chaotic mapping and the random image, so that an encrypted image is generated. Compared with the conventional method, the method provided by the invention has the advantages that the decryption area is limited, so that the encrypted image can only be decrypted within a specific range; and plain text attributes and therandom image are introduced, so that encryption steps for the different encrypted images are different, and the safety is further improved.

Description

technical field [0001] The invention belongs to the intersecting field of image security and image signal processing, relates to an image encryption method, in particular to an image encryption method for defining a decryption area mapped to a directed area and playing cards. Background technique [0002] Digital image encryption, in essence, is to convert meaningful plaintext images into random noise-like random images under the joint action of encryption functions and encryption keys, the purpose of which is to make the real information to be transmitted unable to be intuitively perceived. [0003] Traditional image encryption algorithms usually use encryption strategies based on pixel confusion or pixel position replacement, for example: Peng Zaiping, 2014. (Peng Zaiping, Wang Chunhua, Lin Yuan, etc. A new type of four-dimensional multi-wing hyperchaotic attractor and its application in image encryption [J]. Acta Physica Sinica, 2014,63(24):240506-240506.) XOR encryption ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04N1/44H04L9/00H04L9/06
CPCH04L9/001H04L9/0643H04N1/44H04N1/4486
Inventor 邵利平李庆玲曹菡何思雨
Owner SHAANXI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products