Image scrambling method of two-dimensional mapping groups

An image scrambling and image technology, applied in the field of information security, can solve the problem of mapping characteristics, affecting the encryption effect, and the key space is not large, etc.

Inactive Publication Date: 2018-09-25
HUNAN INSTITUTE OF ENGINEERING
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the problem of mapping characteristics, the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image scrambling method of two-dimensional mapping groups
  • Image scrambling method of two-dimensional mapping groups
  • Image scrambling method of two-dimensional mapping groups

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0095] Two-dimensional mapping principles and examples are as figure 1 , 2 Shown. Regarding the image as an array, the principle of mapping is to sequentially insert the image column pixels into two pixels in the corresponding row from two directions to stretch the image. Repeat the process and connect sequentially, the original image is stretched into a long N 2 Straight line.

[0096] figure 2 Take a 4×4 picture as an example. First, insert the pixels in the first column from left to right between the pixels in the first row from top to bottom, such as (1,0) inserted between (0,0), (0,1), (2, 0) Insert between (0,1) and (0,2), (3,0) between (0,2) and (0,3), and then insert the pixels in the first column from right to left To the pixels in the first row from bottom to top, that is, (2,3) is inserted between (3,2) and (3,3), (1,3) is inserted into (3,1), Between (3,2)... Repeat the above process, the original image is stretched into a straight line of pixels: (0,0), (1,0), ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an image scrambling method of two-dimensional mapping groups and belongs to the field of information safety. The main concept is that by use of the combination of different mapping groups, pixel positions are scrambled and image encryption is achieved. Firstly, two extension ways are put forward for a square graph with the length of N and comprise step that pixels of each line are successively inserted into pixels of corresponding adjacent rows from two opposite angle directions, and by carrying out repeated insertion and successive connection, the original graph is extended to a straight line with the length of N2. By folding the straight line in six folding ways, a dense graph is obtained and 12 two-dimensional mapping can be obtained. During encryption, 6-bit decimal number is adopted in the secrete key during encryption. According to a selected strategy, by use of the corresponding two-dimensional mapping group, images are scrambled. According to the invention, the algorithm is simple; the encryption speed is quick; the method can be applied in network image encryption and used as component parts of other encryption algorithms; and composite encryption isachieved.

Description

Technical field [0001] The invention relates to a two-dimensional mapping group image scrambling method, which belongs to the field of information security. Background technique [0002] With the rapid development of Internet technology, it is more and more convenient to take and transmit images with portable devices such as mobile phones. While people frequently use and contact images, there are more and more malicious attacks on images by hackers. The leak of private pictures of some public figures caused an uproar on the Internet. For ordinary people, how to protect image security and prevent privacy from being leaked and spread is also a very important issue. [0003] Traditional methods of protecting information are designed based on text information. They have played an important role in the fields of national economy, social life, national defense and military affairs. However, image and text information are essentially different, with the characteristics of large amount...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06T1/00
CPCG06T1/0021G06T2201/0051
Inventor 黄峰雷芳芳
Owner HUNAN INSTITUTE OF ENGINEERING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products