Image encryption method based on AES and chaos

An encryption method and chaotic technology, which are applied in secure communication through chaotic signals, encryption devices with shift registers/memory, image data processing, etc., can solve the problems of weak security and low encryption efficiency, and achieve protection security, The effect of reducing the number of times of encryption and the effect of secure encryption

Active Publication Date: 2018-10-30
CHINA UNIV OF MINING & TECH
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Purpose of the present invention: Aiming at problems such as weak security or low encryption efficiency of existing image encryption methods, an image encryption method based on AES and chaos is proposed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image encryption method based on AES and chaos
  • Image encryption method based on AES and chaos
  • Image encryption method based on AES and chaos

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The implementation process of the present invention will be further described in detail below in conjunction with specific drawings and examples.

[0032] figure 1 is the encryption flowchart of this method, figure 2 is the decryption flowchart of the method.

[0033] The programming software used is MyEclipse 2015 CI, select image 3A Lena image of size 512×512 is shown as the original interaction image. Using this method, Alice describes the detailed process of encrypting the interactive image as follows:

[0034] Step 1: Use the hash algorithm SHA-256 to get the 256-bit hash value corresponding to the original image K =9ae48c65bb78a5c6d0d9496f9364f36efc2bd2f2a3f521763e16edc434977e9e (hexadecimal representation), calculate the initial value of the PLCM chaotic map shown in formula (1) x 0 =0.447058823529412 and parameters q =0.352941176470588, iterate formula (1) 512×512 times to generate a chaotic sequence X ={ x i} 262144 .

[0035] Step 2: Alice calc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an image encryption method based on an AES (Advanced Encryption Standard) and chaos, belonging to the information security field. Currently, the problem of how to protect thesafety of image contents is collectively concerned by the industrial circle and the academic circle along with the rapid development of multimedia communication techniques. The invention discloses theimage encryption method based on AES and chaos. The method comprises the following steps: firstly, converting a plurality of pixels into a big integer by a sender, so as to reduce the encryption number of times; secondly, encrypting the big integers by virtue of AES and chaos; and finally, configuring an encrypted image by virtue of the encrypted big integers. Experiments show that the method issafe and efficient and has a good encryption effect.

Description

technical field [0001] The invention relates to an information encryption technology, in particular to an image encryption method. Background technique [0002] In fields such as military systems, e-government affairs, financial systems, and daily life, a large number of images are generated every day. In order to protect the content of these image information from being stolen, image encryption technology has attracted extensive attention from academia and industry. Researchers have proposed various image encryption methods. However, some of these methods have been deciphered, some have weak security, and some have low efficiency, which are unsatisfactory. [0003] In order to improve the security and efficiency of image encryption and ensure the safe and efficient transmission of images, an image encryption method based on AES and chaos was designed by combining Advanced Encryption Standard (AES) and chaos theory. This method utilizes the high security of AES, as well a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/00G06T1/00
CPCG06T1/0021H04L9/001H04L9/0631H04L9/0643
Inventor 张晓强王雪松程玉虎
Owner CHINA UNIV OF MINING & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products