Image encryption method based on chaotic adaptive mechanism

An encryption method and self-adaptive technology, applied in the countermeasures of attacking encryption mechanism, secure communication through chaotic signals, image communication, etc., can solve the problems of increasing the difficulty of key management and infeasibility, and achieve the effect of resisting attacks and reducing difficulty.

Active Publication Date: 2018-11-02
LIAOCHENG UNIV
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, different SHA-256 hash values ​​K are required to decrypt different ciphertexts,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image encryption method based on chaotic adaptive mechanism
  • Image encryption method based on chaotic adaptive mechanism
  • Image encryption method based on chaotic adaptive mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0072] (1) Assuming that the plaintext image is an image with 256 gray levels and a size of L=m×n, transform it into a one-dimensional vector P={p(1),p(2),p(3),... ,p(mn)}.

[0073] (2) Given (x(0), y(0), z(0), w(0)) = ((1.98, 1.45, 0.78, 0.8)) as the initial value, use the following chaotic system (1) Generate four chaotic sequences X, Y, Z, W of length L. Among them, X={x(1),x(2),x(3),...,x(L)}; Y={y(1),y(2),y(3),...,y( L)}; Z={z(1),z(2),z(3),...,z(L)}; W={w(1),w(2),w(3),..., w(L)}.

[0074]

[0075] Due to the limitation of computer accuracy, the chaotic sequence may degenerate into a periodic sequence in the iterative process. To overcome this shortcoming, multiple chaotic sequences are subjected to a nonlinear function operation to obtain a longer period sequence.

[0076] Use formula d(i)=cos 2 ((x(i)+y(i)+z(i)) / 3), formula k(i)=cos 2 ((w(i)+x(i)+y(i)) / 3) and t(i)=cos 2 The transformation of ((w(i)+x(i)+z(i)) / 2)(i=1, 2, 3,..., m*n) transforms the chaotic flow X, Y, Z, W int...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an image encryption method based on a chaotic adaptive mechanism. According to the method, the key management difficulty in one-time pad encryption scheme (keys for encryptingdifferent plaintexts are different) is overcome, and a chosen plaintext attack also can be resisted. Compared with the conventional encryption scheme, the encryption method has the advantages that random sequences employed in an encryption process are obtained by adding disturbance items associated with the plaintexts to chaotic sequences rather than an initial value of a chaotic system, and the disturbance items are not part of the keys. A legal decryptor decrypts ciphertexts in a diffusion phase and obtains the disturbance items associated with the plaintexts according to obtained scrambledciphertexts. An experimental result and security analysis show that the algorithm has the advantages that the key space is great, the ciphertexts are very sensitive to the plaintexts and the keys, thepixel distribution of the encrypted images is uniform, the correlation of the adjacent pixels of the ciphertexts is very low, information entropies of the ciphertext images are approximate to 8bit, and the chosen plaintext (ciphertext) attack is resisted. The method has a good application prospect.

Description

Technical field [0001] The invention belongs to the field of computer encryption, and particularly relates to an image encryption method based on a chaotic adaptive mechanism for image encryption. Background technique [0002] With the rapid development of Internet technology and multimedia technology, multimedia communication has become more and more important. Therefore, the security problem of image information is becoming more and more serious. However, because the image has the characteristics of large data capacity, high redundancy, and strong correlation between adjacent pixels, traditional encryption algorithms designed for text, such as DES and AES, are no longer suitable for image encryption. [0003] Chaos is a complex and seemingly random physical phenomenon generated by a certain nonlinear system. The sequence generated by it is pseudo-random, non-periodic, and appears as Gaussian white noise. In addition, because the chaotic system is highly sensitive to control par...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04N1/32H04L9/00H04L9/20
CPCH04L9/001H04L9/002H04L9/0656H04N1/32272
Inventor 朱淑芹班朝磊
Owner LIAOCHENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products