Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Asymmetric multi-image encryption method based on Logistic chaotic mapping

An encryption method and chaotic mapping technology, applied in the field of image processing, can solve the problems of insufficient security, small key space, low image encryption efficiency, etc., and achieve the effect of expanding the key space

Inactive Publication Date: 2018-11-16
XIAN UNIV OF TECH
View PDF2 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a kind of asymmetric multi-image encryption method based on Logistic chaotic map, which solves the problem of small key space, low image encryption efficiency and insufficient security in the cryptographic system of one-dimensional Logistic map in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Asymmetric multi-image encryption method based on Logistic chaotic mapping
  • Asymmetric multi-image encryption method based on Logistic chaotic mapping
  • Asymmetric multi-image encryption method based on Logistic chaotic mapping

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0078] use Figure 2a-Figure 2i to verify the feasibility of the proposed multi-image encryption cryptosystem. The two sets of fractional orders are set to α 1 = 0.2, α 2 = α 1 +0.4, beta 1 = α 1 +0.3, beta 2 = α 2 +0.1, α3=α1. The value of the initial dual-coupled logistic map is set to x 0 =0.21,y 0 =0.83, K was set to 2000. The Logistic mapping of the system parameters for double coupling was set to p = 3.56995 and ε = 0.471. The threshold for MSE as a convergence criterion is set to 1.0e -9 . Specific steps are as follows:

[0079] Step 1, refer to image 3 , by using two symmetrically coupled identical logistic maps to the image f i Add interference to get the added interference image f' i , Figure 4a It is the "Lena" image after adding interference in the present invention; Figure 4b is the "Zelda" image after the present invention has added interference; the iterative expression of the double Logistic mapping is:

[0080] x n+1 =p×x n ×(1-x n )+ε...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an asymmetric multi-image encryption method based on Logistic chaotic mapping. The method comprises the following steps: 1) providing an encrypted plain text image fi by assuming the image amount as P and the size of each image as M*N pixels, performing interference adding on the image fi by using two symmetrically coupled same logistic mappings, thereby obtaining an interference-added image f'I; 2) retrieving POF of each interference-added image f'I by using an iteration process in the FrFT domain,, wherein the POF retrieval process is an iteration process between twogray images; 3) modulating POFs of all interferce-added images as an intermediate stage, namely, modulating all POFSs as a complex matrix G, wherein the size of the complex matrix G is same as each original image; and 4) extending the complex matrix G to the final ciphertext in a chaotic diffusion model. The method disclosed by the invention has high security under chosen-plaintext attack.

Description

technical field [0001] The invention belongs to the technical field of image processing, relates to image encryption based on asymmetric technology, and relates to an asymmetric multi-image encryption method based on Logistic chaotic mapping. Background technique [0002] With the rapid popularization of computers and the Internet, image security issues have received widespread attention in various fields. Optical-based processing technology has high security for image encryption. Since Refregier and Javidi proposed an optical image encryption algorithm based on random encoding of input plane and Fourier plane, many optical encryption schemes have emerged. First, optical systems can provide many degrees of freedom, such as wavelength, focal length, and distance between lenses; second, they have inherent capabilities such as parallel processing and fast computational speed in various applications. [0003] Although most optical schemes have excellent properties such as paral...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04N1/44H04L9/00
CPCH04L9/001H04N1/44
Inventor 隋连升王佳豪段快快
Owner XIAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products