Unlock instant, AI-driven research and patent intelligence for your innovation.

Decryption method of encrypted image based on hyper-chaotic system and automatic cell machine

An encrypted image and hyperchaotic technology, applied in the field of information security, can solve the problem of diffusion effect failure, key sequence changes with plaintext, etc.

Active Publication Date: 2018-11-27
HENAN NORMAL UNIV
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the encryption process, the initial values ​​and parameter values ​​of the 3D cat map and the Chen hyperdimensional system are fixed, that is, the same scrambled pseudo-random sequence will be generated for different plaintext images. In addition, this encryption scheme has diffusion effect failure and key sequence The defect that the possibility of changing with the plaintext is limited, so the decryption method of the encryption algorithm can be carried out from the replacement stage and the diffusion stage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Decryption method of encrypted image based on hyper-chaotic system and automatic cell machine
  • Decryption method of encrypted image based on hyper-chaotic system and automatic cell machine
  • Decryption method of encrypted image based on hyper-chaotic system and automatic cell machine

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0082] The invention discloses a method for decrypting an encrypted image based on a hyperchaotic system and an automatic cell machine, which comprises the following steps in sequence:

[0083] Step 1: Divide the encrypted color image C into red, green and blue three-channel images to obtain the red channel image Rc, the green channel image Gc and the blue channel image Bc, where Rc, Gc and Bc are all M×N matrices, and M =1,2,...,m; N=1,2,...,N;

[0084]Step 2: Perform replacement decryption and scrambling decryption on the red channel graph Rc, green channel graph Gc, and blue channel graph Bc to obtain all possible values ​​of the replacement key sequence, row scrambling sequences hr, hg, hb and column scrambling sequences lr, lg and lb, where hr represents the row scrambling sequence of the red channel, hg represents the row scrambling sequence of the green channel, hb represents the row scrambling sequence of the blue channel, and lr represents the column scrambling sequen...

Embodiment 2

[0128] The difference between this embodiment and Embodiment 1 is that in step 3, the method of first scrambling and decrypting and then replacing the decryption is adopted. The specific process is as follows:

[0129] (1) According to the row scrambling sequence and column scrambling sequence obtained in step 2, restore the ranks and columns of the red channel graph Rc, the green channel graph Gc and the blue channel graph Bc respectively, and obtain Rp, Gp and Bp, where Rp is The red channel decryption map obtained by scrambling and decrypting, Gp is ​​the green channel cracking map obtained by scrambling and decrypting, Bp is the blue channel cracking map obtained by scrambling and decrypting, and image_key1 in the KT table undergoes the same row and column changes in sequence to obtain Updated KT table;

[0130] (2) Rp performs XOR calculation with image_key1 in the updated KT table in turn, and obtains all possible results of red channel image decryption {Rhr|r∈[0,255]}, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a decryption method of an encrypted image based on a hyper-chaotic system and an automatic cell machine. Firstly, the encrypted color image C is divided into red, green and blue three-channel images so as to obtain a red channel image Rc, a green channel image Gc and a blue channel image Bc; then substitution decryption and scrambling decryption are performed on the red channel image Rc, the green channel image Gc and the blue channel image Bc are, and all possible values of the substitution key sequence and the row scrambling sequences hr, hg, hb and the column scrambling sequences lr, lg and lb of the three channel images are obtained respectively; then the red channel ciphertext, the blue channel ciphertext and the green channel ciphertext are decoded according to the three channel images, the KT table and the scrambling sequences hr, hg, hb, lr, lg and lb so that the red channel decryption image Rh, the blue channel decryption image Bh and the green channeldecryption image Gh are obtained; and finally the three channel decryption images are merged so as to obtain the original image H. The plaintext is utilized to decrypt the encryption algorithm so as to have high flexibility and high image restoration rate and simplify the calculation process.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method for decrypting encrypted images based on a hyperchaotic system and an automatic cell machine. Background technique [0002] According to a survey report released by the International Telecommunication Union (ITU), by the end of 2016, 47% of the world's population used the Internet, with a total of about 3.9 billion people. Such a huge user base uses the Internet to communicate, shop, and search for information, so that massive data and information are generated, of which images account for a large proportion. Whether these image data come from a country or an individual, extremely high security is required. Encryption technology can convert meaningful images into meaningless images composed of noise, thus ensuring the security and confidentiality of images during storage and transmission on public networks. As we all know, chaos is a powerful tool for imag...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60H04L9/00H04L9/08
CPCG06F21/602G06F2221/2107H04L9/001H04L9/0861
Inventor 李名路丹丹任花王兰兰常慧敏
Owner HENAN NORMAL UNIV