Unlock instant, AI-driven research and patent intelligence for your innovation.

A decryption method of encrypted image based on hyperchaotic system and automatic cellular machine

An encrypted image and hyperchaotic technology, which is applied in the field of information security, can solve the problem of diffusion effect failure key sequence changes with plaintext, etc., and achieve the effects of strong flexibility, simplified calculation process, and high image recovery rate

Active Publication Date: 2021-05-04
HENAN NORMAL UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the encryption process, the initial values ​​and parameter values ​​of the 3D cat map and the Chen hyperdimensional system are fixed, that is, the same scrambled pseudo-random sequence will be generated for different plaintext images. In addition, this encryption scheme has diffusion effect failure and key sequence The defect that the possibility of changing with the plaintext is limited, so the decryption method of the encryption algorithm can be carried out from the replacement stage and the diffusion stage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A decryption method of encrypted image based on hyperchaotic system and automatic cellular machine
  • A decryption method of encrypted image based on hyperchaotic system and automatic cellular machine
  • A decryption method of encrypted image based on hyperchaotic system and automatic cellular machine

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0082] The invention discloses a method for decrypting an encrypted image based on a hyperchaotic system and an automatic cellular machine, which includes the following steps in sequence:

[0083] Step 1: Divide the encrypted color image C into red, green and blue three-channel images to obtain the red channel image Rc, the green channel image Gc and the blue channel image Bc, where Rc, Gc and Bc are all M×N matrices, and M =1,2,...,m; N=1,2,...,N;

[0084]Step 2: Perform replacement decryption and scrambling decryption on the red channel graph Rc, green channel graph Gc, and blue channel graph Bc to obtain all possible values ​​of the replacement key sequence, row scrambling sequences hr, hg, hb and column scrambling sequences lr, lg and lb, where hr represents the row scrambling sequence of the red channel, hg represents the row scrambling sequence of the green channel, hb represents the row scrambling sequence of the blue channel, and lr represents the column scrambling seq...

Embodiment 2

[0128] The difference between this embodiment and Embodiment 1 is that in step 3, the method of first scrambling and decrypting and then replacing the decryption is adopted. The specific process is as follows:

[0129] (1) According to the row scrambling sequence and column scrambling sequence obtained in step 2, restore the ranks and columns of the red channel graph Rc, the green channel graph Gc and the blue channel graph Bc respectively, and obtain Rp, Gp and Bp, where Rp is The red channel decryption map obtained by scrambling and decrypting, Gp is ​​the green channel cracking map obtained by scrambling and decrypting, Bp is the blue channel cracking map obtained by scrambling and decrypting, and image_key1 in the KT table undergoes the same row and column changes in sequence to obtain Updated KT table;

[0130] (2) Rp performs XOR calculation with image_key1 in the updated KT table in turn, and obtains all possible results of red channel image decryption {Rhr|r∈[0, 255]},...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a decryption method of an encrypted image based on a hyperchaotic system and an automatic cell machine. First, the encrypted color image C is divided into three-channel images of red, green, and blue to obtain a red channel image Rc, a green channel image Gc, and a blue channel image. Channel diagram Bc; then replace and decrypt red channel diagram Rc, green channel diagram Gc and blue channel diagram Bc, and obtain all possible values ​​of the replacement key sequence, row scrambling sequence hr, hg, hb and column scrambling sequences lr, lg and lb; then according to the three-channel diagram and KT table and scrambling sequences hr, hg, hb, lr, lg and lb, the red channel ciphertext, blue channel ciphertext and The green channel ciphertext is obtained from the red channel decryption graph Rh, the blue channel decryption graph Bh and the green channel decryption graph Gh; finally, the original image H is obtained by combining the three channel decryption graphs. The invention uses the plaintext to decrypt the encryption algorithm, has strong flexibility, not only has a high image recovery rate, but also simplifies the calculation process.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method for decrypting an encrypted image based on a hyperchaotic system and an automatic cellular machine. Background technique [0002] According to a survey report released by the International Telecommunication Union (ITU), by the end of 2016, 47% of the world's population used the Internet, with a total of about 3.9 billion people. Such a huge user group uses the Internet to communicate, shop, search for information and generate massive data information, of which images account for a large proportion. Whether these image data come from a country or an individual, extremely high security is required. Encryption technology can convert meaningful images into meaningless images composed of noise, thereby ensuring the security and confidentiality of images during storage and transmission on public networks. As we all know, chaos is a powerful tool for image encryp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60H04L9/00H04L9/08
CPCG06F21/602G06F2221/2107H04L9/001H04L9/0861
Inventor 李名路丹丹任花王兰兰常慧敏
Owner HENAN NORMAL UNIV