Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multi-diffusion image encryption and decryption method based on chaotic segmentation

An encryption and decryption and chaotic technology, applied in the field of multi-diffusion image encryption and decryption, can solve problems such as hidden dangers of multimedia data security

Active Publication Date: 2018-12-07
CHANGCHUN UNIV OF SCI & TECH
View PDF7 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to solve the problem of potential safety hazards in multimedia data in the existing computer network environment, the present invention provides a multi-diffusion image encryption and decryption method based on chaotic segmentation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-diffusion image encryption and decryption method based on chaotic segmentation
  • Multi-diffusion image encryption and decryption method based on chaotic segmentation
  • Multi-diffusion image encryption and decryption method based on chaotic segmentation

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach 1

[0080] Specific implementation mode 1. Combination Figure 1 to Figure 4 Illustrate this embodiment, based on the multi-diffusion image encryption and decryption method of chaotic segmentation, comprise image encryption process and image decryption process, it is characterized in that, encryption process and decryption process are realized by the following steps:

[0081] Set the user's encryption key as: the initial value of the cellular neural network and the number of iterations, and the control parameter ku of the chaotic key matrix 1 , ku 2 , the control parameter ku of the chaos control matrix 3 , ku 4 , the control parameter ku of the chaos control table 5 , the control parameter ku of the chaotic exchange table 6 , the control parameter ku of the chaotic dynamic diffusion key stream 7 , ku 8 , the dynamic encryption control parameter ku 9 ;

[0082] The image encryption process is:

[0083] Step 1. Take the "koala" image with a size of 256×256 as the original ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A multi-diffusion image encryption and decryption method based on chaotic segmentation is disclosed, relating to the field of image encryption technology, and solving the problem of security risks inmultimedia data in the existing computer network environment. The multi-diffusion image encryption and decryption method based on chaotic segmentation removes the correlation between image blocks moreeffectively by a chaotic image segmentation method. A chaotic control table and a chaotic exchange table generated by a cellular neural network are used for intra-block and inter-block scrambling ona plain text image, and the correlation between image pixels is removed by multiple chaotic diffusion steps including static diffusion and dynamic diffusion. An image encryption and decryption methodwith large key space, good sensitivity and effective protection against security attacks is provided.

Description

technical field [0001] The invention relates to the technical field of image encryption, in particular to an image segmentation method based on a chaotic system and a multi-diffusion image encryption and decryption method of a cellular neural network hyperchaotic system. Background technique [0002] With the rapid development of emerging technologies such as mobile Internet and cloud computing, human beings have entered the era of big data. Multimedia data such as images, videos, and audios are widely transmitted in various applications such as medical care, finance, military affairs, and e-commerce. User security and privacy have become one of the most important security issues in the big data environment. Network security and information security issues have gradually become security barriers restricting the rapid development of computer networks. Due to the large amount of multimedia information data, high redundancy, and high correlation between adjacent pixels, tradit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04N1/32
CPCH04N1/32272
Inventor 李锦青底晓强毕琳解男男祁晖从立钢任维武王欢王晶春丁勇李佳欢赵巍刘晓杰满振龙陈晓冬管红梅
Owner CHANGCHUN UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products