Unlock instant, AI-driven research and patent intelligence for your innovation.

A plaintext-based image encryption method

A technology of plaintext images and encryption methods, applied in image communication, electrical components, etc., can solve the problems of inability to resist selected plaintext attacks, inability to effectively resist attacks, and insecure encryption algorithms, achieving good encryption effects and improving key sensitivity. , the effect of improving encryption security

Active Publication Date: 2020-02-14
XIDIAN UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

After research by scholars, it is found that most of the first type of encryption algorithms are insecure, because these encryption algorithms either only have one round of scrambling diffusion, or the key space is small, or have nothing to do with the plaintext, etc., which makes them unable to effectively resist attacks.
Although the second type of encryption algorithm is based on plaintext, due to the invariance of the sum of pixel values, the key space of many pseudo-random number generators is small, which makes them unable to resist chosen plaintext attacks, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A plaintext-based image encryption method
  • A plaintext-based image encryption method
  • A plaintext-based image encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] See figure 1 , figure 1 A schematic flow diagram of a plaintext-based image encryption method provided by an embodiment of the present invention, the encryption method specifically includes the following steps:

[0051] Construct a three-dimensional cat mapping key according to the plaintext image data and the initial value of the logical mapping;

[0052] Wherein, constructing the three-dimensional cat mapping key includes:

[0053] Execute the XOR operation on the last column of pixel values ​​of the plaintext image data and the first N-1 column pixel values ​​in turn to obtain a column of XOR values, marked as where l n Indicates a pixel value, and N is the number of columns of the plaintext image data;

[0054] The last row of pixel values ​​of the plaintext image data is sequentially XORed with the first M-1 rows of pixel values ​​to obtain a row of XOR values, marked as where h m Indicates a pixel value, and M is the number of lines of the plaintext image da...

Embodiment 2

[0094] In this embodiment, on the basis of the foregoing embodiments, a detailed description of a plaintext-based image encryption method of the present invention will be focused on. Specifically, see figure 2 , figure 2 A detailed flowchart of a plaintext-based image encryption method provided by an embodiment of the present invention, the method may include:

[0095] S1. Generate a pseudo-random number sequence.

[0096] S11. Input a plaintext image with a size of M×N and the initial value q of logistic 0 , according to the key construction method to generate a three-dimensional cat mapping key (x 0 ,y 0 ,z 0 );

[0097] S11a. Take the pixel value of the last column and the pixel value of the last row of the plaintext respectively, and the plaintext has M rows and N columns;

[0098] S11b. Carry out an XOR operation with the last column (row) and the first N-1 columns (first M-1 rows) in turn to obtain a column (row) XOR value, which is marked as where l n (h m)...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an image encryption method based on plaintext. The method comprises the steps of building a three-dimensional cat mapping key according to plaintext image data and a logic mapping initial value; acquiring a three-dimensional cat mapping pseudo-random number sequence according to the three-dimensional cat mapping key, and acquiring a logic mapping pseudo-random number sequence according to the logic mapping initial value; scrambling the plaintext image data according to the three-dimensional cat mapping pseudo-random number sequence, to acquire scrambled image data; anddiffusing the scrambled image data to acquire ciphertext image data. According to the method provided by the embodiment of the invention, the key flow is constructed based on the plaintext, so that an attacker generates the different key flows when the different plaintexts are selected at each time when the plaintexts are in use, and the plaintext attack is basically resisted.

Description

technical field [0001] The invention belongs to the technical field of digital image processing, and in particular relates to a plaintext-based image encryption method. Background technique [0002] Digital image, also known as digital image or digital image, is the representation of two-dimensional image with finite number of numerical pixels. Represented by an array or matrix, its light position and intensity are both discrete. A digital image is an image obtained by digitizing an analog image, with pixels as the basic element, and can be stored and processed by a digital computer or digital circuit. Image encryption is an important issue in the field of information security, so both image information transmission and image encryption technology have attracted widespread attention. For the security requirements of digital image information, four aspects are mainly considered at present, namely: confidentiality, integrity, authentication and non-repudiation. Because chao...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04N1/32
CPCH04N1/32272
Inventor 王云江李思嘉石莎刘阳王增斌
Owner XIDIAN UNIV