A plaintext-based image encryption method
A technology of plaintext images and encryption methods, applied in image communication, electrical components, etc., can solve the problems of inability to resist selected plaintext attacks, inability to effectively resist attacks, and insecure encryption algorithms, achieving good encryption effects and improving key sensitivity. , the effect of improving encryption security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0050] See figure 1 , figure 1 A schematic flow diagram of a plaintext-based image encryption method provided by an embodiment of the present invention, the encryption method specifically includes the following steps:
[0051] Construct a three-dimensional cat mapping key according to the plaintext image data and the initial value of the logical mapping;
[0052] Wherein, constructing the three-dimensional cat mapping key includes:
[0053] Execute the XOR operation on the last column of pixel values of the plaintext image data and the first N-1 column pixel values in turn to obtain a column of XOR values, marked as where l n Indicates a pixel value, and N is the number of columns of the plaintext image data;
[0054] The last row of pixel values of the plaintext image data is sequentially XORed with the first M-1 rows of pixel values to obtain a row of XOR values, marked as where h m Indicates a pixel value, and M is the number of lines of the plaintext image da...
Embodiment 2
[0094] In this embodiment, on the basis of the foregoing embodiments, a detailed description of a plaintext-based image encryption method of the present invention will be focused on. Specifically, see figure 2 , figure 2 A detailed flowchart of a plaintext-based image encryption method provided by an embodiment of the present invention, the method may include:
[0095] S1. Generate a pseudo-random number sequence.
[0096] S11. Input a plaintext image with a size of M×N and the initial value q of logistic 0 , according to the key construction method to generate a three-dimensional cat mapping key (x 0 ,y 0 ,z 0 );
[0097] S11a. Take the pixel value of the last column and the pixel value of the last row of the plaintext respectively, and the plaintext has M rows and N columns;
[0098] S11b. Carry out an XOR operation with the last column (row) and the first N-1 columns (first M-1 rows) in turn to obtain a column (row) XOR value, which is marked as where l n (h m)...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


