Supercharge Your Innovation With Domain-Expert AI Agents!

An image encryption method and a terminal

An image and terminal technology, applied in the computer field, can solve the problems of poor randomness, removal of image correlation, correlation, redundancy and large amount of data, etc., and achieve the effect of high randomness and high security.

Active Publication Date: 2019-04-02
FUQING BRANCH OF FUJIAN NORMAL UNIV
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, because the image has the characteristics of correlation, redundancy and large amount of data between pixels, the above image encryption algorithms cannot remove the correlation between images well, have poor randomness, and cannot effectively resist plaintext attacks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An image encryption method and a terminal
  • An image encryption method and a terminal
  • An image encryption method and a terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0071] Please refer to figure 1 , a method for image encryption, comprising steps:

[0072] S1. Obtain the image to be encrypted, and generate an iterative initial value, a pseudo-random number and a true random number;

[0073] The generation iteration initial value described in step S1 is specifically:

[0074] S11. Obtain the image to be encrypted and the preset initial secret key;

[0075] S12. Generate an iterative initial value according to the image to be encrypted and the initial key;

[0076] The generation of pseudo-random numbers and true random numbers described in step S1 is specifically:

[0077] Generate pseudo-random numbers through two-dimensional Logistic mapping, and generate true random numbers according to the pseudo-random numbers and preset rules;

[0078] The generating of true random numbers according to the pseudo-random numbers and preset rules is specifically:

[0079] converting the pseudo-random number into a binary form, and dividing the pse...

Embodiment 2

[0086] This embodiment will further illustrate how the above image encryption method is implemented in combination with specific application scenarios:

[0087] 1. Obtain the image to be encrypted, and generate the iteration initial value, pseudo-random number and true random number

[0088] 1.1. Obtain the image to be encrypted and the preset initial key (x 0 ,y 0 ), the size of the grayscale image of the image to be encrypted is M×N as an example;

[0089] 1.2. Calculate the initial value of iteration according to the initial secret key as follows:

[0090]

[0091]

[0092]

[0093]

[0094] Where P(i,j) represents the gray value of row i and column j, (x 0 ,y 0 ) represents the given initial key, (x 0 1 ,y 0 1 ) is the initial value of the iterative row scrambling, (x 0 2 ,y 0 2 ) is the iterative initial value of column scrambling, and mod represents the remainder operation;

[0095] 1.3. Two-dimensional Logistic mapping

[0096] The formula of t...

Embodiment 3

[0161] Please refer to figure 2 , an image encryption terminal 1, including a memory 2, a processor 3, and a computer program stored in the memory 2 and operable on the processor 3, when the processor 3 executes the program, implements the first embodiment various steps.

[0162] To sum up, the method and terminal for image encryption provided by the present invention acquire an image to be encrypted and generate an iterative initial value, a pseudo-random number, and a true random number. The random number performs preset scrambling processing on the image to obtain the encrypted image, and uses the combination of true random number and pseudo-random number to effectively remove the correlation between images and make the encrypted image more random , through the preset scrambling process, the encrypted image can resist plaintext attacks, and the security is higher. The first bit stream is obtained by converting the pseudo-random number into binary form and dividing the pse...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an image encryption method and a terminal. The method comprises obtaining an image to be encrypted, generating an iteration initial value, a pseudo-random number and a true random number, carrying out the preset scrambling processing on the image by the iteration initial value, the pseudo random number and the true random number to obtain the encrypted image, combining the true random number and the pseudo-random number, so that the correlation between the images is effectively removed, the randomness of the encrypted images is higher, the encrypted images can resist plaintext attacks through preset scrambling processing, and the security is higher.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to an image encryption method and terminal. Background technique [0002] With the development of science and technology and the advancement of technology, the security of information has attracted more and more attention. Image is a common form in the network, so the research on its security is very necessary. [0003] In recent years, although some scholars have proposed many algorithms about image encryption. For example, the scrambling and diffusion process proposed by Shannon in cryptography is applied to image encryption; Chen et al. proposed a real-time image encryption system, the scrambling and diffusion operation of the system is realized through a lookup table, and Sun proposed An efficient image encryption algorithm is proposed, which combines pixel layer scrambling, bit layer scrambling and DNA technology, which can effectively improve the security of the encryption...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00
CPCG06T1/0021
Inventor 孙树亮郭永宁陈泗盛
Owner FUQING BRANCH OF FUJIAN NORMAL UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More