Nonlinear double-image encryption method based on chaos and amplitude-phase encoding

An encryption method and dual-image technology, which can be applied to secure communication through chaotic signals, image communication, digital transmission systems, etc., can solve the imbalance of amplitude encryption and phase encryption image histogram, the ability to resist statistical attacks is weak, and the encrypted image is unbalanced. Problems such as uneven distribution of histograms

Active Publication Date: 2019-04-02
GUANGXI NORMAL UNIV
View PDF5 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the histograms of some encrypted images in these schemes are unevenly distributed, and the histograms of the amplitu

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Nonlinear double-image encryption method based on chaos and amplitude-phase encoding
  • Nonlinear double-image encryption method based on chaos and amplitude-phase encoding
  • Nonlinear double-image encryption method based on chaos and amplitude-phase encoding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0097] 1) Generate chaotic sequence and phase mask: Two chaotic systems are used to generate the phase mask M 1 and M 2 , 2D Logistic mapping is used to generate a random kernel matrix of discrete complex order random transformation, as follows:

[0098] ① First, set the adaptive adjustment parameters, apply the adaptive adjustment parameters to adjust the initial value of the chaotic system, and generate the corresponding chaotic sequence, assuming that the plaintext image is expressed as I 1 , I 2 , the size of the plaintext image is N×N, then the generation of adaptive adjustment parameters is shown in formula (1):

[0099]

[0100] where σ ad_init is the initial value of the Chen system, ranging from 0 to 1, which can be understood as the initial value x 0 ,y 0 ,z 0 = σ ad_init , the value range of the 2D Logistic random matrix is ​​small, and the initial value of the 2D Logistic mapping system satisfies formula (2) and formula (3):

[0101] x' 0 =a+0.01σ ad_i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a nonlinear double-image encryption method based on chaos and amplitude-phase encoding. The nonlinear double-image encryption method comprises the steps of: 1) generating a chaotic sequence and a phase mask by using self-adaptive adjustment parameters; 2) preprocessing two original images to synthesize them into complex signals; 3) performing modulation, discrete complex order random transformation and amplitude-phase separation on the complex signals obtained in the step 2); 4) encoding amplitude E01; 5) encoding phase E02; 6) and synthesizing the new amplitude and thenew phase to obtain a final ciphertext. The nonlinear double-image encryption method can realize double-image encryption, has high security and fast encryption speed, and has good performance againstvarious attacks.

Description

technical field [0001] The invention relates to the technical field of image encryption, in particular to a nonlinear double-image encryption method based on chaos and amplitude-phase encoding. Background technique [0002] Image data is playing an increasingly important role in the fields of information transmission and information collection. However, due to the large amount of image data, strong correlation between adjacent pixels, and high redundancy, it is vulnerable to various attacks during transmission. Although some traditional encryption algorithms, such as data encryption standards, have high security and mature verification methods, they do not consider the characteristics of image data, making them less robust. Therefore, some new encryption theories and schemes have been proposed one after another. Among them, the chaos-based cryptography is suitable for the encryption processing of two-dimensional data because of its good randomness, ergodicity and sensitivit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00H04N1/32H04N1/44
CPCH04L9/001H04N1/32272H04N1/4486
Inventor 罗玉玲汤舜彬刘俊秀莫家玲丘森辉岑明灿蔡超波
Owner GUANGXI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products