Unlock instant, AI-driven research and patent intelligence for your innovation.

An image encryption method based on FCM clustering

An encryption method and clustering technology, applied in the field of image processing, can solve the problems of insufficient anti-attack ability and low sensitivity, and achieve the effects of various violent attacks and statistical attacks, high security and strong applicability

Active Publication Date: 2019-05-03
DALIAN UNIV OF TECH
View PDF12 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to solve the problems of low sensitivity and insufficient anti-attack ability, and proposes an image encryption method based on mature theory

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An image encryption method based on FCM clustering
  • An image encryption method based on FCM clustering
  • An image encryption method based on FCM clustering

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Combine below figure 1 The encryption of the present invention is described in more detail

[0028] The flow of the encryption algorithm is as follows:

[0029] In order not to lose generality, assume that the grayscale image P is m×n in size, where m is the number of rows and n is the number of columns.

[0030] 1) Calculate the sum of all pixel values ​​of the plaintext image P and the pixel average value avg as part of the chaotic operation and the key.

[0031]

[0032]

[0033] Wherein, g(i) is the size of the pixel value of each point after converting the pixel matrix into a one-dimensional array, and i=1, 2,..., m×n.

[0034] 2) Calculate the initial value x required for the chaotic system by formula (1-3) 0 ,y 0 ,x 1 ,y 1 .

[0035] 3) The two sets of initial values ​​obtained in the previous step are respectively iterated to the chaotic sequence values ​​used for clustering and c cluster centers after Logistic chaos.

[0036] 4) According to the c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of image processing and provides an image encryption method based on FCM clustering, a new image encryption method is provided based on an FCM fuzzy clustering algorithm, and the main idea of the method is that pixel coordinates generated through one-dimensional chaos are used as points to be clustered. And then carrying out clustering operation on the points through FCM fuzzy clustering, sorting the clustered clusters outside according to the sizes of the clusters, and arranging the clusters in a natural sequence to obtain a scrambled image. And finally, performing XOR operation through a chaotic sequence matrix generated by space-time chaos and the scrambled image matrix to complete the diffusion step. The encryption method provided by the invention ishigh in security, has very high key sensitivity, can well resist various violent attacks, statistical attacks and the like, is designed on the basis of a mature theory, and has very high applicability, practicability and safety.

Description

technical field [0001] The invention belongs to the field of image processing, and relates to an image encryption method based on FCM clustering, which is specifically applied in the image encryption process. Background technique [0002] With the continuous expansion of Internet technology, network security issues have also become more important. Images have become a transmission medium widely used by people no matter in work or in life. Therefore, how to ensure the security of image transmission becomes particularly important. In recent years, people have continuously proposed new image encryption technologies. Among them, the various characteristics of the chaotic system make it well used in the field of image encryption. Its unpredictability and quasi-randomness are in good agreement with cryptography. , which also makes people continue to study the image encryption technology based on chaos. [0003] However, most of the current schemes still have certain defects. Sin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06T9/00G06K9/62H04L9/00H04L9/06
Inventor 范冬梅卢志茂王贺姚念民
Owner DALIAN UNIV OF TECH