An image encryption method based on FCM clustering
An encryption method and clustering technology, applied in the field of image processing, can solve the problems of insufficient anti-attack ability and low sensitivity, and achieve the effects of various violent attacks and statistical attacks, high security and strong applicability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0027] Combine below figure 1 The encryption of the present invention is described in more detail
[0028] The flow of the encryption algorithm is as follows:
[0029] In order not to lose generality, assume that the grayscale image P is m×n in size, where m is the number of rows and n is the number of columns.
[0030] 1) Calculate the sum of all pixel values of the plaintext image P and the pixel average value avg as part of the chaotic operation and the key.
[0031]
[0032]
[0033] Wherein, g(i) is the size of the pixel value of each point after converting the pixel matrix into a one-dimensional array, and i=1, 2,..., m×n.
[0034] 2) Calculate the initial value x required for the chaotic system by formula (1-3) 0 ,y 0 ,x 1 ,y 1 .
[0035] 3) The two sets of initial values obtained in the previous step are respectively iterated to the chaotic sequence values used for clustering and c cluster centers after Logistic chaos.
[0036] 4) According to the c...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


