Image encryption method based on composite chaotic system and image processing device

A technology of chaotic system and encryption method, which is applied in the direction of image data processing, image data processing, electrical digital data processing, etc., can solve the problems of bad chaotic behavior, high possibility of being attacked, and narrow chaotic range, so as to reduce the The probability of attack, the effect of increasing the robustness, and widening the range of chaos

Active Publication Date: 2019-07-05
GUILIN UNIV OF ELECTRONIC TECH
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The object of the present invention is to provide an image encryption method based on a composite chaotic system, a computer-readable storage medium, and an image processing device, aiming at solving the problem that the chaotic range of the image encryption method based on a fractional-order chaotic map is relatively narrow, and the chaotic behavior is not good. The formed ciphertext image is an image with a pattern pattern, which is very easy to be discovered by the attacker, and the possibility of being attacked is high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image encryption method based on composite chaotic system and image processing device
  • Image encryption method based on composite chaotic system and image processing device
  • Image encryption method based on composite chaotic system and image processing device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] see figure 1 The image encryption method based on the composite chaotic system provided by Embodiment 1 of the present invention includes the following steps:

[0027] S101. Using the Sine map, the Tent map and the Logistic map as seed maps, using cascade operations and nonlinear combinations to expand the chaotic range to generate a compound chaotic system.

[0028] In Embodiment 1 of the present invention, the nonlinear combination specifically includes addition and modulo operation.

[0029] The structure diagram of compound chaotic system is as follows: figure 2 shown. The definition formula of compound chaotic system is:

[0030] x n+1 =F(G(x n )+H(x n ))mod1 (1)

[0031] Among them, F(x), G(x) and H(x) are three seed maps. In Embodiment 1 of the present invention, Sine mapping, Tent mapping and Logistic mapping are selected as seed mapping, x n is the iteration value, x n+1 is the output of the composite chaotic system, and the mod operation is to ensur...

Embodiment 2

[0089] Embodiment 2 of the present invention provides a computer-readable storage medium, the computer-readable storage medium stores a computer program, and when the computer program is executed by a processor, the complex chaos system based Steps of an image encryption method.

Embodiment 3

[0091] Figure 8 A specific structural block diagram of an image processing device provided in Embodiment 3 of the present invention is shown. An image processing device 100 includes: one or more processors 101, memory 102, and one or more computer programs, wherein the processor 101 and the memory 102 are connected by a bus, the one or more computer programs are stored in the memory 102, and configured to be executed by the one or more processors 101, and the processor 101 executes the The computer program is used to realize the steps of the image encryption method based on the composite chaotic system provided in Embodiment 1 of the present invention.

[0092]In the present invention, Sine mapping, Tent mapping and Logistic mapping are used as seed mapping, and cascade operation and nonlinear combination are used to expand the chaotic range to generate a composite chaotic system; the composite chaotic system is used to generate a chaotic sequence to pre-encrypt the plaintext...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is applicable to the field of image encryption, and provides an image encryption method based on a composite chaotic system and an image processing device. The method comprises the following steps of taking Sine mapping, Tent mapping and Logistic mapping as seed mapping, and generating a composite chaotic system by utilizing a cascade operation and a nonlinear combination expansion chaotic range; generating a chaotic sequence by using a composite chaotic system to pre-encrypt the plaintext image, and generating a pre-encrypted image; and obtaining a reference image, combining thepre-encrypted image with the reference image, and generating a visually meaningful ciphertext image by using a discrete wavelet transform (DWT) algorithm. The method provided by the invention has a wider chaotic range and the more complex chaotic behaviors, and the encryption performance is improved. In addition, due to the fact that the visually significant ciphertext image is generated, the attack probability is reduced, the selected plaintext attack and the exhaustion attack can be resisted, and the encryption performance is better.

Description

technical field [0001] The invention belongs to the field of image encryption, in particular to an image encryption method and image processing equipment based on a composite chaotic system. Background technique [0002] Chaos-based image encryption technology is a technology that uses the basic characteristics of chaotic sequences and the characteristics of digital images to design encryption algorithms to improve encryption security and operational efficiency. Since digital images contain core confidential and sensitive information, such as military images, medical images, etc., reliable, fast and robust encryption algorithms are required to ensure the security and effectiveness of the transmission process. Chaos is a random-like behavior that does not require any additional random factors, that is, there is inherent randomness and an extremely sensitive dependence on the initial value. [0003] The application publication number is CN103971317A, and the Chinese patent ap...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06T1/00
CPCG06F21/602G06T1/0021Y02D30/50
Inventor 孙希延刘冬梅纪元法蓝如师罗笑南严素清付文涛李有明赵松克符强王守华
Owner GUILIN UNIV OF ELECTRONIC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products