Unlock instant, AI-driven research and patent intelligence for your innovation.

Image encryption and decryption method and device based on chaotic system

An encryption method and chaotic system technology, applied in the field of image processing, can solve the problems of high complexity of chaotic systems, unfavorable embedded implementation, and insufficient security performance, and achieve easy hardware implementation, short encryption time, and strong anti-deciphering ability Effect

Active Publication Date: 2019-07-12
SOUTHWEST UNIVERSITY
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On a PC, a chaotic system can be designed to encrypt images, but the codes for encryption and decryption and the copies of data generated will leave traces on the PC. If the security performance of the chaotic system is not good enough, it will easily cause leaks; The chaotic system is highly complex and requires high computing power, which is not conducive to the implementation of embedded systems.
[0003] In addition, for image encryption based on hardware, at present, the hardware verification of the algorithm is mainly done on FPGA and DSP. Although a good encryption effect can be achieved, the high cost of the chip is not conducive to market promotion.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image encryption and decryption method and device based on chaotic system
  • Image encryption and decryption method and device based on chaotic system
  • Image encryption and decryption method and device based on chaotic system

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment

[0102] Image encryption method:

[0103] Step 1: Input the original JPG image;

[0104] Step 2: read the relevant information of the input picture, decompose the original JPG image into several small image fragments, each image fragment after decomposition is called a decoding unit; decode the decoding units read by all image streams one by one . First, entropy decoding is carried out. Entropy decoding refers to recovering the DC coefficient and AC coefficient of DCT (discrete cosine transform) through the decoding algorithm according to the encoding table of the encoded and compressed image; then inverse quantization refers to encoding and compressing the JPG image. In the process, the frequency coefficient after DCT transformation is restored. The input is the data after entropy decoding, and then multiplied by the quantization table to complete the inverse quantization. The quantization table includes: brightness component quantization table and color difference component ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an image encryption method based on a chaotic system, encryption equipment and a storage medium. The specific implementation comprises: firstly, decoding an image in a corresponding format, and then performing pixel scrambling on pixels of three decoded channels through a sequence generated by a chaotic system, so that the purposes of encrypted transmission and storage of the image are achieved. By means of the image encryption device, the encryption time for finishing an image in a JPG format is shorter than 1 second, and the fidelity of the decrypted image is high andis basically consistent with that of an original image. The chaotic system adopts a double-chaotic system, the generated key has high anti-decoding capability, and the whole encryption and decryptionprocess is completed in the device, so that the information security is ensured; and the device is low in cost, low in power consumption and high in practicability.

Description

technical field [0001] The invention relates to the technical field of image processing, in particular to an image encryption method based on a chaotic system, an encryption device, and a storage medium. Background technique [0002] In recent years, with the development of network technology, the security of image transmission and storage has become a concern. At present, the image encryption device is mainly based on the PC end, or completed on some hardware. On the PC, a chaotic system can be designed to encrypt images, but the codes and data copies that complete the encryption and decryption will leave traces on the PC. If the security performance of the chaotic system is not good enough, it will easily cause leaks; Chaotic systems are highly complex and require high computing power, which is not conducive to the realization of embedded systems. [0003] In addition, for image encryption based on hardware, at present, the hardware verification of the algorithm is mainl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06T9/00G06F21/60G06N7/08G06T7/90
CPCG06T9/00G06T7/90G06F21/602G06N7/08G06T2207/10024
Inventor 罗小红詹明曾洁肖鸣郭靖
Owner SOUTHWEST UNIVERSITY
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More