Image encryption method and device based on cascade transformation

An encryption method and image technology, applied in image communication, computer security devices, instruments, etc., can solve problems such as time-consuming, and achieve the effects of high efficiency, high security, high transmission efficiency and security

Active Publication Date: 2019-11-05
CAPITAL NORMAL UNIVERSITY
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to improve the transmission efficiency of the image encryption system, some image encryption methods based on phase recovery have been proposed one after another, but this kind of method uses iterative calculation phase, the whole process is time-consuming, and mainly for grayscale images

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image encryption method and device based on cascade transformation
  • Image encryption method and device based on cascade transformation
  • Image encryption method and device based on cascade transformation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049]Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary and are intended to explain the present invention and should not be construed as limiting the present invention.

[0050] The following describes the image encryption method and device based on cascaded transformation according to the embodiments of the present invention with reference to the accompanying drawings. First, the image encryption method based on the cascaded transformation proposed according to the embodiments of the present invention will be described with reference to the drawings.

[0051] figure 1 It is a flow chart of an image encryption method based on cascading transformation according to an embodiment of the present invent...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an image encryption method and device based on cascade transformation, and the method comprises the steps: S1, generating a phase mask according to a chaotic sequence; s2, randomly generating a real integer matrix, and encoding the real integer matrix and the first color image to generate a full quaternion matrix; s3, performing modulation and quaternion Gyrator transformation on the full quaternion matrix according to the phase mask to obtain a first amplitude and a first phase; s4, encoding the first amplitude and the second color image to generate a quaternion matrix, and performing amplitude truncation to obtain a second amplitude and a second phase; s5, multiplying the first phase by the second phase, and performing modulation and quaternion Gyrator transformation on the quaternion matrix according to a phase mask to obtain a third amplitude and a third phase; s6, repeatedly executing S4 and S5 until the Nth amplitude and the Nth phase of the last color image are obtained. The method has relatively high transmission efficiency and security.

Description

technical field [0001] The invention relates to the technical field of image encryption, in particular to an image encryption method and device based on cascade transformation. Background technique [0002] In an informationized and networked society, multimedia data such as images, videos, and voices are widely used by people for information transmission and communication. In WeChat, people can conveniently send and share images, voices, etc. On the one hand, these multimedia data may contain personal privacy information and even involve the security of enterprises and countries; on the other hand, since these multimedia data are transmitted through the open Internet, and editing software can be used to easily tamper with images. Therefore, image content protection has become an important issue in the field of information security. [0003] As an effective technology to protect image content, image encryption has attracted extensive attention from scholars at home and abr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N1/32G06F21/60
CPCG06F21/602H04N1/32272
Inventor 邵珠宏尚媛园丁辉赵晓旭刘铁
Owner CAPITAL NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products