Unlock instant, AI-driven research and patent intelligence for your innovation.

Image encryption method based on improved Logistic mapping

An encryption method and image technology, applied in the direction of secure communication, instruments, and digital transmission systems through chaotic signals, can solve the problems of not being well verified, random sequences not obeying uniform distribution, etc., and achieve key space increase, random Sexual Enhancement Effects

Pending Publication Date: 2019-12-20
TIANJIN UNIV
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the continuous improvement and innovation of the encryption system, it is found that the random sequence generated by the traditional Logistic chaotic map does not obey the uniform distribution
Whether the image scrambling result based on the pure Logistic map satisfies the uniform distribution required by the encryption system has not been well verified.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image encryption method based on improved Logistic mapping
  • Image encryption method based on improved Logistic mapping
  • Image encryption method based on improved Logistic mapping

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0090] An image encryption method that simply scrambles image pixel positions and replaces pixel values. The encryption principle is as follows: figure 1 shown. The method consists of an encrypted part of the image and a decrypted part.

[0091] (1) The encrypted part of the image:

[0092] In the encryption process, the first pair of random sequences generated by the traditional Logistic mapping and the improved Logistic mapping are used to scramble the pixel positions of the image to be encrypted to realize the first encryption; then the second pair of random sequences generated by using the The pixel values ​​of the image encrypted for the first time are subjected to XOR operation to realize the replacement of pixel values ​​and obtain the final encrypted image.

[0093] (2) The decrypted part of the image:

[0094] In the decryption process, first use the second pair of random sequences to perform XOR operation with the encrypted image respectively to restore the initia...

Embodiment 2

[0097] Combine below figure 1 The design principle introduces the scheme in embodiment 1 in detail, see the following description for details:

[0098] In order to verify the validity and feasibility of the improved Logistic mapping scheme in detail, a simple image scrambling algorithm is designed combining the improved Logistic mapping scheme and the traditional Logistic mapping respectively. The block diagram of its encryption principle is as follows: figure 1 As shown, the encryption method consists of the encrypted part of the image and the decrypted part of the image. The specific implementation of these two parts will be described in detail below.

[0099] (1) The encrypted part of the image:

[0100] 1) First, the first pair of random sequences seq11 and seq12 generated by traditional Logistic mapping and improved Logistic mapping are used to scramble the pixel positions of image I to be encrypted respectively;

[0101]

[0102]

[0103] In the formula, seq11 ...

Embodiment 3

[0116] Below in conjunction with specific accompanying drawing, the scheme in embodiment 1 and 2 is carried out feasibility verification, see the following description for details:

[0117] The Lyapunov exponent distribution figure of the improved Logistic mapping proposed in traditional Logistic mapping and the present invention is as figure 2 (a) and figure 2 (b)-(d) shown.

[0118] image 3 (a) and image 3 (b) Distribution histograms of random sequences generated for traditional and improved logistic maps, respectively. Compared with the traditional Logistic mapping, the random sequence generated by the improved Logistic mapping satisfies the uniform distribution.

[0119] Adopt the first scheme among the present invention and the second scheme to original image (as Figure 4 (a) After encryption, the obtained encrypted image is as follows Figure 4 (b) and Figure 4 (c) shown.

[0120] Depend on Figure 5 (b) It can be seen that the second scheme is obviously str...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of chaotic systems and information security. The objective of the invention is to provide improved Logistic mapping. The method has effectiveness and feasibility in the aspects of shearing resistance, key sensitivity, histogram distribution, information entropy, correlation between adjacent coefficients and the like; the invention discloses an image encryption method based on improved Logistic mapping, which is applied to data encryption, and comprises the following steps of: 1) an encryption part: firstly, scrambling pixel positions of an image tobe encrypted by utilizing a first pair of random sequences generated by Logistic and improved Logistic mapping respectively; performing exclusive-OR operation to obtain a final encrypted image; and 2)a decryption part: firstly, carrying out exclusive-OR operation on the encrypted image by utilizing the second pair of random sequences to recover the initial pixel value, and then recovering the pixel position of the original image according to the transformation sequence of the pixel positions in the first encryption process, and the method is mainly applied to information encryption occasions.

Description

technical field [0001] The invention relates to the technical field of chaotic systems and information security, in particular to an improvement scheme proposed for the problem of uneven distribution of traditional Logistic mapping. Background technique [0002] With the development of computer and communication technology, especially the wide application of Internet, the security and confidentiality of multimedia information is becoming more and more important. In multimedia information, image information has become one of the important means for humans to express information because of its vivid images. How to protect digital images from tampering, illegal copying and dissemination has important practical significance. [0003] Due to the characteristics of pseudo-randomness, uncertainty, unpredictability and extreme sensitivity to control parameters and initial conditions, chaotic systems provide a good way for image information encryption. Encryption systems that use ch...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60H04L9/00
CPCG06F21/602H04L9/001G06F2221/2107
Inventor 唐晨马广彪
Owner TIANJIN UNIV