Image encryption method based on multi-scroll chaotic system

A technology of chaotic system and encryption method, which is applied in the fields of confidential communication, information security, and computer image encryption. It can solve problems such as integration and limited number of chaotic system models, and achieve high security performance.

Pending Publication Date: 2020-03-27
DALIAN MARITIME UNIVERSITY
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the limited number of chaotic system models, commonly used systems are a

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image encryption method based on multi-scroll chaotic system
  • Image encryption method based on multi-scroll chaotic system
  • Image encryption method based on multi-scroll chaotic system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0056] It should be noted that the terms "first" and "second" in the description and claims of the present invention and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an image encryption method based on a multi-scroll chaotic system. The method comprises the following steps: S1, constructing a multi-scroll chaotic system based on a Chua's system; s2, setting chaotic secret key parameters, and generating a new multi-scroll chaotic system; s3, scrambling pixel points of the plaintext in combination with an Arnold mapping method; and S4, designing a random diffusion method based on the new multi-scroll chaotic system. According to the technical scheme, the problems that in the prior art, a chaotic system used for image encryption is toosimple in structure and low in complexity, and the ciphertext decoding resistance is not high due to the fact that the connection degree with an encryption algorithm is poor are solved. The image encryption method provided by the invention has better security and stronger anti-decoding capability.

Description

technical field [0001] The invention relates to the technical fields of secure communication, information security, and computer image encryption, in particular to an image encryption method based on a multi-scroll chaotic system. Background technique [0002] In recent years, the study of chaos theory has been one of the hot issues in the field of nonlinear science. Due to the high sensitivity and good pseudo-randomness of chaotic system, it has been widely used in the field of cryptography. Because the chaotic key generation mechanism is different from other traditional cryptosystems, it has great advantages in real-time encryption. Especially in the process of image processing, a large amount of data is required, and there is a strong correlation between adjacent data. This leads to low encryption efficiency of image information in traditional cryptography, which cannot even meet the needs of real-time encryption. Compared with traditional encryption methods, encryptio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06N7/08
CPCG06F21/602G06N7/08
Inventor 王兴元叶晓林
Owner DALIAN MARITIME UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products