Image encryption method based on three-dimensional composite scrambling model and chaos

A technology of three-dimensional composite and encryption method, which is applied in the direction of secure communication, image communication, and secure communication device through chaotic signals, which can solve the problems of weak security and low encryption efficiency

Active Publication Date: 2020-04-17
CHINA UNIV OF MINING & TECH
View PDF8 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Purpose of the present invention: In order to solve the problems of weak security or low encryption efficiency of existing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image encryption method based on three-dimensional composite scrambling model and chaos
  • Image encryption method based on three-dimensional composite scrambling model and chaos
  • Image encryption method based on three-dimensional composite scrambling model and chaos

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The implementation process of the present invention will be further described in detail below in conjunction with specific drawings and examples.

[0040] figure 2 is the encryption flowchart of this method.

[0041] The programming software used is Matlab R2016a, select image 3 One image with a size of 256×256 is shown as the original image.

[0042] Step 1: Segmentation of the original image: the original image is divided into 1024 image block sets with a size of 8×8.

[0043] Step 2: Chaotic sequence generation: select the initial value of PWLCM x 0 =0.203921568627451 and parameters p =0.190196078431373, iterate the map 512 times to get a chaotic sequence X ={ x i} 512 .

[0044] Step 3: Chaotic matrix generation: using the initial value y 0 = 1.708431372549026, z 0 = 2.352941176470588 ,u 0 = 1.563212352941176, v 0 = 3.256454901968599 and control parameters a =35, b =7, c =12, d =3, e =0.2, iterate Chen Chao’s chaotic system mapping 256×25...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an image encryption method based on a three-dimensional composite scrambling model and chaos, which belongs to the field of information encryption and aims at solving the increasingly severe problem of current network transmission security and protecting network interaction image content. In combination with bit plane decomposition, piecewise linear chaotic mapping, two-dimensional zigzag transformation and other technologies, a three-dimensional composite scrambling model is established on the basis of defining block built-in scrambling and block scrambling. Pixel scrambling is carried out on an original image by using the model, and diffusion operation is carried out on the scrambled image by using a mature hyper-chaotic system and exclusive-OR operation to obtainan encrypted image. Experiments show that the algorithm is good in encryption effect, high in security and efficient.

Description

technical field [0001] The method relates to an information encryption technology, in particular to an image encryption method. Background technique [0002] In the "Internet 2.0" era, network information interaction has widely penetrated into many fields such as daily life, business and military. The Internet is characterized by strong openness, and there is a risk of information leakage in the process of transmitting information through the Internet for massive images. Although researchers have proposed a variety of image encryption methods, there are problems such as weak security or low efficiency in these methods. [0003] Combining technologies such as bit-plane decomposition, Piece-Wise Linear Chaotic Map (PWLCM) and two-dimensional Zigzag transform, a three-dimensional compound scrambling model is established on the basis of defining block internal scrambling and block scrambling . In order to improve the security and efficiency of the encryption method and ensure...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04N1/44H04L9/00
CPCH04L9/001H04N1/44
Inventor 张晓强闫轩岗
Owner CHINA UNIV OF MINING & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products