Color image encryption method and system based on hyperchaos and double random phase encoding

A double random phase, color image technology, applied in image watermarking, image data processing, image data processing and other directions, can solve the problems of key cracking, affecting the efficiency of image encryption and decryption, and taking a long time.

Active Publication Date: 2020-04-21
SHENZHEN INSTITUTE OF INFORMATION TECHNOLOGY
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

First of all, the key of encryption technology based on low-dimensional chaotic system is too simple and easy to be cracked by illegal obtainers, especially for one-dimensional chaotic system
Secondly, for a high-dimensional chaotic system, although the key space becomes larger, the higher the dimension, the longer the generation time of the corresponding chaotic sequence, which affects the efficiency of image encryption and decryption, especially when frequently generated when chaotic sequence

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Color image encryption method and system based on hyperchaos and double random phase encoding
  • Color image encryption method and system based on hyperchaos and double random phase encoding
  • Color image encryption method and system based on hyperchaos and double random phase encoding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0122] Example 1: Key Sensitivity Experiment

[0123] Such as Figure 3-8 As shown, this example sets the key to x 0 =1,y 0 =0.1,z 0 =1.3, h 0 =4, for the plaintext image Lena( image 3 ) to encrypt and get the secret map ( Figure 4 ), the decrypted graph obtained by decrypting the secret graph with the correct key ( Figure 5 ). Then, the ciphertext image is decrypted with three groups of small perturbation keys respectively. Among them, the first group is x in the original key 0 perform a 10 -14 A small disturbance of the level, that is, x 0 =1+10 -14 ; The second group is the y in the original key 0 perform a 10 -14 A small disturbance of the level, ie y 0 =1+10 -14 ; The third group is z in the original key 0 perform a 10 -14 A small disturbance of the level, that is, z 0 =1+10 -14 . Figure 6-Figure 8 It shows the images after the secret image is decrypted with the first, second and third groups of keys respectively. Visible, even though the keys d...

Embodiment 2

[0124] Example 2: Key Sensitivity Experiment

[0125] In this example, 8000 pairs of adjacent pixels are randomly selected from the plaintext image and the ciphertext image, and then the correlation coefficient of adjacent pixels is calculated. Table 1 shows the correlation coefficients of the R, G and B components of plaintext and ciphertext images in three directions (horizontal, vertical and diagonal).

[0126] Table 1 Correlation coefficients of plaintext and ciphertext images in three directions

[0127]

[0128] It can be seen that in the plaintext image, the correlation between adjacent pixels is close to 1 in all directions, while in the ciphertext image, the correlation between adjacent pixels is close to 0 in all directions. This shows that the present invention can effectively eliminate the correlation between adjacent pixels. Figure 9 and Figure 10 Shown is the adjacent pixel distribution diagram of the plaintext image and the ciphertext image in the vert...

Embodiment 3

[0129] Example 3: Differential analysis experiment

[0130] As we all know, in cryptography or cryptanalysis, there are four classic attack methods: known plaintext attack, known ciphertext attack, chosen plaintext attack and chosen ciphertext attack. Among these attack methods, chosen-plaintext attack poses the greatest threat to cryptosystems. In the attack mode of chosen-plaintext attack, the attacker can pre-select a certain amount of plaintext to encrypt the encryption algorithm under attack to obtain the corresponding ciphertext. The attacker's goal through this process is to obtain some information about the encryption algorithm so that later the attacker can more efficiently crack information encrypted by the same encryption algorithm (and associated keys). If a small change (even 1 bit) of the plaintext image can change more than half of the pixels of the encrypted ciphertext image, then the differential attack will fail. Therefore, resisting differential attacks ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a color image encryption method and system based on hyperchaos and double random phase encoding, and belongs to the technical field of image encryption. The color image encryption method comprises the following steps: scrambling pixel positions of components of an original color image; carrying out chaos and diffusion on all scrambled components through a chaos sequence generated by the hyper-chaos system; and encoding the chaotic and diffused components by using double random phase encoding to obtain a color secret image. The invention also provides a system for realizing the color image encryption method. The method has the beneficial effect that the security and efficiency of chaotic digital image encryption are improved.

Description

technical field [0001] The invention relates to image encryption technology, in particular to a color image encryption method and system based on hyperchaos and double random phase encoding. Background technique [0002] With the rapid development of the network, people's economic life is more and more dependent on the network, so network security has become more and more important in recent years. Data communication has largely become networked in nature, and a large number of portable devices such as smartphones and tablets have embedded image processing functions. At the same time, communication channels, such as the Internet and wireless networks, although these technologies have brought great convenience to our lives, have also brought new challenges to privacy. In order to meet this challenge, it is necessary to encrypt and protect information related to national security, commercial interests, and personal privacy, especially during transmission. The chaotic image e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00
CPCG06T1/0021G06T1/005
Inventor 陈宝文程东升黄慧青
Owner SHENZHEN INSTITUTE OF INFORMATION TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products