Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Random blocking chaotic image encryption method

An encryption method and image technology, applied in the field of information security, can solve problems such as security risks, single encryption structure, and vulnerability to attacks, and achieve the effect of improving security and high efficiency

Pending Publication Date: 2020-07-24
NANCHANG UNIV
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The traditional block method adopts a fixed block method every time an image is encrypted. This method has a single encryption structure and is vulnerable to attacks
Especially after encrypting a large number of images, it will leave a lot of block information for the attacker, and there is a huge hidden danger in security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Random blocking chaotic image encryption method
  • Random blocking chaotic image encryption method
  • Random blocking chaotic image encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the drawings in the embodiments of the present invention.

[0048] The invention discloses a chaotic image encryption method of random blocks, the steps of which are as follows:

[0049] S1: Read the plaintext image A, set the size of the plaintext image A to be M×N, and a ij Represents the pixel in row i and column j in image A;

[0050] S2: Set keys x0, y0, z0, r and s0(1);

[0051] S3: Scramble the image:

[0052] S4: Decompose the replaced image into four sub-images A(1), A(2), A(3), A(4); swap the pixel values ​​at (0,0) and (a,b); where the initial value is set to (x 0 +mean{A} / 256mod 1,y 0 +mean{A} / 256mod 1), where mean{A} represents the average of the sum of pixels in image A.

[0053] S5: Use the initial value z 0 +mean{A} / 256mod 1, according to Logistic mapping z i+1 =f(z i )=rz i (1-z i ) and m p =floor(z p 10 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a random blocking chaotic image encryption method, and relates to the technical field of information security. The method comprises the following steps of: reading a plaintextimage A, setting the size of the plaintext image A to be M * N, and aij representing the pixel of the ith row and the jth column in the image A; setting secret keys x0, y0, z0, r and s0 (1); scrambling the image; decomposing the replaced image into four sub-images; and encrypting each sub-image by using integer Logistic mapping, combining all the encrypted sub-images, and storing the combined sub-images as an encrypted image. According to the invention, a random blocking strategy based on chaos is adopted, and the blocking scheme is randomly changed in each encryption, so that the security iseffectively improved. Meanwhile, a random blocking strategy is introduced, and meanwhile it is guaranteed that the image encryption algorithm has high efficiency.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a random-block chaotic image encryption method. Background technique [0002] Chaos is a complex nonlinear phenomenon. The characteristics of initial value sensitivity, fast decay autocorrelation, long-term unpredictability, quasi-randomness and determinism of chaotic maps meet the security requirements of key stream generation in cryptography. For this reason, keystream generation using chaotic maps has received extensive attention. [0003] With the development of multimedia, the confidentiality of image information has been paid more and more attention, and the encryption of images has also been extensively studied. Due to the strong redundancy of the image and the strong correlation between adjacent pixels, traditional encryption algorithms, such as DES, AES, RSA, are not suitable for image encryption, and the encryption efficiency is low. Because the chaotic ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60
CPCG06F21/602
Inventor 刘凌锋李向军魏智翔揭敏袁凌利喻鹏
Owner NANCHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products