Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Asymmetric image encryption method based on quantum chaotic mapping and SHA-3

A technology of chaotic mapping and encryption method, which is applied in the direction of encryption device with shift register/memory, usage of multiple keys/algorithms, public key for secure communication, etc., which can solve key distribution and storage difficulties, image information Issues such as poor security hiding effect

Pending Publication Date: 2020-12-25
GUANGDONG OCEAN UNIVERSITY
View PDF1 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides an asymmetric image encryption method based on quantum chaotic mapping and SHA-3 in order to overcome the defects of difficulty in key distribution and storage and poor security hiding effect of image information described in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Asymmetric image encryption method based on quantum chaotic mapping and SHA-3
  • Asymmetric image encryption method based on quantum chaotic mapping and SHA-3
  • Asymmetric image encryption method based on quantum chaotic mapping and SHA-3

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0082] The accompanying drawings are for illustrative purposes only and cannot be construed as limiting the patent;

[0083] For those skilled in the art, it is understandable that some well-known structures and descriptions thereof may be omitted in the drawings.

[0084] The technical solutions of the present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0085] This embodiment proposes an asymmetric image encryption method based on quantum chaotic mapping and SHA-3, such as figure 1 As shown, it is a flow chart of the asymmetric image encryption method based on quantum chaotic mapping and SHA-3 in this embodiment.

[0086] In the asymmetric image encryption method based on quantum chaotic mapping and SHA-3 proposed in this embodiment, its specific steps are as follows:

[0087] S1: Use the RSA algorithm to randomly generate a key pair; the specific steps are as follows:

[0088] S1.1: Randomly select two differ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of image encryption, and provides an asymmetric image encryption method based on quantum chaotic mapping and SHA-3. The method comprises the following steps of: randomly generating a secret key pair through employing an RSA algorithm; preprocessing a plaintext image P to be encrypted; carrying out SHA-3 hash calculation on the preprocessed image to obtain a plaintext message value, and secretly storing the plaintext message value; encrypting the plaintext message value by using the RSA algorithm and a public key to obtain a ciphertext message value,constructing a mathematical model, and then inputting the plaintext message value and the ciphertext message value into the mathematical model for calculation to generate an initial key of quantum chaotic mapping; substituting the initial key of the quantum chaotic mapping into a formula of the quantum chaotic mapping to obtain a key stream sequence; and performing cyclic scrambling, XOR diffusion encryption, cyclic scrambling and modulo diffusion encryption operations on the preprocessed image in sequence according to the key stream sequence to obtain a final ciphertext image.

Description

technical field [0001] The invention relates to the technical field of image encryption, and more specifically, relates to an asymmetric image encryption method based on quantum chaotic mapping and SHA-3. Background technique [0002] As the most important form of information expression in multimedia information, digital images occupy an important position in life. There are certain risks in the dissemination of images on the Internet, especially private images. Therefore, the security issues of image communication and transmission have been widely concerned by experts and scholars in the industry. The application of cryptography technology mainly refers to providing confidentiality, integrity, authenticity, identification, controllability and non-repudiation of data. Cryptography can be divided into two categories according to the classification of cryptographic systems: symmetric cryptography and asymmetric (public key) cryptography, in which asymmetric (public key) cryp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/06H04L9/08H04L9/14H04L9/30
CPCH04L9/0643H04L9/302H04L9/0852H04L9/14H04L9/0825Y02D30/50
Inventor 黄小玲焦开心叶国栋
Owner GUANGDONG OCEAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products