Image encryption method based on Tent mapping and composite chaotic mapping
A technology of chaotic mapping and encryption method, which is applied to secure communication, image communication, and key distribution through chaotic signals, and can solve problems such as relatively high requirements for computer computing power, poor encryption effect of image encryption algorithms, and inability of algorithms to resist brute force attacks. Achieve the effect of improving the ability to resist plaintext attacks, reducing execution costs, and improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0050] Please refer to Figure 1 to Figure 6 As shown, one of the preferred embodiments of the image encryption method based on Tent mapping and composite chaotic mapping of the present invention, comprises the steps:
[0051] Step S10, acquiring an original image with a size of M×N, and creating a matrix I with a size of M×N; storing the matrix information of the original image into the matrix I;
[0052] Step S20, generating 6 initial keys based on the matrix information stored in the matrix I;
[0053] Step S30, obtaining three chaotic sequences of the Tent map and the composite chaotic map based on the initial key; removing the first 1000 random numbers of each chaotic sequence to ensure the randomness of the chaotic sequence;
[0054] Step S40, performing two rounds of scrambling and diffusion operations on the original image based on the chaotic sequence to obtain an encrypted image.
[0055] In the step S10, the matrix information includes pixel positions and pixel va...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


