Unlock instant, AI-driven research and patent intelligence for your innovation.

Image encryption method based on Tent mapping and composite chaotic mapping

A technology of chaotic mapping and encryption method, which is applied to secure communication, image communication, and key distribution through chaotic signals, and can solve problems such as relatively high requirements for computer computing power, poor encryption effect of image encryption algorithms, and inability of algorithms to resist brute force attacks. Achieve the effect of improving the ability to resist plaintext attacks, reducing execution costs, and improving security

Active Publication Date: 2020-12-29
HUAQIAO UNIVERSITY
View PDF8 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Due to the disadvantage of uneven mapping distribution in one-dimensional chaotic map, the encryption effect of the image encryption algorithm based on one-dimensional chaotic map is not good, and there is also the problem of small key space, which makes the algorithm unable to resist brute force attacks; although high-dimensional chaotic map Mapping has complex chaotic behavior and is difficult to predict, but it will lead to high execution cost of the algorithm and requires relatively high computing power of the computer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image encryption method based on Tent mapping and composite chaotic mapping
  • Image encryption method based on Tent mapping and composite chaotic mapping
  • Image encryption method based on Tent mapping and composite chaotic mapping

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] Please refer to Figure 1 to Figure 6 As shown, one of the preferred embodiments of the image encryption method based on Tent mapping and composite chaotic mapping of the present invention, comprises the steps:

[0051] Step S10, acquiring an original image with a size of M×N, and creating a matrix I with a size of M×N; storing the matrix information of the original image into the matrix I;

[0052] Step S20, generating 6 initial keys based on the matrix information stored in the matrix I;

[0053] Step S30, obtaining three chaotic sequences of the Tent map and the composite chaotic map based on the initial key; removing the first 1000 random numbers of each chaotic sequence to ensure the randomness of the chaotic sequence;

[0054] Step S40, performing two rounds of scrambling and diffusion operations on the original image based on the chaotic sequence to obtain an encrypted image.

[0055] In the step S10, the matrix information includes pixel positions and pixel va...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an image encryption method based on Tent mapping and composite chaotic mapping in the technical field of image encryption. The image encryption method comprises the following steps of: S10, acquiring an original image with the size of M*N, and creating a matrix I with the size of M*N, and storing matrix information of the original image into the matrix I; S20, generating sixinitial secret keys based on the matrix information stored in the matrix I; S30, acquiring three chaotic sequences of Tent mapping and composite chaotic mapping based on the initial keys; and S40, performing two rounds of scrambling diffusion operation on the original image based on the chaotic sequences to obtain an encrypted image. The image encryption method has the advantages that the security of image encryption is greatly improved, and the execution cost is reduced.

Description

technical field [0001] The invention relates to the technical field of image encryption, in particular to an image encryption method based on Tent mapping and composite chaotic mapping. Background technique [0002] With the rapid development of multimedia technology and the Internet, more and more images are transmitted, shared and stored on the Internet. The information security of images has always been a serious problem in the digital world. Although there are some traditional encryption algorithms with high security and mature verification capabilities, such as DES algorithm and RSA algorithm, due to the particularity of image data, traditional The encryption algorithm is not suitable for the field of image encryption. Images are usually described by two kinds of information, pixel position and pixel value, in the spatial domain, so the image encryption algorithm is mainly designed around two parts: scrambling and diffusion. The initial value sensitivity and other adv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04N1/32H04L9/00H04L9/08
CPCH04N1/32272H04L9/001H04L9/0869H04L9/0863
Inventor 唐加能汤盈慧陈锦源
Owner HUAQIAO UNIVERSITY