Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Image encryption method based on new chaotic mapping and compressed sensing

A technology of chaotic mapping and compressed sensing, which is applied in the direction of secure communication, image communication, and advanced technology through chaotic signals, can solve problems such as low encryption efficiency and image encryption, reduce storage space and bandwidth, improve security, and improve image quality. The effect of the encryption effect

Active Publication Date: 2021-02-02
HENAN POLYTECHNIC UNIV
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Traditional encryption techniques, such as AES, DES, RSA and other encryption algorithms are used to encrypt text data, which can well protect text data information, and due to the inherent properties of images, such as large data capacity, correlation between adjacent pixels High reliability and redundancy, when traditional encryption technology is used to encrypt images, it will cause very low encryption efficiency, so traditional encryption technology is not suitable for encrypting images

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image encryption method based on new chaotic mapping and compressed sensing
  • Image encryption method based on new chaotic mapping and compressed sensing
  • Image encryption method based on new chaotic mapping and compressed sensing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0039] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0040] refer to figure 1 As shown, this embodiment provides a new image encryption method based on chaotic mapping and compressed sensing, which specifically includes the following steps:

[0041] S...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an image encryption method based on new chaotic mapping and compressed sensing. The method comprises the steps: S1, constructing a novel chaotic structure, and generating new chaotic mapping; S2, in a message sending process, calculating an interference parameter and an interference number, and calculating a row cyclic shift key and a column cyclic shift key; S3, interfering the to-be-transmitted image by using the interference parameter and the interference number; S4, constructing a measurement matrix used during compressed sensing by using the new chaotic mapping, and performing compressed encryption on the interference image through the measurement matrix; S5, performing cyclic shift encryption in the row direction by using the row cyclic shift key; S6, performing cyclic shift encryption in the column direction by using the column cyclic shift key, and transmitting a key generation parameter through a secure channel; S7, in a message receiving process, generating a decryption key through the key generation parameter, and finishing decryption of the to-be-transmitted image through the decryption key. According to the method disclosed in the invention, thesecurity in the image storage and transmission process can be effectively improved.

Description

technical field [0001] The invention relates to the technical field of image encryption, in particular to an image encryption method based on new chaotic mapping and compressed sensing. Background technique [0002] With the development and sharing of computer networks and the rapid development of the Internet, texts, images and other multimedia information are used in various industries in open networks (such as the Internet), and people can easily transmit and store various information through the network. media information. However, due to the security problems of the network itself, multimedia data is vulnerable to various attacks during the storage and transmission process in the network, so it is particularly important to ensure the security of media information data storage and transmission. As a kind of important multimedia data and as the carrier of information, digital image is more vivid, vivid and intuitive than text. It is not only widely used in daily life, bu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L29/06H04N19/42
CPCH04L9/001H04L63/0428H04N19/42Y02D30/70
Inventor 汤永利赵明洁叶青李莹莹赵明昊李丽香谭化钦李运辉
Owner HENAN POLYTECHNIC UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products