Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Image encryption method based on adversarial nerve cryptography and SHA control chaos

An encryption method and cryptography technology, applied in the field of image encryption based on anti-neural cryptography and SHA control chaos, to achieve the effect of meeting encryption security, high sensitivity, and resisting plaintext and chosen plaintext attacks

Active Publication Date: 2021-02-26
NANCHANG UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Abadi et al proposed an ANC-based signal encryption method using GAN, where two neural networks named Alice and Bob try to exchange messages, but restrict another neural network named Eve from gaining information from eavesdropping

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image encryption method based on adversarial nerve cryptography and SHA control chaos
  • Image encryption method based on adversarial nerve cryptography and SHA control chaos
  • Image encryption method based on adversarial nerve cryptography and SHA control chaos

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to better explain the present invention and facilitate understanding, the present invention will be described in detail below in conjunction with the accompanying drawings and embodiments.

[0050] Such as figure 1 As shown, in terms of security, the ANC system designed by the present invention using the classical method involves three parts: Alice, Bob and Eve. Usually, Alice and Bob share a secret key K and confidentially transmit the plaintext P, Eve, as an attacker, wants to eavesdrop on the communication between Alice and Bob, and tries to obtain information about P through the ciphertext C, P Bob and P Eve The output of is computed by Bob and Eve respectively.

[0051] In the system framework of ANC, the network composed of Alice and Bob neural network is regarded as the generator in GAN, and the Eve neural network is regarded as the discriminator in GAN; the encryption process is mainly performed by Alice network, while the Bob network uses In the dec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an image encryption method based on adversarial neural cryptography and SHA control chaos, which is based on an adversarial neural cryptography (ANC), a secure hash algorithm (SHA) and an image encryption (IE) algorithm, and comprises the following steps of: inputting all binary hash values of which the SHA is 256 into an image P to obtain a binary hash value; 1) values within the range; according to the method for controlling chaotic mapping by generating the secret key based on the plaintext SHA256 algorithm, the diffusion performance of an encryption system is greatly improved, so that the system can further resist differential attacks, and can resist common attacks such as ciphertext only attacks, ciphertext selection attacks, known plaintext attacks and plaintext selection attacks. The method provided by the invention can be applied to the field of information safety transmission, such as image storage and transmission of Internet, mobile phones and video conferences.

Description

technical field [0001] The invention relates to the fields of image processing and information security, in particular to an image encryption method based on anti-neural cryptography and SHA control chaos. Background technique [0002] Nowadays, with the rapid development of information construction and multimedia technology, the application of various information technologies has rapidly penetrated into various fields of social economy, but at the same time there are many information security problems. Digital information has pervaded our lives, and information security technology is particularly important. Because digital image information is vivid and intuitive, images have become an important transmission medium, and many information is presented in the form of digital images, which has become one of the important means for human beings to express information. But at the same time, it also provides a channel for criminals to use the network to obtain unauthorized data. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06N3/04G06N3/08
CPCG06F21/602G06N3/08G06N3/045
Inventor 朱喜顺夏未霞祝盖林吴建华
Owner NANCHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products