Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Image encryption method and device based on double-entropy source hyperchaotic system and storage medium

An encryption method and chaotic system technology, which can be used in secure communication through chaotic signals, transmission systems, digital transmission systems, etc., and can solve problems such as poor key sensitivity, insufficient key space, and cracking.

Active Publication Date: 2021-03-23
CHANGSHA UNIVERSITY OF SCIENCE AND TECHNOLOGY
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But at present, there are still the following defects in encrypting images through chaotic systems: (1) The key space is insufficient, which makes it easy to be cracked by brute force attacks; (2) The key sensitivity is poor, and the ability to resist differential attacks is poor; (3) The ability to resist entropy attacks Difference

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image encryption method and device based on double-entropy source hyperchaotic system and storage medium
  • Image encryption method and device based on double-entropy source hyperchaotic system and storage medium
  • Image encryption method and device based on double-entropy source hyperchaotic system and storage medium

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example ;

[0043] refer to image 3 , an embodiment of the present invention provides a kind of image encryption method based on double entropy source hyperchaotic system, and this method can realize under MATLAB environment, and method comprises the following steps:

[0044] S100. Construct a pseudo-random number generator based on a dual-entropy source chaotic system according to the six-dimensional memristive hyperchaotic system and the two-dimensional SF-SIMM hyperchaotic map.

[0045] S200. Generate several pseudo-random sequences by iterating the pseudo-random number generator based on the dual-entropy source chaotic system, wherein several initial values ​​of the six-dimensional memristive hyperchaotic system and the two-dimensional SF-SIMM hyperchaotic map are used as the original key.

[0046] The initial value in this step refers to the initial conditions or system parameters of the six-dimensional continuous memristive hyperchaotic system and the two-dimensional discrete SF-S...

no. 2 example ;

[0052] refer to Figure 4 , as an implementable manner, step S400 in the first embodiment includes the following steps:

[0053] S401. Generate a first image by diffusing a plaintext image according to a corresponding pseudo-random matrix.

[0054] S402. Shuffle the first image into a second image according to the corresponding pseudo-random matrix.

[0055] S403. Diffusion forward the second image from the last pixel according to the corresponding pseudo-random matrix until the second image is diffused into a ciphertext image.

[0056] Of course, step S400 may also use a diffusion-scrambling encryption structure commonly used in this field. Compared with the existing diffusion-scrambling encryption structure, the method of this embodiment adopts the encryption structure of scrambling-diffusion-scrambling, which can make the spatial distribution and gray level distribution of image pixels more uniform, and improve the robustness of image encryption .

no. 3 example ;

[0058] refer to Figure 14 , provides a specific example of an image encryption method based on a dual-entropy source hyperchaotic system, the method includes the following steps:

[0059] S100. Construct a pseudo-random number generator based on a dual-entropy source chaotic system according to the six-dimensional memristive hyperchaotic system and the two-dimensional SF-SIMM hyperchaotic map.

[0060] S200. By iterating the pseudo-random number generator based on the dual-entropy source chaotic system, several pseudo-random sequences are generated, wherein some initial values ​​of the six-dimensional memristive hyperchaotic system and the two-dimensional SF-SIMM hyperchaotic map, and The iterated transition value as the original key. Note that Figure 14 The DECHCS in The said pseudo-random number generator.

[0061] In this embodiment, (x 1 (0),x 2 (0),x 3 (0),x 4 (0),x 5 (0),x 6 (0), r 1 ,r 2 ,y 1 (0),y 2 (0))=(0.05,0,0.2,1,0,0.5,35,201,1,1) as the original ke...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an image encryption method and device based on a double-entropy source hyper-chaotic system and a storage medium, and the method comprises the steps: firstly constructing a pseudo-random number generator based on a six-dimensional memristor hyper-chaotic system and two-dimensional SF-SIMM hyper-chaotic mapping, and obtaining a complex sequence with a double-entropy source structure; performing iteration by a pseudo random number generator to obtain a corresponding pseudo random matrix; and finally, diffusing pixels of the original image based on the obtained pseudo-random matrix, and encrypting the original image into a ciphertext image. According to the method, a six-dimensional memristor hyper-chaotic system and two-dimensional SFSIMM hyper-chaotic mapping are combined and applied to image encryption, a new image encryption method is provided, and the method has high key sensitivity and high differential attack resistance; the secret key space is far large, and violent attacks can be effectively resisted; the information of the ciphertext image can be well hidden, and the security of the ciphertext image is ensured; the information entropy of the ciphertext image is very close to a theoretical value, and the method has high entropy attack resistance.

Description

technical field [0001] The invention relates to the technical field of image encryption, in particular to an image encryption method, device and storage medium based on a dual-entropy source hyperchaotic system. Background technique [0002] With the rapid development of computer technology and communication technology, information has become an important resource in today's society, and the information security problems caused by it have become increasingly prominent. In order to ensure the security of information, cryptographic technology is applied to information systems to realize the confidentiality, integrity, availability, controllability and non-repudiation of information. [0003] Chaos is widely used in complex networks, electronic circuits, image encryption, synchronization control, secure communication and other fields due to its good random characteristics, extreme sensitivity to initial values ​​and parameters, and long-term unpredictability and ergodicity of o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L29/06H04L9/08
CPCH04L9/001H04L63/0428H04L9/002H04L63/1441H04L9/0869
Inventor 余飞乾帅陈曦张梓楠蔡烁
Owner CHANGSHA UNIVERSITY OF SCIENCE AND TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products