Image encryption and decryption method and image encryption and decryption system

An encryption and decryption, image technology, applied in the field of image processing, achieves the effect of good key sensitivity, less system resource occupation, and reduced storage space

Pending Publication Date: 2021-04-09
CHANGSHA UNIVERSITY OF SCIENCE AND TECHNOLOGY
View PDF1 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Therefore, there are deficiencies in the existing image encryption technology, which needs to be improved and improved.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image encryption and decryption method and image encryption and decryption system
  • Image encryption and decryption method and image encryption and decryption system
  • Image encryption and decryption method and image encryption and decryption system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] In order to make the object, technical solution and effect of the present invention clearer and clearer, the present invention will be described in further detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0056] Digital images have always been regarded as the main carrier of information exchange because of their intuitive, vivid and vivid features. The color and grayscale information of the image is mainly stored in the digital image file, but the image information in the process of image transmission may involve a large amount of private information, so ensuring the security of the image in the process of transmission and storage has become a concern and research the key of. More and more experiments prove that not all chaotic image encryption algorithms are safe. The present invention uses a ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an image encryption and decryption method and an image encryption and decryption system. The invention discloses an image encryption and decryption method, and the method comprises an image encryption operation step: S1, carrying out the decomposition and reconstruction of a bit plane of an original image, and obtaining a plaintext image; and S2, acquiring a pseudo-random key, and randomly scrambling the plaintext image to obtain an encrypted image. According to the image encryption and decryption method provided by the invention, the encrypted image obtained by using the encryption operation is subjected to security analysis and differential attack resistance analysis, so that the effectiveness of the algorithm is ensured, and the pixel correlation of the encrypted image tends to 0. Compared with an existing encryption algorithm in performance, a result obtained by feedback proves that the encrypted image obtained by using the image encryption method provided by the invention is excellent in safety performance.

Description

technical field [0001] The invention relates to the field of image processing, in particular to an image encryption and decryption method and an image encryption and decryption system. Background technique [0002] With the continuous development of information technology, the issue of information security is also increasingly concerned by the society, ranging from the security of national secrets to the security of personal privacy. Random numbers are closely related to cryptography, which has attracted much attention and attention because of its extreme sensitivity to keys, mixed data, pseudo-random behavior, and determinism. Therefore, the study of random sequence generators with cryptographic security has become a hot research topic. These generators can generate true random sequences or pseudo-random sequences and are called true random sequence generators and pseudo-random sequence generators, respectively. True random number generators based on physical phenomena (s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L29/06H04L9/08
CPCH04L9/001H04L9/002H04L9/0869H04L63/0428H04L63/1441
Inventor 陈曦乾帅余飞张梓楠蔡烁
Owner CHANGSHA UNIVERSITY OF SCIENCE AND TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products