An Image Encryption Method Based on Filling Curve and Bit Scrambling of Adjacent Pixels

A technology of adjacent pixels and filling curves, applied in encryption devices with shift registers/memory, image communication, security communication devices, etc., can solve the problems of differential attack, failure to achieve strong diffusion characteristics, etc., and achieve good performance and high Key Sensitivity and Resistance to Differential Attacks, Effect of Improving System Security

Active Publication Date: 2021-10-26
ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Aiming at the technical problem that the key used in the existing encryption method will not dissipate the ordinary image, does not achieve strong diffusion characteristics, and is very vulnerable to differential attacks, the present invention proposes an image encryption method based on filling curves and adjacent pixel bit scrambling , combined with hyperchaotic system, Joseph ergodic and filling curve, has high security and high sensitivity, which improves the security of image transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Image Encryption Method Based on Filling Curve and Bit Scrambling of Adjacent Pixels
  • An Image Encryption Method Based on Filling Curve and Bit Scrambling of Adjacent Pixels
  • An Image Encryption Method Based on Filling Curve and Bit Scrambling of Adjacent Pixels

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0050] like Figure 9 As shown, an image encryption method based on filling curves and adjacent pixel bit scrambling has three main operations: first, in the pixel position scrambling, use the index composed of V-shaped curves to globally reset the image pixel position The second is location chaos: the bits of each pixel are traversed through Josephus traversal to realize the replacement and encryption of pixel values; finally, the pixels are further diffused ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention proposes an image encryption method based on filling curves and adjacent pixel bit scrambling, the steps are as follows: transform the grayscale image into a two-dimensional image matrix; calculate the hash value of the image matrix, and calculate the four-dimensional hyperchaos The initial value of the system; the V-shaped filling curve is used to scramble the image matrix, and the image matrix is ​​transposed for the second scrambling; according to the obtained initial value, the hyper-chaotic system is iterated to obtain four chaotic sequences; one chaotic sequence is used as the starting point , one is the step size, using the binary bits of the adjacent pixels of the Joseph traversal image matrix to scramble the adjacent pixel bits; using the sequence matrix obtained from the chaotic sequence to perform forward diffusion and reverse diffusion on the image respectively to obtain the ciphertext image. The present invention breaks the high correlation between pixels through the double replacement of bit level and pixel level, overcomes the selected / known plaintext attack and the statistical attack related to ordinary images, and has high key sensitivity and ability to resist differential attack .

Description

technical field [0001] The invention relates to the technical field of image encryption, in particular to an image encryption method based on filling curves and bit scrambling of adjacent pixels. Background technique [0002] With the rapid development of multimedia technology and the popularization of the Internet, the transmission, storage and sharing of images has become more and more convenient. These images usually carry some sensitive information. The encryption of digital images is an important guarantee for the safe storage and transmission of digital images. Therefore, in order to prevent image content from being illegally stolen and utilized, people are devoting themselves to developing efficient and secure image encryption algorithms. [0003] Image encryption is a research hotspot in the field of image processing and information security, and is widely used in national security, medical imaging, privacy information protection and other fields. Images have inhe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04N1/44H04L9/00H04L9/06
CPCH04L9/001H04L9/0643H04N1/4486
Inventor 牛莹张勋才景志勇杨存祥张建伟曹祥红吴艳敏
Owner ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products