Image encryption method based on chaotic mapping and chaotic S-box substitution

A technology of chaotic mapping and encryption method, applied in image data processing, image data processing, instruments, etc., can solve the problems of unsuitable digital image encryption, hidden dangers of digital image security, and high redundancy, so as to increase the cost of cracking and improve security. Sexuality, the effect of enhancing relatedness

Active Publication Date: 2021-06-04
HUAQIAO UNIVERSITY
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, because digital images are different from text information and have the characteristics of strong correlation, large data volume, and high redundancy, RSA, Data Standard Encryption (DES), Advanced Encryption Standard (AES), and International Data Encryption Algorithm ( IDEA) and other encryption algorithms are not suitable for the encryption of digital images, which makes digital images have great security risks in the process of transmission and storage.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image encryption method based on chaotic mapping and chaotic S-box substitution
  • Image encryption method based on chaotic mapping and chaotic S-box substitution
  • Image encryption method based on chaotic mapping and chaotic S-box substitution

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] The general idea of ​​the technical solution in the embodiment of the application is as follows: the hash value is obtained by performing hash calculation on the color image file, the system parameter P is obtained based on the hash value, and four initial values ​​of the four-dimensional hyperchaotic map are generated based on the hash value , the hash value is used as the system key, and the color image is encrypted by combining the four-dimensional hyperchaotic map and the chaotic S-box to improve the security of image encryption.

[0064] Please refer to Figure 1 to Figure 8 As shown, one of the preferred embodiments of an image encryption method based on chaotic mapping and chaotic S-box substitution of the present invention comprises the following steps:

[0065] Step S10, acquiring a color image file, performing a hash calculation on the color image file to obtain a hash value as a system key, and calculating a system parameter P based on the hash value;

[006...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an image encryption method based on chaotic mapping and chaotic S-box substitution in the technical field of image encryption, and the method comprises the steps: S10, obtaining a color image file, carrying out the Hash calculation, obtaining a Hash value, and calculating a system parameter based on the Hash value; step S20, generating four initial values of four-dimensional hyper-chaotic mapping based on the Hash values, and further obtaining four groups of chaotic pseudo-random sequences; s30, extracting a sequence Wz based on the chaotic pseudo-random sequence and system parameters, and generating a chaotic S box by using the sequence Wz and the S box using the AES algorithm; step S40, performing Arnold scrambling on the color image file to obtain a scrambled image, and performing byte substitution on the scrambled image by using a chaos S box to obtain a substituted image; and S50, performing image diffusion encryption on the three components of the RGB in the substitution image by using the chaos pseudo-random sequence and the system parameters to obtain three pieces of ciphertext data, and obtaining an encrypted image based on each piece of ciphertext data. The method has the advantage that the security of image encryption is greatly improved.

Description

technical field [0001] The invention relates to the technical field of image encryption, in particular to an image encryption method based on chaotic mapping and chaotic S-box substitution. Background technique [0002] With the development of the Internet and multimedia technology, the spread and influence of digital images continue to expand, and a large number of digital images are transmitted, shared and stored on the Internet every day. How to ensure the security of digital images involving sensitive information such as military, financial, political, and medical information during transmission and storage has always been a hot research topic in information security. The most direct way to protect digital images is to encrypt them. However, since digital images are different from text information and have the characteristics of strong correlation, large data volume, and high redundancy, RSA, Data Standard Encryption (DES), Advanced Encryption Standard (AES), and Interna...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G06T1/00
CPCG06F21/602G06F21/6209G06T1/0021
Inventor 唐加能陈锦源汤盈慧黄诚惕黄婷婷
Owner HUAQIAO UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products