Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Chaotic encryption and digital watermark image verification method and system

An encrypted image and chaotic encryption technology, which is applied in the field of information security, can solve problems such as chaos degradation, property damage of the receiver, and discontinuity of chaotic mapping, so as to prevent attacks and not be exchanged by stolen packets, good shear resistance and robustness Rod, good safety performance and deterministic effect

Pending Publication Date: 2021-07-09
SOUTH CHINA AGRI UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the advancement of technology, people have changed from traditional text communication to the current use of image information to communicate on the Internet. Once encrypted images are intercepted and destroyed during transmission, or replaced with pictures with viruses, the recipient It is not easy to detect and will cause damage to the recipient's property and other aspects;
[0003] In the early 1990s, researchers discovered the natural connection between chaos and cryptography. Because the chaotic system well reflects the characteristics of randomness, it can well match the design criteria of a perfect cryptographic system. The encryption system based on chaotic dynamics has strong flexibility in design and can provide a good balance between security and computing efficiency. It is especially suitable for encrypting digital images with a large amount of data and realizing the security of digital images. Real-time, secure transmission; initially in 1998, American scholar Jessica Fridrich proposed the first general-purpose image encryption architecture, which implements a security through two core processes of "permutation" and "substitution". image encryption system; therefore, it has been extensively studied by scholars in the field of image encryption in recent years, but encryption technology still faces many difficulties, and traditional chaotic image encryption algorithms are difficult to resist known plaintext attacks;
[0004] In order to solve the encryption algorithm's ability to resist known plaintext attacks, researchers at home and abroad have proposed improved image encryption algorithms on this basis. The classic methods include using hyper-chaos or composite chaotic systems to complete color image encryption, such as the above American scholar Jessica Fridrich proposed the first general-purpose image encryption architecture: in the scrambling phase, the pixel value of each point is attacked sequentially under the action of the key stream, and at the same time, the influence of each pixel is spread to the entire ciphertext image , so as to ensure that the encryption system can effectively resist chosen-plaintext attacks, but this method has a high time complexity and requires a long processing time;
[0005] Due to the disadvantages of the chaotic encryption algorithm itself, that is, it is difficult to resist the chosen plaintext attack, even if the chaotic encryption algorithm is improved, it is only slightly improved on the basis of it, and it is difficult to resist new or specific chosen plaintext attacks. Only defend against the more common selected plaintext, such as resisting differential attacks;
[0006] Chaos degradation occurs when implemented in a platform with a certain range of precision, because its output states cannot be uniformly distributed, and since there is no complex behavior, their trajectories can be easily predicted using certain techniques, and they There are only two cases of chaotic range, narrow or discontinuous. If the chaotic map has a narrow or discontinuous chaotic range, when its parameters are subject to some external interference, its chaotic properties are likely to be destroyed.
[0007] When verifying the security of chaotic encryption algorithms, researchers pay too much attention to statistical data and resisting a single chosen plaintext attack instead of in-depth analysis of the ability of the algorithm to resist specific attacks, and it is difficult to guarantee whether it has good shear resistance and robustness. Rod

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Chaotic encryption and digital watermark image verification method and system
  • Chaotic encryption and digital watermark image verification method and system
  • Chaotic encryption and digital watermark image verification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0057] Such as figure 1 As shown, the present embodiment provides an image verification method of chaotic encryption and digital watermarking, the method includes the following steps:

[0058] Chaotic encryption step: select the image to be encrypted, and perform chaotic encryption on the original image of the image to be encrypted to obtain the first encrypted image;

[0059] Watermark encryption step: selecting the first watermark code text, embedding the first watermark code text into the first encrypted image to form a second encrypted image containing the first watermark code text;

[0060] Verification step: receiving the second encrypted image, and judging whether the watermark information of the second encrypted image can be extracted according to the pre-extracted watermark processing result;

[0061] If not, it indicates that the image has been maliciously attacked during the transmission process, and the subsequent processing of the second encrypted image is termin...

Embodiment 2

[0079] Such as Figure 8 As shown, the present embodiment provides a chaotic encryption and digital watermark image verification system, the system includes: a chaotic encryption module, a watermark encryption module, a verification module and a decryption module;

[0080] In this embodiment, the chaotic encryption module is used to select the image to be encrypted, and perform chaotic encryption on the original image of the image to be encrypted to obtain the first encrypted image;

[0081] In this embodiment, the watermark encryption module is used to select the first watermark code text, and embed the first watermark code text into the first encrypted image to form a second encrypted image containing the first watermark code text;

[0082] In this embodiment, the verification module is used to receive the second encrypted image, and judge whether the watermark information of the second encrypted image can be extracted according to the pre-extracted watermark processing resu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an image verification method and system based on chaotic encryption and digital watermarking, and the method comprises a chaotic encryption step: selecting a to-be-encrypted image, and carrying out the chaotic encryption to obtain a first encrypted image; a watermark encryption step: embedding the first watermark code text into the first encrypted image to form a second encrypted image containing the first watermark code text; a verification step: judging whether the watermark information of the second encrypted image can be extracted according to the pre-extracted watermark processing result: if the watermark codes can be decrypted and the watermark codes are consistent when the similarity of the watermark codes is detected, continuing to execute the decryption step; otherwise, finishing the subsequent processing of the second encrypted image; and a decryption step: performing watermark removal processing to restore the first encrypted image, and decrypting the first encrypted image to obtain a decrypted image. According to the method, the defects of a chaotic encryption algorithm in resisting selected plaintext attacks are overcome by adopting the digital watermarking, so that the method has good shearing resistance and robustness, and image information transmission is safer.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an image verification method and system for chaotic encryption and digital watermarking. Background technique [0002] With the advancement of technology, people have changed from traditional text communication to the current use of image information to communicate on the Internet. Once encrypted images are intercepted and destroyed during transmission, or replaced with pictures with viruses, the recipient It is not easy to detect and will cause damage to the recipient's property and other aspects; [0003] In the early 1990s, researchers discovered the natural connection between chaos and cryptography. Because the chaotic system well reflects the characteristics of randomness, it can well match the design criteria of a perfect cryptographic system. The encryption system based on chaotic dynamics has strong flexibility in design and can provide a good balance betwee...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06T1/00G06F21/60G06F21/64
CPCG06T1/0021G06F21/602G06F21/64
Inventor 韩宇星顾一帆刘伟康
Owner SOUTH CHINA AGRI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products