Compressible six-dimensional non-degenerate hyperchaotic image secrecy system and method

A security method and hyper-chaotic technology, which are applied in secure communication through chaotic signals, transmission systems, image communication, etc., can solve the problems of image encryption algorithm, such as large computational load, low computational efficiency, low time series complexity, etc., to improve discrete speed, randomness, and security

Pending Publication Date: 2022-01-04
HUNAN UNIV OF SCI & TECH
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a compressible six-dimensional non-degenerate chaotic image encryption system and method to solve the problem of low time series complexity generated by traditional chaotic systems, large amount of calculation and low operation efficiency of image encryption algorithms based on chaotic systems The problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Compressible six-dimensional non-degenerate hyperchaotic image secrecy system and method
  • Compressible six-dimensional non-degenerate hyperchaotic image secrecy system and method
  • Compressible six-dimensional non-degenerate hyperchaotic image secrecy system and method

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach 1

[0056] Specific implementation mode one: combine figure 1 To describe this embodiment, figure 1 It is a flow chart of system operation of the present invention. A compressible six-dimensional non-degenerate hyper-chaotic image security system, the plaintext image is subjected to DCT transformation at the encryption end to form a coefficient matrix, and the coefficient matrix is ​​compressed to form a compression coefficient matrix; the compression coefficient matrix is ​​scrambled and diffused. The ciphertext is formed; the decryption end diffuses and scrambles the ciphertext to obtain the decrypted compression matrix, and expands the decrypted compression matrix to the size of the original coefficient matrix with 0 and performs IDCT transformation to obtain the plaintext image.

specific Embodiment approach 2

[0057] Specific implementation mode two: combination figure 2 To describe this embodiment, figure 2 It is a block diagram of hardware implementation of the encryption system of the present invention. The plaintext image is transformed by integer DCT to form a coefficient matrix, and the cropping size of each transform block coefficient matrix is ​​set to n x m , before extracting each transform block coefficient matrix n Front row m The columns recombine the compression factor matrix, forming the size w' x h' The compression factor matrix. The ARM processor in the SOPC further processes the compression coefficient matrix into a quotient matrix and a modulus matrix, and stores them in the data cache device at the encryption end. The FPGA in the SOPC uses the 32-bit fixed-point Euler algorithm to discretize the hyper-chaotic system at the encrypted end, and the discretized results are stored in the data cache device at the encrypted end through the AXI4 (Advanced Extens...

specific Embodiment approach 3

[0058] Specific implementation mode three: combination image 3 To describe this embodiment, image 3 It is a block diagram of hardware realization of the decryption system of the present invention. The ARM processor reads the ciphertext in the storage medium to the cache device, and the FPGA in the SOPC uses the 32-bit fixed-point Euler algorithm to discretize the hyper-chaotic system at the decryption end, and the discretized results pass through the AXI4 interface stored in cache. The ARM processor performs reverse diffusion, forward diffusion, and scrambling decryption operations on the ciphertext quotient matrix and ciphertext modulus matrix in combination with the hyperchaotic discretized sequence. The decrypted quotient matrix and modulus matrix are restored to a compression coefficient matrix, and the compression coefficient matrix of each transform block is expanded with 0 to a transform block expansion coefficient matrix with a size of 32×32. All transformation bl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a compressible six-dimensional non-degenerate hyperchaotic image secrecy system and method. Image data are compressed at an encryption end to obtain a compression coefficient matrix, and the matrix is encrypted by combining a hyperchaotic sequence at the encryption end to obtain ciphertext data. And the decryption end sets an initial value of the hyper-chaotic system according to the key, decrypts the ciphertext data by a chaotic sequence of the hyper-chaotic system of the decryption end, and further reduces the ciphertext data to obtain a plaintext image. The encryption end and the decryption end complete encryption and decryption operations by using SOPC resources, the FPGA performs parallel acceleration on the hyperchaotic discretization process in the SOPC, and the ARM processor completes the image encryption and decryption process in combination with a chaotic sequence. According to the method, hardware resources can be effectively saved in the application process, the discretization speed of the hyperchaotic system is increased by applying the parallel computing advantages of the FPGA, and then the working efficiency of an image secrecy system is improved.

Description

technical field [0001] The invention relates to the field of image encryption, in particular to a compressible six-dimensional non-degeneracy hyperchaotic image encryption system and method. Background technique [0002] With the rapid development of information technology in recent years, social production and life are closely related to the network. As an important information carrier for network transmission, images are widely used in national defense, medical, social, monitoring and other fields. Therefore, it is very important to prevent digital images from being tampered with and information leakage, and establishing a secure image confidential communication mechanism has become an urgent problem to be solved. [0003] The high-dimensional non-degenerate chaotic system refers to the chaotic system in which the number of positive Li's exponents reaches the maximum. Chaotic systems, especially high-dimensional non-degenerate chaotic systems, have the advantages of sens...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04N1/32H04N1/44H04N19/625
CPCH04L9/001H04N1/32272H04N1/4486H04N19/625
Inventor 于文新周躜波王俊年刘美婷李燕
Owner HUNAN UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products