Color image encryption method based on composite chaotic mapping

A color image and chaotic mapping technology, which is applied in the direction of chaos model, image data processing, image data processing, etc., can solve the problems of small key space, short cycle, large amount of calculation, etc.

Pending Publication Date: 2022-02-15
杭州安司源科技有限公司
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, there are many algorithms for image encryption, most of which use low-dimensional chaotic systems, whose key space is relatively small, it is difficult to effectively resist exhaustive attacks, and there are problems such as short periods in finite-precision systems.
If a high-dimensional chaotic system is used, the calculation amount is large

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Color image encryption method based on composite chaotic mapping
  • Color image encryption method based on composite chaotic mapping
  • Color image encryption method based on composite chaotic mapping

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention will be further described in detail in conjunction with the following specific embodiments and accompanying drawings. Key x during encryption 0 =y 0 =z 0 =C 0 = 0.1, m R =200, m B =300, m G =400, m 1 =500, R=2

[0036] Such as figure 1 As shown, a color image encryption method based on compound chaotic map, the specific implementation is as follows:

[0037] Step 1. Take the color image of size N*N as the original image Image1, such as Figure 5 shown;

[0038] Step 2. Extract the three RGB components of the original image, and convert the original image into a matrix D R ,D G ,D B . And calculate the gray value matrix D of the image 1 ;

[0039] Step 3. According to the gray value matrix D 1 And SHA-256 produces a 256-bit binary Hash value L 0 ;

[0040] Step 4, the L 0 Segmentation, every 8 bits, can get 32 ​​segmentation keys k i (i=1,2,...,32);

[0041] Step 5. Let the current number of rounds r=1, according to the segment...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a color image encryption method based on composite chaotic mapping. The method aims at solving the technical problems that an existing low-dimensional chaotic system is relatively small in secret key space, and a high-dimensional chaotic system is large in a calculation amount. Through a composite chaotic mapping method, two results generated by Logistic mapping and Chebyshev mapping are multiplied to obtain new output, and the problems that the low-dimensional chaotic system is small in key space and the high-dimensional chaotic system is large in calculation amount are solved. Meanwhile, the encryption method disclosed by the invention well destroys correlation between adjacent pixels, has relatively good encryption performance, has a larger key space to resist violent attacks, and enhances the security and reliability of a ciphertext image.

Description

technical field [0001] The invention relates to the field of color image encryption, in particular to a color image encryption method based on a composite chaotic network. Background technique [0002] With the rapid development of Internet technology and multimedia technology, digital information can be transmitted conveniently and quickly on the network in different forms. In transmission systems such as military coordinated operations, e-government, industrial collaborative design, scene monitoring, telemedicine and distance education, reliable image encryption technology is required. General image encryption is divided into two steps: scrambling and diffusion. The scrambling transformation can quickly scramble the pixel position, destroy the original spatial order and local correlation in the image, and make the image messy and unrecognizable. Diffusion technology refers to the replacement of image pixel values, and the change of one pixel value will affect the change ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00G06F21/60G06N7/08
CPCG06T1/0021G06F21/602G06N7/08
Inventor 徐智纬
Owner 杭州安司源科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products