Hyperchaos-based parallel encryption method for images in network office official document

An encryption method and ultra-chaotic technology, applied in the field of new parallel digital image encryption, can solve problems such as hidden dangers of multimedia data security, and achieve the effects of improving plaintext sensitivity, enhancing sensitivity, and increasing computing speed

Pending Publication Date: 2022-05-10
HARBIN UNIV OF SCI & TECH
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the public cloud storage platform provides convenient storage and low-cost services for the majority of users, but there are a large number of security risks in the storage process of the user's multimedia data on the cloud platform.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hyperchaos-based parallel encryption method for images in network office official document
  • Hyperchaos-based parallel encryption method for images in network office official document
  • Hyperchaos-based parallel encryption method for images in network office official document

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0137] Example 1, constructing a chaotic password generator

[0138] The overall encryption process requires a pseudo-random chaotic sequence generated by a chaotic cipher generator for scrambling and diffusion operations in the encryption process. The chaotic cipher generator is constructed from a "key string", and the "key string" is composed of three groups of mutually iterative "keys": 2D-Logistic key, RANSAC-circle key, superLorenz key. The four sequences generated by the chaotic cipher generator are used for preprocessing, scrambling, diffusion and other operations in the encryption process;

[0139] Use P to represent the sample electronic document image. If the length and width are not divisible, it will be corrected with a pixel value of 0. The corrected image size is 800×800. The key generation steps are as follows:

[0140] Func1.1, 2D-Logistic key

[0141] The key is based on a two-dimensional Logistic (ie, 2D-Logistic) map and serves as the initial iteration key...

example 2

[0177] Example 2. Digital image encryption

[0178] First, the network electronic document image P is divided into block images in units of 2×2, and put into a parallel pool for parallel encryption operations. If the length and width are not divisible by an integer, it will be corrected with a pixel value of 0, and the corrected size will be 640,000. Taking the first image P1 as an example, preprocess P1 to obtain a preprocessed image P', and then perform plaintext-independent forward diffusion, plaintext correlation scrambling, and plaintext-independent backward diffusion on each image in parallel, and finally obtain electronic Official document ciphertext image C.

[0179] Its specific steps are described as:

[0180] Func2.1, digital image preprocessing

[0181] The specific steps are described as:

[0182] The plaintext block image P1 and the random matrix X(400,400) are subjected to bit-level bit XOR processing to obtain the preprocessed image P';

[0183] Func2.2, pl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a hyperchaos-based parallel encryption method for images in network office official documents. Comprising the steps that 1, a chaotic password generator is composed of a secret key string, and the secret key string is composed of three sets of secret keys which are mutually iterated, wherein the three sets of secret keys are a 2D-Logistic secret key, an RANSAC-circle secret key and a superLorenz secret key; 2, receiving a network electronic official document image, and adopting a preprocessing-diffusion-scrambling-diffusion architecture mode in an encryption process to realize block parallel encryption; according to the method, the image key sensitivity is effectively improved, the calculation time of image encryption with large data is shortened, the key space is expanded, the calculation speed of the encryption process is improved, and hacker attacks such as statistical attacks and differential attacks are effectively resisted; according to the method, the problem of data inconsistency caused by calculation of different word lengths in network transmission is solved, the safety of cross transmission of sensitive document picture data in a public network is guaranteed, and the method can be applied to the field of information safety application such as network official documents and the like.

Description

technical field [0001] The invention belongs to the field of image encryption and parallel computing, and in particular relates to a novel parallel digital image encryption method in network office approval documents based on HyperChaotic Maps. Background technique [0002] With the development of distributed computer networks, digital image processing, and mobile storage devices, digital images, one of the important carriers for disseminating electronic information today, have been widely used in many fields. Due to the cross-transmission of information on the public network, it is vulnerable to various security threats during the dissemination process, such as illegal theft, malicious tampering, and private copying. Therefore, a large number of potential dangers in the process of digital image transmission in public networks have aroused extensive attention of researchers in the field of information security. [0003] The essence of digital image encryption is to quickly ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/20H04L9/08H04N1/32
CPCH04L9/001H04L9/0656H04L9/0869H04L9/002H04N1/32272
Inventor 刘嘉辉仇化平杜金
Owner HARBIN UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products