Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

231 results about "Chaotic encryption" patented technology

Encryption and decryption method for numeric type data

The invention discloses an encryption and decryption method for numeric type data. The method comprises the following steps that the numeric type data is converted into character strings; each character is sequentially converted into 4 bits according to the correspondence relationship between the numeric characters and the binary system, and a bit stream is formed; the number of 0 and 1 in the bit stream is counted, and an encryption secret key is obtained through calculation; the encryption secret key is utilized, a chaotic sequence with the pseudo-random property is generated by a chaotic system, in addition, chaotic signals are taken from the chaotic sequence and are sequenced in an ascending sequence, and the bit stream is scrambled according to the positions in accordance with the scrambling rule; the corresponding relationship between the four-digit binary coding mode and the visible ciphertext characters is utilized for converting the scrambled bit stream into the visible ciphertext character strings, and the ciphertext can be decrypted and recovered into the original data type data through adopting the similar method. According to the method provided by the invention, the corresponding table customization is adopted, the numeric type data is subjected to binary scrambling chaotic encryption processing, the safety and the feasibility of the data encryption are ensured, and in addition, the encryption efficiency is also greatly improved.
Owner:南通九盛软件有限公司

Secondary chaotic encryption optical communication system based on phase transformation

The invention discloses a secondary chaotic encryption optical communication system based on phase transformation. The system comprises an optical signal transmitting device, a chaotic combined phase transformation encryption device, a transmission fiber, a chaotic combined phase transformation decryption device and a signal receiving device. The signal encryption part is a chaotic encryption module added with a phase transformation decryption device in a feedback loop, and the signal decryption device is an open-loop chaotic laser receiving module comprising a phase transformation decryption device. The system overcomes the defect that encryption variables of a chaotic encryption system are few; by combining phase transformation decryption with chaotic encryption, an eavesdropper is difficult in analyzing and attacking the energy; high-speed signals can be supported, and 10 Gb/s high-speed signals can be directly encrypted; a light emitting source of an existing WDM (Wavelength Division Multiplexing) system can be directly used for encrypting, and a special ultra-short pulse light source is not needed; and decryption can be implemented by using the same phase transformation modules at the receiving end as at the transmitting end, so that the adjusting difficulty is reduced without changing the confidentiality.
Owner:SHANGHAI JIAO TONG UNIV

A multi-channel color image chaotic encryption method based on DNA coding

The invention discloses a multi-channel color image chaotic encryption method based on DNA coding, relates to the field of digital image encryption, and aims to solve the problems that an existing image chaotic encryption scheme is insufficient, and a high-dimensional continuous time chaotic system is complex in discrete process algorithm, so that the safety of an encrypted image is low, and the acquisition of a discrete chaotic sequence is time-consuming. A six-dimensional discrete hyper-chaotic system is used for generating six groups of chaotic sequences, and a Hash function SHA-256 is usedfor generating a system iteration initial value; RGB (red, green and blue) components of the color image are extracted, DNA (deoxyribonucleic acid) coding is performed on each component to obtain a DNA matrix, the DNA matrixes is merged, a recombinant DNA matrix is constructed, and row and column scrambling operation is executed; Then, the scrambled DNA matrix is splitted into three matrixes withthe same size, respectively DNA calculation is carried out on the three matrixes and the three chaotic key matrixes subjected to DNA coding, and DNA decoding operation is carried out on the obtainedmatrixes; diffusion encryption operation is performed on the decoding matrix, wherein the encryption round number is determined by SHA-256. The encryption effect is good and the security is high.
Owner:HARBIN UNIV OF SCI & TECH

High-robustness digital watermarking method making color QR code embedded in color image

The invention relates to a high-robustness digital watermarking method making a color QR code embedded in a color image. Based on a color QR code, a Contourlet transformation technology, a DCT (discrete cosine transformation) technology and an SVD (singular value decomposition) transformation technology, the color QR code is adopted as original watermark information. The method includes the following steps that: a color host image and the color QR code are water-marked in an RGB space so as to be subjected to three-channel decomposition, and three-channel watermarks obtained after the decomposition are subjected to chaotic encryption separately; Contourlet transformation is performed on each channel image of the color host image, and DCT is performed on the low-frequency components of the channel images, and the direct-current components of the channel images are adopted to construct new matrixes, SVD transformation is performed on the new matrixes, so that singular value matrixes can be obtained; and the watermarks are embedded into corresponding channels, SVD inverse transformation, inverse DCT, and Contourlet inverse transformation are carried out, so that the color image containing the watermarks can be obtained. Compared with an existing algorithm for embedding color watermarks into a color image, the high-robustness digital watermarking method of the invention has the advantages of high imperceptibility and high robustness.
Owner:UNIV OF SHANGHAI FOR SCI & TECH

Internet picture transparent and safe transmission method based on chaotic encryption

The present invention relates to an internet picture transparent and safe transmission method based on chaotic encryption, and provides a chaotic digital image encryption transmission solution scheme which supports the automatic generation of a secret key and is fully transparent to the internet user operation. According to the internet picture transparent and safe transmission method based on the chaotic encryption, a browser client utilizes a JavaScript program to automatically map, calculate and obtain two key Logistic chaotic secret key parameters according to the information, such as the usernames, password Hash values, etc. inputted by the internet valid users, to realize the safe and transparent encryption and transmission on the to-be-uploaded pictures of users; a server terminal can query a user database according to the registered username to obtain the password Hash value of a user, so that a same chaotic random sequence can be obtained, and finally the encrypted pictures uploaded by the user can be decrypted; on the contrary, when the user registers validly to require the server pictures, the JavaScript program can automatically carry out the chaotic secret key parameter calculation and chaotic decryption operations at a browser terminal. According to the scheme of the present invention, the balance problem among the security, the encryption efficiency, the secret key management and the like of the internet picture transmission can be solved effectively.
Owner:ZHEJIANG UNIV OF TECH

Network video monitoring system based on FPGA chaotic encryption

The invention relates to a network video monitoring system based on FPGA chaotic encryption, comprising a server terminal, a client terminal and a system configuration terminal. The server terminal comprises a plurality of cameras, a video server, an encryption module and a signal sending module; the client terminal comprises a signal receiving module, a decryption module and a client terminal player; video frequency collected by the plurality of cameras is coded by the server, then input into the encryption module via the Ethernet and sent to the client terminal via the signal sending module after encrypted; the signal receiving module of the client terminal receives the encrypted video data and then sends the data to the decryption module for processing and finally the client terminal player plays the video data; the encryption module and the decryption module are respectively an FPGA encryption board and a decryption board; the encryption process and the decryption process of the encryption module to video flow are as follows: the encryption module adopts a CPRS array which is cut and operates with a plain text data module 2, and then sent; and the receiving terminal of the decryption module obtains the same CPRS array, and then operates with a cryptograph module to realize decryption.
Owner:NANJING UNIV

True random number generation method based on chaotic encryption

InactiveCN102541509AIncrease the differenceEasy and convenient to getRandom number generatorsChaotic systemsMATLAB
The invention discloses a true random number generation method based on chaotic encryption. The true random number generation method comprises the following steps of: recording a piece of audio by portable digital voice recording equipment; converting the format of the audio into a wav format, introducing the audio into MATLAB software installed in computer equipment, and reading a signal (y), a sampling rate Fs and sampling bits of the audio; generating a chaotic sequence, of which the length is same as the length of the value sequence of the signal (y), by a chaotic system, wherein an initial value and a system parameter of the chaotic system guarantee that the system generates a chaotic behavior after iteration; encrypting the value sequence of the signal (y) by the chaotic sequence to generate an encrypted true value sequence; and performing binary processing on the encrypted true value sequence, wherein a binary output is a true random number. An audio signal is recorded by a portable device so that a random source is acquired easily and conveniently; the acquired audio sequence is encrypted by the chaotic sequence so that the difference of audio signals recorded at different times is further expanded; and the random number can be generated by using regular audios, such as music with weak background noise.
Owner:HENAN UNIV OF SCI & TECH

Classified passive optical network based on synchronization of chaos

The invention discloses a classified passive optical network based on synchronization of chaos, and belongs to the technical field of classified optical communication. N pairs of semiconductor lasers with the same operating wavelength are adopted at two ends of an OLT and two ends of an optical network unit to serve as a chaotic carrier wave generator. Uplink information and downlink information are respectively loaded to n chaotic carrier waves with different wavelengths through an optical modulator to achieve information chaotic encryption, up-load and down-load are carried out through optical fibers after combination by adopting a wavelength-division multiplexing technology, and at last information decryption is achieved by adopting a chaotic carrier wave with the same wavelength. An all-optical chaotic signal is used as a carrier wave and combined with the wavelength-division multiplexing technology to carry out classified transmission on uplink information and downlink information, information security of the passive optical network is improved from a physical layer, the classified passive optical network based on synchronization of the chaos is suitable for a communication service with high requirements in information confidentiality, and reference significance is provided to improve safety of the passive optical network.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

QR two-dimensional code binary image partition-based key varying chaotic encryption method

InactiveCN103414549AAdd auxiliary keyImplement chaotic encryptionRecord carriers used with machinesSecuring communicationComputer hardwareTransfer procedure
The invention relates to a QR two-dimensional code binary image partition-based key-varying chaotic encryption method. The method comprises the following steps that: 1), a traditional logistic chaotic mapping encryption algorithm is improved in a manner that an auxiliary key is added such that a new initial value x0 can be formed; 2), an original QR-code binary image is partitioned, and the total number of sub-region images of which the pixel is 1 is calculated, and therefore, the initial values of random keys of sub-blocks are formed; and 3), the auxiliary key and the random key are combined with partition encryption technology, such that QR code binary image partition-based key-varying chaotic encryption and decryption algorithms can be realized. With the QR two-dimensional code binary image partition-based key-varying chaotic encryption method adopted, random variation of keys can be realized; key space and key paths can be expanded; the reliability and security of encryption can be enhanced; a requirement for QR code information confidentiality in storage and transmission can be satisfied; and at the same time, an encryption effect, encryption speed and cracking difficulty are further improved. The QR two-dimensional code binary image partition-based key-varying chaotic encryption method of the invention is advantageous in convenience, practicability, safety and reliability.
Owner:GUANGDONG UNIV OF TECH

Chaotic image encryption method based on bit replacement and dynamic DNA coding

The invention provides a chaotic image encryption method based on bit replacement and dynamic DNA coding. The objective of the invention is to solve the problem that security of chaotic encryption is affected by degradation of chaotic dynamics characteristics of an image encryption method based on a chaotic system in the prior art. The chaotic image encryption method comprises steps of firstly using the Keccak algorithm to calculate a hash value of a DNA sequence; based on the hash value, generating an initial state value of the chaotic mapping; by use of a hyperchaotic Chen system, generating a chaotic mapping index to carry out pixel position overall scrambling on an image; combining the Butterfly network to carry out bit position scrambling on each pixel, thereby achieving position grade scrambling; carrying out dynamic DNA coding on the image and combining the given DNA sequence to carry out XOR operation, thereby achieving replacing of the pixels; and finally, through the ciphertext feedback, further enhancing the chaotic and diffusion features. According to the invention, the chaotic image encryption method has big key space and is highly sensitive to a key, and capable of effectively resisting attacking operation of statistical analysis and exhaustion analysis.
Owner:ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY

DWT-SVD robust blind watermark method based on multilevel DCT

The invention relates to a DWT-SVD robust blind watermark method based on multilevel DCT. The method comprises a watermark embedding method and a watermark extraction method. The watermark embedding method includes the steps that discrete waterlet transformation is conducted on an original image, a low-frequency sub-band of the original image is divided into small blocks, multilevel DCT is conducted on each small block, chaotic encryption is conducted on watermarks to be embedded, multilevel DCT coefficients of each small block form a new matrix, and the encrypted watermarks are embedded into a singular value matrix of each new matrix. The watermark extraction method is the inverse process of the watermark embedding method and includes the steps of extraction of the encrypted watermarks and decryption and restoration of the watermarks through secret keys. According to the method, by the combination of the advantages of DWT and SVD on the digital watermark respect and the utilization of the energy concentration characteristic of multilevel DCT, data of which values are large are acquired, the embedded capacity of the watermarks is increased, the characteristic of being good in robustness is still maintained, and the problem of conflicts between the capacity of the watermarks and robustness is well solved.
Owner:HANGZHOU DIANZI UNIV

Fine particulate matter removal device and method with combined action of acoustic agglomeration and cyclone separation

The invention discloses a fine particulate matter removal device and method with combined action of acoustic agglomeration and cyclone separation. The device is embedded in each terminal workstation in an MIS system, is used for adding an invisible watermark to an acquired new image, and also provides integrity detection and tampering localization analysis for terminal work management and image processing. The technical method is embedded and integrated into a management information system for authenticating image content integrity and locating a tampered image region, and the method can be expressed as integrated external hardware when in concrete realization. The realization of the whole device scheme is divided into two parts: one, image characteristic information as the watermark is generated by the original image, the watermark information is subjected to chaotic encryption and then embedded into the original image, and the invisibility of the watermark information is realized under a condition without increasing the bandwidth; and two, a watermark-containing medical image is subjected to watermark extraction on a receiving end, the image can be subjected to integrity detection, the tampered image region is located, and thus a strong support is provided for further decision.
Owner:CENT SOUTH UNIV

Method for chaotic encryption of multi-path image digital information

The invention discloses a method for chaotic encryption of multi-path image digital information. The method comprises the following steps that an n-dimension discrete chaotic system kinetic equation is established; according to the seven-dimension chaotic system kinetic equation, n-m+1 real number chaotic sequences generated through iteration are rounded and then converted into binary digital information through a digital information encipher, and then XOR operation is conducted on the binary digital information and digital information of n-m+1 images, so that cryptograph values of the n-m+1 images are obtained respectively; the cryptograph values are transmitted to a digital information decipher through a digital transmission channel. According to the method, three-path image information is encrypted simultaneously just through one seven-dimension chaotic system; due to the fact that the cascading closed loop principle is adopted, a sending end system and a receiving end system have identical drive signals, strict synchronization can be realized, the influence of modulation of the size of useful information is avoided, and decrypted information has a high reduction degree under the condition that the parameters of the sending end are matched with the parameters of the receiving end.
Owner:GUANGDONG UNIV OF TECH

DWT-SVD geometric attack prevention blind watermark method based on SIFT

The invention relates to a DWT-SVD geometric attack prevention blind watermark method based on SIFT. The method comprises a watermark embedding method and a watermark extraction method. The watermark embedding method includes the steps that discrete waterlet transformation is conducted on an original image, a low-frequency sub-band of the original image is divided into small blocks, singular value decomposition is conducted on each small block, chaotic encryption is conducted on watermarks to be embedded, and the watermarks are embedded into the maximum singular value of each small block through an optimal quantitative method, the SIFT feature points of a watermark image are stored as secret keys, the types of geometric attacks are judged according to the secret keys, and correction is conducted. The watermark extraction method is the inverse process of the watermark embedding method and includes the steps of correction of attacked images, watermark extraction and watermark decryption and restoration. According to the method, by the utilization of the rotation, zoom and translation invariance of the SIFT feature points and the combination of the advantages of DWT and SVD in the digital watermark aspect, robustness on geometric attacks is remarkably improved.
Owner:HANGZHOU DIANZI UNIV

Chaotic encryption-based lattice anti-fake code design method and application system thereof

ActiveCN107609621AImprove securityMake up for the defect of not being able to resist scan-forgery attacksCo-operative working arrangementsCommercePlaintextDiffusion
The invention discloses a chaotic encryption-based lattice anti-fake code design method and an application system thereof. According to the method and the application system, the safety of lattice anti-fake codes is improved by utilizing a chaotic encryption technology, and chaotic encryption sequences are generated by using a worm population model and different initial values and control parameters so as to be applied to the diffusion and scrambling processes of chaotic encryption. According to the method and the application system, a ciphertext of a designed is as long as a plaintext, concise, efficient, high in encryption speed and suitable for commercialized production. The invention furthermore discloses the chaotic encryption-based lattice anti-fake code application system. Accordingto the method and the application system, a counter method is utilized to fill the gap that lattice anti-fake codes cannot resist scanning-counterfeiting attack, and a decryption function is deployedat a server, so that the pressure of an android app client is lightened, benefit is brought to the relative independence of the server, passwords are not easy to leak and the safety coefficient is relatively high.
Owner:HARBIN INST OF TECH SHENZHEN GRADUATE SCHOOL

Hyper-chaotic encryption method based on Josephf traversal and bit plane reconstruction

The invention provides a hyper-chaotic encryption method based on Josephf traversal and bit plane reconstruction. The hyper-chaotic encryption method comprises the following steps: converting a grayscale image into an image matrix; inputting the image matrix into an SHA-256 algorithm as a secret key, and obtaining initialization parameters according to the secret key; substituting the initialization parameters into a hyper-chaotic Lorenz system for iteration to generate four chaotic sequences, processing one chaotic sequence to serve as a variable step size sequence, performing pixel positionscrambling on a one-dimensional sequence of an image matrix by utilizing an improved Josephf traversal method, and rearranging a pixel scrambling matrix; dividing the pixel scrambling matrix into eight bit planes, and performing bit plane reconstruction on the pixel scrambling matrix by using the other three chaotic sequences and a bit plane reconstruction method to generate a bit plane reconstruction image matrix; and diffusing the bit plane reconstruction image matrix to generate a final encrypted image. According to the method, different types of images can be encrypted into uniformly distributed encrypted images, and the method has very sensitive key sensitivity and can resist various attacks.
Owner:ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY

Encrypted medical image robust multi-watermark realizing method in cloud environment

InactiveCN104867100AGuarantee data securityMake up for the shortcomings of not being able to protect the medical image itselfImage data processing detailsFeature vectorExclusive or
The invention discloses an encrypted medical image robust multi-watermark realizing method in cloud environment, and belongs to the field of multimedia signal processing. The method comprises the following major steps that: firstly, an original medical image is encrypted in a transformation domain; binary text watermark pictures are encrypted; then, the encrypted original image is subjected to DCT (Discrete Cosine Transformation) to obtain feature vectors; the feature vectors of the encrypted image and watermarks subjected to chaotic encryption are used for carrying out exclusive-or operation; zero watermarks are embedded to obtain a binary logic sequence; next, watermark extraction and watermark reduction are carried out, and the watermarks are extracted by the binary logic sequence generated during the watermark embedding; the extracted watermarks and the binary logic sequence are subjected to exclusive-or operation, and reduced watermarks are obtained; and finally, encrypted image reduction is carried out. Compared with a conventional method of directly embedding scrambled watermarks into an original image, the method provided by the invention has the advantages that the effect of embedding the watermarks into the encrypted image is achieved, and the security of the original image stored in a cloud end can be guaranteed.
Owner:HAINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products