CN104574259A - Image encryption method based on chaotic system and insertion-deletion model - Google Patents
Image encryption method based on chaotic system and insertion-deletion model Download PDFInfo
- Publication number
- CN104574259A CN104574259A CN201510009578.8A CN201510009578A CN104574259A CN 104574259 A CN104574259 A CN 104574259A CN 201510009578 A CN201510009578 A CN 201510009578A CN 104574259 A CN104574259 A CN 104574259A
- Authority
- CN
- China
- Prior art keywords
- dna
- sequence
- chaos
- matrix
- hamming
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 31
- 230000000739 chaotic effect Effects 0.000 title claims abstract description 12
- 238000012217 deletion Methods 0.000 title claims abstract description 11
- 108091028043 Nucleic acid sequence Proteins 0.000 claims abstract description 37
- 108020004414 DNA Proteins 0.000 claims abstract description 24
- 230000008569 process Effects 0.000 claims abstract description 8
- 238000004364 calculation method Methods 0.000 claims abstract description 4
- 239000011159 matrix material Substances 0.000 claims description 46
- 238000005842 biochemical reaction Methods 0.000 claims description 5
- 230000037430 deletion Effects 0.000 claims description 4
- 239000006185 dispersion Substances 0.000 claims description 4
- 230000009471 action Effects 0.000 claims description 3
- 238000009792 diffusion process Methods 0.000 claims description 3
- 230000008878 coupling Effects 0.000 claims description 2
- 238000010168 coupling process Methods 0.000 claims description 2
- 238000005859 coupling reaction Methods 0.000 claims description 2
- 238000013461 design Methods 0.000 abstract description 2
- 230000000694 effects Effects 0.000 abstract description 2
- 238000004088 simulation Methods 0.000 abstract description 2
- 238000005516 engineering process Methods 0.000 description 12
- 238000012360 testing method Methods 0.000 description 9
- 238000004422 calculation algorithm Methods 0.000 description 5
- 102000053602 DNA Human genes 0.000 description 4
- 238000000137 annealing Methods 0.000 description 3
- 238000011161 development Methods 0.000 description 3
- 238000013467 fragmentation Methods 0.000 description 3
- 238000006062 fragmentation reaction Methods 0.000 description 3
- 238000012408 PCR amplification Methods 0.000 description 2
- 108020004682 Single-Stranded DNA Proteins 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 230000009545 invasion Effects 0.000 description 2
- 230000035945 sensitivity Effects 0.000 description 2
- 230000009897 systematic effect Effects 0.000 description 2
- 108090000790 Enzymes Proteins 0.000 description 1
- 102000004190 Enzymes Human genes 0.000 description 1
- 101000911390 Homo sapiens Coagulation factor VIII Proteins 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 238000002474 experimental method Methods 0.000 description 1
- 239000012634 fragment Substances 0.000 description 1
- 238000010438 heat treatment Methods 0.000 description 1
- 102000057593 human F8 Human genes 0.000 description 1
- 230000033001 locomotion Effects 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 229940047431 recombinate Drugs 0.000 description 1
- 108091008146 restriction endonucleases Proteins 0.000 description 1
Landscapes
- Storage Device Security (AREA)
- Compression Or Coding Systems Of Tv Signals (AREA)
Abstract
The invention relates to the field of image encryption, and designs an image encryption method based on a chaotic system and an insertion-deletion model. According to the method, the Hamming distance, the Hamming inverse distance and the Hamming feeding distance are introduced into the generating process of initial values of the chaotic system; in addition, when the method is used for encrypting or decrypting an image, positions of image pixel values are scrambled through the insertion-deletion model; finally, XOR operation of a DNA sequence is applied to diffusing the image pixel values. It can be obtained from simulation results and safety analysis that the method has the good encryption effect and can resist various attacks of an intruder. According to the problem emphatically solved, the basic thought of the insertion-deletion model in DNA calculation is applied to image encryption.
Description
Technical field
The present invention relates to chaos system and insertion-case-deleted models, specifically be to original with chaos system and insertion-case-deleted models
figurepicture is encrypted, and it belongs to
figurepicture field of encryption.
Background technology
In recent years, numeral
figurepicture is applied in Internet Transmission by people widely as a kind of information carrier.But due to the opening of network and the sharing of information, assailant is easy to intercept and capture these information, people take series of measures guarantee for this reason
figurethe security of picture transmission, wherein
figurepicture encryption is the most effective mode of one.
figureas information because of its redundancy and data be two dimension etc. feature, traditional text encryption method is as right in DES, AES, IDEA etc. have not been suitable for
figurethe encryption of picture.Therefore based on modern password system
figurepicture encryption technology, based on matrixing
figurepicture encryption technology, based on chaos
figurepicture encryption technology, based on secret sharing
figurepicture encryption technology and based on frequency domain
figurein succession occur as encryption technology.But, along with parallel computer, the fast development of cloud computing and quantum computer, the security facing stern challenge of these methods.
Chaos system has initial value responsive, ergodicity, the characteristics such as movement locus is random, and has natural contacting with traditional cryptography, therefore based on chaos
figureonce be subject to the favor of scholar as encryption technology, also create a large amount of Chaos Encryption Technologies simultaneously.But less key space, slower enciphering rate and lower security are still based on chaos
figurethe bottleneck of picture encryption technology development.It is the technology that recent development is got up that DNA calculates in field of cryptography, and 1994, Adleman demonstrated a kind of Proof of Concept method DNA being applied to solution 7 Hamilton path problems.In addition, DNA calculates the computation capability and high storage density with height, just in time can make up based on chaos system
figurethe shortcoming of picture encryption technology, therefore, chaos system calculates to combine with DNA and proposes many cryptographic algorithm by researchers.Although some improve to a certain extent based on above-mentioned encryption method
figuresecurity in picture transmitting procedure, but the just DNA sequence dna paid close attention to of these algorithms add the basic series of operations such as computing, XOR, and do not consider the concrete model in biochemical reaction.DNA computation model in biochemical reaction comprises splice model, sticker model, DNA-EC, insertion-case-deleted models and minimum of computation model etc., and we can consider the basic thought of these models to be incorporated into
figurein picture encryption, produce good cipher round results.
To insert herein-case-deleted models is incorporated into
figurein the ciphering process of picture.The mechanism of insertion-case-deleted models is: in the DNA sequence dna of a strand, by biology enzyme and the biological operation technology such as heating and annealing, inserts the DNA fragmentation of section of DNA fragment or deletion one section of strand.Concrete operation step is as described below.
Deletion action: suppose that the value on array i-th-1, i, i+1 position is respectively subsequence u, y, v, for deleting the subsequence y on i-th position in this array, its method step is as follows:
1. this array is put into a test tube N, add single-stranded DNA sequence in test tube N
it is the complementary series of x;
2. implement annealing operation to test tube N, then
with u,
be combined with v, and
folded;
3. in test tube N, add DNA fragmentation and relevant polymerase, implement pcr amplification, complete double chain DNA molecule can be obtained;
4. implement and unwind, obtain two strands, wherein one is the DNA sequence dna after deleting subsequence y.
Update: suppose that the value on array i-th-1, i, i+1 position is respectively subsequence u, y, v, for intron sequences y on the position of i-th in this array, its method step is as follows:
1. this array is put into a test tube N, add single-stranded DNA sequence in test tube N
2. implement annealing operation to test tube N, then
with u,
be combined with v, and
folded;
3. use and adjust inscribe restriction enzyme, the double-strand in test tube N is cut off;
4. in test tube N, add DNA fragmentation and relevant polymerase, implement pcr amplification, complete double chain DNA molecule can be obtained;
4. implement and unwind, obtain two strands, wherein one is the DNA sequence dna after intron sequences y.
Summary of the invention
The object of the invention is to propose a kind of based on chaos system and insertion-case-deleted models
figurepicture encryption method, combine chaos system and insertion-case-deleted models scramble
figurethe location of pixels of picture, makes cipher round results good, thus can the attack of the person of resisting an invasion.The technical solution adopted in the present invention is:
based on the image encryption method of chaos system and insertion-case-deleted models, the insertion-case-deleted models in the chaos sequence of chaotic maps generation and biochemical reaction combines by it; It is first to original
figurepicture carries out DNA encoding, then Lorenz is utilized to map the chaos sequence scramble of generation by the DNA sequence dna obtained of encoding, then with insertion-case-deleted models scramble DNA sequence dna again, finally utilize Lorenz to map the chaos sequence produced and dispersion operation is carried out to the DNA sequence dna matrix obtained, finally sequence matrix decoding is encrypted
figurepicture; Its concrete steps are as follows:
S1, employing DNA encoding rule are to original
figurepicture carries out coding and obtains DNA sequence dna matrix;
S2, utilize Lorenz chaotic maps produce chaos sequence (x, y, z)
Given arbitrary initial value x
0, y
0, z
0, the Hamming distance of the DNA sequence dna matrix obtained in calculation procedure S1, Hamming mend distance against Distance geometry Hamming, and are the decimal between 0-1 by its value, by the new Hamming distance obtained, Hamming against Distance geometry Hamming mend distance respectively with x
0, y
0, z
0be added, obtain new initial value x
1, y
1, z
1; Then coupling system parameter produces three chaos sequences (x, y, z);
The value of the DNA sequence dna matrix in S3, use chaos sequence (x, y) scramble step S1
Chaos sequence (x, y) is rounded downwards, by the value of the sequence scramble DNA sequence dna matrix newly obtained;
S4, with chaos sequence (x, z) and insertion-case-deleted models the value of the DNA sequence dna matrix again in scramble S3;
Detailed process is: two parts up and down identical sized by first being divided by the DNA sequence dna matrix in step S3; Then identical following operation is carried out to these two parts: using one of DNA sequence dna matrix row as a subsequence, obtain one and the equal-sized one-dimension array of sequence matrix columns; Lorenz chaotic maps is utilized to produce chaos sequence between one identical with array size 0 and 1; If the value of chaos sequence i-th position is less than 0.5, then uses deletion action that the element on array i-th position is deleted, and use update to be inserted into the end of residue array the element deleted; Otherwise do not carry out any operation; Finally two parts are merged into a sequence matrix, namely operation completes.
S5, use chaos sequence (y, z) and the value of XOR to the DNA sequence dna matrix that step S4 obtains carry out dispersion operation.
First matrix sequence is divided into the identical block of size, then chaos sequence (y, z) is rounded downwards, finally in conjunction with the value of XOR by block diffusion DNA sequence dna matrix;
S6, merged block identical for the size obtained in step S5 is obtained a DNA sequence dna matrix, can be encrypted its decoding
figurepicture.
The present invention compared with prior art has the following advantages:
1, the basic thought of the insertion-deletion system in biochemical reaction is incorporated in encryption system, forms insertion-case-deleted models.Due to the one that insertion-deletion system is in DNA computation model, therefore insertion-deletion system has huge computation capability and high storage density, thus insertion-case-deleted models also has these characteristics above, uses this model realization
figurethe encryption of picture has higher encryption efficiency.
2, the present invention not only considers chaotic maps to characteristics such as initial value sensitivities, but also will insert-case-deleted models is applied in ciphering process, and effect insertion-case-deleted models and the good characteristic of chaotic maps can make our cryptographic algorithm effectively not resist an invasion the attack of person; Ensure that numeral
figurethe safety of picture when transmitting is high.
Accompanying drawing explanation
figure8 kinds of codings of 1DNA sequence, decoding mapping ruler;
figurethe xor operation of 2DNA sequence;
figure3 is original
figurepicture;
figure4 encryptions
figurepicture;
figure5 deciphering
figurepicture;
figure6 is original
figurethe intensity histogram of picture
figure;
figure7 encryptions
figurethe intensity histogram of picture
figure;
figure8 is original
figurethe correlativity of picture horizontal direction;
figure9 encryptions
figurethe correlativity of picture horizontal direction;
figure10 structure letters of the present invention
figure.
Embodiment
Below in conjunction with attached
figurethe invention will be further described.
Detailed step is as follows:
Step 1: to original
figurepicture is (see attached
figure3) the 2nd kind of coding rule is used to carry out DNA encoding (see attached
figure1);
Step 2: Hamming distance, the Hamming of the matrix sequence after calculation code are mended distance against Distance geometry Hamming, and the value obtained is become the decimal between 0-1; By the value that newly obtains respectively with x
0, y
0, z
0be added, obtain new initial value x
1, y
1, z
1; Under the condition of new initial value and systematic parameter, produce three chaos sequence x, y, z;
Step 3: round chaos sequence (x, y) downwards, by the value of the DNA sequence dna matrix in the new sequence scramble step S1 obtained;
Step 4: will insert-application of case-deleted models in ciphering process and chaos sequence (y, z) combine the value of the DNA sequence dna matrix of replacing in S3;
Step 5: the matrix sequence obtained in step 4 is divided into the block that size is 4 × 4; Round chaos sequence (x, z) downwards, with the XOR of the new sequence obtained and DNA sequence dna (see attached
figure2) by the value of block diffusion DNA sequence dna matrix;
Step 6: the merged block obtained in step 5 is become the sequence matrix that is new, then regular (see attached with the 3rd DNA decoding
figure1) this matrix sequence is decoded, can be encrypted
figurepicture.
Embodiment 1
Embodiments of the invention are implemented under premised on technical solution of the present invention, give detailed embodiment and concrete operating process, but protection scope of the present invention are not limited to following embodiment.
Step 1: be the original gradation of (m, n) by size
figurepicture changes into a binary matrix; The 2nd rule according to DNA sequence encoding is encoded to binary matrix, can obtain the DNA sequence dna matrix D A that a size is (m, n × 4);
Step 2: given arbitrary initial value x
0, y
0, z
0, then it is mended and obtains new initial value x with the Hamming distance of the decimal be converted between 0-1, the inverse distance of Hamming, Hamming apart from being added respectively
1, y
1, z
1, at x
1, y
1, z
1with under the condition of systematic parameter σ, ρ, β, Lorenz chaotic maps is utilized to produce three chaos sequence x=(x
1, x
2..., x
4n), y=(y
1, y
2..., y
4n), z=(z
1, z
2..., z
4n).
Step 3: do downward floor operation to chaos sequence (x, y), formula is as follows:
Wherein x (i) is the value of i-th position in chaos sequence x, and y (j) is the value of a jth position in chaos sequence y, and m is the number of chaos sequence x intermediate value, and n is the number of chaos sequence y intermediate value; With above sequence (x, y) the scramble DA produced, obtain sequence matrix CA.Formula is as follows:
Step 4: according to the application of insertion-case-deleted models in ciphering process and chaos sequence (x, z), operation is carried out to the matrix sequence CA obtained and obtain sequence matrix NA;
Step 5: sequence matrix NA is divided into equal block bR{i, j}, i=1,2 ..., m/4, j=1,2 ..., n, wherein the size of each piece is 4 × 4;
By the mode of step 3, sequence (y, z) is rounded downwards, obtain new sequence (y, z); In conjunction with DNA XOR, according to following formula, the block of correspondence is carried out xor operation.
bR(i,j)←bR(i,j)XORbR(y(i),z(j))i=1,2,…,m/4j=1,2,…,n
Step 6: recombinate these blocks bR{i, j} can obtain a DNA matrix sequence HA; Adopt the 3rd kind of coding rule to decode to HA, a binary matrix can be obtained, be encryption
figurepicture.
Owing to working as σ=10, ρ=8/3, during β=28, chaos system enters chaos state and can produce three chaos sequences, therefore gets σ=10 herein, ρ=8/3, β=28.Get x simultaneously
0=2, y
0=3, z
0=4 and in conjunction with Hamming distance, Hamming is mended distance against Distance geometry Hamming and is produced new initial value x
1, y
1, z
1.Under these keys above, system emulation result is as attached
figure4-is attached
figureshown in 9.
Described in summary, this cryptographic algorithm utilizes chaos system to features such as initial value sensitivity and DNA computation model highly-parallel computing powers, is combined by chaos system realizes numeral with insertion-case-deleted models
figurethe encryption of picture.This algorithm for encryption is respond well, and simultaneously experiment simulation and analog result show the method and can resist statistical attack, differential attack and exhaustive attack etc., are applicable to
figureright in picture transmitting procedure
figurethe protection of picture.
The above; be only the present invention's preferably embodiment; but protection scope of the present invention is not limited thereto; anyly be familiar with those skilled in the art in the technical scope that the present invention discloses; according to technical scheme of the present invention and design with equivalent replacement or change, all should be encompassed in protection scope of the present invention.
Claims (3)
1. based on the image encryption method of chaos system and insertion-case-deleted models, it is characterized in that: the insertion-case-deleted models in its chaos sequence chaotic maps produced and biochemical reaction combines; First it carry out DNA encoding to original image, then Lorenz is utilized to map the chaos sequence scramble of generation by the DNA sequence dna obtained of encoding, then with insertion-case-deleted models scramble DNA sequence dna again, finally utilize Lorenz to map the chaos sequence produced and dispersion operation is carried out to the DNA sequence dna matrix obtained, finally encrypted image is obtained to sequence matrix decoding.
2. the image encryption method based on chaos system and insertion-case-deleted models according to claim 1, is characterized in that: the concrete steps of described encryption method are as follows:
S1, employing DNA encoding rule are carried out coding to original image and are obtained DNA sequence dna matrix;
S2, utilize Lorenz chaotic maps produce chaos sequence (x, y, z)
Given arbitrary initial value x
0, y
0, z
0, the Hamming distance of the DNA sequence dna matrix obtained in calculation procedure S1, Hamming mend distance against Distance geometry Hamming, and are converted into the decimal between 0-1, by the new Hamming distance obtained, Hamming against Distance geometry Hamming mend distance respectively with x
0, y
0, z
0be added, obtain new initial value x
1, y
1, z
1; Then coupling system parameter produces three chaos sequences (x, y, z);
The value of the DNA sequence dna matrix in S3, use chaos sequence (x, y) scramble step S1;
Chaos sequence (x, y) is rounded downwards, by the value of the sequence scramble DNA sequence dna matrix newly obtained;
S4, value with chaos sequence (x, z) and insertion-case-deleted models scramble DNA sequence dna matrix again;
S5, use chaos sequence (y, z) and the value of XOR to the DNA sequence dna matrix that step S4 obtains carry out dispersion operation;
First matrix sequence is divided into the identical block of size, then chaos sequence (y, z) is rounded downwards, finally in conjunction with the value of XOR by block diffusion DNA sequence dna matrix;
S6, merged block identical for the size obtained in step S5 is obtained a DNA sequence dna matrix, can encrypted image be obtained to its decoding.
3. the image encryption method based on chaos system and insertion-case-deleted models according to claim 1, is characterized in that: the process of described step S4 is as follows: two parts up and down identical sized by first being divided by the DNA sequence dna matrix obtained in step S3; Then identical following operation is carried out to these two parts: using one of DNA sequence dna matrix row as a subsequence, obtain one and the equal-sized one-dimension array of sequence matrix columns; Lorenz chaotic maps is utilized to produce chaos sequence between one identical with array size 0 and 1; If the value of chaos sequence i-th position is less than 0.5, then uses deletion action that the element on array i-th position is deleted, and use update to be inserted into the end of residue array the element deleted; Otherwise do not carry out any operation; Finally two parts are merged into a sequence matrix, namely operation completes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510009578.8A CN104574259B (en) | 2015-01-08 | 2015-01-08 | Image encryption method based on chaos system Yu insertion-case-deleted models |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510009578.8A CN104574259B (en) | 2015-01-08 | 2015-01-08 | Image encryption method based on chaos system Yu insertion-case-deleted models |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104574259A true CN104574259A (en) | 2015-04-29 |
CN104574259B CN104574259B (en) | 2017-07-11 |
Family
ID=53090247
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510009578.8A Expired - Fee Related CN104574259B (en) | 2015-01-08 | 2015-01-08 | Image encryption method based on chaos system Yu insertion-case-deleted models |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104574259B (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105046636A (en) * | 2015-07-13 | 2015-11-11 | 郑州轻工业学院 | Digital image encryption method based on chaotic system and nucleotide sequence database |
CN105119717A (en) * | 2015-07-21 | 2015-12-02 | 郑州轻工业学院 | DNA coding based encryption system and encryption method |
CN105678677A (en) * | 2016-01-06 | 2016-06-15 | 大连大学 | Image encryption method based on Hash function and inserting-deleting model |
CN106530197A (en) * | 2016-10-12 | 2017-03-22 | 广东工业大学 | Image encryption method based on Kent mapping and generalized Gray codes |
CN106651735A (en) * | 2016-09-08 | 2017-05-10 | 广东工业大学 | Chaos theory-based digital image parallel encryption method |
CN107437266A (en) * | 2017-07-11 | 2017-12-05 | 大连大学 | Image encryption method based on chaos system Yu DNA chain displacement model |
CN107992948A (en) * | 2017-10-30 | 2018-05-04 | 东北林业大学 | Quantum resume image based on chaos system and DNA dynamic codings |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101702240A (en) * | 2009-11-26 | 2010-05-05 | 大连大学 | Image encryption method based on DNA sub-sequence operation |
CN101706947A (en) * | 2009-11-26 | 2010-05-12 | 大连大学 | Image fusion encryption method based on DNA sequences and multiple chaotic mappings |
CN103167213A (en) * | 2013-02-07 | 2013-06-19 | 东北大学 | Digital image encryption method based on Cat mapping and hyper-chaos Lorenz system |
-
2015
- 2015-01-08 CN CN201510009578.8A patent/CN104574259B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101702240A (en) * | 2009-11-26 | 2010-05-05 | 大连大学 | Image encryption method based on DNA sub-sequence operation |
CN101706947A (en) * | 2009-11-26 | 2010-05-12 | 大连大学 | Image fusion encryption method based on DNA sequences and multiple chaotic mappings |
CN103167213A (en) * | 2013-02-07 | 2013-06-19 | 东北大学 | Digital image encryption method based on Cat mapping and hyper-chaos Lorenz system |
Non-Patent Citations (3)
Title |
---|
HUI-YAN JIANG 等: "An Image Encryption Scheme Based on Lorenz Chaos System", 《FOURTH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION》 * |
QIANG ZHANG 等: "A novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system", 《OPTIK》 * |
许进 等: "DNA计算机原理、进展及难点(Ⅳ):论DNA计算机模型", 《计算机学报》 * |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105046636A (en) * | 2015-07-13 | 2015-11-11 | 郑州轻工业学院 | Digital image encryption method based on chaotic system and nucleotide sequence database |
CN105119717A (en) * | 2015-07-21 | 2015-12-02 | 郑州轻工业学院 | DNA coding based encryption system and encryption method |
CN105678677A (en) * | 2016-01-06 | 2016-06-15 | 大连大学 | Image encryption method based on Hash function and inserting-deleting model |
CN105678677B (en) * | 2016-01-06 | 2018-11-02 | 大连大学 | Image encryption method based on hash function and insertion-case-deleted models |
CN106651735A (en) * | 2016-09-08 | 2017-05-10 | 广东工业大学 | Chaos theory-based digital image parallel encryption method |
CN106530197A (en) * | 2016-10-12 | 2017-03-22 | 广东工业大学 | Image encryption method based on Kent mapping and generalized Gray codes |
CN107437266A (en) * | 2017-07-11 | 2017-12-05 | 大连大学 | Image encryption method based on chaos system Yu DNA chain displacement model |
CN107992948A (en) * | 2017-10-30 | 2018-05-04 | 东北林业大学 | Quantum resume image based on chaos system and DNA dynamic codings |
CN107992948B (en) * | 2017-10-30 | 2021-10-19 | 东北林业大学 | Quantum image encryption algorithm based on chaotic system and DNA dynamic coding |
Also Published As
Publication number | Publication date |
---|---|
CN104574259B (en) | 2017-07-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104574259A (en) | Image encryption method based on chaotic system and insertion-deletion model | |
Niu et al. | An image encryption approach based on chaotic maps and genetic operations | |
CN105046636B (en) | Digital image encryption method based on chaotic system and nucleotide sequence database | |
CN108365947B (en) | A kind of image encryption method based on Feistel network Yu dynamic DNA encoding | |
Kumar et al. | Development of modified AES algorithm for data security | |
Liu et al. | Color image encryption algorithm based on DNA coding and double chaos system | |
CN109376540B (en) | Image encryption method based on Duffing mapping and genetic operation | |
Liu et al. | Color image encryption using three-dimensional sine ICMIC modulation map and DNA sequence operations | |
CN101702240B (en) | Image encryption method based on DNA sub-sequence operation | |
Yu et al. | Double-image encryption based on spatiotemporal chaos and DNA operations | |
Xu et al. | A novel image encryption algorithm based on self-orthogonal Latin squares | |
Azimi et al. | Color image encryption based on DNA encoding and pair coupled chaotic maps | |
CN101719908A (en) | Image encryption method based on chaos theory and DNA splice model | |
CN107437266A (en) | Image encryption method based on chaos system Yu DNA chain displacement model | |
CN109194461A (en) | Single-track link table ordered encryption decryption method based on dual key stream cipher | |
CN109756322A (en) | Digital image encryption method based on DES structure and DNA encoding | |
CN109981249A (en) | Encrypting and decrypting method and device based on zip mode dynamic hashing and NLFSR | |
CN107968705A (en) | A kind of method for encryption/decryption, enciphering/deciphering end and double random phase encrypting and deciphering system | |
Roy et al. | A dual layer image encryption using polymerase chain reaction amplification and dna encryption | |
CN101022331B (en) | Chaos encrypting method based on carrier | |
Sermeno et al. | Modified Vigenere cryptosystem: An integrated data encryption module for learning management system | |
CN103310157B (en) | Based on the image encryption method of RT-DNA cellular automaton | |
Mezaal et al. | OTP encryption enhancement based on logical operations | |
Godara et al. | An improved algorithmic implementation of rail fence Cipher | |
EP4170959B1 (en) | A method of constructing a semi-public key system in qap-based homomorphic encryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20170711 |
|
CF01 | Termination of patent right due to non-payment of annual fee |