CN104574259B - Image encryption method based on chaos system Yu insertion-case-deleted models - Google Patents
Image encryption method based on chaos system Yu insertion-case-deleted models Download PDFInfo
- Publication number
- CN104574259B CN104574259B CN201510009578.8A CN201510009578A CN104574259B CN 104574259 B CN104574259 B CN 104574259B CN 201510009578 A CN201510009578 A CN 201510009578A CN 104574259 B CN104574259 B CN 104574259B
- Authority
- CN
- China
- Prior art keywords
- dna
- sequence
- chaos
- matrix
- image
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 30
- 108091028043 Nucleic acid sequence Proteins 0.000 claims abstract description 38
- 108020004414 DNA Proteins 0.000 claims abstract description 26
- 239000011159 matrix material Substances 0.000 claims description 44
- 230000000739 chaotic effect Effects 0.000 claims description 9
- 238000012217 deletion Methods 0.000 claims description 9
- 230000008569 process Effects 0.000 claims description 9
- 230000037430 deletion Effects 0.000 claims description 5
- 238000005842 biochemical reaction Methods 0.000 claims description 4
- 238000004364 calculation method Methods 0.000 claims description 4
- 238000003780 insertion Methods 0.000 claims description 4
- 230000037431 insertion Effects 0.000 claims description 4
- 230000009897 systematic effect Effects 0.000 claims description 4
- 230000009471 action Effects 0.000 claims description 3
- 230000032258 transport Effects 0.000 claims 1
- 230000009545 invasion Effects 0.000 abstract description 2
- 238000009792 diffusion process Methods 0.000 abstract 1
- 238000012360 testing method Methods 0.000 description 9
- 102000053602 DNA Human genes 0.000 description 4
- 108020004682 Single-Stranded DNA Proteins 0.000 description 4
- 238000000137 annealing Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 3
- 238000011161 development Methods 0.000 description 3
- 238000013467 fragmentation Methods 0.000 description 3
- 238000006062 fragmentation reaction Methods 0.000 description 3
- 238000012408 PCR amplification Methods 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 238000004422 calculation algorithm Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000035945 sensitivity Effects 0.000 description 2
- 108090000790 Enzymes Proteins 0.000 description 1
- 102000004190 Enzymes Human genes 0.000 description 1
- 101000911390 Homo sapiens Coagulation factor VIII Proteins 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000006073 displacement reaction Methods 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 238000002474 experimental method Methods 0.000 description 1
- 239000012634 fragment Substances 0.000 description 1
- 238000010438 heat treatment Methods 0.000 description 1
- 102000057593 human F8 Human genes 0.000 description 1
- 230000033001 locomotion Effects 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 229940047431 recombinate Drugs 0.000 description 1
- 108091008146 restriction endonucleases Proteins 0.000 description 1
- 238000000682 scanning probe acoustic microscopy Methods 0.000 description 1
- 238000004088 simulation Methods 0.000 description 1
Landscapes
- Storage Device Security (AREA)
- Compression Or Coding Systems Of Tv Signals (AREA)
Abstract
The present invention relates to image encryption field, a kind of image encryption method based on chaos system with insertion-case-deleted models is devised.Hamming distance, the inverse distance of Hamming and Hamming are mended distance and are incorporated into during the generation of chaos system initial value by this method;In addition, this method uses the position of insertion-case-deleted models scramble image pixel value in encrypted image and decrypted image;Finally, the xor operation of DNA sequence dna is applied to the pixel value of diffusion image.Can be drawn from analog result and safety analysis, this method has a good cipher round results, and can the person of resisting an invasion various attacks.The problem of present invention is solved emphatically is that the basic thought of insertion-case-deleted models during DNA is calculated is applied in image encryption.
Description
Technical field
The present invention relates to chaos system and insertion-case-deleted models, specifically be with chaos system and insertion-deletion mould
Original image is encrypted type, and it belongs to image encryption field.
Background technology
In recent years, digital picture is widely applied in network transmission as a kind of information carrier by people.However, due to
The opening and the sharing of information of network, attacker is easy to intercept and capture these information, is that this people takes a series of measures
Ensure the security of image transmitting, wherein image encryption is a kind of most effective way.Image information is because of its redundancy and number
The features such as according to being two dimension, traditional text encryption method such as DES, AES, IDEA etc. have not been suitable for the encryption to image.
Therefore the image encryption technology based on modern password system, the image encryption technology based on matrixing, the image based on chaos
Encryption technology, the image encryption technology based on secret sharing and the image encryption technology based on frequency domain occur in succession.But, with
The fast development of parallel computer, cloud computing and quantum computer, the security facing stern challenge of these methods.
Chaos system has a, ergodic sensitive to initial value, the characteristic such as movement locus is random, and and traditional cryptography
There is natural contact, therefore the image encryption technology based on chaos is once favored by scholar, while also generating substantial amounts of
Chaos Encryption Technology.But, less key space, slower enciphering rate and relatively low security are still based on chaos
Image encryption technology development bottleneck.It is the technology that latest development is got up that DNA, which is calculated in field of cryptography, 1994,
Adleman demonstrates a kind of Proof of Concept method that DNA is applied to solve to 7 Hamilton path problems.In addition, DNA
Computation capability and high storage density with height are calculated, the image encryption skill based on chaos system can be just made up
The shortcoming of art, therefore, chaos system is calculated to be combined by researchers with DNA proposes many AESs.Although some bases
Improve the security in image transmitting process to a certain extent in above-mentioned encryption method, but the concern of these algorithms only
It is the basic series of operations such as DNA sequence dna plus computing, XOR, without considering the concrete model in biochemical reaction.It is raw
The DNA computation models changed in reaction include splice model, sticker model, DNA-EC, insertion-case-deleted models and most
Small computation model etc., we, which can contemplate, is incorporated into the basic thought of these models in image encryption, produces good encryption
Effect.
Insertion-case-deleted models are incorporated into the ciphering process of image herein.The mechanism of insertion-case-deleted models is:
In one single-stranded DNA sequence dna, by biology enzyme and heating with annealing etc. biological operation technology, insertion section of DNA fragment or
Person deletes one section of single-stranded DNA fragmentation.Concrete operation step is as described below.
Deletion action:Assuming that the value on array the i-th -1, i, i+1 position is respectively subsequence u, y, v, it is intended in the array
The middle subsequence y deleted on i-th of position, its method and step is as follows:
1. this array is put into a test tube N, to adding single-stranded DNA sequence in test tube NIt is x benefit
Sequence;
2. annealing operation is implemented to test tube N, thenWith u,Combined with v, andIt is folded;
3. adding DNA fragmentation and relevant polymerase in test tube N, PCR amplifications are implemented, complete double-strand can be obtained
DNA molecular;
4. execution is unwind, obtain two it is single-stranded, wherein one is DNA sequence dna after deleting subsequence y.
Insertion operation:Assuming that the value on array the i-th -1, i, i+1 position is respectively subsequence u, y, v, it is intended in the array
In i-th of position on intron sequences y, its method and step is as follows:
1. this array is put into a test tube N, to adding single-stranded DNA sequence in test tube N
2. annealing operation is implemented to test tube N, thenWith u,Combined with v, andIt is folded;
3. using inscribe restriction enzyme is adjusted, the double-strand in test tube N is cut off;
4. adding DNA fragmentation and relevant polymerase in test tube N, PCR amplifications are implemented, complete double-strand can be obtained
DNA molecular;
4. execution is unwind, obtain two it is single-stranded, wherein one is DNA sequence dna after intron sequences y.
The content of the invention
, will it is an object of the invention to propose a kind of image encryption method based on chaos system and insertion-case-deleted models
Chaos system and insertion-case-deleted models are combined the location of pixels of scramble image so that cipher round results are good, so as to
The attack of anti-invader.The technical solution adopted in the present invention is:Image based on chaos system and insertion-case-deleted models adds
Insertion-case-deleted models in decryption method, its chaos sequence and biochemical reaction for producing chaotic maps are combined;It is right first
Original image carries out DNA encoding, and the DNA sequence dna that the chaos sequence scramble produced is obtained by encoding then is mapped using Lorenz,
Then insertion-case-deleted models scramble DNA sequence dna again is used, finally the chaos sequence produced is mapped to obtaining using Lorenz
DNA sequence dna matrix be diffused operation, finally to sequence matrix decoding obtain encrypted image;It is comprised the following steps that:
S1, using DNA encoding rule original image is carried out to encode and obtain DNA sequence dna matrix;
S2, utilize Lorenz chaotic maps produce chaos sequence (x, y, z)
Give arbitrary initial value x0,y0,z0, the Hamming distance of the DNA sequence dna matrix obtained in calculation procedure S1, Hamming
Inverse distance and Hamming mend distance, and are the decimal between 0-1 by its value, by obtained new Hamming distance, Hamming against distance
With Hamming mend distance respectively with x0,y0,z0It is added, obtains new initial value x1,y1,z1;Three are produced then in conjunction with systematic parameter
Chaos sequence (x, y, z);
S3, the value with the DNA sequence dna matrix in chaos sequence (x, y) scramble step S1
Chaos sequence (x, y) is rounded downwards, with the value of the sequence scramble DNA sequence dna matrix newly obtained;
S4, the value with the DNA sequence dna matrix in chaos sequence (x, z) and insertion-case-deleted models again scramble S3;
Detailed process is:The DNA sequence dna matrix in step S3 is divided into two parts above and below size identical first;Then it is right
This two parts carries out identical and operated as follows:Arranged using the one of DNA sequence dna matrix as a subsequence, obtain one and sequence square
The equal-sized one-dimension array of number of arrays;One is produced between array size identical 0 and 1 using Lorenz chaotic maps
Chaos sequence;If the value of i-th of position of chaos sequence is less than 0.5, using deletion action the element on i-th of position of array
Delete, and the element of deletion is inserted into using insertion operation the end of remaining array;Otherwise without any operation;Last handle
Two parts are merged into a sequence matrix, and operation is completed.
S5, the value of the DNA sequence dna matrix obtained with chaos sequence (y, z) and XOR to step S4 are diffused behaviour
Make.
Matrix sequence is divided into size identical block first, then chaos sequence (y, z) rounded downwards, finally with reference to different
Or the value of DNA sequence dna matrix is spread in computing by block;
S6, the size identical merged block obtained in step S5 obtained into a DNA sequence dna matrix, decoding it to obtain
To encrypted image.
The present invention has advantages below compared with prior art:
1st, the basic thought of insertion-deletion system in biochemical reaction is incorporated into encryption system, formation insert-is deleted
Except model.One kind in DNA computation models due to insertion-deletion system, thus insertion-deletion system have it is huge and
Row computing capability and high storage density, so as to insert-case-deleted models also have the above characteristic, use this model realization figure
The encryption of picture has higher encryption efficiency.
2nd, the present invention not only allows for chaotic maps to characteristics such as initial value sensitivities, but also should by insertion-case-deleted models
In ciphering process, the good characteristic of effect insertion-case-deleted models and chaotic maps can make our AES effective
The person of resisting an invasion attack;It ensure that safety of the digital picture in transmission is high.
Brief description of the drawings
8 kinds of codings of Fig. 1 DNA sequence dnas, decoding mapping ruler;
The xor operation of Fig. 2 DNA sequence dnas;
Fig. 3 original images;
Fig. 4 encrypted images;
Fig. 5 decrypted images;
The grey level histogram of Fig. 6 original images;
The grey level histogram of Fig. 7 encrypted images;
The correlation of Fig. 8 original image horizontal directions;
The correlation of Fig. 9 encrypted image horizontal directions;
The structure diagram of Figure 10 present invention.
Embodiment
The invention will be further described below in conjunction with the accompanying drawings.
Detailed step is as follows:
Step 1:DNA encoding (see accompanying drawing 1) is carried out using the 2nd kind of coding rule to original image (see accompanying drawing 3);
Step 2:The Hamming distance of matrix sequence after calculation code, Hamming are mended distance against distance and Hamming, and will obtained
Value into the decimal between 0-1;By the value newly obtained respectively with x0,y0,z0It is added, obtains new initial value x1,y1,z1;
Under conditions of new initial value and systematic parameter, three chaos sequences x, y, z are produced;
Step 3:Chaos sequence (x, y) is rounded downwards, with the DNA sequence dna matrix in obtained new sequence scramble step S1
Value;
Step 4:Application of the insertion-case-deleted models in ciphering process and chaos sequence (y, z) are combined in displacement S3
The value of DNA sequence dna matrix;
Step 5:The matrix sequence obtained in step 4 is divided into the block that size is 4 × 4;Downwards round chaos sequence (x,
Z), the value of DNA sequence dna matrix is spread by block with the XOR (see accompanying drawing 2) of obtained new sequence and DNA sequence dna;
Step 6:By the merged block obtained in step 5 into a new sequence matrix, then rule is decoded with the 3rd DNA
(see accompanying drawing 1) is decoded to this matrix sequence, you can obtain encrypted image.
Embodiment 1
Embodiments of the invention are implemented lower premised on technical solution of the present invention, give detailed implementation
Mode and specific operating process, but protection scope of the present invention is not limited to following embodiments.
Step 1:Size is changed into a binary matrix for the original-gray image of (m, n);According to DNA sequence encoding
The 2nd rule binary matrix is encoded, can obtain size is (the DNA sequence dna matrix D A of m, n × 4);
Step 2:Give arbitrary initial value x0,y0,z0, then by it respectively with being converted to the Hamming of the decimal between 0-1
The inverse distance of distance, Hamming, Hamming benefit distance are added and obtain new initial value x1,y1,z1, in x1,y1,z1With systematic parameter σ, ρ, β
Under conditions of, produce three chaos sequence x=(x using Lorenz chaotic maps1,x2,...,x4n), y=(y1,y2,...,
y4n), z=(z1,z2,...,z4n)。
Step 3:Downward floor operation is done to chaos sequence (x, y), formula is as follows:
Wherein x (i) is the value of i-th of position in chaos sequence x, and y (j) is the value of j-th of position in chaos sequence y, and m is
The number of chaos sequence x intermediate values, n is the number of chaos sequence y intermediate values;Sequence (x, y) the scramble DA produced more than, obtains sequence
Column matrix CA.Formula is as follows:
Step 4:According to application of the insertion-case-deleted models in ciphering process and chaos sequence (x, z) to obtained square
Battle array sequence C A operate obtaining sequence matrix NA;
Step 5:Sequence matrix NA is divided into equal block bR { i, j }, i=1,2 ..., m/4, j=1,2 ..., n, its
In the size of each block be 4 × 4;
Sequence (y, z) is rounded downwards in the way of step 3, new sequence (y, z) is obtained;With reference to DNA XORs, press
According to below equation xor operation is carried out by corresponding piece.
BR (i, j) ← bR (i, j) XORbR (y (i), z (j)) i=1,2 ..., m/4j=1,2 ..., n
Step 6:Recombinate these blocks bR { i, j } and can obtain a DNA matrix sequences HA;Using the 3rd kind of coding rule to HA
Decoding, can obtain a binary matrix, as encrypted image.
Because as σ=10, ρ=8/3, β=28, chaos system enters chaos state and can produce three chaos sequences,
Therefore σ=10, ρ=8/3, β=28 are taken herein.Take x simultaneously0=2, y0=3, z0=4 and Hamming distance is combined, Hamming is against distance
Distance, which is mended, with Hamming produces new initial value x1,y1,z1.Under the above key, system emulation result such as accompanying drawing 4- accompanying drawings 9
It is shown.
Summary is described, and this AES is using chaos system to initial value sensitivity and DNA computation model highly-parallel meters
The features such as calculation ability, chaos system and insertion-case-deleted models are implemented in combination with to the encryption to digital picture.The algorithm for encryption is imitated
Fruit is good, while experiment simulation and analog result show that this method can resist statistical attack, differential attack and exhaustive attack
Deng, it is adaptable to the protection of image in image transmitting process.
The foregoing is intended to be a preferred embodiment of the present invention, but protection scope of the present invention is not limited thereto,
Any one skilled in the art in the technical scope of present disclosure, technique according to the invention scheme and its
Design should all be covered within the scope of the present invention with equivalent or change.
Claims (2)
1. the image encryption method based on chaos system with insertion-case-deleted models, it is characterised in that:It produces chaotic maps
Chaos sequence and biochemical reaction in insertion-case-deleted models be combined;It carries out DNA encoding to original image first, then
The DNA sequence dna that the chaos sequence scramble produced is obtained by encoding is mapped using Lorenz, it is then another with insertion-case-deleted models
Secondary scramble DNA sequence dna, finally maps the chaos sequence produced using Lorenz and is diffused behaviour to obtained DNA sequence dna matrix
Make, encrypted image finally is obtained to sequence matrix decoding;Encryption method is comprised the following steps that:
S1, using DNA encoding rule original image is carried out to encode and obtain DNA sequence dna matrix;
S2, utilize Lorenz chaotic maps produce chaos sequence (x, y, z)
Give arbitrary initial value x0,y0,z0, the Hamming distance of the DNA sequence dna matrix obtained in calculation procedure S1, Hamming it is inverse away from
With a distance from being mended with Hamming, and the decimal being converted between 0-1, by obtained new Hamming distance, Hamming against distance and the Chinese
Visible subsidy distance respectively with x0,y0,z0It is added, obtains new initial value x1,y1,z1;Three chaos are produced then in conjunction with systematic parameter
Sequence (x, y, z);
S3, the value with the DNA sequence dna matrix in chaos sequence (x, y) scramble step S1;
Chaos sequence (x, y) is rounded downwards, with the value of the sequence scramble DNA sequence dna matrix newly obtained;
S4, the value with chaos sequence (x, z) and insertion-case-deleted models scramble DNA sequence dna matrix again;
S5, the value of the DNA sequence dna matrix obtained with chaos sequence (y, z) and XOR to step S4 are diffused operation;
Matrix sequence is divided into size identical block first, then chaos sequence (y, z) rounded downwards, XOR is finally combined and transports
Calculate the value that DNA sequence dna matrix is spread by block;
S6, the size identical merged block obtained in step S5 obtained into a DNA sequence dna matrix, decoding it can be added
Close image.
2. the image encryption method according to claim 1 based on chaos system with insertion-case-deleted models, its feature exists
In:The process of the step S4 is as follows:The DNA sequence dna matrix obtained in step S3 is divided into above and below size identical two first
Point;Then identical is carried out to this two parts to operate as follows:Arranged using the one of DNA sequence dna matrix as a subsequence, obtain one
The individual and equal-sized one-dimension array of sequence matrix columns;One and array size identical are produced using Lorenz chaotic maps
Chaos sequence between 0 and 1;If the value of i-th of position of chaos sequence is less than 0.5, using deletion action array i-th
The element put is deleted, and the element of deletion is inserted into using insertion operation the end of remaining array;Otherwise without any
Operation;Two parts are finally merged into a sequence matrix, operation is completed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510009578.8A CN104574259B (en) | 2015-01-08 | 2015-01-08 | Image encryption method based on chaos system Yu insertion-case-deleted models |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510009578.8A CN104574259B (en) | 2015-01-08 | 2015-01-08 | Image encryption method based on chaos system Yu insertion-case-deleted models |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104574259A CN104574259A (en) | 2015-04-29 |
CN104574259B true CN104574259B (en) | 2017-07-11 |
Family
ID=53090247
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510009578.8A Expired - Fee Related CN104574259B (en) | 2015-01-08 | 2015-01-08 | Image encryption method based on chaos system Yu insertion-case-deleted models |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104574259B (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105046636B (en) * | 2015-07-13 | 2017-05-03 | 郑州轻工业学院 | Digital image encryption method based on chaotic system and nucleotide sequence database |
CN105119717A (en) * | 2015-07-21 | 2015-12-02 | 郑州轻工业学院 | DNA coding based encryption system and encryption method |
CN105678677B (en) * | 2016-01-06 | 2018-11-02 | 大连大学 | Image encryption method based on hash function and insertion-case-deleted models |
CN106651735A (en) * | 2016-09-08 | 2017-05-10 | 广东工业大学 | Chaos theory-based digital image parallel encryption method |
CN106530197A (en) * | 2016-10-12 | 2017-03-22 | 广东工业大学 | Image encryption method based on Kent mapping and generalized Gray codes |
CN107437266A (en) * | 2017-07-11 | 2017-12-05 | 大连大学 | Image encryption method based on chaos system Yu DNA chain displacement model |
CN107992948B (en) * | 2017-10-30 | 2021-10-19 | 东北林业大学 | Quantum image encryption algorithm based on chaotic system and DNA dynamic coding |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101702240A (en) * | 2009-11-26 | 2010-05-05 | 大连大学 | Image encryption method based on DNA sub-sequence operation |
CN101706947A (en) * | 2009-11-26 | 2010-05-12 | 大连大学 | Image fusion encryption method based on DNA sequences and multiple chaotic mappings |
CN103167213A (en) * | 2013-02-07 | 2013-06-19 | 东北大学 | Digital image encryption method based on Cat mapping and hyper-chaos Lorenz system |
-
2015
- 2015-01-08 CN CN201510009578.8A patent/CN104574259B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101702240A (en) * | 2009-11-26 | 2010-05-05 | 大连大学 | Image encryption method based on DNA sub-sequence operation |
CN101706947A (en) * | 2009-11-26 | 2010-05-12 | 大连大学 | Image fusion encryption method based on DNA sequences and multiple chaotic mappings |
CN103167213A (en) * | 2013-02-07 | 2013-06-19 | 东北大学 | Digital image encryption method based on Cat mapping and hyper-chaos Lorenz system |
Non-Patent Citations (2)
Title |
---|
A novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system;Qiang Zhang 等;《Optik》;20130207;第124卷(第18期);第3596-3600页 * |
DNA计算机原理、进展及难点(Ⅳ):论DNA计算机模型;许进 等;《计算机学报》;20070630;第30卷(第06期);第881-893页 * |
Also Published As
Publication number | Publication date |
---|---|
CN104574259A (en) | 2015-04-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104574259B (en) | Image encryption method based on chaos system Yu insertion-case-deleted models | |
CN105046636B (en) | Digital image encryption method based on chaotic system and nucleotide sequence database | |
CN108365947B (en) | A kind of image encryption method based on Feistel network Yu dynamic DNA encoding | |
Wang et al. | A novel chaotic algorithm for image encryption utilizing one-time pad based on pixel level and DNA level | |
CN108366181B (en) | A kind of image encryption method based on hyperchaotic system and multistage scramble | |
CN109376540B (en) | Image encryption method based on Duffing mapping and genetic operation | |
Liu et al. | Color image encryption algorithm based on DNA coding and double chaos system | |
Niu et al. | An image encryption approach based on chaotic maps and genetic operations | |
Zhang et al. | A new image encryption algorithm based on non-adjacent coupled map lattices | |
CN105046161B (en) | Color image encrypting method based on DNA dynamic codings | |
Liu et al. | Color image encryption using three-dimensional sine ICMIC modulation map and DNA sequence operations | |
Zhang et al. | Image encryption algorithm based on DNA encoding and chaotic maps | |
CN104766264B (en) | A kind of piecemeal two tier adaptive diffusion image encryption method | |
CN107590842B (en) | Image encryption method and device based on pixel and DNA cross dynamic chaotic password | |
CN107437266A (en) | Image encryption method based on chaos system Yu DNA chain displacement model | |
CN107220923B (en) | Digital picture feedback encryption method based on image network | |
CN106997606B (en) | A kind of image encryption method based on hyperchaotic system Projective Synchronization | |
CN101702240A (en) | Image encryption method based on DNA sub-sequence operation | |
CN106780282B (en) | Resume image based on piecemeal DNA encoding and uniform scramble | |
CN104766350B (en) | Image encryption method based on splice model and hyperchaotic system | |
CN107094072A (en) | A kind of mixed chaos encryption method based on general Henon Map | |
Hamad | Novel Implementation of an Extended 8x8 Playfair Cipher Using Interweaving on DNA-encoded Data. | |
CN107451948A (en) | Image Encrypt and Decrypt method and system based on chaos and DNA dynamic plane computings | |
Alam et al. | Universal playfair cipher using MXN matrix | |
CN112202545A (en) | Image encryption method based on Y-type filling curve and variable-step Joseph traversal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20170711 |
|
CF01 | Termination of patent right due to non-payment of annual fee |