CN105488426B - Mobile platform image encryption method - Google Patents

Mobile platform image encryption method Download PDF

Info

Publication number
CN105488426B
CN105488426B CN201510864446.3A CN201510864446A CN105488426B CN 105488426 B CN105488426 B CN 105488426B CN 201510864446 A CN201510864446 A CN 201510864446A CN 105488426 B CN105488426 B CN 105488426B
Authority
CN
China
Prior art keywords
piecemeal
encryption method
pixel value
image encryption
chaos
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510864446.3A
Other languages
Chinese (zh)
Other versions
CN105488426A (en
Inventor
李保印
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Wingtech Electronic Technology Co Ltd
Original Assignee
Xian Wingtech Electronic Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Wingtech Electronic Technology Co Ltd filed Critical Xian Wingtech Electronic Technology Co Ltd
Priority to CN201510864446.3A priority Critical patent/CN105488426B/en
Publication of CN105488426A publication Critical patent/CN105488426A/en
Application granted granted Critical
Publication of CN105488426B publication Critical patent/CN105488426B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Facsimile Transmission Control (AREA)

Abstract

Present invention discloses a kind of mobile platform image encryption method, described image encryption method includes: that image array I to be encrypted is divided into several small matrix-blocks first;Recycle image scrambling and each small piecemeal of greyscale transform process;Then the pixel value in each piecemeal is diffused in other piecemeals;All piecemeals are finally synthesized into encrypted picture.Mobile platform image encryption method proposed by the present invention can effectively improve the safety of image information in conjunction with greyscale transformation and image scrambling.

Description

Mobile platform image encryption method
Technical field
The invention belongs to image encryption technology fields, are related to a kind of image encryption method more particularly to a kind of mobile platform Image encryption method.
Background technique
In recent years, develop using smart phone as the mobile terminal of representative swift and violent.With its manufacturing cost it is continuous decline and The continuous renewal of function, popularity rate also constantly rise, and majority are owned by an at least mobile device such as smart phone.With people The accelerating rhythm of life, the advantages that having benefited from the portability of mobile device, more and more people it is mobile using smart phone etc. The time of equipment starts more than traditional computer (such as desktop computer, machine this computer).But what is walked unlike this is that people exist Awareness of safety in mobile device is but without being more than traditional computer, and the information security technology of traditional computer is by decades Development has reached its maturity, but its hardware frame frame for being limited to mobile platform and network environment, therefore indiscriminately imitates conventional security protection Technology is simultaneously not suitable for.Currently, the image information safety problem caused by mobile devices such as smart phones is commonplace, protection movement The information of platform especially image information is extremely urgent safely.
Summary of the invention
The technical problems to be solved by the present invention are: providing a kind of mobile platform image encryption method, figure can be effectively improved As the safety of information.
In order to solve the above technical problems, the present invention adopts the following technical scheme:
A kind of mobile platform image encryption method, described image encryption method include: first by image array I to be encrypted points At several small matrix-blocks;Recycle image scrambling and each small piecemeal of greyscale transform process;Then each piecemeal Interior pixel value diffuses in other piecemeals;All piecemeals are finally synthesized into encrypted picture.
As a preferred solution of the present invention, described image encryption method further include: step S1, pre-treatment step;
For original image I, picture element matrix size is M × N, and expanding picture element matrix makes its size become M ' × N ', so that Wherein M ', N ' are complete square iterative method, might as well set point that M ' × N ' picture element matrix is divided into m × n size in order as m × n Block;(i, j) a piecemeal is indicated with two-dimensional array A [i] [j];With two-dimensional array BA[i][j][x] [y] indicates piecemeal A [i] Pixel value in [j], wherein 0≤i≤m-1,0≤j≤n-1,0≤x≤m-1,0≤y≤n-1.
As a preferred solution of the present invention, in order to increase safety, first Logistic chaos system and tent are mixed Ignorant system distinguishes iteration key1, key2 times;
Logistic system and tent system are most common chaos systems;Logistic mapping is derived to demographics Dynamic system, be a typical non linear chaos equation;It has ergodic, aperiodicity, long-term unpredictability with And the good Chaotic Behavior such as non-convergency, mapping definition are as follows:
0 < xn < 1, n=0,1,2 of xn+1=a*xn* (1-xn) ... (1)
Wherein, as 3.596≤a of coefficient≤4, system enters chaos state;
Tent system is a kind of one-dimensional map of piecewise linearity, has uniform probability density and power spectral density, and Comparatively ideal autocorrelation;Tent mapping definition are as follows:
Wherein, as 0 < b≤2, system is in chaos state;
The number of iterations key1, key2 is as encryption key;Wherein the initial value of Logistic is made as key key3, parameter a For key key4;Wherein the initial value of tent system is as key key5;Parameter b is as key key6;
Step S2, the processing step in piecemeal;
Using Logistic chaos system tectonic sequence T [m × n], so that 0≤T [i]≤m × n-1, wherein 0≤i≤m × N-1, and have T [i] ≠ T [j], as i ≠ j;It is as follows to the processing method of pixel value in each piecemeal, for piecemeal A [i] [j];It specifically includes:
Step S21, transposition of structures array step;
A random number temp is generated using tent chaos system;By temp respectively with each T [r] (r=0,1,2, 3 ... m × n-1) it is added, then to m × n remainder, obtain new sequence T [m × n];Formulae express:
T ' [r]=(temp+T [r]) mod (m × n) (3)
Step S22, according to the sequence of sequence T ' [m × n], the pixel value in piecemeal is replaced;Such as BA[i][j][x] [y], Displacement position is calculated first,
If k1=T [x × n+y]/(m × n), k2=T [x × n+y] % (m+n) (4)
Then B 'A[i][j][k1] [k2]=BA[i][j][x] [y], wherein 0≤x≤m-1,0≤y≤n-1;
Step S23, xor operation;For each pixel value B ' in piecemealA[i][j][x] [y] utilizes tent chaos system System generates a pseudo random number e, then by pixel value B 'A[i][j][x] [y] and e exclusive or;That is:
B′A[i][j][x] [y]=B 'A[i][j][x][y]∧e (5)
Step S24, according to step S21 to step S23, each piecemeal is successively handled;
Step S3, the processing step between piecemeal;
Pixel value in each piecemeal is diffused in other piecemeals;By (i, j) a piecemeal pixel value B 'A[i][j][x] [y]] diffuse to position (i, j) in (x, y) a piecemeal;That is:
B″A′[x][y][i] [j]=B 'A[i][j][x][y] (6)
As a preferred solution of the present invention, described image encryption method further include: step S3 step S4, is disposed it Sequence arrangement of the piecemeal afterwards by column sequence preferentially from small to large, obtains encrypted image I '.
As a preferred solution of the present invention, described image encryption method further include: step S5, decryption step;
Using the value of key key1, key2, key3, key4, key5, key6 when encryption, decrypted according to the inverse process of encryption, If there is redundant data, remove the redundant data of addition, the image after decryption can be obtained.
The beneficial effects of the present invention are mobile platform image encryption method proposed by the present invention, in conjunction with greyscale transformation and Image scrambling can effectively improve the safety of image information.
Detailed description of the invention
Fig. 1 is the flow chart of mobile platform image encryption method of the present invention.
Specific embodiment
The preferred embodiment that the invention will now be described in detail with reference to the accompanying drawings.
Embodiment one
Referring to Fig. 1, present invention discloses a kind of mobile platform image encryption methods, first by image array I to be encrypted It is divided into several small matrix-blocks;Recycle image scrambling and each small piecemeal of greyscale transform process;Then each point Pixel value in block diffuses in other piecemeals;All piecemeals are finally synthesized into encrypted picture, encryption flow such as Fig. 1 institute Show.This algorithm reduces calculation amount required for image scrambling is handled, is allowed to be suitble in movement while guaranteeing cipher round results Encrypted image on platform.
[step S1] encryption method, comprising:
(1) pre-treatment step;
For original image I, picture element matrix size is M × N, and expanding the picture element matrix (with 0 filling) makes its size become M ' × N ' so that wherein M ', N ' be complete square iterative method, might as well set by M ' × N ' picture element matrix be divided into order m × n size as The piecemeal of m × n.For convenience's sake, (i, j) a piecemeal is indicated with two-dimensional array A [i] [j].With two-dimensional array BA[i][j] [x] [y] indicates pixel value (wherein 0≤i≤m-1,0≤j≤n-1,0≤x≤m-1,0≤y≤n- in piecemeal A [i] [j] 1).In order to increase safety, Logistic chaos system and tent chaos system are first distinguished into iteration key1, key2 times.
Logistic system and tent system are most common chaos systems.Logistic mapping is derived to demographics Dynamic system, be a typical non linear chaos equation.It has ergodic, aperiodicity, long-term unpredictability with And the good Chaotic Behavior such as non-convergency, mapping definition are that (as 3.596≤a of coefficient≤4, system enters chaos shape State):
0 < xn < 1, n=0,1,2 of xn+1=a*xn* (1-xn) ... (1)
Tent system is a kind of one-dimensional map of piecewise linearity, has uniform probability density and power spectral density, and Comparatively ideal autocorrelation.Tent mapping definition is (wherein as 0 < b≤2, system is in chaos state):
The number of iterations key1, key2 is as encryption key.Wherein the initial value of Logistic is made as key key3, parameter a For key key4.Wherein the initial value of tent system is as key key5.Parameter b is as key key6.
(2) processing in piecemeal
Using Logistic chaos system tectonic sequence T [m × n], so that 0≤T [i]≤m × n-1, wherein 0≤i≤m × N-1, and have T [i] ≠ T [j], as i ≠ j.It is as follows to the processing method of pixel value in each piecemeal, with piecemeal A [i] [j] For.
A) transposition of structures array
A random number temp is generated using tent chaos system.By temp respectively with each T [r] (r=0,1,2, 3 ... m × n-1) it is added, then to m × n remainder, obtain new sequence T [m × n].Formulae express:
T ' [r]=(temp+T [r]) mod (m × n) (3)
B) according to the sequence of sequence T ' [m × n], the pixel value in piecemeal is replaced.Such as BA[i][j][x] [y], is counted first Displacement position is calculated, if
K1=T [x × n+y]/(m × n), k2=T [x × n+y] % (m+n) (4)
Then B 'A[i][j][k1] [k2]=BA[i][j][x] [y], wherein 0≤x≤m-1,0≤y≤n-1.
C) xor operation.For each pixel value B ' in piecemealA[i][j][x] [y] is generated using tent chaos system One pseudo random number e, then by pixel value B 'A[i][j][x] [y] and e exclusive or.That is:
B′A[i][j][x] [y]=B 'A[i][j][x][y]∧e (5)
D) according to a)-c) step, successively handle each piecemeal.
(3) processing between piecemeal
Pixel value in each piecemeal is diffused in other piecemeals.By (i, j) a piecemeal pixel value B 'A[i][j][x] [y]] diffuse to position (i, j) in (x, y) a piecemeal.That is:
B″A′[x][y][i] [j]=B 'A[i][j][x][y] (6)
(4) piecemeal after step (3) disposition is arranged by the sequence of column sequence preferentially from small to large, obtains encrypted figure As I '.
The description of [step S2] decipherment algorithm
Using the value of key key1, key2, key3, key4, key5, key6 when encryption, decrypted according to the inverse process of encryption, Then the redundant data (if present) for removing addition, the image after decryption can be obtained.
In conclusion mobile platform image encryption method proposed by the present invention can have in conjunction with greyscale transformation and image scrambling Effect improves the safety of image information.
Description and application of the invention herein are illustrative, is not wishing to limit the scope of the invention to above-described embodiment In.The deformation and change of embodiments disclosed herein are possible, the realities for those skilled in the art The replacement and equivalent various parts for applying example are well known.It should be appreciated by the person skilled in the art that not departing from the present invention Spirit or essential characteristics in the case where, the present invention can in other forms, structure, arrangement, ratio, and with other components, Material and component are realized.Without departing from the scope and spirit of the present invention, can to embodiments disclosed herein into The other deformations of row and change.

Claims (4)

1. a kind of mobile platform image encryption method, which is characterized in that described image encryption method includes: first by figure to be encrypted As matrix I is divided into several small matrix-blocks;Recycle image scrambling and each small piecemeal of greyscale transform process;Then Pixel value in each piecemeal diffuses in other piecemeals;All piecemeals are finally synthesized into encrypted picture;
Described image encryption method further include: step S1, pre-treatment step;
For original image I, picture element matrix size is M × N, and expanding picture element matrix makes its size become M ' × N ', so that wherein M ', N ' are complete square iterative method, might as well set M ' × N ' picture element matrix being divided into m × n size in order as the piecemeal of m × n;With Two-dimensional array A [i] [j] indicates (i, j) a piecemeal;With two-dimensional array BA[i][j][x] [y] is indicated in piecemeal A [i] [j] Pixel value, wherein 0≤i≤m-1,0≤j≤n-1,0≤x≤m-1,0≤y≤n-1;
In order to increase safety, Logistic chaos system and tent chaos system are first distinguished into iteration key1, key2 times;
Logistic system and tent system are most common chaos systems;Logistic mapping is derived to demographic dynamic Mechanical system is a typical non linear chaos equation;It has ergodic, aperiodicity, long-term unpredictability and non- The good Chaotic Behavior such as convergence, mapping definition are as follows:
0 < xn < 1, n=0,1,2 of xn+1=a*xn* (1-xn) ... (1)
Wherein, as 3.596≤a of coefficient≤4, system enters chaos state;
Tent system is a kind of one-dimensional map of piecewise linearity, has uniform probability density and power spectral density, and relatively manage The autocorrelation thought;Tent mapping definition are as follows:
Wherein, as 0 < b≤2, system is in chaos state;
The number of iterations key1, key2 is as encryption key;Wherein the initial value of Logistic is as key key3, and parameter a is as close Key key4;Wherein the initial value of tent system is as key key5;Parameter b is as key key6;
Described image encryption method further include: the step S2, processing step in piecemeal;
Using Logistic chaos system tectonic sequence T [m × n], so that 0≤T [i]≤m × n-1, wherein 0≤i≤m × n- 1, and have T [i] ≠ T [j], as i ≠ j;It is as follows to the processing method of pixel value in each piecemeal, for piecemeal A [i] [j];
It specifically includes:
Step S21, transposition of structures array step;
A random number temp is generated using tent chaos system;By temp respectively with each T [r] (r=0,1,2,3 ... m × n-1) it is added, then to m × n remainder, obtain new sequence T [m × n];Formulae express:
T ' [r]=(temp+T [r]) mod (m × n) (3)
Step S22, according to the sequence of sequence T ' [m × n], the pixel value in piecemeal is replaced;Such as BA[i][j][x] [y], first Displacement position is calculated, if
K1=T [x × n+y]/(m × n), k2=T [x × n+y] % (m+n) (4)
Then B 'A[i][j][k1] [k2]=BA[i][j][x] [y], wherein 0≤x≤m-1,0≤y≤n-1;
Step S23, xor operation;For each pixel value B ' in piecemealA[i][j][x] [y] is produced using tent chaos system A raw pseudo random number e, then by pixel value B 'A[i][j][x] [y] and e exclusive or;That is:
B′A[i][j][x] [y]=B 'A[i][j][x][y]∧e (5)
Step S24, according to step S21 to step S23, each piecemeal is successively handled.
2. mobile platform image encryption method according to claim 1, it is characterised in that:
Described image encryption method further include: the step S3, processing step between piecemeal;
Pixel value in each piecemeal is diffused in other piecemeals;By (i, j) a piecemeal pixel value B 'A[i][j][x] [y]] hair It is scattered to position (i, j) in (x, y) a piecemeal;That is:
B″A′[x][y][i] [j]=B 'A[i][j][x][y] (6)。
3. mobile platform image encryption method according to claim 2, it is characterised in that: described image encryption method is also wrapped It includes: the piecemeal after step S3 disposition being arranged by the sequence of column sequence preferentially from small to large step S4, obtains encrypted image I′。
4. mobile platform image encryption method according to claim 3, it is characterised in that:
Described image encryption method further include: step S5, decryption step;
Using the value of key key1, key2, key3, key4, key5, key6 when encryption, decrypted according to the inverse process of encryption, if There are redundant datas, remove the redundant data of addition, the image after decryption can be obtained.
CN201510864446.3A 2015-11-30 2015-11-30 Mobile platform image encryption method Active CN105488426B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510864446.3A CN105488426B (en) 2015-11-30 2015-11-30 Mobile platform image encryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510864446.3A CN105488426B (en) 2015-11-30 2015-11-30 Mobile platform image encryption method

Publications (2)

Publication Number Publication Date
CN105488426A CN105488426A (en) 2016-04-13
CN105488426B true CN105488426B (en) 2019-12-03

Family

ID=55675399

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510864446.3A Active CN105488426B (en) 2015-11-30 2015-11-30 Mobile platform image encryption method

Country Status (1)

Country Link
CN (1) CN105488426B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106156654B (en) * 2016-08-30 2019-06-11 成都百润百成科技股份有限公司 File encryption apparatus and method
CN106570815A (en) * 2016-10-21 2017-04-19 广东工业大学 Image encryption method based on double-chaos system and blocking
CN107507254B (en) * 2017-08-18 2018-11-23 济南大学 Compression of images encryption method based on arithmetic coding
CN109068021B (en) * 2018-08-27 2020-02-14 优信数享(北京)信息技术有限公司 Encryption and decryption method and system
CN109660696B (en) * 2018-11-30 2020-07-14 大连理工大学 New image encryption method
US11757616B2 (en) 2021-09-18 2023-09-12 Dalian Unversity of Technology Image encryption method based on improved class boosting scheme

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7174019B2 (en) * 2001-11-12 2007-02-06 Toshiba Information Systems (Japan) Corporation Cipher generating device, cipher decoding device, cipher generating program, cipher decoding program, authentication system and electronic device
CN102982499A (en) * 2012-09-28 2013-03-20 河南大学 Color image encryption and decryption method based on multiple-fractional-order chaotic systems
CN103248854A (en) * 2013-04-27 2013-08-14 东北大学 Medical image encryption method based on uniform scrambling and chaotic mapping
CN104766264A (en) * 2015-01-22 2015-07-08 西北工业大学 Partitioning double-layer self-adaptation diffusion image encryption method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7174019B2 (en) * 2001-11-12 2007-02-06 Toshiba Information Systems (Japan) Corporation Cipher generating device, cipher decoding device, cipher generating program, cipher decoding program, authentication system and electronic device
CN102982499A (en) * 2012-09-28 2013-03-20 河南大学 Color image encryption and decryption method based on multiple-fractional-order chaotic systems
CN103248854A (en) * 2013-04-27 2013-08-14 东北大学 Medical image encryption method based on uniform scrambling and chaotic mapping
CN104766264A (en) * 2015-01-22 2015-07-08 西北工业大学 Partitioning double-layer self-adaptation diffusion image encryption method

Also Published As

Publication number Publication date
CN105488426A (en) 2016-04-13

Similar Documents

Publication Publication Date Title
CN105488426B (en) Mobile platform image encryption method
Wang et al. An image encryption algorithm based on a hidden attractor chaos system and the Knuth–Durstenfeld algorithm
US20210312334A1 (en) Model parameter training method, apparatus, and device based on federation learning, and medium
Chai An image encryption algorithm based on bit level Brownian motion and new chaotic systems
Zhou et al. Image encryption using binary bitplane
Zhu et al. A chaos-based symmetric image encryption scheme using a bit-level permutation
Zhou et al. Image encryption using P-Fibonacci transform and decomposition
Xiao et al. A chaos-based hash function with both modification detection and localization capabilities
Sang et al. Image encryption based on logistic chaotic systems and deep autoencoder
Sun et al. Image compression and encryption scheme using fractal dictionary and Julia set
Kumar et al. IEHC: An efficient image encryption technique using hybrid chaotic map
Hanis et al. Double image compression and encryption scheme using logistic mapped convolution and cellular automata
CN111461952A (en) Image encryption method, computer device, and computer-readable storage medium
Karawia Image encryption based on Fisher‐Yates shuffling and three dimensional chaotic economic map
CN107481180A (en) The image encryption method perceived based on cellular automata and splits&#39; positions
CN111008383A (en) Image encryption method based on multidirectional diffusion and DNA coding
CN114679250A (en) Image encryption algorithm based on mixed chaos and Arnold transformation
Jiang et al. Image encryption algorithm based on discrete quantum baker map and chen hyperchaotic system
Wen et al. Triple-image bit-level encryption algorithm based on double cross 2D hyperchaotic map
Chong et al. Block color image encryption algorithm based on elementary cellular automata and DNA sequence operations
Singh et al. Ecis: encryption prior to compression for digital image security with reduced memory
CN106127669B (en) Based on the New chaotic image encryption method for protecting area B aker mapping
CN104881837A (en) Hyper-chaotic system-based secret key dynamic selection image encryption algorithm
CN104143174A (en) Image disguising and reconstructing method based on Tangram algorithm and two-dimensional double-scale rectangular mapping
Wadi et al. Decomposition by binary codes‐based speedy image encryption algorithm for multiple applications

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant