CN105488426B - Mobile platform image encryption method - Google Patents
Mobile platform image encryption method Download PDFInfo
- Publication number
- CN105488426B CN105488426B CN201510864446.3A CN201510864446A CN105488426B CN 105488426 B CN105488426 B CN 105488426B CN 201510864446 A CN201510864446 A CN 201510864446A CN 105488426 B CN105488426 B CN 105488426B
- Authority
- CN
- China
- Prior art keywords
- piecemeal
- encryption method
- pixel value
- image encryption
- chaos
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Facsimile Transmission Control (AREA)
Abstract
Present invention discloses a kind of mobile platform image encryption method, described image encryption method includes: that image array I to be encrypted is divided into several small matrix-blocks first;Recycle image scrambling and each small piecemeal of greyscale transform process;Then the pixel value in each piecemeal is diffused in other piecemeals;All piecemeals are finally synthesized into encrypted picture.Mobile platform image encryption method proposed by the present invention can effectively improve the safety of image information in conjunction with greyscale transformation and image scrambling.
Description
Technical field
The invention belongs to image encryption technology fields, are related to a kind of image encryption method more particularly to a kind of mobile platform
Image encryption method.
Background technique
In recent years, develop using smart phone as the mobile terminal of representative swift and violent.With its manufacturing cost it is continuous decline and
The continuous renewal of function, popularity rate also constantly rise, and majority are owned by an at least mobile device such as smart phone.With people
The accelerating rhythm of life, the advantages that having benefited from the portability of mobile device, more and more people it is mobile using smart phone etc.
The time of equipment starts more than traditional computer (such as desktop computer, machine this computer).But what is walked unlike this is that people exist
Awareness of safety in mobile device is but without being more than traditional computer, and the information security technology of traditional computer is by decades
Development has reached its maturity, but its hardware frame frame for being limited to mobile platform and network environment, therefore indiscriminately imitates conventional security protection
Technology is simultaneously not suitable for.Currently, the image information safety problem caused by mobile devices such as smart phones is commonplace, protection movement
The information of platform especially image information is extremely urgent safely.
Summary of the invention
The technical problems to be solved by the present invention are: providing a kind of mobile platform image encryption method, figure can be effectively improved
As the safety of information.
In order to solve the above technical problems, the present invention adopts the following technical scheme:
A kind of mobile platform image encryption method, described image encryption method include: first by image array I to be encrypted points
At several small matrix-blocks;Recycle image scrambling and each small piecemeal of greyscale transform process;Then each piecemeal
Interior pixel value diffuses in other piecemeals;All piecemeals are finally synthesized into encrypted picture.
As a preferred solution of the present invention, described image encryption method further include: step S1, pre-treatment step;
For original image I, picture element matrix size is M × N, and expanding picture element matrix makes its size become M ' × N ', so that
Wherein M ', N ' are complete square iterative method, might as well set point that M ' × N ' picture element matrix is divided into m × n size in order as m × n
Block;(i, j) a piecemeal is indicated with two-dimensional array A [i] [j];With two-dimensional array BA[i][j][x] [y] indicates piecemeal A [i]
Pixel value in [j], wherein 0≤i≤m-1,0≤j≤n-1,0≤x≤m-1,0≤y≤n-1.
As a preferred solution of the present invention, in order to increase safety, first Logistic chaos system and tent are mixed
Ignorant system distinguishes iteration key1, key2 times;
Logistic system and tent system are most common chaos systems;Logistic mapping is derived to demographics
Dynamic system, be a typical non linear chaos equation;It has ergodic, aperiodicity, long-term unpredictability with
And the good Chaotic Behavior such as non-convergency, mapping definition are as follows:
0 < xn < 1, n=0,1,2 of xn+1=a*xn* (1-xn) ... (1)
Wherein, as 3.596≤a of coefficient≤4, system enters chaos state;
Tent system is a kind of one-dimensional map of piecewise linearity, has uniform probability density and power spectral density, and
Comparatively ideal autocorrelation;Tent mapping definition are as follows:
Wherein, as 0 < b≤2, system is in chaos state;
The number of iterations key1, key2 is as encryption key;Wherein the initial value of Logistic is made as key key3, parameter a
For key key4;Wherein the initial value of tent system is as key key5;Parameter b is as key key6;
Step S2, the processing step in piecemeal;
Using Logistic chaos system tectonic sequence T [m × n], so that 0≤T [i]≤m × n-1, wherein 0≤i≤m ×
N-1, and have T [i] ≠ T [j], as i ≠ j;It is as follows to the processing method of pixel value in each piecemeal, for piecemeal A [i]
[j];It specifically includes:
Step S21, transposition of structures array step;
A random number temp is generated using tent chaos system;By temp respectively with each T [r] (r=0,1,2,
3 ... m × n-1) it is added, then to m × n remainder, obtain new sequence T [m × n];Formulae express:
T ' [r]=(temp+T [r]) mod (m × n) (3)
Step S22, according to the sequence of sequence T ' [m × n], the pixel value in piecemeal is replaced;Such as BA[i][j][x] [y],
Displacement position is calculated first,
If k1=T [x × n+y]/(m × n), k2=T [x × n+y] % (m+n) (4)
Then B 'A[i][j][k1] [k2]=BA[i][j][x] [y], wherein 0≤x≤m-1,0≤y≤n-1;
Step S23, xor operation;For each pixel value B ' in piecemealA[i][j][x] [y] utilizes tent chaos system
System generates a pseudo random number e, then by pixel value B 'A[i][j][x] [y] and e exclusive or;That is:
B′A[i][j][x] [y]=B 'A[i][j][x][y]∧e (5)
Step S24, according to step S21 to step S23, each piecemeal is successively handled;
Step S3, the processing step between piecemeal;
Pixel value in each piecemeal is diffused in other piecemeals;By (i, j) a piecemeal pixel value B 'A[i][j][x]
[y]] diffuse to position (i, j) in (x, y) a piecemeal;That is:
B″A′[x][y][i] [j]=B 'A[i][j][x][y] (6)
As a preferred solution of the present invention, described image encryption method further include: step S3 step S4, is disposed it
Sequence arrangement of the piecemeal afterwards by column sequence preferentially from small to large, obtains encrypted image I '.
As a preferred solution of the present invention, described image encryption method further include: step S5, decryption step;
Using the value of key key1, key2, key3, key4, key5, key6 when encryption, decrypted according to the inverse process of encryption,
If there is redundant data, remove the redundant data of addition, the image after decryption can be obtained.
The beneficial effects of the present invention are mobile platform image encryption method proposed by the present invention, in conjunction with greyscale transformation and
Image scrambling can effectively improve the safety of image information.
Detailed description of the invention
Fig. 1 is the flow chart of mobile platform image encryption method of the present invention.
Specific embodiment
The preferred embodiment that the invention will now be described in detail with reference to the accompanying drawings.
Embodiment one
Referring to Fig. 1, present invention discloses a kind of mobile platform image encryption methods, first by image array I to be encrypted
It is divided into several small matrix-blocks;Recycle image scrambling and each small piecemeal of greyscale transform process;Then each point
Pixel value in block diffuses in other piecemeals;All piecemeals are finally synthesized into encrypted picture, encryption flow such as Fig. 1 institute
Show.This algorithm reduces calculation amount required for image scrambling is handled, is allowed to be suitble in movement while guaranteeing cipher round results
Encrypted image on platform.
[step S1] encryption method, comprising:
(1) pre-treatment step;
For original image I, picture element matrix size is M × N, and expanding the picture element matrix (with 0 filling) makes its size become M '
× N ' so that wherein M ', N ' be complete square iterative method, might as well set by M ' × N ' picture element matrix be divided into order m × n size as
The piecemeal of m × n.For convenience's sake, (i, j) a piecemeal is indicated with two-dimensional array A [i] [j].With two-dimensional array BA[i][j]
[x] [y] indicates pixel value (wherein 0≤i≤m-1,0≤j≤n-1,0≤x≤m-1,0≤y≤n- in piecemeal A [i] [j]
1).In order to increase safety, Logistic chaos system and tent chaos system are first distinguished into iteration key1, key2 times.
Logistic system and tent system are most common chaos systems.Logistic mapping is derived to demographics
Dynamic system, be a typical non linear chaos equation.It has ergodic, aperiodicity, long-term unpredictability with
And the good Chaotic Behavior such as non-convergency, mapping definition are that (as 3.596≤a of coefficient≤4, system enters chaos shape
State):
0 < xn < 1, n=0,1,2 of xn+1=a*xn* (1-xn) ... (1)
Tent system is a kind of one-dimensional map of piecewise linearity, has uniform probability density and power spectral density, and
Comparatively ideal autocorrelation.Tent mapping definition is (wherein as 0 < b≤2, system is in chaos state):
The number of iterations key1, key2 is as encryption key.Wherein the initial value of Logistic is made as key key3, parameter a
For key key4.Wherein the initial value of tent system is as key key5.Parameter b is as key key6.
(2) processing in piecemeal
Using Logistic chaos system tectonic sequence T [m × n], so that 0≤T [i]≤m × n-1, wherein 0≤i≤m ×
N-1, and have T [i] ≠ T [j], as i ≠ j.It is as follows to the processing method of pixel value in each piecemeal, with piecemeal A [i] [j]
For.
A) transposition of structures array
A random number temp is generated using tent chaos system.By temp respectively with each T [r] (r=0,1,2,
3 ... m × n-1) it is added, then to m × n remainder, obtain new sequence T [m × n].Formulae express:
T ' [r]=(temp+T [r]) mod (m × n) (3)
B) according to the sequence of sequence T ' [m × n], the pixel value in piecemeal is replaced.Such as BA[i][j][x] [y], is counted first
Displacement position is calculated, if
K1=T [x × n+y]/(m × n), k2=T [x × n+y] % (m+n) (4)
Then B 'A[i][j][k1] [k2]=BA[i][j][x] [y], wherein 0≤x≤m-1,0≤y≤n-1.
C) xor operation.For each pixel value B ' in piecemealA[i][j][x] [y] is generated using tent chaos system
One pseudo random number e, then by pixel value B 'A[i][j][x] [y] and e exclusive or.That is:
B′A[i][j][x] [y]=B 'A[i][j][x][y]∧e (5)
D) according to a)-c) step, successively handle each piecemeal.
(3) processing between piecemeal
Pixel value in each piecemeal is diffused in other piecemeals.By (i, j) a piecemeal pixel value B 'A[i][j][x]
[y]] diffuse to position (i, j) in (x, y) a piecemeal.That is:
B″A′[x][y][i] [j]=B 'A[i][j][x][y] (6)
(4) piecemeal after step (3) disposition is arranged by the sequence of column sequence preferentially from small to large, obtains encrypted figure
As I '.
The description of [step S2] decipherment algorithm
Using the value of key key1, key2, key3, key4, key5, key6 when encryption, decrypted according to the inverse process of encryption,
Then the redundant data (if present) for removing addition, the image after decryption can be obtained.
In conclusion mobile platform image encryption method proposed by the present invention can have in conjunction with greyscale transformation and image scrambling
Effect improves the safety of image information.
Description and application of the invention herein are illustrative, is not wishing to limit the scope of the invention to above-described embodiment
In.The deformation and change of embodiments disclosed herein are possible, the realities for those skilled in the art
The replacement and equivalent various parts for applying example are well known.It should be appreciated by the person skilled in the art that not departing from the present invention
Spirit or essential characteristics in the case where, the present invention can in other forms, structure, arrangement, ratio, and with other components,
Material and component are realized.Without departing from the scope and spirit of the present invention, can to embodiments disclosed herein into
The other deformations of row and change.
Claims (4)
1. a kind of mobile platform image encryption method, which is characterized in that described image encryption method includes: first by figure to be encrypted
As matrix I is divided into several small matrix-blocks;Recycle image scrambling and each small piecemeal of greyscale transform process;Then
Pixel value in each piecemeal diffuses in other piecemeals;All piecemeals are finally synthesized into encrypted picture;
Described image encryption method further include: step S1, pre-treatment step;
For original image I, picture element matrix size is M × N, and expanding picture element matrix makes its size become M ' × N ', so that wherein
M ', N ' are complete square iterative method, might as well set M ' × N ' picture element matrix being divided into m × n size in order as the piecemeal of m × n;With
Two-dimensional array A [i] [j] indicates (i, j) a piecemeal;With two-dimensional array BA[i][j][x] [y] is indicated in piecemeal A [i] [j]
Pixel value, wherein 0≤i≤m-1,0≤j≤n-1,0≤x≤m-1,0≤y≤n-1;
In order to increase safety, Logistic chaos system and tent chaos system are first distinguished into iteration key1, key2 times;
Logistic system and tent system are most common chaos systems;Logistic mapping is derived to demographic dynamic
Mechanical system is a typical non linear chaos equation;It has ergodic, aperiodicity, long-term unpredictability and non-
The good Chaotic Behavior such as convergence, mapping definition are as follows:
0 < xn < 1, n=0,1,2 of xn+1=a*xn* (1-xn) ... (1)
Wherein, as 3.596≤a of coefficient≤4, system enters chaos state;
Tent system is a kind of one-dimensional map of piecewise linearity, has uniform probability density and power spectral density, and relatively manage
The autocorrelation thought;Tent mapping definition are as follows:
Wherein, as 0 < b≤2, system is in chaos state;
The number of iterations key1, key2 is as encryption key;Wherein the initial value of Logistic is as key key3, and parameter a is as close
Key key4;Wherein the initial value of tent system is as key key5;Parameter b is as key key6;
Described image encryption method further include: the step S2, processing step in piecemeal;
Using Logistic chaos system tectonic sequence T [m × n], so that 0≤T [i]≤m × n-1, wherein 0≤i≤m × n-
1, and have T [i] ≠ T [j], as i ≠ j;It is as follows to the processing method of pixel value in each piecemeal, for piecemeal A [i] [j];
It specifically includes:
Step S21, transposition of structures array step;
A random number temp is generated using tent chaos system;By temp respectively with each T [r] (r=0,1,2,3 ... m
× n-1) it is added, then to m × n remainder, obtain new sequence T [m × n];Formulae express:
T ' [r]=(temp+T [r]) mod (m × n) (3)
Step S22, according to the sequence of sequence T ' [m × n], the pixel value in piecemeal is replaced;Such as BA[i][j][x] [y], first
Displacement position is calculated, if
K1=T [x × n+y]/(m × n), k2=T [x × n+y] % (m+n) (4)
Then B 'A[i][j][k1] [k2]=BA[i][j][x] [y], wherein 0≤x≤m-1,0≤y≤n-1;
Step S23, xor operation;For each pixel value B ' in piecemealA[i][j][x] [y] is produced using tent chaos system
A raw pseudo random number e, then by pixel value B 'A[i][j][x] [y] and e exclusive or;That is:
B′A[i][j][x] [y]=B 'A[i][j][x][y]∧e (5)
Step S24, according to step S21 to step S23, each piecemeal is successively handled.
2. mobile platform image encryption method according to claim 1, it is characterised in that:
Described image encryption method further include: the step S3, processing step between piecemeal;
Pixel value in each piecemeal is diffused in other piecemeals;By (i, j) a piecemeal pixel value B 'A[i][j][x] [y]] hair
It is scattered to position (i, j) in (x, y) a piecemeal;That is:
B″A′[x][y][i] [j]=B 'A[i][j][x][y] (6)。
3. mobile platform image encryption method according to claim 2, it is characterised in that: described image encryption method is also wrapped
It includes: the piecemeal after step S3 disposition being arranged by the sequence of column sequence preferentially from small to large step S4, obtains encrypted image
I′。
4. mobile platform image encryption method according to claim 3, it is characterised in that:
Described image encryption method further include: step S5, decryption step;
Using the value of key key1, key2, key3, key4, key5, key6 when encryption, decrypted according to the inverse process of encryption, if
There are redundant datas, remove the redundant data of addition, the image after decryption can be obtained.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510864446.3A CN105488426B (en) | 2015-11-30 | 2015-11-30 | Mobile platform image encryption method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510864446.3A CN105488426B (en) | 2015-11-30 | 2015-11-30 | Mobile platform image encryption method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105488426A CN105488426A (en) | 2016-04-13 |
CN105488426B true CN105488426B (en) | 2019-12-03 |
Family
ID=55675399
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510864446.3A Active CN105488426B (en) | 2015-11-30 | 2015-11-30 | Mobile platform image encryption method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105488426B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106156654B (en) * | 2016-08-30 | 2019-06-11 | 成都百润百成科技股份有限公司 | File encryption apparatus and method |
CN106570815A (en) * | 2016-10-21 | 2017-04-19 | 广东工业大学 | Image encryption method based on double-chaos system and blocking |
CN107507254B (en) * | 2017-08-18 | 2018-11-23 | 济南大学 | Compression of images encryption method based on arithmetic coding |
CN109068021B (en) * | 2018-08-27 | 2020-02-14 | 优信数享(北京)信息技术有限公司 | Encryption and decryption method and system |
CN109660696B (en) * | 2018-11-30 | 2020-07-14 | 大连理工大学 | New image encryption method |
US11757616B2 (en) | 2021-09-18 | 2023-09-12 | Dalian Unversity of Technology | Image encryption method based on improved class boosting scheme |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7174019B2 (en) * | 2001-11-12 | 2007-02-06 | Toshiba Information Systems (Japan) Corporation | Cipher generating device, cipher decoding device, cipher generating program, cipher decoding program, authentication system and electronic device |
CN102982499A (en) * | 2012-09-28 | 2013-03-20 | 河南大学 | Color image encryption and decryption method based on multiple-fractional-order chaotic systems |
CN103248854A (en) * | 2013-04-27 | 2013-08-14 | 东北大学 | Medical image encryption method based on uniform scrambling and chaotic mapping |
CN104766264A (en) * | 2015-01-22 | 2015-07-08 | 西北工业大学 | Partitioning double-layer self-adaptation diffusion image encryption method |
-
2015
- 2015-11-30 CN CN201510864446.3A patent/CN105488426B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7174019B2 (en) * | 2001-11-12 | 2007-02-06 | Toshiba Information Systems (Japan) Corporation | Cipher generating device, cipher decoding device, cipher generating program, cipher decoding program, authentication system and electronic device |
CN102982499A (en) * | 2012-09-28 | 2013-03-20 | 河南大学 | Color image encryption and decryption method based on multiple-fractional-order chaotic systems |
CN103248854A (en) * | 2013-04-27 | 2013-08-14 | 东北大学 | Medical image encryption method based on uniform scrambling and chaotic mapping |
CN104766264A (en) * | 2015-01-22 | 2015-07-08 | 西北工业大学 | Partitioning double-layer self-adaptation diffusion image encryption method |
Also Published As
Publication number | Publication date |
---|---|
CN105488426A (en) | 2016-04-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105488426B (en) | Mobile platform image encryption method | |
Wang et al. | An image encryption algorithm based on a hidden attractor chaos system and the Knuth–Durstenfeld algorithm | |
US20210312334A1 (en) | Model parameter training method, apparatus, and device based on federation learning, and medium | |
Chai | An image encryption algorithm based on bit level Brownian motion and new chaotic systems | |
Zhou et al. | Image encryption using binary bitplane | |
Zhu et al. | A chaos-based symmetric image encryption scheme using a bit-level permutation | |
Zhou et al. | Image encryption using P-Fibonacci transform and decomposition | |
Xiao et al. | A chaos-based hash function with both modification detection and localization capabilities | |
Sang et al. | Image encryption based on logistic chaotic systems and deep autoencoder | |
Sun et al. | Image compression and encryption scheme using fractal dictionary and Julia set | |
Kumar et al. | IEHC: An efficient image encryption technique using hybrid chaotic map | |
Hanis et al. | Double image compression and encryption scheme using logistic mapped convolution and cellular automata | |
CN111461952A (en) | Image encryption method, computer device, and computer-readable storage medium | |
Karawia | Image encryption based on Fisher‐Yates shuffling and three dimensional chaotic economic map | |
CN107481180A (en) | The image encryption method perceived based on cellular automata and splits' positions | |
CN111008383A (en) | Image encryption method based on multidirectional diffusion and DNA coding | |
CN114679250A (en) | Image encryption algorithm based on mixed chaos and Arnold transformation | |
Jiang et al. | Image encryption algorithm based on discrete quantum baker map and chen hyperchaotic system | |
Wen et al. | Triple-image bit-level encryption algorithm based on double cross 2D hyperchaotic map | |
Chong et al. | Block color image encryption algorithm based on elementary cellular automata and DNA sequence operations | |
Singh et al. | Ecis: encryption prior to compression for digital image security with reduced memory | |
CN106127669B (en) | Based on the New chaotic image encryption method for protecting area B aker mapping | |
CN104881837A (en) | Hyper-chaotic system-based secret key dynamic selection image encryption algorithm | |
CN104143174A (en) | Image disguising and reconstructing method based on Tangram algorithm and two-dimensional double-scale rectangular mapping | |
Wadi et al. | Decomposition by binary codes‐based speedy image encryption algorithm for multiple applications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |