CN107392834A - A kind of image encryption method of random rotation displacement - Google Patents
A kind of image encryption method of random rotation displacement Download PDFInfo
- Publication number
- CN107392834A CN107392834A CN201710627279.XA CN201710627279A CN107392834A CN 107392834 A CN107392834 A CN 107392834A CN 201710627279 A CN201710627279 A CN 201710627279A CN 107392834 A CN107392834 A CN 107392834A
- Authority
- CN
- China
- Prior art keywords
- cyclic shift
- image
- row
- subprocess
- encrypted image
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
Abstract
The invention discloses a kind of image encryption method of random rotation displacement, it is related to image encryption technical field.This method includes row cyclic shift, row cyclic shift, oblique line cyclic shift, backslash cyclic shift and the circle class cyclic shift subprocess of cyclic shift five, and the encryption method needs to input the overlay order S of N number of cyclic shift subprocess1, S2... ..., SNWith N number of initialization seedIt is according to key sequence S1, S2... ..., SNDetermine the combination order and superposition number of cyclic shift subprocess, during every class cyclic shift, the encryption key according to corresponding toGenerate one group of random number and treat encrypted image execution circulative shift operation.The method of the present invention is without computings such as multiplication, division, evolution and sequences, need only to assignment and judge computing, operation is quick, user can be as needed, the superposition order of cyclic shift and number are determined by changing key length, Cipher Strength is freely customized, it is not only convenient and practical but also safe and reliable.
Description
Technical field
The present invention relates to image encryption technical field, more particularly relates to a kind of image encryption side of random rotation displacement
Method.
Background technology
With the continuous development of internet, increasing view data is transmitted on network, which part data
Due to security reasons such as individual privacy, copyrights, it is necessary to which transmission is encrypted.Image encryption has important in many application fields
Using.For example, need to scan Quick Response Code in paying the application scenarios of certain paid service, criminal can be right in user
System carries out reverse-engineering, replaces image in 2 D code silently, if now image in 2 D code is not encrypted, will hold
The loss of continuous property.Now in order to ensure digital picture storage, transmit with the safety exchanged, it is necessary to image be encrypted operation.
Existing image encryption technology includes:Based on the encryption technology of location of pixels conversion, based on adding for pixel value conversion
Secret skill art, the encryption technology based on random sequence, the encryption technology based on compressed encoding.But conventional images encryption technology is in reality
Matrixing is commonly used when changing in existing location of pixels, is easy for being cracked when attacker knows AES, and
Current many AESs need complicated calculating, usually contain the computings such as a large amount of multiplication, division, evolution and sequence.Typically
As Arnold conversion encryption method contains more multiplication and division (modulus) computing.And for example chaos sequence image scrambling method needs
Mass data is ranked up.
In summary, image encryption technology of the prior art, the problem of security performance is low and complexity is high be present.
The content of the invention
The embodiment of the present invention provides a kind of image encryption method of random rotation displacement, to solve image in the prior art
Encryption technology, the problem of security performance is low and complexity is high be present.
The embodiment of the present invention provides a kind of image encryption method of random rotation displacement, and methods described includes:
S1, input image to be encrypted;
S2, the N number of initialization seed of inputAnd the superposition of N number of cyclic shift subprocess
Order S1, S2..., SN;
S3, take i=1;
S4, extractionAnd Si;
S5, the S according to extractioniValue determines the species of cyclic shift subprocess, according toOne group of random number is generated, is designated as
[X (1), X (2) ..., X (T)], and with one group of random number treat encrypted image carry out determined by cyclic shift subprocess;
Wherein, T value determines according to the species of cyclic shift subprocess;The species of the cyclic shift subprocess includes:Row circulation moves
Position RowShift, row cyclic shift ColumnShift, oblique line cyclic shift SlashShift, backslash cyclic shift
BackslashShift and circle cyclic shift RoundShift;
S6, i numerical value increase by 1, and when i is less than or equal to N, perform step S4 to S5.
It is preferred that the cyclic shift subprocess according to determined by one group of random number treats encrypted image progress,
Including:
Treat encrypted image and perform RowShift successively from the 1st row to T rows, i.e., the first row is performed into RowShift (1, X
(1) the 2nd row), is performed into RowShift (2, X (2)), the rest may be inferred performs RowShift (T, X (T)) by T rows;Or
Treat encrypted image and perform ColumnShift from the 1st row to T leus time, i.e., perform first row
ColumnShift (1, X (1)), the 2nd row is performed into ColumnShift (i, X (2)), the rest may be inferred arranges execution by T
ColumnShift (T, X (T));Or
Treat encrypted image and perform oblique line cyclic shift SlashShift successively from the 1st oblique line to T oblique lines, i.e., by the 1st
Oblique line performs SlashShift (1, X (1)), the 2nd oblique line is performed into SlashShift (2, X (2)), the rest may be inferred by T oblique lines
Perform SlashShift (T, X (T));Or
Treat encrypted image and perform oblique line cyclic shift BackslashShift successively from the 1st backslash to T backslashes,
The 1st backslash is performed into BackslashShift (1, X (1)), the 2nd backslash is performed into BackslashShift (2, X
(2)), the rest may be inferred performs BackslashShift (T, X (T)) by T backslashes;Or
Treat encrypted image and perform RoundShift successively from the 1st circle to T circles, i.e., the 1st circle is performed into RoundShift
(1, X (1)), the 2nd circle is performed into RoundShift (2, X (2)), the rest may be inferred encloses execution RoundShift (T, X (T)) by T.
It is preferred that to represent that the T rows for treating encrypted image translate X (T) from left to right individual for the RowShift (T, X (T))
Pixel.
It is preferred that the T rows that the ColumnShift (T, X (T)) represents to treat encrypted image translate X (T) from top to bottom
Individual pixel.
It is preferred that the T oblique lines that the SlashShift (T, X (T)) represents to treat encrypted image are from southwest to north-east
To loopy moving X (T) individual pixel.
It is preferred that the BackslashShift (T, X (T)) represents to treat the T backslashes of encrypted image along northwest
To southeastern direction loopy moving X (T) individual pixel.
It is preferred that the RoundShift (T, X (T)) represents that the T circles for treating encrypted image do right-hand circular and rotate X
(T) individual pixel.
In the embodiment of the present invention, treat encrypted image and carried out multiple row cyclic shift, row cyclic shift respectively, oblique line follows
Ring shifts, backslash cyclic shift, encloses circulative shift operation so that image encryption security improves.In each cyclic shift
In, it is generation displacement step number per a kind of cyclic shift by random function, enhances the security of encryption.In addition, the present invention is not
It is related to multiplication, division, evolution and sort operation, it is thus only necessary to assignment and judge computing, operation is quickly.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this
Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can be with
Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 is a kind of schematic flow sheet of the image encryption method of random rotation displacement provided in an embodiment of the present invention;
Fig. 2 is five class cyclic shift mistakes in the image encryption method that a kind of random rotation provided in an embodiment of the present invention shifts
Journey schematic diagram;
Fig. 3 shifts encryption method with Arnold conversion with regard to scramble degree for a kind of random rotation provided in an embodiment of the present invention
Comparison diagram;
Fig. 4 is the cipher round results figure that a kind of random rotation provided in an embodiment of the present invention shifts encryption method;
A kind of Fig. 5 random rotation displacement encryption methods provided in an embodiment of the present invention are stained the decrypted result of encryption data
Figure.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art are obtained every other under the premise of creative work is not made
Embodiment, belong to the scope of protection of the invention.
Fig. 1 provides a kind of schematic flow sheet of the image encryption method of random rotation displacement, the party for the embodiment of the present invention
Method includes:
S1, input image to be encrypted.
S2, the N number of initialization seed of inputAnd the superposition of N number of cyclic shift subprocess
Order S1, S2..., SN。
Wherein, if the overlay order of N number of cyclic shift subprocess is a string of N number of elements being made up of character 1,2,3,4,5
Character string.
In addition, andWith SiInto one-to-one relation, for example the initialization seed inputted is 0.2,0.2344,
0.785,0.9324,0.34724,0.1213 and cyclic shift subprocess overlay order be 3,1,3,2,4,5, then 0.2 pair
Answer 3;0.2344 corresponding 1,0.785 corresponding 3,0.9324 corresponding 2,0.34724 corresponding 4,0.1213 corresponding 5.
S3, take i=1.
S4, extractionAnd Si。
S5, the S according to extractioniValue determines the species of cyclic shift subprocess, according toOne group of random number is generated, is designated as
[X (1), X (2) ..., X (T)], and with one group of random number treat encrypted image carry out determined by cyclic shift subprocess;
Wherein, T value determines according to the species of cyclic shift subprocess;The species of the cyclic shift subprocess includes:Row circulation moves
Position RowShift, row cyclic shift ColumnShift, oblique line cyclic shift SlashShift, backslash cyclic shift
BackslashShift and circle cyclic shift RoundShift.
In the embodiment of the present invention, it is assumed that the size of image to be encrypted is M × N, will for clearer difference T value
T is used respectively in table 11、T2、T3T4And T5Displacement step number, is moved according to circulation corresponding to representing different types of cyclic shift respectively
The kind of seat process determines as illustrated in chart 1.
Table 1:The step of size is the cyclic shift subprocess of MxN images number
Wherein, the operation that the species of cyclic shift subprocess is determined according to the Si values of extraction is, from SiValue with circulation move
Corresponding cyclic shift subprocess is determined in the corresponding relation of the species of seat process, and according to one group of random number to be added
Close image carries out the cyclic shift subprocess.
S6, i numerical value increase by 1, and when i is less than or equal to N, perform step S4 to S5.
Wherein, the cyclic shift subprocess according to determined by one group of random number treats encrypted image progress, including:
First way, treat encrypted image and perform RowShift successively from the 1st row to T rows, i.e., perform the first row
RowShift (1, X (1)), the 2nd row is performed into RowShift (2, X (2)), the rest may be inferred performs RowShift (T, X by T rows
(T))。
The second way, encrypted image is treated from the 1st row to T leu time execution ColumnShift, i.e., hold first row
Row ColumnShift (1, X (1)), the 2nd row is performed into ColumnShift (i, X (2)), the rest may be inferred arranges execution by T
ColumnShift (T, X (T)).
The third mode, treat encrypted image and perform oblique line cyclic shift successively from the 1st oblique line to T oblique lines
SlashShift, i.e., the 1st oblique line is performed into SlashShift (1, X (1)), the 2nd oblique line is performed into SlashShift (2, X (2)),
The rest may be inferred performs SlashShift (T, X (T)) by T oblique lines.
4th kind of mode, treat encrypted image and perform oblique line cyclic shift successively from the 1st backslash to T backslashes
BackslashShift, i.e., the 1st backslash is performed into BackslashShift (1, X (1)), the 2nd backslash is performed
BackslashShift (2, X (2)), the rest may be inferred performs BackslashShift (T, X (T)) by T backslashes.
Fifth procedure, treat encrypted image from the 1st circle to T circle perform RoundShift successively, i.e., by the 1st circle perform
RoundShift (1, X (1)), the 2nd circle is performed into RoundShift (2, X (2)), the rest may be inferred encloses execution by T
RoundShift (T, X (T)).
It should be noted that when treating encrypted image and being encrypted, any in above-mentioned five kinds of implementations can be passed through
Implementation is encrypted or encrypts, also may be used by the combination of any two kinds of implementations in above-mentioned implementation
Encrypted with the combinations of any three kinds of implementations, the combination of any four implementation come encrypt or be in order to improve plus
Close security, it can also be encrypted by the combination of any stacked system of above-mentioned five kinds of implementations, the embodiment of the present disclosure
This is not specifically limited.
In embodiments of the present invention, understand for convenience RowShift, ColumnShift, SlashShift,
BackslashShift and RoundShift definition.Now will be for example, as shown in Fig. 2 (a), illustrated the of image in figure
1 and the 9th row, and demonstrate RowShift (5,3) and RowShift (9, -1) process.ColumnShift (14, -2) shows pair
Image the 14th arranges 2 pixels of loopy moving from bottom to top, as shown in Fig. 2 (b).As shown in Fig. 2 (c), SlashShift (19, -2)
Process, i.e., the 19th article of oblique line is carried out from southwest to the pixel operation of northeastward loopy moving 2.As shown in Fig. 2 (d), use
BackslashShift (20,2) represents to have carried out from northwest to the picture of southeastern direction loopy moving 2 the 20th article of backslash of image
Element operation.As shown in Fig. 2 (e), RoundShift (4,1) shows that doing right-hand circular to the 4th circle of image rotates 1 pixel,
Wherein, in the embodiment of the present invention, image is considered as and is made up of some rectangular loops, and the circle of outermost is designated as the 1st circle.
In embodiments of the present invention, it is assumed that the overlay order of cyclic shift subprocess and pair of cyclic shift subprocess species
Should be related to for:1 correspond to RowShift, and 2 correspond to ColumnShift, and 3 correspond to SlashShift, and 4 correspond to
BackslashShift, 5 correspond to RoundShift.
In order to be better understood from the present invention, N group initialization seeds X is takens seed(s=1,2 ... N) and it is corresponding a string by
The character string for N number of element that character 1,2,3,4,5 forms with corresponding relation 1 above for example, correspond to RowShift, 2 correspondences
ColumnShift, 3 correspond to SlashShift, and 4 correspond to BackslashShift, and 5 correspond to RoundShift.If give
Go out following key:0.2,0.2344,0.785,0.9324,0.34724,0.1213 and 3,1,3,2,4,5.Then the present invention is implemented
Example ciphering process be:First, one group of random number of generation is initialized with initial number seed 0.2, and treats each of encrypted image A
Oblique line implements SlashShift and obtains image B, and induced by random number seed 0.2 one group of the displacement step number of each oblique line with
Machine number determines;Secondly, another group of random number is initialized with initialization seed 0.2344, RowShift is implemented per a line to image B
Image C is obtained, one group of random number that often the displacement step number of row is induced by random number seed 0.2344 determines;Again, seed is used
0.785 another group of random number of initialization, SlashShift is implemented to each oblique lines of image C and obtains image D, and the shifting of each oblique line
One group of random number that position step number is induced by random number seed 0.785 determines;Then, reinitialized another group with seed 0.9324
Random number, row each to image D implement ColumnShif and obtain image E, and the displacement step number of each column is by random number seed
0.9324 one group of random number inducing determines, then, is reinitialized another group of random number with seed 0.34724, every to image E
One backslash implements BackslashShift and obtains image F, and the displacement step number of each backslash is lured by random number seed 0.34724
Derived one group of random number is determined finally, and one group of random number is initialized with seed 0.1213, and image F each circle is implemented
RoundShift, and one group of random number that the displacement step number of each circle is induced by random number seed 0.1213 determines;With regard to completing
Image encryption obtains ciphertext graph picture.
Decrypting process corresponding to present invention encryption is its inverse process, and its decryption principle is similar with encryption principle, of the invention
Specific decryption step is as follows:
(1), decruption key during input decryption:The initialization seed of cyclic shift subprocess And the superposition order of cyclic shift subprocess:S1,S2,…,ST。
(2) key S, is readiAnd Xi seed.Pay attention to:It is to read from back to front that the key of decrypting process, which is read, i.e., first reads STWith
XT seed, then read ST-1And XT-1 seed... ..., finally read S1And X1 seed.According to SiDetermine to use what type of cyclic shift mistake
Journey, according to key Xi seed, one group of random number is generated, is designated as X (1), X (2) ..., X (Ti), wherein, TiValue by key SiDetermine,
Shown in table 2 specific as follows, and the size of image is MxN in table 2.
Table 2
Specifically:
If a. read Si=A, Xi seed=a:Show to carry out RowShift circulative shift operations to image, share n times row and move
Position, every time direction shifting function from right to left, one group of random number that often the displacement step number of row is induced by random number seed a are determined
It is fixed.
If b. read Si=B, Xi seed=b:Show to carry out ColumnShift circulative shift operations to image, share M row
Displacement, is shifted, one group of random number that the displacement step number of each column is induced by random number seed b determines from top to bottom every time.
If c. read Si=C, Xi seed=c:Show to carry out SlashShift circulative shift operations to image, share M+N-1
The displacement of secondary oblique line, is shifted from northeast to southwestward every time, the displacement step number of each oblique line induced by random number seed c one
Group random number determines.
If d. read Si=D, Xi seed=d:Show to carry out BackslashShift circulative shift operations to image, share M+
N-1 backslash displacement, is shifted, the displacement step number of each backslash is lured by random number seed d from the southeast to direction northwest every time
Derived one group of random number determines.
If e. read Si=E, Xi seed=e:Show to carry out RoundShift circulative shift operations to image, shareSecondary circle displacement, from outer ring to inner ring direction operation, carries out displaced counter-clockwise, the displacement step number of each circle every time
The one group of random number induced by random number seed e determines;
(3) (2) step, is repeated, until key uses until exhausted, now i.e. decryption terminates.
In example in real time of the invention, of the invention is safe, and the current pseudo-random number generating algorithm cycle is high, with regard to version
MATLAB R2014A rand () function, it produces the cycle of pseudo random number more than 21400, and still more this encryption method is close
Key indefinite length, in theory can be with endless, and its key space can be infinitely great.Formed by five cyclic shift subprocess
Encryption method in, if according to the double-precision floating pointses format standards of IEEE 754, the initialization of this five cyclic shift subprocess
Seed is represented using 52-bit character strings, and the superposition order of this five classes cyclic shift subprocess is represented using 8-bit.So
Encryption key amounts to be made up of 300 character strings for being, security performance can obtain enough guarantees.In view of this, this hair is cracked
The possibility of bright image encryption method is substantially impossible.
The present invention is by C/C++ programming experimental checks, it was demonstrated that and it is truly feasible, will to image type and size nothing
Ask.We all carried out test by the image to online standard testing image storehouse, and the test image warehouse compartment is in http://
Decsai.ugr.es/cvg/CG/base.htm, and the result tested and the Arnold conversion of classics are contrasted, with regard to scramble
Degree carries out quantitative measurement.Scramble degree can be used for the clutter for reflecting image, and its value is between -1 and 1, absolute value
It is more big, show that image is more in disorder.
RCSA random rotations displacement encryption technology (RCSA) in Fig. 3 is with Arnold conversion (being repeated 5 times) with regard to scramble degree
Correction data, data can be seen that in most of situation from the figure, random rotation displacement encryption technology add than Arnold
Decryption method obtains more in disorder encryption data.
Fig. 4 is the cipher round results figure that a kind of random rotation provided in an embodiment of the present invention shifts encryption method, in order to test
The cipher round results of the present invention, two groups of experiments will be carried out, in first group of experiment, test the cipher round results of all kinds of images, such as Fig. 4
The result of first group of experiment is illustrated, wherein experimental image includes bianry image, gray level image, coloured image and non-square chi
Very little image, it is respectively from top to bottom from Fig. 4:Bianry image, gray level image, coloured image, wide rectangular region image, high rectangle
Area image, and left column is artwork, right row are encryption figures, and the visual effect of encryption of the invention is good as can be seen from Figure 4.
A kind of Fig. 5 random rotation displacement encryption methods provided in an embodiment of the present invention are stained the decrypted result of encryption data
Figure, have detected noise in the figure, shear, and compress the influence to encryption data, and (left side) noise level is 30% in Fig. 5
Gaussian noise;(in) artificial failure by shear;(right side) JPEG lossy compression methods.It is to be respectively by noise level in upper row's image
30% Gaussian noise pollutes, and the encryption data of artificial shearing and JPEG compression, lower row is then the decrypted result of upper row, thus may be used
See, random rotation displacement encryption technology can resist the influence of these factors.
In the embodiment of the present invention, treat encrypted image and carried out multiple row cyclic shift, row cyclic shift respectively, oblique line follows
Ring shifts, backslash cyclic shift, and circle cyclic shift causes image encryption security to improve.In each cyclic shift, lead to
It is generation displacement step number per a kind of cyclic shift to cross random function, enhances the security of encryption.In addition, the present invention is not related to
Multiplication, division, evolution and sort operation, it is thus only necessary to assignment and judge computing, operation is quickly.
Disclosed above is only several specific embodiments of the present invention, and those skilled in the art can be carried out to the present invention
It is various to change with modification without departing from the spirit and scope of the present invention, if these modifications and variations of the present invention belong to the present invention
Within the scope of claim and its equivalent technologies, then the present invention is also intended to comprising including these changes and modification.
Claims (7)
1. a kind of image encryption method of random rotation displacement, it is characterised in that methods described includes:
S1, input image to be encrypted;
S2, the N number of initialization seed of inputAnd the overlay order of N number of cyclic shift subprocess
S1, S2..., SN;
S3, take i=1;
S4, extractionAnd Si;
S5, the S according to extractioniValue determines the species of cyclic shift subprocess, according toOne group of random number is generated, is designated as [X
(1), X (2) ..., X (T)], and with one group of random number treat encrypted image carry out determined by cyclic shift subprocess;Its
In, T value determines according to the species of cyclic shift subprocess;The species of the cyclic shift subprocess includes:Row cyclic shift
RowShift, row cyclic shift ColumnShift, oblique line cyclic shift SlashShift, backslash cyclic shift
BackslashShift and circle cyclic shift RoundShift;
S6, i numerical value increase by 1, and when i is less than or equal to N, perform step S4 to S5.
2. the image encryption method of random rotation as claimed in claim 1 displacement, it is characterised in that it is described with described one group with
Machine number treats cyclic shift subprocess determined by encrypted image progress, including:
Treat encrypted image and perform RowShift successively from the 1st row to T rows, i.e., the first row is performed into RowShift (1, X
(1) the 2nd row), is performed into RowShift (2, X (2)), the rest may be inferred performs RowShift (T, X (T)) by T rows;Or
Treat encrypted image and perform ColumnShift from the 1st row to T leus time, i.e., first row is performed into ColumnShift
(1, X (1)), the 2nd row is performed into ColumnShift (i, X (2)), the rest may be inferred arranges execution ColumnShift (T, X by T
(T));Or
Treat encrypted image and perform oblique line cyclic shift SlashShift successively from the 1st oblique line to T oblique lines, i.e., by the 1st oblique line
SlashShift (1, X (1)) is performed, the 2nd oblique line is performed into SlashShift (2, X (2)), the rest may be inferred performs T oblique lines
SlashShift (T, X (T));Or
Treat encrypted image and perform oblique line cyclic shift BackslashShift successively from the 1st backslash to T backslashes, will
1st backslash performs BackslashShift (1, X (1)), and the 2nd backslash is performed into BackslashShift (2, X (2)), according to
This analogizes performs BackslashShift (T, X (T)) by T backslashes;Or
Treat encrypted image and perform RoundShift successively from the 1st circle to T circles, i.e., the 1st circle is performed into RoundShift (1, X
(1) the 2nd circle), is performed into RoundShift (2, X (2)), the rest may be inferred encloses execution RoundShift (T, X (T)) by T.
3. the image encryption method of random rotation displacement as claimed in claim 2, it is characterised in that RowShift (T, the X
(T)) represent that the T rows for treating encrypted image translate X (T) individual pixel from left to right.
4. the image encryption method of random rotation displacement as claimed in claim 2, it is characterised in that the ColumnShift
The T rows that (T, X (T)) represents to treat encrypted image translate X (T) individual pixel from top to bottom.
5. the image encryption method of random rotation displacement as claimed in claim 2, it is characterised in that the SlashShift
The T oblique lines that (T, X (T)) represents to treat encrypted image are from southwest to northeastward loopy moving X (T) individual pixel.
6. the image encryption method of random rotation displacement as claimed in claim 2, it is characterised in that the BackslashShi
Ft (T, X (T)) represents to treat the T backslashes of encrypted image along northwest to southeastern direction loopy moving X (T) individual pixel.
7. the image encryption method of random rotation displacement as claimed in claim 2, it is characterised in that the RoundShift
(T, X (T)) represents that the T circles for treating encrypted image do right-hand circular and rotate X (T) individual pixel.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710627279.XA CN107392834B (en) | 2017-07-28 | 2017-07-28 | Random cyclic shift image encryption method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710627279.XA CN107392834B (en) | 2017-07-28 | 2017-07-28 | Random cyclic shift image encryption method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107392834A true CN107392834A (en) | 2017-11-24 |
CN107392834B CN107392834B (en) | 2021-02-26 |
Family
ID=60342696
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710627279.XA Active CN107392834B (en) | 2017-07-28 | 2017-07-28 | Random cyclic shift image encryption method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107392834B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107968705A (en) * | 2017-11-28 | 2018-04-27 | 深圳大学 | A kind of method for encryption/decryption, enciphering/deciphering end and double random phase encrypting and deciphering system |
CN110730188A (en) * | 2019-10-23 | 2020-01-24 | 深圳市中仁信息科技有限公司 | Method for encrypting, storing and transmitting static pictures |
CN115632756A (en) * | 2022-08-18 | 2023-01-20 | 重庆市地理信息和遥感应用中心 | Geographic data encryption system and method based on dynamic cyclic displacement |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6064738A (en) * | 1996-12-10 | 2000-05-16 | The Research Foundation Of State University Of New York | Method for encrypting and decrypting data using chaotic maps |
CN101237321A (en) * | 2008-02-03 | 2008-08-06 | 西北农林科技大学 | Encryption method based on cycle queue shift rule |
CN102196320A (en) * | 2011-04-15 | 2011-09-21 | 江苏省现代企业信息化应用支撑软件工程技术研发中心 | Image encrypting and decrypting system |
-
2017
- 2017-07-28 CN CN201710627279.XA patent/CN107392834B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6064738A (en) * | 1996-12-10 | 2000-05-16 | The Research Foundation Of State University Of New York | Method for encrypting and decrypting data using chaotic maps |
CN101237321A (en) * | 2008-02-03 | 2008-08-06 | 西北农林科技大学 | Encryption method based on cycle queue shift rule |
CN102196320A (en) * | 2011-04-15 | 2011-09-21 | 江苏省现代企业信息化应用支撑软件工程技术研发中心 | Image encrypting and decrypting system |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107968705A (en) * | 2017-11-28 | 2018-04-27 | 深圳大学 | A kind of method for encryption/decryption, enciphering/deciphering end and double random phase encrypting and deciphering system |
CN110730188A (en) * | 2019-10-23 | 2020-01-24 | 深圳市中仁信息科技有限公司 | Method for encrypting, storing and transmitting static pictures |
CN115632756A (en) * | 2022-08-18 | 2023-01-20 | 重庆市地理信息和遥感应用中心 | Geographic data encryption system and method based on dynamic cyclic displacement |
Also Published As
Publication number | Publication date |
---|---|
CN107392834B (en) | 2021-02-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Dhall et al. | Cryptanalysis of image encryption scheme based on a new 1D chaotic system | |
Shankar et al. | RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography | |
Dhamija et al. | A novel cryptographic and steganographic approach for secure cloud data migration | |
CN104751401B (en) | A kind of novel Piecewise linear chaotic map image encryption and coding method | |
Al-Roithy et al. | Remodeling randomness prioritization to boost-up security of RGB image encryption | |
CN106296561B (en) | Image encryption method and device, decryption method and device based on hyperchaotic system | |
CN108122188A (en) | A kind of image encryption method | |
Hanchinamani et al. | An efficient image encryption scheme based on a Peter De Jong chaotic map and a RC4 stream cipher | |
CN107392834A (en) | A kind of image encryption method of random rotation displacement | |
Karthikeyan et al. | Enhanced security in steganography using encryption and quick response code | |
CN108141350A (en) | The method of transaction is ensured from non-security terminal | |
Fu et al. | A new fast color image encryption scheme using chen chaotic system | |
Iqbal et al. | An efficient grayscale image encryption scheme based on variable length row-column swapping operations | |
Ramírez-Torres et al. | Image encryption with an improved cryptosystem based on a matrix approach | |
Incze | Pixel Sieve method for secret sharing & visual cryptography | |
Kutade et al. | A survey on various approaches of image steganography | |
CN113099069B (en) | Multi-image encryption method based on three-dimensional spiral model | |
Nathaniel | Methodology for Image Cryptosystem Based on a Gray Code Number System. | |
Lokhande | An Effective Way of using LSB Steganography in images along with Cryptography | |
Li et al. | A novel image protection cryptosystem with only permutation stage: multi-shuffling process | |
Fu et al. | Medical image protection using hyperchaos-based encryption | |
Babatunde et al. | Performance analysis of gray code number system in image security | |
Bagane et al. | Securing Data in Images Using Cryptography and Steganography Algorithms | |
Siddartha et al. | A novel data masking method for securing medical image | |
Dey et al. | Color image encryption using single layer artificial neural network and buffer shuffling |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |