CN107392834A - A kind of image encryption method of random rotation displacement - Google Patents

A kind of image encryption method of random rotation displacement Download PDF

Info

Publication number
CN107392834A
CN107392834A CN201710627279.XA CN201710627279A CN107392834A CN 107392834 A CN107392834 A CN 107392834A CN 201710627279 A CN201710627279 A CN 201710627279A CN 107392834 A CN107392834 A CN 107392834A
Authority
CN
China
Prior art keywords
cyclic shift
image
row
subprocess
encrypted image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710627279.XA
Other languages
Chinese (zh)
Other versions
CN107392834B (en
Inventor
伍健
邓梦薇
付莲莲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangxi Agricultural University
Original Assignee
Jiangxi Agricultural University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangxi Agricultural University filed Critical Jiangxi Agricultural University
Priority to CN201710627279.XA priority Critical patent/CN107392834B/en
Publication of CN107392834A publication Critical patent/CN107392834A/en
Application granted granted Critical
Publication of CN107392834B publication Critical patent/CN107392834B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking

Abstract

The invention discloses a kind of image encryption method of random rotation displacement, it is related to image encryption technical field.This method includes row cyclic shift, row cyclic shift, oblique line cyclic shift, backslash cyclic shift and the circle class cyclic shift subprocess of cyclic shift five, and the encryption method needs to input the overlay order S of N number of cyclic shift subprocess1, S2... ..., SNWith N number of initialization seedIt is according to key sequence S1, S2... ..., SNDetermine the combination order and superposition number of cyclic shift subprocess, during every class cyclic shift, the encryption key according to corresponding toGenerate one group of random number and treat encrypted image execution circulative shift operation.The method of the present invention is without computings such as multiplication, division, evolution and sequences, need only to assignment and judge computing, operation is quick, user can be as needed, the superposition order of cyclic shift and number are determined by changing key length, Cipher Strength is freely customized, it is not only convenient and practical but also safe and reliable.

Description

A kind of image encryption method of random rotation displacement
Technical field
The present invention relates to image encryption technical field, more particularly relates to a kind of image encryption side of random rotation displacement Method.
Background technology
With the continuous development of internet, increasing view data is transmitted on network, which part data Due to security reasons such as individual privacy, copyrights, it is necessary to which transmission is encrypted.Image encryption has important in many application fields Using.For example, need to scan Quick Response Code in paying the application scenarios of certain paid service, criminal can be right in user System carries out reverse-engineering, replaces image in 2 D code silently, if now image in 2 D code is not encrypted, will hold The loss of continuous property.Now in order to ensure digital picture storage, transmit with the safety exchanged, it is necessary to image be encrypted operation.
Existing image encryption technology includes:Based on the encryption technology of location of pixels conversion, based on adding for pixel value conversion Secret skill art, the encryption technology based on random sequence, the encryption technology based on compressed encoding.But conventional images encryption technology is in reality Matrixing is commonly used when changing in existing location of pixels, is easy for being cracked when attacker knows AES, and Current many AESs need complicated calculating, usually contain the computings such as a large amount of multiplication, division, evolution and sequence.Typically As Arnold conversion encryption method contains more multiplication and division (modulus) computing.And for example chaos sequence image scrambling method needs Mass data is ranked up.
In summary, image encryption technology of the prior art, the problem of security performance is low and complexity is high be present.
The content of the invention
The embodiment of the present invention provides a kind of image encryption method of random rotation displacement, to solve image in the prior art Encryption technology, the problem of security performance is low and complexity is high be present.
The embodiment of the present invention provides a kind of image encryption method of random rotation displacement, and methods described includes:
S1, input image to be encrypted;
S2, the N number of initialization seed of inputAnd the superposition of N number of cyclic shift subprocess Order S1, S2..., SN
S3, take i=1;
S4, extractionAnd Si
S5, the S according to extractioniValue determines the species of cyclic shift subprocess, according toOne group of random number is generated, is designated as [X (1), X (2) ..., X (T)], and with one group of random number treat encrypted image carry out determined by cyclic shift subprocess; Wherein, T value determines according to the species of cyclic shift subprocess;The species of the cyclic shift subprocess includes:Row circulation moves Position RowShift, row cyclic shift ColumnShift, oblique line cyclic shift SlashShift, backslash cyclic shift BackslashShift and circle cyclic shift RoundShift;
S6, i numerical value increase by 1, and when i is less than or equal to N, perform step S4 to S5.
It is preferred that the cyclic shift subprocess according to determined by one group of random number treats encrypted image progress, Including:
Treat encrypted image and perform RowShift successively from the 1st row to T rows, i.e., the first row is performed into RowShift (1, X (1) the 2nd row), is performed into RowShift (2, X (2)), the rest may be inferred performs RowShift (T, X (T)) by T rows;Or
Treat encrypted image and perform ColumnShift from the 1st row to T leus time, i.e., perform first row ColumnShift (1, X (1)), the 2nd row is performed into ColumnShift (i, X (2)), the rest may be inferred arranges execution by T ColumnShift (T, X (T));Or
Treat encrypted image and perform oblique line cyclic shift SlashShift successively from the 1st oblique line to T oblique lines, i.e., by the 1st Oblique line performs SlashShift (1, X (1)), the 2nd oblique line is performed into SlashShift (2, X (2)), the rest may be inferred by T oblique lines Perform SlashShift (T, X (T));Or
Treat encrypted image and perform oblique line cyclic shift BackslashShift successively from the 1st backslash to T backslashes, The 1st backslash is performed into BackslashShift (1, X (1)), the 2nd backslash is performed into BackslashShift (2, X (2)), the rest may be inferred performs BackslashShift (T, X (T)) by T backslashes;Or
Treat encrypted image and perform RoundShift successively from the 1st circle to T circles, i.e., the 1st circle is performed into RoundShift (1, X (1)), the 2nd circle is performed into RoundShift (2, X (2)), the rest may be inferred encloses execution RoundShift (T, X (T)) by T.
It is preferred that to represent that the T rows for treating encrypted image translate X (T) from left to right individual for the RowShift (T, X (T)) Pixel.
It is preferred that the T rows that the ColumnShift (T, X (T)) represents to treat encrypted image translate X (T) from top to bottom Individual pixel.
It is preferred that the T oblique lines that the SlashShift (T, X (T)) represents to treat encrypted image are from southwest to north-east To loopy moving X (T) individual pixel.
It is preferred that the BackslashShift (T, X (T)) represents to treat the T backslashes of encrypted image along northwest To southeastern direction loopy moving X (T) individual pixel.
It is preferred that the RoundShift (T, X (T)) represents that the T circles for treating encrypted image do right-hand circular and rotate X (T) individual pixel.
In the embodiment of the present invention, treat encrypted image and carried out multiple row cyclic shift, row cyclic shift respectively, oblique line follows Ring shifts, backslash cyclic shift, encloses circulative shift operation so that image encryption security improves.In each cyclic shift In, it is generation displacement step number per a kind of cyclic shift by random function, enhances the security of encryption.In addition, the present invention is not It is related to multiplication, division, evolution and sort operation, it is thus only necessary to assignment and judge computing, operation is quickly.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can be with Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 is a kind of schematic flow sheet of the image encryption method of random rotation displacement provided in an embodiment of the present invention;
Fig. 2 is five class cyclic shift mistakes in the image encryption method that a kind of random rotation provided in an embodiment of the present invention shifts Journey schematic diagram;
Fig. 3 shifts encryption method with Arnold conversion with regard to scramble degree for a kind of random rotation provided in an embodiment of the present invention Comparison diagram;
Fig. 4 is the cipher round results figure that a kind of random rotation provided in an embodiment of the present invention shifts encryption method;
A kind of Fig. 5 random rotation displacement encryption methods provided in an embodiment of the present invention are stained the decrypted result of encryption data Figure.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art are obtained every other under the premise of creative work is not made Embodiment, belong to the scope of protection of the invention.
Fig. 1 provides a kind of schematic flow sheet of the image encryption method of random rotation displacement, the party for the embodiment of the present invention Method includes:
S1, input image to be encrypted.
S2, the N number of initialization seed of inputAnd the superposition of N number of cyclic shift subprocess Order S1, S2..., SN
Wherein, if the overlay order of N number of cyclic shift subprocess is a string of N number of elements being made up of character 1,2,3,4,5 Character string.
In addition, andWith SiInto one-to-one relation, for example the initialization seed inputted is 0.2,0.2344, 0.785,0.9324,0.34724,0.1213 and cyclic shift subprocess overlay order be 3,1,3,2,4,5, then 0.2 pair Answer 3;0.2344 corresponding 1,0.785 corresponding 3,0.9324 corresponding 2,0.34724 corresponding 4,0.1213 corresponding 5.
S3, take i=1.
S4, extractionAnd Si
S5, the S according to extractioniValue determines the species of cyclic shift subprocess, according toOne group of random number is generated, is designated as [X (1), X (2) ..., X (T)], and with one group of random number treat encrypted image carry out determined by cyclic shift subprocess; Wherein, T value determines according to the species of cyclic shift subprocess;The species of the cyclic shift subprocess includes:Row circulation moves Position RowShift, row cyclic shift ColumnShift, oblique line cyclic shift SlashShift, backslash cyclic shift BackslashShift and circle cyclic shift RoundShift.
In the embodiment of the present invention, it is assumed that the size of image to be encrypted is M × N, will for clearer difference T value T is used respectively in table 11、T2、T3T4And T5Displacement step number, is moved according to circulation corresponding to representing different types of cyclic shift respectively The kind of seat process determines as illustrated in chart 1.
Table 1:The step of size is the cyclic shift subprocess of MxN images number
Wherein, the operation that the species of cyclic shift subprocess is determined according to the Si values of extraction is, from SiValue with circulation move Corresponding cyclic shift subprocess is determined in the corresponding relation of the species of seat process, and according to one group of random number to be added Close image carries out the cyclic shift subprocess.
S6, i numerical value increase by 1, and when i is less than or equal to N, perform step S4 to S5.
Wherein, the cyclic shift subprocess according to determined by one group of random number treats encrypted image progress, including:
First way, treat encrypted image and perform RowShift successively from the 1st row to T rows, i.e., perform the first row RowShift (1, X (1)), the 2nd row is performed into RowShift (2, X (2)), the rest may be inferred performs RowShift (T, X by T rows (T))。
The second way, encrypted image is treated from the 1st row to T leu time execution ColumnShift, i.e., hold first row Row ColumnShift (1, X (1)), the 2nd row is performed into ColumnShift (i, X (2)), the rest may be inferred arranges execution by T ColumnShift (T, X (T)).
The third mode, treat encrypted image and perform oblique line cyclic shift successively from the 1st oblique line to T oblique lines SlashShift, i.e., the 1st oblique line is performed into SlashShift (1, X (1)), the 2nd oblique line is performed into SlashShift (2, X (2)), The rest may be inferred performs SlashShift (T, X (T)) by T oblique lines.
4th kind of mode, treat encrypted image and perform oblique line cyclic shift successively from the 1st backslash to T backslashes BackslashShift, i.e., the 1st backslash is performed into BackslashShift (1, X (1)), the 2nd backslash is performed BackslashShift (2, X (2)), the rest may be inferred performs BackslashShift (T, X (T)) by T backslashes.
Fifth procedure, treat encrypted image from the 1st circle to T circle perform RoundShift successively, i.e., by the 1st circle perform RoundShift (1, X (1)), the 2nd circle is performed into RoundShift (2, X (2)), the rest may be inferred encloses execution by T RoundShift (T, X (T)).
It should be noted that when treating encrypted image and being encrypted, any in above-mentioned five kinds of implementations can be passed through Implementation is encrypted or encrypts, also may be used by the combination of any two kinds of implementations in above-mentioned implementation Encrypted with the combinations of any three kinds of implementations, the combination of any four implementation come encrypt or be in order to improve plus Close security, it can also be encrypted by the combination of any stacked system of above-mentioned five kinds of implementations, the embodiment of the present disclosure This is not specifically limited.
In embodiments of the present invention, understand for convenience RowShift, ColumnShift, SlashShift, BackslashShift and RoundShift definition.Now will be for example, as shown in Fig. 2 (a), illustrated the of image in figure 1 and the 9th row, and demonstrate RowShift (5,3) and RowShift (9, -1) process.ColumnShift (14, -2) shows pair Image the 14th arranges 2 pixels of loopy moving from bottom to top, as shown in Fig. 2 (b).As shown in Fig. 2 (c), SlashShift (19, -2) Process, i.e., the 19th article of oblique line is carried out from southwest to the pixel operation of northeastward loopy moving 2.As shown in Fig. 2 (d), use BackslashShift (20,2) represents to have carried out from northwest to the picture of southeastern direction loopy moving 2 the 20th article of backslash of image Element operation.As shown in Fig. 2 (e), RoundShift (4,1) shows that doing right-hand circular to the 4th circle of image rotates 1 pixel, Wherein, in the embodiment of the present invention, image is considered as and is made up of some rectangular loops, and the circle of outermost is designated as the 1st circle.
In embodiments of the present invention, it is assumed that the overlay order of cyclic shift subprocess and pair of cyclic shift subprocess species Should be related to for:1 correspond to RowShift, and 2 correspond to ColumnShift, and 3 correspond to SlashShift, and 4 correspond to BackslashShift, 5 correspond to RoundShift.
In order to be better understood from the present invention, N group initialization seeds X is takens seed(s=1,2 ... N) and it is corresponding a string by The character string for N number of element that character 1,2,3,4,5 forms with corresponding relation 1 above for example, correspond to RowShift, 2 correspondences ColumnShift, 3 correspond to SlashShift, and 4 correspond to BackslashShift, and 5 correspond to RoundShift.If give Go out following key:0.2,0.2344,0.785,0.9324,0.34724,0.1213 and 3,1,3,2,4,5.Then the present invention is implemented Example ciphering process be:First, one group of random number of generation is initialized with initial number seed 0.2, and treats each of encrypted image A Oblique line implements SlashShift and obtains image B, and induced by random number seed 0.2 one group of the displacement step number of each oblique line with Machine number determines;Secondly, another group of random number is initialized with initialization seed 0.2344, RowShift is implemented per a line to image B Image C is obtained, one group of random number that often the displacement step number of row is induced by random number seed 0.2344 determines;Again, seed is used 0.785 another group of random number of initialization, SlashShift is implemented to each oblique lines of image C and obtains image D, and the shifting of each oblique line One group of random number that position step number is induced by random number seed 0.785 determines;Then, reinitialized another group with seed 0.9324 Random number, row each to image D implement ColumnShif and obtain image E, and the displacement step number of each column is by random number seed 0.9324 one group of random number inducing determines, then, is reinitialized another group of random number with seed 0.34724, every to image E One backslash implements BackslashShift and obtains image F, and the displacement step number of each backslash is lured by random number seed 0.34724 Derived one group of random number is determined finally, and one group of random number is initialized with seed 0.1213, and image F each circle is implemented RoundShift, and one group of random number that the displacement step number of each circle is induced by random number seed 0.1213 determines;With regard to completing Image encryption obtains ciphertext graph picture.
Decrypting process corresponding to present invention encryption is its inverse process, and its decryption principle is similar with encryption principle, of the invention Specific decryption step is as follows:
(1), decruption key during input decryption:The initialization seed of cyclic shift subprocess And the superposition order of cyclic shift subprocess:S1,S2,…,ST
(2) key S, is readiAnd Xi seed.Pay attention to:It is to read from back to front that the key of decrypting process, which is read, i.e., first reads STWith XT seed, then read ST-1And XT-1 seed... ..., finally read S1And X1 seed.According to SiDetermine to use what type of cyclic shift mistake Journey, according to key Xi seed, one group of random number is generated, is designated as X (1), X (2) ..., X (Ti), wherein, TiValue by key SiDetermine, Shown in table 2 specific as follows, and the size of image is MxN in table 2.
Table 2
Specifically:
If a. read Si=A, Xi seed=a:Show to carry out RowShift circulative shift operations to image, share n times row and move Position, every time direction shifting function from right to left, one group of random number that often the displacement step number of row is induced by random number seed a are determined It is fixed.
If b. read Si=B, Xi seed=b:Show to carry out ColumnShift circulative shift operations to image, share M row Displacement, is shifted, one group of random number that the displacement step number of each column is induced by random number seed b determines from top to bottom every time.
If c. read Si=C, Xi seed=c:Show to carry out SlashShift circulative shift operations to image, share M+N-1 The displacement of secondary oblique line, is shifted from northeast to southwestward every time, the displacement step number of each oblique line induced by random number seed c one Group random number determines.
If d. read Si=D, Xi seed=d:Show to carry out BackslashShift circulative shift operations to image, share M+ N-1 backslash displacement, is shifted, the displacement step number of each backslash is lured by random number seed d from the southeast to direction northwest every time Derived one group of random number determines.
If e. read Si=E, Xi seed=e:Show to carry out RoundShift circulative shift operations to image, shareSecondary circle displacement, from outer ring to inner ring direction operation, carries out displaced counter-clockwise, the displacement step number of each circle every time The one group of random number induced by random number seed e determines;
(3) (2) step, is repeated, until key uses until exhausted, now i.e. decryption terminates.
In example in real time of the invention, of the invention is safe, and the current pseudo-random number generating algorithm cycle is high, with regard to version MATLAB R2014A rand () function, it produces the cycle of pseudo random number more than 21400, and still more this encryption method is close Key indefinite length, in theory can be with endless, and its key space can be infinitely great.Formed by five cyclic shift subprocess Encryption method in, if according to the double-precision floating pointses format standards of IEEE 754, the initialization of this five cyclic shift subprocess Seed is represented using 52-bit character strings, and the superposition order of this five classes cyclic shift subprocess is represented using 8-bit.So Encryption key amounts to be made up of 300 character strings for being, security performance can obtain enough guarantees.In view of this, this hair is cracked The possibility of bright image encryption method is substantially impossible.
The present invention is by C/C++ programming experimental checks, it was demonstrated that and it is truly feasible, will to image type and size nothing Ask.We all carried out test by the image to online standard testing image storehouse, and the test image warehouse compartment is in http:// Decsai.ugr.es/cvg/CG/base.htm, and the result tested and the Arnold conversion of classics are contrasted, with regard to scramble Degree carries out quantitative measurement.Scramble degree can be used for the clutter for reflecting image, and its value is between -1 and 1, absolute value It is more big, show that image is more in disorder.
RCSA random rotations displacement encryption technology (RCSA) in Fig. 3 is with Arnold conversion (being repeated 5 times) with regard to scramble degree Correction data, data can be seen that in most of situation from the figure, random rotation displacement encryption technology add than Arnold Decryption method obtains more in disorder encryption data.
Fig. 4 is the cipher round results figure that a kind of random rotation provided in an embodiment of the present invention shifts encryption method, in order to test The cipher round results of the present invention, two groups of experiments will be carried out, in first group of experiment, test the cipher round results of all kinds of images, such as Fig. 4 The result of first group of experiment is illustrated, wherein experimental image includes bianry image, gray level image, coloured image and non-square chi Very little image, it is respectively from top to bottom from Fig. 4:Bianry image, gray level image, coloured image, wide rectangular region image, high rectangle Area image, and left column is artwork, right row are encryption figures, and the visual effect of encryption of the invention is good as can be seen from Figure 4.
A kind of Fig. 5 random rotation displacement encryption methods provided in an embodiment of the present invention are stained the decrypted result of encryption data Figure, have detected noise in the figure, shear, and compress the influence to encryption data, and (left side) noise level is 30% in Fig. 5 Gaussian noise;(in) artificial failure by shear;(right side) JPEG lossy compression methods.It is to be respectively by noise level in upper row's image 30% Gaussian noise pollutes, and the encryption data of artificial shearing and JPEG compression, lower row is then the decrypted result of upper row, thus may be used See, random rotation displacement encryption technology can resist the influence of these factors.
In the embodiment of the present invention, treat encrypted image and carried out multiple row cyclic shift, row cyclic shift respectively, oblique line follows Ring shifts, backslash cyclic shift, and circle cyclic shift causes image encryption security to improve.In each cyclic shift, lead to It is generation displacement step number per a kind of cyclic shift to cross random function, enhances the security of encryption.In addition, the present invention is not related to Multiplication, division, evolution and sort operation, it is thus only necessary to assignment and judge computing, operation is quickly.
Disclosed above is only several specific embodiments of the present invention, and those skilled in the art can be carried out to the present invention It is various to change with modification without departing from the spirit and scope of the present invention, if these modifications and variations of the present invention belong to the present invention Within the scope of claim and its equivalent technologies, then the present invention is also intended to comprising including these changes and modification.

Claims (7)

1. a kind of image encryption method of random rotation displacement, it is characterised in that methods described includes:
S1, input image to be encrypted;
S2, the N number of initialization seed of inputAnd the overlay order of N number of cyclic shift subprocess S1, S2..., SN
S3, take i=1;
S4, extractionAnd Si
S5, the S according to extractioniValue determines the species of cyclic shift subprocess, according toOne group of random number is generated, is designated as [X (1), X (2) ..., X (T)], and with one group of random number treat encrypted image carry out determined by cyclic shift subprocess;Its In, T value determines according to the species of cyclic shift subprocess;The species of the cyclic shift subprocess includes:Row cyclic shift RowShift, row cyclic shift ColumnShift, oblique line cyclic shift SlashShift, backslash cyclic shift BackslashShift and circle cyclic shift RoundShift;
S6, i numerical value increase by 1, and when i is less than or equal to N, perform step S4 to S5.
2. the image encryption method of random rotation as claimed in claim 1 displacement, it is characterised in that it is described with described one group with Machine number treats cyclic shift subprocess determined by encrypted image progress, including:
Treat encrypted image and perform RowShift successively from the 1st row to T rows, i.e., the first row is performed into RowShift (1, X (1) the 2nd row), is performed into RowShift (2, X (2)), the rest may be inferred performs RowShift (T, X (T)) by T rows;Or
Treat encrypted image and perform ColumnShift from the 1st row to T leus time, i.e., first row is performed into ColumnShift (1, X (1)), the 2nd row is performed into ColumnShift (i, X (2)), the rest may be inferred arranges execution ColumnShift (T, X by T (T));Or
Treat encrypted image and perform oblique line cyclic shift SlashShift successively from the 1st oblique line to T oblique lines, i.e., by the 1st oblique line SlashShift (1, X (1)) is performed, the 2nd oblique line is performed into SlashShift (2, X (2)), the rest may be inferred performs T oblique lines SlashShift (T, X (T));Or
Treat encrypted image and perform oblique line cyclic shift BackslashShift successively from the 1st backslash to T backslashes, will 1st backslash performs BackslashShift (1, X (1)), and the 2nd backslash is performed into BackslashShift (2, X (2)), according to This analogizes performs BackslashShift (T, X (T)) by T backslashes;Or
Treat encrypted image and perform RoundShift successively from the 1st circle to T circles, i.e., the 1st circle is performed into RoundShift (1, X (1) the 2nd circle), is performed into RoundShift (2, X (2)), the rest may be inferred encloses execution RoundShift (T, X (T)) by T.
3. the image encryption method of random rotation displacement as claimed in claim 2, it is characterised in that RowShift (T, the X (T)) represent that the T rows for treating encrypted image translate X (T) individual pixel from left to right.
4. the image encryption method of random rotation displacement as claimed in claim 2, it is characterised in that the ColumnShift The T rows that (T, X (T)) represents to treat encrypted image translate X (T) individual pixel from top to bottom.
5. the image encryption method of random rotation displacement as claimed in claim 2, it is characterised in that the SlashShift The T oblique lines that (T, X (T)) represents to treat encrypted image are from southwest to northeastward loopy moving X (T) individual pixel.
6. the image encryption method of random rotation displacement as claimed in claim 2, it is characterised in that the BackslashShi Ft (T, X (T)) represents to treat the T backslashes of encrypted image along northwest to southeastern direction loopy moving X (T) individual pixel.
7. the image encryption method of random rotation displacement as claimed in claim 2, it is characterised in that the RoundShift (T, X (T)) represents that the T circles for treating encrypted image do right-hand circular and rotate X (T) individual pixel.
CN201710627279.XA 2017-07-28 2017-07-28 Random cyclic shift image encryption method Active CN107392834B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710627279.XA CN107392834B (en) 2017-07-28 2017-07-28 Random cyclic shift image encryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710627279.XA CN107392834B (en) 2017-07-28 2017-07-28 Random cyclic shift image encryption method

Publications (2)

Publication Number Publication Date
CN107392834A true CN107392834A (en) 2017-11-24
CN107392834B CN107392834B (en) 2021-02-26

Family

ID=60342696

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710627279.XA Active CN107392834B (en) 2017-07-28 2017-07-28 Random cyclic shift image encryption method

Country Status (1)

Country Link
CN (1) CN107392834B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107968705A (en) * 2017-11-28 2018-04-27 深圳大学 A kind of method for encryption/decryption, enciphering/deciphering end and double random phase encrypting and deciphering system
CN110730188A (en) * 2019-10-23 2020-01-24 深圳市中仁信息科技有限公司 Method for encrypting, storing and transmitting static pictures
CN115632756A (en) * 2022-08-18 2023-01-20 重庆市地理信息和遥感应用中心 Geographic data encryption system and method based on dynamic cyclic displacement

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6064738A (en) * 1996-12-10 2000-05-16 The Research Foundation Of State University Of New York Method for encrypting and decrypting data using chaotic maps
CN101237321A (en) * 2008-02-03 2008-08-06 西北农林科技大学 Encryption method based on cycle queue shift rule
CN102196320A (en) * 2011-04-15 2011-09-21 江苏省现代企业信息化应用支撑软件工程技术研发中心 Image encrypting and decrypting system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6064738A (en) * 1996-12-10 2000-05-16 The Research Foundation Of State University Of New York Method for encrypting and decrypting data using chaotic maps
CN101237321A (en) * 2008-02-03 2008-08-06 西北农林科技大学 Encryption method based on cycle queue shift rule
CN102196320A (en) * 2011-04-15 2011-09-21 江苏省现代企业信息化应用支撑软件工程技术研发中心 Image encrypting and decrypting system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107968705A (en) * 2017-11-28 2018-04-27 深圳大学 A kind of method for encryption/decryption, enciphering/deciphering end and double random phase encrypting and deciphering system
CN110730188A (en) * 2019-10-23 2020-01-24 深圳市中仁信息科技有限公司 Method for encrypting, storing and transmitting static pictures
CN115632756A (en) * 2022-08-18 2023-01-20 重庆市地理信息和遥感应用中心 Geographic data encryption system and method based on dynamic cyclic displacement

Also Published As

Publication number Publication date
CN107392834B (en) 2021-02-26

Similar Documents

Publication Publication Date Title
Dhall et al. Cryptanalysis of image encryption scheme based on a new 1D chaotic system
Shankar et al. RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography
Dhamija et al. A novel cryptographic and steganographic approach for secure cloud data migration
CN104751401B (en) A kind of novel Piecewise linear chaotic map image encryption and coding method
Al-Roithy et al. Remodeling randomness prioritization to boost-up security of RGB image encryption
CN106296561B (en) Image encryption method and device, decryption method and device based on hyperchaotic system
CN108122188A (en) A kind of image encryption method
Hanchinamani et al. An efficient image encryption scheme based on a Peter De Jong chaotic map and a RC4 stream cipher
CN107392834A (en) A kind of image encryption method of random rotation displacement
Karthikeyan et al. Enhanced security in steganography using encryption and quick response code
CN108141350A (en) The method of transaction is ensured from non-security terminal
Fu et al. A new fast color image encryption scheme using chen chaotic system
Iqbal et al. An efficient grayscale image encryption scheme based on variable length row-column swapping operations
Ramírez-Torres et al. Image encryption with an improved cryptosystem based on a matrix approach
Incze Pixel Sieve method for secret sharing & visual cryptography
Kutade et al. A survey on various approaches of image steganography
CN113099069B (en) Multi-image encryption method based on three-dimensional spiral model
Nathaniel Methodology for Image Cryptosystem Based on a Gray Code Number System.
Lokhande An Effective Way of using LSB Steganography in images along with Cryptography
Li et al. A novel image protection cryptosystem with only permutation stage: multi-shuffling process
Fu et al. Medical image protection using hyperchaos-based encryption
Babatunde et al. Performance analysis of gray code number system in image security
Bagane et al. Securing Data in Images Using Cryptography and Steganography Algorithms
Siddartha et al. A novel data masking method for securing medical image
Dey et al. Color image encryption using single layer artificial neural network and buffer shuffling

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant