CN110598430B - Image encryption method based on improved logistic mapping - Google Patents

Image encryption method based on improved logistic mapping Download PDF

Info

Publication number
CN110598430B
CN110598430B CN201910818981.3A CN201910818981A CN110598430B CN 110598430 B CN110598430 B CN 110598430B CN 201910818981 A CN201910818981 A CN 201910818981A CN 110598430 B CN110598430 B CN 110598430B
Authority
CN
China
Prior art keywords
image
encryption
encrypted
logistic
pair
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910818981.3A
Other languages
Chinese (zh)
Other versions
CN110598430A (en
Inventor
唐晨
马广彪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin University
Original Assignee
Tianjin University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin University filed Critical Tianjin University
Priority to CN201910818981.3A priority Critical patent/CN110598430B/en
Publication of CN110598430A publication Critical patent/CN110598430A/en
Application granted granted Critical
Publication of CN110598430B publication Critical patent/CN110598430B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Facsimile Transmission Control (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The invention relates to the technical field of chaotic systems and information security, which has effectiveness and feasibility in the aspects of shearing resistance, key sensitivity, histogram distribution, information entropy, correlation between adjacent coefficients and the like, and is applied to data encryption. 1) Encryption section: firstly, respectively scrambling pixel positions of an image to be encrypted by using a first pair of random sequences generated by using Logistic and improved Logistic mapping; then performing exclusive OR operation to obtain a final encrypted image; 2) Decryption section: firstly, performing exclusive OR operation on the second pair of random sequences and the encrypted image respectively, and recovering an initial pixel value; and then restoring the pixel positions of the original image according to the conversion sequence of the pixel positions in the first encryption process. The invention is mainly applied to information encryption occasions.

Description

Image encryption method based on improved Logistic mapping
Technical Field
The invention relates to the technical field of chaotic systems and information security, in particular to an improvement scheme aiming at the problem of uneven distribution of traditional Logistic mapping.
Background
With the development of computer and communication technologies, particularly the wide application of the Internet, the security and confidentiality of multimedia information has become more and more important. Among multimedia information, image information has become one of the important means for human expression of information because of its vivid image, and how to protect digital images from tampering, illegal copying and transmission has important practical significance.
The chaotic system provides a good path for image information encryption due to the characteristics of pseudo-randomness, uncertainty, unpredictability and extreme sensitivity to control parameters and initial conditions. Encryption systems that use a chaotic sequence to construct images appear sequentially. However, with the continuous perfection and innovation of encryption systems, it has been found that random sequences generated by conventional Logistic chaotic mapping are not uniformly distributed. Whether the simple image scrambling result based on Logistic mapping meets the uniform distribution required by the encryption system is not well verified.
Disclosure of Invention
To overcome the deficiencies of the prior art, the present invention is directed to an improved Logistic mapping scheme. The random sequence generated by the improved Logistic map not only satisfies the uniform distribution, but also has a larger key space than the traditional Logistic map. And then, combining a simple image pixel position scrambling and pixel value replacing image encryption algorithm, further verifying the effectiveness and feasibility of the improved Logistic mapping in the aspects of shearing resistance, key sensitivity, histogram distribution, information entropy, correlation between adjacent coefficients and the like. Therefore, the technical scheme adopted by the invention is that the image encryption method based on improved Logistic mapping comprises the following steps:
1) Encryption section: firstly, scrambling pixel positions of an image to be encrypted respectively by utilizing a first pair of random sequences generated by a Logistic map which does not meet uniform distribution and a Logistic map which meets uniform distribution, so as to realize first encryption; then, performing exclusive OR operation on the generated second pair of random sequences and the pixel values of the image after the first encryption respectively to realize the replacement of the pixel values and obtain a final encrypted image;
2) Decryption section: firstly, performing exclusive OR operation on the second pair of random sequences and the encrypted image respectively, and recovering an initial pixel value; and then restoring the pixel positions of the original image according to the conversion sequence of the pixel positions in the first encryption process, thus finishing the decryption process.
The iterative form of the Logistic mapping that does not satisfy the uniform distribution is as follows:
x n+1 =μx n (1-x n )
wherein x is n Is the chaos sequence value after n times of iteration, when the control parameter 3.5699 is more than mu and less than or equal to 4, the input initial value x 0 ∈[0,1]The Logistic map is in a chaotic state;
the Logistic mapping iteration form satisfying the uniform distribution is as follows:
x n+1 =(ux n+1 (1-x n ))mod1
y n+1 =rx n
wherein x is n+1 ,y n+1 The chaotic sequence values are respectively iterated n+1 times, and u and r are control parameters.
The specific steps are refined as follows:
(1) Encryption portion of image:
1) Firstly, scrambling pixel positions of an image I to be encrypted by utilizing a first pair of random sequences seq11 and seq12 generated by using a Logistic map which does not meet the uniform distribution and a Logistic map which meets the uniform distribution respectively;
wherein I (I, j) is the pixel value of the original image at (I, j), seq11, seq12 is a line number with the length of the original image, and the value range is an integer sequence of [0,255 ];
2) Then, the generated second pair of random sequences seq21 and seq22 are respectively exclusive-ored with the pixel values of the first encrypted image to realize the replacement of the pixel values, so as to obtain final encrypted images I1 and I2:
in the method, in the process of the invention,is an exclusive-or operation, seq21, seq22 is a size equal to the original image, and the value range is [0,255]]Is an integer matrix of (a);
(2) Decryption portion of image:
1) Firstly, performing exclusive OR operation on the generated second pair of random sequences seq21 and seq22 and the final encrypted images I1 and I2 respectively to restore initial pixel values;
2) Then, the pixel positions of the original image are restored according to the conversion order of the pixel positions in the first encryption process, and a decrypted image reI is obtained:
in the formula, reI is a decrypted image of two encryption methods.
The invention has the characteristics and beneficial effects that:
an improved Logistic chaotic mapping scheme is provided, so that the generated random sequence presents a uniform distribution state, and the randomness of the chaotic sequence is enhanced. Meanwhile, compared with the traditional Logistic mapping, the key space of the chaotic mapping in the scheme provided by the invention is greatly increased. Finally, through experiments, the effectiveness and feasibility of the improved Logistic mapping in the aspects of shearing resistance, key sensitivity, histogram distribution, information entropy, correlation between adjacent coefficients and the like are further verified by using a simple chaotic mapping-based image encryption algorithm.
Description of the drawings:
FIG. 1 is a schematic block diagram of the encryption scheme of the present invention.
Fig. 2 is a graph comparing the index profile.
FIG. 2 (a) is a Lyapunov exponent profile of a conventional Logistic map;
FIGS. 2 (b) - (d) are Lyapunov exponent profiles for improved Logistic mapping.
Fig. 3 is a distribution histogram contrast chart.
FIG. 3 (a) is a distribution histogram of a chaotic sequence generated by a conventional Logistic map;
fig. 3 (b) is a distribution histogram of the chaotic sequence generated by the improved Logistic map.
Fig. 4 is a diagram showing the comparison of the images to be encrypted, the conventional encryption and the encryption of the invention.
Fig. 4 (a) is an image to be encrypted;
FIG. 4 (b) is an encrypted image based on a conventional Logistic map (first scheme);
fig. 4 (c) is an encrypted image based on an improved Logistic mapping (second scheme).
Fig. 5 is a similarity comparison diagram of the decrypted image and the original image.
Fig. 5 (a) shows the value of the shear control coefficient k=d1/d;
fig. 5 (b) is a graph comparing the similarity of the decrypted image of the first scheme and the second scheme with the original image by the cut attack.
Fig. 6 is a gray histogram contrast chart.
Fig. 6 (a) is a gray level histogram of an original image;
fig. 6 (b) is a gray level histogram of the encrypted image of the first scheme;
fig. 6 (c) is a gray level histogram of the encrypted image of the second scheme.
Detailed Description
In order to overcome the defect that the random sequence generated by the traditional Logistic chaotic mapping does not meet the uniform distribution, the invention provides an improved Logistic mapping scheme. The random sequence generated by the improved Logistic map not only satisfies the uniform distribution, but also has a larger key space than the traditional Logistic map. And then, combining a simple image pixel position scrambling and pixel value replacing image encryption algorithm, further verifying the effectiveness and feasibility of the improved Logistic mapping in the aspects of shearing resistance, key sensitivity, histogram distribution, information entropy, correlation between adjacent coefficients and the like. The method comprises the following steps:
1) Encryption section: firstly, scrambling pixel positions of an image to be encrypted respectively by using a first pair of random sequences generated by the traditional Logistic mapping and the improved Logistic mapping, so as to realize first encryption; and then performing exclusive OR operation on the generated second pair of random sequences and the pixel values of the image after the first encryption respectively to realize the replacement of the pixel values and obtain a final encrypted image.
2) Decryption section: firstly, performing exclusive OR operation on the second pair of random sequences and the encrypted image respectively, and recovering an initial pixel value; and then restoring the pixel positions of the original image according to the conversion sequence of the pixel positions in the first encryption process, thus finishing the decryption process.
In one example, the specific steps are as follows:
(1) Encryption portion of image:
1) Firstly, scrambling pixel positions of an image I to be encrypted by using a first pair of random sequences seq11 and seq12 generated by a traditional Logistic map and an improved Logistic map respectively;
in the formula, seq11, seq12 is an integer sequence with the length of the line number of the original image and the value range of [0,255 ].
2) Then, the generated second pair of random sequences seq21 and seq22 are respectively exclusive-ored with the pixel values of the first encrypted image, so that the pixel values are replaced, and the final encrypted images I1 and I2 are obtained.
In the method, in the process of the invention,is an exclusive-or operation, seq21, seq22 is a size and original graphThe value range is 0,255]Is a matrix of integers.
(2) Decryption portion of image:
1) Firstly, performing exclusive OR operation on the generated second pair of random sequences seq21 and seq22 and the final encrypted images I1 and I2 respectively to restore initial pixel values;
2) Then, the pixel positions of the original image are restored according to the conversion order of the pixel positions in the first encryption process, and the decrypted image reI can be obtained.
Aiming at the defect that the random sequence generated by the traditional Logistic mapping does not meet the uniform distribution, the invention provides an improved Logistic mapping scheme. The random sequence generated by the improved Logistic map not only satisfies the uniform distribution, but also has a larger key space than the traditional Logistic map. And then, a simple image scrambling algorithm is designed by combining the scheme provided by the invention with the traditional Logistic mapping, and the effectiveness and feasibility of the scheme are further verified. The details are described below:
lyapunov index
Lyapunov exponent describes an important index of the chaos phenomenon, and the calculation formula is as follows:
wherein x is k Is a chaotic sequence. When the number of the pins is small,
λ < 0, the mapping converging at a certain point;
λ=0, the mapping performs a periodic motion;
lambda > 0, the mapping is in a chaotic state.
Logistic mapping
Logistic mapping is a simple and widely used nonlinear dynamics system. The iterative form is as follows:
x n+1 =μx n (1-x n )
wherein x is n Is the chaos sequence value after n times of iteration. When the control parameter 3.5699 is smaller than mu and smaller than or equal to 4, the input initial value x 0 ∈[0,1]The Logistic map is in a chaotic state. Fig. 3 (a) is a distribution histogram of a random sequence generated for a Logistic map.
Improved Logistic mapping
x n+1 =(ux n+1 (1-x n ))mod1
y n+1 =rx n
Wherein x is n+1 ,y n+1 Respectively, the chaotic sequence values of n+1 iterations. The improved Logistic map is in a chaotic state when the control parameters u and r satisfy the relationship in fig. 2 (b) calculated according to equation (1). Fig. 3 (b) is a distribution histogram of a random sequence generated for the improved Logistic map.
In order to make the purpose and the technical advantages of the present invention clearer, a simple image scrambling algorithm is designed by combining the scheme provided by the present invention with the traditional Logistic mapping, and is further described in detail.
Example 1
A simple image pixel position scrambling and pixel value replacing image encryption method has the encryption principle shown in figure 1. The method consists of an encrypted portion and a decrypted portion of the image.
(1) Encryption portion of image:
in the encryption process, firstly, a first pair of random sequences generated by the traditional Logistic mapping and the improved Logistic mapping are used for respectively scrambling the pixel positions of an image to be encrypted, so that first encryption is realized; and then performing exclusive OR operation on the generated second pair of random sequences and the pixel values of the image after the first encryption respectively to realize the replacement of the pixel values and obtain a final encrypted image.
(2) Decryption portion of image:
in the decryption process, firstly, performing exclusive OR operation on the second pair of random sequences and the encrypted image respectively, and recovering an initial pixel value; and then restoring the pixel positions of the original image according to the conversion sequence of the pixel positions in the first encryption process, thus finishing the decryption process.
In summary, the present invention combines the improved Logistic mapping scheme with the traditional Logistic mapping scheme to design a simple image scrambling algorithm. The method not only solves the defect that the random sequence generated by the traditional Logistic mapping does not meet the uniform distribution, but also has larger key space compared with the traditional Logistic mapping. Meanwhile, the validity and feasibility of the scheme are verified in detail in aspects of key sensitivity, histogram distribution of the encrypted image, information entropy, correlation between adjacent pixels of the encrypted image and the like.
Example 2
The scheme of embodiment 1 is described in detail below in conjunction with the design principle of fig. 1, and is described in detail below:
in order to verify the validity and feasibility of the improved Logistic mapping scheme in detail, a simple image scrambling algorithm is designed by combining the improved Logistic mapping scheme with the traditional Logistic mapping scheme. The encryption principle block diagram is shown in fig. 1, and the encryption method consists of an encryption part of an image and a decryption part of the image. The following detailed description of the two embodiments is provided.
(1) Encryption portion of image:
1) Firstly, scrambling pixel positions of an image I to be encrypted by using a first pair of random sequences seq11 and seq12 generated by a traditional Logistic map and an improved Logistic map respectively;
where seq11, seq12 is a number of lines of length of the original image, and the range of values is an integer sequence of [0,255 ].
2) Then, the generated second pair of random sequences seq21 and seq22 are respectively exclusive-ored with the pixel values of the first encrypted image, so that the pixel values are replaced, and the final encrypted images I1 and I2 are obtained.
In the method, in the process of the invention,is an exclusive-or operation, seq21, seq22 is a size equal to the original image, and the value range is [0,255]]Is a matrix of integers.
(2) Decryption portion of image:
1) Firstly, performing exclusive OR operation on the generated second pair of random sequences seq21 and seq22 and the final encrypted images I1 and I2 respectively to restore initial pixel values;
2) Then, the pixel positions of the original image are restored according to the conversion order of the pixel positions in the first encryption process, and the decrypted image reI can be obtained.
Example 3
The feasibility of the solutions of examples 1 and 2 is verified in the following description, in conjunction with the specific figures, given in detail below:
the Lyapunov index profiles of the conventional Logistic map and the improved Logistic map proposed in the present invention are shown in FIGS. 2 (a) and 2 (b) - (d).
Fig. 3 (a) and 3 (b) are distribution histograms of random sequences generated for a conventional Logistic map and a modified Logistic map, respectively. The random sequences generated by the improved Logistic map satisfy a uniform distribution compared to the traditional Logistic map.
After the original image (as shown in fig. 4 (a)) is encrypted by adopting the first scheme and the second scheme in the present invention, the obtained encrypted image is shown in fig. 4 (b) and fig. 4 (c).
As can be seen from fig. 5 (b), the second solution is significantly stronger in terms of shear attack resistance than the first solution.
Fig. 6 (a) - (c) are gray-scale histogram distributions of the original image, the first-scheme encrypted image, and the second-scheme encrypted image, respectively. It follows that the second scheme is more resistant to statistical attacks than the first scheme.
Table 1 shows the key space of the first scheme and the second scheme and the sensitivity of the two schemes to keys was quantitatively analyzed. The second scheme is illustrated to have a larger key space and higher key sensitivity than the first scheme.
Table 2 is the information entropy of the original image and the encrypted images of the two encryption schemes. It can be seen that the information entropy of the encrypted image of the second scheme is closer to 8 than that of the first scheme.
Table 3 shows the correlation between adjacent coefficients of the encrypted image in three directions in two schemes. It can be seen that the second scheme has a lower correlation between adjacent coefficients in three directions than the encrypted image of the first scheme.
TABLE 1
TABLE 2
TABLE 3 Table 3
It can be seen that the random sequence generated by the improved Logistic mapping proposed in the present invention not only satisfies the uniform distribution, but also has a larger key space than the conventional Logistic mapping. Moreover, the effectiveness and feasibility of the improved Logistic mapping in the aspects of shearing resistance, key sensitivity, histogram distribution, information entropy, correlation between adjacent coefficients and the like are verified by combining a simple image pixel position scrambling and pixel value substitution image encryption algorithm. Meets various requirements in practical application.
Those skilled in the art will appreciate that the drawings are schematic representations of only one preferred embodiment, and that the above-described embodiment numbers are merely for illustration purposes and do not represent advantages or disadvantages of the embodiments.
The foregoing is only illustrative of the present invention and is not to be construed as limiting thereof, but rather, any modifications, equivalent arrangements, improvements, etc. that fall within the spirit and principles of the present invention are intended to be included within the scope of the present invention.

Claims (2)

1. An image encryption method based on improved Logistic mapping is characterized by comprising the following steps:
1) Encryption section: firstly, scrambling pixel positions of an image to be encrypted respectively by utilizing a first pair of random sequences generated by a Logistic map which does not meet uniform distribution and a Logistic map which meets uniform distribution, so as to realize first encryption; then, performing exclusive OR operation on the generated second pair of random sequences and the pixel values of the image after the first encryption respectively to realize the replacement of the pixel values and obtain a final encrypted image;
2) Decryption section: firstly, performing exclusive OR operation on the second pair of random sequences and the encrypted image respectively, and recovering an initial pixel value; then, according to the conversion sequence of the pixel positions in the first encryption process, the pixel positions of the original image are restored, and the decryption process can be completed;
the iterative form of the Logistic mapping that does not satisfy the uniform distribution is as follows:
x n+1 =μx n (1-x n )
wherein x is n Is the chaos sequence value after n times of iteration, when the control parameter 3.5699 is more than mu and less than or equal to 4, the input initial value x 0 ∈[0,1]The Logistic map is in a chaotic state;
the Logistic mapping iteration form satisfying the uniform distribution is as follows:
x n+1 =(ux n+1 (1-x n ))mod1
y n+1 =rx n
wherein x is n+1 ,y n+1 The chaotic sequence values are respectively iterated n+1 times, and u and r are control parameters.
2. The improved Logistic mapping-based image encryption method according to claim 1, wherein the specific steps are refined as follows:
(1) Encryption portion of image:
1) Firstly, scrambling pixel positions of an image I to be encrypted by utilizing a first pair of random sequences seq11 and seq12 generated by using a Logistic map which does not meet the uniform distribution and a Logistic map which meets the uniform distribution respectively;
wherein I (I, j) is the pixel value of the original image at (I, j), seq11, seq12 is a line number with the length of the original image, and the value range is an integer sequence of [0,255 ];
2) Then, the generated second pair of random sequences seq21 and seq22 are respectively exclusive-ored with the pixel values of the first encrypted image to realize the replacement of the pixel values, so as to obtain final encrypted images I1 and I2:
in the method, in the process of the invention,is an exclusive-or operation, seq21, seq22 is a size equal to the original image, and the value range is [0,255]]Is an integer matrix of (a);
(2) Decryption portion of image:
1) Firstly, performing exclusive OR operation on the generated second pair of random sequences seq21 and seq22 and the final encrypted images I1 and I2 respectively to restore initial pixel values;
2) Then, the pixel positions of the original image are restored according to the conversion order of the pixel positions in the first encryption process, and a decrypted image reI is obtained:
in the formula, reI is a decrypted image of two encryption methods.
CN201910818981.3A 2019-08-30 2019-08-30 Image encryption method based on improved logistic mapping Active CN110598430B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910818981.3A CN110598430B (en) 2019-08-30 2019-08-30 Image encryption method based on improved logistic mapping

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910818981.3A CN110598430B (en) 2019-08-30 2019-08-30 Image encryption method based on improved logistic mapping

Publications (2)

Publication Number Publication Date
CN110598430A CN110598430A (en) 2019-12-20
CN110598430B true CN110598430B (en) 2023-11-07

Family

ID=68856618

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910818981.3A Active CN110598430B (en) 2019-08-30 2019-08-30 Image encryption method based on improved logistic mapping

Country Status (1)

Country Link
CN (1) CN110598430B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111314046B (en) * 2020-01-19 2023-04-07 内江师范学院 Image encryption and decryption method based on Arnold transformation and fractional order chaotic sequence
US11734435B2 (en) * 2020-10-16 2023-08-22 Qilu University Of Technology Image encryption and decryption communication algorithm based on two-dimensional lag complex logistic map
CN112258520B (en) * 2020-10-16 2022-03-29 齐鲁工业大学 Image encryption and decryption communication method based on two-dimensional hysteresis complex Logistic mapping
CN113726975B (en) * 2021-08-11 2024-02-09 国网河北省电力有限公司保定供电分公司 Image encryption method and device based on chaotic system, medium and electronic equipment
CN114337988A (en) * 2021-12-10 2022-04-12 深圳市洲明科技股份有限公司 Media data decryption method and device, computer equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103179319A (en) * 2013-01-09 2013-06-26 王少夫 Method for encrypting digital images of double-chaos system
CN107911572A (en) * 2017-12-15 2018-04-13 安阳工学院 The image encryption method of logistic chaos system is improved based on fractional fourier transform
CN108133446A (en) * 2016-12-01 2018-06-08 钦州市晶通科技有限公司 A kind of composite chaotic Second-scrambling resume image
CN109981921A (en) * 2019-03-11 2019-07-05 齐齐哈尔大学 A kind of mixed chaos virtual optics image encryption method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106953875A (en) * 2017-04-26 2017-07-14 吉林大学珠海学院 Ordered encryption method based on multi-key cipher stream cipher

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103179319A (en) * 2013-01-09 2013-06-26 王少夫 Method for encrypting digital images of double-chaos system
CN108133446A (en) * 2016-12-01 2018-06-08 钦州市晶通科技有限公司 A kind of composite chaotic Second-scrambling resume image
CN107911572A (en) * 2017-12-15 2018-04-13 安阳工学院 The image encryption method of logistic chaos system is improved based on fractional fourier transform
CN109981921A (en) * 2019-03-11 2019-07-05 齐齐哈尔大学 A kind of mixed chaos virtual optics image encryption method

Also Published As

Publication number Publication date
CN110598430A (en) 2019-12-20

Similar Documents

Publication Publication Date Title
CN110598430B (en) Image encryption method based on improved logistic mapping
Man et al. Double image encryption algorithm based on neural network and chaos
CN111105339B (en) Image encryption method based on multidimensional chaotic system and Joseph scrambling
Patro et al. Secure multi–level permutation operation based multiple colour image encryption
Bedi et al. Using PSO in a spatial domain based image hiding scheme with distortion tolerance
CN106709854B (en) Image information fusion encryption method based on cat face transformation and chaos
Lv et al. A novel scheme for simultaneous image compression and encryption based on wavelet packet transform and multi-chaotic systems
Wang et al. Color image encryption algorithm based on hyperchaotic system and improved quantum revolving gate
CN110570344A (en) Image encryption method based on random number embedding and DNA dynamic coding
CN110889877A (en) Image encryption method based on L-F cascade chaos and 3D bit scrambling
Li et al. An improved quantum watermarking scheme using small-scale quantum circuits and color scrambling
CN111130748A (en) Quantum chaotic parallel image encryption method
Xiang et al. Cryptanalysis and improvement of a reversible data-hiding scheme in encrypted images by redundant space transfer
Wong et al. A DCT-based Mod4 steganographic method
Luo et al. An image encryption scheme based on block compressed sensing and Chen’s system
CN115580687A (en) Multi-image encryption method based on variable parameter hyperchaotic system and S-shaped diffusion
Shao et al. Chaotic image encryption using piecewise-logistic-sine map
Tong et al. A residual chaotic system for image security and digital video Watermarking
Caragata et al. Cryptanalysis of an improved fragile watermarking scheme
Li et al. Visual image encryption scheme based on inter-intra-block scrambling and weighted diffusion
Chen et al. An image encryption algorithm based on the LSCMM chaotic map and bidirectional dynamic diffusion
Panchikkil et al. A pseudo-random pixel mapping with weighted mesh graph approach for reversible data hiding in encrypted image
Wen et al. Exploring the future application of UAVs: face image privacy protection scheme based on chaos and DNA cryptography
Rajput et al. A novel image encryption and authentication scheme using chaotic maps
Ding et al. Signal-sensing dynamic S-box image encryption with 2D Griewank–sin map

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant