CN101344960A - Chaos digital image encryption method - Google Patents

Chaos digital image encryption method Download PDF

Info

Publication number
CN101344960A
CN101344960A CNA2008100128828A CN200810012882A CN101344960A CN 101344960 A CN101344960 A CN 101344960A CN A2008100128828 A CNA2008100128828 A CN A2008100128828A CN 200810012882 A CN200810012882 A CN 200810012882A CN 101344960 A CN101344960 A CN 101344960A
Authority
CN
China
Prior art keywords
matrix
encryption method
picture
chaos
picture element
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2008100128828A
Other languages
Chinese (zh)
Inventor
回静
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CNA2008100128828A priority Critical patent/CN101344960A/en
Publication of CN101344960A publication Critical patent/CN101344960A/en
Pending legal-status Critical Current

Links

Abstract

The invention relates to an encryption method of chaotic digital images, which adopts a method that firstly utilizes MATLAB software to transform digital images to be processed into pixel matrixes, then utilizes a chaotic cryptography theory to encode and encrypt the initialized pixel matrixes, and finally utilizes MATLAB commands to transform the encrypted pixel matrixes into digital images, thus completing the encryption process. Compared with the existing encryption method, the encryption method, in terms of the generation of encryption keys, can randomly generate nonlinear encryption key space, thus causing the images after encryption to be safer and hard to be decrypted, furthermore, the encryption effect is uniform and the method is simple.

Description

Chaos digital image encryption method
One, technical field:
The present invention relates to the secret and safe method, particularly digital image encryption method of digital information transmission.
Two, background technology:
Encryption method is the method for information being carried out Code And Decode, and encryption method commonly used at present mainly contains symmetric cryptography, asymmetric cryptosystem and irreversible encryption method.These three kinds of methods all adopt utilizes a cover that matches each other of generation in advance or the method for a few cover PKI and private key to carry out encryption and decryption.When generating key, above-mentioned three kinds of methods mainly adopt linear order to realize.And for the encryption of digital picture, above-mentioned encryption method defectiveness all in encryption homogeneity, cipher round results and the security of image.
Three, summary of the invention:
In order to overcome the not high shortcoming of existing encryption method security, the invention provides a kind of digital image encryption method, this method can generate nonlinear key space at random on aspect the generation key, encrypt even and safer, reliable than present encryption method.
The technical scheme that the present invention is adopted for achieving the above object is: chaos digital image encryption method, earlier input picture is carried out pre-service, extract picture element matrix, and the picture element matrix that obtains carried out initialization process, utilize chaos cipher scientific principle opinion to carry out the encoding process of key to the matrix after handling then.
Described when the image to input carries out pre-service, the method for employing is the imread order that utilizes in the MATLAB software, is about to input picture and is converted into numerical value picture element matrix form.
Described when picture element matrix is carried out initialization process, the method for employing is: the numerical value q that extracts the maximum in every row in the matrix earlier j, adopt following formula to handle for each element in the matrix:
m ij *=(q j-m ij)/∑ i=1 n(q j-m ij)
Wherein, m IjIt is the element in the picture element matrix.M *=(m Ij *) be exactly the new matrix after the initialization.
Described picture element matrix after utilizing the logistic conversion of chaos cipher in learning with initialization when generating key carries out encoding process, promptly utilizes following formula to handle:
(m j *) n+1=(m * j) n×μ×[(1-m j *) n] μ∈[0,4]
Wherein μ is called as the Logistic parameter.
Characteristics of the present invention: utilize chaos sequence can generate the characteristics of non-linear sequence, generate the key of digital picture, it is good that this encryption method has a cipher round results, is difficult for being cracked safe and reliable characteristics.
Four, embodiment:
Below in conjunction with embodiment the present invention is described in further detail, but is not limited to specific embodiment.
According to following steps a certain digital picture is carried out encryption:
1. for a certain digital picture to be encrypted, at first this digital picture is deposited in the buffer memory of MATLAB software with a certain glue file title, call imread order operation then, digital picture is converted into the picture element matrix form.
2. for making digital picture when encrypting, can upset original image more uniformly, need do initialization process to the resulting picture element matrix of step 1, concrete grammar is as follows: the numerical value q that extracts the maximum in every row in the matrix earlier j, adopt following formula to handle for each element in the matrix:
m ij *=(q j-m ij)/∑ i=1 n(q j-m ij)
Wherein, m IjIt is the element in the picture element matrix.M *=(m Ij *) be exactly the new matrix after the initialization.It is poor that the element that is about to maximum in every column element and these row in the picture element matrix is done, and calculates their ratios separately, makes the summation of element of the every row in the picture element matrix remain 1.
3. utilize the logistic mapping that each row vector is done encryption to initialized picture element matrix.The concrete model of the logistic mapping of using is:
(m j *) n+1=(m * j) n×μ×[(1-m j *) n] μ∈[0,4]
Wherein μ is called as the Logistic parameter.
4. the picture element matrix after the encryption that will obtain with step is kept in the buffer memory of MATLAB software, as with its called after name1.dat, calls imshow (name1) order, and the picture element matrix after encrypting is converted into encrypted image.

Claims (5)

1, chaos digital image encryption method, it is characterized in that: earlier input picture is carried out pre-service, extract picture element matrix, and the picture element matrix that obtains carried out initialization process, utilize chaos cipher scientific principle opinion to carry out the encoding process of key to the matrix after handling then, utilize the picture element matrix after the MATLAB order will be encrypted to convert digital picture at last again.
2, chaos digital image encryption method according to claim 1 is characterized in that: when the image to input carried out pre-service, the method for employing was the imread order that utilizes in the MATLAB software, is about to input picture and is converted into numerical value picture element matrix form.
3, chaos digital image encryption method according to claim 1 is characterized in that: when picture element matrix was carried out initialization process, the method for employing was: the numerical value q that extracts the maximum in every row in the matrix earlier j, adopt following formula to handle for each element in the matrix:
m ij *=(q j-m ij)/∑ i=i n(q j-m ij)
Wherein, m IjIt is the element in the picture element matrix.M *=(m Ij *) be exactly the new matrix after the initialization.
4, chaos digital image encryption method according to claim 1 is characterized in that: the picture element matrix after utilizing the logistic conversion of chaos cipher in learning with initialization when generating key carries out encoding process, promptly utilizes following formula to handle:
(m j *) n+1=m * jn×μ×[(1-m j *) n] μ∈[0,4]
Wherein μ is called as the Logistic parameter.
5, chaos digital image encryption method according to claim 1 is characterized in that: when the image after the encryption was converted into digital picture, the imshow order of using in the MATLAB software realized.
CNA2008100128828A 2008-08-20 2008-08-20 Chaos digital image encryption method Pending CN101344960A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2008100128828A CN101344960A (en) 2008-08-20 2008-08-20 Chaos digital image encryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2008100128828A CN101344960A (en) 2008-08-20 2008-08-20 Chaos digital image encryption method

Publications (1)

Publication Number Publication Date
CN101344960A true CN101344960A (en) 2009-01-14

Family

ID=40246960

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2008100128828A Pending CN101344960A (en) 2008-08-20 2008-08-20 Chaos digital image encryption method

Country Status (1)

Country Link
CN (1) CN101344960A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101902576A (en) * 2010-08-02 2010-12-01 华南师范大学 Video-encryption camera and encryption method thereof
CN102184518A (en) * 2011-05-16 2011-09-14 重庆大学 DICOM (Digital Imaging and Communications in Medicine) medical image encrypting and decrypting method based on edge detection
CN101739695B (en) * 2009-11-26 2011-09-14 西北工业大学 Three-dimensional Arnold mapping-based image grouping encryption method
CN103281504A (en) * 2013-05-30 2013-09-04 东北大学 Chaotic image encryption method with double-direction diffusion mechanism
CN104954116A (en) * 2015-06-19 2015-09-30 杭州电子科技大学 Image password construction method based on neuron chaotic response coding
CN105117666A (en) * 2015-07-21 2015-12-02 深圳市同创国芯电子有限公司 Encryption and decryption methods and devices for internet protocol (IP) configuration parameter of integrated circuit
CN106156654A (en) * 2016-08-30 2016-11-23 成都百润百成科技股份有限公司 File encryption apparatus and method
CN106651976A (en) * 2016-12-01 2017-05-10 大连理工大学 Image encryption algorithm based on clustering and chaos

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101739695B (en) * 2009-11-26 2011-09-14 西北工业大学 Three-dimensional Arnold mapping-based image grouping encryption method
CN101902576A (en) * 2010-08-02 2010-12-01 华南师范大学 Video-encryption camera and encryption method thereof
CN101902576B (en) * 2010-08-02 2012-01-04 华南师范大学 Video-encryption camera and encryption method thereof
CN102184518A (en) * 2011-05-16 2011-09-14 重庆大学 DICOM (Digital Imaging and Communications in Medicine) medical image encrypting and decrypting method based on edge detection
CN102184518B (en) * 2011-05-16 2013-11-06 重庆大学 DICOM (Digital Imaging and Communications in Medicine) medical image encrypting and decrypting method based on edge detection
CN103281504A (en) * 2013-05-30 2013-09-04 东北大学 Chaotic image encryption method with double-direction diffusion mechanism
CN104954116A (en) * 2015-06-19 2015-09-30 杭州电子科技大学 Image password construction method based on neuron chaotic response coding
CN104954116B (en) * 2015-06-19 2018-05-04 杭州电子科技大学 A kind of image password building method based on neuron chaos motion coding
CN105117666A (en) * 2015-07-21 2015-12-02 深圳市同创国芯电子有限公司 Encryption and decryption methods and devices for internet protocol (IP) configuration parameter of integrated circuit
CN106156654A (en) * 2016-08-30 2016-11-23 成都百润百成科技股份有限公司 File encryption apparatus and method
CN106156654B (en) * 2016-08-30 2019-06-11 成都百润百成科技股份有限公司 File encryption apparatus and method
CN106651976A (en) * 2016-12-01 2017-05-10 大连理工大学 Image encryption algorithm based on clustering and chaos

Similar Documents

Publication Publication Date Title
WO2018153317A1 (en) Chaotic map-based digital chaotic encryption method
CN101344960A (en) Chaos digital image encryption method
Zhang et al. Cryptanalysis of S-box-only chaotic image ciphers against chosen plaintext attack
CN109660696B (en) New image encryption method
Wang et al. Security analysis on a color image encryption based on DNA encoding and chaos map
Kawle et al. Modified advanced encryption standard
CN101895390B (en) Method, device and system for encryption and decryption
CN105406969A (en) Apparatus And Method For Data Encryption
CN110535624B (en) Medical image privacy protection method applied to DICOM format
CN103440613A (en) Color-image encryption method for hyperchaotic Rossler system
Agrawal et al. Elliptic curve cryptography with hill cipher generation for secure text cryptosystem
Mishra et al. A New algorithm of encryption and decryption of images using chaotic mapping
CN103871017A (en) Novel image encryption method based on quantum hash function
CN110149200A (en) A kind of color image encrypting method based on dynamic DNA and 4D chaos
Majumder et al. Secure data communication and cryptography based on DNA based message encoding
US20180375641A1 (en) Technique to generate symmetric encryption algorithms
Gabr et al. A combination of decimal-and bit-level secure multimedia transmission
US20170041133A1 (en) Encryption method, program, and system
CN111314270B (en) Data encryption and decryption method based on validity period uniform distribution symmetric algorithm
Zhang et al. Image encryption algorithm based on chaotic sequence
CN107493164B (en) DES encryption method and system based on chaotic system
Kumar et al. File encryption and decryption using DNA technology
CN102622561A (en) Enciphering and deciphering method for invoking data in software
El Abbadi et al. Digital RGB image encryption based on 2D cat map and shadow numbers
CN111130755B (en) Matrix double encryption method based on signature

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20090114