CN101344960A - Chaos digital image encryption method - Google Patents
Chaos digital image encryption method Download PDFInfo
- Publication number
- CN101344960A CN101344960A CNA2008100128828A CN200810012882A CN101344960A CN 101344960 A CN101344960 A CN 101344960A CN A2008100128828 A CNA2008100128828 A CN A2008100128828A CN 200810012882 A CN200810012882 A CN 200810012882A CN 101344960 A CN101344960 A CN 101344960A
- Authority
- CN
- China
- Prior art keywords
- matrix
- encryption method
- picture
- chaos
- picture element
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
The invention relates to an encryption method of chaotic digital images, which adopts a method that firstly utilizes MATLAB software to transform digital images to be processed into pixel matrixes, then utilizes a chaotic cryptography theory to encode and encrypt the initialized pixel matrixes, and finally utilizes MATLAB commands to transform the encrypted pixel matrixes into digital images, thus completing the encryption process. Compared with the existing encryption method, the encryption method, in terms of the generation of encryption keys, can randomly generate nonlinear encryption key space, thus causing the images after encryption to be safer and hard to be decrypted, furthermore, the encryption effect is uniform and the method is simple.
Description
One, technical field:
The present invention relates to the secret and safe method, particularly digital image encryption method of digital information transmission.
Two, background technology:
Encryption method is the method for information being carried out Code And Decode, and encryption method commonly used at present mainly contains symmetric cryptography, asymmetric cryptosystem and irreversible encryption method.These three kinds of methods all adopt utilizes a cover that matches each other of generation in advance or the method for a few cover PKI and private key to carry out encryption and decryption.When generating key, above-mentioned three kinds of methods mainly adopt linear order to realize.And for the encryption of digital picture, above-mentioned encryption method defectiveness all in encryption homogeneity, cipher round results and the security of image.
Three, summary of the invention:
In order to overcome the not high shortcoming of existing encryption method security, the invention provides a kind of digital image encryption method, this method can generate nonlinear key space at random on aspect the generation key, encrypt even and safer, reliable than present encryption method.
The technical scheme that the present invention is adopted for achieving the above object is: chaos digital image encryption method, earlier input picture is carried out pre-service, extract picture element matrix, and the picture element matrix that obtains carried out initialization process, utilize chaos cipher scientific principle opinion to carry out the encoding process of key to the matrix after handling then.
Described when the image to input carries out pre-service, the method for employing is the imread order that utilizes in the MATLAB software, is about to input picture and is converted into numerical value picture element matrix form.
Described when picture element matrix is carried out initialization process, the method for employing is: the numerical value q that extracts the maximum in every row in the matrix earlier
j, adopt following formula to handle for each element in the matrix:
m
ij *=(q
j-m
ij)/∑
i=1 n(q
j-m
ij)
Wherein, m
IjIt is the element in the picture element matrix.M
*=(m
Ij *) be exactly the new matrix after the initialization.
Described picture element matrix after utilizing the logistic conversion of chaos cipher in learning with initialization when generating key carries out encoding process, promptly utilizes following formula to handle:
(m
j *)
n+1=(m
* j)
n×μ×[(1-m
j *)
n] μ∈[0,4]
Wherein μ is called as the Logistic parameter.
Characteristics of the present invention: utilize chaos sequence can generate the characteristics of non-linear sequence, generate the key of digital picture, it is good that this encryption method has a cipher round results, is difficult for being cracked safe and reliable characteristics.
Four, embodiment:
Below in conjunction with embodiment the present invention is described in further detail, but is not limited to specific embodiment.
According to following steps a certain digital picture is carried out encryption:
1. for a certain digital picture to be encrypted, at first this digital picture is deposited in the buffer memory of MATLAB software with a certain glue file title, call imread order operation then, digital picture is converted into the picture element matrix form.
2. for making digital picture when encrypting, can upset original image more uniformly, need do initialization process to the resulting picture element matrix of step 1, concrete grammar is as follows: the numerical value q that extracts the maximum in every row in the matrix earlier
j, adopt following formula to handle for each element in the matrix:
m
ij *=(q
j-m
ij)/∑
i=1 n(q
j-m
ij)
Wherein, m
IjIt is the element in the picture element matrix.M
*=(m
Ij *) be exactly the new matrix after the initialization.It is poor that the element that is about to maximum in every column element and these row in the picture element matrix is done, and calculates their ratios separately, makes the summation of element of the every row in the picture element matrix remain 1.
3. utilize the logistic mapping that each row vector is done encryption to initialized picture element matrix.The concrete model of the logistic mapping of using is:
(m
j *)
n+1=(m
* j)
n×μ×[(1-m
j *)
n] μ∈[0,4]
Wherein μ is called as the Logistic parameter.
4. the picture element matrix after the encryption that will obtain with step is kept in the buffer memory of MATLAB software, as with its called after name1.dat, calls imshow (name1) order, and the picture element matrix after encrypting is converted into encrypted image.
Claims (5)
1, chaos digital image encryption method, it is characterized in that: earlier input picture is carried out pre-service, extract picture element matrix, and the picture element matrix that obtains carried out initialization process, utilize chaos cipher scientific principle opinion to carry out the encoding process of key to the matrix after handling then, utilize the picture element matrix after the MATLAB order will be encrypted to convert digital picture at last again.
2, chaos digital image encryption method according to claim 1 is characterized in that: when the image to input carried out pre-service, the method for employing was the imread order that utilizes in the MATLAB software, is about to input picture and is converted into numerical value picture element matrix form.
3, chaos digital image encryption method according to claim 1 is characterized in that: when picture element matrix was carried out initialization process, the method for employing was: the numerical value q that extracts the maximum in every row in the matrix earlier
j, adopt following formula to handle for each element in the matrix:
m
ij *=(q
j-m
ij)/∑
i=i n(q
j-m
ij)
Wherein, m
IjIt is the element in the picture element matrix.M
*=(m
Ij *) be exactly the new matrix after the initialization.
4, chaos digital image encryption method according to claim 1 is characterized in that: the picture element matrix after utilizing the logistic conversion of chaos cipher in learning with initialization when generating key carries out encoding process, promptly utilizes following formula to handle:
(m
j *)
n+1=m
* jn×μ×[(1-m
j *)
n] μ∈[0,4]
Wherein μ is called as the Logistic parameter.
5, chaos digital image encryption method according to claim 1 is characterized in that: when the image after the encryption was converted into digital picture, the imshow order of using in the MATLAB software realized.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2008100128828A CN101344960A (en) | 2008-08-20 | 2008-08-20 | Chaos digital image encryption method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2008100128828A CN101344960A (en) | 2008-08-20 | 2008-08-20 | Chaos digital image encryption method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101344960A true CN101344960A (en) | 2009-01-14 |
Family
ID=40246960
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA2008100128828A Pending CN101344960A (en) | 2008-08-20 | 2008-08-20 | Chaos digital image encryption method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101344960A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101902576A (en) * | 2010-08-02 | 2010-12-01 | 华南师范大学 | Video-encryption camera and encryption method thereof |
CN102184518A (en) * | 2011-05-16 | 2011-09-14 | 重庆大学 | DICOM (Digital Imaging and Communications in Medicine) medical image encrypting and decrypting method based on edge detection |
CN101739695B (en) * | 2009-11-26 | 2011-09-14 | 西北工业大学 | Three-dimensional Arnold mapping-based image grouping encryption method |
CN103281504A (en) * | 2013-05-30 | 2013-09-04 | 东北大学 | Chaotic image encryption method with double-direction diffusion mechanism |
CN104954116A (en) * | 2015-06-19 | 2015-09-30 | 杭州电子科技大学 | Image password construction method based on neuron chaotic response coding |
CN105117666A (en) * | 2015-07-21 | 2015-12-02 | 深圳市同创国芯电子有限公司 | Encryption and decryption methods and devices for internet protocol (IP) configuration parameter of integrated circuit |
CN106156654A (en) * | 2016-08-30 | 2016-11-23 | 成都百润百成科技股份有限公司 | File encryption apparatus and method |
CN106651976A (en) * | 2016-12-01 | 2017-05-10 | 大连理工大学 | Image encryption algorithm based on clustering and chaos |
-
2008
- 2008-08-20 CN CNA2008100128828A patent/CN101344960A/en active Pending
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101739695B (en) * | 2009-11-26 | 2011-09-14 | 西北工业大学 | Three-dimensional Arnold mapping-based image grouping encryption method |
CN101902576A (en) * | 2010-08-02 | 2010-12-01 | 华南师范大学 | Video-encryption camera and encryption method thereof |
CN101902576B (en) * | 2010-08-02 | 2012-01-04 | 华南师范大学 | Video-encryption camera and encryption method thereof |
CN102184518A (en) * | 2011-05-16 | 2011-09-14 | 重庆大学 | DICOM (Digital Imaging and Communications in Medicine) medical image encrypting and decrypting method based on edge detection |
CN102184518B (en) * | 2011-05-16 | 2013-11-06 | 重庆大学 | DICOM (Digital Imaging and Communications in Medicine) medical image encrypting and decrypting method based on edge detection |
CN103281504A (en) * | 2013-05-30 | 2013-09-04 | 东北大学 | Chaotic image encryption method with double-direction diffusion mechanism |
CN104954116A (en) * | 2015-06-19 | 2015-09-30 | 杭州电子科技大学 | Image password construction method based on neuron chaotic response coding |
CN104954116B (en) * | 2015-06-19 | 2018-05-04 | 杭州电子科技大学 | A kind of image password building method based on neuron chaos motion coding |
CN105117666A (en) * | 2015-07-21 | 2015-12-02 | 深圳市同创国芯电子有限公司 | Encryption and decryption methods and devices for internet protocol (IP) configuration parameter of integrated circuit |
CN106156654A (en) * | 2016-08-30 | 2016-11-23 | 成都百润百成科技股份有限公司 | File encryption apparatus and method |
CN106156654B (en) * | 2016-08-30 | 2019-06-11 | 成都百润百成科技股份有限公司 | File encryption apparatus and method |
CN106651976A (en) * | 2016-12-01 | 2017-05-10 | 大连理工大学 | Image encryption algorithm based on clustering and chaos |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2018153317A1 (en) | Chaotic map-based digital chaotic encryption method | |
CN101344960A (en) | Chaos digital image encryption method | |
Zhang et al. | Cryptanalysis of S-box-only chaotic image ciphers against chosen plaintext attack | |
CN109660696B (en) | New image encryption method | |
Wang et al. | Security analysis on a color image encryption based on DNA encoding and chaos map | |
Kawle et al. | Modified advanced encryption standard | |
CN101895390B (en) | Method, device and system for encryption and decryption | |
CN105406969A (en) | Apparatus And Method For Data Encryption | |
CN110535624B (en) | Medical image privacy protection method applied to DICOM format | |
CN103440613A (en) | Color-image encryption method for hyperchaotic Rossler system | |
Agrawal et al. | Elliptic curve cryptography with hill cipher generation for secure text cryptosystem | |
Mishra et al. | A New algorithm of encryption and decryption of images using chaotic mapping | |
CN103871017A (en) | Novel image encryption method based on quantum hash function | |
CN110149200A (en) | A kind of color image encrypting method based on dynamic DNA and 4D chaos | |
Majumder et al. | Secure data communication and cryptography based on DNA based message encoding | |
US20180375641A1 (en) | Technique to generate symmetric encryption algorithms | |
Gabr et al. | A combination of decimal-and bit-level secure multimedia transmission | |
US20170041133A1 (en) | Encryption method, program, and system | |
CN111314270B (en) | Data encryption and decryption method based on validity period uniform distribution symmetric algorithm | |
Zhang et al. | Image encryption algorithm based on chaotic sequence | |
CN107493164B (en) | DES encryption method and system based on chaotic system | |
Kumar et al. | File encryption and decryption using DNA technology | |
CN102622561A (en) | Enciphering and deciphering method for invoking data in software | |
El Abbadi et al. | Digital RGB image encryption based on 2D cat map and shadow numbers | |
CN111130755B (en) | Matrix double encryption method based on signature |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Open date: 20090114 |