CN102722856A - Digital image encryption method of DCT domain based on three dimensional Lorenz chaotic mapping - Google Patents

Digital image encryption method of DCT domain based on three dimensional Lorenz chaotic mapping Download PDF

Info

Publication number
CN102722856A
CN102722856A CN201210146858XA CN201210146858A CN102722856A CN 102722856 A CN102722856 A CN 102722856A CN 201210146858X A CN201210146858X A CN 201210146858XA CN 201210146858 A CN201210146858 A CN 201210146858A CN 102722856 A CN102722856 A CN 102722856A
Authority
CN
China
Prior art keywords
dimensional
dct
digital image
lorenz
encryption method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201210146858XA
Other languages
Chinese (zh)
Other versions
CN102722856B (en
Inventor
张军
鲍泓
刘元盛
吴晶晶
李月琴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Union University
Original Assignee
Beijing Union University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Union University filed Critical Beijing Union University
Priority to CN201210146858.XA priority Critical patent/CN102722856B/en
Publication of CN102722856A publication Critical patent/CN102722856A/en
Application granted granted Critical
Publication of CN102722856B publication Critical patent/CN102722856B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides a image encryption method of DCT domain based on three dimensional Lorenz chaotic mapping. The characteristics of the method lie in that, the method comprises the following steps: inputting original digital image information, carrying out DCT transformation on the original digital image information; carrying out three dimensional Lorenz scrambling transformation on the DCT coefficient array; carrying out one-time encryption on the DCT coefficient symbol after being subjected to scrambling transformation; and carrying out inverse DCT transformation on the result after being subjected to one-time encryption, wherein the result of the inverse DCT transformation is outputted encryption image information. The method in the invention possesses a good scrambling property and high encryption efficiency. The method can effectively overcome a disadvantage that low-dimension chaotic encryption algorithm and airspace scrambling are prone to attacks, and the method can effectively guarantee confidentiality and security of the encryption image. The method in the invention is not only suitable for encryption of single digital image, but also suitable for carrying out encryption on multiple images in a file package.

Description

Digital image encryption method based on the DCT territory of three-dimensional Lorenz chaotic maps
Technical field
The present invention relates to digital image processing field, more particularly, relate to digital image encryption method based on the DCT territory of three-dimensional Lorenz chaotic maps.
Background technology
Along with network and Development of Multimedia Technology, digital picture becomes one of important information carrier that people exchange.But; Not every digital image information can be by full disclosure; Some digital image information relates to the secret of country or group; And some digital image information may relate to individual privacy, and perhaps some digital image information is only supplied with the user who obtains authorizing and watched or download as a kind of consumer goods.Therefore, the safety of digital image information and secrecy technology have become more and more important.Because digital image information is different from other common data stream; Have that data volume is big, the degree of correlation of neighbor is high, with the characteristics such as format of two-dimensional array; And the traditional text encryption technology is not considered the characteristics of image information; Therefore, use traditional cipher mode can cause efficient low and effect is undesirable.Therefore, how to design that make new advances, safer digital image encryption algorithm, become the heat subject in this field.In recent years; Because the pseudo-randomness of chaos, track unpredictability and to initial value good characteristic such as susceptibility extremely; More and more researchers is applied to encryption system with chaos, has also obtained a lot of progress based on the research of the digital image encryption algorithm of chaos system.
Chaos is a kind of peculair motion form in the nonlinear kinetics system, and it extensively is present in occurring in nature.Chaos is meant in deterministic nonlinear systems, need not add the similar behavior at random that any enchancement factor also can occur.Chaos has good encryption performance, and Britain mathematician Matthews has at first clearly proposed to produce with chaos system the thought of stream cipher.Based on the encryption technology of Time Chaotic Dynamical Systems is a kind of stream cipher technology that cipher system requires that meets, and has solved in the one-time pad system bottleneck problem of the generation of personal attendant's machine sequence, transmission, storage arbitrarily preferably.In addition, chaos encrypting method can greatly be simplified the design process of conventional sequence password.Therefore, chaos system is very suitable for the encryption of various data and hides.Simultaneously, design good chaos system and be easy on microprocessor and computing machine, realize to have higher speed and lower cost.Thereby chaos encrypting method more is adapted to digital picture is carried out safeguard protection than a lot of traditional safety techniques.
Existing in recent years scholar proposes the digital Image Scrambling encryption method based on chaos system, and it has overcome the secret defective that can not all reside among the key in the traditional images encryption method preferably; Number of patent application is that 200810012882.8 patent application document has disclosed a kind of chaos digital image encryption method; Adopt and utilize MATLAB software to be converted into picture element matrix to the digital picture that will handle earlier; Utilize the secret scientific principle opinion of chaos that the picture element matrix after the initialization is carried out coding encrypting then and handle, the last method of utilizing the MATLAB order to be converted into digital picture the picture element matrix after the encryption is again accomplished ciphering process.
The main research based on the image encryption method of chaos sequence at present still concentrates on a peacekeeping 2 D chaotic system; And most encryption methods are in the spatial domain pixel to be carried out scramble; It has form simple, produce advantages such as the chaotic time series time is short, but its defective is that key space is too little, along with to the chaos encryption Study on Technology; Encipherment scheme for low dimension chaos system; There have been some attack methods can it be cracked,, can have expected to obtain higher confidentiality based on the chaotic secret system of higher-dimension because the chaotic signal of higher-dimension has better randomness.
Therefore be necessary to seek to develop that rule is more complicated, chaos encryption sequence more at random is as close spoon, and combines other processing, like associative transformation territory algorithm, i.e. DCT algorithm makes the security of the image after the encryption higher, is difficult for being cracked.
Summary of the invention
The purpose of this invention is to provide digital image encryption method based on the DCT territory of three-dimensional Lorenz chaotic maps; It is characterized in that; Said method comprises the steps: to import original digital image information, and the information of said original digital picture is carried out dct transform; Said DCT coefficient array is carried out the conversion of three-dimensional Lorenz scramble; DCT coefficient symbols after the said scramble conversion is carried out one-time pad encrypts; Result to after the said one-time pad encryption carries out inverse dct transform, and the result of said inverse dct transform is the encrypted image information of output.
Preferably, said information to said original digital picture is carried out dct transform and is comprised the steps:
(1) information with said original digital picture is kept at size in the three-dimensional array of
Figure 243077DEST_PATH_IMAGE001
;
(2) said three-dimensional array is carried out said dct transform, said three-dimensional array is become the two-dimensional matrix of size for
Figure 620969DEST_PATH_IMAGE002
;
(3) two-dimensional matrix of said size for
Figure 657933DEST_PATH_IMAGE002
carried out the layering two-dimensional dct transform, obtain two-dimensional array
Figure 121275DEST_PATH_IMAGE003
.
Preferably, the data type of the three-dimensional array of said size for
Figure 465669DEST_PATH_IMAGE001
is a double precision.
Preferably, saidly said DCT coefficient array is carried out the conversion of three-dimensional Lorenz scramble comprise the steps:
(1) user imports three parameters and three initial values of three-dimensional Lorenz chaotic maps, obtains Lorenz three-dimensional chaos sequence ;
(2) according to said three-dimensional chaos sequence
Figure 407397DEST_PATH_IMAGE004
, structure Lorenz scramble transformation matrix
Figure 295719DEST_PATH_IMAGE005
;
(3) convert said two-dimensional array
Figure 178224DEST_PATH_IMAGE006
into three-dimensional array
Figure 530708DEST_PATH_IMAGE007
; And said three-dimensional array
Figure 410939DEST_PATH_IMAGE007
carried out the conversion of three-dimensional Lorenz scramble, obtain
Figure 848874DEST_PATH_IMAGE008
thus.
Preferably; To said Lorenz scramble transformation matrix
Figure 974218DEST_PATH_IMAGE005
length
Figure 181209DEST_PATH_IMAGE009
intercepting
Figure 294658DEST_PATH_IMAGE010
on demand; Simultaneously; According to ascending order series arrangement
Figure 157572DEST_PATH_IMAGE011
;
Figure 381880DEST_PATH_IMAGE012
,
Figure 708956DEST_PATH_IMAGE013
.
Preferably, saidly DCT coefficient symbols after the said scramble conversion is carried out one-time pad encrypt and to comprise the steps:
(1) adopt m rank Chebyshev mapping to obtain chaos sequence F;
(2) utilize said chaos sequence F to scrambling encryption after the symbol of each row DCT coefficient in
Figure 665411DEST_PATH_IMAGE014
carry out one-time pad and encrypt.
Preferably, said employing m rank Chebyshev mapping obtains chaos sequence F, carries out iteration for initial value being brought into said m rank Chebyshev chaos system, gives up preceding segment data, then according to threshold method be converted into 1,1} chaos sequence F.
Preferably; Said one-time pad is encrypted; For chaos sequence F that said m rank Chebyshev mapping is produced to said Lorenz scrambling encryption after each row DCT coefficient in
Figure 77937DEST_PATH_IMAGE014
carry out symbol and encrypt promptly corresponding dot product:
Figure 43619DEST_PATH_IMAGE015
.
Preferably, the length L of said chaos sequence F value between 1500~6000.
Preferably, said digital image encryption method comprises that also the decrypting process to the encrypted image information of said output is the inverse process of aforementioned ciphering process.
Advantage of the present invention is: since three-dimensional Lorenz mapping have be prone to generate, key space is big, the cycle is long, safe, characteristics such as travelling speed is fast; The Lorenz chaotic maps is used for the encryption in digital picture DCT territory; Can overcome the pregnable shortcoming of low-dimensional chaos spatial domain scrambling algorithm effectively; And this encryption method efficient is high, security is good and be easy to realization, the confidentiality and the security that have improved encrypted image.
Description of drawings
In order to make the present invention be convenient to understand, combine accompanying drawing to describe specific embodiment of the present invention now.
Fig. 1 is the synoptic diagram according to the Lorenz three-dimensional chaos sequence of a preferred embodiment of the digital image encryption method in the DCT territory based on three-dimensional Lorenz chaotic maps of the present invention.
Fig. 2 (a) shows the original image that does not have encryption according to a width of cloth of the another preferred embodiment of the digital image encryption method in the DCT territory based on three-dimensional Lorenz chaotic maps of the present invention; Image effect after Fig. 2 (b) shows digital image encryption method that image among Fig. 2 (a) used said DCT territory based on three-dimensional Lorenz chaotic maps and encrypts.
Fig. 3 (a) shows the histogram of the original image of a preferred embodiment again according to the digital image encryption method in the DCT territory based on three-dimensional Lorenz chaotic maps of the present invention, and Fig. 3 (b) shows the histogram of the encrypted image that the said original image of Fig. 3 (a) is carried out obtaining behind the said digital image encryption method.
Fig. 4 shows the schematic flow sheet according to the digital image encryption method in the DCT territory based on three-dimensional Lorenz chaotic maps of the present invention.
Embodiment
Below in conjunction with accompanying drawing and embodiment the present invention is described in further detail.
U.S. meteorologist Lorenz is through the research to convection experiment, and first has obtained the dynamical system of performance strange attractor.When system capacity rises; Just outer rim gets into from the right side to make the tracks of fluid; Ecto-entad is wound near the center, and suddenly at random the left side outer rim that jumps to continues inwardly coiling then, this process be aperiodic, at random, its track never the oneself intersect.The Lorenz system is a typical three-dimensional chaos system, generates the advantage of encrypting chaos sequence with the Lorenz system and is: one, the low dimension chaos system of its structure is complicated, and the real number value sequence of generation is more unpredictable; Two, three of system initial values and three parameters can be as generating the seed key of encrypting chaos sequence, and the key space of generation is much higher than the low-dimensional chaos system; Three, the real-valued chaos sequence of system's output is handled, can be adopted the encryption chaos sequence of single argument or multivariate combination, the design of stream cipher is more flexible like this.
The invention provides digital image encryption method based on the DCT territory of three-dimensional Lorenz chaotic maps.Fig. 4 shows the schematic flow sheet of digital image encryption method of the present invention, and the step of said digital image encryption method is following:
Step 1: import original digital image information, said digital image information is carried out dct transform (discrete cosine transform).
At first; Read in the very color digital picture of RGB; The very color digital image information of the said RGB that reads in is kept at size in the three-dimensional array of
Figure 225202DEST_PATH_IMAGE001
, and the data type of said three-dimensional array is set to double precision; Then; Three-dimensional array to said image array is carried out dct transform; It is become the two-dimensional matrix of size for
Figure 680454DEST_PATH_IMAGE002
; Two-dimensional matrix line number after the said conversion is 3, and columns is ; At last; The two-dimensional matrix of said size for
Figure 317027DEST_PATH_IMAGE002
carried out the layering two-dimensional dct transform, obtain two-dimensional array
Figure 556378DEST_PATH_IMAGE003
after the conversion.
Step 2: said DCT coefficient array is carried out the conversion of three-dimensional Lorenz scramble.
At first, use the Lorenz chaotic maps to produce Lorenz scramble transformation matrix
Figure 182531DEST_PATH_IMAGE005
.The kinetics equation group of Lorenz chaos system is:
Figure 304071DEST_PATH_IMAGE017
wherein;
Figure 611556DEST_PATH_IMAGE018
is three parameters, all is positive number.For example; When in calculating,
Figure 767731DEST_PATH_IMAGE019
being set; When three initial values were
Figure 564785DEST_PATH_IMAGE020
, the Lorenz three-dimensional chaos sequence of generation was as shown in Figure 1.
As previously mentioned, three of the Lorenz system initial values and three parameters can be as generating the seed key
Figure 111304DEST_PATH_IMAGE021
of encrypting chaos sequence.Because chaos system is all extremely responsive to systematic parameter and initial value states, so key space is infinitely great on this theory of algorithm.
User's input parameter
Figure 19217DEST_PATH_IMAGE022
; Parameter according to user's input; Produce Lorenz three-dimensional chaos sequence
Figure 463187DEST_PATH_IMAGE004
, construct Lorenz scramble transformation matrix
Figure 431143DEST_PATH_IMAGE005
thus.Wherein, To length
Figure 527275DEST_PATH_IMAGE009
intercepting on demand of said Lorenz scramble transformation matrix; According to ascending order series arrangement
Figure 41750DEST_PATH_IMAGE011
;
Figure 180608DEST_PATH_IMAGE012
,
Figure 701719DEST_PATH_IMAGE013
.
Then; Convert the said two dimensional DCT coefficients array that obtains in the step 1
Figure 217014DEST_PATH_IMAGE006
into three-dimensional array
Figure 874391DEST_PATH_IMAGE007
; And said three-dimensional array
Figure 184150DEST_PATH_IMAGE007
carried out the conversion of three-dimensional Lorenz scramble, obtain
Figure 254874DEST_PATH_IMAGE008
thus.
Step 3: the DCT coefficient symbols after the said scramble conversion is carried out one-time pad encrypt.
At first, adopt m rank Chebyshev mapping to obtain chaos sequence F.The chaos basin of attraction of m rank Chebyshev mapping is (1; 1); Bring its initial value into said m rank Chebyshev chaos system and carry out iteration; Give up preceding segment data; Be converted into { 1 according to threshold method then; 1} chaos sequence F; Each row DCT coefficient of
Figure 744499DEST_PATH_IMAGE014
carries out the one-time pad encryption after using this chaos sequence F to scrambling encryption; Be about to chaos sequence F that said m rank Chebyshev mapping produces to said Lorenz scrambling encryption after each row DCT coefficient in
Figure 584279DEST_PATH_IMAGE014
carry out symbol and encrypt promptly corresponding dot product:
Figure 2622DEST_PATH_IMAGE015
.
Have only two kinds of elements among the said chaos sequence F :-1 and 1.This step has adopted an one dimension chaos algorithm; It is said Chebyshev chaos algorithm; Be used for that the element in the matrix
Figure 560642DEST_PATH_IMAGE014
that obtains after the conversion of Lorenz scramble is carried out symbol and encrypt, with further raising security.
With the length L of said sequence F as seed key
Figure 152161DEST_PATH_IMAGE023
.If the long meeting of choosing of said L causes speed slower, the too short meeting of said L causes randomness not strong.Preferably, said L value between 1500~6000 is proper.DCT coefficient symbols after utilizing said sequence F to scrambling encryption is carried out one-time pad and is encrypted: .
Step 4: the result to after the said one-time pad encryption carries out inverse dct transform, and the result of said inverse dct transform is the encrypted image information of output.Promptly inverse dct transform is carried out in layering to array
Figure 701271DEST_PATH_IMAGE024
, and the result of said inverse dct transform is the encrypted image information of output.
The core of the digital image encryption method in the DCT territory based on three-dimensional Lorenz chaotic maps of the present invention is that digital picture is carried out dct transform, the conversion of three-dimensional Lorenz scramble and DCT coefficient symbols encrypts.The decrypting process of the encrypted image information of said output is the inverse process of aforementioned ciphering process.
Digital image encryption method of the present invention is 30 bytes (byte); The i.e. encryption of 8 * 30=240 position (bit), key space reach .Since at first utilize dct transform with said digital image information from the spatial transform to the frequency domain; Carry out the conversion of three-dimensional Lorenz scramble again; Utilize the Chebyshev chaotic maps to carry out one-time pad to the DCT coefficient symbols behind the scramble at last and encrypt, so the key space of algorithm is difficult to estimate.Because serious scramble and sign modification have taken place the DCT coefficient, therefore, demonstrate basic complete black image after the bulk encryption.
Fig. 2 (a) shows the original image that a width of cloth does not have encryption, the image effect after Fig. 2 (b) shows digital image encryption method that image among Fig. 2 (a) used said DCT territory based on three-dimensional Lorenz chaotic maps and encrypts.
Fig. 3 (a) shows the histogram of original image, and Fig. 3 (b) shows the histogram of the encrypted image that the said original image of Fig. 3 (a) is carried out obtaining behind the said digital image encryption method.Can relatively draw, very big change has taken place in the histogram of encrypting the back image, does not have correlativity between its neighbor basically.
Show through above-mentioned analysis and emulation experiment; Method of the present invention has good scramble character and higher encryption efficiency; Low-dimensional chaos AES and the pregnable shortcoming of spatial domain scrambling algorithm can be overcome effectively, the confidentiality and the security of encrypted image can be ensured effectively.Method of the present invention is not only applicable to the single width digital image encryption, applicable to the multiple image in the literature kit is encrypted yet.
Above-mentioned detailed description has been illustrated the various embodiment of system and/or process through embodiment and/or synoptic diagram.With regard to these synoptic diagram and/or comprise with regard to one or more functions and/or the operation; It will be understood by those skilled in the art that among these synoptic diagram or the embodiment each function and/or operation all can by various hardware, software, firmware or in fact its combination in any come individually and/or jointly realize.
Should be appreciated that method described herein can combined with hardware or software, or combine both combinations to realize in due course.Therefore; Method of the present invention; Can adopt the form that is included in such as the program code in the tangible mediums such as floppy disk, CD-ROM, hard disk drive or any other machinable medium (that is, instruction), wherein; When program code under situation about carrying out on the programmable calculator, computing equipment generally includes processor, readable storage medium (comprising volatile memory and/or memory element), at least one input equipment and at least one output device of this processor.One or more programs can be for example, and through using API, reusable control waits realizes or utilize the process that combines the present invention to describe.Such program preferably realizes with high level procedural or Object-Oriented Programming Language, to communicate by letter with computer system.Yet if desired, this program can realize with assembly language or machine language.In any situation, language can be compiler language or interpretative code, and realizes combining with hardware.
Need to prove that the category of the technical scheme of the digital image encryption method in the DCT territory based on three-dimensional Lorenz chaotic maps of the present invention comprises the combination in any between the each part mentioned above.
Although illustrate and described the present invention with reference to its preferred embodiment particularly, those skilled in the art will appreciate that the various changes on the form of to make and the details and do not break away from the scope of the present invention described in the appended claims.More than combine specific embodiment of the present invention to describe in detail, but be not to be limitation of the present invention.Every foundation technical spirit of the present invention all still belongs to the scope of technical scheme of the present invention to any simple modification that above embodiment did.

Claims (10)

1. based on the digital image encryption method in the DCT territory of three-dimensional Lorenz chaotic maps, it is characterized in that said method comprises the steps:
Import original digital image information, the information of said original digital picture is carried out dct transform;
Said DCT coefficient array is carried out the conversion of three-dimensional Lorenz scramble;
DCT coefficient symbols after the said scramble conversion is carried out one-time pad encrypts;
Result to after the said one-time pad encryption carries out inverse dct transform, and the result of said inverse dct transform is the encrypted image information of output.
2. the digital image encryption method in the DCT territory based on three-dimensional Lorenz chaotic maps as claimed in claim 1 is characterized in that, said information to said original digital picture is carried out dct transform and comprised the steps:
The information of said original digital picture is kept at size in the three-dimensional array of
Figure 239987DEST_PATH_IMAGE001
;
Said three-dimensional array is carried out said dct transform, said three-dimensional array is become the two-dimensional matrix of size for
Figure 54359DEST_PATH_IMAGE002
;
The two-dimensional matrix of said size for
Figure 814505DEST_PATH_IMAGE002
carried out the layering two-dimensional dct transform, obtain two-dimensional array
Figure 81538DEST_PATH_IMAGE003
.
3. the digital image encryption method in the DCT territory based on three-dimensional Lorenz chaotic maps as claimed in claim 2; It is characterized in that the data type of the three-dimensional array of said size for
Figure 280438DEST_PATH_IMAGE001
is a double precision.
4. the digital image encryption method in the DCT territory based on three-dimensional Lorenz chaotic maps as claimed in claim 1 is characterized in that, saidly said DCT coefficient array is carried out the conversion of three-dimensional Lorenz scramble comprises the steps:
(1) user imports three parameters and three initial values of three-dimensional Lorenz chaotic maps, obtains Lorenz three-dimensional chaos sequence ;
(2) according to said three-dimensional chaos sequence
Figure 375969DEST_PATH_IMAGE004
, structure Lorenz scramble transformation matrix
Figure 67982DEST_PATH_IMAGE005
;
(3) convert said two-dimensional array
Figure 804993DEST_PATH_IMAGE006
into three-dimensional array
Figure 328379DEST_PATH_IMAGE007
; And said three-dimensional array carried out the conversion of three-dimensional Lorenz scramble, obtain
Figure 937532DEST_PATH_IMAGE008
thus.
5. the digital image encryption method in the DCT territory based on three-dimensional Lorenz chaotic maps as claimed in claim 4; It is characterized in that; To said Lorenz scramble transformation matrix
Figure 150338DEST_PATH_IMAGE005
length
Figure 793809DEST_PATH_IMAGE009
intercepting on demand; Simultaneously; According to ascending order series arrangement
Figure 294115DEST_PATH_IMAGE011
;
Figure 372930DEST_PATH_IMAGE012
,
Figure 808590DEST_PATH_IMAGE013
.
6. the digital image encryption method in the DCT territory based on three-dimensional Lorenz chaotic maps as claimed in claim 1 is characterized in that, saidly DCT coefficient symbols after the said scramble conversion is carried out one-time pad encrypts and comprises the steps:
Adopt m rank Chebyshev mapping to obtain chaos sequence F;
The symbol of each the row DCT coefficient after utilizing said chaos sequence F to scrambling encryption in
Figure 580237DEST_PATH_IMAGE014
carries out one-time pad and encrypts.
7. the digital image encryption method in the DCT territory based on three-dimensional Lorenz chaotic maps as claimed in claim 6; It is characterized in that; Said employing m rank Chebyshev mapping obtains chaos sequence F, carries out iteration for initial value being brought into said m rank Chebyshev chaos system, gives up preceding segment data; Then according to threshold method be converted into 1,1} chaos sequence F.
8. the digital image encryption method in the DCT territory based on three-dimensional Lorenz chaotic maps as claimed in claim 6; It is characterized in that; Said one-time pad is encrypted; For chaos sequence F that said m rank Chebyshev mapping is produced to said Lorenz scrambling encryption after each row DCT coefficient in
Figure 468559DEST_PATH_IMAGE014
carry out symbol and encrypt promptly corresponding dot product:
Figure 351064DEST_PATH_IMAGE015
.
9. the digital image encryption method in the DCT territory based on three-dimensional Lorenz chaotic maps as claimed in claim 6 is characterized in that the length L of said chaos sequence F value between 1500~6000.
10. the digital image encryption method in the DCT territory based on three-dimensional Lorenz chaotic maps as claimed in claim 1; It is characterized in that said digital image encryption method comprises that also the decrypting process to the encrypted image information of said output is the inverse process of aforementioned ciphering process.
CN201210146858.XA 2012-06-06 2012-06-06 Digital image encryption method of DCT domain based on three dimensional Lorenz chaotic mapping Expired - Fee Related CN102722856B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210146858.XA CN102722856B (en) 2012-06-06 2012-06-06 Digital image encryption method of DCT domain based on three dimensional Lorenz chaotic mapping

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210146858.XA CN102722856B (en) 2012-06-06 2012-06-06 Digital image encryption method of DCT domain based on three dimensional Lorenz chaotic mapping

Publications (2)

Publication Number Publication Date
CN102722856A true CN102722856A (en) 2012-10-10
CN102722856B CN102722856B (en) 2014-07-23

Family

ID=46948603

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210146858.XA Expired - Fee Related CN102722856B (en) 2012-06-06 2012-06-06 Digital image encryption method of DCT domain based on three dimensional Lorenz chaotic mapping

Country Status (1)

Country Link
CN (1) CN102722856B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105096234A (en) * 2015-07-30 2015-11-25 北京工业大学 Hyperspectral image encryption method based on hybrid domain
CN107222749A (en) * 2017-06-21 2017-09-29 同济大学 A kind of chaos code constructing method for wireless video transmission
CN107610034A (en) * 2017-09-06 2018-01-19 贵州航天计量测试技术研究所 Image encryption method based on chaos system and the reversible cellular automaton of two dimension
CN107886003A (en) * 2017-10-12 2018-04-06 东北大学 A kind of cryptography disorder method based on nonlinear system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101894385A (en) * 2010-06-29 2010-11-24 宇龙计算机通信科技(深圳)有限公司 Method and system for editing picture files, and mobile terminal
US20110142302A1 (en) * 2009-12-10 2011-06-16 Complex System, Inc. Chaotic Watermarking for a Digital Image

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110142302A1 (en) * 2009-12-10 2011-06-16 Complex System, Inc. Chaotic Watermarking for a Digital Image
CN101894385A (en) * 2010-06-29 2010-11-24 宇龙计算机通信科技(深圳)有限公司 Method and system for editing picture files, and mobile terminal

Non-Patent Citations (6)

* Cited by examiner, † Cited by third party
Title
《中国优秀硕士学位论文全文数据库》 20080925 宋国强 "数字图像加密技术研究" 第56-59页 1-10 , *
《北京科技大学学报》 20041231 王英等 "基于Lorenz混沌系统的数字图像加密算法" 第678-682页 1-10 第26卷, 第6期 *
《计算机工程与应用》 20051231 刘英等 "基于三维猫映射的图像加密算法" 第127-130、157页 1-10 , 第36期 *
刘英等: ""基于三维猫映射的图像加密算法"", 《计算机工程与应用》 *
宋国强: ""数字图像加密技术研究"", 《中国优秀硕士学位论文全文数据库》 *
王英等: ""基于Lorenz混沌系统的数字图像加密算法"", 《北京科技大学学报》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105096234A (en) * 2015-07-30 2015-11-25 北京工业大学 Hyperspectral image encryption method based on hybrid domain
CN105096234B (en) * 2015-07-30 2019-02-01 北京工业大学 A kind of high spectrum image encryption method based on hybrid domain
CN107222749A (en) * 2017-06-21 2017-09-29 同济大学 A kind of chaos code constructing method for wireless video transmission
CN107222749B (en) * 2017-06-21 2019-10-18 同济大学 A kind of chaos code constructing method for wireless video transmission
CN107610034A (en) * 2017-09-06 2018-01-19 贵州航天计量测试技术研究所 Image encryption method based on chaos system and the reversible cellular automaton of two dimension
CN107886003A (en) * 2017-10-12 2018-04-06 东北大学 A kind of cryptography disorder method based on nonlinear system
CN107886003B (en) * 2017-10-12 2019-08-09 东北大学 A kind of cryptography disorder method based on nonlinear system

Also Published As

Publication number Publication date
CN102722856B (en) 2014-07-23

Similar Documents

Publication Publication Date Title
Shahna et al. A novel image encryption scheme using both pixel level and bit level permutation with chaotic map
Zhang et al. Multiple-image encryption algorithm based on mixed image element and chaos
Liu et al. Image block encryption algorithm based on chaotic maps
Xu et al. A novel chaotic image encryption algorithm using block scrambling and dynamic index based diffusion
Mohammad et al. A survey and analysis of the image encryption methods
Zhang et al. An image encryption scheme based on the MLNCML system using DNA sequences
Tang et al. Multiple-image encryption with bit-plane decomposition and chaotic maps
Liu et al. Color image encryption based on one-time keys and robust chaotic maps
Wang et al. A novel chaotic block image encryption algorithm based on dynamic random growth technique
Song et al. An image encryption scheme based on new spatiotemporal chaos
Kadir et al. Color image encryption using skew tent map and hyper chaotic system of 6th-order CNN
Wang et al. A novel image encryption scheme based on Brownian motion and PWLCM chaotic system
CN103955884B (en) Dual image encryption method based on chaos and discrete fraction stochastic transformation
Zhang The image encryption algorithm with plaintext-related shuffling
Li et al. A novel plaintext-related chaotic image encryption scheme with no additional plaintext information
Xu et al. A novel image encryption algorithm based on self-orthogonal Latin squares
Wang et al. Color image encryption algorithm based on Double layer Josephus scramble and laser chaotic system
Deb et al. Chaos-based medical image encryption scheme using special nonlinear filtering function based LFSR
Li et al. Double chaotic image encryption algorithm based on optimal sequence solution and fractional transform
Hu et al. An improved piecewise linear chaotic map based image encryption algorithm
CN103903215A (en) Multi-image encryption method based on chaos and FrFT domain phase retrieval process
Mir et al. Color image encryption using RSA cryptosystem with a chaotic map in Hartley domain
Attaullah et al. Cryptosystem techniques based on the improved Chebyshev map: an application in image encryption
CN102722856B (en) Digital image encryption method of DCT domain based on three dimensional Lorenz chaotic mapping
CN103716502A (en) Encryption method based on iteration FrFT and chaotic single-channel color images

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20140723

Termination date: 20200606