CN102722856A - Digital image encryption method of DCT domain based on three dimensional Lorenz chaotic mapping - Google Patents
Digital image encryption method of DCT domain based on three dimensional Lorenz chaotic mapping Download PDFInfo
- Publication number
- CN102722856A CN102722856A CN201210146858XA CN201210146858A CN102722856A CN 102722856 A CN102722856 A CN 102722856A CN 201210146858X A CN201210146858X A CN 201210146858XA CN 201210146858 A CN201210146858 A CN 201210146858A CN 102722856 A CN102722856 A CN 102722856A
- Authority
- CN
- China
- Prior art keywords
- dimensional
- dct
- digital image
- lorenz
- encryption method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention provides a image encryption method of DCT domain based on three dimensional Lorenz chaotic mapping. The characteristics of the method lie in that, the method comprises the following steps: inputting original digital image information, carrying out DCT transformation on the original digital image information; carrying out three dimensional Lorenz scrambling transformation on the DCT coefficient array; carrying out one-time encryption on the DCT coefficient symbol after being subjected to scrambling transformation; and carrying out inverse DCT transformation on the result after being subjected to one-time encryption, wherein the result of the inverse DCT transformation is outputted encryption image information. The method in the invention possesses a good scrambling property and high encryption efficiency. The method can effectively overcome a disadvantage that low-dimension chaotic encryption algorithm and airspace scrambling are prone to attacks, and the method can effectively guarantee confidentiality and security of the encryption image. The method in the invention is not only suitable for encryption of single digital image, but also suitable for carrying out encryption on multiple images in a file package.
Description
Technical field
The present invention relates to digital image processing field, more particularly, relate to digital image encryption method based on the DCT territory of three-dimensional Lorenz chaotic maps.
Background technology
Along with network and Development of Multimedia Technology, digital picture becomes one of important information carrier that people exchange.But; Not every digital image information can be by full disclosure; Some digital image information relates to the secret of country or group; And some digital image information may relate to individual privacy, and perhaps some digital image information is only supplied with the user who obtains authorizing and watched or download as a kind of consumer goods.Therefore, the safety of digital image information and secrecy technology have become more and more important.Because digital image information is different from other common data stream; Have that data volume is big, the degree of correlation of neighbor is high, with the characteristics such as format of two-dimensional array; And the traditional text encryption technology is not considered the characteristics of image information; Therefore, use traditional cipher mode can cause efficient low and effect is undesirable.Therefore, how to design that make new advances, safer digital image encryption algorithm, become the heat subject in this field.In recent years; Because the pseudo-randomness of chaos, track unpredictability and to initial value good characteristic such as susceptibility extremely; More and more researchers is applied to encryption system with chaos, has also obtained a lot of progress based on the research of the digital image encryption algorithm of chaos system.
Chaos is a kind of peculair motion form in the nonlinear kinetics system, and it extensively is present in occurring in nature.Chaos is meant in deterministic nonlinear systems, need not add the similar behavior at random that any enchancement factor also can occur.Chaos has good encryption performance, and Britain mathematician Matthews has at first clearly proposed to produce with chaos system the thought of stream cipher.Based on the encryption technology of Time Chaotic Dynamical Systems is a kind of stream cipher technology that cipher system requires that meets, and has solved in the one-time pad system bottleneck problem of the generation of personal attendant's machine sequence, transmission, storage arbitrarily preferably.In addition, chaos encrypting method can greatly be simplified the design process of conventional sequence password.Therefore, chaos system is very suitable for the encryption of various data and hides.Simultaneously, design good chaos system and be easy on microprocessor and computing machine, realize to have higher speed and lower cost.Thereby chaos encrypting method more is adapted to digital picture is carried out safeguard protection than a lot of traditional safety techniques.
Existing in recent years scholar proposes the digital Image Scrambling encryption method based on chaos system, and it has overcome the secret defective that can not all reside among the key in the traditional images encryption method preferably; Number of patent application is that 200810012882.8 patent application document has disclosed a kind of chaos digital image encryption method; Adopt and utilize MATLAB software to be converted into picture element matrix to the digital picture that will handle earlier; Utilize the secret scientific principle opinion of chaos that the picture element matrix after the initialization is carried out coding encrypting then and handle, the last method of utilizing the MATLAB order to be converted into digital picture the picture element matrix after the encryption is again accomplished ciphering process.
The main research based on the image encryption method of chaos sequence at present still concentrates on a peacekeeping 2 D chaotic system; And most encryption methods are in the spatial domain pixel to be carried out scramble; It has form simple, produce advantages such as the chaotic time series time is short, but its defective is that key space is too little, along with to the chaos encryption Study on Technology; Encipherment scheme for low dimension chaos system; There have been some attack methods can it be cracked,, can have expected to obtain higher confidentiality based on the chaotic secret system of higher-dimension because the chaotic signal of higher-dimension has better randomness.
Therefore be necessary to seek to develop that rule is more complicated, chaos encryption sequence more at random is as close spoon, and combines other processing, like associative transformation territory algorithm, i.e. DCT algorithm makes the security of the image after the encryption higher, is difficult for being cracked.
Summary of the invention
The purpose of this invention is to provide digital image encryption method based on the DCT territory of three-dimensional Lorenz chaotic maps; It is characterized in that; Said method comprises the steps: to import original digital image information, and the information of said original digital picture is carried out dct transform; Said DCT coefficient array is carried out the conversion of three-dimensional Lorenz scramble; DCT coefficient symbols after the said scramble conversion is carried out one-time pad encrypts; Result to after the said one-time pad encryption carries out inverse dct transform, and the result of said inverse dct transform is the encrypted image information of output.
Preferably, said information to said original digital picture is carried out dct transform and is comprised the steps:
(1) information with said original digital picture is kept at size in the three-dimensional array of
;
(2) said three-dimensional array is carried out said dct transform, said three-dimensional array is become the two-dimensional matrix of size for
;
(3) two-dimensional matrix of said size for
carried out the layering two-dimensional dct transform, obtain two-dimensional array
.
Preferably, saidly said DCT coefficient array is carried out the conversion of three-dimensional Lorenz scramble comprise the steps:
(1) user imports three parameters and three initial values of three-dimensional Lorenz chaotic maps, obtains Lorenz three-dimensional chaos sequence
;
(2) according to said three-dimensional chaos sequence
, structure Lorenz scramble transformation matrix
;
(3) convert said two-dimensional array
into three-dimensional array
; And said three-dimensional array
carried out the conversion of three-dimensional Lorenz scramble, obtain
thus.
Preferably; To said Lorenz scramble transformation matrix
length
intercepting
on demand; Simultaneously; According to ascending order series arrangement
;
,
.
Preferably, saidly DCT coefficient symbols after the said scramble conversion is carried out one-time pad encrypt and to comprise the steps:
(1) adopt m rank Chebyshev mapping to obtain chaos sequence F;
(2) utilize said chaos sequence F to scrambling encryption after the symbol of each row DCT coefficient in
carry out one-time pad and encrypt.
Preferably, said employing m rank Chebyshev mapping obtains chaos sequence F, carries out iteration for initial value being brought into said m rank Chebyshev chaos system, gives up preceding segment data, then according to threshold method be converted into 1,1} chaos sequence F.
Preferably; Said one-time pad is encrypted; For chaos sequence F that said m rank Chebyshev mapping is produced to said Lorenz scrambling encryption after each row DCT coefficient in
carry out symbol and encrypt promptly corresponding dot product:
.
Preferably, the length L of said chaos sequence F value between 1500~6000.
Preferably, said digital image encryption method comprises that also the decrypting process to the encrypted image information of said output is the inverse process of aforementioned ciphering process.
Advantage of the present invention is: since three-dimensional Lorenz mapping have be prone to generate, key space is big, the cycle is long, safe, characteristics such as travelling speed is fast; The Lorenz chaotic maps is used for the encryption in digital picture DCT territory; Can overcome the pregnable shortcoming of low-dimensional chaos spatial domain scrambling algorithm effectively; And this encryption method efficient is high, security is good and be easy to realization, the confidentiality and the security that have improved encrypted image.
Description of drawings
In order to make the present invention be convenient to understand, combine accompanying drawing to describe specific embodiment of the present invention now.
Fig. 1 is the synoptic diagram according to the Lorenz three-dimensional chaos sequence of a preferred embodiment of the digital image encryption method in the DCT territory based on three-dimensional Lorenz chaotic maps of the present invention.
Fig. 2 (a) shows the original image that does not have encryption according to a width of cloth of the another preferred embodiment of the digital image encryption method in the DCT territory based on three-dimensional Lorenz chaotic maps of the present invention; Image effect after Fig. 2 (b) shows digital image encryption method that image among Fig. 2 (a) used said DCT territory based on three-dimensional Lorenz chaotic maps and encrypts.
Fig. 3 (a) shows the histogram of the original image of a preferred embodiment again according to the digital image encryption method in the DCT territory based on three-dimensional Lorenz chaotic maps of the present invention, and Fig. 3 (b) shows the histogram of the encrypted image that the said original image of Fig. 3 (a) is carried out obtaining behind the said digital image encryption method.
Fig. 4 shows the schematic flow sheet according to the digital image encryption method in the DCT territory based on three-dimensional Lorenz chaotic maps of the present invention.
Embodiment
Below in conjunction with accompanying drawing and embodiment the present invention is described in further detail.
U.S. meteorologist Lorenz is through the research to convection experiment, and first has obtained the dynamical system of performance strange attractor.When system capacity rises; Just outer rim gets into from the right side to make the tracks of fluid; Ecto-entad is wound near the center, and suddenly at random the left side outer rim that jumps to continues inwardly coiling then, this process be aperiodic, at random, its track never the oneself intersect.The Lorenz system is a typical three-dimensional chaos system, generates the advantage of encrypting chaos sequence with the Lorenz system and is: one, the low dimension chaos system of its structure is complicated, and the real number value sequence of generation is more unpredictable; Two, three of system initial values and three parameters can be as generating the seed key of encrypting chaos sequence, and the key space of generation is much higher than the low-dimensional chaos system; Three, the real-valued chaos sequence of system's output is handled, can be adopted the encryption chaos sequence of single argument or multivariate combination, the design of stream cipher is more flexible like this.
The invention provides digital image encryption method based on the DCT territory of three-dimensional Lorenz chaotic maps.Fig. 4 shows the schematic flow sheet of digital image encryption method of the present invention, and the step of said digital image encryption method is following:
Step 1: import original digital image information, said digital image information is carried out dct transform (discrete cosine transform).
At first; Read in the very color digital picture of RGB; The very color digital image information of the said RGB that reads in is kept at size in the three-dimensional array of
, and the data type of said three-dimensional array is set to double precision; Then; Three-dimensional array to said image array is carried out dct transform; It is become the two-dimensional matrix of size for
; Two-dimensional matrix line number after the said conversion is 3, and columns is
; At last; The two-dimensional matrix of said size for
carried out the layering two-dimensional dct transform, obtain two-dimensional array
after the conversion.
Step 2: said DCT coefficient array is carried out the conversion of three-dimensional Lorenz scramble.
At first, use the Lorenz chaotic maps to produce Lorenz scramble transformation matrix
.The kinetics equation group of Lorenz chaos system is:
wherein;
is three parameters, all is positive number.For example; When in calculating,
being set; When three initial values were
, the Lorenz three-dimensional chaos sequence of generation was as shown in Figure 1.
As previously mentioned, three of the Lorenz system initial values and three parameters can be as generating the seed key
of encrypting chaos sequence.Because chaos system is all extremely responsive to systematic parameter and initial value states, so key space is infinitely great on this theory of algorithm.
User's input parameter
; Parameter according to user's input; Produce Lorenz three-dimensional chaos sequence
, construct Lorenz scramble transformation matrix
thus.Wherein, To length
intercepting
on demand of said Lorenz scramble transformation matrix; According to ascending order series arrangement
;
,
.
Then; Convert the said two dimensional DCT coefficients array that obtains in the step 1
into three-dimensional array
; And said three-dimensional array
carried out the conversion of three-dimensional Lorenz scramble, obtain
thus.
Step 3: the DCT coefficient symbols after the said scramble conversion is carried out one-time pad encrypt.
At first, adopt m rank Chebyshev mapping to obtain chaos sequence F.The chaos basin of attraction of m rank Chebyshev mapping is (1; 1); Bring its initial value into said m rank Chebyshev chaos system and carry out iteration; Give up preceding segment data; Be converted into { 1 according to threshold method then; 1} chaos sequence F; Each row DCT coefficient of
carries out the one-time pad encryption after using this chaos sequence F to scrambling encryption; Be about to chaos sequence F that said m rank Chebyshev mapping produces to said Lorenz scrambling encryption after each row DCT coefficient in
carry out symbol and encrypt promptly corresponding dot product:
.
Have only two kinds of elements among the said chaos sequence F :-1 and 1.This step has adopted an one dimension chaos algorithm; It is said Chebyshev chaos algorithm; Be used for that the element in the matrix
that obtains after the conversion of Lorenz scramble is carried out symbol and encrypt, with further raising security.
With the length L of said sequence F as seed key
.If the long meeting of choosing of said L causes speed slower, the too short meeting of said L causes randomness not strong.Preferably, said L value between 1500~6000 is proper.DCT coefficient symbols after utilizing said sequence F to scrambling encryption is carried out one-time pad and is encrypted:
.
Step 4: the result to after the said one-time pad encryption carries out inverse dct transform, and the result of said inverse dct transform is the encrypted image information of output.Promptly inverse dct transform is carried out in layering to array
, and the result of said inverse dct transform is the encrypted image information of output.
The core of the digital image encryption method in the DCT territory based on three-dimensional Lorenz chaotic maps of the present invention is that digital picture is carried out dct transform, the conversion of three-dimensional Lorenz scramble and DCT coefficient symbols encrypts.The decrypting process of the encrypted image information of said output is the inverse process of aforementioned ciphering process.
Digital image encryption method of the present invention is 30 bytes (byte); The i.e. encryption of 8 * 30=240 position (bit), key space reach
.Since at first utilize dct transform with said digital image information from the spatial transform to the frequency domain; Carry out the conversion of three-dimensional Lorenz scramble again; Utilize the Chebyshev chaotic maps to carry out one-time pad to the DCT coefficient symbols behind the scramble at last and encrypt, so the key space of algorithm is difficult to estimate.Because serious scramble and sign modification have taken place the DCT coefficient, therefore, demonstrate basic complete black image after the bulk encryption.
Fig. 2 (a) shows the original image that a width of cloth does not have encryption, the image effect after Fig. 2 (b) shows digital image encryption method that image among Fig. 2 (a) used said DCT territory based on three-dimensional Lorenz chaotic maps and encrypts.
Fig. 3 (a) shows the histogram of original image, and Fig. 3 (b) shows the histogram of the encrypted image that the said original image of Fig. 3 (a) is carried out obtaining behind the said digital image encryption method.Can relatively draw, very big change has taken place in the histogram of encrypting the back image, does not have correlativity between its neighbor basically.
Show through above-mentioned analysis and emulation experiment; Method of the present invention has good scramble character and higher encryption efficiency; Low-dimensional chaos AES and the pregnable shortcoming of spatial domain scrambling algorithm can be overcome effectively, the confidentiality and the security of encrypted image can be ensured effectively.Method of the present invention is not only applicable to the single width digital image encryption, applicable to the multiple image in the literature kit is encrypted yet.
Above-mentioned detailed description has been illustrated the various embodiment of system and/or process through embodiment and/or synoptic diagram.With regard to these synoptic diagram and/or comprise with regard to one or more functions and/or the operation; It will be understood by those skilled in the art that among these synoptic diagram or the embodiment each function and/or operation all can by various hardware, software, firmware or in fact its combination in any come individually and/or jointly realize.
Should be appreciated that method described herein can combined with hardware or software, or combine both combinations to realize in due course.Therefore; Method of the present invention; Can adopt the form that is included in such as the program code in the tangible mediums such as floppy disk, CD-ROM, hard disk drive or any other machinable medium (that is, instruction), wherein; When program code under situation about carrying out on the programmable calculator, computing equipment generally includes processor, readable storage medium (comprising volatile memory and/or memory element), at least one input equipment and at least one output device of this processor.One or more programs can be for example, and through using API, reusable control waits realizes or utilize the process that combines the present invention to describe.Such program preferably realizes with high level procedural or Object-Oriented Programming Language, to communicate by letter with computer system.Yet if desired, this program can realize with assembly language or machine language.In any situation, language can be compiler language or interpretative code, and realizes combining with hardware.
Need to prove that the category of the technical scheme of the digital image encryption method in the DCT territory based on three-dimensional Lorenz chaotic maps of the present invention comprises the combination in any between the each part mentioned above.
Although illustrate and described the present invention with reference to its preferred embodiment particularly, those skilled in the art will appreciate that the various changes on the form of to make and the details and do not break away from the scope of the present invention described in the appended claims.More than combine specific embodiment of the present invention to describe in detail, but be not to be limitation of the present invention.Every foundation technical spirit of the present invention all still belongs to the scope of technical scheme of the present invention to any simple modification that above embodiment did.
Claims (10)
1. based on the digital image encryption method in the DCT territory of three-dimensional Lorenz chaotic maps, it is characterized in that said method comprises the steps:
Import original digital image information, the information of said original digital picture is carried out dct transform;
Said DCT coefficient array is carried out the conversion of three-dimensional Lorenz scramble;
DCT coefficient symbols after the said scramble conversion is carried out one-time pad encrypts;
Result to after the said one-time pad encryption carries out inverse dct transform, and the result of said inverse dct transform is the encrypted image information of output.
2. the digital image encryption method in the DCT territory based on three-dimensional Lorenz chaotic maps as claimed in claim 1 is characterized in that, said information to said original digital picture is carried out dct transform and comprised the steps:
The information of said original digital picture is kept at size in the three-dimensional array of
;
Said three-dimensional array is carried out said dct transform, said three-dimensional array is become the two-dimensional matrix of size for
;
4. the digital image encryption method in the DCT territory based on three-dimensional Lorenz chaotic maps as claimed in claim 1 is characterized in that, saidly said DCT coefficient array is carried out the conversion of three-dimensional Lorenz scramble comprises the steps:
(1) user imports three parameters and three initial values of three-dimensional Lorenz chaotic maps, obtains Lorenz three-dimensional chaos sequence
;
(2) according to said three-dimensional chaos sequence
, structure Lorenz scramble transformation matrix
;
5. the digital image encryption method in the DCT territory based on three-dimensional Lorenz chaotic maps as claimed in claim 4; It is characterized in that; To said Lorenz scramble transformation matrix
length
intercepting
on demand; Simultaneously; According to ascending order series arrangement
;
,
.
6. the digital image encryption method in the DCT territory based on three-dimensional Lorenz chaotic maps as claimed in claim 1 is characterized in that, saidly DCT coefficient symbols after the said scramble conversion is carried out one-time pad encrypts and comprises the steps:
Adopt m rank Chebyshev mapping to obtain chaos sequence F;
7. the digital image encryption method in the DCT territory based on three-dimensional Lorenz chaotic maps as claimed in claim 6; It is characterized in that; Said employing m rank Chebyshev mapping obtains chaos sequence F, carries out iteration for initial value being brought into said m rank Chebyshev chaos system, gives up preceding segment data; Then according to threshold method be converted into 1,1} chaos sequence F.
8. the digital image encryption method in the DCT territory based on three-dimensional Lorenz chaotic maps as claimed in claim 6; It is characterized in that; Said one-time pad is encrypted; For chaos sequence F that said m rank Chebyshev mapping is produced to said Lorenz scrambling encryption after each row DCT coefficient in
carry out symbol and encrypt promptly corresponding dot product:
.
9. the digital image encryption method in the DCT territory based on three-dimensional Lorenz chaotic maps as claimed in claim 6 is characterized in that the length L of said chaos sequence F value between 1500~6000.
10. the digital image encryption method in the DCT territory based on three-dimensional Lorenz chaotic maps as claimed in claim 1; It is characterized in that said digital image encryption method comprises that also the decrypting process to the encrypted image information of said output is the inverse process of aforementioned ciphering process.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210146858.XA CN102722856B (en) | 2012-06-06 | 2012-06-06 | Digital image encryption method of DCT domain based on three dimensional Lorenz chaotic mapping |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210146858.XA CN102722856B (en) | 2012-06-06 | 2012-06-06 | Digital image encryption method of DCT domain based on three dimensional Lorenz chaotic mapping |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102722856A true CN102722856A (en) | 2012-10-10 |
CN102722856B CN102722856B (en) | 2014-07-23 |
Family
ID=46948603
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210146858.XA Expired - Fee Related CN102722856B (en) | 2012-06-06 | 2012-06-06 | Digital image encryption method of DCT domain based on three dimensional Lorenz chaotic mapping |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102722856B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105096234A (en) * | 2015-07-30 | 2015-11-25 | 北京工业大学 | Hyperspectral image encryption method based on hybrid domain |
CN107222749A (en) * | 2017-06-21 | 2017-09-29 | 同济大学 | A kind of chaos code constructing method for wireless video transmission |
CN107610034A (en) * | 2017-09-06 | 2018-01-19 | 贵州航天计量测试技术研究所 | Image encryption method based on chaos system and the reversible cellular automaton of two dimension |
CN107886003A (en) * | 2017-10-12 | 2018-04-06 | 东北大学 | A kind of cryptography disorder method based on nonlinear system |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101894385A (en) * | 2010-06-29 | 2010-11-24 | 宇龙计算机通信科技(深圳)有限公司 | Method and system for editing picture files, and mobile terminal |
US20110142302A1 (en) * | 2009-12-10 | 2011-06-16 | Complex System, Inc. | Chaotic Watermarking for a Digital Image |
-
2012
- 2012-06-06 CN CN201210146858.XA patent/CN102722856B/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110142302A1 (en) * | 2009-12-10 | 2011-06-16 | Complex System, Inc. | Chaotic Watermarking for a Digital Image |
CN101894385A (en) * | 2010-06-29 | 2010-11-24 | 宇龙计算机通信科技(深圳)有限公司 | Method and system for editing picture files, and mobile terminal |
Non-Patent Citations (6)
Title |
---|
《中国优秀硕士学位论文全文数据库》 20080925 宋国强 "数字图像加密技术研究" 第56-59页 1-10 , * |
《北京科技大学学报》 20041231 王英等 "基于Lorenz混沌系统的数字图像加密算法" 第678-682页 1-10 第26卷, 第6期 * |
《计算机工程与应用》 20051231 刘英等 "基于三维猫映射的图像加密算法" 第127-130、157页 1-10 , 第36期 * |
刘英等: ""基于三维猫映射的图像加密算法"", 《计算机工程与应用》 * |
宋国强: ""数字图像加密技术研究"", 《中国优秀硕士学位论文全文数据库》 * |
王英等: ""基于Lorenz混沌系统的数字图像加密算法"", 《北京科技大学学报》 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105096234A (en) * | 2015-07-30 | 2015-11-25 | 北京工业大学 | Hyperspectral image encryption method based on hybrid domain |
CN105096234B (en) * | 2015-07-30 | 2019-02-01 | 北京工业大学 | A kind of high spectrum image encryption method based on hybrid domain |
CN107222749A (en) * | 2017-06-21 | 2017-09-29 | 同济大学 | A kind of chaos code constructing method for wireless video transmission |
CN107222749B (en) * | 2017-06-21 | 2019-10-18 | 同济大学 | A kind of chaos code constructing method for wireless video transmission |
CN107610034A (en) * | 2017-09-06 | 2018-01-19 | 贵州航天计量测试技术研究所 | Image encryption method based on chaos system and the reversible cellular automaton of two dimension |
CN107886003A (en) * | 2017-10-12 | 2018-04-06 | 东北大学 | A kind of cryptography disorder method based on nonlinear system |
CN107886003B (en) * | 2017-10-12 | 2019-08-09 | 东北大学 | A kind of cryptography disorder method based on nonlinear system |
Also Published As
Publication number | Publication date |
---|---|
CN102722856B (en) | 2014-07-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Shahna et al. | A novel image encryption scheme using both pixel level and bit level permutation with chaotic map | |
Zhang et al. | Multiple-image encryption algorithm based on mixed image element and chaos | |
Liu et al. | Image block encryption algorithm based on chaotic maps | |
Xu et al. | A novel chaotic image encryption algorithm using block scrambling and dynamic index based diffusion | |
Mohammad et al. | A survey and analysis of the image encryption methods | |
Zhang et al. | An image encryption scheme based on the MLNCML system using DNA sequences | |
Tang et al. | Multiple-image encryption with bit-plane decomposition and chaotic maps | |
Liu et al. | Color image encryption based on one-time keys and robust chaotic maps | |
Wang et al. | A novel chaotic block image encryption algorithm based on dynamic random growth technique | |
Song et al. | An image encryption scheme based on new spatiotemporal chaos | |
Kadir et al. | Color image encryption using skew tent map and hyper chaotic system of 6th-order CNN | |
Wang et al. | A novel image encryption scheme based on Brownian motion and PWLCM chaotic system | |
CN103955884B (en) | Dual image encryption method based on chaos and discrete fraction stochastic transformation | |
Zhang | The image encryption algorithm with plaintext-related shuffling | |
Li et al. | A novel plaintext-related chaotic image encryption scheme with no additional plaintext information | |
Xu et al. | A novel image encryption algorithm based on self-orthogonal Latin squares | |
Wang et al. | Color image encryption algorithm based on Double layer Josephus scramble and laser chaotic system | |
Deb et al. | Chaos-based medical image encryption scheme using special nonlinear filtering function based LFSR | |
Li et al. | Double chaotic image encryption algorithm based on optimal sequence solution and fractional transform | |
Hu et al. | An improved piecewise linear chaotic map based image encryption algorithm | |
CN103903215A (en) | Multi-image encryption method based on chaos and FrFT domain phase retrieval process | |
Mir et al. | Color image encryption using RSA cryptosystem with a chaotic map in Hartley domain | |
Attaullah et al. | Cryptosystem techniques based on the improved Chebyshev map: an application in image encryption | |
CN102722856B (en) | Digital image encryption method of DCT domain based on three dimensional Lorenz chaotic mapping | |
CN103716502A (en) | Encryption method based on iteration FrFT and chaotic single-channel color images |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20140723 Termination date: 20200606 |