CN102904710B - Hyper-chaos encryption method for weak password based on quantum cellular neural network - Google Patents

Hyper-chaos encryption method for weak password based on quantum cellular neural network Download PDF

Info

Publication number
CN102904710B
CN102904710B CN201210384510.4A CN201210384510A CN102904710B CN 102904710 B CN102904710 B CN 102904710B CN 201210384510 A CN201210384510 A CN 201210384510A CN 102904710 B CN102904710 B CN 102904710B
Authority
CN
China
Prior art keywords
image
password
isk
quantum
encryption method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201210384510.4A
Other languages
Chinese (zh)
Other versions
CN102904710A (en
Inventor
李锦青
柏逢明
底晓强
祁晖
从立钢
管红梅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Changchun University of Science and Technology
Original Assignee
Changchun University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Changchun University of Science and Technology filed Critical Changchun University of Science and Technology
Priority to CN201210384510.4A priority Critical patent/CN102904710B/en
Publication of CN102904710A publication Critical patent/CN102904710A/en
Application granted granted Critical
Publication of CN102904710B publication Critical patent/CN102904710B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention relates to a hyper-chaos encryption method for a weak password based on a quantum cellular neural network, which belongs to the field of the information security technology. The method provided by the invention solves the problem that the existing password system is limited by limited key space so that the safety of the system is difficult to guarantee when running into brute-force attacks. The encryption method provided by the invention combines the hyper-chaos characteristic of the quantum cellular neural network with the advantages of human brain identification; the safe password is divided into two parts, wherein one part is translated into the picture form; in terms of an initial value and extremely sensitive characteristics of a control parameter, images are encrypted by using the high complexity of the hyper-chaos system; the other part of secret key is encrypted by using an AES (Advanced Encryption Standard) encryption method; and the two parts form a safe password for encrypting the data. The encryption method provided by the invention has great key space; the ability resisting to brute force attack is obviously strengthened; the calculated quantity in the encryption process is reduced when less password number is used; and the encryption method has the characteristics of high safety and convenience for remembering by a user.

Description

Based on the weak password hyperchaos encryption method of quantum cellular neural
Technical field
The present invention relates to field of information security technology, be specifically related to a kind of weak password hyperchaos encryption method based on quantum cellular neural.
Background technology
Computer and information security issue by deep research more than 50 years.Comprise the Generally Recognized as safe of cryptographic algorithm, calculation element, operating system and network.Wherein cryptographic system is widely used in authentication and data encryption.The mankind remember the limited in one's ability of password and tend to select weak password that is too simple and that can be foreseen.Thus, the leak that weak password is correlated with becomes the safety problem extensively existed.The method solving weak password problem is all being found by global user and enterprise.
According to statistics, the u s company of 2009 86% will access to your password certification and encryption.If weak password is used as a strong encryption or authentication, then the attack that system may be made to be easy to be subject to violence password search.Research shows, user uses simply usually, and the password that can be foreseen is to treat the problem of this complexity of password.Schneier has investigated 34, online user's password of 000 " Myspace ": wherein user's choice for use 8 characters of 65%, and use " password1 ", " abc123 ", " myspace1 ", and " password " this kind of password there are plenty of such people especially.Also have a considerable amount of user that all accounts are all set to same password, or password is write in notepad, or password is recorded in a form, or iterative cycles uses these class methods of Old Password.Horowitz reports neat password being write on Sticky Note and to be attached on computer screen of the user of 15-20%.Another is recorded in password on paper when investigating the user job of discovery 66%, and 58% is recorded in form.
The defect that weak password is correlated with has great impact to World Economics, and the symmetric key cryptography system of existing commercialization is generally DES (data encryption standard) and AES (Advanced Encryption Standard).One is used to the desirable key of the completely random of aes algorithm, a violence is searched and is attacked in the future present or infeasible.But when key is restricted to a less subspace, will there is theatrical change in situation.And actual conditions are, the password that usual keyword is remembered by people, or assailant by crack accordingly, mechanism can obtain.For so very little key subspace, violence is searched will be effective.
Quantum Cellular Automata (Quantum cellular automata, QCA) is a kind of nano level Novel electronic devices, has superelevation integrated level, super low-power consumption and without the lead-in wire advantage such as integrated, is one of electronic component of new generation.Abroad in Recent Years scholar utilizes the mechanism QCA of Cai Schwann Cells neural net to construct the locally coupled network of cell based on Schrodinger equation, i.e. quantum cellular neural (QCNN).Because the quantum between quantum dot interacts, complicated dynamics can be obtained from the polarizability of each cell.
Summary of the invention
The present invention solves existing password system due to the restriction by limited key space, and when being subject to Brute Force and attacking, its fail safe is difficult to guaranteed problem, provides a kind of weak password hyperchaos encryption method based on quantum cellular neural.
Based on the weak password hyperchaos encryption method of quantum cellular neural, the method is realized by following steps:
Step one, designated length be the password of n position as cryptographic object, n is positive integer;
Step 2, n position password selected for step one is split as the short password SP of m position and the strong encryption keys SK of k position, described m and k is positive integer;
Step 3, strong encryption keys SK step 2 split embed in two dimensional image, obtain image strong encryption keys ISK;
Step 4, Discrete Chaotic Map is carried out to the image strong encryption keys ISK that step 3 obtains, and setup control parameter, obtain scramble image S_ISK, and by scramble image S_ISK according to from top to bottom, order from left to right arranges, and obtains scrambling sequence S;
Step 5, selection quantum cellular neural hyperchaotic system, and initialization and controling parameters.Adopt fourth-order Runge-Kutta method to carry out iterative to described quantum cellular neural hyperchaotic system, obtain chaos sequence K;
Step 6, adopt chaos sequence K to carry out DIFFUSION TREATMENT to the scrambling sequence S that step 4 obtains, realize the equalization of scramble image S_ISK, obtain ciphering sequence C, and to ciphering sequence C according to from top to bottom, order from left to right arranges, generation encrypted image C final;
Step 7, the encrypted image C that the short password SP employing in m position AES encryption method is encrypted afterwards and step 6 generates that step 2 is split finalmerge, jointly transmit as Crypted password.
Beneficial effect of the present invention: the present invention proposes a kind of weak password hyperchaos encryption method based on quantum cellular neural, the Dominant Facies of the hyperchaos characteristic of quantum cellular neural and human brain pattern recognition combines by this cryptography scheme.Security password is divided into two parts, is wherein partially converted into graphic form, the high complexity of application hyperchaotic system, to the feature of initial value and controling parameters extreme sensitivity, encrypted image, carrys out mental picture by user, is user-friendly to; Another part key adopts traditional password encryption scheme.Two parts form a security password to data encryption jointly.Key space is large, and the ability of opposing brute force attack obviously strengthens; 105 SP combinations are carried out spending very considerable time required for Brute Force.Simple growth SP space just significantly limit assailant to 106, still keeps quite short password simultaneously.Weak password system of the present invention, use less password figure place, greatly reduce the amount of calculation in ciphering process, reach higher lsafety level, it is high that the method for the invention has fail safe, and user remembers feature easily.
Accompanying drawing explanation
Fig. 1 is the encrypting and decrypting of the weak password hyperchaos encryption method based on quantum cellular neural of the present invention and attacks schematic diagram;
Fig. 2 is the encryption flow figure of the weak password hyperchaos encryption method based on quantum cellular neural of the present invention;
Fig. 3 is the cipher round results figure of the weak password hyperchaos encryption method based on quantum cellular neural of the present invention; Wherein scheming A is original image, and figure B is encrypted image, the correct decrypted image of figure C, and figure D is wrong decrypted image.
Embodiment
Embodiment one, composition graphs 1 to Fig. 3 illustrate present embodiment, and based on the weak password hyperchaos encryption method of quantum cellular neural, the method is realized by following steps:
A1, designated length be the password of n as cryptographic object, n is positive integer, and the pattern length of described n is in the reasonable scope (as 105 combinations);
B1, n position password is split as the short password SP of m position and the strong encryption keys SK of k position;
C1, strong encryption keys SK to be embedded in two dimensional image, form image strong encryption keys ISK; Be with the difference of existing encryption technology, user need not be required to remember SK again, and for human brain, memory piece image is easily a lot of more than memory k position character;
D1, Discrete Chaotic Map is carried out to the image strong encryption keys ISK in step C1, and setup control parameter, obtain scramble image S_ISK.By scramble image S_ISK according to from top to bottom, order from left to right arranges, and obtains scrambling sequence S;
E1, selection quantum cellular neural hyperchaotic system, and initialization and controling parameters.Adopt 4 rank Runge-Kutta methods to carry out iterative to this hyperchaotic system, produce chaos sequence K;
F1, carry out DIFFUSION TREATMENT with above chaos sequence to the scrambling sequence S that step D1 generates, as XOR, obtain ciphering sequence C, realize image equilibration, to C sequence according to from top to bottom, order from left to right arranges, and generates encrypted image C final;
G1, to step B1 produce the short password SP(SP in l position remembered by user), adopt conventional encryption methods be encrypted, as AES encryption algorithm;
H1, encrypted result step F 1 and G1 generated merge, and jointly transmit as Crypted password.
Because this cryptographic algorithm is symmetric cryptography, decrypting process is the inverse process of ciphering process.Decrypted result can be obtained according to the reverse operating of ciphering process.
Use variable element Cat to map in present embodiment step D1, the equation that Cat maps is defined as:
x n + 1 y n + 1 = A x n y n mod ( N ) = 1 p q pq + 1 x n y n mod ( N ) - - - ( 1 )
In formula, suppose that image strong encryption keys ISK is the gray level image of N × N pixel, controling parameters p, q are positive integer, can be set by the user, and are required to meet det (A)=1.
By image strong encryption keys ISK according to equation (1) arrangement, be converted into scramble image S_ISK.
The quantum cell neural network system model that in present embodiment, step e 1 uses is:
P . 1 = - 2 a 1 1 - P 1 2 sin φ 1 φ . 1 = - ω 1 ( P 1 - P 2 ) + 2 a 1 P 1 1 - P 1 2 cos φ 1 P . 2 = - 2 a 2 1 - P 2 2 sin φ 2 φ . 2 = - ω 2 ( P 2 - P 1 ) + 2 a 2 P 2 1 - P 2 2 cos φ 2 - - - ( 2 )
Wherein, P 1and P 2be the polarizability of two Quantum Cellular Automata (QCA), φ 1and φ 2be the phase place of two QCA, a1 and a2 is the coefficient be directly proportional to energy between quantum dot in each QCA, ω 1and ω 2it is the weighted influence coefficient of the difference of adjacent QCA polarizability.
Work as ω 12=0.5, a 1=a 2when=0.075, system (2) is in hyperchaos state.Parameter a1 and a2, ω 1and ω 2also can be chosen by user.
When i-th (i=1,2 ..., (N × N)/4) secondary iteration system (2) quantum cellular neural time, four of generation value { x 1(i), x 2(i), x 3(i), x 4(i) } for generating chaos sequence .Through type (3) is asked for:
K x 1 ( i ) = mod ( round ( ( abs ( x 1 ( i ) ) - floor ( abs ( x 1 ( i ) ) ) ) × 10 14 + S 4 ( i - 1 ) ) , N ) K x 2 ( i ) = mod ( round ( ( abs ( x 2 ( i ) ) - floor ( abs ( x 2 ( i ) ) ) ) × 10 14 + S 4 ( i - 1 ) + 1 ) , N ) K x 3 ( i ) = mod ( round ( ( abs ( x 3 ( i ) ) - floor ( abs ( x 3 ( i ) ) ) ) × 10 14 + S 4 ( i - 1 ) + 2 ) , N ) K x 4 ( i ) = mod ( round ( ( abs ( x 4 ( i ) ) - floor ( abs ( x 4 ( i ) ) ) ) × 10 14 + S 4 ( i - 1 ) + 3 ) , N ) - - - ( 3 )
Image equilibration method in present embodiment in step F 1 adopts scheme shown in formula (4), obtains sequence C
C 4 ( i - 1 ) + 1 = bit xor ( S 4 ( i - 1 ) + 1 , K x 1 ( i ) ) C 4 ( i - 1 ) + 2 = bit xor ( S 4 ( i - 1 ) + 2 , K x 2 ( i ) ) C 4 ( i - 1 ) + 3 = bit xor ( S 4 ( i - 1 ) + 3 , K x 3 ( i ) ) C 4 i = bit xor ( S 4 i , K x 4 ( i ) ) - - - ( 4 )
Embodiment two, composition graphs 3 illustrate present embodiment, and present embodiment is the embodiment of the weak password hyperchaos encryption method based on quantum cellular neural described in embodiment one:
One, select seven passwords " custABC " as cryptographic object, wherein front four " cust " strong encryption keys SK, rear three " ABC " are as short password SP;
Two, " cust " is embedded in two dimensional image, generate the image strong encryption keys ISK of 128 × 128 pixels;
Three, by chaotic maps equation (1) Suo Shi, setup control parameter p=36, q=3, carries out image scrambling process to image strong encryption keys ISK, obtains scramble image S_ISK.And by scramble image S_ISK according to from top to bottom, order from left to right arranges, and obtains scrambling sequence S;
Four, by hyperchaotic system formula (2) Suo Shi, initialization P 1(0)=0.5, P 2(0)=0.999, φ 1=-20, φ 2=2.5 and controling parameters ω 12=0.5, a 1=a 2=0.075.Adopt 4 rank Runge-Kutta methods to carry out iterative to this hyperchaotic system, produce chaos sequence K;
Five, carry out equalization processing according to method formula (4) Suo Shi to image, obtain sequence C, to C sequence according to from top to bottom, order from left to right arranges, and generates encrypted image C final;
Six, AES encryption scheme is used to be encrypted short password " ABC "; By encrypted result and encrypted image C finalintegrate, by the Crypted password transmission finally obtained.
Cipher round results composition graphs 3, can find out that encryption rear video image scrambling is abundant, cannot reflect any information of original image, cipher round results is good; Image after correct deciphering and original image completely the same.

Claims (4)

1., based on the weak password hyperchaos encryption method of quantum cellular neural, it is characterized in that, the method is realized by following steps:
Step one, designated length be the password of n position as cryptographic object, n is positive integer;
Step 2, n position password selected for step one is split as the short password SP of m position and the strong encryption keys SK of k position, described m and k is positive integer;
Step 3, strong encryption keys SK step 2 split embed in two dimensional image, obtain image strong encryption keys ISK;
Step 4, Discrete Chaotic Map is carried out to the image strong encryption keys ISK that step 3 obtains, and setup control parameter, obtain scramble image S_ISK, and by scramble image S_ISK according to from top to bottom, order from left to right arranges, and obtains scrambling sequence S;
Step 5, selection quantum cellular neural hyperchaotic system, and initialization and controling parameters, adopt fourth-order Runge-Kutta method to carry out iterative to described quantum cellular neural hyperchaotic system, obtain chaos sequence K;
Step 6, adopt chaos sequence K to carry out DIFFUSION TREATMENT to the scrambling sequence S that step 4 obtains, realize the equalization of scramble image S_ISK, obtain ciphering sequence C, and to ciphering sequence C according to from top to bottom, order from left to right arranges, generation encrypted image C final;
Step 7, the encrypted image C that the short password SP employing in m position AES encryption method is encrypted afterwards and step 6 generates that step 2 is split finalmerge, jointly transmit as Crypted password.
2. the weak password hyperchaos encryption method based on quantum cellular neural according to claim 1, it is characterized in that, described in step 4, Discrete Chaotic Map is carried out to image strong encryption keys ISK, and setup control parameter, the detailed process obtaining scramble image S_ISK is: adopt variable element Cat to map, the equation definition equation one that described Cat maps is expressed as:
Equation one x n + 1 y n + 1 = A x n y n mod ( N ) = 1 p q pq + 1 x n y n mod ( N )
Wherein, setting image strong encryption keys ISK is the gray level image of N × N pixel, and controling parameters is p, q is positive integer, is set by the user, and is required to meet det (A)=1; Image strong encryption keys ISK is arranged according to equation one, is converted into scramble image S_ISK.
3. the weak password hyperchaos encryption method based on quantum cellular neural according to claim 1, it is characterized in that, the quantum cell neural network system model formation one of the employing described in step 5 is expressed as:
Formula one P · 1 = - 2 a 1 1 - P 1 2 sin φ 1 φ · 1 = - ω 1 ( P 1 - P 2 ) + 2 a 1 P 1 1 - P 1 2 cos φ 1 P · 2 = - 2 a 2 1 - P 2 2 sin φ 2 φ · 2 = - ω 2 ( P 2 - P 1 ) + 2 a 2 P 2 1 - P 2 2 cos φ 2
In formula, P 1and P 2be respectively the polarizability of two Quantum Cellular Automata, φ 1and φ 2be the phase place of two Quantum Cellular Automata, a1 and a2 is the coefficient be directly proportional to energy between quantum dot in each two Quantum Cellular Automata, ω 1and ω 2it is the weighted influence coefficient of the difference of adjacent Quantum Cellular Automata polarizability;
Work as ω 12=0.5, a 1=a 2when=0.075, quantum cell neural network system is in hyperchaos state; Wherein, a1 and a2, ω 1and ω 2value can be chosen by user;
Adopt formula one carry out i-th (i=1,2 ..., (N × N)/4) secondary iteration time, four values of generation are respectively: { x 1(i), x 2(i), x 3(i), x 4(i) }, described four values are for generating chaos sequence i=1,2 ..., (N × N)/4; Described generation chaos sequence K is asked for by formula two:
Formula two:
K x 1 ( i ) = mod ( round ( ( abs ( x 1 ( i ) ) - floor ( abs ( x 1 ( i ) ) ) ) × 10 14 + S 4 ( i - 1 ) ) , N ) K x 2 ( i ) = mod ( round ( ( abs ( x 2 ( i ) ) - floor ( abs ( x 2 ( i ) ) ) ) × 10 14 + S 4 ( i - 1 ) + 1 ) , N ) K x 3 ( i ) = mod ( round ( ( abs ( x 3 ( i ) ) - floor ( abs ( x 3 ( i ) ) ) ) × 10 14 + S 4 ( i - 1 ) + 2 ) , N ) K x 4 ( i ) = mod ( round ( ( abs ( x 4 ( i ) ) - floor ( abs ( x 4 ( i ) ) ) ) × 10 14 + S 4 ( i - 1 ) + 3 ) , N ) .
4. the weak password hyperchaos encryption method based on quantum cellular neural according to claim 1, is characterized in that, the image equilibration in step 6 adopts formula three to realize, and obtains ciphering sequence C,
C 4 ( i - 1 ) + 1 = bit xor ( S 4 ( i - 1 ) + 1 , K x 1 ( i ) ) C 4 ( i - 1 ) + 2 = bit xor ( S 4 ( i - 1 ) + 2 , K x 2 ( i ) ) C 4 ( i - 1 ) + 3 = bit xor ( S 4 ( i - 1 ) + 3 , K x 3 ( i ) ) C 4 i = bit xor ( S 4 i , K x 4 ( i ) )
Carry out according to from top to bottom to ciphering sequence C, order from left to right arranges, and generates encrypted image.
CN201210384510.4A 2012-10-11 2012-10-11 Hyper-chaos encryption method for weak password based on quantum cellular neural network Expired - Fee Related CN102904710B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210384510.4A CN102904710B (en) 2012-10-11 2012-10-11 Hyper-chaos encryption method for weak password based on quantum cellular neural network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210384510.4A CN102904710B (en) 2012-10-11 2012-10-11 Hyper-chaos encryption method for weak password based on quantum cellular neural network

Publications (2)

Publication Number Publication Date
CN102904710A CN102904710A (en) 2013-01-30
CN102904710B true CN102904710B (en) 2015-01-07

Family

ID=47576764

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210384510.4A Expired - Fee Related CN102904710B (en) 2012-10-11 2012-10-11 Hyper-chaos encryption method for weak password based on quantum cellular neural network

Country Status (1)

Country Link
CN (1) CN102904710B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103501224B (en) * 2013-09-23 2016-05-25 长春理工大学 Based on the asymmetric image encryption decryption method of quantum cellular neural system
CN104092530B (en) * 2014-06-11 2017-07-07 长春理工大学 Based on quantum cellular neural hyperchaotic system optical image encryption method
CN106373082A (en) * 2016-09-23 2017-02-01 中山大学 Cellular automata and chaotic mapping-based digital image encryption method and decryption method thereof
CN109003314B (en) * 2018-08-14 2023-03-21 长春理工大学 Image encryption and decryption method based on four-dimensional quantum Dicke mapping
CN109117657B (en) * 2018-08-28 2020-06-16 电子科技大学 Lossy image compression encryption method
CN109672517B (en) * 2018-12-20 2021-07-27 杭州电子科技大学 Encryption and decryption method of OFDM-PON system based on cellular neural network
CN111464304B (en) * 2019-01-18 2021-04-20 江苏实达迪美数据处理有限公司 Hybrid encryption method and system for controlling system network security
CN110190959B (en) 2019-06-28 2021-05-07 中南大学 Encryption and decryption method based on continuous variable quantum neural network
CN111062453B (en) * 2019-10-16 2022-03-18 浙江联云智鼎信息科技有限公司 Super-fusion full-stack type cloud data center system and method
CN113923315B (en) * 2021-12-13 2022-03-29 湖南菠萝互娱网络信息有限公司 Image cloud storage leakage-prevention encryption system

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102360488A (en) * 2011-09-29 2012-02-22 付冲 Digital image encryption method based on chaotic orbit perturbation

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102360488A (en) * 2011-09-29 2012-02-22 付冲 Digital image encryption method based on chaotic orbit perturbation

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
一种结合Cat映射和Henon映射的图像加密技术;田汉清;《计算机应用与软件》;20100930;第27卷(第9期);全文 *

Also Published As

Publication number Publication date
CN102904710A (en) 2013-01-30

Similar Documents

Publication Publication Date Title
CN102904710B (en) Hyper-chaos encryption method for weak password based on quantum cellular neural network
Ye Image scrambling encryption algorithm of pixel bit based on chaos map
CN103501224B (en) Based on the asymmetric image encryption decryption method of quantum cellular neural system
CN101447870B (en) Safe storage method of private key based on technology of distributed password
CN106301760B (en) A kind of 3D point cloud model encryption method based on chaotic maps
CN105743645B (en) Stream code key generating means, method and data encryption, decryption method based on PUF
CN103440613B (en) The color image encrypting method of hyperchaos Rossler system
CN109450632A (en) Key recovery method based on whitepack block cipher CLEFIA analysis
Rajput et al. Towards the growth of image encryption and authentication schemes
CN101030852B (en) Method for enciphering and deciphering human-body safety
CN103258312A (en) Digital image encryption method with rapid key stream generative mechanism
CN107276766A (en) A kind of many authorization attribute encipher-decipher methods
CN105373739A (en) Hyperchaotic system based quantum image encryption method
Cao et al. Secure QR code scheme based on visual cryptography
CN102664727A (en) Virtual optical encryption method based on chaotic mapping
CN109361830A (en) A kind of image encryption method based on plaintext
CN110166784A (en) A kind of adapting to image texture area steganographic algorithm based on block of pixels
CN109951273A (en) A kind of SM4 algorithm whitepack implementation method and device
Kamath et al. Extended visual cryptography for color images using coding tables
CN102722856B (en) Digital image encryption method of DCT domain based on three dimensional Lorenz chaotic mapping
Wang et al. Fisher-Yates scrambling algorithm combined with S-box color image encryption technology based on 3D-SCCM chaotic system
Kumar et al. Image encryption using simplified data encryption standard (S-DES)
CN103546277B (en) The DPA of a kind of smart card SM4 algorithm attacks and key recovery method and system
Alghamdi et al. A secure iris image encryption technique using bio-chaotic algorithm
Alghamdi et al. Bio-chaotic stream cipher-based iris image encryption

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150107

Termination date: 20161011

CF01 Termination of patent right due to non-payment of annual fee