CN103442157A - Image encryption method based on Arnold transformations and Henon chaotic system - Google Patents
Image encryption method based on Arnold transformations and Henon chaotic system Download PDFInfo
- Publication number
- CN103442157A CN103442157A CN2013103971309A CN201310397130A CN103442157A CN 103442157 A CN103442157 A CN 103442157A CN 2013103971309 A CN2013103971309 A CN 2013103971309A CN 201310397130 A CN201310397130 A CN 201310397130A CN 103442157 A CN103442157 A CN 103442157A
- Authority
- CN
- China
- Prior art keywords
- matrix
- image
- henon
- arnold
- scramble
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Abstract
The invention relates to an image encryption method based on Arnold transformations and a Henon chaotic system. Firstly, a plurality of Arnold scrambling transformations are carried out on images, then scrambling is carried out for a second time on the images through use of a Henon chaotic sequence and then the Henon chaotic sequence is used to carry out a bit-by-bit XOR operation with images to change pixel values of the images. The two technologies are adopted to carry out pixel-value position scrambling twice so that the scrambling degree of the images is higher compared with a single scrambling technology and then the chaotic sequence is adopted to change the pixel values so that any information related to plaintext is completely hidden in the encrypted images. Therefore, the method has the advantages of being great in safety and high in anti-attack ability and the like.
Description
Technical field
The present invention relates to a kind of information encryption, particularly a kind of image encryption method based on Arnold conversion and Henon chaos system.
Background technology
Along with the development of multimedia technology, digital picture has overcome the factor data amount is brought greatly in the past storage and transmission problem, and it is becoming a kind of information representation mode of main flow.Can be when network communication brings various facilities and interests to us, various potential safety hazards are also following, the hacker's event and the Internet piracy that constantly occur, make people worried to the fail safe of network communication, seriously restricting further developing of internet, applications.Moreover, some information also relates to the national security aspect, picture as captured as military applications drawing, military satellite, new weapon figure etc.Thereby the protection of view data more and more is subject to the generally attention of society.
To view data, protected two kinds of measures to take, a kind of is to realize by embed digital watermark information in digital picture the copyright protection of digital picture.Another is the image encryption technology exactly.In recent years, about image is encrypted, normally image pixel positions and pixel value are changed, the Arnold conversion is a kind of conversion commonly used in Chaotic Technology, it is a kind of conversion proposed by the mathematician V.J.Arnold of Russia, because its calculating is relatively simple, easily realize, often be applied in the encryption of image.
But the method for single change location of pixels, can not make the scramble degree of image reach comparatively ideal state sometimes.Chaos system, due to the characteristics such as pseudo-randomness of its good randomness feature, sensitiveness, ergodic and formation sequence to initial value, is studied in the image encryption field by scholars in recent years widely.The Henon chaos system is a two dimensional dynamic system, and its attractor is to be found by French astronomer M.Henon, and the sequence produced by the Henon chaos system afterwards often is employed as ciphering sequence.
Summary of the invention
The present invention be directed to current generation to the more and more higher problem of Information Security requirement, a kind of image encryption method based on Arnold conversion and Henon chaos system has been proposed, adopted two kinds of technology to carry out the location of pixels scramble twice to image, scramble Du Genggao to image, cipher round results is good, is difficult for being cracked.
Technical scheme of the present invention is: a kind of image encryption method based on Arnold conversion and Henon chaos system specifically comprises the steps:
2), by matrix
carry out 37 Arnold conversion reprocessings and obtain the image array after scramble one time
;
3), choose
as the initial value of Henon system, and by initial value substitution Henon system equation iteration
the inferior two group encryption chaos sequences that obtain
, wherein
value is greater than
square value;
4), at chaos sequence
in at random from a certain element, get successively respectively
individual element, composition sequence
, and by these two sequences generation a line that sorts in turn
the matrix of row
,
the matrix of row one row
, two of regenerations
null matrix
;
5), by matrix
arrange by ascending order, and obtain permutation matrix
, hypothesis matrix
in
column of figure is
, so just by matrix
row
the element of row is set to 1, in like manner, and hypothesis matrix
in
the line number word is
, so just by matrix
row
the element of row is set to 1, by that analogy, and null matrix originally
through so becoming matrix
, then to a scramble image array
do computing:
, obtain the image array after the secondary scramble
;
6), at chaos sequence
middlely choose respectively
individual element composition sequence
, by sequence
do conversion process, obtain chaos sequence
;
7), will encrypt chaos sequence
element read successively generation
scrambled matrix
, and with secondary scramble image array
in element carry out xor operation by turn, obtain final encrypted image matrix
;
8), by the encrypted image matrix
preserve according to the graphics standard form, obtain final encrypted image;
9), decipherment algorithm is exactly the inverse operation of cryptographic algorithm, chooses the scrambled matrix used in ciphering process
successively with the encrypted image matrix
carry out xor operation by turn, obtain the secondary scramble image array in ciphering process
;
10), try to achieve matrix
inverse matrix
, right
random operation is inverted:
, obtain a scramble image array in ciphering process
;
11), by matrix
make 37 times the Arnold inverse transformation, obtain image array
thereby, obtain deciphering image.
Described step 2) Arnold in is transformed to:
Wherein
matrix is called transformation matrix,
for the coordinate position of the image pixel after the Arnold conversion, mod means modular arithmetic,
exponent number for image.
In described step 6), conversion is treated to:
Beneficial effect of the present invention is: the image encryption method that the present invention is based on Arnold conversion and Henon chaos system, adopted two kinds of technology to carry out the location of pixels scramble twice to image, compared with single Chaotic Technology, its scramble Du Genggao, the chaos sequence then adopted changes pixel value, encrypted image is hidden and related any information expressly fully, there is fail safe good, the advantage such as anti-attack ability is strong.
The accompanying drawing explanation
Fig. 1 the present invention is based on encryption flow figure in the image encryption method of Arnold conversion and Henon chaos system;
Fig. 2 the present invention is based in the image encryption method of Arnold conversion and Henon chaos system to decipher flow chart;
The attraction subgraph that Fig. 3 is Henon chaos system of the present invention;
Fig. 4 is that the image encryption method that the present invention is based on Arnold conversion and Henon chaos system is implemented illustration;
Fig. 5 is scramble degree analyzing figure of the present invention;
Fig. 6 is key sensitivity resolution chart of the present invention;
Fig. 7 is the statistic histogram after tree image encryption of the present invention;
Fig. 8 is the horizontal neighbor correlation analysis in the bright ciphertext graph picture of the present invention.
Embodiment
At first image encryption method based on Arnold conversion and Henon chaos system carries out repeatedly the conversion of Arnold scramble to image, recycling Henon chaos sequence carries out the secondary scramble to it, then utilizes Henon chaos sequence and image to carry out the pixel value that XOR by turn changes image.
One, Arnold conversion:
The image coordinate of supposing a width binary digital image is
, the Arnold conversion is defined as so:
Wherein
matrix is called transformation matrix,
for the coordinate position of the image pixel after the Arnold conversion, mod means modular arithmetic,
exponent number for image.The Arnold conversion has periodically, and, after several times Arnold conversion, image will be converted to original image.
Two, Henon chaos system:
The Henon chaos system is a two dimensional dynamic system, and its equation is defined as:
Wherein
for system parameters, the impact by the research parameter on mapping, show to work as
the time, the equal area of system dwindles at the volley, corresponding a dissipative system, and dissipative system refers to the open system of a far from equilibrium state.When
the time, system, in chaos state, Figure 3 shows that Henon chaos attractor figure.
Three, the image encryption method based on Arnold conversion and Henon chaos system:
Under the Matlab7.1 environment, right
the tree gray level image carry out encryption and decryption, the initial value of getting the Henon chaos sequence is
, encryption and decryption flow process as depicted in figs. 1 and 2, concrete steps are as follows:
1), choose
gray level image as original image (4(a in figure)), and obtain the image pixel value matrix
;
2), by matrix
carry out 37 Arnold conversion reprocessings and obtain the image array after scramble one time
;
3), choose suitable
as the initial value of Henon system, and by initial value substitution Henon system equation iteration
the inferior two group encryption chaos sequences that obtain
, wherein
value is greater than
square value;
4), at chaos sequence
in at random from a certain element, get successively respectively
individual element, composition sequence
, and by these two sequences generation a line that sorts in turn
the matrix of row
,
the matrix of row one row
, two of regenerations
null matrix
;
5), by matrix
arrange by ascending order, and obtain permutation matrix
, hypothesis matrix
in
column of figure is
, so just by matrix
row
the element of row is set to 1, in like manner, and hypothesis matrix
in
the line number word is
, so just by matrix
row
the element of row is set to 1, by that analogy, and null matrix originally
through so becoming matrix
, then to a scramble image array
do computing:
, obtain the image array after the secondary scramble
;
6), at chaos sequence
middlely choose respectively
individual element composition sequence
, by sequence
do conversion process,
7), will encrypt chaos sequence
element read successively generation
scrambled matrix
, and with secondary scramble image array
in element carry out xor operation by turn,
8), by the encrypted image matrix
preserve according to the graphics standard form, obtain final encrypted image (4(b in figure));
9), decipherment algorithm is exactly the inverse operation of cryptographic algorithm.Choose the scrambled matrix used in ciphering process
successively with the encrypted image matrix
carry out xor operation by turn,
, obtain the secondary scramble image array in ciphering process
;
10), try to achieve matrix
inverse matrix
, right
random operation is inverted:
, obtain a scramble image array in ciphering process
;
11), by matrix
make 37 times the Arnold inverse transformation, obtain image array
thereby, obtain deciphering image (Fig. 4 (c)).
For the better fail safe of this cryptographic algorithm of explanation, the present invention analyzes from the correlation between scramble degree, key sensitiveness, statistic histogram and neighbor etc. respectively.
Four, scramble degree analyzing:
For the scramble degree of verifying this algorithm higher, accompanying drawing 5(a) mean only to use the scramble image of Arnold conversion, accompanying drawing 5(b) mean only to carry out the scramble image of Henon chaos sequence, accompanying drawing 5(c) mean use Arnold conversion in this algorithm and the scramble image of two kinds of scramble modes of Henon chaos sequence.From Fig. 5 (a) and (b), (c), can find out, only the image by Arnold scramble or Henon chaos sequence scramble be far from good through the image effect of secondary scramble, image after the secondary scramble is upset putting in order of original image fully, and scramble Du Genggao is disguised better.
Five, key sensitivity analysis:
For verifying the sensitiveness of key in this algorithm, when deciphering, choose Henon chaos sequence initial value
for
as decruption key, this is in key
used with encryption
initial value only differs
, obtain a width mistake deciphering image as shown in Figure 6.Can find out that image and original image difference after wrong deciphering are very large, not see the information that original image is implicit fully, illustrate that this algorithm has stronger key sensitivity, can effectively resist exhaustive attack.
Six, grey level histogram analysis:
We analyze the change of bright ciphertext graph as statistical property by histogrammic comparison.From accompanying drawing 7(a), find out (b), the image histogram after encryption is evenly distributed, and the original image information feature is stashed fully, illustrates that this algorithm has the ability of well resisting statistical analysis.
Seven, the correlation analysis between neighbor:
Correlation between original image pixels is very high, in order to resist the assailant, utilizes this correlation to be decrypted, and must effectively reduce the correlation of encrypted image.Be chosen at horizontal direction, vertical direction and, to 2000 pairs of neighbor pixels on angular direction, then utilize the correlation between formula (3)-(6) calculating pixel at random from original image and encrypted image in the present invention.
The correlation of original image and encrypted image horizontal direction is shown in accompanying drawing 8(a), (b), coefficient correlation is respectively 0.94706 and 0.0044421, the coefficient correlation of other direction is in Table the coefficient correlation of the neighbor of 1 original image and encrypted image.From accompanying drawing 8(b) and table 1 can find out that the correlation between the pixel of encrypted image is very low, almost close to 0, illustrate that this algorithm has very strong anti-statistical attack ability.
Claims (4)
1. the image encryption method based on Arnold conversion and Henon chaos system, is characterized in that, specifically comprises the steps:
2), by matrix
carry out 37 Arnold conversion reprocessings and obtain the image array after scramble one time
;
3), choose
as the initial value of Henon system, and by initial value substitution Henon system equation iteration
the inferior two group encryption chaos sequences that obtain
, wherein
value is greater than
square value;
4), at chaos sequence
in at random from a certain element, get successively respectively
individual element, composition sequence
, and by these two sequences generation a line that sorts in turn
the matrix of row
,
the matrix of row one row
, two of regenerations
null matrix
;
5), by matrix
arrange by ascending order, and obtain permutation matrix
, hypothesis matrix
in
column of figure is
, so just by matrix
row
the element of row is set to 1, in like manner, and hypothesis matrix
in
the line number word is
, so just by matrix
row
the element of row is set to 1, by that analogy, and null matrix originally
through so becoming matrix
, then to a scramble image array
do computing:
, obtain the image array after the secondary scramble
;
6), at chaos sequence
middlely choose respectively
individual element composition sequence
, by sequence
do conversion process, obtain chaos sequence
;
7), will encrypt chaos sequence
element read successively generation
scrambled matrix
, and with secondary scramble image array
in element carry out xor operation by turn, obtain final encrypted image matrix
;
8), by the encrypted image matrix
preserve according to the graphics standard form, obtain final encrypted image;
9), decipherment algorithm is exactly the inverse operation of cryptographic algorithm, chooses the scrambled matrix used in ciphering process
successively with the encrypted image matrix
carry out xor operation by turn, obtain the secondary scramble image array in ciphering process
;
10), try to achieve matrix
inverse matrix
, right
random operation is inverted:
, obtain a scramble image array in ciphering process
;
2. the image encryption method based on Arnold conversion and Henon chaos system according to claim 1, is characterized in that described step 2) in Arnold be transformed to:
4. the image encryption method based on Arnold conversion and Henon chaos system according to claim 1, is characterized in that, in described step 6) by turn xor operation be:
.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2013103971309A CN103442157A (en) | 2013-09-04 | 2013-09-04 | Image encryption method based on Arnold transformations and Henon chaotic system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2013103971309A CN103442157A (en) | 2013-09-04 | 2013-09-04 | Image encryption method based on Arnold transformations and Henon chaotic system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103442157A true CN103442157A (en) | 2013-12-11 |
Family
ID=49695819
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2013103971309A Pending CN103442157A (en) | 2013-09-04 | 2013-09-04 | Image encryption method based on Arnold transformations and Henon chaotic system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103442157A (en) |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103780794A (en) * | 2013-12-17 | 2014-05-07 | 中山大学深圳研究院 | Image encryption improved method based on chaotic system |
CN103929563A (en) * | 2014-04-11 | 2014-07-16 | 陕西师范大学 | Image encryption and decryption method based on improved Joseph traversal and generalized Henon mapping |
CN103971320A (en) * | 2014-04-25 | 2014-08-06 | 河海大学 | Image scrambling and restoring method based on Henon mapping |
CN104077739A (en) * | 2014-07-03 | 2014-10-01 | 苏州大学应用技术学院 | Color image quick encryption method |
CN104574257A (en) * | 2014-12-30 | 2015-04-29 | 刘红军 | Chaos-based image encryption and decryption algorithm |
CN105118017A (en) * | 2015-08-06 | 2015-12-02 | 河海大学 | Gray image encryption method based on two-dimension Henon mapping |
CN105447396A (en) * | 2015-12-15 | 2016-03-30 | 西安电子科技大学 | Fractional domain image encryption method based on Arnold transformation and compound chaos |
CN106709854A (en) * | 2016-12-20 | 2017-05-24 | 西安电子科技大学 | Cat mapping and chaos based image information fusion and encryption method |
CN107220923A (en) * | 2017-02-14 | 2017-09-29 | 陕西师范大学 | Digital picture feedback encryption method based on image network |
CN107392970A (en) * | 2017-07-12 | 2017-11-24 | 湖北民族学院 | A kind of digital image encryption algorithm based on bit plane and high-dimension chaotic system |
CN107833174A (en) * | 2017-08-11 | 2018-03-23 | 西京学院 | A kind of image encryption method based on Logistic chaos system algorithms |
CN109660695A (en) * | 2018-12-06 | 2019-04-19 | 广西师范大学 | A kind of color image encrypting method based on Global Genetic Simulated Annealing Algorithm and chaotic maps |
CN111179146A (en) * | 2019-12-19 | 2020-05-19 | 胡友彬 | Meteorological marine data encryption system based on satellite communication |
CN111224771A (en) * | 2020-01-13 | 2020-06-02 | 燕山大学 | Management coding encryption and decryption method based on principal component analysis and Henon mapping |
CN111832035A (en) * | 2019-04-23 | 2020-10-27 | 北京掌慧纵盈科技股份有限公司 | Image encryption storage method and device |
CN114389787A (en) * | 2021-12-06 | 2022-04-22 | 中南大学 | Carrier-free information hiding method and system based on chaotic system and computer storage medium |
CN114389787B (en) * | 2021-12-06 | 2024-05-07 | 中南大学 | Carrier-free information hiding method and system based on chaotic system and computer storage medium |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103208288A (en) * | 2013-03-13 | 2013-07-17 | 漳州职业技术学院 | Dual encryption based discrete wavelet transform-discrete cosine transform (DWT-DCT) domain audio public watermarking algorithm |
-
2013
- 2013-09-04 CN CN2013103971309A patent/CN103442157A/en active Pending
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103208288A (en) * | 2013-03-13 | 2013-07-17 | 漳州职业技术学院 | Dual encryption based discrete wavelet transform-discrete cosine transform (DWT-DCT) domain audio public watermarking algorithm |
Non-Patent Citations (4)
Title |
---|
刘晓克等: "Henon映射的图像加密新算法", 《中国计量学院学报》, vol. 19, no. 04, 15 December 2008 (2008-12-15) * |
田汉清等: "一种结合Cat映射和Henon映射的图像加密技术", 《计算机应用与软件》, vol. 27, no. 09, 30 September 2010 (2010-09-30), pages 286 - 288 * |
郑凡等: "基于Henon映射的数字图像加密", 《北京邮电大学学报》, vol. 31, no. 01, 15 February 2008 (2008-02-15) * |
陆铭鑫: "数字图像水印技术研究", 《中国优秀硕士学位论文全文数据库信息科技辑》, 15 March 2013 (2013-03-15) * |
Cited By (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103780794A (en) * | 2013-12-17 | 2014-05-07 | 中山大学深圳研究院 | Image encryption improved method based on chaotic system |
CN103929563A (en) * | 2014-04-11 | 2014-07-16 | 陕西师范大学 | Image encryption and decryption method based on improved Joseph traversal and generalized Henon mapping |
CN103971320A (en) * | 2014-04-25 | 2014-08-06 | 河海大学 | Image scrambling and restoring method based on Henon mapping |
CN103971320B (en) * | 2014-04-25 | 2018-03-13 | 河海大学 | A kind of image scrambling and restoration methods based on Henon mappings |
CN104077739A (en) * | 2014-07-03 | 2014-10-01 | 苏州大学应用技术学院 | Color image quick encryption method |
CN104574257B (en) * | 2014-12-30 | 2018-02-23 | 刘红军 | Image encryption and decipherment algorithm based on chaos |
CN104574257A (en) * | 2014-12-30 | 2015-04-29 | 刘红军 | Chaos-based image encryption and decryption algorithm |
CN105118017A (en) * | 2015-08-06 | 2015-12-02 | 河海大学 | Gray image encryption method based on two-dimension Henon mapping |
CN105447396A (en) * | 2015-12-15 | 2016-03-30 | 西安电子科技大学 | Fractional domain image encryption method based on Arnold transformation and compound chaos |
CN106709854B (en) * | 2016-12-20 | 2020-02-21 | 西安电子科技大学 | Image information fusion encryption method based on cat face transformation and chaos |
CN106709854A (en) * | 2016-12-20 | 2017-05-24 | 西安电子科技大学 | Cat mapping and chaos based image information fusion and encryption method |
CN107220923A (en) * | 2017-02-14 | 2017-09-29 | 陕西师范大学 | Digital picture feedback encryption method based on image network |
CN107392970B (en) * | 2017-07-12 | 2020-12-04 | 湖北民族学院 | Digital image encryption method based on bit plane and high-dimensional chaotic system |
CN107392970A (en) * | 2017-07-12 | 2017-11-24 | 湖北民族学院 | A kind of digital image encryption algorithm based on bit plane and high-dimension chaotic system |
CN107833174A (en) * | 2017-08-11 | 2018-03-23 | 西京学院 | A kind of image encryption method based on Logistic chaos system algorithms |
CN107833174B (en) * | 2017-08-11 | 2021-02-19 | 西京学院 | Image encryption method based on Logistic chaotic system algorithm |
CN109660695A (en) * | 2018-12-06 | 2019-04-19 | 广西师范大学 | A kind of color image encrypting method based on Global Genetic Simulated Annealing Algorithm and chaotic maps |
CN111832035A (en) * | 2019-04-23 | 2020-10-27 | 北京掌慧纵盈科技股份有限公司 | Image encryption storage method and device |
CN111179146A (en) * | 2019-12-19 | 2020-05-19 | 胡友彬 | Meteorological marine data encryption system based on satellite communication |
CN111224771A (en) * | 2020-01-13 | 2020-06-02 | 燕山大学 | Management coding encryption and decryption method based on principal component analysis and Henon mapping |
CN111224771B (en) * | 2020-01-13 | 2021-09-21 | 燕山大学 | Management coding encryption and decryption method based on principal component analysis and Henon mapping |
CN114389787A (en) * | 2021-12-06 | 2022-04-22 | 中南大学 | Carrier-free information hiding method and system based on chaotic system and computer storage medium |
CN114389787B (en) * | 2021-12-06 | 2024-05-07 | 中南大学 | Carrier-free information hiding method and system based on chaotic system and computer storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103442157A (en) | Image encryption method based on Arnold transformations and Henon chaotic system | |
CN102982499B (en) | Based on color image encryption and the decryption method of multi-fractional order chaos system | |
CN103530571A (en) | Image encryption method based on sine mapping and Logistic chaos sequence | |
CN103491279B (en) | The 4-neighborhood XOR image encryption method of Hyperchaotic Lorenz system | |
CN103440613B (en) | The color image encrypting method of hyperchaos Rossler system | |
CN103455971A (en) | Image encryption method combining three-dimensional Arnold transformation with chaotic sequence | |
CN108122188B (en) | Image encryption method | |
CN107094072B (en) | Mixed chaotic encryption method based on generalized Henon mapping | |
CN101739695A (en) | Three-dimensional Arnold mapping-based image grouping encryption method | |
CN101604439A (en) | A kind of color image encrypting method based on multi-chaos system | |
CN107330338B (en) | Color image encryption and decryption method and system based on double-chaos cross diffusion | |
CN107274457A (en) | Double color image encrypting methods based on DNA sequence dna computing and Coupling Deformation image grid | |
CN104050617B (en) | Image encryption method based on Liu chaos systems | |
CN109361830B (en) | Image encryption method based on plaintext | |
CN107292805A (en) | A kind of image encryption method based on the discrete Tchebichef conversion of multi-parameter fractional order | |
CN110225222B (en) | Image encryption method based on 3D orthogonal Latin square and chaotic system | |
Huang et al. | Duple color image encryption system based on 3D non-equilateral Arnold transform for IIoT | |
CN103258313A (en) | Image encryption method based on Henon mapping and magic cube transformation | |
Auyporn et al. | A robust image encryption method based on bit plane decomposition and multiple chaotic maps | |
Hanchinamani et al. | A novel approach for image encryption based on parametric mixing chaotic system | |
CN101895539B (en) | Scrambling-based method for combining multimedia data active encryption and passive protection | |
Shraida et al. | An Efficient Color-Image Encryption Method Using DNA Sequence and Chaos Cipher | |
Yu et al. | Image encryption algorithm based on high-dimensional chaotic systems | |
Kaur et al. | A review of image encryption schemes based on the chaotic map | |
Aihong et al. | Research on method of color image protective transmission based on Logistic map |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20131211 |