CN103442157A - Image encryption method based on Arnold transformations and Henon chaotic system - Google Patents

Image encryption method based on Arnold transformations and Henon chaotic system Download PDF

Info

Publication number
CN103442157A
CN103442157A CN2013103971309A CN201310397130A CN103442157A CN 103442157 A CN103442157 A CN 103442157A CN 2013103971309 A CN2013103971309 A CN 2013103971309A CN 201310397130 A CN201310397130 A CN 201310397130A CN 103442157 A CN103442157 A CN 103442157A
Authority
CN
China
Prior art keywords
matrix
image
henon
arnold
scramble
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013103971309A
Other languages
Chinese (zh)
Inventor
杜翠霞
张定会
张宗楠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Shanghai for Science and Technology
Original Assignee
University of Shanghai for Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Shanghai for Science and Technology filed Critical University of Shanghai for Science and Technology
Priority to CN2013103971309A priority Critical patent/CN103442157A/en
Publication of CN103442157A publication Critical patent/CN103442157A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention relates to an image encryption method based on Arnold transformations and a Henon chaotic system. Firstly, a plurality of Arnold scrambling transformations are carried out on images, then scrambling is carried out for a second time on the images through use of a Henon chaotic sequence and then the Henon chaotic sequence is used to carry out a bit-by-bit XOR operation with images to change pixel values of the images. The two technologies are adopted to carry out pixel-value position scrambling twice so that the scrambling degree of the images is higher compared with a single scrambling technology and then the chaotic sequence is adopted to change the pixel values so that any information related to plaintext is completely hidden in the encrypted images. Therefore, the method has the advantages of being great in safety and high in anti-attack ability and the like.

Description

Image encryption method based on Arnold conversion and Henon chaos system
Technical field
The present invention relates to a kind of information encryption, particularly a kind of image encryption method based on Arnold conversion and Henon chaos system.
Background technology
Along with the development of multimedia technology, digital picture has overcome the factor data amount is brought greatly in the past storage and transmission problem, and it is becoming a kind of information representation mode of main flow.Can be when network communication brings various facilities and interests to us, various potential safety hazards are also following, the hacker's event and the Internet piracy that constantly occur, make people worried to the fail safe of network communication, seriously restricting further developing of internet, applications.Moreover, some information also relates to the national security aspect, picture as captured as military applications drawing, military satellite, new weapon figure etc.Thereby the protection of view data more and more is subject to the generally attention of society.
To view data, protected two kinds of measures to take, a kind of is to realize by embed digital watermark information in digital picture the copyright protection of digital picture.Another is the image encryption technology exactly.In recent years, about image is encrypted, normally image pixel positions and pixel value are changed, the Arnold conversion is a kind of conversion commonly used in Chaotic Technology, it is a kind of conversion proposed by the mathematician V.J.Arnold of Russia, because its calculating is relatively simple, easily realize, often be applied in the encryption of image.
But the method for single change location of pixels, can not make the scramble degree of image reach comparatively ideal state sometimes.Chaos system, due to the characteristics such as pseudo-randomness of its good randomness feature, sensitiveness, ergodic and formation sequence to initial value, is studied in the image encryption field by scholars in recent years widely.The Henon chaos system is a two dimensional dynamic system, and its attractor is to be found by French astronomer M.Henon, and the sequence produced by the Henon chaos system afterwards often is employed as ciphering sequence.
Summary of the invention
The present invention be directed to current generation to the more and more higher problem of Information Security requirement, a kind of image encryption method based on Arnold conversion and Henon chaos system has been proposed, adopted two kinds of technology to carry out the location of pixels scramble twice to image, scramble Du Genggao to image, cipher round results is good, is difficult for being cracked.
Technical scheme of the present invention is: a kind of image encryption method based on Arnold conversion and Henon chaos system specifically comprises the steps:
1), choose
Figure 221346DEST_PATH_IMAGE001
gray level image
Figure 241385DEST_PATH_IMAGE002
as original image, and obtain the image pixel value matrix
Figure 354835DEST_PATH_IMAGE003
;
2), by matrix
Figure 280066DEST_PATH_IMAGE003
carry out 37 Arnold conversion reprocessings and obtain the image array after scramble one time
Figure 566690DEST_PATH_IMAGE004
;
3), choose
Figure 893767DEST_PATH_IMAGE005
as the initial value of Henon system, and by initial value substitution Henon system equation iteration
Figure 178117DEST_PATH_IMAGE006
the inferior two group encryption chaos sequences that obtain
Figure 135185DEST_PATH_IMAGE007
, wherein
Figure 163183DEST_PATH_IMAGE006
value is greater than
Figure 344766DEST_PATH_IMAGE008
square value;
4), at chaos sequence
Figure 862335DEST_PATH_IMAGE007
in at random from a certain element, get successively respectively
Figure 762158DEST_PATH_IMAGE008
individual element, composition sequence
Figure 328269DEST_PATH_IMAGE009
, and by these two sequences generation a line that sorts in turn
Figure 364358DEST_PATH_IMAGE008
the matrix of row ,
Figure 925100DEST_PATH_IMAGE008
the matrix of row one row
Figure 294902DEST_PATH_IMAGE011
, two of regenerations
Figure 513393DEST_PATH_IMAGE001
null matrix
Figure 310448DEST_PATH_IMAGE012
;
5), by matrix
Figure 919284DEST_PATH_IMAGE013
arrange by ascending order, and obtain permutation matrix
Figure 640246DEST_PATH_IMAGE014
, hypothesis matrix
Figure 650928DEST_PATH_IMAGE015
in
Figure 618884DEST_PATH_IMAGE016
column of figure is
Figure 715016DEST_PATH_IMAGE017
, so just by matrix
Figure 619704DEST_PATH_IMAGE016
row the element of row is set to 1, in like manner, and hypothesis matrix
Figure 889459DEST_PATH_IMAGE019
in
Figure 404754DEST_PATH_IMAGE016
the line number word is , so just by matrix
Figure 699786DEST_PATH_IMAGE020
row the element of row is set to 1, by that analogy, and null matrix originally
Figure 620655DEST_PATH_IMAGE012
through so becoming matrix
Figure 276414DEST_PATH_IMAGE022
, then to a scramble image array do computing:
Figure 315094DEST_PATH_IMAGE023
, obtain the image array after the secondary scramble
Figure 968929DEST_PATH_IMAGE024
;
6), at chaos sequence
Figure 928795DEST_PATH_IMAGE007
middlely choose respectively
Figure 580356DEST_PATH_IMAGE025
individual element composition sequence
Figure 360093DEST_PATH_IMAGE026
, by sequence do conversion process, obtain chaos sequence ;
7), will encrypt chaos sequence element read successively generation
Figure 534537DEST_PATH_IMAGE025
scrambled matrix
Figure 733437DEST_PATH_IMAGE028
, and with secondary scramble image array
Figure 402316DEST_PATH_IMAGE029
in element carry out xor operation by turn, obtain final encrypted image matrix
Figure 208729DEST_PATH_IMAGE030
;
8), by the encrypted image matrix
Figure 963058DEST_PATH_IMAGE031
preserve according to the graphics standard form, obtain final encrypted image;
9), decipherment algorithm is exactly the inverse operation of cryptographic algorithm, chooses the scrambled matrix used in ciphering process
Figure 965649DEST_PATH_IMAGE032
successively with the encrypted image matrix
Figure 489035DEST_PATH_IMAGE030
carry out xor operation by turn, obtain the secondary scramble image array in ciphering process ;
10), try to achieve matrix
Figure 957242DEST_PATH_IMAGE033
inverse matrix , right
Figure 688886DEST_PATH_IMAGE035
random operation is inverted: , obtain a scramble image array in ciphering process
Figure 752974DEST_PATH_IMAGE037
;
11), by matrix
Figure 159684DEST_PATH_IMAGE038
make 37 times the Arnold inverse transformation, obtain image array thereby, obtain deciphering image.
Described step 2) Arnold in is transformed to:
Figure 163730DEST_PATH_IMAGE041
mod N
Wherein
Figure 2013103971309100002DEST_PATH_IMAGE043
matrix is called transformation matrix,
Figure 924488DEST_PATH_IMAGE044
for the coordinate position of the image pixel after the Arnold conversion, mod means modular arithmetic,
Figure 2013103971309100002DEST_PATH_IMAGE045
exponent number for image.
In described step 6), conversion is treated to:
Figure DEST_PATH_IMAGE047
In described step 6) by turn xor operation be:
Figure DEST_PATH_IMAGE049
.
Beneficial effect of the present invention is: the image encryption method that the present invention is based on Arnold conversion and Henon chaos system, adopted two kinds of technology to carry out the location of pixels scramble twice to image, compared with single Chaotic Technology, its scramble Du Genggao, the chaos sequence then adopted changes pixel value, encrypted image is hidden and related any information expressly fully, there is fail safe good, the advantage such as anti-attack ability is strong.
The accompanying drawing explanation
Fig. 1 the present invention is based on encryption flow figure in the image encryption method of Arnold conversion and Henon chaos system;
Fig. 2 the present invention is based in the image encryption method of Arnold conversion and Henon chaos system to decipher flow chart;
The attraction subgraph that Fig. 3 is Henon chaos system of the present invention;
Fig. 4 is that the image encryption method that the present invention is based on Arnold conversion and Henon chaos system is implemented illustration;
Fig. 5 is scramble degree analyzing figure of the present invention;
Fig. 6 is key sensitivity resolution chart of the present invention;
Fig. 7 is the statistic histogram after tree image encryption of the present invention;
Fig. 8 is the horizontal neighbor correlation analysis in the bright ciphertext graph picture of the present invention.
Embodiment
At first image encryption method based on Arnold conversion and Henon chaos system carries out repeatedly the conversion of Arnold scramble to image, recycling Henon chaos sequence carries out the secondary scramble to it, then utilizes Henon chaos sequence and image to carry out the pixel value that XOR by turn changes image.
One, Arnold conversion:
The image coordinate of supposing a width binary digital image is
Figure 869310DEST_PATH_IMAGE050
, the Arnold conversion is defined as so:
Figure 34843DEST_PATH_IMAGE052
mod N (1)
Wherein
Figure DEST_PATH_IMAGE053
matrix is called transformation matrix,
Figure 977391DEST_PATH_IMAGE044
for the coordinate position of the image pixel after the Arnold conversion, mod means modular arithmetic,
Figure 477643DEST_PATH_IMAGE045
exponent number for image.The Arnold conversion has periodically, and, after several times Arnold conversion, image will be converted to original image.
Two, Henon chaos system:
The Henon chaos system is a two dimensional dynamic system, and its equation is defined as:
Figure 163839DEST_PATH_IMAGE054
(2)
Wherein
Figure DEST_PATH_IMAGE055
for system parameters, the impact by the research parameter on mapping, show to work as
Figure 183879DEST_PATH_IMAGE056
the time, the equal area of system dwindles at the volley, corresponding a dissipative system, and dissipative system refers to the open system of a far from equilibrium state.When
Figure DEST_PATH_IMAGE057
the time, system, in chaos state, Figure 3 shows that Henon chaos attractor figure.
Three, the image encryption method based on Arnold conversion and Henon chaos system:
Under the Matlab7.1 environment, right
Figure 359645DEST_PATH_IMAGE058
the tree gray level image carry out encryption and decryption, the initial value of getting the Henon chaos sequence is
Figure DEST_PATH_IMAGE059
, encryption and decryption flow process as depicted in figs. 1 and 2, concrete steps are as follows:
1), choose
Figure 284876DEST_PATH_IMAGE060
gray level image as original image (4(a in figure)), and obtain the image pixel value matrix
Figure 509184DEST_PATH_IMAGE039
;
2), by matrix
Figure 649309DEST_PATH_IMAGE039
carry out 37 Arnold conversion reprocessings and obtain the image array after scramble one time
Figure 668081DEST_PATH_IMAGE061
;
3), choose suitable
Figure 80608DEST_PATH_IMAGE062
as the initial value of Henon system, and by initial value substitution Henon system equation iteration
Figure 170923DEST_PATH_IMAGE006
the inferior two group encryption chaos sequences that obtain , wherein
Figure 807758DEST_PATH_IMAGE006
value is greater than
Figure 269700DEST_PATH_IMAGE008
square value;
4), at chaos sequence
Figure 835810DEST_PATH_IMAGE063
in at random from a certain element, get successively respectively individual element, composition sequence
Figure 763632DEST_PATH_IMAGE064
, and by these two sequences generation a line that sorts in turn
Figure 947489DEST_PATH_IMAGE008
the matrix of row
Figure 317290DEST_PATH_IMAGE010
,
Figure 473465DEST_PATH_IMAGE008
the matrix of row one row
Figure 83569DEST_PATH_IMAGE011
, two of regenerations
Figure 692405DEST_PATH_IMAGE060
null matrix
Figure 600318DEST_PATH_IMAGE065
;
5), by matrix
Figure 610999DEST_PATH_IMAGE066
arrange by ascending order, and obtain permutation matrix
Figure 641272DEST_PATH_IMAGE055
, hypothesis matrix
Figure 737404DEST_PATH_IMAGE015
in
Figure 449008DEST_PATH_IMAGE016
column of figure is
Figure 127245DEST_PATH_IMAGE067
, so just by matrix
Figure 266103DEST_PATH_IMAGE018
Figure 849531DEST_PATH_IMAGE016
row
Figure 427143DEST_PATH_IMAGE067
the element of row is set to 1, in like manner, and hypothesis matrix
Figure 146837DEST_PATH_IMAGE019
in
Figure 456596DEST_PATH_IMAGE016
the line number word is
Figure 527320DEST_PATH_IMAGE067
, so just by matrix
Figure 393776DEST_PATH_IMAGE020
row
Figure 714216DEST_PATH_IMAGE069
the element of row is set to 1, by that analogy, and null matrix originally
Figure 334553DEST_PATH_IMAGE065
through so becoming matrix , then to a scramble image array
Figure 620358DEST_PATH_IMAGE061
do computing:
Figure 537498DEST_PATH_IMAGE071
, obtain the image array after the secondary scramble
Figure 127355DEST_PATH_IMAGE072
;
6), at chaos sequence
Figure 522564DEST_PATH_IMAGE063
middlely choose respectively
Figure 336936DEST_PATH_IMAGE025
individual element composition sequence
Figure 221716DEST_PATH_IMAGE073
, by sequence do conversion process,
Figure 687649DEST_PATH_IMAGE047
, obtain chaos sequence
Figure 356528DEST_PATH_IMAGE074
;
7), will encrypt chaos sequence
Figure 162941DEST_PATH_IMAGE074
element read successively generation
Figure 979587DEST_PATH_IMAGE025
scrambled matrix
Figure 716599DEST_PATH_IMAGE075
, and with secondary scramble image array
Figure 239984DEST_PATH_IMAGE035
in element carry out xor operation by turn,
, obtain final encrypted image matrix
Figure 482878DEST_PATH_IMAGE077
;
8), by the encrypted image matrix
Figure DEST_PATH_IMAGE078
preserve according to the graphics standard form, obtain final encrypted image (4(b in figure));
9), decipherment algorithm is exactly the inverse operation of cryptographic algorithm.Choose the scrambled matrix used in ciphering process
Figure 786820DEST_PATH_IMAGE079
successively with the encrypted image matrix
Figure 61944DEST_PATH_IMAGE077
carry out xor operation by turn,
Figure 518464DEST_PATH_IMAGE081
, obtain the secondary scramble image array in ciphering process
Figure 853631DEST_PATH_IMAGE035
;
10), try to achieve matrix inverse matrix
Figure 723684DEST_PATH_IMAGE034
, right
Figure 221661DEST_PATH_IMAGE035
random operation is inverted:
Figure 809287DEST_PATH_IMAGE036
, obtain a scramble image array in ciphering process
Figure 759925DEST_PATH_IMAGE083
;
11), by matrix
Figure 704748DEST_PATH_IMAGE085
make 37 times the Arnold inverse transformation, obtain image array
Figure 57232DEST_PATH_IMAGE039
thereby, obtain deciphering image (Fig. 4 (c)).
For the better fail safe of this cryptographic algorithm of explanation, the present invention analyzes from the correlation between scramble degree, key sensitiveness, statistic histogram and neighbor etc. respectively.
Four, scramble degree analyzing:
For the scramble degree of verifying this algorithm higher, accompanying drawing 5(a) mean only to use the scramble image of Arnold conversion, accompanying drawing 5(b) mean only to carry out the scramble image of Henon chaos sequence, accompanying drawing 5(c) mean use Arnold conversion in this algorithm and the scramble image of two kinds of scramble modes of Henon chaos sequence.From Fig. 5 (a) and (b), (c), can find out, only the image by Arnold scramble or Henon chaos sequence scramble be far from good through the image effect of secondary scramble, image after the secondary scramble is upset putting in order of original image fully, and scramble Du Genggao is disguised better.
Five, key sensitivity analysis:
For verifying the sensitiveness of key in this algorithm, when deciphering, choose Henon chaos sequence initial value
Figure DEST_PATH_IMAGE086
for as decruption key, this is in key
Figure DEST_PATH_IMAGE088
used with encryption
Figure 250764DEST_PATH_IMAGE089
initial value only differs
Figure DEST_PATH_IMAGE090
, obtain a width mistake deciphering image as shown in Figure 6.Can find out that image and original image difference after wrong deciphering are very large, not see the information that original image is implicit fully, illustrate that this algorithm has stronger key sensitivity, can effectively resist exhaustive attack.
Six, grey level histogram analysis:
We analyze the change of bright ciphertext graph as statistical property by histogrammic comparison.From accompanying drawing 7(a), find out (b), the image histogram after encryption is evenly distributed, and the original image information feature is stashed fully, illustrates that this algorithm has the ability of well resisting statistical analysis.
Seven, the correlation analysis between neighbor:
Correlation between original image pixels is very high, in order to resist the assailant, utilizes this correlation to be decrypted, and must effectively reduce the correlation of encrypted image.Be chosen at horizontal direction, vertical direction and, to 2000 pairs of neighbor pixels on angular direction, then utilize the correlation between formula (3)-(6) calculating pixel at random from original image and encrypted image in the present invention.
Figure DEST_PATH_IMAGE092
(3)
Figure DEST_PATH_IMAGE094
(4)
Figure DEST_PATH_IMAGE096
(5)
Figure DEST_PATH_IMAGE098
(6)
Wherein
Figure 609064DEST_PATH_IMAGE099
with
Figure DEST_PATH_IMAGE100
represent respectively two gray values between neighbor.
The correlation of original image and encrypted image horizontal direction is shown in accompanying drawing 8(a), (b), coefficient correlation is respectively 0.94706 and 0.0044421, the coefficient correlation of other direction is in Table the coefficient correlation of the neighbor of 1 original image and encrypted image.From accompanying drawing 8(b) and table 1 can find out that the correlation between the pixel of encrypted image is very low, almost close to 0, illustrate that this algorithm has very strong anti-statistical attack ability.
Figure 81634DEST_PATH_IMAGE101

Claims (4)

1. the image encryption method based on Arnold conversion and Henon chaos system, is characterized in that, specifically comprises the steps:
1), choose
Figure 183461DEST_PATH_IMAGE001
gray level image
Figure 578671DEST_PATH_IMAGE002
as original image, and obtain the image pixel value matrix ;
2), by matrix
Figure 903921DEST_PATH_IMAGE003
carry out 37 Arnold conversion reprocessings and obtain the image array after scramble one time
Figure 170954DEST_PATH_IMAGE004
;
3), choose
Figure 369854DEST_PATH_IMAGE005
as the initial value of Henon system, and by initial value substitution Henon system equation iteration the inferior two group encryption chaos sequences that obtain
Figure 156731DEST_PATH_IMAGE007
, wherein
Figure 911060DEST_PATH_IMAGE006
value is greater than
Figure 648072DEST_PATH_IMAGE008
square value;
4), at chaos sequence
Figure 171457DEST_PATH_IMAGE007
in at random from a certain element, get successively respectively
Figure 538985DEST_PATH_IMAGE008
individual element, composition sequence , and by these two sequences generation a line that sorts in turn the matrix of row
Figure 699205DEST_PATH_IMAGE010
,
Figure 719857DEST_PATH_IMAGE008
the matrix of row one row
Figure 448778DEST_PATH_IMAGE011
, two of regenerations null matrix
Figure 963253DEST_PATH_IMAGE012
;
5), by matrix
Figure 734900DEST_PATH_IMAGE013
arrange by ascending order, and obtain permutation matrix
Figure 685539DEST_PATH_IMAGE014
, hypothesis matrix
Figure 568044DEST_PATH_IMAGE015
in
Figure 107479DEST_PATH_IMAGE016
column of figure is , so just by matrix
Figure 846262DEST_PATH_IMAGE016
row
Figure 318831DEST_PATH_IMAGE017
the element of row is set to 1, in like manner, and hypothesis matrix
Figure 432281DEST_PATH_IMAGE019
in
Figure 357512DEST_PATH_IMAGE016
the line number word is
Figure 270235DEST_PATH_IMAGE017
, so just by matrix
Figure 331732DEST_PATH_IMAGE020
Figure 616083DEST_PATH_IMAGE017
row the element of row is set to 1, by that analogy, and null matrix originally
Figure 966293DEST_PATH_IMAGE012
through so becoming matrix
Figure 994292DEST_PATH_IMAGE022
, then to a scramble image array
Figure 175874DEST_PATH_IMAGE004
do computing:
Figure 365547DEST_PATH_IMAGE023
, obtain the image array after the secondary scramble
Figure 452321DEST_PATH_IMAGE024
;
6), at chaos sequence
Figure 18431DEST_PATH_IMAGE007
middlely choose respectively
Figure 320100DEST_PATH_IMAGE025
individual element composition sequence
Figure 680674DEST_PATH_IMAGE026
, by sequence
Figure 5476DEST_PATH_IMAGE026
do conversion process, obtain chaos sequence
Figure 375277DEST_PATH_IMAGE027
;
7), will encrypt chaos sequence
Figure 265873DEST_PATH_IMAGE027
element read successively generation
Figure 62928DEST_PATH_IMAGE025
scrambled matrix
Figure 363109DEST_PATH_IMAGE028
, and with secondary scramble image array
Figure 536601DEST_PATH_IMAGE029
in element carry out xor operation by turn, obtain final encrypted image matrix
Figure 547282DEST_PATH_IMAGE030
;
8), by the encrypted image matrix
Figure 515238DEST_PATH_IMAGE031
preserve according to the graphics standard form, obtain final encrypted image;
9), decipherment algorithm is exactly the inverse operation of cryptographic algorithm, chooses the scrambled matrix used in ciphering process
Figure 549053DEST_PATH_IMAGE032
successively with the encrypted image matrix
Figure 260658DEST_PATH_IMAGE030
carry out xor operation by turn, obtain the secondary scramble image array in ciphering process
Figure 125845DEST_PATH_IMAGE029
;
10), try to achieve matrix
Figure 264703DEST_PATH_IMAGE033
inverse matrix
Figure 35081DEST_PATH_IMAGE034
, right random operation is inverted:
Figure 270071DEST_PATH_IMAGE036
, obtain a scramble image array in ciphering process
Figure 517512DEST_PATH_IMAGE037
;
11), by matrix
Figure 588237DEST_PATH_IMAGE038
make 37 times the Arnold inverse transformation, obtain image array
Figure 641643DEST_PATH_IMAGE039
thereby, obtain deciphering image.
2. the image encryption method based on Arnold conversion and Henon chaos system according to claim 1, is characterized in that described step 2) in Arnold be transformed to:
Figure 481423DEST_PATH_IMAGE040
mod N
Wherein
Figure 650499DEST_PATH_IMAGE041
matrix is called transformation matrix,
Figure 942940DEST_PATH_IMAGE042
for the coordinate position of the image pixel after the Arnold conversion, mod means modular arithmetic,
Figure DEST_PATH_IMAGE043
exponent number for image.
3. the image encryption method based on Arnold conversion and Henon chaos system according to claim 1, is characterized in that, in described step 6), changes and be treated to:
Figure 800037DEST_PATH_IMAGE044
4. the image encryption method based on Arnold conversion and Henon chaos system according to claim 1, is characterized in that, in described step 6) by turn xor operation be: .
CN2013103971309A 2013-09-04 2013-09-04 Image encryption method based on Arnold transformations and Henon chaotic system Pending CN103442157A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013103971309A CN103442157A (en) 2013-09-04 2013-09-04 Image encryption method based on Arnold transformations and Henon chaotic system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013103971309A CN103442157A (en) 2013-09-04 2013-09-04 Image encryption method based on Arnold transformations and Henon chaotic system

Publications (1)

Publication Number Publication Date
CN103442157A true CN103442157A (en) 2013-12-11

Family

ID=49695819

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013103971309A Pending CN103442157A (en) 2013-09-04 2013-09-04 Image encryption method based on Arnold transformations and Henon chaotic system

Country Status (1)

Country Link
CN (1) CN103442157A (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103780794A (en) * 2013-12-17 2014-05-07 中山大学深圳研究院 Image encryption improved method based on chaotic system
CN103929563A (en) * 2014-04-11 2014-07-16 陕西师范大学 Image encryption and decryption method based on improved Joseph traversal and generalized Henon mapping
CN103971320A (en) * 2014-04-25 2014-08-06 河海大学 Image scrambling and restoring method based on Henon mapping
CN104077739A (en) * 2014-07-03 2014-10-01 苏州大学应用技术学院 Color image quick encryption method
CN104574257A (en) * 2014-12-30 2015-04-29 刘红军 Chaos-based image encryption and decryption algorithm
CN105118017A (en) * 2015-08-06 2015-12-02 河海大学 Gray image encryption method based on two-dimension Henon mapping
CN105447396A (en) * 2015-12-15 2016-03-30 西安电子科技大学 Fractional domain image encryption method based on Arnold transformation and compound chaos
CN106709854A (en) * 2016-12-20 2017-05-24 西安电子科技大学 Cat mapping and chaos based image information fusion and encryption method
CN107220923A (en) * 2017-02-14 2017-09-29 陕西师范大学 Digital picture feedback encryption method based on image network
CN107392970A (en) * 2017-07-12 2017-11-24 湖北民族学院 A kind of digital image encryption algorithm based on bit plane and high-dimension chaotic system
CN107833174A (en) * 2017-08-11 2018-03-23 西京学院 A kind of image encryption method based on Logistic chaos system algorithms
CN109660695A (en) * 2018-12-06 2019-04-19 广西师范大学 A kind of color image encrypting method based on Global Genetic Simulated Annealing Algorithm and chaotic maps
CN111179146A (en) * 2019-12-19 2020-05-19 胡友彬 Meteorological marine data encryption system based on satellite communication
CN111224771A (en) * 2020-01-13 2020-06-02 燕山大学 Management coding encryption and decryption method based on principal component analysis and Henon mapping
CN111832035A (en) * 2019-04-23 2020-10-27 北京掌慧纵盈科技股份有限公司 Image encryption storage method and device
CN114389787A (en) * 2021-12-06 2022-04-22 中南大学 Carrier-free information hiding method and system based on chaotic system and computer storage medium
CN114389787B (en) * 2021-12-06 2024-05-07 中南大学 Carrier-free information hiding method and system based on chaotic system and computer storage medium

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103208288A (en) * 2013-03-13 2013-07-17 漳州职业技术学院 Dual encryption based discrete wavelet transform-discrete cosine transform (DWT-DCT) domain audio public watermarking algorithm

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103208288A (en) * 2013-03-13 2013-07-17 漳州职业技术学院 Dual encryption based discrete wavelet transform-discrete cosine transform (DWT-DCT) domain audio public watermarking algorithm

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
刘晓克等: "Henon映射的图像加密新算法", 《中国计量学院学报》, vol. 19, no. 04, 15 December 2008 (2008-12-15) *
田汉清等: "一种结合Cat映射和Henon映射的图像加密技术", 《计算机应用与软件》, vol. 27, no. 09, 30 September 2010 (2010-09-30), pages 286 - 288 *
郑凡等: "基于Henon映射的数字图像加密", 《北京邮电大学学报》, vol. 31, no. 01, 15 February 2008 (2008-02-15) *
陆铭鑫: "数字图像水印技术研究", 《中国优秀硕士学位论文全文数据库信息科技辑》, 15 March 2013 (2013-03-15) *

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103780794A (en) * 2013-12-17 2014-05-07 中山大学深圳研究院 Image encryption improved method based on chaotic system
CN103929563A (en) * 2014-04-11 2014-07-16 陕西师范大学 Image encryption and decryption method based on improved Joseph traversal and generalized Henon mapping
CN103971320A (en) * 2014-04-25 2014-08-06 河海大学 Image scrambling and restoring method based on Henon mapping
CN103971320B (en) * 2014-04-25 2018-03-13 河海大学 A kind of image scrambling and restoration methods based on Henon mappings
CN104077739A (en) * 2014-07-03 2014-10-01 苏州大学应用技术学院 Color image quick encryption method
CN104574257B (en) * 2014-12-30 2018-02-23 刘红军 Image encryption and decipherment algorithm based on chaos
CN104574257A (en) * 2014-12-30 2015-04-29 刘红军 Chaos-based image encryption and decryption algorithm
CN105118017A (en) * 2015-08-06 2015-12-02 河海大学 Gray image encryption method based on two-dimension Henon mapping
CN105447396A (en) * 2015-12-15 2016-03-30 西安电子科技大学 Fractional domain image encryption method based on Arnold transformation and compound chaos
CN106709854B (en) * 2016-12-20 2020-02-21 西安电子科技大学 Image information fusion encryption method based on cat face transformation and chaos
CN106709854A (en) * 2016-12-20 2017-05-24 西安电子科技大学 Cat mapping and chaos based image information fusion and encryption method
CN107220923A (en) * 2017-02-14 2017-09-29 陕西师范大学 Digital picture feedback encryption method based on image network
CN107392970B (en) * 2017-07-12 2020-12-04 湖北民族学院 Digital image encryption method based on bit plane and high-dimensional chaotic system
CN107392970A (en) * 2017-07-12 2017-11-24 湖北民族学院 A kind of digital image encryption algorithm based on bit plane and high-dimension chaotic system
CN107833174A (en) * 2017-08-11 2018-03-23 西京学院 A kind of image encryption method based on Logistic chaos system algorithms
CN107833174B (en) * 2017-08-11 2021-02-19 西京学院 Image encryption method based on Logistic chaotic system algorithm
CN109660695A (en) * 2018-12-06 2019-04-19 广西师范大学 A kind of color image encrypting method based on Global Genetic Simulated Annealing Algorithm and chaotic maps
CN111832035A (en) * 2019-04-23 2020-10-27 北京掌慧纵盈科技股份有限公司 Image encryption storage method and device
CN111179146A (en) * 2019-12-19 2020-05-19 胡友彬 Meteorological marine data encryption system based on satellite communication
CN111224771A (en) * 2020-01-13 2020-06-02 燕山大学 Management coding encryption and decryption method based on principal component analysis and Henon mapping
CN111224771B (en) * 2020-01-13 2021-09-21 燕山大学 Management coding encryption and decryption method based on principal component analysis and Henon mapping
CN114389787A (en) * 2021-12-06 2022-04-22 中南大学 Carrier-free information hiding method and system based on chaotic system and computer storage medium
CN114389787B (en) * 2021-12-06 2024-05-07 中南大学 Carrier-free information hiding method and system based on chaotic system and computer storage medium

Similar Documents

Publication Publication Date Title
CN103442157A (en) Image encryption method based on Arnold transformations and Henon chaotic system
CN102982499B (en) Based on color image encryption and the decryption method of multi-fractional order chaos system
CN103530571A (en) Image encryption method based on sine mapping and Logistic chaos sequence
CN103491279B (en) The 4-neighborhood XOR image encryption method of Hyperchaotic Lorenz system
CN103440613B (en) The color image encrypting method of hyperchaos Rossler system
CN103455971A (en) Image encryption method combining three-dimensional Arnold transformation with chaotic sequence
CN108122188B (en) Image encryption method
CN107094072B (en) Mixed chaotic encryption method based on generalized Henon mapping
CN101739695A (en) Three-dimensional Arnold mapping-based image grouping encryption method
CN101604439A (en) A kind of color image encrypting method based on multi-chaos system
CN107330338B (en) Color image encryption and decryption method and system based on double-chaos cross diffusion
CN107274457A (en) Double color image encrypting methods based on DNA sequence dna computing and Coupling Deformation image grid
CN104050617B (en) Image encryption method based on Liu chaos systems
CN109361830B (en) Image encryption method based on plaintext
CN107292805A (en) A kind of image encryption method based on the discrete Tchebichef conversion of multi-parameter fractional order
CN110225222B (en) Image encryption method based on 3D orthogonal Latin square and chaotic system
Huang et al. Duple color image encryption system based on 3D non-equilateral Arnold transform for IIoT
CN103258313A (en) Image encryption method based on Henon mapping and magic cube transformation
Auyporn et al. A robust image encryption method based on bit plane decomposition and multiple chaotic maps
Hanchinamani et al. A novel approach for image encryption based on parametric mixing chaotic system
CN101895539B (en) Scrambling-based method for combining multimedia data active encryption and passive protection
Shraida et al. An Efficient Color-Image Encryption Method Using DNA Sequence and Chaos Cipher
Yu et al. Image encryption algorithm based on high-dimensional chaotic systems
Kaur et al. A review of image encryption schemes based on the chaotic map
Aihong et al. Research on method of color image protective transmission based on Logistic map

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20131211