CN103888637B - The method of multiway images digital information chaos encryption - Google Patents

The method of multiway images digital information chaos encryption Download PDF

Info

Publication number
CN103888637B
CN103888637B CN201410136855.7A CN201410136855A CN103888637B CN 103888637 B CN103888637 B CN 103888637B CN 201410136855 A CN201410136855 A CN 201410136855A CN 103888637 B CN103888637 B CN 103888637B
Authority
CN
China
Prior art keywords
digital information
chaos
images
information
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410136855.7A
Other languages
Chinese (zh)
Other versions
CN103888637A (en
Inventor
王倩雪
禹思敏
郑汉忠
吕金虎
徐向前
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong University of Technology
Original Assignee
Guangdong University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong University of Technology filed Critical Guangdong University of Technology
Priority to CN201410136855.7A priority Critical patent/CN103888637B/en
Publication of CN103888637A publication Critical patent/CN103888637A/en
Application granted granted Critical
Publication of CN103888637B publication Critical patent/CN103888637B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Facsimile Transmission Control (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of method of multiway images digital information chaos encryption, comprise the following steps:Set up n dimension discrete chaotic system kinetics equations;Using above-mentioned 7 degree of freedom discrete chaotic system kinetics equation, after the n m+1 real number chaos sequences that iteration is produced are rounded, binary digital information is converted to by digital information encryption equipment, then the digital information with n m+1 width images carries out XOR, respectively obtains the ciphertext value of n m+1 width images;Ciphertext value is sent to digital information decipher by digital transmission channel again.Only realize being encrypted 3 tunnel image informations simultaneously using a 7 degree of freedom chaos system.Due to using Cascading Closed Loop principle, transmitting terminal system has identical drive signal with receiving terminal system, can realize that strict synchronization, without being influenceed by useful information size modulations, in the case where transmitting terminal is matched with receiving terminal parameter, makes the information for decrypting have reduction degree high.

Description

The method of multiway images digital information chaos encryption
Technical field
The present invention relates to a kind of method of Image Chaos encryption, specifically a kind of multiway images digital information chaos encryption Method.
Background technology
The problem of chaos how is generated in continuous or discrete-time system and then becomes natural science in recent years and work A forward position focus problem in journey application field.1994, American scientist Schiff et al. was in well-known International Periodicals Published an article on Nature and propose the concept of Anti-control for chaos in the world first.It is 1996 after 2 years, relevant discrete The revertive control Study on Problems of time system achieves substantial progress in the world.The revertive control method of discrete-time system is built Stand on the basis of chaos existence criterion, it is proposed that be typically designed criterion with versatility and universality, for example, obtain Successful Chen-Lai algorithms and Wang-Chen algorithms etc., so as to solve the one of discrete-time system revertive control in theory As problem.
Digital communication system is with its strong antijamming capability, it is easy to encrypt, it is easy to the features such as large-scale integrated, in the communications industry It is middle will substitution analogue communication and in the highest flight.And, digital chaotic system compares simulation chaos system has simple structure, easily In realization, the advantage such as security performance is high, chaotic signal is the similar random wide spectrum signal produced by certainty equation, with excellent Good correlation properties.Chaos sequence is complicated, be difficult to long-term forecast, and need to only change acquisition by systematic parameter and state initial value Substantial amounts of excellent sequence, therefore chaos sequence is particularly suitable for being applied in secret communication and field of information encryption.Thus, chaos skill Application study of the art in digital secret communication also just has more realistic meaning.At present, digital chaotic secure communication technology is ground Study carefully and be all based on greatly one-dimensional and Two Dimensional Chaotic Systems.There are some researches show Low-dimensional Chaotic Systems confidentiality is inadequate, and it is difficult real Existing motor synchronizing.It is therefore desirable to explore the motor synchronizing encryption method based on high-dimension chaotic system or even hyperchaos.
At present, most chaos system realizes the encryption to single channel image, therefore for how to build multi-dimension Chaos system It is a direction for research that system produces multichannel chaos sequence to be encrypted multiple image simultaneously.
State Intellectual Property Office disclosed Publication No. CN102831569A on December 19th, 2012, and patent name is one Plant the patent of invention document towards the digital picture Choice encryption method of cellular service, the patent document:Including fraction ciphertext to be added The selection of wavelet low frequency subband, the determination of Image Chaos encryption key, four parts of the cryptographic operation of image and closed quality evaluation; Wherein, the determination of Image Chaos encryption key, will realize fraction wavelet transformation and chaos encryption it needs to be determined that following parameter:
(1) the control parameter α of chaos sequence, is given by user;
(2) the yardstick β of image wavelet transform, is given by user;
(3) the fractional order γ of fraction wavelet transformation, and meet 0<γ<2, be given by user;
(4) chaos sequence initial value X (0), its determination process is as follows:
It is m bits that step 1. sets original image, optional 5 pixels P1, P2, P3, P4 from selected subband, P5, the chaos sequence initial value of the subband is obtained by this 5 pixel values of point;
Step 2. calculates the chaos sequence initial value of selected wavelet sub-band according to the following formula:
Aforementioned four parameter alpha, beta, gamma, X (0) constitutes the key of selected sub-band images encryption;
The cryptographic operation of image is as follows:Step 1. is for selected wavelet low frequency subband, if the size of the subband is N1 × N2, the series of starting values X (0) generated using this fraction wavelet low frequency subband, chaos sequence is generated according to following mapping:X (n+1)=cos (α arccos (X (n)) (4), wherein, α is control parameter, and X (n) ∈ [- 1,1], the sequence for now being generated Row are chaos, because this chaos sequence is ambipolar, the unipolarity sequence in [0,1] are converted it into according to following conversion Row:The length of this sequence is taken as N1 × N2, and this N1 × N2 numerical value is converted into the chaos matrix of N1 rows N2 row, is designated as U;
Step 2. is encrypted to selected fraction wavelet low frequency subband, and encryption is calculated as follows:Wherein, it is XOR operation, ValueNew (i, j), ValueOld (i, j) be respectively after the encryption of selected fraction wavelet low frequency subband with encryption before In the low frequency sub-band fraction wavelet coefficient of the i-th row jth row;
Step 3. is replaced after the fraction wavelet low frequency subband before encryption with the fraction wavelet low frequency subband after encryption, is carried out Wavelet inverse transformation, obtains initial encryption image;
The initial encryption image segmentation that step 4. will be obtained into 4 width size identical subgraphs, afterwards to this 4 width subgraph After doing rotation treatment according to clockwise direction, the image for being obtained is exactly final encrypted image.
The technical scheme of above-mentioned patent is entirely different with the technical scheme of this patent.
The content of the invention
It is an object of the invention to provide a kind of method of the multiway images chaos encryption of strong security.The method passes through FPGA Hardware design 7 degree of freedom chaos discrete system, makes it that multi-path digital chaos sequence is produced under certain precision, using the digital chaos Sequence is encrypted simultaneously as key to multiway images information, produces multichannel chaos encryption signal.
To achieve the above object, the technical solution adopted in the present invention is:
The method of multiway images digital information chaos encryption, comprises the following steps:
A, n dimension discrete chaotic system kinetics equations are set up, the formula being encrypted to n-m+1 width images is as follows:
Wherein,It is feedback controller, σ in formulajIt is gain control parameter, εj
It is gjThe upper bound of output, 1 represents the number of feedback controling variable, m=1,2 ... ... n;
B, discrete chaotic system kinetics equation is tieed up using above-mentioned n, with being continuously increased for k values, constantly changed Generation, the n-m+1 real number chaos sequence x that iteration is producedm(k),xm+1(k),,xnK () rounds after, by digital information encryption equipment Be converted to binary digital information;
The digital information s of the n-m+1 width images that C, digital information encryption equipment will read and storedm(k),sm+1(k),,sn (k), in calling in the DDR internal memories in digital information encryption equipment;
D, cryptographic calculation:Using XOR formulaN-m+1 real number chaos after rounding Sequence xm(k),xm+1(k),,xnThe digital information s of (k) and n-m+1 width imagesm(k),sm+1(k),,snK () carries out XOR, Respectively obtain the ciphertext value p of n-m+1 width imagesm(k),pm+1(k),,pn(k);
E, information transmission:Digital information encryption equipment is respectively simultaneously by the ciphertext value p of n-m+1 width imagesm(k),pm+1(k),,pn K () sends digital information decipher to by digital transmission channel;
F, digital information decipher are using the inverse operation of cryptographic calculation to n-m+1 ciphertext value pm(k),pm+1(k),,pn(k) It is decrypted.
The n-m+1 width image is 3~6 width images.
Method to 3 road image digitization information chaos encryptions is as follows:
A, the n dimension discrete chaotic system kinetics equations using foundation, work as m=5, during n=7,7 degree of freedom discrete chaotic system Kinetics equation is as follows:
Wherein, ε1=1.8 × 1051=1.6 × 103;ε2=1.4 × 1052=1.7 × 103;ε3=1.9 × 1053=1.1 × 103
B, using above-mentioned 7 degree of freedom discrete chaotic system kinetics equation, with being continuously increased for k values, constantly changed Generation, 3 real number chaos sequence x that iteration is produced5(k),x6(k),x7K () rounds after, be converted to by digital information encryption equipment Binary digital information;
The digital information s of the 3 road images that C, digital information encryption equipment will read and stored5(k),s6(k),s7K (), adjusts In entering the DDR internal memories in digital information encryption equipment;
D, cryptographic calculation:Using XOR formula3 real number chaos sequences after rounding x5(k),x6(k),x7The digital information s of (k) and 3 road images5(k),s6(k),s7K () carries out XOR, obtain 3 simultaneously respectively The ciphertext value p of road image5(k),p6(k),p7(k);
E, information transmission:Digital information encryption equipment is respectively simultaneously by the ciphertext value p of 3 road images5(k),p6(k),p7K () leads to Cross digital transmission channel and send digital information decipher to;
F, digital information decipher are using the inverse operation of cryptographic calculation to 3 ciphertext value p5(k),p6(k),p7K () is solved It is close.
In the step of described information is transmitted E, information transmission transmits a line to the pixel in 3 width images using encryption a line Information transmission mode.Digital information encryption equipment respectively simultaneously passes through the ciphertext value of each pixel in the first row of 3 road images Digital transmission channel sends digital information decipher to, is then back in step D to each pixel in the second row of 3 road images XOR is carried out, the ciphertext value of each pixel in the second row of 3 road images is obtained, digital information solution is then transferred to Close device;By that analogy, the information transmission of the ciphertext value of the pixel of all rows of 3 road images is completed.
Beneficial effects of the present invention:
(1) only realized to 3 tunnel image informations while being encrypted using a 7 degree of freedom chaos system.
(2) due to using Cascading Closed Loop principle, transmitting terminal system and receiving terminal system have identical drive signal, Strict synchronization can be realized without being influenceed by useful information size modulations, in the situation that transmitting terminal is matched with receiving terminal parameter Under, make the information for decrypting that there is reduction degree high.
Brief description of the drawings
The present invention is described in further detail with reference to the accompanying drawings and detailed description:
Fig. 1 is the x that 7 degree of freedom chaos system is produced1(k)-x2The phasor of (k);
Fig. 2 is the 7 degree of freedom drive system of digital information encryption equipment;
Fig. 3 is the 7 degree of freedom response system of digital information decipher;
Fig. 4 is AES flow chart;
Fig. 5 is decipherment algorithm flow chart.
Specific embodiment
Embodiment:To the hardware configuration of the method for 3 road image digitization information chaos encryptions:With two pieces of XUP Virtex-II FPGA plates respectively as digital information encryption equipment and digital information decipher, set up one using two pieces of FPGA development boards Server-Client models, set up the respective socket of Server and Client, as the basis of intercommunication.Multichannel drives The FPGA plates of chaotic systems encryption equipment are responsible for being transmitted cipher-text information as Client ends;Multichannel chaos motion Solutions of Systems The cipher-text information that the FPGA plates of close device are transmitted as Server ends, responsible reception.In addition, digital information transmission channel is used Datagram formula Socket type transfers, i.e., be served by corresponding to connectionless UDP, employs the UPD agreements of transport layer, works as clothes When business device termination receives the dependent instruction of client, the view data for transmitting can be quickly and efficiently received.
To the method for 3 road image digitization information chaos encryptions, 7 degree of freedom chaos system is employed, it is mixed with system generation encryption Ignorant sequence has the advantage that:One is that the more general low-dimensional system of system architecture is complicated, and the real-valued sequence of system variable more can not Prediction;7 degree of freedom chaos system one has six attractor phasors, here with x1(k)-x2As a example by (k) phasor, as shown in Figure 1.From figure Can intuitively find out, the distribution of point is more concentrated, be global bounded.Two is that the system realizes motor synchronizing, even if driving and responding Also can correctly be decrypted when system initial value is different, this illustrates when data have fractional transmission mistake, incited somebody to action Not impact effect, the key space of AES will be much higher than Low-dimensional Chaotic Systems, specific 3 road image digitization information chaos The method of encryption is as follows:
A, the n dimension discrete chaotic system kinetics equations using foundation, work as m=5, during n=7,7 degree of freedom discrete chaotic system Kinetics equation is as follows:
Wherein, ε1=1.8 × 1051=1.6 × 103;ε2=1.4 × 1052=1.7 × 103;ε3=1.9 × 1053 =1.1 × 103
B, using above-mentioned 7 degree of freedom discrete chaotic system kinetics equation, choose x5(k),x6(k),x7K () is (in order to be able to incite somebody to action Three variables of information encryption equipment are distinguished with three variables of digital information decipher, by the x of information encryption equipment5(k),x6 (k),x7K () three variable-definitions areOther parameters in 7 degree of freedom discrete chaotic system kinetics equation It is similar with it;By the x of information decipher5(k),x6(k),x7K () three variable-definitions are7 degree of freedom is discrete Other parameters in chaos system kinetics equation are similar with it), the real number chaos sequence produced after three iteration of variables is rounded Afterwards, binary digital information is converted to by digital information encryption equipment;
The digital information s of the 3 road images that C, digital information encryption equipment will read and stored5(k),s6(k),s7K (), adjusts In entering the DDR internal memories in digital information encryption equipment.Detailed process is:In encryption transmitting terminal, that is, digital information encryption equipment, will 24 BMP figures of 3 160 × 120 are stored in the CF cards in it, are easy to the image reading of next step, then by slow in it Area is rushed, during 3 road images are read in into DDR internal memories respectively;
D, cryptographic calculation:Using XOR formula3 real number chaos sequences after rounding x5(k),x6(k),x7The digital information s of (k) and 3 road images5(k),s6(k),s7K () carries out XOR, obtain 3 simultaneously respectively The ciphertext value p of road image5(k),p6(k),p7(k), by p5(k),p6(k),p7K () is applied to digital letter as feedback controling variable On the equation of the 7 degree of freedom drive system (as shown in Figure 2) of encryption for information device, the 7 degree of freedom drive system shape of digital information encryption equipment is obtained State equation is as follows:
Similarly, for digital information decipher is as data receiver, by p5(k),p6(k),p7K () is used as feedback Control variables is applied on the equation of 7 degree of freedom response system (as shown in Figure 3) of digital information decipher, obtains following numeral letter Cease the 7 degree of freedom response system state equation of decipher:
In above-mentioned two equation, wherein controller
Matrix
Meanwhile,
As shown in figure 4, specific ciphering process is:The drive system of digital information decipher is judged by feedback information It is no to receive image information, if after receiving feedback information, the i-th of 3 width original images are read respectively by the operation of program J-th capable pixel, and cryptographic calculation is carried out, last pixel of the row is then determined whether, if it is not, then to this Capable+1 pixel of jth is encrypted computing, if last pixel of the row, then the i-th row in 3 road images is all All encryption is finished pixel, then into information transfer step.
E, information transmission:Digital information encryption equipment is respectively simultaneously by the ciphertext value p of 3 road images5(k),p6(k),p7K () leads to Cross digital transmission channel and send digital information decipher to.
Specifically information transmission is:The information transmission mode of a line is transmitted using encryption a line to the pixel in 3 width images, In other words, information transmission is used and transmitted in units of a line, and digital information encryption equipment is respectively simultaneously by 3 road images The first row in the ciphertext value of each pixel digital information decipher is sent to by digital transmission channel, be then back to step XOR is carried out to each pixel in the second row of 3 road images in D, each pixel in the second row of 3 road images is obtained Ciphertext value, be then transferred to digital information decipher;By that analogy, the pixel of all rows of 3 road images of completion is close The information transmission of text value.
F, digital information decipher are using the inverse operation of cryptographic calculation to 3 ciphertext value p5(k),p6(k),p7K () is solved It is close.
It is specific as follows:In Server receiving terminals, that is, digital information decipher, judge whether to receive by feedback information To the cipher-text information transmitted from digital information encryption equipment, if after receiving feedback information, distinguished by the operation of program J-th pixel of the i-th row of 3 width original images is read, and is decrypted computing, then determine whether the row last Pixel, if it is not, then be decrypted computing to+1 pixel of jth of the row, if last pixel of the row, then 3 All decryption is finished all pixels of the i-th row in the image of road, and its decryption flow is as shown in figure 5, by that analogy, will continue to The pixel of the i+1 rows transmitted from digital information encryption equipment transmitting terminal, by that analogy, carries out similar decryption computing, until 3 Whole pixels decryption of road image is finished.
The above is the preferred embodiment of the present invention, can not limit the right model of the present invention with this certainly Enclose, it is noted that for those skilled in the art, technical scheme is modified or is waited With replacing, without departure from the protection domain of technical solution of the present invention.

Claims (4)

1. a kind of method of multiway images digital information chaos encryption, it is characterised in that:Comprise the following steps:
A, n dimension discrete chaotic system kinetics equations are set up, the formula being encrypted to n-m+1 width images is as follows:
x 1 ( k + 1 ) x 2 ( k + 1 ) x l ( k + 1 ) x l + 1 ( k + 1 ) x n ( k + 1 ) n &times; 1 = a 11 a 12 a 1 n a 21 a 22 a 2 n a n 1 a n 2 a n n n &times; n x 1 ( k ) x 2 ( k ) x l ( k ) x l + 1 ( k ) x n ( k ) n &times; 1 + mod ( &sigma; 1 x m , &epsiv; 1 ) mod ( &sigma; 2 x m + 1 , &epsiv; 2 ) mod ( &sigma; l x n , &epsiv; l ) 0 0 n &times; 1 ,
Wherein,It is feedback controller, σ in formulajIt is gain control parameter, εjIt is gj The upper bound of output, 1 represents the number of feedback controling variable, m=1,2 ... ... n;
B, discrete chaotic system kinetics equation is tieed up using above-mentioned n, with being continuously increased for k values, carry out constantly iteration, general The n-m+1 real number chaos sequence x that iteration is producedm(k),xm+1(k),,xnK () rounds after, changed by digital information encryption equipment It is binary digital information;
The digital information s of the n-m+1 width images that C, digital information encryption equipment will read and storedm(k),sm+1(k),,sn(k), In calling in the DDR internal memories in digital information encryption equipment;
D, cryptographic calculation:Using XOR formulaN-m+1 real number chaos sequence after rounding xm(k),xm+1(k),,xnThe digital information s of (k) and n-m+1 width imagesm(k),sm+1(k),,snK () carries out XOR, respectively Obtain the ciphertext value p of n-m+1 width imagesm(k),pm+1(k),,pn(k);
E, information transmission:Digital information encryption equipment is respectively simultaneously by the ciphertext value p of n-m+1 width imagesm(k),pm+1(k),,pn(k) Digital information decipher is sent to by digital transmission channel;
F, digital information decipher are using the inverse operation of cryptographic calculation to n-m+1 ciphertext value pm(k),pm+1(k),,pn(k) carry out Decryption.
2. the method for multiway images digital information chaos encryption according to claim 1, it is characterised in that:The n-m+1 Width image is 3~6 width images.
3. the method for multiway images digital information chaos encryption according to claim 2, it is characterised in that:
Method to 3 road image digitization information chaos encryptions is as follows:
A, the n dimension discrete chaotic system kinetics equations using foundation, work as m=5, during n=7,7 degree of freedom discrete chaotic system power Learn equation as follows:
Wherein, ε1=1.8 × 1051=1.6 × 103;ε2=1.4 × 1052=1.7 × 103;ε3=1.9 × 1053=1.1 ×103
B, using above-mentioned 7 degree of freedom discrete chaotic system kinetics equation, with being continuously increased for k values, carry out constantly iteration, 3 real number chaos sequence x that iteration is produced5(k),x6(k),x7K () rounds after, two are converted to by digital information encryption equipment The digital information of system;
The digital information s of the 3 road images that C, digital information encryption equipment will read and stored5(k),s6(k),s7K (), calls in number In DDR internal memories in word information encryption equipment;
D, cryptographic calculation:Using XOR formula3 real number chaos sequence x after rounding5 (k),x6(k),x7The digital information s of (k) and 3 road images5(k),s6(k),s7K () carries out XOR, obtain 3 tunnels simultaneously respectively The ciphertext value p of image5(k),p6(k),p7(k);
E, information transmission:Digital information encryption equipment is respectively simultaneously by the ciphertext value p of 3 road images5(k),p6(k),p7K () is by number Word transmission channel sends digital information decipher to;
F, digital information decipher are using the inverse operation of cryptographic calculation to 3 ciphertext value p5(k),p6(k),p7K () is decrypted.
4. the method for multiway images digital information chaos encryption according to claim 3, it is characterised in that:Described information is passed In the step of sending E, the information transmission mode of a line is transmitted using encryption a line to the pixel in 3 width images.
CN201410136855.7A 2014-04-08 2014-04-08 The method of multiway images digital information chaos encryption Active CN103888637B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410136855.7A CN103888637B (en) 2014-04-08 2014-04-08 The method of multiway images digital information chaos encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410136855.7A CN103888637B (en) 2014-04-08 2014-04-08 The method of multiway images digital information chaos encryption

Publications (2)

Publication Number Publication Date
CN103888637A CN103888637A (en) 2014-06-25
CN103888637B true CN103888637B (en) 2017-06-13

Family

ID=50957350

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410136855.7A Active CN103888637B (en) 2014-04-08 2014-04-08 The method of multiway images digital information chaos encryption

Country Status (1)

Country Link
CN (1) CN103888637B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104135669B8 (en) * 2014-07-16 2017-10-10 广东工业大学 A kind of video secret communication method of multi-dimension Chaos mapping
TWI571092B (en) * 2015-09-04 2017-02-11 崑山科技大學 Encryption system for safe transmission of network data with adaptive synchronization of hyperchaotic signals free from external interference and parameter disturbance, and method for the same
CN108365946B (en) * 2018-01-31 2023-04-11 国网河南省电力公司潢川县供电公司 Energy internet communication safety system and method based on chaotic system array
CN108199825A (en) * 2018-03-14 2018-06-22 长安大学 A kind of file-type read-write secret communication method based on chaos system
CN108683490B (en) * 2018-07-11 2023-10-31 佛山科学技术学院 Multi-scroll chaotic circuit
CN109726577B (en) * 2019-01-10 2020-08-18 首都师范大学 Image encryption method and device
CN111932430B (en) * 2020-01-15 2023-05-26 南京信息工程大学 Image encryption method based on FPGA
CN113257260A (en) * 2021-04-09 2021-08-13 中国质量认证中心 Transmission method and terminal equipment for secret communication of mobile phone

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5930364A (en) * 1996-03-29 1999-07-27 Daewoo Heavy Industries Ltd. Synchronized chaotic system and communication system using synchronized chaotic system
CN102123026A (en) * 2011-04-12 2011-07-13 南开大学 Chaos and hyperchaos based two-level video streaming media encryption method
CN102176759A (en) * 2011-02-15 2011-09-07 天津理工大学 Method for encrypting video streaming information based on hyper-chaotic sequence

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5930364A (en) * 1996-03-29 1999-07-27 Daewoo Heavy Industries Ltd. Synchronized chaotic system and communication system using synchronized chaotic system
CN102176759A (en) * 2011-02-15 2011-09-07 天津理工大学 Method for encrypting video streaming information based on hyper-chaotic sequence
CN102123026A (en) * 2011-04-12 2011-07-13 南开大学 Chaos and hyperchaos based two-level video streaming media encryption method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于超混沌的保密通信系统;禹思敏,丘水生;《电波科学学报》;20010630;第16卷(第2期);全文 *

Also Published As

Publication number Publication date
CN103888637A (en) 2014-06-25

Similar Documents

Publication Publication Date Title
CN103888637B (en) The method of multiway images digital information chaos encryption
Sheela et al. Image encryption based on modified Henon map using hybrid chaotic shift transform
Zhang et al. Embedding cryptographic features in compressive sensing
US11734435B2 (en) Image encryption and decryption communication algorithm based on two-dimensional lag complex logistic map
CN109412808B (en) Image transmission method and system based on finite time synchronization of memristive chaotic system
CN107770405A (en) Image encryption method and device
CN104751403A (en) Multi-chaos system based method of encrypting images related to plaintext
US10924263B2 (en) Systems and methods for facilitating iterative key generation and data encryption and decryption
Liu et al. A novel color image encryption algorithm based on quantum chaos sequence
Abusukhon et al. New direction of cryptography: A review on text-to-image encryption algorithms based on RGB color value
US10965456B2 (en) Systems and methods for facilitating data encryption and decryption and erasing of associated information
CN112183767A (en) Multi-key lower model aggregation federal learning method and related equipment
CN110677236A (en) OFDM encryption method based on composite chaotic system and XOR operation
CN108924594B (en) Video encryption method based on hyperchaotic system
CN104320241A (en) Video secure communication method based on integer field chaos
CN111199047B (en) Data encryption method, data decryption method, device, equipment and storage medium
CN116846542A (en) Data encryption and decryption method and device and electronic equipment
JP5689826B2 (en) Secret calculation system, encryption apparatus, secret calculation apparatus and method, program
EP3131230B1 (en) Encryption method, program, and system
US10860403B2 (en) Systems and methods for facilitating truly random bit generation
Ramírez-Torres et al. Fpga implementation of a reconfigurable image encryption system
CN104135669A (en) Video secret communication method for high-dimensional chaotic mapping
Karolin et al. Encryption and decryption of color images using visual cryptography
CN109743156B (en) Packet encryption and decryption method and device
Bajaj et al. AES algorithm for encryption

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information

Inventor after: Wang Qianxue

Inventor after: Yu Simin

Inventor after: Zheng Hanzhong

Inventor after: Xu Xiangqian

Inventor before: Zheng Hanzhong

Inventor before: Yu Simin

Inventor before: Xu Xiangqian

Inventor before: Wang Qianxue

COR Change of bibliographic data
CB03 Change of inventor or designer information

Inventor after: Wang Qianxue

Inventor after: Yu Simin

Inventor after: Zheng Hanzhong

Inventor after: Lv Jinhu

Inventor after: Xu Xiangqian

Inventor before: Wang Qianxue

Inventor before: Yu Simin

Inventor before: Zheng Hanzhong

Inventor before: Xu Xiangqian

CB03 Change of inventor or designer information
GR01 Patent grant
GR01 Patent grant