CN104135669A - Video secret communication method for high-dimensional chaotic mapping - Google Patents

Video secret communication method for high-dimensional chaotic mapping Download PDF

Info

Publication number
CN104135669A
CN104135669A CN201410336408.6A CN201410336408A CN104135669A CN 104135669 A CN104135669 A CN 104135669A CN 201410336408 A CN201410336408 A CN 201410336408A CN 104135669 A CN104135669 A CN 104135669A
Authority
CN
China
Prior art keywords
video
pixel
serial number
mapping
dimensional coordinate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410336408.6A
Other languages
Chinese (zh)
Other versions
CN104135669B (en
CN104135669B8 (en
Inventor
林卓胜
禹思敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong University of Technology
Original Assignee
Guangdong University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong University of Technology filed Critical Guangdong University of Technology
Priority to CN201410336408.6A priority Critical patent/CN104135669B8/en
Publication of CN104135669A publication Critical patent/CN104135669A/en
Publication of CN104135669B publication Critical patent/CN104135669B/en
Application granted granted Critical
Publication of CN104135669B8 publication Critical patent/CN104135669B8/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Medicines Containing Antibodies Or Antigens For Use As Internal Diagnostic Agents (AREA)
  • Magnetic Resonance Imaging Apparatus (AREA)

Abstract

The invention discloses a video secret communication method for high-dimensional chaotic mapping. The method comprises the following steps: establishing a kinetic equation of eight-dimensional discrete chaotic mapping; acquiring a mapping table of a video pixel position scrambling encryption algorithm according to a formula in which the loop number of eight nested loops from 0 to 3 is equal to the pixel number of one frame of image; performing encryption operation: (1) numbering each pixel in a two-dimensional video image; (2) constructing a sequence number after video pixel position scrambling encryption; and (3) mapping the pixel value of an original position S to a position E(S) by using a video pixel position scrambling encryption algorithm mapping table to obtain the cipher text value of the frame of image; transmitting information; and performing inverse mapping on the cipher text value through a mapping table generated in the same way by using a client to realize decryption. Compared with methods of the same type, the method has the characteristics of high confidentiality and high encryption reduction degree.

Description

A kind of video secret communication method of multi-dimension Chaos mapping
Technical field
The present invention relates to video secret communication method, specifically a kind of video secret communication method of multi-dimension Chaos mapping.
Background technology
Within 1989, British mathematician Mattllews has proposed a kind of text cryptography scheme based on 1 dimensional Logistic Map first.From then on chaos encryption becomes the focus of research.Chaos system is applied to image encryption, first by Fridrich, in 1997, proposed, use two-dimentional Baker mapping and Cat mapping to carry out the conversion of location of pixels, but the key space of two-dimentional Cat mapping is too small, is confined to square sized images to encrypt simultaneously.Chen and Mao, on the basis of Fridrich, arrive three-dimensional by two-dimentional Baker mapping and two-dimentional Cat mapped extension, and utilize respectively three-dimensional mapping to propose an Image Encryption Scheme fast.Feng etc. utilize chaos to stretch and folding principle has proposed to utilize again the thought that image is cut apart to propose a kind of chaotic maps image encryption algorithm after line map image cryptographic algorithm.2 D chaotic mapping is in recent years extended to three dimensions and carries out image encryption, as the 3D Baker map image encryption algorithm that the people such as Mao propose, and the 3D Cat map image encryption algorithm that Chen G proposes.
It is CN102831569A that State Intellectual Property Office discloses publication number on December 19th, 2012, patent name is the patent of invention document that a kind of digital picture towards cellular service is selected encryption method, this patent documentation: comprise the selection of mark small echo low frequency sub-band to be encrypted, cryptographic operation and the closed quality definite, image of Image Chaos encryption key are evaluated four parts; Wherein, determining of Image Chaos encryption key, realize mark wavelet transformation and chaos encryption and need to determine following parameter:
(1) the control parameter alpha of chaos sequence, is provided by user;
(2) the yardstick β of image wavelet transform, is provided by user;
(3) the fractional order γ of mark wavelet transformation, and meet 0< γ <2, by user, provided;
(4) chaos sequence initial value X (0), its deterministic process is as follows:
It is m bit that step 1. is established original image, optional 5 pixel P1 from selecteed subband, and P2, P3, P4, P5, is obtained the chaos sequence initial value of this subband by the pixel value of these 5 points;
Step 2. is calculated the chaos sequence initial value of selected wavelet sub-band according to following formula:
Above-mentioned four parameter alpha, beta, gamma, X (0) forms the key that selected sub-band images is encrypted;
The cryptographic operation of image is as follows: step 1. is for selected small echo low frequency sub-band, if the size of this subband is N1 * N2, the serial initial value X (0) that utilizes this mark small echo low frequency sub-band to generate, according to following mapping, generate chaos sequence: X (n+1)=cos (α arccos (X (n)) (4), wherein, α controls parameter, and X (n) ∈ [1, 1], the sequence that now generated is chaos, because this chaos sequence is ambipolar, according to following conversion, convert it into [0, 1] the unipolarity sequence in: the length of this sequence is taken as N1 * N2, and convert this N1 * N2 numerical value to chaos matrix that the capable N2 of N1 is listed as, be designated as U,
Step 2. pair selected mark small echo low frequency sub-band is encrypted, encryption is calculated as follows: wherein, it is XOR computing, ValueNew (i, j), ValueOld (i, j) is respectively after selected mark small echo low frequency sub-band is encrypted and encrypts the front low frequency sub-band mark wavelet coefficient at the capable j row of i;
Step 3., with after the mark small echo low frequency sub-band before the mark small echo low frequency sub-band Substitution encryption after encrypting, is carried out wavelet inverse transformation, obtains initial encryption image;
Step 4. is divided into the identical subimage of 4 width size by obtained initial encryption image, afterwards this 4 width subimage is done after rotation processing according to clockwise direction, and the image obtaining is exactly final encrypted image.
The technical scheme of above-mentioned patent is completely different from the technical scheme of this patent.
Summary of the invention
The object of the present invention is to provide a kind of strong security, encrypt the video secret communication method of the multi-dimension Chaos mapping that reduction degree is high.
For achieving the above object, the technical solution adopted in the present invention is:
A video secret communication method for multi-dimension Chaos mapping, comprises the following steps:
A. set up the kinetics equation of 8 dimension Discrete Chaotic Maps:
In formula , building method be , wherein:
Select a kind of subscript sequence wherein for:
Obtaining corresponding transformation matrix is
Obtaining video pixel position scrambling encryption algorithm is
The second row in formula joins together to represent the nested circulation of 8 from 0 to 3 with last column;
B. by the nested circulation of above-mentioned 8 from 0 to 3, cycle-index is , equate with the pixel of a two field picture, according to above formula, the mapping table that obtains video pixel position scrambling encryption algorithm is as shown in the table:
Because above-mentioned modulo operation is mould 4 computings, therefore each in mapping table can only have four kinds of possible values,
In formula , ;
C. cryptographic calculation:
give each the pixel chronological order number in two-dimensional video image: the positional representation of the two-dimensional video image pixel that is 256 * 256 by a width size before location of pixels scrambling encryption becomes one-dimension array, have 65536 pixels, to length that should one-dimension array, be 65536, before location of pixels scrambling encryption, the corresponding serial number of each pixel, serial number each by increasing by 1 order arrangement and meeting , size be
build the serial number after the scrambling encryption of video pixel position: utilize corresponding 8 of every a line in mapping table , construct video pixel position scrambling encryption serial number afterwards, the size of corresponding serial number is
In formula , .According to above formula, due to with man-to-man, therefore also there are 65536 kinds of different values;
utilize video pixel position scrambling encryption algorithm mapping table, by origin-location, be the pixel value at place is mapped to position and is locate, obtain thus the ciphertext value of a two field picture ;
D. information transmits: server end is simultaneously by the ciphertext value of a two field picture by Ethernet, send client to;
E. the mapping table that client utilization produces with the same manner is to ciphertext value carry out anti-Mapping implementation deciphering.
Further, the step in described step C in concrete grammar as follows:
First, the two-dimensional coordinate before setting video location of pixels scrambling encryption is , the two-dimensional coordinate before encrypting with one-dimension array serial number between pass be
In formula, floor represents to round downwards, and mod is modular function;
Secondly, the two-dimensional coordinate after setting video location of pixels scrambling encryption is , the two-dimensional coordinate after encrypting with one-dimension array serial number between pass be
If corresponding two-dimensional coordinate before the scrambling encryption of position video pixel value be , corresponding two-dimensional coordinate after the scrambling encryption of position video pixel value be , so, we carry out the replacement operator computing shown in following formula
Realize the encryption of the position scramble of video pixel, finally obtained the ciphertext value of a two field picture .
Further, the concrete decryption method in described step e is as follows: deciphering is the inverse operation of encrypting, and the mathematic(al) representation of establishing the rear respective pixel serial number of deciphering is
Two-dimensional coordinate after the deciphering of setting video pixel is , two-dimensional coordinate with one-dimension array serial number pass be
According to above formula, establish the rear corresponding two-dimensional coordinate of deciphering video pixel value be , if realize the deciphering of video image, so, we only need carry out the replacement operator computing shown in following formula , one-dimension array serial number corresponding to pixel after encrypting is reduced into , realize ciphertext value reflect the deciphering of penetrating.
Beneficial effect of the present invention: owing to having adopted above-mentioned method, compare with same class methods, there is strong security, encrypt the high feature of reduction degree.
Accompanying drawing explanation
Below in conjunction with the drawings and specific embodiments, the present invention is described in further detail:
Fig. 1 is the composition frame chart of the video secret signalling of multi-dimension Chaos mapping;
Fig. 2 is Client end workflow diagram;
Fig. 3 is Server end workflow diagram.
Embodiment
As shown in Figure 1, 2, 3, the hardware configuration to video multi-dimension Chaos mapping encrypting: set up a Server-Client model with the ARM plate of two Super 4412, set up Server and Client socket separately, as the basis of intercommunication.The ARM development board of image real-time acquisition, multi-dimension Chaos mapping encrypting is held as Client, camera, V4L2 driving, jpeg decompression contracting, chaos encryption, H.264 compression, network interface card driving, ethernet port, eight parts of LCDs, consist of, the video data by chaos encryption and after H.264 compressing transmits through Ethernet.The ARM development board of multi-dimension Chaos mapping deciphering is held as Server, the cipher-text information that responsible reception transmits.Ethernet port, network interface card driving, H.264 decompression, chaos decode, five parts of LCDs form, it is at Client end and Server end, be all to move built-in Linux operating system on Cortex-A9 type processor, by C++, programme to realize the function of above-mentioned corresponding part.Because the vedio data of USB camera output is the JPEG compressed format after hardware encoding, therefore, first need every frame jpeg image to carry out after jpeg decompression contracting, just can obtain corresponding RGB three primary colors video format.In addition, local area network communication adopts socket programming, adopts connection-oriented, Transmission Control Protocol reliably.
Utilize above-mentioned hardware configuration, realize video secure communication, a kind of video secret communication method of multi-dimension Chaos mapping, comprises the following steps:
A. set up the kinetics equation of 8 dimension Discrete Chaotic Maps:
In formula , building method be , wherein:
Select a kind of subscript sequence wherein for:
Obtaining corresponding transformation matrix is
Obtaining video pixel position scrambling encryption algorithm is
The second row in formula joins together to represent the nested circulation of 8 from 0 to 3 with last column;
B. by the nested circulation of above-mentioned 8 from 0 to 3, cycle-index is , equate with the pixel of a two field picture, according to above formula, the mapping table that obtains video pixel position scrambling encryption algorithm is as shown in the table:
Because above-mentioned modulo operation is mould 4 computings, therefore each in mapping table can only have four kinds of possible values,
In formula , ;
C. cryptographic calculation:
give each the pixel chronological order number in two-dimensional video image: the positional representation of the two-dimensional video image pixel that is 256 * 256 by a width size before location of pixels scrambling encryption becomes one-dimension array, have 65536 pixels, to length that should one-dimension array, be 65536, before location of pixels scrambling encryption, the corresponding serial number of each pixel, serial number each by increasing by 1 order arrangement and meeting , size be
build the serial number after the scrambling encryption of video pixel position: utilize corresponding 8 of every a line in mapping table , construct video pixel position scrambling encryption serial number afterwards, the size of corresponding serial number is
In formula , .According to above formula, due to with man-to-man, therefore also there are 65536 kinds of different values;
utilize video pixel position scrambling encryption algorithm mapping table, by origin-location, be the pixel value at place is mapped to position and is locate, obtain thus the ciphertext value of a two field picture , concrete grammar is as follows:
First, the two-dimensional coordinate before setting video location of pixels scrambling encryption is , the two-dimensional coordinate before encrypting with one-dimension array serial number between pass be
In formula, floor represents to round downwards, and mod is modular function;
Secondly, the two-dimensional coordinate after setting video location of pixels scrambling encryption is , the two-dimensional coordinate after encrypting with one-dimension array serial number between pass be
If corresponding two-dimensional coordinate before the scrambling encryption of position video pixel value be , corresponding two-dimensional coordinate after the scrambling encryption of position video pixel value be , so, we carry out the replacement operator computing shown in following formula
Realize the encryption of the position scramble of video pixel, finally obtained the ciphertext value of a two field picture .
D. information transmits: server end is simultaneously by the ciphertext value of a two field picture by Ethernet, send client to;
E. the mapping table that client utilization produces with the same manner is to ciphertext value carry out anti-Mapping implementation deciphering.
Deciphering is the inverse operation of encrypting, and the mathematic(al) representation of establishing the rear respective pixel serial number of deciphering is
Two-dimensional coordinate after the deciphering of setting video pixel is , two-dimensional coordinate with one-dimension array serial number pass be
According to above formula, establish the rear corresponding two-dimensional coordinate of deciphering video pixel value be , if realize the deciphering of video image, so, we only need carry out the replacement operator computing shown in following formula , one-dimension array serial number corresponding to pixel after encrypting is reduced into , realize ciphertext value reflect the deciphering of penetrating.
Decipher in two kinds of situation: transmitting terminal is identical with parameter and the key of receiving terminal, , , receiving terminal can correctly decrypt original video image; Transmitting terminal is different from parameter and the key of receiving terminal, , , receiving terminal can not correctly decrypt original video image.
Notice while realizing with ARM, on the one hand, need to consider video requirement of real-time, from speed aspect, cryptographic algorithm can not be too complicated and consuming time, and the close number of taking turns can not be too much.Conventionally in hardware experiments, choosing encryption round number is 1.ARM while realizing, the conservative estimation value of key space size is
The above is the preferred embodiment of the present invention; certainly can not limit with this interest field of the present invention; should be understood that; for those skilled in the art; technical scheme of the present invention is modified or is equal to replacement, do not depart from the protection range of technical solution of the present invention.

Claims (3)

1. a video secret communication method for multi-dimension Chaos mapping, is characterized in that, comprises the following steps:
A. set up the kinetics equation of 8 dimension Discrete Chaotic Maps:
In formula , building method be , wherein:
Select a kind of subscript sequence wherein for:
Obtaining corresponding transformation matrix is
Obtaining video pixel position scrambling encryption algorithm is
The second row in formula joins together to represent the nested circulation of 8 from 0 to 3 with last column;
B. by the nested circulation of above-mentioned 8 from 0 to 3, cycle-index is , equate with the pixel of a two field picture, according to above formula, the mapping table that obtains video pixel position scrambling encryption algorithm is as shown in the table:
S E( S,1) E ( S,2) E ( S,3) E ( S,8) 0 E (0,1) E (0,2) E (0,3) E (0,8) 1 E (1,1) E (1,2) E (1,3) E (1,8) 2 E (2,1) E (2,2) E (2,3) E (2,8) 2 16-1 E (2 16-1,1) E (2 16-1,2) E (2 16-1,3) E (2 16-1,8)
Because above-mentioned modulo operation is mould 4 computings, therefore each in mapping table can only have four kinds of possible values,
In formula , ;
C. cryptographic calculation:
give each the pixel chronological order number in two-dimensional video image: the positional representation of the two-dimensional video image pixel that is 256 * 256 by a width size before location of pixels scrambling encryption becomes one-dimension array, have 65536 pixels, to length that should one-dimension array, be 65536, before location of pixels scrambling encryption, the corresponding serial number of each pixel, serial number each by increasing by 1 order arrangement and meeting , size be
build the serial number after the scrambling encryption of video pixel position: utilize corresponding 8 of every a line in mapping table , construct video pixel position scrambling encryption serial number afterwards, the size of corresponding serial number is
In formula , ,
According to above formula, due to with man-to-man, therefore also there are 65536 kinds of different values;
utilize video pixel position scrambling encryption algorithm mapping table, by origin-location, be the pixel value at place is mapped to position and is locate, obtain thus the ciphertext value of a two field picture ;
D. information transmits: server end is simultaneously by the ciphertext value of a two field picture by Ethernet, send client to;
E. the mapping table that client utilization produces with the same manner is to ciphertext value carry out anti-Mapping implementation deciphering.
2. the video secret communication method of a kind of multi-dimension Chaos mapping according to claim 1, is characterized in that: the step in described step C in concrete grammar as follows:
First, the two-dimensional coordinate before setting video location of pixels scrambling encryption is , the two-dimensional coordinate before encrypting with one-dimension array serial number between pass be
In formula, floor represents to round downwards, and mod is modular function;
Secondly, the two-dimensional coordinate after setting video location of pixels scrambling encryption is , the two-dimensional coordinate after encrypting with one-dimension array serial number between pass be
If corresponding two-dimensional coordinate before the scrambling encryption of position video pixel value be , corresponding two-dimensional coordinate after the scrambling encryption of position video pixel value be , so, we carry out the replacement operator computing shown in following formula
Realize the encryption of the position scramble of video pixel, finally obtained the ciphertext value of a two field picture .
3. the video secret communication method of a kind of multi-dimension Chaos mapping according to claim 1, is characterized in that: the concrete decryption method in described step e is as follows: deciphering is the inverse operation of encrypting, and the mathematic(al) representation of establishing the rear respective pixel serial number of deciphering is
Two-dimensional coordinate after the deciphering of setting video pixel is , two-dimensional coordinate with one-dimension array serial number pass be
According to above formula, establish the rear corresponding two-dimensional coordinate of deciphering video pixel value be , if realize the deciphering of video image, so, we only need carry out the replacement operator computing shown in following formula , one-dimension array serial number corresponding to pixel after encrypting is reduced into , realize ciphertext value reflect the deciphering of penetrating.
CN201410336408.6A 2014-07-16 2014-07-16 A kind of video secret communication method of multi-dimension Chaos mapping Active CN104135669B8 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410336408.6A CN104135669B8 (en) 2014-07-16 2014-07-16 A kind of video secret communication method of multi-dimension Chaos mapping

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410336408.6A CN104135669B8 (en) 2014-07-16 2014-07-16 A kind of video secret communication method of multi-dimension Chaos mapping

Publications (3)

Publication Number Publication Date
CN104135669A true CN104135669A (en) 2014-11-05
CN104135669B CN104135669B (en) 2017-08-25
CN104135669B8 CN104135669B8 (en) 2017-10-10

Family

ID=51808179

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410336408.6A Active CN104135669B8 (en) 2014-07-16 2014-07-16 A kind of video secret communication method of multi-dimension Chaos mapping

Country Status (1)

Country Link
CN (1) CN104135669B8 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105049877A (en) * 2015-06-02 2015-11-11 阔地教育科技有限公司 Encryption method and device for live and recorded broadcast interaction system
CN105744294B (en) * 2016-02-04 2017-11-17 广东工业大学 The video Development of Chaotic Secure Communication Method that a kind of mobile phone is realized
CN108900868A (en) * 2018-08-14 2018-11-27 苏州科达科技股份有限公司 Based on video transmission method, device and storage medium H.264
CN109788299A (en) * 2019-03-12 2019-05-21 广东工业大学 Video transmission method, system, equipment and computer media between a kind of mobile device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101431400A (en) * 2008-12-06 2009-05-13 华中科技大学 Encryption/decryption method and system based on chaos hybrid self-synchronizing method
CN102263636A (en) * 2011-05-24 2011-11-30 浙江工业大学 Stream cipher key control method for fusing neural network with chaotic mappings
CN102831569A (en) * 2012-08-17 2012-12-19 华中师范大学 Mobile-service-oriented digital image selective encryption method
CN103473784A (en) * 2013-09-29 2013-12-25 河海大学常州校区 Blurred image self-adaptation recovering method based on high-dimensional space geometry informatics
CN103856786A (en) * 2012-12-04 2014-06-11 中山大学深圳研究院 Streaming media video encryption method and device based on H.264
CN103888637A (en) * 2014-04-08 2014-06-25 广东工业大学 Method for chaotic encryption of multi-path image digital information

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101431400A (en) * 2008-12-06 2009-05-13 华中科技大学 Encryption/decryption method and system based on chaos hybrid self-synchronizing method
CN102263636A (en) * 2011-05-24 2011-11-30 浙江工业大学 Stream cipher key control method for fusing neural network with chaotic mappings
CN102831569A (en) * 2012-08-17 2012-12-19 华中师范大学 Mobile-service-oriented digital image selective encryption method
CN103856786A (en) * 2012-12-04 2014-06-11 中山大学深圳研究院 Streaming media video encryption method and device based on H.264
CN103473784A (en) * 2013-09-29 2013-12-25 河海大学常州校区 Blurred image self-adaptation recovering method based on high-dimensional space geometry informatics
CN103888637A (en) * 2014-04-08 2014-06-25 广东工业大学 Method for chaotic encryption of multi-path image digital information

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
宋春艳: "基于混沌理论的信息加密技术研究", 《中国博士学位论文全文数据库》 *
禹思敏 李黎明: "基于局域网的混沌视频加密研究与实现", 《电子世界》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105049877A (en) * 2015-06-02 2015-11-11 阔地教育科技有限公司 Encryption method and device for live and recorded broadcast interaction system
CN105744294B (en) * 2016-02-04 2017-11-17 广东工业大学 The video Development of Chaotic Secure Communication Method that a kind of mobile phone is realized
CN108900868A (en) * 2018-08-14 2018-11-27 苏州科达科技股份有限公司 Based on video transmission method, device and storage medium H.264
CN108900868B (en) * 2018-08-14 2020-11-13 苏州科达科技股份有限公司 Video transmission method, device and storage medium based on H.264
CN109788299A (en) * 2019-03-12 2019-05-21 广东工业大学 Video transmission method, system, equipment and computer media between a kind of mobile device

Also Published As

Publication number Publication date
CN104135669B (en) 2017-08-25
CN104135669B8 (en) 2017-10-10

Similar Documents

Publication Publication Date Title
EP2791855B1 (en) Preserving image privacy when manipulated by cloud services
CN103888637B (en) The method of multiway images digital information chaos encryption
EP3195519B1 (en) Encoder, decoder and methods employing partial data encryption
CN104468090A (en) Chinese character password encoding method based on image pixel coordinates
CN105208028B (en) Data transmission method and related device and equipment
CN104135669A (en) Video secret communication method for high-dimensional chaotic mapping
Mostafa et al. A robust high capacity gray code-based double layer security scheme for secure data embedding in 3d objects
Anbarasi et al. Secured secret color image sharing with steganography
SaiChandana et al. A new visual cryptography scheme for color images
CN104883580A (en) System and method for video security convolution calculation based on homomorphic encryption
Singh et al. Image encryption scheme based on Knight's tour problem
CN105744294B (en) The video Development of Chaotic Secure Communication Method that a kind of mobile phone is realized
CN111031322B (en) BMP image encryption and decryption method and device of self-synchronizing chaotic stream cipher
CN110298363A (en) A kind of secret protection LBP feature extracting method on encrypted image
US20170041133A1 (en) Encryption method, program, and system
KR101909284B1 (en) Encryption apparatus and method for protecting digital contents on the basis of chaos map
Singh et al. DIP using image encryption and XOR operation affine transform
CN105913370A (en) Wavelet layering and combining chaos-based image encryption algorithm
Desai et al. Chaos-based system for image encryption
CN114339282A (en) Method and device for transmitting anchor image picture in live broadcast interaction
CN113806759A (en) Federal learning model training method and device, electronic equipment and storage medium
Yang et al. An encrypted image editing scheme based on homomorphic encryption
Nazneen et al. Selective bitplane encryption for secure transmission of image data in mobile environment
Gopinath et al. Image encryption for color images using bit plane and edge map cryptography algorithm
Raja et al. A review on various image encryption techniques for secure image transmission

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information

Inventor after: Lin Zhuosheng

Inventor after: Yu Simin

Inventor after: Lv Jinhu

Inventor before: Lin Zhuosheng

Inventor before: Yu Simin

COR Change of bibliographic data
GR01 Patent grant
GR01 Patent grant
CI03 Correction of invention patent

Correction item: Inventor

Correct: Lin Zhuosheng|Yu Simin|Lv Jinhu

False: Lin Zhuosheng|Yu Simin

Number: 34-02

Volume: 33

Correction item: Inventor

Correct: Lin Zhuosheng|Yu Simin|Lv Jinhu

False: Lin Zhuosheng|Yu Simin

Number: 34-02

Page: Fei Ye

Volume: 33

CI03 Correction of invention patent