CN104135669B8 - A kind of video secret communication method of multi-dimension Chaos mapping - Google Patents

A kind of video secret communication method of multi-dimension Chaos mapping Download PDF

Info

Publication number
CN104135669B8
CN104135669B8 CN201410336408.6A CN201410336408A CN104135669B8 CN 104135669 B8 CN104135669 B8 CN 104135669B8 CN 201410336408 A CN201410336408 A CN 201410336408A CN 104135669 B8 CN104135669 B8 CN 104135669B8
Authority
CN
China
Prior art keywords
video
dimensional
pixel
encryption
sequence number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410336408.6A
Other languages
Chinese (zh)
Other versions
CN104135669B (en
CN104135669A (en
Inventor
林卓胜
禹思敏
吕金虎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong University of Technology
Original Assignee
Guangdong University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong University of Technology filed Critical Guangdong University of Technology
Priority to CN201410336408.6A priority Critical patent/CN104135669B8/en
Publication of CN104135669A publication Critical patent/CN104135669A/en
Publication of CN104135669B publication Critical patent/CN104135669B/en
Application granted granted Critical
Publication of CN104135669B8 publication Critical patent/CN104135669B8/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Medicines Containing Antibodies Or Antigens For Use As Internal Diagnostic Agents (AREA)
  • Magnetic Resonance Imaging Apparatus (AREA)

Abstract

The invention discloses a kind of video secret communication method of multi-dimension Chaos mapping, comprise the following steps:Set up the kinetics equation of 8 dimension Discrete Chaotic Maps;Circulated by above-mentioned 8 from 0 to 3 nesting, cycle-index is, it is equal with the pixel of a two field picture, according to above formula, obtain the mapping table of video pixel position scrambling encryption algorithm;Cryptographic calculation:To each pixel chronological order number in two-dimensional video image;Build the serial number after the scrambling encryption of video pixel position:Using video pixel position scrambling encryption Algorithm mapping table, it is by origin-locationThe pixel value at place is mapped to positionPlace, thus obtains the ciphertext value of a two field picture;Information transmission;Client carries out anti-Mapping implementation decryption using the mapping table produced in the same fashion to ciphertext value.As a result of above-mentioned method, compared with congenic method, with strong security, the characteristics of reduction degree is high is encrypted.

Description

一种高维混纯映射的视频保密通信方法A video secure communication method based on high-dimensional mixed pure mapping

技术领域Technical field

[0001] 本发明涉及视频保密通信方法,具体是一种高维混沌映射的视频保密通信方法。 [0001] The present invention relates to a video secure communication method, specifically a high-dimensional chaotic mapping video secure communication method.

背景技术Background technique

[0002] 1989年英国数学家Mattllews首次提出了一种基于一维Logistic映射的文本密码方案。 [0002] In 1989, British mathematician Mattllews first proposed a text encryption scheme based on one-dimensional Logistic mapping. 从此混沌加密成为研宄的热点。 Since then, chaotic encryption has become a research hotspot. 混沌系统应用于图像加密,首先由Fridrich于1997年提出,使用二维的Baker映射和Cat映射进行了像素位置的变换,不过二维Cat映射的密钥空间过小,同时局限于对正方形大小图像加密。 The chaotic system is applied to image encryption. It was first proposed by Fridrich in 1997. The two-dimensional Baker map and the Cat map were used to transform the pixel position. However, the key space of the two-dimensional Cat map was too small and limited to square-sized images. encryption. Chen和Mao在Fridrich的基础上,将二维Baker 映射和二维Cat映射扩展到三维,并分别利用三维映射提出了一个快速的图像加密方案。 On the basis of Fridrich, Chen and Mao extended the two-dimensional Baker mapping and the two-dimensional Cat mapping to three-dimensional, and respectively proposed a fast image encryption scheme using three-dimensional mapping. Feng等利用混沌拉伸和折叠的原理提出了line映射图像加密算法后又利用图像分割的思想提出了一种混沌映射图像加密算法。 Feng et al. proposed a line map image encryption algorithm based on the principle of chaotic stretching and folding, and then used the idea of ​​image segmentation to propose a chaotic map image encryption algorithm. 近年来二维混沌映射被扩展到三维空间进行图像加密,如Mao等人提出的3D Baker map图像加密算法,Chen G提出的3D Catmap图像加密算法。 In recent years, two-dimensional chaotic mapping has been extended to three-dimensional space for image encryption, such as the 3D Baker map image encryption algorithm proposed by Mao et al., and the 3D Catmap image encryption algorithm proposed by Chen G.

[0003] 国家知识产权局于2012年12月19日公开了公开号为CN102831569A,专利名称为一种面向手机服务的数字图像选择加密方法的发明专利文献,该专利文献:包括待加密分数小波低频子带的选择、图像混沌加密密钥的确定、图像的加密操作及加密质量评价四部分; 其中,图像混沌加密密钥的确定,要实现分数小波变换和混沌加密需要确定以下参数: [0003] The State Intellectual Property Office published on December 19, 2012, the publication number CN102831569A, and the patent name is an invention patent document for a mobile phone service-oriented digital image selection encryption method. The patent document includes the fractional wavelet low frequency to be encrypted. The selection of subbands, the determination of the image chaotic encryption key, the image encryption operation and the evaluation of encryption quality; among them, the determination of the image chaotic encryption key requires the following parameters to be determined in order to realize the fractional wavelet transform and chaotic encryption:

[0004] (1)混沌序列的控制参数a,由用户给出; [0004] (1) The control parameter a of the chaotic sequence is given by the user;

[0005] (2)图像小波变换的尺度队由用户给出; [0005] (2) The scale team of the image wavelet transform is given by the user;

[0006] ⑶分数小波变换的分数阶数y,且满足〇< y <2,由用户给出; [0006] ⑶ The fractional order y of the fractional wavelet transform, and satisfies 〇<y<2, given by the user;

[0007] ⑷混沌序列初始值X⑼,它的确定过程如下: [0007] ⑷The initial value of the chaotic sequence X⑼, its determination process is as follows:

[0008] 步骤1.设原始图像是m比特的,从被选择的子带中任选5个像素点P1,P2,P3,P4, P5,由这5个点的像素值来获得该子带的混沌序列初始值; [0008] Step 1. Assuming that the original image is m-bit, choose 5 pixels P1, P2, P3, P4, P5 from the selected subband, and obtain the subband from the pixel values ​​of these 5 points The initial value of the chaotic sequence;

[0009] 步骤2.按照下列公式计算所选小波子带的混沌序列初始值: [0009] Step 2. Calculate the initial value of the chaotic sequence of the selected wavelet subband according to the following formula:

[0010] 上述四个参数a, ¢, Y ,x⑼构成所选子带图像加密的密钥; [0010] The above-mentioned four parameters a, ¢, Y, x⑼ constitute the key of the selected sub-band image encryption;

[0011] 图像的加密操作如下:步骤1.对于所选择的小波低频子带,设该子带的大小是N1 X N2,利用这个分数小波低频子带生成的系列初始值X (〇),按照如下映射生成混沌序列:X (n+1) =cos (a • arccos (X (n))⑷,其中,c[是控制参数,且X (n) G [-1,1],此时所生成的序列是混沌的,由于这个混沌序列是双极性的,按照下述变换将其转化成[0,1]内的单极性序列:这个序列的长度取为N1 X N2,并将这N1 X N2个数值转换成N1行N2列的混沌矩阵,记为U; [0011] The image encryption operation is as follows: Step 1. For the selected wavelet low-frequency sub-band, set the size of the sub-band to be N1 X N2, use this fractional wavelet low-frequency sub-band to generate a series of initial values ​​X (〇), according to The chaotic sequence is generated by the following mapping: X (n+1) = cos (a • arccos (X (n))⑷, where c[ is the control parameter, and X (n) G [-1, 1], at this time The generated sequence is chaotic. Since this chaotic sequence is bipolar, it is transformed into a unipolar sequence in [0,1] according to the following transformation: the length of this sequence is taken as N1 X N2, and this N1 X N2 values ​​are converted into a chaotic matrix with N1 rows and N2 columns, denoted as U;

[0012] 步骤2.对所选择的分数小波低频子带进行加密,加密按如下公式计算:其中,是X0R运算,ValueNew (i,j)、Value01d (i,j)分别是所选择分数小波低频子带加密后与加密目U 在第i行第j列的低频子带分数小波系数; [0012] Step 2. Encrypt the selected fractional wavelet low-frequency subband, and the encryption is calculated according to the following formula: Among them, is the XOR operation, ValueNew (i, j) and Value01d (i, j) are the selected fractional wavelet low-frequency, respectively After sub-band encryption, the low-frequency sub-band fractional wavelet coefficients in the i-th row and j-th column of the encrypted target U;

[0013] 步骤3.用加密后的分数小波低频子带替换加密前的分数小波低频子带之后,进行小波逆变换,获得初始加密图像; [0013] Step 3. After replacing the encrypted fractional wavelet low-frequency sub-band with the encrypted fractional wavelet low-frequency sub-band, perform inverse wavelet transform to obtain the initial encrypted image;

[0014] 步骤4.将所获得的初始加密图像分割成4幅大小相同的子图像,之后对这4幅子图像依照顺时针方向做轮换处理后,所获得的图像就是最终的加密图像。 [0014] Step 4. Divide the obtained initial encrypted image into four sub-images of the same size, and then rotate the four sub-images in a clockwise direction, and the obtained image is the final encrypted image.

[0015] 上述专利的技术方案与本专利的技术方案完全不同。 [0015] The technical solution of the above-mentioned patent is completely different from the technical solution of this patent.

发明内容Summary of the invention

[0016]本发明的目的在于提供一种保密性强、加密还原度高的高维混纯映射的视频保密通信方法。 [0016] The object of the present invention is to provide a video secure communication method of high-dimensional hybrid mapping with strong confidentiality and high degree of encryption restoration. U U

[0017] 为实现上述目的,本发明所采用的技术方案是: [0017] In order to achieve the above objective, the technical solution adopted by the present invention is:

[0018] 一种高维混沌映射的视频保密通信方法,包括以下步骤: [0018] A high-dimensional chaotic mapping video secure communication method, including the following steps:

[0019] A.建立8维离散混沌映射的动力学方程: ::¾.维.=.:访&amp;成4鐵』::光痛2¾¾十:'-:,法.為A,*,.2 :) [0019] A. Establish the dynamic equation of the 8-dimensional discrete chaotic map: ::¾. dimension.=.: visit&amp;成4铁"::light pain 2¾¾ ten:'-:, method. is A,*, .2 :)

[0020] 滅為2¾ 妒.為产) 义8勒:1 ;鐵為.1:高灰步為裒本;2,丨..:于…+為8气1^.:窆:.:8 ) [0020] Mie is 2¾ jealous. For production) Yi 8 Le: 1; Iron is .1: High gray step is a botan; 2, 丨..: Yu...+为8气1^.:窆:.:8 )

[0021] 式中Ni(i = l,2,…,8) =2,A8= (Aij)8x8(i, j = i,2,".,8)的构造方法为其中: \ /=:+i 含"i 钗”、 0 1 — 0 苟^ 0 ::,.: :〇:: ::〇0 0 1 0 •,0 0 [0021] In the formula, Ni (i = 1, 2,..., 8) = 2, A8 = (Aij) 8x8 (i, j = i, 2, "., 8) The construction method is where: \ /=: +i contains "i hairpin", 0 1 — 0 Gou^ 0 ::,.::〇::::0 0 0 1 0 •, 0 0

[0022] 〇: q: 〇... :t: •>: 〇〇〇Cif 0 (j 1' :〇. 靖0' _:0 0:… 幻〇:ii 〇:〇: i, [0022] 〇: q: 〇... :t: •>: 〇〇〇Cif 0 (j 1':〇. 靖0' _:0 0:... Magic 〇: ii 〇: 〇: i,

[0023] 下标排序〇i, j,其中i,j的取值应满足的条件为2.---,7 [0023] The subscript order 〇i, j, where the value of i, j should meet the conditions 2.---, 7

[0024] = / + 2/.,,1 [0024] = / + 2/.,,1

[0025]选择其中的一种下标排序为: [0025] One of the subscript sorts is selected as:

[0026] 〇i,j = 78,13,14,15,16,45,18,23,24,25,57,27,28,34,35,36,37,38,17,46,47, 48,56,26,58,67,68,12则相应的变换矩阵A8为Tij的乘积,得3990517 9恥8413 226236 4794X46 22802340 143956428 2426531 I 23狀78586、; 103377 170555 3300 72240 3450S4 2207175 389517 3597285 (Aa A, — 如64191 丨4931951 341X37 7246707 M4635抑217599315 36692J73 355<):5()只45 [0026] 〇i,j=78,13,14,15,16,45,18,23,24,25,57,27,28,34,35,36,37,38,17,46,47, 48, 56, 26, 58, 67, 68, 12, the corresponding transformation matrix A8 is the product of Tij, which is 3990517 9sha 8413 226236 4794X46 22802340 143956428 2426531 I 23-shaped 78586,; 103377 170555 3300 72240 3450S4 2207175 389517 3597285 (Aa A, — such as 64191 丨4931951 341X37 7246707 M4635 or 217599315 36692J73 355<): 5()个45

[0027] 4: ' 4'~ ... 4251336 7002429 162735 3440882 16357955 103167336 17326695 168341529 " ...... 1743033 28709:U 66858 1412607 6715337 42346893 7108446 69099612 \4i: -- 4a y 6081 10086 195 2703 133M 88019 leslS 143121 157々4: .:259^6 939 16023 76080: 46t016 70400 輝3々難、23712 ":mm 1446 24249 :1::151 療70;6Q44 t〇57_ :1:|:5483;1:. :/ [0027] 4: '4'~ ... 4251336 7002429 162735 3440882 16357955 103167336 17326695 168341529 "...... 1743033 28709: U 66858 1412607 6715337 42346893 7108446 69099612 \4i: - 4a y 6081 10086 195 2703 133M 88019 leslS 143121 157々4: .:259^6 939 16023 76080: 46t016 70400 辉3々difficult, 23712": mm 1446 24249 :1::151 treatment 70; 6Q44 t〇57_:1:|:5483; 1:. :/

[0028]得视频像素位置置乱加密算法为f S = 0 to^=0:3;fors=0:3;fe、=0.3;feh=〇:3;te^=〇:3;fel=0:3;fcrM^3_M:_3; ECS, 1) = mod (4,xu + AI2xu + 4,.tj,4 + A,Aa + 4^s,t + + + ^8¾.^ ^ E(S, 2) = mod(4,x, 4 +,A,x%, + A23x{J + ^4¾.* + ^si + + Ar<x^ 4 4>*:: 机?,3)=腦d ('J31xu + 人+ 4,¾ + +¾ * + 4A* + + + 為A” 4>; r ^ I 啦4) = mod (為而+ ,4A, + 4A〆心4 i + 4而+ + 4*〆〆4A* ' 你: L 」 EiS 5) = mod <4,x, ( + 4^,,^ + + ^ i + ^ < + < + + ^1,4)" E(S, 6) = mod (4,.xu + A^2x2 > + + A>x> * + + ^x〇1 + ^^7-* + ' 4), £(5; 7>= mod (4,¾ + 為/以+ 43xw + 為〆+ 為A* + 為〇xw + 為Aw + ' 4)' £(•?,8> = mod(.Vu + 為〜+ ] 4¾ + 為+ + Vw ' 4); s<-s-\ke喊etirt; 廊出雄_ [0028] The video pixel position scrambling encryption algorithm is f S=0 to^=0:3; fors=0:3; fe, =0.3; feh=〇:3; te^=〇:3; fel=0 :3;fcrM^3_M:_3; ECS, 1) = mod (4,xu + AI2xu + 4,.tj,4 + A,Aa + 4^s,t + + + ^8¾.^ ^ E(S, 2) = mod(4,x, 4 +,A,x%, + A23x{J + ^4¾.* + ^si + + Ar<x^ 4 4>*:: machine?, 3)=脑d ( 'J31xu + person + 4,¾ + +¾ * + 4A* + + + is A” 4>; r ^ I 啦4) = mod (为和+ ,4A, + 4A〆心4 i + 4和+ + 4*〆〆4A*'You: L ”EiS 5) = mod <4,x, (+ 4^,,^ + + ^ i + ^ <+ <+ + ^1, 4)" E(S, 6 ) = mod (4,.xu + A^2x2> + + A>x> * + + ^x〇1 + ^^7-* + '4), £(5; 7>= mod (4,¾ + For/to + 43xw + to 〆+ for A* + for 〇xw + for Aw + '4)' £(•?, 8> = mod(.Vu + for ~+] 4¾ + for + + Vw' 4) ; s<-s-\ke shout etirt; Lang Chuxiong_

[0030] 式中的第二行和最后一行联合起来表示8个从0到3的嵌套循环; [0030] The second line and the last line in the formula jointly represent 8 nested loops from 0 to 3;

[0031] B •通过上述8个从0到3的嵌套循环,循环次数为216,与一帧图像的像素相等,根据上式,得视频像素位置置乱加密算法的映射表如下表所示: 易£'(5,1) £ (5,2) E (5,3) : •,. 茗働) [0031] B • Through the above 8 nested loops from 0 to 3, the number of loops is 216, which is equal to the pixels of a frame of image. According to the above formula, the mapping table of the video pixel position scrambling encryption algorithm is shown in the following table : Easy £'(5,1) £ (5,2) E (5,3): •,. Ming働)

[0032] 0 £-((),1) £-(0,2) Ei〇M 衣傭. 1 .._:1.,.1.): 麓:(1,2;): : j:(w):丨… ••,霉'1 ^.(1,:1):.五1¾¾ : :… 贫丨顚) [0032] 0 £-((),1) £-(0,2) Ei〇M clothing service. 1 .._:1., .1.): :(1,2;):: j: (w):丨… ••,霉'1 ^.(1,:1):.五1¾¾: :... 桗顚)

[0033] 1 :; :: - 丨、::k__^__ 2¾ ^(21(>-1,1) £(^6AA ^ 顏釋6巧身[0033] 1 :; ::-丨, ::k__^__ 2¾ ^(21(>-1,1) £(^6AA ^ 颜释6巧身

[0034] 由于视频像素位置置乱加密算法中的取模运算是模4运算,故映射表中的每一项E (S,i)只能有0,1,2,3四种可能的取值,即[0034] Since the modulo operation in the video pixel position scrambling encryption algorithm is a modulo 4 operation, each item E (S, i) in the mapping table can only have four possible selections: 0, 1, 2, and 3. Value, i.e.

[0035] E(S,i) e {〇,1,2,3} [0035] E(S,i) e {〇,1,2,3}

[0036] 式中S = 0,l,2,…,216_l,i = l,2,…,8; [0036] where S = 0, 1, 2, ..., 216_l, i = 1, 2, ..., 8;

[0037] C.加密运算: _ _ [0037] C. Encryption operation: _ _

[0038] ①给二维视频图像中的每个像素编排顺序号:像素位置置乱加密之前将一幅大小为256X256的二维视频图像像素的位置表示成一维数组,共有65536个像素点,对应该一维数组的长度为65536,在像素位置置乱加密之前,每一个像素对应一个顺序号,顺序号3每次按增加1的顺序排列并且满足〇彡s<216-1,S (S = 0,1,2,…,216-1)的大小为~ xitk x + x7,kx 2 2 + x 2 + x4 kx 2 :' +. ^ [0038] ① Arrange a sequence number for each pixel in the two-dimensional video image: before the pixel position is scrambled and encrypted, the pixel position of a two-dimensional video image with a size of 256X256 is expressed as a one-dimensional array, with a total of 65536 pixels. The length of the one-dimensional array should be 65536. Before the pixel position is scrambled and encrypted, each pixel corresponds to a sequence number. The sequence number 3 is arranged in the order of increasing by 1 each time and satisfies 〇彡s<216-1, S (S = The size of 0,1,2,…,216-1) is ~ xitk x + x7,kx 2 2 + x 2 + x4 kx 2 :'+. ^

[0039] x 26 + x 24 + a.7J x 22 + x 2° [0039] x 26 + x 24 + a.7J x 22 + x 2°

[0040] ②构建视频像素位置置乱加密后的顺序号:利用映射表中每一行对应的8个E(S, i) (i = 1,2,…,8),构造一个视频像素位置置乱加密之后的顺序号,则对应顺序号的大小为[0040] ②Construct the sequence number of the video pixel position scrambled and encrypted: use 8 E(S, i) (i=1, 2,..., 8) corresponding to each row in the mapping table to construct a video pixel position The sequence number after random encryption, the size of the corresponding sequence number is

[0041] E(S) =E(S,ai) X214+E(S,a2) X212+E(S,a3) X210+E(S,a4) X28+ [0041] E(S)=E(S,ai) X214+E(S,a2) X212+E(S,a3) X210+E(S,a4) X28+

[0042] E (S,a5) X 26+E (S,a6) X 24+E (S,a7) X 22+E (S,a8) X 2 [0042] E (S, a5) X 26+E (S, a6) X 24+E (S, a7) X 22+E (S, a8) X 2

[0043] 式中ai(i = l,2,••.,8)e{l,2,…,8},cllテa2关…关an。 [0043] In the formula, ai (i = l, 2,••., 8)e{l, 2,..., 8}, cllテa2 is off...off an. 根据上式,由于S与E⑸是一对一的,故E⑸也有65536种不同的取值; &amp; According to the above formula, since S and E⑸ are one-to-one, E⑸ also has 65,536 different values; &amp;

[0044] ③利用视频像素位置置乱加密算法映射表,将原来位置为S处的像素值映射到位置为E⑸处,由此得到一帧图像的密文值p⑹; &amp; [0044] ③Using the video pixel position scrambling encryption algorithm mapping table, map the pixel value at the original position S to the position E⑸, thereby obtaining the ciphertext value p⑹ of a frame of image; &amp;

[0045] D.信息传送:服务器端同时将一帧图像的密文值P (k)通过以太网传送给客户端; [0045] D. Information transmission: the server simultaneously transmits the ciphertext value P (k) of a frame of image to the client via Ethernet;

[0046] E.客户端利用以同样方式产生的映射表对密文值P (k)进行反映射实现解密。 [0046] E. The client uses the mapping table generated in the same way to reverse-map the ciphertext value P (k) to achieve decryption.

[0047] 进一步地,所述步骤C中的步骤③中的具体方法如下: _ 一[0047] Further, the specific method in step ③ in step C is as follows: _一

[0048]首先,设视频像素位置置乱加密之前的二维坐标为(x,y),则加密之前的二维坐标(x, y)与一维数组顺序号S (S = 0,1,2,…,216-1)之间的关系为1^: == :floor(S: / 256) H-;l [0049] 啦,256)_ [0048] First, suppose the two-dimensional coordinates of the video pixel position before scrambling and encryption are (x, y), then the two-dimensional coordinates (x, y) before encryption and the one-dimensional array sequence number S (S = 0, 1, 2. The relationship between …, 216-1) is 1^: == :floor(S: / 256) H-;l [0049] 啦,256)_

[0050] 式中floor表示向下取整,mod为模函数; 、 [0050] In the formula, floor represents rounding down, and mod is a modular function; 、

[0051]其次,设视频像素位置置乱加密后的二维坐标为(x6,h),则加密后的二维坐标(Xe,ye)与一维数组顺序号E⑸之间的关系为「00521 ^ ^ 2561+1 ]_凡=modl£(S),256卜1. [0051] Secondly, assuming that the two-dimensional coordinates of the video pixel position scrambled and encrypted are (x6, h), the relationship between the encrypted two-dimensional coordinates (Xe, ye) and the sequence number E⑸ of the one-dimensional array is "00521 ^ ^ 2561+1 ]_凡=modl£(S), 256 div 1.

[0053] 如果位置置乱加密之前对应二维坐标(x,y)的视频像素值为V(x,y),则位置置乱加密之后对应二维坐标(Xe,ye)的视频像素值为w (x6,ye),进行下式所示的置换操作运算[0053] If the video pixel value corresponding to the two-dimensional coordinates (x, y) before the position scrambling and encryption is V(x, y), then the video pixel value corresponding to the two-dimensional coordinates (Xe, ye) after the position scrambling and encryption is w (x6, ye), perform the permutation operation shown in the following formula

[0054] Ve (xe,ye) =V (x,y) [0054] Ve (xe,ye) =V (x,y)

[0055] 则实现了视频像素的位置置乱的加密,最后得到一帧图像的密文值P(k)。 [0055] The encryption of the position scrambling of the video pixels is realized, and the ciphertext value P(k) of a frame of image is finally obtained.

[0056] 进一步地,所述步骤E中的具体解密方法如下:解密是加密的逆运算,设解密后对应像素顺序号的数学表达式为[0056] Further, the specific decryption method in step E is as follows: decryption is the inverse operation of encryption, and the mathematical expression corresponding to the pixel sequence number after decryption is

[0057] D(S)=D(S,ai) X214+D(S,a2) X212+D(S,a3) X210+D(S,a4) X28+D(S,a5) X26+D(S, a6) X24+D(S,a7) X22+D(S,a8) X2° [0057] D(S)=D(S,ai) X214+D(S,a2) X212+D(S,a3) X210+D(S,a4) X28+D(S,a5) X26+D( S, a6) X24+D(S,a7) X22+D(S,a8) X2°

[0058] 设视频像素解密后的二维坐标为(Xd,yd),则二维坐标(xd,yd)与一维数组顺序号D (S)的关系为「巧=flooi'l />($) / 2561 +1 [0058] Assuming that the two-dimensional coordinates of the decrypted video pixels are (Xd, yd), the relationship between the two-dimensional coordinates (xd, yd) and the sequence number D (S) of the one-dimensional array is "Q=flooi'l />( $) / 2561 +1

[0059] " ' ' . ' = mod| D(S)? 2561 + 1 [0059] "''. '= Mod| D(S)? 2561 + 1

[0060] 式中floor表不向下取整,mod为検函数; [0060] In the formula, floor is not rounded down, and mod is a function;

[0061] 根据上式,设解密后对应二维坐标(xd,yd)的视频像素值为(xd,yd),如果要实现视频图像的解密,只需进行下式所示的置换操作运算%(x,y) =Ve (Xd,yd),将加密后像素对应的一维数组顺序号还原成S (S = 0,1,2,…,216-1),实现对密文值P (k)进行反映射的解密。 [0061] According to the above formula, it is assumed that the video pixel value corresponding to the two-dimensional coordinates (xd, yd) after decryption is (xd, yd). If you want to decrypt the video image, you only need to perform the replacement operation shown in the following formula% (x, y) =Ve (Xd, yd), restore the sequence number of the one-dimensional array corresponding to the encrypted pixel to S (S = 0,1,2,...,216-1), and realize the ciphertext value P ( k) Decryption of the reverse mapping.

[0062] 本发明的有益效果:由于采用了上述的方法,与同类方法相比,具有保密性强、加密还原度高的特点。 [0062] The beneficial effects of the present invention: due to the adoption of the above method, compared with similar methods, it has the characteristics of strong confidentiality and high encryption reduction.

附图说明Description of the drawings

[0063]图1为高维混沌映射的视频保密通信系统的组成框图; [0063] FIG. 1 is a block diagram of a video secure communication system based on high-dimensional chaotic mapping;

[0064] 图2为Client端工作流程图; [0064] FIG. 2 is a working flow chart of the Client side;

[0065] 图3为Server端工作流程图。 [0065] FIG. 3 is a working flow chart of the Server side.

具体实施方式Detailed ways

[0066] 如图1、2、3所示,对视频高维混沌映射加密的硬件配置:用两块Super 4412的ARM 板建立一个Server-Client模型,建立Server和Client各自的socket,作为双方通信的基础。 [0066] As shown in Figures 1, 2, and 3, the hardware configuration of the video high-dimensional chaotic map encryption: use two Super 4412 ARM boards to establish a Server-Client model, and establish the respective sockets of the Server and the Client as communication between the two parties. The basics. 图像实时采集、高维混沌映射加密的ARM开发板作为Client端,由摄像头、V4L2驱动、 JPEG解压缩、混沌加密、H. 264压缩、网卡驱动、以太网端口、液晶显示屏八个部分组成,通过混沌加密和H. 264压缩后的视频数据经以太网传输。 The ARM development board with real-time image acquisition and high-dimensional chaotic mapping encryption is used as the client side. It consists of eight parts: camera, V4L2 driver, JPEG decompression, chaotic encryption, H.264 compression, network card driver, Ethernet port, and LCD screen. The video data after chaos encryption and H.264 compression is transmitted via Ethernet. 高维混沌映射解密的ARM开发板作为Server端,负责接收传输过来的密文信息。 The ARM development board for high-dimensional chaotic map decryption serves as the server side and is responsible for receiving the transmitted ciphertext information. 以太网端口、网卡驱动、H.264解压缩、混沌解密、 液晶显示屏五个部分组成,其在Cl ient端和Server端,都是在Cortex-A9型处理器上运行嵌入式Linux操作系统,通过C++编程来实现上述对应部分的功能。 The Ethernet port, network card driver, H.264 decompression, chaos decryption, and LCD display are composed of five parts. Both the Cl ient and Server sides run the embedded Linux operating system on the Cortex-A9 processor. The functions of the above corresponding parts are realized through C++ programming. 由于USB摄像头输出的视频图像数据是硬件编码后的JPEG压缩格式,因此,首先需要将每帧JPEG图像进行JPEG解压缩后,才能得到对应的RGB三基色视频格式。 Since the video image data output by the USB camera is a hardware-encoded JPEG compression format, it is necessary to decompress each frame of JPEG image with JPEG before the corresponding RGB three-color video format can be obtained. 另外,局域网通信采用socket编程,采用面向连接的、可靠地TCP协议。 In addition, the LAN communication adopts socket programming, and adopts connection-oriented and reliable TCP protocol.

[0067]利用上述的硬件配置,实现视频保密通信,一种高维混沌映射的视频保密通信方法,包括以下步骤: [0067] Using the above hardware configuration to realize video secure communication, a high-dimensional chaotic mapping video secure communication method includes the following steps:

[0068] A •建立8维离散混沌映射的动力学方程: •VUM + 2 ' ) [0068] A • Establish the dynamic equation of the 8-dimensional discrete chaotic map: • VUM + 2 ')

[0069] < 〜+1 =mod(為,¾ +42义” +..' + 4sx8i,2A' > ,XS./t+l +為2又'2_4 +…+ 2 s) [0069] <~+1=mod(为,¾ +42义" +..' + 4sx8i, 2A'> ,XS./t+1 +为2又'2_4 +...+ 2 s)

[0070] 式中仏(1 = 1,2,".,8)=2,六8=以。)8><8(1,」=1,2,".,8)的构造方法为為=ni、g,':,其中: ii ::〇i. ft 0: …Uf :i :〇:g: :〇: :ij ::;:; [0070] Where (1 = 1, 2, "., 8) = 2, six 8 = to.) 8><8 (1, "=1, 2, "., 8) is constructed as =ni,g,':, where: ii::〇i. ft 0: …Uf:i:〇:g::〇: :ij::;:;

[0071] 0 p -v :i 〇. ::〇; 0: ::令:\ Q: (i -:• 〇ii om «- 〇: - :〇m I. i〇' [0071] 0 p -v: i 〇. ::〇; 0::: Order: \ Q: (i -:• 〇ii om «- 〇:-: 〇m I. i〇'

[0072]下标排序Oi, j,其中i,j的取值应满足的条件为^ ~ 1»2, • * •,? [0072] The subscript order Oi, j, where the value of i, j should meet the conditions ^ ~ 1»2, • * •,?

[0073] -1=/ + 1,/ + 2.---,8 .m [0073] -1=/ + 1,/ + 2.---, 8.m

[0074]选择其中的一种下标排序0ij为: [0074] One of the subscript order 0ij is selected as:

[0075] 〇ij = 78,13,14,15,16,45,18,23,24,25,57,27,28,34,35,36,37,38,17,46,47, 48,56,26,58,67,68,12则相应的变换矩阵A^Tij的乘积,得'5990537 986M13 226236 4794846 22802340 143956428 2426531J 23487K586" 觸377 170555 3300 72240 345054 2207175 389517 35972B5 : '卷:4» ,4s、 9064191 14931951 341837 7246707 34463589 2175^9315 36692373 355030845 1 4n 4s 4251336 7002429 l〇2735 3440SB2 l〇357935 10316^336 17326695 168341529 L〇〇」 ,:>:: ,,•: ^ 1743033 2870931 6685S 1412607 6715337 42346893 7108446 69099612 、今為2:兩60S1 10086 195 2703 13386 88019 16818 143121 15774 259.26 939 L6023 76080 467016 704^)0 763779 ,23712 3973 1446 24249 115179 7〇MM 105780 1154^1 j, [0075] 〇ij=78,13,14,15,16,45,18,23,24,25,57,27,28,34,35,36,37,38,17,46,47,48, 56, 26, 58, 67, 68, and 12 are the product of the corresponding transformation matrix A^Tij, and get '5990537 986M13 226236 4794846 22802340 143956428 2426531J 23487K586" touch 377 170555 3300 72240 345054 2207175 389517 35972B5:'Volume: 4», 4s , 9064191 14931951 341837 7246707 34463589 2175^9315 36692373 355030845 1 4n 4s 4251336 7002429 l〇2735 3440SB2 l〇357935 10316^336 17326695 168341529 L〇〇" ,:>:: ,,•: ^ 1712607 4243033 2870931 6685S 1412607 6715446337690346893 , Today is 2: two 60S1 10086 195 2703 13386 88019 16818 143121 15774 259.26 939 L6023 76080 467016 704^)0 763779 ,23712 3973 1446 24249 115179 7〇MM 105780 1154^1 j,

[0077]得视频像素位置置乱加密算法为^ = 0; for xu = 0:3; for X, A * 0:3; for x^k = 0:3; for x4 A = 0: 3; foi A - 0:3; for x^k = 0:3; for ,t7 A = 0 • J; for ^ = 0:3; 1.) HlD.d + "t" ^ 4)r £(5; 2) = mod + 為2xw + 為,3〆44x4i + 4¾.+ .為6.〜:..+ 4:7'A +4); E(S, 3) = mod (4,.yu + A3Zxu 4 Jryxu 4 J„xu + + A^k + 4); 1 ^(5, 4) = mod H- A42x2 k + A4^ k -t Ai4x4 k + A45x5 k + A46x6 i + A41xiik + , 4); E(S\ 5)=:taod.p5,^. + + + ^); E{S, 6)-:mod + %%:: + .+A&amp;\k^ 4)i E(S, 7) + A12X1X +vi7jX3^ +-^4¾^ A5Xu + AAk + + ^78^8,ft> 4)> :S):= ^p4^^ + 4^fi: # 44¾.+ AsS,i: &amp; + 4y^7 s + 4sa. a ^ 4): SS + J; end; end; end; end; end; end; end; end; [0077] The video pixel position scrambling encryption algorithm is ^ = 0; for xu = 0:3; for X, A * 0:3; for x^k = 0:3; for x4 A = 0: 3; foi A-0:3; for x^k = 0:3; for ,t7 A = 0 • J; for ^ = 0:3; 1.) HlD.d + "t" ^ 4)r £(5; 2 ) = mod + is 2xw + is, 3〆44x4i + 4¾.+. is 6.~:..+ 4: 7'A +4); E(S, 3) = mod (4,.yu + A3Zxu 4 Jryxu 4 J``xu + + A^k + 4); 1 ^(5, 4) = mod H- A42x2 k + A4^ k -t Ai4x4 k + A45x5 k + A46x6 i + A41xiik +, 4); E( S\ 5)=: taod.p5,^. + + + ^); E{S, 6)-: mod + %%:: + .+A&amp;\k^ 4)i E(S, 7) + A12X1X +vi7jX3^ +-^4¾^ A5Xu + AAk + + ^78^8,ft> 4)> :S): = ^p4^^ + 4^fi: # 44¾.+ AsS, i: &amp; + 4y ^7 s + 4sa. a ^ 4): SS + J; end; end; end; end; end; end; end; end;

[0079]式中的第二行和最后一行联合起来表示8个从〇到3的嵌套循环; [0079] The second and last lines in the formula combine to represent 8 nested loops from 0 to 3;

[0080] B.通过上述8个从0到3的嵌套循环,循环次数为2,与一帧图像的像素相根据上式,得视频像素位置置乱加密算法的映射表如下表所示:__ :$ £(5,1) £(5,2) ^(以3);… 麗保約0 £(0,1) E(0,2)石(〇,3)… 態(明1 #(1,1) 輝J> 祕_ … 纏:(满[0080] B. Through the above 8 nested loops from 0 to 3, the number of loops is 2, and according to the above formula with the pixels of a frame of image, the mapping table of the video pixel position scrambling encryption algorithm is shown in the following table: __: $ £(5,1) £(5,2) ^(with 3);... Li Bao is about 0 £(0,1) E(0,2)石(〇,3)... State (明1 # (1,1) Hui J> Secret_… Entangled: (full

[0081] ................. ::..... ...... …一^—---..…一----———— 1 M:tMf 迟(¾¾ £(2,3) … E (2,8) :: : :: ... .:. ,.. ;•• ♦. . .........+—.... +.. 2:16-1 丨…五(2叱1,, [0081] ................. ::..... ...... …一^—---.....一———— —— 1 M: tMf late (¾¾ £(2,3)… E (2,8) ::: :: ... .:., .. ;•• ♦.. ........ .+—.... +.. 2:16-1 丨...五(2叱1,,

[0082]由于视频像雜置置乱加密算法中的取模运算疋模4运算,故映射表中的每一咖(S,i)只能有0,1,2,3四种可能的取值,即[0082] Due to the modulo operation and modulo 4 operation in the video image scrambling encryption algorithm, each (S, i) in the mapping table can only have four possible values ​​of 0, 1, 2, 3 ,Right now

[0083] E(S,i) e {0,1,2,3} [0083] E(S,i) e {0,1,2,3}

[0084] 式中S = 0,1,2, ...,2^-1,1 = 1,2,...,8; [0084] where S = 0,1,2,...,2^-1,1 = 1,2,...,8;

[0085] C •加密运算: 丄一、1 一[0085] C • Encryption operation: one to one, one to one

[0086]①给二维视频图像中的每个像素编排顺序号:髓位置置乱加想、之别将一巾_大小为256 X256的二维视频图像像麵位置表示成一维数组,共有65536个像素点,对应该一维数组的长度为65536,在像素位置置乱加密之前,每一个像素对应一个顺序号,顺序号S每次按增加1的顺序排列并且满足〇彡3彡216-1,5(5 = 0,1,2,"_,216-1)的大小为0 = x 214 :+ x2j; x 2U + x} kx 2UI + ,r4 A. x 25 + ^ [0086] ① Arrange a sequence number for each pixel in the two-dimensional video image: scrambling the position of the marrow, and not to express the position of the two-dimensional video image with a size of 256 X 256 as a one-dimensional array, with a total of 65536 Pixel points, the length of the corresponding one-dimensional array is 65536. Before the pixel position is scrambled and encrypted, each pixel corresponds to a sequence number. The sequence number S is arranged in the order of increasing by 1 each time and satisfies 〇≦3≦216-1 , The size of 5 (5 = 0, 1, 2, "_, ​​216-1) is 0 = x 214: + x2j; x 2U + x} kx 2UI + ,r4 A. x 25 + ^

[0087] x5 A x 26 + x61 x + A x 2J + xgt x 2° [0087] x5 A x 26 + x61 x + A x 2J + xgt x 2°

[0088] ②构建视频像素位置置乱加密后的顺序号:利用映射表中每一行对应的8个E(S, i) (i = l,2,〜,8),构造一个视频像素位置置乱加密之后的顺序号,则对应顺序号的大小为[0088] ②Construct the sequence number of the video pixel position scrambled and encrypted: use 8 E(S, i) (i=1, 2, ~, 8) corresponding to each row in the mapping table to construct a video pixel position The sequence number after random encryption, the size of the corresponding sequence number is

[0089] E ⑸二已匕〜)X214+E(S,a2) X212+E(S,a3) X210+E(S,a4) X28+ [0089] E ⑸ Two already dagger~) X214+E(S, a2) X212+E(S, a3) X210+E(S, a4) X28+

[0090] E (S,a5) X 26+E (S,a6) X 24+E (S,a7) X 22+E (S,a8) X 20 [0090] E (S, a5) X 26+E (S, a6) X 24+E (S, a7) X 22+E (S, a8) X 20

[0091] 式中ai(i = l,2,...,8) G {1,2,...,8} 关…关an。 [0091] In the formula, ai (i = 1, 2,..., 8) G {1,2,...,8} close... close an. 根据上式,由于S与E⑸是一对一的,故E (S)也有65536种不同的取值; According to the above formula, since S and E⑸ are one-to-one, E (S) also has 65,536 different values;

[0092] ③利用视频像素位置置乱加密算法映射表,将原来位置为S处的像素值映射到位置为E⑸处,由此得到一帧图像的密文值p⑹,具体方法如下: [0092] ③Using the video pixel position scrambling encryption algorithm mapping table, map the pixel value at the original position S to the position E⑸, thereby obtaining the ciphertext value p⑹ of a frame of image, the specific method is as follows:

[0093] 首先,设视频像素位置置乱加密之前的二维坐标为(x,y),则加密之前的二维坐标(x,y)与一维数组顺序号s (S = 0,1,2,…,216-1)之间的关系为rn fx--= tW(5/256) + 1 [0093] First, suppose the two-dimensional coordinates of the video pixel position before scrambling and encryption are (x, y), then the two-dimensional coordinates (x, y) before encryption and the one-dimensional array sequence number s (S=0, 1, 2. The relationship between …, 216-1) is rn fx--= tW(5/256) + 1

[0094] [). = -.1(5. 256)+1 [0094] [). = -.1(5. 256)+1

[0095] 式中floor表不向下取整,mod为模函数; [0095] In the formula, floor is not rounded down, and mod is a modular function;

[0096] 其次,设视频像素位置置乱加密后的二维坐标为(xe,ye),则加密后的二维坐标(Xe,ye)与一维数组顺序号E (S)之间的关系为「0097] f- =^^[£(S) 25(,1 + 1 [ve =mod|/T(.S')! 256|+1 [0096] Secondly, assuming that the two-dimensional coordinates of the video pixel position scrambled and encrypted are (xe, ye), the relationship between the encrypted two-dimensional coordinates (Xe, ye) and the sequence number E (S) of the one-dimensional array Is "0097] f- =^^[£(S) 25(,1 + 1 [ve =mod|/T(.S')! 256|+1

[0098] 如果位置置乱加密之前对应二维坐标(x,y)的视频像素值为V (x,y),则位置置乱加密之后对应二维坐标(xe,ye)的视频像素值SVe (xe,ye),那么,我们进行下式所示的置换操作运算[0098] If the video pixel value corresponding to the two-dimensional coordinates (x, y) before the position scrambling and encryption is V (x, y), then the video pixel value SVe corresponding to the two-dimensional coordinates (xe, ye) after the position scrambling and encryption is (xe, ye), then, we perform the permutation operation shown in the following formula

[0099] Ve (xe,ye) =V (x,y) [0099] Ve (xe,ye) =V (x,y)

[0100] 则实现了视频像素的位置置乱的加密,最后得到一帧图像的密文值P 〇〇。 [0100] The encryption of the position scrambling of the video pixels is realized, and the ciphertext value P 〇〇 of a frame of image is finally obtained.

[0101] D.信息传送:服务器端同时将一帧图像的密文值P(k)通过以太网传送给客户端; [0101] D. Information transmission: the server simultaneously transmits the ciphertext value P(k) of a frame of image to the client via Ethernet;

[0102] E.客户端利用以同样方式产生的映射表对密文值P (k)进行反映射实现解密。 [0102] E. The client uses the mapping table generated in the same way to reverse-map the ciphertext value P(k) to achieve decryption.

[0103] 解密是加密的逆运算,设解密后对应像素顺序号的数学表达式为[0103] Decryption is the inverse operation of encryption. Suppose the mathematical expression of the pixel sequence number after decryption is

[0104] D(S) =D(S,〇i) X214+D(S,a2) X212+D(S,a3) X 210+D (S,a4) X 28+ [0104] D(S)=D(S,〇i) X214+D(S,a2) X212+D(S,a3) X 210+D (S,a4) X 28+

[0105] D(S,a5) X26+D(S,a6) X24+D(S,a7) X22+D(S,a8) X20 [0105] D(S,a5) X26+D(S,a6) X24+D(S,a7) X22+D(S,a8) X20

[0i06]设视频像素解密后的二维坐标为(Xd,yd),则二维坐标(xd,yd)与一维数组顺序号D (S)的关系为\x, =n〇〇iiDC.S)/256|+1 [0107] 4 ' 1 = mod| 0(.¾ 256 卜1 [0i06] Assuming that the two-dimensional coordinates of the decrypted video pixels are (Xd, yd), the relationship between the two-dimensional coordinates (xd, yd) and the one-dimensional array sequence number D (S) is \x, =n〇〇iiDC. S)/256|+1 [0107] 4 '1 = mod| 0(.¾ 256 卜1

[0108] 式中floor表示向下取整,mod为模函数; [0108] In the formula, floor represents rounding down, and mod is a modular function;

[0109]根据上式,设解密后对应二维坐标(xd,yd)的视频像素值为Mxd,yd),如果要实现视频图像的解密,那么,我们只需进行下式所示的置换操作运算Vd (X,y) = (Xd,yd),将加密后像素对应的一维数组顺序号还原成S (S二0,1,2,…,216-1),实现对密文值P (k)进行反映射的解密。 [0109] According to the above formula, suppose the video pixel value corresponding to the two-dimensional coordinates (xd, yd) after decryption is Mxd, yd). If the decryption of the video image is to be realized, then we only need to perform the replacement operation shown in the following formula Operation Vd (X, y) = (Xd, yd), restore the sequence number of the one-dimensional array corresponding to the encrypted pixel to S (S-2 0, 1, 2, ..., 216-1), and realize the ciphertext value P (k) Decryption of the reverse mapping.

[0110] 解密分两种情况:发送端与接收端的参数和密钥相同,D(s) =E(S),V(x,y) =Vd (x,y),接收端能正确解密出原视频图像;发送端与接收端的参数和密钥不同,D⑸#E(S), V(x,y) #Vd (x,y),接收端不能正确解密出原视频图像。 [0110] There are two cases of decryption: the parameters and keys of the sending end and the receiving end are the same, D(s) = E(S), V(x, y) = Vd (x, y), and the receiving end can decrypt correctly Original video image; the parameters and keys of the sending end and the receiving end are different, D⑸#E(S), V(x,y) #Vd (x,y), the receiving end cannot decrypt the original video image correctly.

[0111]注意到用ARM实现时,一方面,需要考虑到视频实时性要求,从速度方面来看,加密算法不能过于复杂和耗时,密轮数不能过多。 [0111] Note that when implemented with ARM, on the one hand, it is necessary to consider the real-time requirements of the video. From the perspective of speed, the encryption algorithm cannot be too complicated and time-consuming, and the number of dense rounds cannot be too many. 通常在硬件实验中,选取加密轮数为i。 Usually in hardware experiments, the number of encryption rounds is selected as i. 得ARM 实现时,密钥空间大小的保守估计值为[0112] Ks= (8 X 7) /2) ! X 8! = 1.2293 X 1〇34。 When implemented by ARM, the conservative estimate of the key space size is [0112] Ks= (8 X 7) /2)! X 8! = 1.2293 X 1034.

[0113]以上所述是本发明的优选实施方式而己,当然不能以此来限定本发明之权利范围,应当指出,对于本技术领域的普通技术人员来说,对本发明的技术方案进行修改或者等同替换,都不脱离本发明技术方案的保护范围。 [0113] The above are the preferred embodiments of the present invention. Of course, it cannot be used to limit the scope of rights of the present invention. The equivalent replacement does not depart from the protection scope of the technical solution of the present invention.

Claims (3)

1. 一种高维混沌映射的视频保密通信方法,其特征在于,包括以下步骤: A.建立8维离散混沌映射的动力学方程: 气㈣_雄减气表:+為為.2 :旗.A^c^^-2 ^ 、XS,jU1 -+ 為2¾^ + …+ 為s-^a:,2 ) 式中Ni(i二1,2,…,8) =2,A8= (^)狀8(1,」=1,2,._,8)的构造方法为4=故!!1,、.,其(=1 ^ f=Sl+1 / 中: '1: ) ;>〇: ::i:. _、、:. 〇A:: :¾ ….〇o: 5号.:〇:&amp;: (3:: .¾ 1 …:(3:: .:0:: 0 .0 …:.::i: .¾ 1^' ::〇〇,,, :(j' ::MQ;: 〇> :¾. l o': \ :丨丨:..0 1 y 下标排序Oi, j,其中i,j的取值应满足的条件为< ./-/ + 1,/ + 2,'.:,J 选择其中的一种下标排序Oij为: 〇i,j=78,13,14,15,16,45,18,23,24,25,57,27,28,34,35,36,37,38,17,46,47,48, 56,26,58,67,68,12 则相应的变换矩阵A8*Tij的乘积,得^5990537 9868413 226236 4794846 22802340 143956428 24265311 234878586^ 103377 170555 5300 72240 345054 2207175 389517 3597285 An 9064191 1493J951 34J837 7246707 34463589 2175993J5 36692373 355030845 ^ = ^32 4$ ^ 4251336 7002429 162735 34408.82 16357935 103167336 17326695 168341529 .......….… 1743033 287093】 6685S 1412607 6715337 42346893 7108446 69099612 4a $sj 6081 10086 195 2703 13386 88019 16818 14_鉍丨15774 25926 939 16023 76080 4670] 6 70400: ,滴: ,23712 38973 1446 24249 115179 706044 105 1. A high-dimensional chaotic mapping video secure communication method, which is characterized in that it includes the following steps: A. Establishing the dynamic equation of the 8-dimensional discrete chaotic mapping: Qi iv_ Xiong Qi table: +为为.2: Flag .A^c^^-2 ^, XS,jU1 -+ is 2¾^ + …+ is s-^a:, 2) where Ni(i二1,2,…,8) =2, A8= ( ^) The construction method of shape 8(1,"=1,2,._,8) is 4=so!!1,,., its (=1 ^ f=Sl+1 / middle: '1: ); >〇: ::i:. _,,:. 〇A:: :¾ ….〇o: No. 5.: 〇:&amp;: (3:: .¾ 1 …:(3:: .:0: : 0 .0 …:.::i: .¾ 1^' ::〇〇,,, :(j' ::MQ;: 〇> :¾. l o': \ :丨丨:..0 1 y subscript order Oi, j, where the value of i, j should satisfy the condition <./-/ + 1,/ + 2,'.:, J choose one of the subscript order Oij as: 〇i ,j=78,13,14,15,16,45,18,23,24,25,57,27,28,34,35,36,37,38,17,46,47,48, 56,26 ,58,67,68,12 is the product of the corresponding transformation matrix A8*Tij, which is ^5990537 9868413 226236 4794846 22802340 143956428 24265311 234878586^ 103377 170555 5300 72240 345054 2207175 389517 3597285 An 9064191 1493J951 34J837 7246707 34463 2175993J5 36692373355030707 32 4$ ^ 4251336 7002429 162735 34408.82 16357935 103167336 17326695 168341529 ... 1743033 287093] 6685S 1412607 6715337 42346893 7108446 69099612 4a $sj 6081 10086 195 2703 13386 88019 16818 14_bismuth丨15774 25926 939 16023 76080 4670] 6 70400:, drop: ,23712 38973 1446 24249 115179 706044 105 780 |i:54831 y 得视频像素位置置乱加密算法为\s=o; forx A - 0.3, f〇r^2 A =0:3; tbrx,^ -0:3; tbrx4fc - 〇:3; f〇r.x5 A =〇:3; tbrx6i =0:3; f〇rx7j[ = 0:¾¾¾ ^ E(S, l) = mod(4,.\:M +4,xm +44x4iA +45x5iA +^,6xw + ^,7x7jt-h 48%s, 4); £ (乂2> = mod (4,¾ ! 42x2 A + 44xv + 毛X'〆為〜+ + j2sXu,4), £(S, 3) = mod (Ai}xU/l + + Aasxm 4 +A5x-s,k + k ^ Anx^kh: 4); 與又4卜腦W儿a ; +」42;r2, + + +办〜“招〜,4); 5) = m〇d (為1气4 —忒2' A + 4¾ + 44-\A + — 46Ta +』57X以4」VYS ” 4); £'(5f>6) = modf4>1vu+-4:t2^ + f i6A64 4 47r7, n ^6SrM; 4>, EiS, 7) =mod (4,x, A + A12xXk + A12xi k + Aax^ + + + + 4); ^(5, 8) ^ mod (4,^ + 42x2 A + 4^-3 A + 44x4 ft + + ^6x6; + 4?.^ A + ^Xsk, 4); :Sf 射1; end; end; end: end; e興eiid;罐;賴; 式中的第二行和最后一行联合起来表示8个从〇到3的嵌套循环; B. 通过上述8个从0到3的嵌套循环,循环次数为2i6,与一帧图像的像素相等,根据上式, 得视频像素位置置乱加密算法的映射表如下表所示: SE(s,l) £(5,2) j £(5,3) ••• £(5,8) § ; f(0,l) ^(0,2) £(〇,3) - ^(0,8) 1 ^(1,1) 觀1,_ 與1,尊…;五(1應2 丨芯(2,:1) E:UM \ #:(2,;|) … 麗儘8) ;丨: • 丨一,:. ••. • :216-1 £(216-1,1) E(216-l,2) £(2!6-1,3) “' ^(2,6-1,8) 由于所述视频像素位置置乱加密算法中的取模运算是模4运算,故映射表中的每一项E (S, 780 |i: 54831 y The video pixel position scrambling encryption algorithm is \s=o; forx A-0.3, f〇r^2 A =0:3; tbrx,^ -0:3; tbrx4fc-〇:3; f〇r.x5 A =〇: 3; tbrx6i =0:3; f〇rx7j[ = 0:¾¾¾ ^ E(S, l) = mod(4,.\: M +4, xm +44x4iA +45x5iA + ^,6xw + ^,7x7jt-h 48%s, 4); £ (乂2> = mod (4,¾! 42x2 A + 44xv + 毛X'〆 is ~ + + j2sXu, 4), £(S, 3) = mod (Ai)xU/l + + Aasxm 4 +A5x-s,k + k ^ Anx^kh: 4); and 4 卜脑W儿a; +」42;r2, + + +办~ "Zhao~, 4); 5) = m〇d (for 1 Qi 4-忒 2'A + 4¾ + 44-\A +-46Ta + "57X to 4" VYS "4); £'(5f>6 ) = modf4>1vu+-4: t2^ + f i6A64 4 47r7, n ^6SrM; 4>, EiS, 7) =mod (4,x, A + A12xXk + A12xi k + Aax^ + + + + 4); ^(5, 8) ^ mod (4,^ + 42x2 A + 4^-3 A + 44x4 ft + + ^6x6; + 4?.^ A + ^Xsk, 4); :Sf 射1; end; end ; end: end; exingeiid; tank; Lai; The second and last lines in the formula combine to represent 8 nested loops from 0 to 3; B. Through the above 8 nested loops from 0 to 3 , The number of cycles is 2i6, which is equal to the pixels of a frame of image. According to the above formula, the mapping table of the video pixel position scrambling encryption algorithm is shown in the following table: SE(s,l) £(5,2) j £(5 ,3) ••• £(5,8) §; f(0,l) ^(0,2) £(〇,3)-^(0,8) 1 ^(1,1) 观1,_ With 1, respect...; Five (1 should 2 丨 core(2,:1) E:UM \ #:(2,;|)… 丽尽8) ;丨: • 丨一,:. ••. •: 216-1 £(216-1,1) E(216-l,2) £(2!6-1,3) “'^(2,6-1,8) Encrypted due to the scrambling of the video pixel position The modulo operation in the algorithm is a modulo 4 operation, so each item in the mapping table E (S, i)只能有0,1,2,3四种可能的取值,即E(S,i) e {0,1,2,3} 式中S=0,l,2,…,216-l,i二1,2,…,8; C. 加密运算: ① 给二维视频图像中的每个像素编排顺序号:像素位置置乱加密之前将一幅大小为256X256的二维视频图像像素的位置表示成一维数组,共有65536个像素点,对应该一维数组的长度为65536,在像素位置置乱加密之前,每一个像素对应一个顺序号,顺序号S每次按增加1的顺序排列并且满足0彡S彡216-1,S (S = 0,1,2,…,216-1)的大小为S = x^x2l4+ xl lc x 2'2 +:a^tx 210 + x 28 + x 26 + % x 2? + 〜x#: ' ② 构建视频像素位置置乱加密后的顺序号:利用映射表中每一行对应的8个E (S, i) (i =1,2,…,8),构造一个视频像素位置置乱加密之后的顺序号,则对应顺序号的大小为E(S) =E(S,a!) X214+E(S,a2) X212+E(S,a3) X210+E(S,a4) X28+ E(S,a5) X26+E(S,a6) X24+E(S,a7) X22+E(S,a8) X2° 式中ai(i = l,2,…,8) E {1,2,…,8}叫古以关…关an,根据上式,由于S与E⑸是一对一的,故E⑸也有65536种不同的取值; ③利用视频像素位置置乱加密算法映射表,将原来位置为S处的像素值映射到位置为E (s)处,由此得到一帧图像的密文值P GO ; D. 信息传送:服务器端同时将一帧图像的密文值p⑹通过以太网传送给客户端; E. 客户端利用以同样方式产生的映射表对密文值p(k)进行反映射实现解密。 i) There can only be four possible values ​​of 0, 1, 2, 3, namely E(S,i) e {0,1,2,3} where S=0,l,2,...,216- l, i two 1,2,..., 8; C. Encryption operation: ① Arrange a sequence number for each pixel in the two-dimensional video image: before the pixel position is scrambled and encrypted, a 256X256 two-dimensional video image pixel The position of is expressed as a one-dimensional array, with a total of 65536 pixels. The length of the corresponding one-dimensional array is 65536. Before the pixel position is scrambled and encrypted, each pixel corresponds to a sequence number, and the sequence number S is arranged in the order of increasing 1 each time And satisfy 0≦S≦216-1, the size of S (S = 0,1,2,...,216-1) is S = x^x2l4+ xl lc x 2'2 +: a^tx 210 + x 28 + x 26 +% x 2? + ~x#: '② Construct the sequence number of the video pixel position scrambled and encrypted: use 8 E (S, i) (i =1, 2,..., 8) Construct a sequence number after scrambling and encrypting the position of the video pixel, then the size of the corresponding sequence number is E(S) =E(S,a!) X214+E(S,a2) X212+E(S,a3 ) X210+E(S,a4) X28+ E(S,a5) X26+E(S,a6) X24+E(S,a7) X22+E(S,a8) X2° where ai(i = l, 2,…, 8) E {1, 2,…, 8} is called ancient Yiguan…guanan. According to the above formula, since S and E⑸ are one-to-one, E⑸ also has 65,536 different values; ③Use The video pixel position scrambling encryption algorithm mapping table maps the pixel value at the original position S to the position E (s), thereby obtaining the ciphertext value P GO of a frame of image; D. Information transmission: server side at the same time The ciphertext value p⑹ of a frame of image is transmitted to the client via Ethernet; E. The client uses the mapping table generated in the same way to reverse the ciphertext value p(k) to achieve decryption. 2.根据权利要求1所述的一种高维混沌映射的视频保密通信方法,其特征在于:所述步骤C中的步骤③中的具体方法如下: 首先,设视频像素位置置乱加密之前的二维坐标为(x,y),则加密之前的二维坐标(x, y)与一维数组顺序号S (S = 0,1,2,…,216-1)之间的关系为|,T = f1ooitS - 256) + 1 j 少二mod(>S,256) + 1 式中floor表示向下取整,mod为模函数; 其次,设视频像素位置置乱加密后的二维坐标为(xe,^),则加密后的二维坐标(xe,h) 与一维数组顺序号E 之间的关系为[r = £100^(5) 256 ] + 3 =mod[£(5j. 256J+1 如果位置置乱加密之前对应二维坐标(X,y)的视频像素值为V (X,y),则位置置乱加密之后对应二维坐标(Xe,ye)的视频像素值为Ve(Xe,ye),进行下式所示的置换操作运算Ve (xe,ye) =V (x,y) 则实现了视频像素的位置置乱的加密,最后得到一帧图像的密文值P (k)。 2. A high-dimensional chaotic mapping video secure communication method according to claim 1, characterized in that: the specific method in step ③ in step C is as follows: First, set the video pixel position to scramble before encryption The two-dimensional coordinates are (x, y), then the relationship between the two-dimensional coordinates (x, y) before encryption and the one-dimensional array sequence number S (S = 0, 1, 2, ..., 216-1) is | ,T = f1ooitS-256) + 1 j two mod(>S, 256) + 1 where floor means rounding down, and mod is a modulus function; secondly, set the two-dimensional coordinates of the video pixel position scrambled and encrypted as (xe,^), the relationship between the encrypted two-dimensional coordinates (xe, h) and the one-dimensional array sequence number E is [r = £100^(5) 256] + 3 =mod[£(5j. 256J+1 If the video pixel value corresponding to the two-dimensional coordinates (X, y) before the position scrambling and encryption is V (X, y), then the video pixel value corresponding to the two-dimensional coordinates (Xe, ye) after the position scrambling and encryption is Ve (Xe, ye), perform the replacement operation shown in the following formula. Ve (xe, ye) = V (x, y) realizes the encryption of the position scrambling of the video pixels, and finally obtains the ciphertext value of a frame of image P (k). 3.根据权利要求1所述的一种高维混沌映射的视频保密通信方法,其特征在于:所述步骤E中的具体解密方法如下:解密是加密的逆运算,设解密后对应像素顺序号的数学表达式为D (S) = D (S, ai) X 214+D (S, a2) X 212+D (S, a3) X 210+D (S, a4) X 28+ D(S,a5) X26+D(S,a6) X24+D(S,a7) X22+D(S,a8) X2° 设视频像素解密后的二维坐标为(xd,yd),则二维坐标(xd,yd)与一维数组顺序号D (S)的关系为[a;, = floor[Z)(.S') 256]+L | \(( =niodfD(.V), 256] + l 式中floor表示向下取整,m〇d为模函数; 根据上式,设解密后对应二维坐标(Xd,yd)的视频像素值为Ve (xd,yd),如果要实现视频图像的解密,只需进行下式所示的置换操作运算Vd(x,y) =Ve(Xd,yd),将加密后像素对应的一维数组顺序号还原成S (S = 0,1,2,…,216-1),实现对密文值P⑹进行反映射的解密。 3. A high-dimensional chaotic mapping video secure communication method according to claim 1, characterized in that: the specific decryption method in step E is as follows: decryption is the inverse operation of encryption, and the corresponding pixel sequence number after decryption is assumed The mathematical expression of is D (S) = D (S, ai) X 214+D (S, a2) X 212+D (S, a3) X 210+D (S, a4) X 28+ D(S, a5) X26+D(S,a6) X24+D(S,a7) X22+D(S,a8) X2° Assuming that the two-dimensional coordinates of the video pixel after decryption are (xd,yd), then the two-dimensional coordinates (xd ,yd) and the one-dimensional array sequence number D (S) relationship is [a;, = floor[Z)(.S') 256]+L | \(( =niodfD(.V), 256] + l The floor means rounding down, and m〇d is the modulus function; according to the above formula, the video pixel value corresponding to the two-dimensional coordinates (Xd, yd) after decryption is set to Ve (xd, yd), if you want to achieve the decryption of the video image , Only need to perform the replacement operation Vd(x,y) =Ve(Xd,yd) as shown in the following formula, and restore the one-dimensional array sequence number corresponding to the encrypted pixel to S (S = 0,1,2,... , 216-1), to realize the decryption of the reverse mapping of the ciphertext value P⑹.
CN201410336408.6A 2014-07-16 2014-07-16 A kind of video secret communication method of multi-dimension Chaos mapping Active CN104135669B8 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410336408.6A CN104135669B8 (en) 2014-07-16 2014-07-16 A kind of video secret communication method of multi-dimension Chaos mapping

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410336408.6A CN104135669B8 (en) 2014-07-16 2014-07-16 A kind of video secret communication method of multi-dimension Chaos mapping

Publications (3)

Publication Number Publication Date
CN104135669A CN104135669A (en) 2014-11-05
CN104135669B CN104135669B (en) 2017-08-25
CN104135669B8 true CN104135669B8 (en) 2017-10-10

Family

ID=51808179

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410336408.6A Active CN104135669B8 (en) 2014-07-16 2014-07-16 A kind of video secret communication method of multi-dimension Chaos mapping

Country Status (1)

Country Link
CN (1) CN104135669B8 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105049877A (en) * 2015-06-02 2015-11-11 阔地教育科技有限公司 Encryption method and device for live and recorded broadcast interaction system
CN105744294B (en) * 2016-02-04 2017-11-17 广东工业大学 The video Development of Chaotic Secure Communication Method that a kind of mobile phone is realized
CN108900868B (en) * 2018-08-14 2020-11-13 苏州科达科技股份有限公司 Video transmission method, device and storage medium based on H.264
CN109788299A (en) * 2019-03-12 2019-05-21 广东工业大学 Video transmission method, system, equipment and computer media between a kind of mobile device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101431400A (en) * 2008-12-06 2009-05-13 华中科技大学 Encryption/decryption method and system based on chaos hybrid self-synchronizing method
CN102263636A (en) * 2011-05-24 2011-11-30 浙江工业大学 Stream cipher key control method for fusing neural network with chaotic mappings
CN102831569A (en) * 2012-08-17 2012-12-19 华中师范大学 Mobile-service-oriented digital image selective encryption method
CN103473784A (en) * 2013-09-29 2013-12-25 河海大学常州校区 Blurred image self-adaptation recovering method based on high-dimensional space geometry informatics
CN103856786A (en) * 2012-12-04 2014-06-11 中山大学深圳研究院 Streaming media video encryption method and device based on H.264
CN103888637A (en) * 2014-04-08 2014-06-25 广东工业大学 Method for chaotic encryption of multi-path image digital information

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101431400A (en) * 2008-12-06 2009-05-13 华中科技大学 Encryption/decryption method and system based on chaos hybrid self-synchronizing method
CN102263636A (en) * 2011-05-24 2011-11-30 浙江工业大学 Stream cipher key control method for fusing neural network with chaotic mappings
CN102831569A (en) * 2012-08-17 2012-12-19 华中师范大学 Mobile-service-oriented digital image selective encryption method
CN103856786A (en) * 2012-12-04 2014-06-11 中山大学深圳研究院 Streaming media video encryption method and device based on H.264
CN103473784A (en) * 2013-09-29 2013-12-25 河海大学常州校区 Blurred image self-adaptation recovering method based on high-dimensional space geometry informatics
CN103888637A (en) * 2014-04-08 2014-06-25 广东工业大学 Method for chaotic encryption of multi-path image digital information

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
基于局域网的混沌视频加密研究与实现;禹思敏 李黎明;《电子世界》;20140515(第9期);1-138 *
基于混沌理论的信息加密技术研究;宋春艳;《中国博士学位论文全文数据库》;20130101;1-125 *

Also Published As

Publication number Publication date
CN104135669B (en) 2017-08-25
CN104135669A (en) 2014-11-05

Similar Documents

Publication Publication Date Title
CN104135669B8 (en) A kind of video secret communication method of multi-dimension Chaos mapping
WO2020023982A3 (en) Method and apparatus for combining data to construct a floor plan
EP3068066A3 (en) Private computation on encrypted biometric data using homomorphic encryption
AU2016266557A8 (en) Secure dynamic communication network and protocol
WO2017109584A3 (en) Computer-implemented cryptographic method for improving a computer network, and terminal, system and computer-readable medium for the same
WO2016044856A3 (en) Nado cryptography with key generators
WO2016113429A3 (en) Self-rectification of stereo camera
MX2016001900A (en) Nado cryptography using one-way functions.
Soleymani et al. A novel public key image encryption based on elliptic curves over prime group field
CN103971317A (en) Fractional order chaotic mapping based image encryption method
EP2908493A3 (en) Secure communication systems
CN105279729A (en) Three-dimensional information encryption method based on integral imaging and multi-chaotic system
EP3695560A1 (en) Encryption and decryption of media data
PL3813365T3 (en) Rendering wide color gamut, two-dimensional (2d) images on three-dimensional (3d) capable displays
CN104376267A (en) Image shuffling encrypting method based on fractional order chaotic mapping
Liu et al. Security assessment on block-Cat-map based permutation applied to image encryption scheme
CN104077739A (en) Color image quick encryption method
WO2016204846A3 (en) System and method for an enhanced xor cipher through extensions
Zhang Comments on “Color image encryption using Choquet fuzzy integral and hyper chaotic system”
CN104144056B (en) Self-authorized CP-ABE system and method
Christy et al. Feed forward networks in color extended visual cryptography to generate meaningful shares
Smyth et al. Translating between equational theories for automated reasoning
WO2016073058A3 (en) Method and apparatus for secure elgamal-type cryptography
Kamat et al. Symmetric image encryption algorithm using 3d rossler system
Thapliyal et al. A image encryption scheme using chaotic maps

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information

Inventor after: Lin Zhuosheng

Inventor after: Yu Simin

Inventor after: Lv Jinhu

Inventor before: Lin Zhuosheng

Inventor before: Yu Simin

COR Change of bibliographic data
GR01 Patent grant
GR01 Patent grant
CI03 Correction of invention patent

Correction item: Inventor

Correct: Lin Zhuosheng|Yu Simin|Lv Jinhu

False: Lin Zhuosheng|Yu Simin

Number: 34-02

Volume: 33

Correction item: Inventor

Correct: Lin Zhuosheng|Yu Simin|Lv Jinhu

False: Lin Zhuosheng|Yu Simin

Number: 34-02

Page: Fei Ye

Volume: 33

CI03 Correction of invention patent