CN104135669B8 - A kind of video secret communication method of multi-dimension Chaos mapping - Google Patents
A kind of video secret communication method of multi-dimension Chaos mapping Download PDFInfo
- Publication number
- CN104135669B8 CN104135669B8 CN201410336408.6A CN201410336408A CN104135669B8 CN 104135669 B8 CN104135669 B8 CN 104135669B8 CN 201410336408 A CN201410336408 A CN 201410336408A CN 104135669 B8 CN104135669 B8 CN 104135669B8
- Authority
- CN
- China
- Prior art keywords
- video
- dimensional
- pixel
- encryption
- sequence number
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Medicines Containing Antibodies Or Antigens For Use As Internal Diagnostic Agents (AREA)
- Magnetic Resonance Imaging Apparatus (AREA)
Abstract
Description
一种高维混纯映射的视频保密通信方法A video secure communication method based on high-dimensional mixed pure mapping
技术领域Technical field
[0001] 本发明涉及视频保密通信方法,具体是一种高维混沌映射的视频保密通信方法。 [0001] The present invention relates to a video secure communication method, specifically a high-dimensional chaotic mapping video secure communication method.
背景技术Background technique
[0002] 1989年英国数学家Mattllews首次提出了一种基于一维Logistic映射的文本密码方案。 [0002] In 1989, British mathematician Mattllews first proposed a text encryption scheme based on one-dimensional Logistic mapping. 从此混沌加密成为研宄的热点。 Since then, chaotic encryption has become a research hotspot. 混沌系统应用于图像加密,首先由Fridrich于1997年提出,使用二维的Baker映射和Cat映射进行了像素位置的变换,不过二维Cat映射的密钥空间过小,同时局限于对正方形大小图像加密。 The chaotic system is applied to image encryption. It was first proposed by Fridrich in 1997. The two-dimensional Baker map and the Cat map were used to transform the pixel position. However, the key space of the two-dimensional Cat map was too small and limited to square-sized images. encryption. Chen和Mao在Fridrich的基础上,将二维Baker 映射和二维Cat映射扩展到三维,并分别利用三维映射提出了一个快速的图像加密方案。 On the basis of Fridrich, Chen and Mao extended the two-dimensional Baker mapping and the two-dimensional Cat mapping to three-dimensional, and respectively proposed a fast image encryption scheme using three-dimensional mapping. Feng等利用混沌拉伸和折叠的原理提出了line映射图像加密算法后又利用图像分割的思想提出了一种混沌映射图像加密算法。 Feng et al. proposed a line map image encryption algorithm based on the principle of chaotic stretching and folding, and then used the idea of image segmentation to propose a chaotic map image encryption algorithm. 近年来二维混沌映射被扩展到三维空间进行图像加密,如Mao等人提出的3D Baker map图像加密算法,Chen G提出的3D Catmap图像加密算法。 In recent years, two-dimensional chaotic mapping has been extended to three-dimensional space for image encryption, such as the 3D Baker map image encryption algorithm proposed by Mao et al., and the 3D Catmap image encryption algorithm proposed by Chen G.
[0003] 国家知识产权局于2012年12月19日公开了公开号为CN102831569A,专利名称为一种面向手机服务的数字图像选择加密方法的发明专利文献,该专利文献:包括待加密分数小波低频子带的选择、图像混沌加密密钥的确定、图像的加密操作及加密质量评价四部分; 其中,图像混沌加密密钥的确定,要实现分数小波变换和混沌加密需要确定以下参数: [0003] The State Intellectual Property Office published on December 19, 2012, the publication number CN102831569A, and the patent name is an invention patent document for a mobile phone service-oriented digital image selection encryption method. The patent document includes the fractional wavelet low frequency to be encrypted. The selection of subbands, the determination of the image chaotic encryption key, the image encryption operation and the evaluation of encryption quality; among them, the determination of the image chaotic encryption key requires the following parameters to be determined in order to realize the fractional wavelet transform and chaotic encryption:
[0004] (1)混沌序列的控制参数a,由用户给出; [0004] (1) The control parameter a of the chaotic sequence is given by the user;
[0005] (2)图像小波变换的尺度队由用户给出; [0005] (2) The scale team of the image wavelet transform is given by the user;
[0006] ⑶分数小波变换的分数阶数y,且满足〇< y <2,由用户给出; [0006] ⑶ The fractional order y of the fractional wavelet transform, and satisfies 〇<y<2, given by the user;
[0007] ⑷混沌序列初始值X⑼,它的确定过程如下: [0007] ⑷The initial value of the chaotic sequence X⑼, its determination process is as follows:
[0008] 步骤1.设原始图像是m比特的,从被选择的子带中任选5个像素点P1,P2,P3,P4, P5,由这5个点的像素值来获得该子带的混沌序列初始值; [0008] Step 1. Assuming that the original image is m-bit, choose 5 pixels P1, P2, P3, P4, P5 from the selected subband, and obtain the subband from the pixel values of these 5 points The initial value of the chaotic sequence;
[0009] 步骤2.按照下列公式计算所选小波子带的混沌序列初始值: [0009] Step 2. Calculate the initial value of the chaotic sequence of the selected wavelet subband according to the following formula:
[0010] 上述四个参数a, ¢, Y ,x⑼构成所选子带图像加密的密钥; [0010] The above-mentioned four parameters a, ¢, Y, x⑼ constitute the key of the selected sub-band image encryption;
[0011] 图像的加密操作如下:步骤1.对于所选择的小波低频子带,设该子带的大小是N1 X N2,利用这个分数小波低频子带生成的系列初始值X (〇),按照如下映射生成混沌序列:X (n+1) =cos (a • arccos (X (n))⑷,其中,c[是控制参数,且X (n) G [-1,1],此时所生成的序列是混沌的,由于这个混沌序列是双极性的,按照下述变换将其转化成[0,1]内的单极性序列:这个序列的长度取为N1 X N2,并将这N1 X N2个数值转换成N1行N2列的混沌矩阵,记为U; [0011] The image encryption operation is as follows: Step 1. For the selected wavelet low-frequency sub-band, set the size of the sub-band to be N1 X N2, use this fractional wavelet low-frequency sub-band to generate a series of initial values X (〇), according to The chaotic sequence is generated by the following mapping: X (n+1) = cos (a • arccos (X (n))⑷, where c[ is the control parameter, and X (n) G [-1, 1], at this time The generated sequence is chaotic. Since this chaotic sequence is bipolar, it is transformed into a unipolar sequence in [0,1] according to the following transformation: the length of this sequence is taken as N1 X N2, and this N1 X N2 values are converted into a chaotic matrix with N1 rows and N2 columns, denoted as U;
[0012] 步骤2.对所选择的分数小波低频子带进行加密,加密按如下公式计算:其中,是X0R运算,ValueNew (i,j)、Value01d (i,j)分别是所选择分数小波低频子带加密后与加密目U 在第i行第j列的低频子带分数小波系数; [0012] Step 2. Encrypt the selected fractional wavelet low-frequency subband, and the encryption is calculated according to the following formula: Among them, is the XOR operation, ValueNew (i, j) and Value01d (i, j) are the selected fractional wavelet low-frequency, respectively After sub-band encryption, the low-frequency sub-band fractional wavelet coefficients in the i-th row and j-th column of the encrypted target U;
[0013] 步骤3.用加密后的分数小波低频子带替换加密前的分数小波低频子带之后,进行小波逆变换,获得初始加密图像; [0013] Step 3. After replacing the encrypted fractional wavelet low-frequency sub-band with the encrypted fractional wavelet low-frequency sub-band, perform inverse wavelet transform to obtain the initial encrypted image;
[0014] 步骤4.将所获得的初始加密图像分割成4幅大小相同的子图像,之后对这4幅子图像依照顺时针方向做轮换处理后,所获得的图像就是最终的加密图像。 [0014] Step 4. Divide the obtained initial encrypted image into four sub-images of the same size, and then rotate the four sub-images in a clockwise direction, and the obtained image is the final encrypted image.
[0015] 上述专利的技术方案与本专利的技术方案完全不同。 [0015] The technical solution of the above-mentioned patent is completely different from the technical solution of this patent.
发明内容Summary of the invention
[0016]本发明的目的在于提供一种保密性强、加密还原度高的高维混纯映射的视频保密通信方法。 [0016] The object of the present invention is to provide a video secure communication method of high-dimensional hybrid mapping with strong confidentiality and high degree of encryption restoration. U U
[0017] 为实现上述目的,本发明所采用的技术方案是: [0017] In order to achieve the above objective, the technical solution adopted by the present invention is:
[0018] 一种高维混沌映射的视频保密通信方法,包括以下步骤: [0018] A high-dimensional chaotic mapping video secure communication method, including the following steps:
[0019] A.建立8维离散混沌映射的动力学方程: ::¾.维.=.:访&成4鐵』::光痛2¾¾十:'-:,法.為A,*,.2 :) [0019] A. Establish the dynamic equation of the 8-dimensional discrete chaotic map: ::¾. dimension.=.: visit&成4铁"::light pain 2¾¾ ten:'-:, method. is A,*, .2 :)
[0020] 滅為2¾ 妒.為产) 义8勒:1 ;鐵為.1:高灰步為裒本;2,丨..:于…+為8气1^.:窆:.:8 ) [0020] Mie is 2¾ jealous. For production) Yi 8 Le: 1; Iron is .1: High gray step is a botan; 2, 丨..: Yu...+为8气1^.:窆:.:8 )
[0021] 式中Ni(i = l,2,…,8) =2,A8= (Aij)8x8(i, j = i,2,".,8)的构造方法为其中: \ /=:+i 含"i 钗”、 0 1 — 0 苟^ 0 ::,.: :〇:: ::〇0 0 1 0 •,0 0 [0021] In the formula, Ni (i = 1, 2,..., 8) = 2, A8 = (Aij) 8x8 (i, j = i, 2, "., 8) The construction method is where: \ /=: +i contains "i hairpin", 0 1 — 0 Gou^ 0 ::,.::〇::::0 0 0 1 0 •, 0 0
[0022] 〇: q: 〇... :t: •>: 〇〇〇Cif 0 (j 1' :〇. 靖0' _:0 0:… 幻〇:ii 〇:〇: i, [0022] 〇: q: 〇... :t: •>: 〇〇〇Cif 0 (j 1':〇. 靖0' _:0 0:... Magic 〇: ii 〇: 〇: i,
[0023] 下标排序〇i, j,其中i,j的取值应满足的条件为2.---,7 [0023] The subscript order 〇i, j, where the value of i, j should meet the conditions 2.---, 7
[0024] = / + 2/.,,1 [0024] = / + 2/.,,1
[0025]选择其中的一种下标排序为: [0025] One of the subscript sorts is selected as:
[0026] 〇i,j = 78,13,14,15,16,45,18,23,24,25,57,27,28,34,35,36,37,38,17,46,47, 48,56,26,58,67,68,12则相应的变换矩阵A8为Tij的乘积,得3990517 9恥8413 226236 4794X46 22802340 143956428 2426531 I 23狀78586、; 103377 170555 3300 72240 3450S4 2207175 389517 3597285 (Aa A, — 如64191 丨4931951 341X37 7246707 M4635抑217599315 36692J73 355<):5()只45 [0026] 〇i,j=78,13,14,15,16,45,18,23,24,25,57,27,28,34,35,36,37,38,17,46,47, 48, 56, 26, 58, 67, 68, 12, the corresponding transformation matrix A8 is the product of Tij, which is 3990517 9sha 8413 226236 4794X46 22802340 143956428 2426531 I 23-shaped 78586,; 103377 170555 3300 72240 3450S4 2207175 389517 3597285 (Aa A, — such as 64191 丨4931951 341X37 7246707 M4635 or 217599315 36692J73 355<): 5()个45
[0027] 4: ' 4'~ ... 4251336 7002429 162735 3440882 16357955 103167336 17326695 168341529 " ...... 1743033 28709:U 66858 1412607 6715337 42346893 7108446 69099612 \4i: -- 4a y 6081 10086 195 2703 133M 88019 leslS 143121 157々4: .:259^6 939 16023 76080: 46t016 70400 輝3々難、23712 ":mm 1446 24249 :1::151 療70;6Q44 t〇57_ :1:|:5483;1:. :/ [0027] 4: '4'~ ... 4251336 7002429 162735 3440882 16357955 103167336 17326695 168341529 "...... 1743033 28709: U 66858 1412607 6715337 42346893 7108446 69099612 \4i: - 4a y 6081 10086 195 2703 133M 88019 leslS 143121 157々4: .:259^6 939 16023 76080: 46t016 70400 辉3々difficult, 23712": mm 1446 24249 :1::151 treatment 70; 6Q44 t〇57_:1:|:5483; 1:. :/
[0028]得视频像素位置置乱加密算法为f S = 0 to^=0:3;fors=0:3;fe、=0.3;feh=〇:3;te^=〇:3;fel=0:3;fcrM^3_M:_3; ECS, 1) = mod (4,xu + AI2xu + 4,.tj,4 + A,Aa + 4^s,t + + + ^8¾.^ ^ E(S, 2) = mod(4,x, 4 +,A,x%, + A23x{J + ^4¾.* + ^si + + Ar<x^ 4 4>*:: 机?,3)=腦d ('J31xu + 人+ 4,¾ + +¾ * + 4A* + + + 為A” 4>; r ^ I 啦4) = mod (為而+ ,4A, + 4A〆心4 i + 4而+ + 4*〆〆4A* ' 你: L 」 EiS 5) = mod <4,x, ( + 4^,,^ + + ^ i + ^ < + < + + ^1,4)" E(S, 6) = mod (4,.xu + A^2x2 > + + A>x> * + + ^x〇1 + ^^7-* + ' 4), £(5; 7>= mod (4,¾ + 為/以+ 43xw + 為〆+ 為A* + 為〇xw + 為Aw + ' 4)' £(•?,8> = mod(.Vu + 為〜+ ] 4¾ + 為+ + Vw ' 4); s<-s-\ke喊etirt; 廊出雄_ [0028] The video pixel position scrambling encryption algorithm is f S=0 to^=0:3; fors=0:3; fe, =0.3; feh=〇:3; te^=〇:3; fel=0 :3;fcrM^3_M:_3; ECS, 1) = mod (4,xu + AI2xu + 4,.tj,4 + A,Aa + 4^s,t + + + ^8¾.^ ^ E(S, 2) = mod(4,x, 4 +,A,x%, + A23x{J + ^4¾.* + ^si + + Ar<x^ 4 4>*:: machine?, 3)=脑d ( 'J31xu + person + 4,¾ + +¾ * + 4A* + + + is A” 4>; r ^ I 啦4) = mod (为和+ ,4A, + 4A〆心4 i + 4和+ + 4*〆〆4A*'You: L ”EiS 5) = mod <4,x, (+ 4^,,^ + + ^ i + ^ <+ <+ + ^1, 4)" E(S, 6 ) = mod (4,.xu + A^2x2> + + A>x> * + + ^x〇1 + ^^7-* + '4), £(5; 7>= mod (4,¾ + For/to + 43xw + to 〆+ for A* + for 〇xw + for Aw + '4)' £(•?, 8> = mod(.Vu + for ~+] 4¾ + for + + Vw' 4) ; s<-s-\ke shout etirt; Lang Chuxiong_
[0030] 式中的第二行和最后一行联合起来表示8个从0到3的嵌套循环; [0030] The second line and the last line in the formula jointly represent 8 nested loops from 0 to 3;
[0031] B •通过上述8个从0到3的嵌套循环,循环次数为216,与一帧图像的像素相等,根据上式,得视频像素位置置乱加密算法的映射表如下表所示: 易£'(5,1) £ (5,2) E (5,3) : •,. 茗働) [0031] B • Through the above 8 nested loops from 0 to 3, the number of loops is 216, which is equal to the pixels of a frame of image. According to the above formula, the mapping table of the video pixel position scrambling encryption algorithm is shown in the following table : Easy £'(5,1) £ (5,2) E (5,3): •,. Ming働)
[0032] 0 £-((),1) £-(0,2) Ei〇M 衣傭. 1 .._:1.,.1.): 麓:(1,2;): : j:(w):丨… ••,霉'1 ^.(1,:1):.五1¾¾ : :… 贫丨顚) [0032] 0 £-((),1) £-(0,2) Ei〇M clothing service. 1 .._:1., .1.): :(1,2;):: j: (w):丨… ••,霉'1 ^.(1,:1):.五1¾¾: :... 桗顚)
[0033] 1 :; :: - 丨、::k__^__ 2¾ ^(21(>-1,1) £(^6AA ^ 顏釋6巧身[0033] 1 :; ::-丨, ::k__^__ 2¾ ^(21(>-1,1) £(^6AA ^ 颜释6巧身
[0034] 由于视频像素位置置乱加密算法中的取模运算是模4运算,故映射表中的每一项E (S,i)只能有0,1,2,3四种可能的取值,即[0034] Since the modulo operation in the video pixel position scrambling encryption algorithm is a modulo 4 operation, each item E (S, i) in the mapping table can only have four possible selections: 0, 1, 2, and 3. Value, i.e.
[0035] E(S,i) e {〇,1,2,3} [0035] E(S,i) e {〇,1,2,3}
[0036] 式中S = 0,l,2,…,216_l,i = l,2,…,8; [0036] where S = 0, 1, 2, ..., 216_l, i = 1, 2, ..., 8;
[0037] C.加密运算: _ _ [0037] C. Encryption operation: _ _
[0038] ①给二维视频图像中的每个像素编排顺序号:像素位置置乱加密之前将一幅大小为256X256的二维视频图像像素的位置表示成一维数组,共有65536个像素点,对应该一维数组的长度为65536,在像素位置置乱加密之前,每一个像素对应一个顺序号,顺序号3每次按增加1的顺序排列并且满足〇彡s<216-1,S (S = 0,1,2,…,216-1)的大小为~ xitk x + x7,kx 2 2 + x 2 + x4 kx 2 :' +. ^ [0038] ① Arrange a sequence number for each pixel in the two-dimensional video image: before the pixel position is scrambled and encrypted, the pixel position of a two-dimensional video image with a size of 256X256 is expressed as a one-dimensional array, with a total of 65536 pixels. The length of the one-dimensional array should be 65536. Before the pixel position is scrambled and encrypted, each pixel corresponds to a sequence number. The sequence number 3 is arranged in the order of increasing by 1 each time and satisfies 〇彡s<216-1, S (S = The size of 0,1,2,…,216-1) is ~ xitk x + x7,kx 2 2 + x 2 + x4 kx 2 :'+. ^
[0039] x 26 + x 24 + a.7J x 22 + x 2° [0039] x 26 + x 24 + a.7J x 22 + x 2°
[0040] ②构建视频像素位置置乱加密后的顺序号:利用映射表中每一行对应的8个E(S, i) (i = 1,2,…,8),构造一个视频像素位置置乱加密之后的顺序号,则对应顺序号的大小为[0040] ②Construct the sequence number of the video pixel position scrambled and encrypted: use 8 E(S, i) (i=1, 2,..., 8) corresponding to each row in the mapping table to construct a video pixel position The sequence number after random encryption, the size of the corresponding sequence number is
[0041] E(S) =E(S,ai) X214+E(S,a2) X212+E(S,a3) X210+E(S,a4) X28+ [0041] E(S)=E(S,ai) X214+E(S,a2) X212+E(S,a3) X210+E(S,a4) X28+
[0042] E (S,a5) X 26+E (S,a6) X 24+E (S,a7) X 22+E (S,a8) X 2 [0042] E (S, a5) X 26+E (S, a6) X 24+E (S, a7) X 22+E (S, a8) X 2
[0043] 式中ai(i = l,2,••.,8)e{l,2,…,8},cllテa2关…关an。 [0043] In the formula, ai (i = l, 2,••., 8)e{l, 2,..., 8}, cllテa2 is off...off an. 根据上式,由于S与E⑸是一对一的,故E⑸也有65536种不同的取值; & According to the above formula, since S and E⑸ are one-to-one, E⑸ also has 65,536 different values; &
[0044] ③利用视频像素位置置乱加密算法映射表,将原来位置为S处的像素值映射到位置为E⑸处,由此得到一帧图像的密文值p⑹; & [0044] ③Using the video pixel position scrambling encryption algorithm mapping table, map the pixel value at the original position S to the position E⑸, thereby obtaining the ciphertext value p⑹ of a frame of image; &
[0045] D.信息传送:服务器端同时将一帧图像的密文值P (k)通过以太网传送给客户端; [0045] D. Information transmission: the server simultaneously transmits the ciphertext value P (k) of a frame of image to the client via Ethernet;
[0046] E.客户端利用以同样方式产生的映射表对密文值P (k)进行反映射实现解密。 [0046] E. The client uses the mapping table generated in the same way to reverse-map the ciphertext value P (k) to achieve decryption.
[0047] 进一步地,所述步骤C中的步骤③中的具体方法如下: _ 一[0047] Further, the specific method in step ③ in step C is as follows: _一
[0048]首先,设视频像素位置置乱加密之前的二维坐标为(x,y),则加密之前的二维坐标(x, y)与一维数组顺序号S (S = 0,1,2,…,216-1)之间的关系为1^: == :floor(S: / 256) H-;l [0049] 啦,256)_ [0048] First, suppose the two-dimensional coordinates of the video pixel position before scrambling and encryption are (x, y), then the two-dimensional coordinates (x, y) before encryption and the one-dimensional array sequence number S (S = 0, 1, 2. The relationship between …, 216-1) is 1^: == :floor(S: / 256) H-;l [0049] 啦,256)_
[0050] 式中floor表示向下取整,mod为模函数; 、 [0050] In the formula, floor represents rounding down, and mod is a modular function; 、
[0051]其次,设视频像素位置置乱加密后的二维坐标为(x6,h),则加密后的二维坐标(Xe,ye)与一维数组顺序号E⑸之间的关系为「00521 ^ ^ 2561+1 ]_凡=modl£(S),256卜1. [0051] Secondly, assuming that the two-dimensional coordinates of the video pixel position scrambled and encrypted are (x6, h), the relationship between the encrypted two-dimensional coordinates (Xe, ye) and the sequence number E⑸ of the one-dimensional array is "00521 ^ ^ 2561+1 ]_凡=modl£(S), 256 div 1.
[0053] 如果位置置乱加密之前对应二维坐标(x,y)的视频像素值为V(x,y),则位置置乱加密之后对应二维坐标(Xe,ye)的视频像素值为w (x6,ye),进行下式所示的置换操作运算[0053] If the video pixel value corresponding to the two-dimensional coordinates (x, y) before the position scrambling and encryption is V(x, y), then the video pixel value corresponding to the two-dimensional coordinates (Xe, ye) after the position scrambling and encryption is w (x6, ye), perform the permutation operation shown in the following formula
[0054] Ve (xe,ye) =V (x,y) [0054] Ve (xe,ye) =V (x,y)
[0055] 则实现了视频像素的位置置乱的加密,最后得到一帧图像的密文值P(k)。 [0055] The encryption of the position scrambling of the video pixels is realized, and the ciphertext value P(k) of a frame of image is finally obtained.
[0056] 进一步地,所述步骤E中的具体解密方法如下:解密是加密的逆运算,设解密后对应像素顺序号的数学表达式为[0056] Further, the specific decryption method in step E is as follows: decryption is the inverse operation of encryption, and the mathematical expression corresponding to the pixel sequence number after decryption is
[0057] D(S)=D(S,ai) X214+D(S,a2) X212+D(S,a3) X210+D(S,a4) X28+D(S,a5) X26+D(S, a6) X24+D(S,a7) X22+D(S,a8) X2° [0057] D(S)=D(S,ai) X214+D(S,a2) X212+D(S,a3) X210+D(S,a4) X28+D(S,a5) X26+D( S, a6) X24+D(S,a7) X22+D(S,a8) X2°
[0058] 设视频像素解密后的二维坐标为(Xd,yd),则二维坐标(xd,yd)与一维数组顺序号D (S)的关系为「巧=flooi'l />($) / 2561 +1 [0058] Assuming that the two-dimensional coordinates of the decrypted video pixels are (Xd, yd), the relationship between the two-dimensional coordinates (xd, yd) and the sequence number D (S) of the one-dimensional array is "Q=flooi'l />( $) / 2561 +1
[0059] " ' ' . ' = mod| D(S)? 2561 + 1 [0059] "''. '= Mod| D(S)? 2561 + 1
[0060] 式中floor表不向下取整,mod为検函数; [0060] In the formula, floor is not rounded down, and mod is a function;
[0061] 根据上式,设解密后对应二维坐标(xd,yd)的视频像素值为(xd,yd),如果要实现视频图像的解密,只需进行下式所示的置换操作运算%(x,y) =Ve (Xd,yd),将加密后像素对应的一维数组顺序号还原成S (S = 0,1,2,…,216-1),实现对密文值P (k)进行反映射的解密。 [0061] According to the above formula, it is assumed that the video pixel value corresponding to the two-dimensional coordinates (xd, yd) after decryption is (xd, yd). If you want to decrypt the video image, you only need to perform the replacement operation shown in the following formula% (x, y) =Ve (Xd, yd), restore the sequence number of the one-dimensional array corresponding to the encrypted pixel to S (S = 0,1,2,...,216-1), and realize the ciphertext value P ( k) Decryption of the reverse mapping.
[0062] 本发明的有益效果:由于采用了上述的方法,与同类方法相比,具有保密性强、加密还原度高的特点。 [0062] The beneficial effects of the present invention: due to the adoption of the above method, compared with similar methods, it has the characteristics of strong confidentiality and high encryption reduction.
附图说明Description of the drawings
[0063]图1为高维混沌映射的视频保密通信系统的组成框图; [0063] FIG. 1 is a block diagram of a video secure communication system based on high-dimensional chaotic mapping;
[0064] 图2为Client端工作流程图; [0064] FIG. 2 is a working flow chart of the Client side;
[0065] 图3为Server端工作流程图。 [0065] FIG. 3 is a working flow chart of the Server side.
具体实施方式Detailed ways
[0066] 如图1、2、3所示,对视频高维混沌映射加密的硬件配置:用两块Super 4412的ARM 板建立一个Server-Client模型,建立Server和Client各自的socket,作为双方通信的基础。 [0066] As shown in Figures 1, 2, and 3, the hardware configuration of the video high-dimensional chaotic map encryption: use two Super 4412 ARM boards to establish a Server-Client model, and establish the respective sockets of the Server and the Client as communication between the two parties. The basics. 图像实时采集、高维混沌映射加密的ARM开发板作为Client端,由摄像头、V4L2驱动、 JPEG解压缩、混沌加密、H. 264压缩、网卡驱动、以太网端口、液晶显示屏八个部分组成,通过混沌加密和H. 264压缩后的视频数据经以太网传输。 The ARM development board with real-time image acquisition and high-dimensional chaotic mapping encryption is used as the client side. It consists of eight parts: camera, V4L2 driver, JPEG decompression, chaotic encryption, H.264 compression, network card driver, Ethernet port, and LCD screen. The video data after chaos encryption and H.264 compression is transmitted via Ethernet. 高维混沌映射解密的ARM开发板作为Server端,负责接收传输过来的密文信息。 The ARM development board for high-dimensional chaotic map decryption serves as the server side and is responsible for receiving the transmitted ciphertext information. 以太网端口、网卡驱动、H.264解压缩、混沌解密、 液晶显示屏五个部分组成,其在Cl ient端和Server端,都是在Cortex-A9型处理器上运行嵌入式Linux操作系统,通过C++编程来实现上述对应部分的功能。 The Ethernet port, network card driver, H.264 decompression, chaos decryption, and LCD display are composed of five parts. Both the Cl ient and Server sides run the embedded Linux operating system on the Cortex-A9 processor. The functions of the above corresponding parts are realized through C++ programming. 由于USB摄像头输出的视频图像数据是硬件编码后的JPEG压缩格式,因此,首先需要将每帧JPEG图像进行JPEG解压缩后,才能得到对应的RGB三基色视频格式。 Since the video image data output by the USB camera is a hardware-encoded JPEG compression format, it is necessary to decompress each frame of JPEG image with JPEG before the corresponding RGB three-color video format can be obtained. 另外,局域网通信采用socket编程,采用面向连接的、可靠地TCP协议。 In addition, the LAN communication adopts socket programming, and adopts connection-oriented and reliable TCP protocol.
[0067]利用上述的硬件配置,实现视频保密通信,一种高维混沌映射的视频保密通信方法,包括以下步骤: [0067] Using the above hardware configuration to realize video secure communication, a high-dimensional chaotic mapping video secure communication method includes the following steps:
[0068] A •建立8维离散混沌映射的动力学方程: •VUM + 2 ' ) [0068] A • Establish the dynamic equation of the 8-dimensional discrete chaotic map: • VUM + 2 ')
[0069] < 〜+1 =mod(為,¾ +42义” +..' + 4sx8i,2A' > ,XS./t+l +為2又'2_4 +…+ 2 s) [0069] <~+1=mod(为,¾ +42义" +..' + 4sx8i, 2A'> ,XS./t+1 +为2又'2_4 +...+ 2 s)
[0070] 式中仏(1 = 1,2,".,8)=2,六8=以。)8><8(1,」=1,2,".,8)的构造方法为為=ni、g,':,其中: ii ::〇i. ft 0: …Uf :i :〇:g: :〇: :ij ::;:; [0070] Where (1 = 1, 2, "., 8) = 2, six 8 = to.) 8><8 (1, "=1, 2, "., 8) is constructed as =ni,g,':, where: ii::〇i. ft 0: …Uf:i:〇:g::〇: :ij::;:;
[0071] 0 p -v :i 〇. ::〇; 0: ::令:\ Q: (i -:• 〇ii om «- 〇: - :〇m I. i〇' [0071] 0 p -v: i 〇. ::〇; 0::: Order: \ Q: (i -:• 〇ii om «- 〇:-: 〇m I. i〇'
[0072]下标排序Oi, j,其中i,j的取值应满足的条件为^ ~ 1»2, • * •,? [0072] The subscript order Oi, j, where the value of i, j should meet the conditions ^ ~ 1»2, • * •,?
[0073] -1=/ + 1,/ + 2.---,8 .m [0073] -1=/ + 1,/ + 2.---, 8.m
[0074]选择其中的一种下标排序0ij为: [0074] One of the subscript order 0ij is selected as:
[0075] 〇ij = 78,13,14,15,16,45,18,23,24,25,57,27,28,34,35,36,37,38,17,46,47, 48,56,26,58,67,68,12则相应的变换矩阵A^Tij的乘积,得'5990537 986M13 226236 4794846 22802340 143956428 2426531J 23487K586" 觸377 170555 3300 72240 345054 2207175 389517 35972B5 : '卷:4» ,4s、 9064191 14931951 341837 7246707 34463589 2175^9315 36692373 355030845 1 4n 4s 4251336 7002429 l〇2735 3440SB2 l〇357935 10316^336 17326695 168341529 L〇〇」 ,:>:: ,,•: ^ 1743033 2870931 6685S 1412607 6715337 42346893 7108446 69099612 、今為2:兩60S1 10086 195 2703 13386 88019 16818 143121 15774 259.26 939 L6023 76080 467016 704^)0 763779 ,23712 3973 1446 24249 115179 7〇MM 105780 1154^1 j, [0075] 〇ij=78,13,14,15,16,45,18,23,24,25,57,27,28,34,35,36,37,38,17,46,47,48, 56, 26, 58, 67, 68, and 12 are the product of the corresponding transformation matrix A^Tij, and get '5990537 986M13 226236 4794846 22802340 143956428 2426531J 23487K586" touch 377 170555 3300 72240 345054 2207175 389517 35972B5:'Volume: 4», 4s , 9064191 14931951 341837 7246707 34463589 2175^9315 36692373 355030845 1 4n 4s 4251336 7002429 l〇2735 3440SB2 l〇357935 10316^336 17326695 168341529 L〇〇" ,:>:: ,,•: ^ 1712607 4243033 2870931 6685S 1412607 6715446337690346893 , Today is 2: two 60S1 10086 195 2703 13386 88019 16818 143121 15774 259.26 939 L6023 76080 467016 704^)0 763779 ,23712 3973 1446 24249 115179 7〇MM 105780 1154^1 j,
[0077]得视频像素位置置乱加密算法为^ = 0; for xu = 0:3; for X, A * 0:3; for x^k = 0:3; for x4 A = 0: 3; foi A - 0:3; for x^k = 0:3; for ,t7 A = 0 • J; for ^ = 0:3; 1.) HlD.d + "t" ^ 4)r £(5; 2) = mod + 為2xw + 為,3〆44x4i + 4¾.+ .為6.〜:..+ 4:7'A +4); E(S, 3) = mod (4,.yu + A3Zxu 4 Jryxu 4 J„xu + + A^k + 4); 1 ^(5, 4) = mod H- A42x2 k + A4^ k -t Ai4x4 k + A45x5 k + A46x6 i + A41xiik + , 4); E(S\ 5)=:taod.p5,^. + + + ^); E{S, 6)-:mod + %%:: + .+A&\k^ 4)i E(S, 7) + A12X1X +vi7jX3^ +-^4¾^ A5Xu + AAk + + ^78^8,ft> 4)> :S):= ^p4^^ + 4^fi: # 44¾.+ AsS,i: & + 4y^7 s + 4sa. a ^ 4): SS + J; end; end; end; end; end; end; end; end; [0077] The video pixel position scrambling encryption algorithm is ^ = 0; for xu = 0:3; for X, A * 0:3; for x^k = 0:3; for x4 A = 0: 3; foi A-0:3; for x^k = 0:3; for ,t7 A = 0 • J; for ^ = 0:3; 1.) HlD.d + "t" ^ 4)r £(5; 2 ) = mod + is 2xw + is, 3〆44x4i + 4¾.+. is 6.~:..+ 4: 7'A +4); E(S, 3) = mod (4,.yu + A3Zxu 4 Jryxu 4 J``xu + + A^k + 4); 1 ^(5, 4) = mod H- A42x2 k + A4^ k -t Ai4x4 k + A45x5 k + A46x6 i + A41xiik +, 4); E( S\ 5)=: taod.p5,^. + + + ^); E{S, 6)-: mod + %%:: + .+A&\k^ 4)i E(S, 7) + A12X1X +vi7jX3^ +-^4¾^ A5Xu + AAk + + ^78^8,ft> 4)> :S): = ^p4^^ + 4^fi: # 44¾.+ AsS, i: & + 4y ^7 s + 4sa. a ^ 4): SS + J; end; end; end; end; end; end; end; end;
[0079]式中的第二行和最后一行联合起来表示8个从〇到3的嵌套循环; [0079] The second and last lines in the formula combine to represent 8 nested loops from 0 to 3;
[0080] B.通过上述8个从0到3的嵌套循环,循环次数为2,与一帧图像的像素相根据上式,得视频像素位置置乱加密算法的映射表如下表所示:__ :$ £(5,1) £(5,2) ^(以3);… 麗保約0 £(0,1) E(0,2)石(〇,3)… 態(明1 #(1,1) 輝J> 祕_ … 纏:(满[0080] B. Through the above 8 nested loops from 0 to 3, the number of loops is 2, and according to the above formula with the pixels of a frame of image, the mapping table of the video pixel position scrambling encryption algorithm is shown in the following table: __: $ £(5,1) £(5,2) ^(with 3);... Li Bao is about 0 £(0,1) E(0,2)石(〇,3)... State (明1 # (1,1) Hui J> Secret_… Entangled: (full
[0081] ................. ::..... ...... …一^—---..…一----———— 1 M:tMf 迟(¾¾ £(2,3) … E (2,8) :: : :: ... .:. ,.. ;•• ♦. . .........+—.... +.. 2:16-1 丨…五(2叱1,, [0081] ................. ::..... ...... …一^—---.....一———— —— 1 M: tMf late (¾¾ £(2,3)… E (2,8) ::: :: ... .:., .. ;•• ♦.. ........ .+—.... +.. 2:16-1 丨...五(2叱1,,
[0082]由于视频像雜置置乱加密算法中的取模运算疋模4运算,故映射表中的每一咖(S,i)只能有0,1,2,3四种可能的取值,即[0082] Due to the modulo operation and modulo 4 operation in the video image scrambling encryption algorithm, each (S, i) in the mapping table can only have four possible values of 0, 1, 2, 3 ,Right now
[0083] E(S,i) e {0,1,2,3} [0083] E(S,i) e {0,1,2,3}
[0084] 式中S = 0,1,2, ...,2^-1,1 = 1,2,...,8; [0084] where S = 0,1,2,...,2^-1,1 = 1,2,...,8;
[0085] C •加密运算: 丄一、1 一[0085] C • Encryption operation: one to one, one to one
[0086]①给二维视频图像中的每个像素编排顺序号:髓位置置乱加想、之别将一巾_大小为256 X256的二维视频图像像麵位置表示成一维数组,共有65536个像素点,对应该一维数组的长度为65536,在像素位置置乱加密之前,每一个像素对应一个顺序号,顺序号S每次按增加1的顺序排列并且满足〇彡3彡216-1,5(5 = 0,1,2,"_,216-1)的大小为0 = x 214 :+ x2j; x 2U + x} kx 2UI + ,r4 A. x 25 + ^ [0086] ① Arrange a sequence number for each pixel in the two-dimensional video image: scrambling the position of the marrow, and not to express the position of the two-dimensional video image with a size of 256 X 256 as a one-dimensional array, with a total of 65536 Pixel points, the length of the corresponding one-dimensional array is 65536. Before the pixel position is scrambled and encrypted, each pixel corresponds to a sequence number. The sequence number S is arranged in the order of increasing by 1 each time and satisfies 〇≦3≦216-1 , The size of 5 (5 = 0, 1, 2, "_, 216-1) is 0 = x 214: + x2j; x 2U + x} kx 2UI + ,r4 A. x 25 + ^
[0087] x5 A x 26 + x61 x + A x 2J + xgt x 2° [0087] x5 A x 26 + x61 x + A x 2J + xgt x 2°
[0088] ②构建视频像素位置置乱加密后的顺序号:利用映射表中每一行对应的8个E(S, i) (i = l,2,〜,8),构造一个视频像素位置置乱加密之后的顺序号,则对应顺序号的大小为[0088] ②Construct the sequence number of the video pixel position scrambled and encrypted: use 8 E(S, i) (i=1, 2, ~, 8) corresponding to each row in the mapping table to construct a video pixel position The sequence number after random encryption, the size of the corresponding sequence number is
[0089] E ⑸二已匕〜)X214+E(S,a2) X212+E(S,a3) X210+E(S,a4) X28+ [0089] E ⑸ Two already dagger~) X214+E(S, a2) X212+E(S, a3) X210+E(S, a4) X28+
[0090] E (S,a5) X 26+E (S,a6) X 24+E (S,a7) X 22+E (S,a8) X 20 [0090] E (S, a5) X 26+E (S, a6) X 24+E (S, a7) X 22+E (S, a8) X 20
[0091] 式中ai(i = l,2,...,8) G {1,2,...,8} 关…关an。 [0091] In the formula, ai (i = 1, 2,..., 8) G {1,2,...,8} close... close an. 根据上式,由于S与E⑸是一对一的,故E (S)也有65536种不同的取值; According to the above formula, since S and E⑸ are one-to-one, E (S) also has 65,536 different values;
[0092] ③利用视频像素位置置乱加密算法映射表,将原来位置为S处的像素值映射到位置为E⑸处,由此得到一帧图像的密文值p⑹,具体方法如下: [0092] ③Using the video pixel position scrambling encryption algorithm mapping table, map the pixel value at the original position S to the position E⑸, thereby obtaining the ciphertext value p⑹ of a frame of image, the specific method is as follows:
[0093] 首先,设视频像素位置置乱加密之前的二维坐标为(x,y),则加密之前的二维坐标(x,y)与一维数组顺序号s (S = 0,1,2,…,216-1)之间的关系为rn fx--= tW(5/256) + 1 [0093] First, suppose the two-dimensional coordinates of the video pixel position before scrambling and encryption are (x, y), then the two-dimensional coordinates (x, y) before encryption and the one-dimensional array sequence number s (S=0, 1, 2. The relationship between …, 216-1) is rn fx--= tW(5/256) + 1
[0094] [). = -.1(5. 256)+1 [0094] [). = -.1(5. 256)+1
[0095] 式中floor表不向下取整,mod为模函数; [0095] In the formula, floor is not rounded down, and mod is a modular function;
[0096] 其次,设视频像素位置置乱加密后的二维坐标为(xe,ye),则加密后的二维坐标(Xe,ye)与一维数组顺序号E (S)之间的关系为「0097] f- =^^[£(S) 25(,1 + 1 [ve =mod|/T(.S')! 256|+1 [0096] Secondly, assuming that the two-dimensional coordinates of the video pixel position scrambled and encrypted are (xe, ye), the relationship between the encrypted two-dimensional coordinates (Xe, ye) and the sequence number E (S) of the one-dimensional array Is "0097] f- =^^[£(S) 25(,1 + 1 [ve =mod|/T(.S')! 256|+1
[0098] 如果位置置乱加密之前对应二维坐标(x,y)的视频像素值为V (x,y),则位置置乱加密之后对应二维坐标(xe,ye)的视频像素值SVe (xe,ye),那么,我们进行下式所示的置换操作运算[0098] If the video pixel value corresponding to the two-dimensional coordinates (x, y) before the position scrambling and encryption is V (x, y), then the video pixel value SVe corresponding to the two-dimensional coordinates (xe, ye) after the position scrambling and encryption is (xe, ye), then, we perform the permutation operation shown in the following formula
[0099] Ve (xe,ye) =V (x,y) [0099] Ve (xe,ye) =V (x,y)
[0100] 则实现了视频像素的位置置乱的加密,最后得到一帧图像的密文值P 〇〇。 [0100] The encryption of the position scrambling of the video pixels is realized, and the ciphertext value P 〇〇 of a frame of image is finally obtained.
[0101] D.信息传送:服务器端同时将一帧图像的密文值P(k)通过以太网传送给客户端; [0101] D. Information transmission: the server simultaneously transmits the ciphertext value P(k) of a frame of image to the client via Ethernet;
[0102] E.客户端利用以同样方式产生的映射表对密文值P (k)进行反映射实现解密。 [0102] E. The client uses the mapping table generated in the same way to reverse-map the ciphertext value P(k) to achieve decryption.
[0103] 解密是加密的逆运算,设解密后对应像素顺序号的数学表达式为[0103] Decryption is the inverse operation of encryption. Suppose the mathematical expression of the pixel sequence number after decryption is
[0104] D(S) =D(S,〇i) X214+D(S,a2) X212+D(S,a3) X 210+D (S,a4) X 28+ [0104] D(S)=D(S,〇i) X214+D(S,a2) X212+D(S,a3) X 210+D (S,a4) X 28+
[0105] D(S,a5) X26+D(S,a6) X24+D(S,a7) X22+D(S,a8) X20 [0105] D(S,a5) X26+D(S,a6) X24+D(S,a7) X22+D(S,a8) X20
[0i06]设视频像素解密后的二维坐标为(Xd,yd),则二维坐标(xd,yd)与一维数组顺序号D (S)的关系为\x, =n〇〇iiDC.S)/256|+1 [0107] 4 ' 1 = mod| 0(.¾ 256 卜1 [0i06] Assuming that the two-dimensional coordinates of the decrypted video pixels are (Xd, yd), the relationship between the two-dimensional coordinates (xd, yd) and the one-dimensional array sequence number D (S) is \x, =n〇〇iiDC. S)/256|+1 [0107] 4 '1 = mod| 0(.¾ 256 卜1
[0108] 式中floor表示向下取整,mod为模函数; [0108] In the formula, floor represents rounding down, and mod is a modular function;
[0109]根据上式,设解密后对应二维坐标(xd,yd)的视频像素值为Mxd,yd),如果要实现视频图像的解密,那么,我们只需进行下式所示的置换操作运算Vd (X,y) = (Xd,yd),将加密后像素对应的一维数组顺序号还原成S (S二0,1,2,…,216-1),实现对密文值P (k)进行反映射的解密。 [0109] According to the above formula, suppose the video pixel value corresponding to the two-dimensional coordinates (xd, yd) after decryption is Mxd, yd). If the decryption of the video image is to be realized, then we only need to perform the replacement operation shown in the following formula Operation Vd (X, y) = (Xd, yd), restore the sequence number of the one-dimensional array corresponding to the encrypted pixel to S (S-2 0, 1, 2, ..., 216-1), and realize the ciphertext value P (k) Decryption of the reverse mapping.
[0110] 解密分两种情况:发送端与接收端的参数和密钥相同,D(s) =E(S),V(x,y) =Vd (x,y),接收端能正确解密出原视频图像;发送端与接收端的参数和密钥不同,D⑸#E(S), V(x,y) #Vd (x,y),接收端不能正确解密出原视频图像。 [0110] There are two cases of decryption: the parameters and keys of the sending end and the receiving end are the same, D(s) = E(S), V(x, y) = Vd (x, y), and the receiving end can decrypt correctly Original video image; the parameters and keys of the sending end and the receiving end are different, D⑸#E(S), V(x,y) #Vd (x,y), the receiving end cannot decrypt the original video image correctly.
[0111]注意到用ARM实现时,一方面,需要考虑到视频实时性要求,从速度方面来看,加密算法不能过于复杂和耗时,密轮数不能过多。 [0111] Note that when implemented with ARM, on the one hand, it is necessary to consider the real-time requirements of the video. From the perspective of speed, the encryption algorithm cannot be too complicated and time-consuming, and the number of dense rounds cannot be too many. 通常在硬件实验中,选取加密轮数为i。 Usually in hardware experiments, the number of encryption rounds is selected as i. 得ARM 实现时,密钥空间大小的保守估计值为[0112] Ks= (8 X 7) /2) ! X 8! = 1.2293 X 1〇34。 When implemented by ARM, the conservative estimate of the key space size is [0112] Ks= (8 X 7) /2)! X 8! = 1.2293 X 1034.
[0113]以上所述是本发明的优选实施方式而己,当然不能以此来限定本发明之权利范围,应当指出,对于本技术领域的普通技术人员来说,对本发明的技术方案进行修改或者等同替换,都不脱离本发明技术方案的保护范围。 [0113] The above are the preferred embodiments of the present invention. Of course, it cannot be used to limit the scope of rights of the present invention. The equivalent replacement does not depart from the protection scope of the technical solution of the present invention.
Claims (3)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410336408.6A CN104135669B8 (en) | 2014-07-16 | 2014-07-16 | A kind of video secret communication method of multi-dimension Chaos mapping |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410336408.6A CN104135669B8 (en) | 2014-07-16 | 2014-07-16 | A kind of video secret communication method of multi-dimension Chaos mapping |
Publications (3)
Publication Number | Publication Date |
---|---|
CN104135669A CN104135669A (en) | 2014-11-05 |
CN104135669B CN104135669B (en) | 2017-08-25 |
CN104135669B8 true CN104135669B8 (en) | 2017-10-10 |
Family
ID=51808179
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410336408.6A Active CN104135669B8 (en) | 2014-07-16 | 2014-07-16 | A kind of video secret communication method of multi-dimension Chaos mapping |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104135669B8 (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105049877A (en) * | 2015-06-02 | 2015-11-11 | 阔地教育科技有限公司 | Encryption method and device for live and recorded broadcast interaction system |
CN105744294B (en) * | 2016-02-04 | 2017-11-17 | 广东工业大学 | The video Development of Chaotic Secure Communication Method that a kind of mobile phone is realized |
CN108900868B (en) * | 2018-08-14 | 2020-11-13 | 苏州科达科技股份有限公司 | Video transmission method, device and storage medium based on H.264 |
CN109788299A (en) * | 2019-03-12 | 2019-05-21 | 广东工业大学 | Video transmission method, system, equipment and computer media between a kind of mobile device |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101431400A (en) * | 2008-12-06 | 2009-05-13 | 华中科技大学 | Encryption/decryption method and system based on chaos hybrid self-synchronizing method |
CN102263636A (en) * | 2011-05-24 | 2011-11-30 | 浙江工业大学 | Stream cipher key control method for fusing neural network with chaotic mappings |
CN102831569A (en) * | 2012-08-17 | 2012-12-19 | 华中师范大学 | Mobile-service-oriented digital image selective encryption method |
CN103473784A (en) * | 2013-09-29 | 2013-12-25 | 河海大学常州校区 | Blurred image self-adaptation recovering method based on high-dimensional space geometry informatics |
CN103856786A (en) * | 2012-12-04 | 2014-06-11 | 中山大学深圳研究院 | Streaming media video encryption method and device based on H.264 |
CN103888637A (en) * | 2014-04-08 | 2014-06-25 | 广东工业大学 | Method for chaotic encryption of multi-path image digital information |
-
2014
- 2014-07-16 CN CN201410336408.6A patent/CN104135669B8/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101431400A (en) * | 2008-12-06 | 2009-05-13 | 华中科技大学 | Encryption/decryption method and system based on chaos hybrid self-synchronizing method |
CN102263636A (en) * | 2011-05-24 | 2011-11-30 | 浙江工业大学 | Stream cipher key control method for fusing neural network with chaotic mappings |
CN102831569A (en) * | 2012-08-17 | 2012-12-19 | 华中师范大学 | Mobile-service-oriented digital image selective encryption method |
CN103856786A (en) * | 2012-12-04 | 2014-06-11 | 中山大学深圳研究院 | Streaming media video encryption method and device based on H.264 |
CN103473784A (en) * | 2013-09-29 | 2013-12-25 | 河海大学常州校区 | Blurred image self-adaptation recovering method based on high-dimensional space geometry informatics |
CN103888637A (en) * | 2014-04-08 | 2014-06-25 | 广东工业大学 | Method for chaotic encryption of multi-path image digital information |
Non-Patent Citations (2)
Title |
---|
基于局域网的混沌视频加密研究与实现;禹思敏 李黎明;《电子世界》;20140515(第9期);1-138 * |
基于混沌理论的信息加密技术研究;宋春艳;《中国博士学位论文全文数据库》;20130101;1-125 * |
Also Published As
Publication number | Publication date |
---|---|
CN104135669B (en) | 2017-08-25 |
CN104135669A (en) | 2014-11-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104135669B8 (en) | A kind of video secret communication method of multi-dimension Chaos mapping | |
WO2020023982A3 (en) | Method and apparatus for combining data to construct a floor plan | |
EP3068066A3 (en) | Private computation on encrypted biometric data using homomorphic encryption | |
AU2016266557A8 (en) | Secure dynamic communication network and protocol | |
WO2017109584A3 (en) | Computer-implemented cryptographic method for improving a computer network, and terminal, system and computer-readable medium for the same | |
WO2016044856A3 (en) | Nado cryptography with key generators | |
WO2016113429A3 (en) | Self-rectification of stereo camera | |
MX2016001900A (en) | Nado cryptography using one-way functions. | |
Soleymani et al. | A novel public key image encryption based on elliptic curves over prime group field | |
CN103971317A (en) | Fractional order chaotic mapping based image encryption method | |
EP2908493A3 (en) | Secure communication systems | |
CN105279729A (en) | Three-dimensional information encryption method based on integral imaging and multi-chaotic system | |
EP3695560A1 (en) | Encryption and decryption of media data | |
PL3813365T3 (en) | Rendering wide color gamut, two-dimensional (2d) images on three-dimensional (3d) capable displays | |
CN104376267A (en) | Image shuffling encrypting method based on fractional order chaotic mapping | |
Liu et al. | Security assessment on block-Cat-map based permutation applied to image encryption scheme | |
CN104077739A (en) | Color image quick encryption method | |
WO2016204846A3 (en) | System and method for an enhanced xor cipher through extensions | |
Zhang | Comments on “Color image encryption using Choquet fuzzy integral and hyper chaotic system” | |
CN104144056B (en) | Self-authorized CP-ABE system and method | |
Christy et al. | Feed forward networks in color extended visual cryptography to generate meaningful shares | |
Smyth et al. | Translating between equational theories for automated reasoning | |
WO2016073058A3 (en) | Method and apparatus for secure elgamal-type cryptography | |
Kamat et al. | Symmetric image encryption algorithm using 3d rossler system | |
Thapliyal et al. | A image encryption scheme using chaotic maps |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB03 | Change of inventor or designer information |
Inventor after: Lin Zhuosheng Inventor after: Yu Simin Inventor after: Lv Jinhu Inventor before: Lin Zhuosheng Inventor before: Yu Simin |
|
COR | Change of bibliographic data | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CI03 | Correction of invention patent |
Correction item: Inventor Correct: Lin Zhuosheng|Yu Simin|Lv Jinhu False: Lin Zhuosheng|Yu Simin Number: 34-02 Volume: 33 Correction item: Inventor Correct: Lin Zhuosheng|Yu Simin|Lv Jinhu False: Lin Zhuosheng|Yu Simin Number: 34-02 Page: Fei Ye Volume: 33 |
|
CI03 | Correction of invention patent |