CN104240177A - Colored image encryption method based on chaotic system and fractional order Fourier transform - Google Patents
Colored image encryption method based on chaotic system and fractional order Fourier transform Download PDFInfo
- Publication number
- CN104240177A CN104240177A CN201410486126.4A CN201410486126A CN104240177A CN 104240177 A CN104240177 A CN 104240177A CN 201410486126 A CN201410486126 A CN 201410486126A CN 104240177 A CN104240177 A CN 104240177A
- Authority
- CN
- China
- Prior art keywords
- matrix
- image
- fourier transform
- encryption
- matrices
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000000739 chaotic effect Effects 0.000 title claims abstract description 31
- 238000000034 method Methods 0.000 title claims abstract description 31
- 239000011159 matrix material Substances 0.000 claims abstract description 45
- 230000000694 effects Effects 0.000 abstract description 2
- 238000000605 extraction Methods 0.000 abstract 1
- 238000012360 testing method Methods 0.000 description 5
- 230000009466 transformation Effects 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 2
- 238000013478 data encryption standard Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000035945 sensitivity Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 150000001875 compounds Chemical class 0.000 description 1
- 238000010219 correlation analysis Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000009792 diffusion process Methods 0.000 description 1
- 230000009931 harmful effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000010206 sensitivity analysis Methods 0.000 description 1
Landscapes
- Facsimile Transmission Control (AREA)
- Image Analysis (AREA)
Abstract
本发明公开一种基于混沌系统和分数阶傅立叶变换的彩色图像加密方法,涉及图像加密系统领域。采用的方法如下:首先用Logistic混沌系统产生混沌序列,对重组后的彩色图像矩阵进行全局像素置乱;然后对上一步结果进行分数阶傅立叶变换;最后再次利用Logistic混沌系统产生混沌序列,对上一步提取模长和相角并重组的矩阵进行全局像素置乱,从而实现对图像的加密。本发明引入了一幅图像构造复数矩阵,降低了两幅图像构造复数矩阵的算法占用空间;引入了全局像素置乱和分数阶傅立叶变换加密像素值,降低了图像间像素点的相关性,提高了算法抗干扰性和抗攻击性,加密效果好,安全性高。
The invention discloses a color image encryption method based on a chaotic system and fractional Fourier transform, and relates to the field of image encryption systems. The method adopted is as follows: First, use the Logistic chaotic system to generate a chaotic sequence, and perform global pixel scrambling on the reorganized color image matrix; then perform a fractional Fourier transform on the result of the previous step; finally use the Logistic chaotic system to generate a chaotic sequence again, and perform One-step extraction of modulus length and phase angle and recombined matrix for global pixel scrambling, so as to realize the encryption of the image. The present invention introduces one image to construct a complex matrix, which reduces the space occupied by the algorithm for constructing a complex matrix from two images; introduces global pixel scrambling and fractional Fourier transform to encrypt pixel values, reduces the correlation of pixel points between images, and improves The anti-interference and anti-attack performance of the algorithm is improved, the encryption effect is good, and the security is high.
Description
技术领域technical field
本发明属于图像处理与信息安全领域,尤其涉及一种采用单一图像加密方式的基于混沌系统和分数阶傅立叶变换的彩色图像加密方法。The invention belongs to the field of image processing and information security, in particular to a color image encryption method based on a chaotic system and fractional Fourier transform using a single image encryption method.
背景技术Background technique
随着计算机网络技术的迅速发展,信息安全已经变成信息传输和存储的严重问题,图像信息传输和图像加密技术都引起了广泛关注。图像信息本身具有数据量大,数据间相关度高等特点,传统的针对纯文本信息的加密方法,如数据加密标准(DES)、国际数据加密算法、非对称加密算法RSA等,并不完全适合图像加密。由于混沌系统具有密钥空间大,初值敏感性,非周期性,非线性以及不可预测性等特点,基于混沌的图像加密方法在安全性、适应性上具有优势,近年来得到了广泛的研究。With the rapid development of computer network technology, information security has become a serious problem in information transmission and storage, image information transmission and image encryption technology have attracted widespread attention. Image information itself has the characteristics of large amount of data and high correlation between data. Traditional encryption methods for plain text information, such as Data Encryption Standard (DES), International Data Encryption Algorithm, RSA Asymmetric Encryption Algorithm, etc., are not completely suitable for image information. encryption. Because the chaotic system has the characteristics of large key space, initial value sensitivity, aperiodicity, nonlinearity and unpredictability, the image encryption method based on chaos has advantages in security and adaptability, and has been extensively studied in recent years.
目前,混沌图像加密方法按加密图像的方法可以分为两类:图像像素值变换和像素坐标变换。图像像素值变换是通过更改图像灰度值来加密图像,像素坐标变换是通过更改图像像素坐标改加密图片。但传统的这两种加密方法的加密密钥均与明文图像无关,所以难以抵抗已知明文攻击。At present, chaotic image encryption methods can be divided into two categories according to the method of encrypting images: image pixel value transformation and pixel coordinate transformation. Image pixel value transformation is to encrypt the image by changing the gray value of the image, and pixel coordinate transformation is to change the encrypted image by changing the image pixel coordinates. However, the encryption keys of these two traditional encryption methods have nothing to do with plaintext images, so it is difficult to resist known plaintext attacks.
此外,目前常用的基于混沌图像的加密方法使用双图像加密。双图像加密在图像加密中使用虽然具有加密复杂度高的优点,但是存在算法占用存储空间大和实际应用不便等缺点。使用单一图像加密,加密算法占用空间小且实际应用方便,相对双图像加密在图像加密效率和安全性等方面具有一定的优势。In addition, currently commonly used encryption methods based on chaotic images use dual-image encryption. Although double-image encryption has the advantages of high encryption complexity when used in image encryption, it has disadvantages such as large storage space occupied by the algorithm and inconvenient practical application. Using single image encryption, the encryption algorithm occupies a small space and is convenient for practical application. Compared with double image encryption, it has certain advantages in terms of image encryption efficiency and security.
发明内容Contents of the invention
本发明的目的是提供一种加密效果好、安全性高的基于混沌系统和分数阶傅立叶变换的彩色图像加密方法。The purpose of the present invention is to provide a color image encryption method based on chaotic system and fractional Fourier transform with good encryption effect and high security.
本发明是通过以下技术方案实现的:The present invention is achieved through the following technical solutions:
一种基于混沌系统和分数阶傅立叶变换的彩色图像加密方法,包括以下几个步骤:A color image encryption method based on chaotic system and fractional Fourier transform, comprising the following steps:
步骤一:输入尺寸为M×N的明文彩色像素图像Iin,提取明文彩色像素图像的三色通道矩阵R,G,B顺次连接成一个3M×N的矩阵Iirgb;Step 1: Input a plaintext color pixel image I in with a size of M×N, extract the three-color channel matrix R, G, B of the plaintext color pixel image and sequentially connect them into a 3M×N matrix I irgb ;
步骤二:将初始参数λ1和初始迭代值x0代入Logistic混沌系统迭代m+3MN次,忽略前m次迭代结果,得到混沌序列x={xm+1,xm+2,...,xm+3MN},将混沌序列x的所有值进行排序,得到新的序列并得到序列中各个元素值在原混沌序列x中的位置T1={t1,t2,...,t3MN},即
步骤三:对矩阵Iirgb进行全局像素置乱,将矩阵Iirgb转变成3MN×1的矩阵It,将It的所有行根据T1重新排列,即将It的t1行移至第一行,将It的t2行移至第二行,以此类推,直至将It的t3MN行移至最后一行,得到矩阵I1;Step 3: Perform global pixel scrambling on the matrix I irgb , transform the matrix I irgb into a 3MN×1 matrix I t , rearrange all the rows of I t according to T 1 , that is, move the t 1 row of I t to the first row, move the t 2 row of I t to the second row, and so on, until the t 3MN row of I t is moved to the last row, and obtain the matrix I 1 ;
步骤四:将矩阵I1均分成两个矩阵I11和I12,让矩阵I11作为模,矩阵I12作为相角构成一个复数矩阵
步骤五:将复数矩阵Ie进行旋转角为α的分数阶傅立叶变换,得到复数矩阵I2;Step 5: Perform the fractional Fourier transform of the complex matrix I e with a rotation angle of α to obtain the complex matrix I 2 ;
步骤六:提取复数矩阵I2的模和相角,得到矩阵I21和I22,将矩阵I21和I22合并成一个3MN×1的矩阵I3;Step 6: Extract the modulus and phase angle of the complex matrix I 2 to obtain the matrices I 21 and I 22 , and combine the matrices I 21 and I 22 into a 3MN×1 matrix I 3 ;
步骤七:代入初始参数λ2和初始迭代值y0,重复步骤二到步骤三,得到矩阵Iorgb;Step 7: Substituting the initial parameter λ 2 and the initial iteration value y 0 , repeating steps 2 to 3 to obtain the matrix I orgb ;
步骤八:将Iorgb分割成等长的3个MN×1的矩阵并重新排列,得到M×N的矩阵Ior、Iog、Iob,并将三个矩阵复合最终得到密文图像Iout。Step 8: Divide I orgb into three MN×1 matrices of equal length and rearrange them to obtain M×N matrices I or , I og , I ob , and combine the three matrices to finally obtain the ciphertext image I out .
本发明的有益效果为:The beneficial effects of the present invention are:
1、采用单一图像加密,算法占用空间小,加密算法运行速度快。即双图像加密算法加密时间为2.367s,解密时间为2.376s;本发明加密时间为0.674s,解密时间为0.688s。1. A single image is used for encryption, the algorithm occupies a small space, and the encryption algorithm runs fast. That is, the encryption time of the double-image encryption algorithm is 2.367s, and the decryption time is 2.376s; the encryption time of the present invention is 0.674s, and the decryption time is 0.688s.
2、利用了双混沌系统具有更为复杂的动力学特性以及更高安全性的优点,克服了单一混沌系统进行图像加密的密钥空间小,安全性低的缺点。即采用双混沌系统(密钥数为6),精度为10-15密钥空间为1090,远大于2128,密钥空间足够抵御已知各种攻击。2. Utilizing the advantages of more complex dynamic characteristics and higher security of the double chaotic system, it overcomes the shortcomings of a single chaotic system for image encryption with small key space and low security. That is to say, a double chaotic system is adopted (the number of keys is 6), the precision is 10 -15 and the key space is 10 90 , which is much larger than 2 128 . The key space is enough to resist various known attacks.
3、利用全局像素置乱和分数阶傅立叶变换加密像素灰度值,极大降低了密文像素值间的相关性。即原图像像素点间相关性为99%以上,本发明加密后图像像素点相关性降为2%以下。3. Utilize global pixel scrambling and fractional Fourier transform to encrypt pixel gray value, which greatly reduces the correlation between ciphertext pixel values. That is, the correlation between the pixels of the original image is above 99%, and the correlation between the pixels of the encrypted image in the present invention is reduced to below 2%.
附图说明Description of drawings
图1为本发明方法流程图;Fig. 1 is a flow chart of the method of the present invention;
图2a为Lena原图像;Figure 2a is the original image of Lena;
图2b为图2a的R通道图像;Fig. 2b is the R channel image of Fig. 2a;
图2c为图2a的G通道图像;Fig. 2c is the G channel image of Fig. 2a;
图2d为图2a的B通道图像;Figure 2d is the B channel image of Figure 2a;
图3a为图2a的加密图像;Fig. 3a is the encrypted image of Fig. 2a;
图3b为图3a的R通道图像;Fig. 3b is the R channel image of Fig. 3a;
图3c为图3a的G通道图像;Fig. 3c is the G channel image of Fig. 3a;
图3d为图3a的B通道图像;Figure 3d is the B channel image of Figure 3a;
图4a为图3a的正确解密图像;Figure 4a is the correct decrypted image of Figure 3a;
图4b为图4a的错误参数x0解密图像;Fig. 4b is the decrypted image of the wrong parameter x 0 in Fig. 4a;
图4c为图4a的错误参数y0解密图像;Fig. 4c is the decrypted image of the wrong parameter y 0 in Fig. 4a;
图4d为图4a的错误参数λ1解密图像;Fig. 4d is the decrypted image of the wrong parameter λ 1 of Fig. 4a;
图4e为图4a的错误参数λ2解密图像;Fig. 4e is the wrong parameter λ 2 decrypted image of Fig. 4a;
图5a为图3a遮盖20%图像;Figure 5a covers 20% of the image in Figure 3a;
图5b为图3a添加均方差为0.05高斯噪声图像;Figure 5b is the Gaussian noise image with a mean square error of 0.05 added to Figure 3a;
图5c为图5a的解密图像;Fig. 5c is the decrypted image of Fig. 5a;
图5d为图5b的解密图像;Figure 5d is the decrypted image of Figure 5b;
图6a为原始图像和加密图像R,G,B各通道像素相关性表;Fig. 6 a is the original image and encrypted image R, G, pixel correlation table of each channel of B;
图6b为R,G,B通道间相同位置像素相关性表;Figure 6b is a correlation table of pixels at the same position among R, G, and B channels;
图6c为R,G,B通道间相邻位置像素相关性表。Fig. 6c is a correlation table of pixels at adjacent positions among R, G, and B channels.
具体实施方式Detailed ways
下面将结合附图对本发明做进一步详细说明。The present invention will be described in further detail below in conjunction with the accompanying drawings.
如图1所示一种基于混沌系统和分数阶傅立叶变换的彩色图像加密方法,包括如下步骤:As shown in Figure 1, a color image encryption method based on chaotic system and fractional Fourier transform comprises the following steps:
S1:已知明文彩色像素图像Iin(.bmp格式),图像尺寸为M×N,提取图像的三色通道矩阵R,G,B顺次连接构成一个3M×N的矩阵Iirgb。S1: Known plaintext color pixel image I in (.bmp format), the size of the image is M×N, the three-color channel matrix R, G, B of the extracted image is sequentially connected to form a 3M×N matrix I irgb .
S2:设置初始参数λ1和初始迭代值x0,代入Logistic混沌系统迭代m+3MN次。忽略前m次迭代结果以避免有害影响,得到混沌序列x={xm+1,xm+2,...,xm+3MN}。S2: Set the initial parameter λ 1 and the initial iteration value x 0 , and substitute it into the Logistic chaotic system for m+3MN iterations. Ignoring the results of the first m iterations to avoid harmful effects, the chaotic sequence x={x m+1 ,x m+2 ,...,x m+3MN } is obtained.
S3:将混沌序列x的所有值进行排序,得到新的序列并得到序列中各个元素值在原序列x中的位置T1={t1,t2,...,t3MN},即 S3: Sort all the values of the chaotic sequence x to get a new sequence and get the sequence The position of each element value in the original sequence x T 1 ={t 1 ,t 2 ,...,t 3MN }, that is
S4:对Iirgb进行全局像素置乱,即,将Iirgb转变成3MN×1的矩阵It,将It的所有行根据T1重新排列,即将It的t1行移至第一行,将将It的t2行移至第二行,以此类推,直至将It的t3MN行移至最后一行,此时我们得到矩阵I1。S4: Perform global pixel scrambling on I irgb , that is, transform I irgb into a 3MN×1 matrix I t , rearrange all rows of I t according to T 1 , that is, move row t 1 of I t to the first row , the t 2 row of I t will be moved to the second row, and so on until the t 3MN row of I t is moved to the last row, at this time we get the matrix I 1 .
S5:将I1均分成两部分I11和I12,让I11作为模而I12作为相角构成一个复数矩阵,即此时我们得到矩阵Ie。S5: Divide I 1 into two parts, I 11 and I 12 , let I 11 be the modulus and I 12 the phase angle to form a complex matrix, namely At this point we get the matrix I e .
S6:将Ie进行旋转角为α的分数阶傅立叶变换(DFrFTα),此时我们得到矩阵I2。S6: Perform fractional Fourier transform (DFrFT α ) of I e with a rotation angle of α, and at this time we obtain matrix I 2 .
S7:提取复数矩阵I2的模和相角,分别得到矩阵I21和I22,将I21和I22合并成一个3MN×1的矩阵,此时我们得到矩阵I3。S7: Extract the modulus and phase angle of the complex matrix I 2 to obtain the matrices I 21 and I 22 respectively, combine I 21 and I 22 into a 3MN×1 matrix, and then we obtain the matrix I 3 .
S8:设置初始参数λ2和初始迭代值y0,重复步骤S2—S4,此时我们得到矩阵Iorgb。S8: Set the initial parameter λ 2 and the initial iteration value y 0 , repeat steps S2-S4, and now we get the matrix I orgb .
S9:将Iorgb分割成等长的3个MN×1的矩阵并重新排列,得到M×N的矩阵Ior,Iog,Iob,将他们复合最终得到密文图像Iout(.bmp格式)。S9: Divide I orgb into three MN×1 matrices of equal length and rearrange them to obtain M×N matrices I or , I og , I ob , and compound them to finally obtain the ciphertext image I out (.bmp format ).
使用MATLAB软件对本发明提出的图像加密方法进行仿真,明文图像选用标准测试彩色图像Lena,图像尺寸256×256)如图2a所示,对其进行基于混沌系统和分数阶傅立叶变换的加密,密钥参数为x0=0.8927,y0=0.7035,m=300,n=349,α=0.5000,λ1=3.9735,λ2=3.9824的加密,并分析性能。图2b为图2a的R通道图像,图2c为图2a的G通道图像,图2d为图2a的B通道图像。Use MATLAB software to simulate the image encryption method proposed by the present invention, the plaintext image selects the standard test color image Lena, image size 256 * 256) as shown in Figure 2a, it is carried out based on the encryption of chaotic system and fractional Fourier transform, key The parameters are encryption of x 0 =0.8927, y 0 =0.7035, m=300, n=349, α=0.5000, λ 1 =3.9735, λ 2 =3.9824, and the performance is analyzed. Figure 2b is the R channel image of Figure 2a, Figure 2c is the G channel image of Figure 2a, and Figure 2d is the B channel image of Figure 2a.
首先将明文图像按照步骤S1-S9,得到加密图像如图3a所示,图3b为图3a的R通道图像,图3c为图3a的G通道图像,图3d为图3a的B通道图像。First, follow the steps S1-S9 of the plaintext image to obtain an encrypted image as shown in Figure 3a, Figure 3b is the R-channel image in Figure 3a, Figure 3c is the G-channel image in Figure 3a, and Figure 3d is the B-channel image in Figure 3a.
密钥敏感性分析测试:使用正确密钥x0=0.8927,y0=0.7035,m=300,n=349,α=0.5000,λ1=3.9735,λ2=3.9824解密,得到解密图像如图4a,分别使用错误密钥x0=0.8927+10-15,y0=0.7035+10-15,λ1=3.9735+10-15,λ2=3.9824+10-15得到解密结果图像如图4b,图4c,图4d,图4e。从解密结果可以看出,密钥敏感性极高,密钥空间大,可以抵挡密钥攻击。Key sensitivity analysis test: use the correct key x 0 =0.8927, y 0 =0.7035, m=300, n=349, α=0.5000, λ 1 =3.9735, λ 2 =3.9824 to decrypt, and the decrypted image is shown in Figure 4a , respectively use the wrong key x 0 =0.8927+10 -15 , y 0 =0.7035+10 -15 , λ 1 =3.9735+10 -15 , λ 2 =3.9824+10 -15 to get the decrypted image as shown in Figure 4b, Fig. 4c, Figure 4d, Figure 4e. It can be seen from the decryption results that the key sensitivity is extremely high and the key space is large, which can resist key attacks.
加密方法抗攻击性分析测试:给加密结果图像图3a遮盖20%如图5a,对其进行解密,得到解密结果图如图5c;给加密结果图像图3a添加均方差为0.05的高斯噪声如图5b,对其进行解密,得到解密结果图如图5d。从解密结果可以看出,加密图像收到一定攻击后仍能有效解密,表明加密方法鲁棒性好,抗攻击性高。Anti-attack analysis and test of the encryption method: cover the encrypted result image 3a by 20% as shown in 5a, and decrypt it to obtain the decrypted result as shown in 5c; add Gaussian noise with a mean square error of 0.05 to the encrypted result image 3a as shown in the figure 5b, decrypt it, and obtain the decryption result as shown in Figure 5d. From the decryption results, it can be seen that the encrypted image can still be effectively decrypted after receiving a certain attack, which shows that the encryption method has good robustness and high resistance to attack.
像素相关性分析测试:相邻像素的相关性可以反映出图像像素的扩散程度,而原始明文图像中相邻两个像素的相关性通常很大,尽量让加密图像相邻像素的相关性系数接近零。表1为原始图像和加密图像R,G,B各通道像素相关性,表2为R,G,B通道间相同位置像素相关性,表3为R,G,B通道间相邻位置像素相关性。从以上表格中可以看出,原始图像相关性较强,加密图像相关性较弱,安全性高。Pixel correlation analysis test: The correlation of adjacent pixels can reflect the degree of diffusion of image pixels, and the correlation between two adjacent pixels in the original plaintext image is usually very large, try to make the correlation coefficient of adjacent pixels in the encrypted image close to zero. Table 1 shows the pixel correlation of the R, G, and B channels of the original image and the encrypted image, Table 2 shows the pixel correlation of the same position between the R, G, and B channels, and Table 3 shows the pixel correlation of adjacent positions between the R, G, and B channels sex. It can be seen from the above table that the original image has a strong correlation, and the encrypted image has a weak correlation and high security.
解密过程:Decryption process:
图像解密过程为图像加密过程的逆过程。The image decryption process is the reverse process of the image encryption process.
本发明中,解密过程可以使用密钥x0=0.8927,y0=0.7035,m=300,n=349,α=0.5000,λ1=3.9735,λ2=3.9824,通过与加密过程相逆的过程完成解密。In the present invention, the decryption process can use the keys x 0 =0.8927, y 0 =0.7035, m=300, n=349, α=0.5000, λ 1 =3.9735, λ 2 =3.9824, through the reverse process of the encryption process Complete decryption.
例如,待加密图像为标准测试彩色Lena图像,图像尺寸256×256,对其进行基于混沌系统和分数阶傅立叶变换的密钥为x0,y0,m,n,α,λ1,λ2的彩色图像加密,则解密时也可以用密钥参数x0,y0,m,n,α,λ1,λ2参与加密过程相逆的过程进行解密。For example, the image to be encrypted is a standard test color Lena image, the image size is 256×256, and the key for performing chaotic system and fractional Fourier transform on it is x 0 , y 0 ,m,n,α,λ 1 ,λ 2 If the color image is encrypted, the key parameters x 0 , y 0 , m, n, α, λ 1 , λ 2 can also be used to decrypt the reverse process of the encryption process.
本发明提供的一种基于混沌系统和分数阶傅立叶变换的加密方法,安全性高,抗破译能力强,为图像加密提供了一个新的解决方案,在使用图像进行通信的场合,该加密方法具有很高的使用价值。An encryption method based on a chaotic system and fractional Fourier transform provided by the present invention has high security and strong anti-deciphering ability, and provides a new solution for image encryption. In the occasion of using images for communication, the encryption method has Very high use value.
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410486126.4A CN104240177B (en) | 2014-09-22 | 2014-09-22 | A kind of color image encrypting method based on chaos system and fraction Fourier conversion |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410486126.4A CN104240177B (en) | 2014-09-22 | 2014-09-22 | A kind of color image encrypting method based on chaos system and fraction Fourier conversion |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104240177A true CN104240177A (en) | 2014-12-24 |
CN104240177B CN104240177B (en) | 2017-07-11 |
Family
ID=52228189
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410486126.4A Expired - Fee Related CN104240177B (en) | 2014-09-22 | 2014-09-22 | A kind of color image encrypting method based on chaos system and fraction Fourier conversion |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104240177B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104700348A (en) * | 2015-03-13 | 2015-06-10 | 哈尔滨工程大学 | Colorful image self-adaption encrypting method based on high-order chaotic system |
CN104809685A (en) * | 2015-05-13 | 2015-07-29 | 哈尔滨工程大学 | Color image one-time-key DNA (Deoxyribonucleic Acid) encryption method based on six-dimensional chaotic system |
CN105979116A (en) * | 2016-03-31 | 2016-09-28 | 首都师范大学 | Color image authentication method and system based on hypercomplex number encrypted domain sparse representation |
CN108270944A (en) * | 2018-01-02 | 2018-07-10 | 北京邮电大学 | A kind of method and device of the digital image encryption based on fractional order transformation |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6064738A (en) * | 1996-12-10 | 2000-05-16 | The Research Foundation Of State University Of New York | Method for encrypting and decrypting data using chaotic maps |
US20070076868A1 (en) * | 2005-09-30 | 2007-04-05 | Konica Minolta Systems Laboratory, Inc. | Method and apparatus for image encryption and embedding and related applications |
CN101604439A (en) * | 2008-06-13 | 2009-12-16 | 西北工业大学 | A Color Image Encryption Method Based on Multiple Chaotic Systems |
CN102982499A (en) * | 2012-09-28 | 2013-03-20 | 河南大学 | Color image encryption and decryption method based on multiple-fractional-order chaotic systems |
CN103020891A (en) * | 2012-12-21 | 2013-04-03 | 东华大学 | Color image encryption method based on compound chaotic sequence and shifting |
-
2014
- 2014-09-22 CN CN201410486126.4A patent/CN104240177B/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6064738A (en) * | 1996-12-10 | 2000-05-16 | The Research Foundation Of State University Of New York | Method for encrypting and decrypting data using chaotic maps |
US20070076868A1 (en) * | 2005-09-30 | 2007-04-05 | Konica Minolta Systems Laboratory, Inc. | Method and apparatus for image encryption and embedding and related applications |
CN101604439A (en) * | 2008-06-13 | 2009-12-16 | 西北工业大学 | A Color Image Encryption Method Based on Multiple Chaotic Systems |
CN102982499A (en) * | 2012-09-28 | 2013-03-20 | 河南大学 | Color image encryption and decryption method based on multiple-fractional-order chaotic systems |
CN103020891A (en) * | 2012-12-21 | 2013-04-03 | 东华大学 | Color image encryption method based on compound chaotic sequence and shifting |
Non-Patent Citations (2)
Title |
---|
崔得龙等: "一种基于分数阶傅里叶变换的改进图像加密算法", 《成都信息工程学院学报》 * |
左敬龙等: "基于混沌系统和分数阶傅里叶变换的图像加密算法", 《计算机与现代化》 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104700348A (en) * | 2015-03-13 | 2015-06-10 | 哈尔滨工程大学 | Colorful image self-adaption encrypting method based on high-order chaotic system |
CN104700348B (en) * | 2015-03-13 | 2017-11-21 | 哈尔滨工程大学 | A kind of color image-adaptive encryption method based on high-order chaos system |
CN104809685A (en) * | 2015-05-13 | 2015-07-29 | 哈尔滨工程大学 | Color image one-time-key DNA (Deoxyribonucleic Acid) encryption method based on six-dimensional chaotic system |
CN104809685B (en) * | 2015-05-13 | 2018-08-17 | 哈尔滨工程大学 | A kind of coloured image one time key DNA encryption methods based on 6 dimension chaos systems |
CN105979116A (en) * | 2016-03-31 | 2016-09-28 | 首都师范大学 | Color image authentication method and system based on hypercomplex number encrypted domain sparse representation |
CN105979116B (en) * | 2016-03-31 | 2019-01-29 | 首都师范大学 | The color image authentication method and system of supercomplex encrypted domain rarefaction representation |
CN108270944A (en) * | 2018-01-02 | 2018-07-10 | 北京邮电大学 | A kind of method and device of the digital image encryption based on fractional order transformation |
Also Published As
Publication number | Publication date |
---|---|
CN104240177B (en) | 2017-07-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bakhshandeh et al. | An authenticated image encryption scheme based on chaotic maps and memory cellular automata | |
Norouzi et al. | A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process | |
CN103491279B (en) | The 4-neighborhood XOR image encryption method of Hyperchaotic Lorenz system | |
EP2316189B1 (en) | Method for generating a cipher-based message authentication code | |
US20150270967A1 (en) | Method for performing an encryption of an aes type, and corresponding system and computer program product | |
CN104809685B (en) | A kind of coloured image one time key DNA encryption methods based on 6 dimension chaos systems | |
CN100484243C (en) | Digital image enciphoring/deciphoring method | |
CN107330338B (en) | Color image encryption and decryption method and system based on double chaotic cross-diffusion | |
CN106301760B (en) | A kind of 3D point cloud model encryption method based on chaotic maps | |
CN103679625A (en) | Single-channel color image encryption method based on chaos and phase retrieval process | |
CN105959098A (en) | Format-reserved encryption algorithm based on multi-segmented Feistel network | |
CN104240177B (en) | A kind of color image encrypting method based on chaos system and fraction Fourier conversion | |
CN103440613B (en) | The color image encrypting method of hyperchaos Rossler system | |
CN104751401A (en) | Novel piecewise linear chaotic mapping image encrypting and encoding method | |
CN106327414A (en) | Plaintext feature-based double-chaos image encryption method | |
CN104751065A (en) | Encryption method for geographic information product file | |
CN104851071A (en) | Digital image encryption method based on three-dimensional chaotic system | |
Irfan et al. | Image encryption using combination of chaotic system and rivers shamir adleman (RSA) | |
CN104182926B (en) | Color image encrypting method based on Hilbert conversion and chaos Liu algorithms | |
CN109586895B (en) | Novel color image encryption method | |
CN110572252A (en) | An image encryption and decryption method based on fractional translation chaotic system | |
Agarwal | A review of image scrambling technique using chaotic maps | |
CN106570814B (en) | Hyperchaotic image encryption method | |
Joshi et al. | Security of digital images based on 3D Arnold cat map and elliptic curve | |
Gaspar et al. | Hardware implementation and side-channel analysis of lapin |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20170711 |