CN104954116A - Image password construction method based on neuron chaotic response coding - Google Patents

Image password construction method based on neuron chaotic response coding Download PDF

Info

Publication number
CN104954116A
CN104954116A CN201510345680.5A CN201510345680A CN104954116A CN 104954116 A CN104954116 A CN 104954116A CN 201510345680 A CN201510345680 A CN 201510345680A CN 104954116 A CN104954116 A CN 104954116A
Authority
CN
China
Prior art keywords
neuron
time
chaos
sequence
image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510345680.5A
Other languages
Chinese (zh)
Other versions
CN104954116B (en
Inventor
范影乐
方芳
郭斌
李晓春
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HANGZHOU GANXIANG TECHNOLOGY CO LTD
Hangzhou Dianzi University
Original Assignee
HANGZHOU GANXIANG TECHNOLOGY CO LTD
Hangzhou Dianzi University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by HANGZHOU GANXIANG TECHNOLOGY CO LTD, Hangzhou Dianzi University filed Critical HANGZHOU GANXIANG TECHNOLOGY CO LTD
Priority to CN201510345680.5A priority Critical patent/CN104954116B/en
Publication of CN104954116A publication Critical patent/CN104954116A/en
Application granted granted Critical
Publication of CN104954116B publication Critical patent/CN104954116B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses an image password construction method based on neuron chaotic response coding. According to the image password construction method, firstly, a digital password is converted into a position initial value of a Lorenz system through logarithmic transformation, so as to obtain a chaotic time sequence; linear transformation is performed on the chaotic time sequence combined with a user number, so as to obtain a low-level time sequence, thereby constructing a chaotic square wave exciting signal; the exciting signal is used as input current of a Hodgkin-Huxley neuron, so as to perform the neuron chaotic response coding and record the time for discharging neuron pulses; finally, a time interval sequence of discharging the neuron pulses is obtained, and a one-dimensional time interval sequence is converted into a two-dimensional image password through the gray mapping according to row and line parameters of the image password. According to the image password construction method, the chaotic initial value sensitivity of the Lorenz system and the pulse discharging chaotic parameter sensitivity of a neuron model are fully used, the irreversibility of the image password is guaranteed, and the safety of an identity authentication system is effectively increased.

Description

A kind of image password building method based on neuron chaos motion coding
Technical field
The invention belongs to a kind of in identity authorization system, relate to a kind of image password building method based on neuron chaos motion coding, in conjunction with digital cipher application in identity authorization system, the problem of conventional password cipher safety difference can be solved.
Background technology
Authentication, for differentiating user identity, is the major way that user ensures self privacy and property.Enter today of large data age in the Internet, ID authentication mechanism becomes the important component part of network security technology.Password mechanism is the most basic, most widely used ID authentication mechanism.System is that each legal user establishes user name/password password, and when logging in system by user, user inputs oneself the user name and password password, and itself and the user name and password stored compare by system, judge that whether the identity of user is effective.There is following problem in this ID authentication mechanism: 1. the password code of user stores in systems in which with form expressly, easily leaks; What 2. user inputted to system is the password of plaintext version, and assailant can intercept the password of user from communication line; 3. user cannot the identity of checking system, may have been gained correct password or other valuable information by cheating by the system of falseness.Therefore make to carry out authentication in this way fairly simple, convenient, but fail safe extreme difference.
Summary of the invention
The present invention is directed to the deficiencies in the prior art, propose a kind of image password building method based on neuron chaos motion coding.
After user registration success, user name, numerical ciphers and image password are preserved by user, do not carry out the storage of user cipher in system, only preserve the Customs Assigned Number corresponding to user name.The present invention is using the initial value of numerical ciphers as long-range navigation thatch system, and using Customs Assigned Number as the neuronic input signal parameter of Hodgkin-Huxley, carry out neuron chaos motion coding, utilize chaos initial value sensitivity and the sensitivity to parameter of two systems, final generation decodes the larger image password of difficulty.When logging in system by user, user inputs user name, numerical ciphers and image password, and system, according to user name and numerical ciphers, adopts image password building method of the present invention to produce image password.When the image password of user's input is consistent with the image that system produces, user logs in successfully, completes the authentication to user.
Image password building method of the present invention mainly comprises the following steps:
Step (1) user first input through system authentication registration user name and propose arbitrarily fixed 4-digit number password, wherein user name has uniqueness, and user name automatically can be converted to corresponding Customs Assigned Number by system;
The numerical ciphers that user inputs by step (2) system carries out logarithmic transformation, using transformation results as the position initial value on long-range navigation thatch chaos system three dimensions x direction, makes it to produce the chaos time sequence on x direction;
Step (3), in Self defined time window, is converted to the time series after normalization to the chaos time sequence that step (2) produces; Then using Customs Assigned Number as transformation parameter, linear transformation is carried out to the time series after normalization, rise time sequence;
Described Self defined time window will meet the requirement producing image password sequence length;
Step (4) structure chaos square wave excitation signal, wherein square-wave signal amplitude and high level time are encryption system inner parameter; And square wave low level time is a dynamic value, corresponding to the new time series generated in step (3);
Chaos square wave excitation signal as stimulating current input Hodgkin-Huxley neuron models, is produced neuron pulse and provides sequence by step (5);
The moment is provided in the pulse of step (6) record neuron, obtains the time interval sequence that the moment is provided in pulse;
The time interval sequence that step (7) intercepts particular sequence length carries out grey scale mapping, and presses the ranks parameter of image password, and One-dimension Time Series is converted to 2-D gray image Image, Image is image password; Described particular sequence length is the total number of pixel of image password.
The method that the numerical ciphers that user inputs by the system in described step (2) carries out logarithmic transformation is
x 1 = ( l n M 1 1000 ) × 4.343 - - - ( 1 ) ;
Wherein x 1as the position initial value on long-range navigation thatch system three dimensions x direction, M 1for the numerical ciphers of user's input.
In step (3) using Customs Assigned Number as transformation parameter, carry out linear transformation to the time series after normalization, the method for rise time sequence D elay is:
Delay i=A+G i×(ID_N/10 m) (2);
Wherein Delay irepresent that i-th element, the A of time series Delay are that system fixes constant, G irepresent the time value after the chaos time sequence normalization that step (2) is produced, ID_N is Customs Assigned Number, 10 mrepresent system user total number of persons, wherein i, m are positive integer.
Beneficial effect of the present invention is:
1. the numerical ciphers of user and image password do not need to store in systems in which, are not easy to leak;
2. utilize numerical ciphers to realize the chaos initial value sensitivity of long-range navigation thatch system, strengthen the unpredictability of image password;
3. the chaotic parameter sensitiveness utilizing user name to realize the pulse of Hodgkin-Huxley neuron to provide, and neuron models structure has higher complexity, reduces the possibility that the predicted or construction process of image password is cracked;
4. what user inputted to system is image password, reduces password at communication line by the risk intercepted.
Accompanying drawing explanation
Fig. 1 is flow chart of the present invention;
Fig. 2 is neuron chaos square wave excitation signal configuration figure;
Fig. 3 a is numerical ciphers is M 1=1627, Customs Assigned Number is the image password schematic diagram of ID_N=50;
Fig. 3 b is numerical ciphers is M 1=1626, Customs Assigned Number is the image password schematic diagram of ID_N=50;
Fig. 4 a is numerical ciphers is M 1=1627, Customs Assigned Number is the image password schematic diagram of ID_N=50;
Fig. 4 b is numerical ciphers is M 1=1627, Customs Assigned Number is the image password schematic diagram of ID_N=51; Embodiment:
By reference to the accompanying drawings 1, the concrete implementation step of the present invention is:
First step (1) user inputs through the user name of system authentication registration, and user name can be converted to corresponding Customs Assigned Number ID_N by system automatically, and system user total number of persons is m the progression of 10, and user can propose surely arbitrary 4-digit number password M 1; M is positive integer;
The numerical ciphers M that user inputs by step (2) system 1carry out logarithmic transformation, shown in (1).
x 1 = ( l n M 1 1000 ) × 4.343 - - - ( 1 )
By transformation results x 1as the position initial value on long-range navigation thatch system three dimensions x direction, and other parameters of long-range navigation thatch system and the initial value in y and z direction are generated automatically by identity authorization system, and long-range navigation thatch system is such as formula shown in (2).
d x d t = a ( y - x ) d y d t = x ( b - z ) - y d z d t = x y - c z - - - ( 2 )
In this exemplifying embodiment, the initial value that the initial value of a=10, b=28, c=8/3, y equals 2, z equals 10.Thus the chaos time sequence obtained on x direction, be designated as X, shown in (3).
X={x 1,x 2,x 3,......} (3)
Wherein x ibe illustrated respectively in the positional value on long-range navigation thatch system x direction that i-th sampling instant obtain.
Step (3) is normalized the time chaos sequence X (being such as taken as 10s) in special time window and producing, and obtains the time series G={G after normalization 1, G 2, G 3... ..}, G ishown in (4).
G i = ( x i - X m i n ) ( X m a x - X m i n ) - - - ( 4 )
Wherein, X minfor the minimum value in chaos time sequence X, X maxfor the maximum in chaos time sequence X.Then in conjunction with Customs Assigned Number ID_N, linear transformation rise time sequence D elay={Delay is utilized 1, Delay 2, Delay 3..., Delay ishown in (5), wherein A is that system fixes constant, such as desirable A=10.The implication of m as described in step (1), such as desirable m=2.
Delay i=A+G i×(ID_N/10 m) (5)
Step (4) structure chaos square wave excitation signal, wherein square-wave signal amplitude and high level time are encryption system inner parameter, and high level time is T_top, and low and high level difference in magnitude is F, and low level amplitude is F 0.And square wave low level time is a dynamic value, corresponding with the time series Delay produced in step (3); Chaos square wave excitation signal is concrete as shown in Figure 2.
Step (5) carries out neuron response coding to chaos square wave excitation signal, using chaos square wave excitation signal as stimulating current input Hodgkin-Huxley neuron models, shown in (6) ~ (9).It is the time instant that film potential V exceedes threshold value (such as can be set as 10mv) that the moment is provided in the pulse of definition neuron, thus obtains pulse granting moment sequence Spike={S 1, S 2..., wherein S jrepresent the moment that a jth pulse is provided.
C m d V d t = I e x t - g N a m 3 h ( V - V N a ) - g K n 4 ( V - V K ) - g L ( V - V L ) - - - ( 6 )
K t=3 (T-6.3)/10(7)
m · = K t [ α m ( V ) ( 1 - m ) - β m ( V ) m ] h · = K t [ α h ( V ) ( 1 - h ) - β h ( V ) h ] n · = K t [ α n ( V ) ( 1 - n ) - β n ( V ) n ] - - - ( 8 )
α m = 0.1 × 25 - V e 25 - V 10 - 1 , β m = 4 × e - V 18 , α h = 0.07 × e - V 20 , β h = 1 e 30 - V 10 + 1 , α n = 0.01 × 10 - V e 10 - V 10 - 1 , β m = 0.125 × e - V 80 . - - - ( 9 )
Wherein neuron parameter value C m=1uF/cm 2, T=6.3 DEG C, g na=120mS/cm 2, g k=36mS/cm 2, g l=0.3mS/cm 2, V na=54.97mV, V k=-71.96mV, V l=-49mV.I extfor the input current of neuron models, be taken as the chaos square wave excitation signal in step (4).
Step (6) provides moment sequence Spike={S to neuron pulse 1, S 2... ask difference, obtain the time interval sequence ISI={ISI that the moment is provided in pulse 1, ISI 2, ISI 3..}, wherein ISI i=S i+1-S i.
Step (7) supposes that the ranks parameter of image password is N (such as N=20), and intercepting sequence length is that the ISI sequence of N × N carries out grey scale mapping, obtains One-dimension Time Series M={M 1, M 2, M 3... ..}, M ishown in (10).
M i = ( ISI i - ISI min ) ( ISI m a x - ISI m i n ) × 256 - - - ( 10 )
Wherein, ISI minfor the minimum value in time interval sequence ISI, ISI maxfor the maximum in time interval sequence ISI.
One-dimension Time Series M is converted by rows to the 2-D gray image Image of N × N, Image is image password, and schematic diagram is as shown in accompanying drawing 3a, Fig. 3 b, Fig. 4 a, Fig. 4 b.

Claims (3)

1., based on an image password building method for neuron chaos motion coding, it is characterized in that, the method specifically comprises the following steps:
Step (1) user first input through system authentication registration user name and propose arbitrarily fixed 4-digit number password, wherein user name has uniqueness, and user name automatically can be converted to corresponding Customs Assigned Number by system;
The numerical ciphers that user inputs by step (2) system carries out logarithmic transformation, using transformation results as the position initial value on long-range navigation thatch chaos system three dimensions x direction, makes it to produce the chaos time sequence on x direction;
Step (3), in Self defined time window, is converted to the time series after normalization to the chaos time sequence that step (2) produces; Then using Customs Assigned Number as transformation parameter, linear transformation is carried out to the time series after normalization, rise time sequence;
Described Self defined time window will meet the requirement producing image password sequence length;
Step (4) structure chaos square wave excitation signal, wherein square-wave signal amplitude and high level time are encryption system inner parameter; And square wave low level time is a dynamic value, corresponding to the new time series generated in step (3);
Chaos square wave excitation signal as stimulating current input Hodgkin-Huxley neuron models, is produced neuron pulse and provides sequence by step (5);
The moment is provided in the pulse of step (6) record neuron, obtains the time interval sequence that the moment is provided in pulse;
The time interval sequence that step (7) intercepts particular sequence length carries out grey scale mapping, and presses the ranks parameter of image password, and One-dimension Time Series is converted to 2-D gray image Image, Image is image password; Described particular sequence length is the total number of pixel of image password.
2. a kind of image password building method based on neuron chaos motion coding according to claim 1, is characterized in that: the method that the numerical ciphers that user inputs by the system in described step (2) carries out logarithmic transformation is
x 1 = ( l n M 1 1000 ) × 4.343 - - - ( 1 ) ;
Wherein x 1as the position initial value on long-range navigation thatch system three dimensions x direction, M 1for the numerical ciphers of user's input.
3. a kind of image password building method based on neuron chaos motion coding according to claim 1, it is characterized in that: in step (3) using Customs Assigned Number as transformation parameter, carry out linear transformation to the time series after normalization, the method for rise time sequence D elay is:
Delay i=A+G i×(ID_N/10 m) (2);
Wherein Delay irepresent that i-th element, the A of time series Delay are that system fixes constant, G irepresent the time value after the chaos time sequence normalization that step (2) is produced, ID_N is Customs Assigned Number, 10 mrepresent system user total number of persons, wherein i, m are positive integer.
CN201510345680.5A 2015-06-19 2015-06-19 A kind of image password building method based on neuron chaos motion coding Active CN104954116B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510345680.5A CN104954116B (en) 2015-06-19 2015-06-19 A kind of image password building method based on neuron chaos motion coding

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510345680.5A CN104954116B (en) 2015-06-19 2015-06-19 A kind of image password building method based on neuron chaos motion coding

Publications (2)

Publication Number Publication Date
CN104954116A true CN104954116A (en) 2015-09-30
CN104954116B CN104954116B (en) 2018-05-04

Family

ID=54168495

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510345680.5A Active CN104954116B (en) 2015-06-19 2015-06-19 A kind of image password building method based on neuron chaos motion coding

Country Status (1)

Country Link
CN (1) CN104954116B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101022331A (en) * 2006-02-16 2007-08-22 刘粉林 Chaos encrypting method based on carrier
CN101344960A (en) * 2008-08-20 2009-01-14 回静 Chaos digital image encryption method
CN101882296A (en) * 2010-05-07 2010-11-10 邹阿金 Method for hiding Chebyshev neural network chaotic digital watermark information

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101022331A (en) * 2006-02-16 2007-08-22 刘粉林 Chaos encrypting method based on carrier
CN101344960A (en) * 2008-08-20 2009-01-14 回静 Chaos digital image encryption method
CN101882296A (en) * 2010-05-07 2010-11-10 邹阿金 Method for hiding Chebyshev neural network chaotic digital watermark information

Also Published As

Publication number Publication date
CN104954116B (en) 2018-05-04

Similar Documents

Publication Publication Date Title
Shamsuddin Resilience resistance: The challenges and implications of urban resilience implementation
Szyjka Understanding research paradigms: Trends in science education research
Gill et al. Community-oriented policing to reduce crime, disorder and fear and increase satisfaction and legitimacy among citizens: A systematic review
CN105631296A (en) Design method of safety face verification system based on CNN (convolutional neural network) feature extractor
KR101968449B1 (en) Automatic inspection system for label type data based on Artificial Intelligence Learning to improve data productivity, and method thereof
CN106295501A (en) The degree of depth based on lip movement study personal identification method
CN112396191A (en) Method, system and device for updating model parameters based on federal learning
CN105574633A (en) College teacher and student knowledge sharing platform based on KNN
Collins et al. Establishing interpretive consistency when mixing approaches: Role of sampling designs in evaluations
Al-Saeed et al. Efficient key agreement algorithm for wireless body area networks using reusable ECG-based features
Costilla-Enriquez et al. Attack power system state estimation by implicitly learning the underlying models
Gil et al. Fingerprint verification system in tests in moodle
CN104954116A (en) Image password construction method based on neuron chaotic response coding
CN106855564A (en) A kind of efficient micro swirl coagulation flco detecting system
Heupel Rule of Law Promotion and Security Sector Reform: Common Principles, Common Challenges
Guo et al. Chebyshev-polynomial neuronet, WASD algorithm and world population prediction from past 10000-year rough data
Lay Lee Rethinking power and rights-promoting NGOs in China
Narwal et al. Simulating manual signature using Elman back propagation model to create pseudo digital signature
Kumari et al. Artificial Intelligence—Blockchain Enabled Technology for Internet of Things: Research Statements, Open Issues, and Possible Applications in the Near Future
Ko et al. Development of a STEAM Program to Learn the Principles of Quantum Mechanics by applying the Gamification Mechanism
Krrabaj et al. A NOVEL IOT ENABLED AUTOMATED ATTENDANCE REGISTERING SYSTEM USING RFID AND CLOUD AS BACK-END
Chojnacki et al. Single email prompts individuals to increase retirement savings
Banu et al. Blockchain Innovations in Education: Empowering Students with Smart Contracts
Qiu et al. A case study for high-level course website based on muti-technology integration
Kambale et al. CAPTCHA as graphical passwords

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant