CN104954116B - A kind of image password building method based on neuron chaos motion coding - Google Patents

A kind of image password building method based on neuron chaos motion coding Download PDF

Info

Publication number
CN104954116B
CN104954116B CN201510345680.5A CN201510345680A CN104954116B CN 104954116 B CN104954116 B CN 104954116B CN 201510345680 A CN201510345680 A CN 201510345680A CN 104954116 B CN104954116 B CN 104954116B
Authority
CN
China
Prior art keywords
chaos
sequence
time
neuron
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510345680.5A
Other languages
Chinese (zh)
Other versions
CN104954116A (en
Inventor
范影乐
方芳
郭斌
李晓春
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HANGZHOU GANXIANG TECHNOLOGY CO LTD
Hangzhou Dianzi University
Original Assignee
HANGZHOU GANXIANG TECHNOLOGY CO LTD
Hangzhou Dianzi University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by HANGZHOU GANXIANG TECHNOLOGY CO LTD, Hangzhou Dianzi University filed Critical HANGZHOU GANXIANG TECHNOLOGY CO LTD
Priority to CN201510345680.5A priority Critical patent/CN104954116B/en
Publication of CN104954116A publication Critical patent/CN104954116A/en
Application granted granted Critical
Publication of CN104954116B publication Critical patent/CN104954116B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a kind of image password building method based on neuron chaos motion coding, numerical ciphers are converted to the position initial value of long-range navigation thatch system by the present invention by logarithmic transformation first, obtain chaos time sequence;Linear transformation is carried out to time chaos sequence with reference to Customs Assigned Number, low level time sequence is obtained, so as to construct chaos square wave excitation signal;Input current using the pumping signal as Hodgkin Huxley neurons, carries out neuron chaos motion coding, at the time of the pulse of record neuron is provided;The time interval sequence of neuron pulse granting is finally obtained, by grey scale mapping, and by the ranks parameter of image password, one-dimensional time interval sequence is converted into two dimensional image password.The present invention takes full advantage of the chaos initial value sensitivity of long-range navigation thatch system and the chaotic parameter sensitiveness of neuron models pulse granting, it is ensured that the irreversibility of image password, effectively enhances the security of identity authorization system.

Description

A kind of image password building method based on neuron chaos motion coding
Technical field
The invention belongs to one kind in identity authorization system, it is related to a kind of image password based on neuron chaos motion coding Building method, with reference to digital cipher application in identity authorization system, can solve the problems, such as that conventional password cipher safety is poor.
Background technology
Authentication is used to differentiate user identity, is the major way that user ensures itself privacy and property.In internet Into the today in big data epoch, ID authentication mechanism becomes the important component of network security technology.Password mechanism is most Substantially, most widely used ID authentication mechanism.System establishes user name/password password for each legal user, when with During the login system of family, user inputs the user name and password password of oneself, and system carries out the user name and password of itself and storage Compare, judge whether the identity of user is effective.There are following problem for this ID authentication mechanism:1. the password code of user Storage in systems, easily leaks in the form of plaintext;2. user to system input be plaintext version password, attacker can From the password of communication line interception user;3. user can not checking system identity, may have been defrauded of correctly by false system Password or other valuable information.Therefore it is fairly simple, conveniently that authentication is carried out in this way, but security pole Difference.
The content of the invention
In view of the deficiencies of the prior art, the present invention proposes a kind of image password construction based on neuron chaos motion coding Method.
After user registration success, user name, numerical ciphers and image password are preserved by user, in system without The storage of user cipher, only preserves the Customs Assigned Number corresponding to user name.The present invention is using numerical ciphers as long-range navigation thatch system Initial value, and the input signal parameter using Customs Assigned Number as Hodgkin-Huxley neurons, carry out neuron chaos motion volume Code, using the chaos initial value sensitivity and sensitivity to parameter of two systems, ultimately generates and decodes the larger image password of difficulty.When During logging in system by user, user inputs user name, numerical ciphers and image password, system according to user name and numerical ciphers, Image password building method using the present invention produces image password.When the image that image password input by user and system produce When consistent, user logs in success, completes the authentication to user.
The image password building method of the present invention mainly includes the following steps that:
Step (1) user inputs the user name for having been subjected to system authentication registration and arbitrarily proposes fixed 4-digit number first Password, wherein user name have uniqueness, and user name can be converted to corresponding Customs Assigned Number by system automatically;
Numerical ciphers input by user are carried out logarithmic transformation by step (2) system, using transformation results as long-range navigation thatch chaos Position initial value on system three dimensions x directions, is allowed to produce the chaos time sequence on x directions;
After step (3) is converted to normalization to the chaos time sequence in self defined time window, produced to step (2) Time series;Then using Customs Assigned Number as transformation parameter, linear transformation, generated time are carried out to the time series after normalization Sequence;
The self defined time window will meet the requirement for producing image password sequence length;
Step (4) constructs chaos square wave excitation signal, and wherein square-wave signal amplitude and high level time are encryption system Inner parameter;And square wave low level time is a dynamic value, corresponding to the new time series of generation in step (3);
Chaos square wave excitation signal is inputted Hodgkin-Huxley neuron models, production by step (5) Sequence is provided in raw neuron pulse;
The moment is provided in step (6) record neuron pulse, obtains the time interval sequence that the moment is provided in pulse;
The time interval sequence of step (7) interception particular sequence length carries out grey scale mapping, and by the row of image password Row parameter, it is image password that One-dimension Time Series are converted to 2-D gray image Image, Image;The particular sequence Length is the pixel total number of image password.
The method that numerical ciphers input by user are carried out logarithmic transformation by system in the step (2) is
Wherein x1As the position initial value on long-range navigation thatch system three dimensions x directions, M1For numerical ciphers input by user.
Using Customs Assigned Number as transformation parameter in step (3), linear transformation, generation are carried out to the time series after normalization The method of time series Delay is:
Delayi=A+Gi×(ID_N/10m) (2);
Wherein DelayiI-th of element, the A for representing time series Delay are system Fixed constant, GiRepresent to step (2) Time value, ID_N after the chaos time sequence normalization of generation are Customs Assigned Number, 10mRepresent system user total number of persons, wherein I, m is positive integer.
Beneficial effects of the present invention are:
1. the numerical ciphers of user need not store in systems with image password, it is not easy to leak;
2. realizing the chaos initial value sensitivity of long-range navigation thatch system using numerical ciphers, the unpredictable of image password is strengthened Property;
3. the chaotic parameter sensitiveness of Hodgkin-Huxley neuron pulse grantings is realized using user name, and nerve Metamodel structure has higher complexity, reduces the possibility that image password is predicted or construction process is cracked;
4. what user was inputted to system is image password, the risk that password is intercepted in communication line is reduced.
Brief description of the drawings
Fig. 1 is flow chart of the present invention;
Fig. 2 is neuron chaos square wave excitation signal structural map;
Fig. 3 a are that numerical ciphers are M1=1627, Customs Assigned Number is the image password schematic diagram of ID_N=50;
Fig. 3 b are that numerical ciphers are M1=1626, Customs Assigned Number is the image password schematic diagram of ID_N=50;
Fig. 4 a are that numerical ciphers are M1=1627, Customs Assigned Number is the image password schematic diagram of ID_N=50;
Fig. 4 b are that numerical ciphers are M1=1627, Customs Assigned Number is the image password schematic diagram of ID_N=51;
Embodiment
With reference to attached drawing 1, the specific implementation steps of the present invention are:
Step (1) user inputs the user name for having been subjected to system authentication registration first, and system automatically can change user name For corresponding Customs Assigned Number ID_N, system user total number of persons is 10 m series, and it is close that user can propose surely arbitrary 4-digit number Code M1;M is positive integer;
Step (2) system is by numerical ciphers M input by user1Logarithmic transformation is carried out, as shown in formula (1).
By transformation results x1As the position initial value on long-range navigation thatch system three dimensions x directions, and its of long-range navigation thatch system The initial value in his parameter and y and z directions is automatically generated by identity authorization system, shown in long-range navigation thatch system such as formula (2).
In this implementation example, a=10, b=28, initial value of the initial value equal to 2, z of c=8/3, y are equal to 10.So as to obtain Chaos time sequence on x directions, is denoted as X, as shown in formula (3).
X={ x1,x2,x3,......} (3)
Wherein xiThe positional value being illustrated respectively on the long-range navigation thatch system x directions acquired in the ith sample moment.
Place is normalized in the time chaos sequence X that step (3) produces (such as being taken as 10s) in special time window Reason, the time series G={ G after being normalized1,G2,G3... .. }, GiAs shown in formula (4).
Wherein, XminFor the minimum value in chaos time sequence X, XmaxFor the maximum in chaos time sequence X.Then tie Customs Assigned Number ID_N is closed, utilizes linear transformation generated time sequence D elay={ Delay1,Delay2,Delay3... ..., DelayiAs shown in formula (5), wherein A is system Fixed constant, such as desirable A=10.The implication of m such as step (1) is described, such as Desirable m=2.
Delayi=A+Gi×(ID_N/10m) (5)
Step (4) constructs chaos square wave excitation signal, and wherein square-wave signal amplitude and high level time are encryption system Inner parameter, high level time T_top, low and high level difference in magnitude are F, and low level amplitude is F0.And square wave low level time It is corresponding with the time series Delay produced in step (3) for a dynamic value;Chaos square wave excitation signal is specific such as the institute of attached drawing 2 Show.
Step (5) carries out chaos square wave excitation signal neuron response coding, using chaos square wave excitation signal as thorn Electric current input Hodgkin-Huxley neuron models are swashed, as shown in formula (6)~(9).Define neuron pulse and provide the moment and be Film potential V exceedes the time instant of threshold value (such as may be set to 10mv), so that obtaining pulse provides moment sequence Spike= {S1,S2..., wherein SjAt the time of representing that j-th of pulse is provided.
Kt=3(T-6.3)/10 (7)
Wherein neuron parameter value Cm=1uF/cm2, T=6.3 DEG C, gNa=120mS/cm2, gK=36mS/cm2, gL= 0.3mS/cm2, VNa=54.97mV, VK=-71.96mV, VL=-49mV.IextFor the input current of neuron models, it is taken as walking Suddenly the chaos square wave excitation signal in (4).
Step (6) provides moment sequence Spike={ S to neuron pulse1,S2... difference is sought, when obtaining pulse granting The time interval sequence ISI={ ISI at quarter1,ISI2,ISI3.. }, wherein ISIi=Si+1- Si
Step (7) assumes that the ranks parameter of image password is N (such as N=20), the ISI that interception sequence length is N × N Sequence carries out grey scale mapping, obtains One-dimension Time Series M={ M1,M2,M3... .. }, MiAs shown in formula (10).
Wherein, ISIminFor the minimum value in time interval sequence ISI, ISImaxFor the maximum in time interval sequence ISI Value.
It is that image is close by 2-D gray image Image, Image that One-dimension Time Series M is converted into N × N by rows Code, schematic diagram is as shown in attached drawing 3a, Fig. 3 b, Fig. 4 a, Fig. 4 b.

Claims (1)

1. a kind of image password building method based on neuron chaos motion coding, it is characterised in that this method specifically includes Following steps:
Step (1), user input the user name for having been subjected to system authentication registration first and arbitrarily to propose fixed 4-digit number close Code, wherein user name has uniqueness, and user name can be converted to corresponding Customs Assigned Number by system automatically;
Numerical ciphers input by user are carried out logarithmic transformation by step (2), system, using transformation results as long-range navigation thatch chaos system Position initial value on three dimensions x directions, is allowed to produce the chaos time sequence on x directions;
Step (3), in self defined time window, to step (2) produce chaos time sequence be converted to normalization after when Between sequence;Then using Customs Assigned Number as transformation parameter, linear transformation, generated time sequence are carried out to the time series after normalization Row;
The self defined time window will meet the requirement for producing image password sequence length;
Step (4), construction chaos square wave excitation signal, wherein square-wave signal amplitude and high level time are inside encryption system Parameter;And square wave low level time is a dynamic value, corresponding to the new time series of generation in step (3);
Step (5), using chaos square wave excitation signal as stimulated current input Hodgkin-Huxley neuron models, produce god Sequence is provided through first pulse;
The moment is provided in step (6), the pulse of record neuron, obtains the time interval sequence that the moment is provided in pulse;
The time interval sequence of step (7) interception particular sequence length carries out grey scale mapping, and joins by the ranks of image password Number, it is image password that One-dimension Time Series are converted to 2-D gray image Image, Image;The particular sequence length For the pixel total number of image password;
The method that numerical ciphers input by user are carried out logarithmic transformation by system in the step (2) is
<mrow> <msub> <mi>x</mi> <mn>1</mn> </msub> <mo>=</mo> <mrow> <mo>(</mo> <mi>l</mi> <mi>n</mi> <mfrac> <msub> <mi>M</mi> <mn>1</mn> </msub> <mn>1000</mn> </mfrac> <mo>)</mo> </mrow> <mo>&amp;times;</mo> <mn>4.343</mn> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>1</mn> <mo>)</mo> </mrow> <mo>;</mo> </mrow>
Wherein x1As the position initial value on long-range navigation thatch system three dimensions x directions, M1For numerical ciphers input by user;
Using Customs Assigned Number as transformation parameter in step (3), linear transformation, generated time are carried out to the time series after normalization The method of sequence D elay is:
Delayi=A+Gi×(ID_N/10m) (2);
Wherein DelayiI-th of element, the A for representing time series Delay are system Fixed constant, GiRepresent to produce step (2) Chaos time sequence normalization after time value, ID_N for Customs Assigned Number, 10mRepresent system user total number of persons, wherein i, m is Positive integer.
CN201510345680.5A 2015-06-19 2015-06-19 A kind of image password building method based on neuron chaos motion coding Active CN104954116B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510345680.5A CN104954116B (en) 2015-06-19 2015-06-19 A kind of image password building method based on neuron chaos motion coding

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510345680.5A CN104954116B (en) 2015-06-19 2015-06-19 A kind of image password building method based on neuron chaos motion coding

Publications (2)

Publication Number Publication Date
CN104954116A CN104954116A (en) 2015-09-30
CN104954116B true CN104954116B (en) 2018-05-04

Family

ID=54168495

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510345680.5A Active CN104954116B (en) 2015-06-19 2015-06-19 A kind of image password building method based on neuron chaos motion coding

Country Status (1)

Country Link
CN (1) CN104954116B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101022331A (en) * 2006-02-16 2007-08-22 刘粉林 Chaos encrypting method based on carrier
CN101344960A (en) * 2008-08-20 2009-01-14 回静 Chaos digital image encryption method
CN101882296A (en) * 2010-05-07 2010-11-10 邹阿金 Method for hiding Chebyshev neural network chaotic digital watermark information

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101022331A (en) * 2006-02-16 2007-08-22 刘粉林 Chaos encrypting method based on carrier
CN101344960A (en) * 2008-08-20 2009-01-14 回静 Chaos digital image encryption method
CN101882296A (en) * 2010-05-07 2010-11-10 邹阿金 Method for hiding Chebyshev neural network chaotic digital watermark information

Also Published As

Publication number Publication date
CN104954116A (en) 2015-09-30

Similar Documents

Publication Publication Date Title
He et al. Privacy in the internet of things for smart healthcare
US10535120B2 (en) Adversarial learning of privacy protection layers for image recognition services
Chen et al. An anonymous mutual authenticated key agreement scheme for wearable sensors in wireless body area networks
CN105631296A (en) Design method of safety face verification system based on CNN (convolutional neural network) feature extractor
Ashibani et al. Design and implementation of a contextual-based continuous authentication framework for smart homes
EP3841497A1 (en) Machine learning-based platform for user identification
CN112906903A (en) Network security risk prediction method and device, storage medium and computer equipment
Bai et al. A lightweight method of data encryption in BANs using electrocardiogram signal
Najmi et al. A survey on security threats and countermeasures in IoT to achieve users confidentiality and reliability
Moon et al. Improving biometric-based authentication schemes with smart card revocation/reissue for wireless sensor networks
Rathore et al. Multi-layer security scheme for implantable medical devices
CN106295501A (en) The degree of depth based on lip movement study personal identification method
Wang A novel physical layer assisted authentication scheme for mobile wireless sensor networks
Ali et al. A secure and efficient multi-factor authentication algorithm for mobile money applications
Al-Saeed et al. Efficient key agreement algorithm for wireless body area networks using reusable ECG-based features
Banani et al. A dynamic light-weight symmetric encryption algorithm for secure data transmission via ble beacons
Sun et al. On secure simple pairing in Bluetooth standard v5. 0-part i: Authenticated link key security and its home automation and entertainment applications
Wang et al. Securing a smart home with a transformer-based iot intrusion detection system
Lee et al. Secure key agreement and authentication protocol for message confirmation in vehicular cloud computing
Hong et al. A study on a JWT-based user authentication and API assessment scheme using IMEI in a smart home environment
Yan et al. Impersonation attack detection in mobile edge computing by levering sarsa technique in physical layer security
Mishra et al. Secure Blockchain-Enabled Authentication Key Management Framework with Big Data Analytics for Drones in Networks Beyond 5G Applications
CN104954116B (en) A kind of image password building method based on neuron chaos motion coding
Ferretti et al. H2O: secure interactions in IoT via behavioral fingerprinting
Liu et al. Stochastic resonance of signal detection in mono-threshold system using additive and multiplicative noises

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant