CN105450899B - Multiple image encryption method based on PWLCM chaos - Google Patents
Multiple image encryption method based on PWLCM chaos Download PDFInfo
- Publication number
- CN105450899B CN105450899B CN201510881049.7A CN201510881049A CN105450899B CN 105450899 B CN105450899 B CN 105450899B CN 201510881049 A CN201510881049 A CN 201510881049A CN 105450899 B CN105450899 B CN 105450899B
- Authority
- CN
- China
- Prior art keywords
- image
- chaos
- width
- pwlcm
- big
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32267—Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
- H04N1/32272—Encryption or ciphering
Abstract
One kind is based on Piecewise linear chaotic map(Piecewise Linear Chaotic Map, PWLCM)Multiple image encryption method, belong to field of information encryption.Existing image encryption method is using single image as encrypted object mostly, it is difficult to which suitable for the situation of high-volume image encryption, and encryption efficiency is relatively low.Traditional image encryption method is different from, the present invention, by the way that multiple image is converted into the big image of single width, encrypts the big image of single width using multiple image as encrypted object, then is translated into the thought of several encrypted images, realizes the protection to multiple image content.Core procedure:WillkWidth interaction figure picture is combined into the big image of a width;Big image is encrypted using PWLCM chaos, a width is obtained and encrypts big image;It is divided intokWidth encrypted image, and chaos sequence is named it successively caused by PWLCM chaos.Test result indicates that:This method is easily achieved, and cipher round results are good, encryption efficiency and safe, can protect the communication security of any multiple image content simultaneously.
Description
Technical field
The present invention relates to a kind of information encryption, more particularly to a kind of image encryption method.
Background technology
In the numerous areas such as politics, military, business, the safety of the network information becomes to become more and more important.In recent years, network security
Developing state is presented:(1) computer virus emerges in an endless stream;(2) assault rises year by year;(3) there are security breaches in system;
(4) military of various countries steps up information war research.Secrets disclosed by net event happens occasionally, the business of communication privacy, enterprise to network individual
Industry secret, nation's security are stable all to cause significant impact.Therefore, the network information security is to be badly in need of solving in internet development
Major issue.
In many necks such as military discovery, natural disaster monitoring, traffic monitoring, weather forecast, E-Government and individual affairs
In domain, substantial amounts of digital picture can be all produced daily.Meanwhile continuing to bring out for various capture apparatus also accelerates the big data epoch
Arrival.Several photos can be shot as a slr camera is per second, a traffic monitoring camera can shoot thousands of figures daily
Picture.In the big data epoch, digital picture often carries many secret informations.Therefore, the safety of picture material how is protected
As academia and the significant challenge of industrial circle.
To ensure the safety of picture material, people have been presented for many single image encryption methods.These methods are mainly wrapped
Include:Image encryption method based on modern password system, the image encryption method based on matrixing, the figure based on chaology
Image encryption method as encryption method, based on transform domain and the image encryption method based on DNA calculating.In the big data epoch,
Although the safety of multiple image content can be protected with the means for repeating existing single image encryption method, encryption
Efficiency is often relatively low.Therefore, a kind of multiple image encryption method is devised, can while multiple image content safety is ensured
Effectively improve encryption efficiency.
The content of the invention
The purpose of the present invention:The problem of efficiency is low during for existing most single image encryption method encryption multiple images,
It is proposed a kind of multiple image encryption method based on PWLCM chaos.
Technical scheme:For achieving the above object, the technical scheme used is based on the more of PWLCM chaos
Width image encryption method, specifically includes following steps:
Step 1:It is the interaction figure picture I that m rows and n are arranged by k width size1, I2..., IkIt is combined into the big image I of a width;
Step 2:According to system initial value x0With control parameter p1Progress PWLCM chaos system interative computations k × m × n times,
Chaos sequence X is obtained, for the big image of scramble;According to system initial value y0With control parameter p2Carry out PWLCM chaos system iteration
Computing k times, chaos sequence Y is obtained, for naming k width encrypted images;
Step 3:Using chaos sequence X, the big image I of scramble, the big image I of scramble is obtaineddif;
Step 4:Using floor () bracket function to chaos sequence Y integer, integer sequence Y ' are obtained;
Step 5:By the big image I of scrambledifIt is divided into k width encrypted images Ie1, Ie2..., Iek;
Step 6:Encrypted image is sent to recipient.
Further, in the step 1, to encrypt an equal amount of interaction figure pictures of k width m × n, i.e. I1, I2..., Ik, press
Width interaction figure picture is converted into the big image of a width according to certain order, if k=k1×k2, k1And k2Be positive integer, then big image
It is represented by
Further, in the step 1, x is randomly selected0∈ (0,1) and p1∈ (0,0.5) is respectively as PWLCM chaos system
The initial value and control parameter of system, using the chaos system shown in equation below (2) by iteration k × m × n times, one can be produced
Individual chaos sequence X={ xi}kmn,
Similarly, y is randomly selected0∈ (0,1) and p2∈ (0,0.5), another chaos sequence Y={ y can be producedi}k。
Further, in the step 1, ascending order arrangement is carried out according to element value size to X, can obtain a new chaos sequence
Arrange X '={ xi' }kmn={ xt1, xt2..., xtkmn, subscript t1, t2..., tkmnIt is 1,2 ..., a kmn fully intermeshing;According to member
Plain position, to each pixel Arabic numerals 1,2 ... in big image, kmn is encoded, and according to this fully intermeshing to picture
Element carries out position scramble, obtains the big image I of scrambledif。
Further, in the step 1, it is assumed that the precision of computer is 10-14, calculate
yi'=floor (yi×1014), i=1,2 ..., k, (3)
It can obtain an integer sequence Y '.
Further, in the step 1, the big image I of scramble is splitdifInto the image of the equal sizes of k width m × n, i.e. Ie1,
Ie2..., IekIt is considered as the encrypted image of this method, and the filename with the element in Y ' respectively as this k width image.
Further, in the step 1, k width encrypted image and key x0, y0, p1, p2It can not send together;Pass through network
K width encrypted images I is sent to recipiente1, Ie2..., Iek;The transmission of key is then individually sent by safer channel.
The decrypting process is the inverse process of ciphering process.
Beneficial effect:Efficiency low problem when the present invention is for existing most single image encryption method encryption multiple images,
The difficult point of batch images encryption is difficult in adapt to, proposes a kind of multiple image encryption method based on PWLCM chaos.Main contributions have
3 points below:(1) using multiple image as encrypted object, by the way that multiple image is converted into the big image of single width, the big figure of single width is encrypted
Picture, then the thought of several encrypted images is translated into, realize the protection to multiple image content;(2) PWLCM chaos system is used
System carries out bulk encryption to multiple image, and amount of calculation is small, improves encryption efficiency;(3) this method relies on chaology, uses
PWLCM chaos systems carry out location of pixels scramble to multiple image and encrypted image is named, and key sensitiveness is strong, key space
Greatly, it is safe.
Brief description of the drawings
Fig. 1:Multiple image encryption method encryption flow figure based on PWLCM chaos;
Fig. 2:Interaction figure picture;
Fig. 3:Big image;
Fig. 4:Scramble image;
Fig. 5:Encrypted image.
Embodiment
Embodiments of the present invention are further elaborated with reference to specific accompanying drawing and example.
Multiple image encryption method encryption flow figure based on PWLCM chaos, as shown in Figure 1.
The programming software used chooses the gray image of 9 512 × 512 equal sizes shown in Fig. 2 for Matlab 7.0
For experimental subjects.Using the multiple image encryption method based on PWLCM chaos, the detailed process encrypted to 9 width interaction figure pictures is such as
Under:
1. to encrypt the grey interaction figure picture of 9 512 × 512 equal sizes, i.e. I1, I2..., I9, sender Alice presses
9 width interaction figure pictures are converted into the big image of a width according to certain order to be represented by
As shown in Figure 3.
2. randomly select x0=0.28153489126924 and p1=0.44537834013456 respectively as PWLCM chaos
The initial value and control parameter of system, using chaos system shown in formula (2) by iteration 9 × 512 × 512 times, one can be produced
Individual chaos sequence X={ xi}9×512×512.Similarly, y is randomly selected0=0.46567899345427 and p2=
0.13184640452142, another chaos sequence Y={ y can be producedi}9。x0, y0, p1And p2It is considered as the key of this method.
3. couple X carries out ascending order arrangement according to element value size, a new chaos sequence X '={ x can obtaini' }9×512×512=
{xt1, xt2..., xt9×512×512}.Therefore, subscript t1, t2..., t9×512×512It is 1,2 ..., 9 × 512 × 512 full row
Row.According to element position, to each pixel Arabic numerals 1,2 ... in big image, 9 × 512 × 512 are encoded, and
Position scramble is carried out to pixel according to this fully intermeshing, obtains the big image I of scrambledif, as shown in Figure 4.
4. using formula (3), an integer sequence Y ' can obtain.
5. split the big image I of scrambledifInto the image of 512 × 512 equal size such as 9 width, i.e. Ie1, Ie2..., Ie9, it is corresponding
Filename be respectively element in Y '.This k width image is considered as the encrypted image of this method, as shown in Figure 5.
6. send 9 width encrypted image Ie1, Ie2..., Ie9To recipient.
In examples detailed above, recipient carries out the inverse operation of above-mentioned ciphering process in the case of well-known key, you can realizes
Decryption to encrypted image, so as to obtain 9 width original interactive graphic pictures.
Claims (8)
1. the multiple image encryption method based on PWLCM chaos, it is characterised in that specifically include following steps:
Step 1:WillkWidth size ismRow andnThe interaction figure picture of rowI 1 ,I 2 ...,I k It is combined into the big image of a widthI;
Step 2:According to system initial valuex 0And control parameterp 1Carry out PWLCM chaos system interative computationsk×m×nIt is secondary, obtain
Chaos sequenceX, for the big image of scramble;According to system initial valuey 0And control parameterp 2Carry out PWLCM chaos system interative computationskIt is secondary, obtain chaos sequenceY, for namingkWidth encrypted image;
Step 3:Utilize chaos sequenceX, the big image of scrambleI, obtain the big image of scrambleI dif ;
Step 4:Utilizefloor() bracket function is to chaos sequenceYInteger, obtain integer sequenceY ';
Step 5:By the big image of scrambleI dif It is divided intokWidth encrypted imageI e1 ,I e2 ...,I ek ;
Step 6:Encrypted image is sent to recipient.
2. the multiple image encryption method according to claim 1 based on PWLCM chaos, it is characterised in that the step 1
In combination refer to:For encryptionkWidthm×nAn equal amount of interaction figure picture, i.e.,I 1 ,I 2 ...,I k , in a certain order by width
Interaction figure picture is converted into the big image of a width, ifk=k 1 ×k 2 ,k 1 Withk 2 It is positive integer, then big image is represented by
(1).
3. the multiple image encryption method according to claim 1 based on PWLCM chaos, it is characterised in that the step 2
In PWLCM chaos system iteration refer to:Randomly selectx 0 ∈ (0,1) andp 1 ∈ (0,0.5) is respectively as PWLCM chaos systems
Initial value and control parameter, utilize equation below(2)Shown chaos system passes through iterationk×m×nIt is secondary, one can be produced
Chaos sequenceX={x i } kmn ,
;(2)
Similarly, randomly selecty 0 ∈ (0,1) andp 2 ∈ (0,0.5), can produce another chaos sequenceY={y i } k 。
4. the multiple image encryption method according to claim 1 based on PWLCM chaos, it is characterised in that the step 3
In the big image of scramble refer to:It is rightXAscending order arrangement is carried out according to element value size, can obtain a new chaos sequenceX '=
{x i '} kmn ={x t1 ,x t2 ...,x tkmn , subscriptt 1 ,t 2 ...,t kmnIt is 1,2 ...,kmnA fully intermeshing;According to element position,
To each pixel Arabic numerals 1,2 ... in big image,kmnEncoded, and line position is entered to pixel according to this fully intermeshing
Scramble, obtain the big image of scrambleI dif 。
5. the multiple image encryption method according to claim 1 based on PWLCM chaos, it is characterised in that the step 4
In integer refer to:Assuming that the precision of computer is 10-14, calculate
y i '=floor(y i ×1014),i=1,2 ...,k,(3)
It can obtain an integer sequenceY '。
6. the multiple image encryption method according to claim 1 based on PWLCM chaos, it is characterised in that the step 5
In segmentation refer to:Split the big image of scrambleI dif IntokWidthm×nThe image of equal size, i.e.,I e1 ,I e2 ...,I ek It is considered as the party
The encrypted image of method, is used in combinationY 'In element respectively as thiskThe filename of width image.
7. the multiple image encryption method according to claim 1 based on PWLCM chaos, it is characterised in that the step 6
In transmission refer to:kWidth encrypted image and keyx 0,y 0,p 1,p 2It can not send together;Sent by network to recipientkWidth
Encrypted imageI e1 ,I e2 ...,I ek ;The transmission of key is then individually sent by safer channel.
8. the multiple image encryption method according to claim 1 based on PWLCM chaos, it is characterised in that decrypting process
It is the inverse process of ciphering process.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510881049.7A CN105450899B (en) | 2015-12-07 | 2015-12-07 | Multiple image encryption method based on PWLCM chaos |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510881049.7A CN105450899B (en) | 2015-12-07 | 2015-12-07 | Multiple image encryption method based on PWLCM chaos |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105450899A CN105450899A (en) | 2016-03-30 |
CN105450899B true CN105450899B (en) | 2018-03-06 |
Family
ID=55560640
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510881049.7A Expired - Fee Related CN105450899B (en) | 2015-12-07 | 2015-12-07 | Multiple image encryption method based on PWLCM chaos |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105450899B (en) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106599703A (en) * | 2016-12-12 | 2017-04-26 | 中国矿业大学 | Mixed primitive and chaos-based multi-image encryption method |
CN107451948B (en) * | 2017-08-09 | 2020-09-29 | 山东师范大学 | Image encryption and decryption method and system based on chaos and DNA dynamic plane operation |
CN107659752B (en) * | 2017-09-19 | 2020-01-14 | 中国矿业大学 | Multi-image encryption method based on DNA coding and chaos |
CN107659751B (en) * | 2017-09-19 | 2020-01-14 | 中国矿业大学 | Multi-image encryption method based on DNA coding and chaos |
CN108718232B (en) * | 2018-08-17 | 2021-03-26 | 中国矿业大学 | Image encryption method based on AES and chaos |
CN109150492B (en) * | 2018-08-17 | 2021-09-21 | 中国矿业大学 | Multi-image encryption method based on three-dimensional scrambling model and chaos |
CN109726577B (en) * | 2019-01-10 | 2020-08-18 | 首都师范大学 | Image encryption method and device |
CN111263026B (en) * | 2020-01-06 | 2021-08-06 | 中国矿业大学 | Multi-image encryption method based on stereo scrambling model and fractional Fourier transform |
CN111031193B (en) * | 2020-01-06 | 2021-08-06 | 中国矿业大学 | Image encryption method based on three-dimensional composite scrambling model and chaos |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6064738A (en) * | 1996-12-10 | 2000-05-16 | The Research Foundation Of State University Of New York | Method for encrypting and decrypting data using chaotic maps |
JP2004126484A (en) * | 2002-10-01 | 2004-04-22 | Chaos Sangyo Gijutsu Kenkyusho:Kk | Method for compressing and ciphering image data |
CN101604439A (en) * | 2008-06-13 | 2009-12-16 | 西北工业大学 | A kind of color image encrypting method based on multi-chaos system |
CN103916234A (en) * | 2014-04-11 | 2014-07-09 | 中国人民解放军沈阳军区总医院 | Chaos medical image encryption method applied to privacy protection |
CN104537604A (en) * | 2014-12-25 | 2015-04-22 | 中国科学院武汉物理与数学研究所 | Image certainty encryption double-blind secrecy matching method |
-
2015
- 2015-12-07 CN CN201510881049.7A patent/CN105450899B/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6064738A (en) * | 1996-12-10 | 2000-05-16 | The Research Foundation Of State University Of New York | Method for encrypting and decrypting data using chaotic maps |
JP2004126484A (en) * | 2002-10-01 | 2004-04-22 | Chaos Sangyo Gijutsu Kenkyusho:Kk | Method for compressing and ciphering image data |
CN101604439A (en) * | 2008-06-13 | 2009-12-16 | 西北工业大学 | A kind of color image encrypting method based on multi-chaos system |
CN103916234A (en) * | 2014-04-11 | 2014-07-09 | 中国人民解放军沈阳军区总医院 | Chaos medical image encryption method applied to privacy protection |
CN104537604A (en) * | 2014-12-25 | 2015-04-22 | 中国科学院武汉物理与数学研究所 | Image certainty encryption double-blind secrecy matching method |
Also Published As
Publication number | Publication date |
---|---|
CN105450899A (en) | 2016-03-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105450899B (en) | Multiple image encryption method based on PWLCM chaos | |
CN107657579B (en) | Image encryption method based on DNA coding and chaos | |
US20130179690A1 (en) | Method and apparatus for fast image encryption and invisible digital watermark | |
Li et al. | A modified reversible data hiding in encrypted images using random diffusion and accurate prediction | |
Aung et al. | A novel secure combination technique of steganography and cryptography | |
CN109005027B (en) | Random data encryption and decryption method, device and system | |
CN112040086B (en) | Image encryption and decryption methods and devices, equipment and readable storage medium | |
CN107659751A (en) | More image encryption methods based on DNA encoding and chaos | |
CN107659752A (en) | More image encryption methods based on DNA encoding and chaos | |
CN106604040A (en) | Multi-image encryption method based on mixed primitives and full permutation | |
CN104881838B (en) | One kind is based on GF (23) (K, N) significant point deposited without expansion image and reconstructing method | |
CN105447404B (en) | The method and system of image secret protection in a kind of cloud storage | |
CN105554344A (en) | Multi-image encryption method based on mixed graphics primitives | |
US11276138B2 (en) | Image data encryption and rendering system | |
Sazaki et al. | Implementation of affine transform method and advanced hill cipher for securing digital images | |
Kumar et al. | An efficient and effective lossless symmetric key cryptography algorithm for an image | |
CN105554343B (en) | Image encryption method based on weeds model | |
Abboud | Multifactor authentication for software protection | |
CN111541652B (en) | System for improving security of secret information keeping and transmission | |
EP3883178A1 (en) | Encryption system and method employing permutation group-based encryption technology | |
Gunasekaran et al. | Encrypting and decrypting image using computer visualization techniques | |
Gupta et al. | A hybrid technique for spatial image steganography | |
Manindra et al. | OTP Camouflaging using LSB Steganography and Public Key Cryptography | |
Singh et al. | Cryptography and Steganography Techniques | |
Rao et al. | A novel approach for enhancing image security and data hiding using nvss |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20180306 Termination date: 20211207 |
|
CF01 | Termination of patent right due to non-payment of annual fee |