CN105450899B - Multiple image encryption method based on PWLCM chaos - Google Patents

Multiple image encryption method based on PWLCM chaos Download PDF

Info

Publication number
CN105450899B
CN105450899B CN201510881049.7A CN201510881049A CN105450899B CN 105450899 B CN105450899 B CN 105450899B CN 201510881049 A CN201510881049 A CN 201510881049A CN 105450899 B CN105450899 B CN 105450899B
Authority
CN
China
Prior art keywords
image
chaos
width
pwlcm
big
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510881049.7A
Other languages
Chinese (zh)
Other versions
CN105450899A (en
Inventor
张晓强
王雪松
程玉虎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China University of Mining and Technology CUMT
Original Assignee
China University of Mining and Technology CUMT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China University of Mining and Technology CUMT filed Critical China University of Mining and Technology CUMT
Priority to CN201510881049.7A priority Critical patent/CN105450899B/en
Publication of CN105450899A publication Critical patent/CN105450899A/en
Application granted granted Critical
Publication of CN105450899B publication Critical patent/CN105450899B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering

Abstract

One kind is based on Piecewise linear chaotic map(Piecewise Linear Chaotic Map, PWLCM)Multiple image encryption method, belong to field of information encryption.Existing image encryption method is using single image as encrypted object mostly, it is difficult to which suitable for the situation of high-volume image encryption, and encryption efficiency is relatively low.Traditional image encryption method is different from, the present invention, by the way that multiple image is converted into the big image of single width, encrypts the big image of single width using multiple image as encrypted object, then is translated into the thought of several encrypted images, realizes the protection to multiple image content.Core procedure:WillkWidth interaction figure picture is combined into the big image of a width;Big image is encrypted using PWLCM chaos, a width is obtained and encrypts big image;It is divided intokWidth encrypted image, and chaos sequence is named it successively caused by PWLCM chaos.Test result indicates that:This method is easily achieved, and cipher round results are good, encryption efficiency and safe, can protect the communication security of any multiple image content simultaneously.

Description

Multiple image encryption method based on PWLCM chaos
Technical field
The present invention relates to a kind of information encryption, more particularly to a kind of image encryption method.
Background technology
In the numerous areas such as politics, military, business, the safety of the network information becomes to become more and more important.In recent years, network security Developing state is presented:(1) computer virus emerges in an endless stream;(2) assault rises year by year;(3) there are security breaches in system; (4) military of various countries steps up information war research.Secrets disclosed by net event happens occasionally, the business of communication privacy, enterprise to network individual Industry secret, nation's security are stable all to cause significant impact.Therefore, the network information security is to be badly in need of solving in internet development Major issue.
In many necks such as military discovery, natural disaster monitoring, traffic monitoring, weather forecast, E-Government and individual affairs In domain, substantial amounts of digital picture can be all produced daily.Meanwhile continuing to bring out for various capture apparatus also accelerates the big data epoch Arrival.Several photos can be shot as a slr camera is per second, a traffic monitoring camera can shoot thousands of figures daily Picture.In the big data epoch, digital picture often carries many secret informations.Therefore, the safety of picture material how is protected As academia and the significant challenge of industrial circle.
To ensure the safety of picture material, people have been presented for many single image encryption methods.These methods are mainly wrapped Include:Image encryption method based on modern password system, the image encryption method based on matrixing, the figure based on chaology Image encryption method as encryption method, based on transform domain and the image encryption method based on DNA calculating.In the big data epoch, Although the safety of multiple image content can be protected with the means for repeating existing single image encryption method, encryption Efficiency is often relatively low.Therefore, a kind of multiple image encryption method is devised, can while multiple image content safety is ensured Effectively improve encryption efficiency.
The content of the invention
The purpose of the present invention:The problem of efficiency is low during for existing most single image encryption method encryption multiple images, It is proposed a kind of multiple image encryption method based on PWLCM chaos.
Technical scheme:For achieving the above object, the technical scheme used is based on the more of PWLCM chaos Width image encryption method, specifically includes following steps:
Step 1:It is the interaction figure picture I that m rows and n are arranged by k width size1, I2..., IkIt is combined into the big image I of a width;
Step 2:According to system initial value x0With control parameter p1Progress PWLCM chaos system interative computations k × m × n times, Chaos sequence X is obtained, for the big image of scramble;According to system initial value y0With control parameter p2Carry out PWLCM chaos system iteration Computing k times, chaos sequence Y is obtained, for naming k width encrypted images;
Step 3:Using chaos sequence X, the big image I of scramble, the big image I of scramble is obtaineddif
Step 4:Using floor () bracket function to chaos sequence Y integer, integer sequence Y ' are obtained;
Step 5:By the big image I of scrambledifIt is divided into k width encrypted images Ie1, Ie2..., Iek
Step 6:Encrypted image is sent to recipient.
Further, in the step 1, to encrypt an equal amount of interaction figure pictures of k width m × n, i.e. I1, I2..., Ik, press Width interaction figure picture is converted into the big image of a width according to certain order, if k=k1×k2, k1And k2Be positive integer, then big image It is represented by
Further, in the step 1, x is randomly selected0∈ (0,1) and p1∈ (0,0.5) is respectively as PWLCM chaos system The initial value and control parameter of system, using the chaos system shown in equation below (2) by iteration k × m × n times, one can be produced Individual chaos sequence X={ xi}kmn,
Similarly, y is randomly selected0∈ (0,1) and p2∈ (0,0.5), another chaos sequence Y={ y can be producedi}k
Further, in the step 1, ascending order arrangement is carried out according to element value size to X, can obtain a new chaos sequence Arrange X '={ xi' }kmn={ xt1, xt2..., xtkmn, subscript t1, t2..., tkmnIt is 1,2 ..., a kmn fully intermeshing;According to member Plain position, to each pixel Arabic numerals 1,2 ... in big image, kmn is encoded, and according to this fully intermeshing to picture Element carries out position scramble, obtains the big image I of scrambledif
Further, in the step 1, it is assumed that the precision of computer is 10-14, calculate
yi'=floor (yi×1014), i=1,2 ..., k, (3)
It can obtain an integer sequence Y '.
Further, in the step 1, the big image I of scramble is splitdifInto the image of the equal sizes of k width m × n, i.e. Ie1, Ie2..., IekIt is considered as the encrypted image of this method, and the filename with the element in Y ' respectively as this k width image.
Further, in the step 1, k width encrypted image and key x0, y0, p1, p2It can not send together;Pass through network K width encrypted images I is sent to recipiente1, Ie2..., Iek;The transmission of key is then individually sent by safer channel.
The decrypting process is the inverse process of ciphering process.
Beneficial effect:Efficiency low problem when the present invention is for existing most single image encryption method encryption multiple images, The difficult point of batch images encryption is difficult in adapt to, proposes a kind of multiple image encryption method based on PWLCM chaos.Main contributions have 3 points below:(1) using multiple image as encrypted object, by the way that multiple image is converted into the big image of single width, the big figure of single width is encrypted Picture, then the thought of several encrypted images is translated into, realize the protection to multiple image content;(2) PWLCM chaos system is used System carries out bulk encryption to multiple image, and amount of calculation is small, improves encryption efficiency;(3) this method relies on chaology, uses PWLCM chaos systems carry out location of pixels scramble to multiple image and encrypted image is named, and key sensitiveness is strong, key space Greatly, it is safe.
Brief description of the drawings
Fig. 1:Multiple image encryption method encryption flow figure based on PWLCM chaos;
Fig. 2:Interaction figure picture;
Fig. 3:Big image;
Fig. 4:Scramble image;
Fig. 5:Encrypted image.
Embodiment
Embodiments of the present invention are further elaborated with reference to specific accompanying drawing and example.
Multiple image encryption method encryption flow figure based on PWLCM chaos, as shown in Figure 1.
The programming software used chooses the gray image of 9 512 × 512 equal sizes shown in Fig. 2 for Matlab 7.0 For experimental subjects.Using the multiple image encryption method based on PWLCM chaos, the detailed process encrypted to 9 width interaction figure pictures is such as Under:
1. to encrypt the grey interaction figure picture of 9 512 × 512 equal sizes, i.e. I1, I2..., I9, sender Alice presses 9 width interaction figure pictures are converted into the big image of a width according to certain order to be represented by
As shown in Figure 3.
2. randomly select x0=0.28153489126924 and p1=0.44537834013456 respectively as PWLCM chaos The initial value and control parameter of system, using chaos system shown in formula (2) by iteration 9 × 512 × 512 times, one can be produced Individual chaos sequence X={ xi}9×512×512.Similarly, y is randomly selected0=0.46567899345427 and p2= 0.13184640452142, another chaos sequence Y={ y can be producedi}9。x0, y0, p1And p2It is considered as the key of this method.
3. couple X carries out ascending order arrangement according to element value size, a new chaos sequence X '={ x can obtaini' }9×512×512= {xt1, xt2..., xt9×512×512}.Therefore, subscript t1, t2..., t9×512×512It is 1,2 ..., 9 × 512 × 512 full row Row.According to element position, to each pixel Arabic numerals 1,2 ... in big image, 9 × 512 × 512 are encoded, and Position scramble is carried out to pixel according to this fully intermeshing, obtains the big image I of scrambledif, as shown in Figure 4.
4. using formula (3), an integer sequence Y ' can obtain.
5. split the big image I of scrambledifInto the image of 512 × 512 equal size such as 9 width, i.e. Ie1, Ie2..., Ie9, it is corresponding Filename be respectively element in Y '.This k width image is considered as the encrypted image of this method, as shown in Figure 5.
6. send 9 width encrypted image Ie1, Ie2..., Ie9To recipient.
In examples detailed above, recipient carries out the inverse operation of above-mentioned ciphering process in the case of well-known key, you can realizes Decryption to encrypted image, so as to obtain 9 width original interactive graphic pictures.

Claims (8)

1. the multiple image encryption method based on PWLCM chaos, it is characterised in that specifically include following steps:
Step 1:WillkWidth size ismRow andnThe interaction figure picture of rowI 1 ,I 2 ...,I k It is combined into the big image of a widthI
Step 2:According to system initial valuex 0And control parameterp 1Carry out PWLCM chaos system interative computationsk×m×nIt is secondary, obtain Chaos sequenceX, for the big image of scramble;According to system initial valuey 0And control parameterp 2Carry out PWLCM chaos system interative computationskIt is secondary, obtain chaos sequenceY, for namingkWidth encrypted image;
Step 3:Utilize chaos sequenceX, the big image of scrambleI, obtain the big image of scrambleI dif
Step 4:Utilizefloor() bracket function is to chaos sequenceYInteger, obtain integer sequenceY '
Step 5:By the big image of scrambleI dif It is divided intokWidth encrypted imageI e1 ,I e2 ...,I ek
Step 6:Encrypted image is sent to recipient.
2. the multiple image encryption method according to claim 1 based on PWLCM chaos, it is characterised in that the step 1 In combination refer to:For encryptionkWidthm×nAn equal amount of interaction figure picture, i.e.,I 1 ,I 2 ...,I k , in a certain order by width Interaction figure picture is converted into the big image of a width, ifk=k 1 ×k 2 ,k 1 Withk 2 It is positive integer, then big image is represented by
(1).
3. the multiple image encryption method according to claim 1 based on PWLCM chaos, it is characterised in that the step 2 In PWLCM chaos system iteration refer to:Randomly selectx 0 ∈ (0,1) andp 1 ∈ (0,0.5) is respectively as PWLCM chaos systems Initial value and control parameter, utilize equation below(2)Shown chaos system passes through iterationk×m×nIt is secondary, one can be produced Chaos sequenceX={x i } kmn ,
;(2)
Similarly, randomly selecty 0 ∈ (0,1) andp 2 ∈ (0,0.5), can produce another chaos sequenceY={y i } k
4. the multiple image encryption method according to claim 1 based on PWLCM chaos, it is characterised in that the step 3 In the big image of scramble refer to:It is rightXAscending order arrangement is carried out according to element value size, can obtain a new chaos sequenceX '= {x i } kmn ={x t1 ,x t2 ...,x tkmn , subscriptt 1 ,t 2 ...,t kmnIt is 1,2 ...,kmnA fully intermeshing;According to element position, To each pixel Arabic numerals 1,2 ... in big image,kmnEncoded, and line position is entered to pixel according to this fully intermeshing Scramble, obtain the big image of scrambleI dif
5. the multiple image encryption method according to claim 1 based on PWLCM chaos, it is characterised in that the step 4 In integer refer to:Assuming that the precision of computer is 10-14, calculate
y i '=floor(y i ×1014),i=1,2 ...,k,(3)
It can obtain an integer sequenceY '
6. the multiple image encryption method according to claim 1 based on PWLCM chaos, it is characterised in that the step 5 In segmentation refer to:Split the big image of scrambleI dif IntokWidthm×nThe image of equal size, i.e.,I e1 ,I e2 ...,I ek It is considered as the party The encrypted image of method, is used in combinationY 'In element respectively as thiskThe filename of width image.
7. the multiple image encryption method according to claim 1 based on PWLCM chaos, it is characterised in that the step 6 In transmission refer to:kWidth encrypted image and keyx 0,y 0,p 1,p 2It can not send together;Sent by network to recipientkWidth Encrypted imageI e1 ,I e2 ...,I ek ;The transmission of key is then individually sent by safer channel.
8. the multiple image encryption method according to claim 1 based on PWLCM chaos, it is characterised in that decrypting process It is the inverse process of ciphering process.
CN201510881049.7A 2015-12-07 2015-12-07 Multiple image encryption method based on PWLCM chaos Expired - Fee Related CN105450899B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510881049.7A CN105450899B (en) 2015-12-07 2015-12-07 Multiple image encryption method based on PWLCM chaos

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510881049.7A CN105450899B (en) 2015-12-07 2015-12-07 Multiple image encryption method based on PWLCM chaos

Publications (2)

Publication Number Publication Date
CN105450899A CN105450899A (en) 2016-03-30
CN105450899B true CN105450899B (en) 2018-03-06

Family

ID=55560640

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510881049.7A Expired - Fee Related CN105450899B (en) 2015-12-07 2015-12-07 Multiple image encryption method based on PWLCM chaos

Country Status (1)

Country Link
CN (1) CN105450899B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106599703A (en) * 2016-12-12 2017-04-26 中国矿业大学 Mixed primitive and chaos-based multi-image encryption method
CN107451948B (en) * 2017-08-09 2020-09-29 山东师范大学 Image encryption and decryption method and system based on chaos and DNA dynamic plane operation
CN107659752B (en) * 2017-09-19 2020-01-14 中国矿业大学 Multi-image encryption method based on DNA coding and chaos
CN107659751B (en) * 2017-09-19 2020-01-14 中国矿业大学 Multi-image encryption method based on DNA coding and chaos
CN108718232B (en) * 2018-08-17 2021-03-26 中国矿业大学 Image encryption method based on AES and chaos
CN109150492B (en) * 2018-08-17 2021-09-21 中国矿业大学 Multi-image encryption method based on three-dimensional scrambling model and chaos
CN109726577B (en) * 2019-01-10 2020-08-18 首都师范大学 Image encryption method and device
CN111263026B (en) * 2020-01-06 2021-08-06 中国矿业大学 Multi-image encryption method based on stereo scrambling model and fractional Fourier transform
CN111031193B (en) * 2020-01-06 2021-08-06 中国矿业大学 Image encryption method based on three-dimensional composite scrambling model and chaos

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6064738A (en) * 1996-12-10 2000-05-16 The Research Foundation Of State University Of New York Method for encrypting and decrypting data using chaotic maps
JP2004126484A (en) * 2002-10-01 2004-04-22 Chaos Sangyo Gijutsu Kenkyusho:Kk Method for compressing and ciphering image data
CN101604439A (en) * 2008-06-13 2009-12-16 西北工业大学 A kind of color image encrypting method based on multi-chaos system
CN103916234A (en) * 2014-04-11 2014-07-09 中国人民解放军沈阳军区总医院 Chaos medical image encryption method applied to privacy protection
CN104537604A (en) * 2014-12-25 2015-04-22 中国科学院武汉物理与数学研究所 Image certainty encryption double-blind secrecy matching method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6064738A (en) * 1996-12-10 2000-05-16 The Research Foundation Of State University Of New York Method for encrypting and decrypting data using chaotic maps
JP2004126484A (en) * 2002-10-01 2004-04-22 Chaos Sangyo Gijutsu Kenkyusho:Kk Method for compressing and ciphering image data
CN101604439A (en) * 2008-06-13 2009-12-16 西北工业大学 A kind of color image encrypting method based on multi-chaos system
CN103916234A (en) * 2014-04-11 2014-07-09 中国人民解放军沈阳军区总医院 Chaos medical image encryption method applied to privacy protection
CN104537604A (en) * 2014-12-25 2015-04-22 中国科学院武汉物理与数学研究所 Image certainty encryption double-blind secrecy matching method

Also Published As

Publication number Publication date
CN105450899A (en) 2016-03-30

Similar Documents

Publication Publication Date Title
CN105450899B (en) Multiple image encryption method based on PWLCM chaos
CN107657579B (en) Image encryption method based on DNA coding and chaos
US20130179690A1 (en) Method and apparatus for fast image encryption and invisible digital watermark
Li et al. A modified reversible data hiding in encrypted images using random diffusion and accurate prediction
Aung et al. A novel secure combination technique of steganography and cryptography
CN109005027B (en) Random data encryption and decryption method, device and system
CN112040086B (en) Image encryption and decryption methods and devices, equipment and readable storage medium
CN107659751A (en) More image encryption methods based on DNA encoding and chaos
CN107659752A (en) More image encryption methods based on DNA encoding and chaos
CN106604040A (en) Multi-image encryption method based on mixed primitives and full permutation
CN104881838B (en) One kind is based on GF (23) (K, N) significant point deposited without expansion image and reconstructing method
CN105447404B (en) The method and system of image secret protection in a kind of cloud storage
CN105554344A (en) Multi-image encryption method based on mixed graphics primitives
US11276138B2 (en) Image data encryption and rendering system
Sazaki et al. Implementation of affine transform method and advanced hill cipher for securing digital images
Kumar et al. An efficient and effective lossless symmetric key cryptography algorithm for an image
CN105554343B (en) Image encryption method based on weeds model
Abboud Multifactor authentication for software protection
CN111541652B (en) System for improving security of secret information keeping and transmission
EP3883178A1 (en) Encryption system and method employing permutation group-based encryption technology
Gunasekaran et al. Encrypting and decrypting image using computer visualization techniques
Gupta et al. A hybrid technique for spatial image steganography
Manindra et al. OTP Camouflaging using LSB Steganography and Public Key Cryptography
Singh et al. Cryptography and Steganography Techniques
Rao et al. A novel approach for enhancing image security and data hiding using nvss

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180306

Termination date: 20211207

CF01 Termination of patent right due to non-payment of annual fee