CN105761198A - Image selective encryption and decryption method based on dynamic probability and space-frequency domain compositing - Google Patents
Image selective encryption and decryption method based on dynamic probability and space-frequency domain compositing Download PDFInfo
- Publication number
- CN105761198A CN105761198A CN201610102071.1A CN201610102071A CN105761198A CN 105761198 A CN105761198 A CN 105761198A CN 201610102071 A CN201610102071 A CN 201610102071A CN 105761198 A CN105761198 A CN 105761198A
- Authority
- CN
- China
- Prior art keywords
- formula
- init
- image
- parameter
- sequence
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention provides an image selective encryption and decryption method based on dynamic probability and space-frequency domain compositing. The MD5 value and SHA-1 value of a to-be-encrypted image are composited to improve the impact resistance of a single Hash feature, and intermediate key parameters are generated through close coupling to a user key to carry out probability interval division, probability generation and to-be-encrypted pixel screening and to determine a probabilistic encryption event and transform parameters. The designed encryption event includes a space domain and frequency domain replacement operation to improve the efficiency of encryption and avoid the influence of frequency domain coefficient overflow on the recovery of the visual quality of the image. According to the method, the encryption features of the to-be-encrypted image and the user key are updated, so that the key parameters under the condition of different number of encryption times differ greatly and are closely associated with the features of the to-be-encrypted image and the user key, and image visual quality and frequency domain overflow filtering control can be carried out through a preset encryption threshold. For decryption, an intermediate key set needs to be restored first, and then, the screened pixel blocks are decrypted reversely.
Description
Technical field
The invention belongs to information security and data image signal processes crossing research field, relate to a kind of image encryption and conciliate
Decryption method, the image selective encryption compound particularly to a kind of dynamic probability and null tone territory and decryption method.
Background technology
Be generally directed to is entire image in traditional images encryption, changed beyond recognition with secret for entire image being converted to
Figure, not only brings high calculation cost, also masks the image to be encrypted all features almost in addition to size.A lot
In actual application, often it is not required to entire image is encrypted, and only needs bit plane, region and the part picture selected to image
Element is encrypted, and needs the Partial Feature providing original image to come to potential user with more experience while encryption,
Thus exchange bigger commercial interest for, and the characteristics of image that these encrypted images are retained, can be further used for image classification,
Retrieval and identification etc., thus encrypt relative to traditional images, possess more use value.This only to the bit that image is selected
Plane, region and the method for partial pixel encryption, be referred to as selective encryption.
Encrypt for selective image, mainly have than more typical selective image encryption method at present:
1. partial bit plane or bit to choosing carry out selective encryption.Such as, Rehman A U, 2015.
(Rehman A U,Liao X,Kulsoom A,et al.Selective encryption for gray images based
on chaos and DNA complementary rules[J].Multimedia Tools and Applications,
2015,74 (13): 4655-4677) the high-low-position bit plane treating encrypted image is encrypted by different DNA sequence dnas.
Kulsoom A,2016.(Kulsoom A,Xiao D,Aqeel-ur-Rehman,et al.An efficient and noise
resistive selective image encryption scheme for gray images based on chaotic
maps and DNA complementary rules[J].Multimedia Tools and Applications,2016,75
(1) the MD5 value of image: 1-23.) it is further introduced into improve Rehman A U, the anti-chosen-plain attact of strategy described in 2015
Ability.Moon D,2006.(Moon D,Chung Y,Pan S B,et al.An efficient selective
encryption of fingerprint images for embedded processors[J].ETRI journal,
2006,28 (4): 444-452.) LSB of pixel carries out XOR encryption as random keystream and high order bit position cover and treat
Encrypted image feature, and the security of described strategy is improved by secrecy LSB.Vanogenbroeck M,2002.
(Vanogenbroeck M,Benedett R.Techniques for a selective encryption of
uncompressed and compressed images[C]//in Proceedings of Advanced Concepts
For Intelligent Vision Systems (ACIVS) 2002.2002:90-97.) utilize 2 values big with close figure etc. random
The bit plane that double secret key is selected carries out XOR encryption by turn.Zhong Ming, 2008. (Zhong Ming, Liao Xiaofeng, Zhou Qing. a kind of based on four forks
Spatial domain picture Choice encryption algorithm [J] of tree. computer engineering, 2008,34 (18): 174-178.) by bit selected for image
Plane is divided into 8 × 8 fritters, is set the position decomposing node with layer by the position relationship and exchange 8 × 8 fritter 4 fork changing fritter
Put order selected bit plane is encrypted.Xiang T,2007.(Xiang T,Wong K,Liao
X.Selective image encryption using a spatiotemporal chaotic system[J].Chaos:
An Interdisciplinary Journal of Nonlinear Science, 2007,17 (2): 415-427.) use base
Tie up coupled map lattices in the 1 of skew tent map and the bit plane chosen is carried out selective encryption, and to be encrypted by adjusting
Notable bit plane quantity compromise in security and encryption performance.Hoang T,2014.(Hoang T,Tran,
D.Cryptanalysis and security improvement for selective image encryption[J]
.European Physical Journal Special Topics, 2014,223 (8): 1635-1646.) to Xiang T,
The security of 2007 is analyzed, and the notable number of bits participating in encryption by changing each pixel improves described strategy
Security.Rehman A U, 2015, Kulsoom A, 2016, Moon D, 2006, Vanogenbroeck M, 2002, Zhong Ming,
2008, Xiang T, 2007 and Hoang T, 2014 are all based on the selective image encryption of bit plane or bit.Different
Be Rehman A U, 2015 and Kulsoom A, 2016 pairs of high-low-position bit planes have employed different encryption policys;Moon
D, 2006 is as the key encrypting high order bit plane XOR using low-order bit plane;Vanogenbroeck M, 2002,
Zhong Ming, 2008 and Xiang T, 2007 are to be encrypted the bit plane chosen;Hoang T, different pixels is entered by 2014
The bit encryption of row varying number.The ratio that selective encryption strategy based on bit plane and bit can be encrypted by adjustment
The quantity of special plane and encrypting bit position adjusts the visual quality of image to be encrypted, if encryption amount is too much, then tends to tradition
Image encryption, if being only encrypted notable position or notable plane, then loses the identification feature of image, if only to not notable bit
Plane is encrypted, then cannot be effectively reduced the visual quality of image.If using LSB as key, then it is prone to brokenly in transmitting procedure
Bad, cause encrypted image to recover.For gray scale or coloured image, the most limited alternative bit plane, pass through
Select different bit planes that the visual quality of image encryption cost and encrypted image is regulated and controled, the regulation and control that can play
Act on extremely limited.
2. image pixel and block of pixels are screened, the pixel filtered out and block of pixels are carried out selective encryption.Example
As, Zhao Liang, 2010. (Zhao Liang, Liao Xiaofeng, Xiang Tao etc. map based on Z matrix and the coloured image degeneration algorithm of Choice encryption grinds
Study carefully. Acta Physica Sinica [J], 2010,59 [3]: 1507-1523.) give based on pixel random screening masterplate and Pixel Information entropy
Image degradation encryption method.Lin Yangfei, 2015. (Lin Yangfei, Ye Shaozhen. a kind of selective encryption method of medical image data.
Application of electronic technology [J], 2015,41 (3): 107-110.) utilize the pixel of image block and the block of pixels of encryption is carried out
Screening, is encrypted the block of pixels filtered out by SCAN language and image hash value.Wen W,2015.(Wen W,Zhang
Y,Fang Z,et al.Infrared target-based selective encryption bychaotic maps[J]
.Optics Communications, 2015,341:131 139.) utilize geometric active contour and partial differential equation to infrared figure
The target area of picture is screened, and is then encrypted the block of pixels filtered out.Khashan O A,2014.(Khashan O
A,Zin A M,Sundararajan E A.Performance study of selective encryption in
comparison to full encryption for still visual images[J].Journal of Zhejiang
University SCIENCE C, 2014,15 (6): 435-444.) the not overlap partition that image is divided calculate pixel and, root
The block of pixels that blowfish encrypts is filtered out according to pixel and the relation set between threshold value.Zhang T,2013.(Zhang T,
El-Latif A,Han Q,et al.Selective Encryption for Cartoon Images[C]//
Intelligent Human-Machine Systems and Cybernetics(IHMSC),20135th
International Conference on.IEEE, 2013,2:198-201.) utilize scalable Shape context to screen card release
Important information block to be encrypted in logical image.Ayoup A M,2015.(Ayoup A M,Hussein A H,Attia M A
A.Efficient selective image encryption[J].Multimedia Tools and Applications,
2015:1-16.) the comentropy largest block filtered out is carried out AES encryption.Mehta G,2014.(Mehta G,Dutta M K,
Travieso-Gonzalez C M,et al.Edge based selective encryption scheme for
biometric data using chaotic theory[C]//Contemporary Computing and
Informatics (IC3I), 2014International Conference on.IEEE, 2014:383-386.) only opposite side
The notable block that edge detection filters out is encrypted, and is made a distinction notable block and non-significant block by encryption vector.Zhao Liang,
2010, Wen W, 2015, Khashan O A, 2014, Mehta G, 2014, Zhang T, 2013, Ayoup A M, 2015 Hes
Mehta G, 2014 is all that the pixel filtered out on image and block of pixels are carried out selective encryption, need to set screening when screening
Threshold value filters out pixel and the block of pixels of correspondence, owing to before and after encryption, block of pixels is the most corresponding, for keeping encryption policy
Restorability, typically need to ensure encryption screening feature do not change or by record and embed encryption parameter come to encryption and not
Pixel and the block of pixels of encryption make a distinction.For the former, generally it is only capable of selecting fixing encrypted feature, such as comentropy or only
Simple encryption policy can be used to ensure that encrypted feature does not changes;For the latter, store extra encryption parameter usual
Need higher storage cost.
3. the sensitizing range selected user carries out selective encryption.Ravishankar K C,2006.
(Ravishankar K C,Venkateshmurthy M G.Region based selective image encryption
[C]//Computing & Informatics,2006.ICOCI'06.International Conference on.ieee,
2006:1-6.) sensitizing range that user selectes is divided into nonoverlapping fritter, the fritter comprising sensitizing range is selected
Property encryption.Ou Y,2007.(Ou Y,Sur C,Rhee K H.Region-based selective encryption for
medical imaging[M]//Frontiers in Algorithmics.Springer Berlin Heidelberg,
2007:62-73.) specify sensitizing range to carry out AES deciphering user.Ravishankar K C, 2006 and Ou Y, 2007 are all
The area-of-interest selecting user carries out selective encryption, when deciphering, need to provide the most selected sensitizing range, the most also
Bring extra storage cost.
4. frequency coefficient specific to image carries out selective encryption.Wang Lihua, 2010. (Wang Lihua, Liao Xiaofeng, Xiang Tao
Manually degenerate algorithm [J] Deng. image based on wavelet transformation. computer engineering, 2010,36 (16): 203-207.) by original graph
As being converted to the wavelet field subgraph of different frequency composition, by HFS interpolation multiplicative noise and additive noise are come figure
As carrying out frequency domain selective encryption.Nidhi Taneja,2011.(Nidhi Taneja,Balasubramanian Raman,
Indra Gupta.Selective image encryption in fractionalwavelet domain[J].AEU-
International Journal of Electronics and Communications,2011,65(4):338-344.)
In Fourier Transform of Fractional Order territory, energy component is carried out the displacement of Arnold position and XOR encryption more than the sub-band of threshold value.
Wang Lihua, 2010 and Nidhi Taneja, 2011 are to change image to frequency domain, select specific frequency coefficient to add
Close, at frequency domain, choose the different frequency coefficient of significance level and can effectively regulate and control visual quality of images, but simultaneously to frequency coefficient
Encryption also can change the amplitude area of frequency coefficient, thus causes spatial domain pixel overflow and cannot correctly decipher.
In addition to the above problems, selective image encryption there is also the safety problem existing for traditional images encryption, example
Such as displacement and the loose coupling of process of obfuscation, the problems such as concrete encryption policy is unrelated with image to be encrypted.
Summary of the invention
Present invention aim to overcome that prior art defect, it is provided that the image that a kind of dynamic probability and null tone territory are combined selects
Property encryption and decryption approaches, designed encrypted event include spatial domain and frequency domain replacement operator with improve encryption efficiency and avoid frequency
Domain coefficient overflows the impact recovering visual quality of images, simultaneously can be by encryption threshold value set in advance to visual quality of images
It is controlled.
For achieving the above object, the present invention is by the following technical solutions:
The image selective cryptographic method that a kind of dynamic probability and null tone territory are combined, comprises the following steps:
1st step: remember that image to be encrypted is A=(ai,j)m×nAnd ai,j∈ 0,1 ..., and 255}, encryption number of times t, t > 0 are set,
Primary iteration controls parameter k=1, selected initial parameter μ0∈ [3.57,4] and setting encryption judgment threshold δ, δ > 0, note A's
MD5 value and SHA-1 value are respectively 16 system Number Sequence SMD5=< m0,m1,…,m31> and SSHA-1=< s0,s1,…,s39>, by SMD5
And SSHA-1Series connection is 16 system Number Sequence Sms=SMD5||SSHA-1=< smi>72And initialization encryption event subscript index sequence Sid
For Sid=<0,1 ..., 5>, wherein " | | " it is bit bit string serial operation symbol;
2nd step: by SmsIt is mapped as 16 system sequences Sh=< h0,h1,…,h39>;
3rd step: by ShIt is divided intoFour parts, then willI=0,1 ..., 3 are converted to (0,1)
In the range of 10 system decimal Gi, i=0,1 ..., 3;
4th step: by G3As initial parameter α, G0,G1,G2It is mapped as 10 system decimal G ' in the range of (0,1)0,G′1,
G′2, by G '0,G′1,G′2As key parameter Xinit,Yinit,xinit, i.e. Xinit=G '0,Yinit=G '1,xinit=G '2;
5th step: by initial parameter μ0As systematic parameter, key parameter xinit5 (0,1) scopes are produced as initial value
Interior random number is as sequence Sp=< p0,p1,p2,p3,p4>, by SpInterval division sequence S ' in the range of structure (0,1)p=<
p′0,p′1,p′2,p′3,p′4>, thus obtain probability interval [0, p '0),[p′0,p′1),[p′1,p′2),[p′2,p′3),[p′3,
p′4),[p′4,1];
6th step: by key parameter Yinit,μ0It is mapped as μ1∈ [3.57,4], by XinitAnd μ1Respectively as initial value be
System parameter iteration produces intermediate key parameter Z in the range of (0,1)init;
7th step: by Xinit,Yinit,ZinitAs initial value, iteration produces 3 real-valued random numbers for 1 time successively as parameter
X0,Y0,Z0;
8th step: by X0,Y0It is mapped as encrypted image A=(ai,j)m×nOn random point (r0,v0);
9th step: by (r0,v0) as starting point, from image A=(a to be encryptedi,j)m×nFilter out Min=(mu,w)4×4, calculate
MinMapping value Map (Min), if Map is (Min) >=δ then performs the 10th step, otherwise by xinitAs probabilistic determination value P, by X0,Y0,
Z0Mapping value as transformation parameter v, the probability interval fallen into according to P, perform corresponding spatial domain and frequency domain displacement encryption behaviour
Make, then to the matrix fritter M after encryptionoutCalculate mapping value Map (Mout);If Map is (Mout) < δ, then by MoutIn pixel depend on
Secondary as image A=(a to be encryptedi,j)m×nThe pixel of correspondence position, otherwise by MinMiddle pixel is directly as image A=to be encrypted
(ai,j)m×nCorrespondence position pixel;
10th step: utilize X0,Y0,Z0To case index sequence SidCarry out resetting and update;
11st step: utilize X0,Y0,Z0To initial parameter μ0And Sms=< msi>72In element be updated operation;
12nd step: if during k≤t, updates k=k+1, repeatedly performs the 2nd step~the 11st step;
13rd step: by A=(ai,j)m×nOutput is as encrypted image.
Further, the 2nd step is by SmsIt is mapped as Sh=< h0,h1,…,h39> concrete grammar be formula (1):
Sh=Draw (Sms,start,gap,|Sh|) (1)
In formula (1), Draw () is that sequential element extracts function, and wherein start is extraction starting point, and gap is the sample skipped
Number, | Sh| for ShMiddle number of elements, i.e. from SmsCirculation extraction | Sh| individual 16 system numbers are as Sh, start, gap are respectively by formula (2)
Map with formula (3) and obtain:
3rd step is by ShIt is divided intoTetrameric concrete grammar is formula (4):
3rd step willI=0,1 ..., 3 are converted to 10 system decimal G in the range of (0,1)i, i=0,1 ..., the tool of 3
Body method is formula (5), and in formula (5), [] is round function:
Further, the 4th step is by G3As initial parameter α, G0,G1,G2It is mapped as 10 system decimals in the range of (0,1)
G′0,G′1,G′2Concrete grammar be by G0,G1,G2Respectively as the input parameter of formula (6), substitute into formula (6) iteration and produce 31 time
Individual sequential value G '0,G′1,G′2;
5th step is by μ0As systematic parameter, xinitThe random number in the range of 5 (0,1) is produced as sequence as initial value
Sp=< p0,p1,p2,p3,p4> concrete grammar be by μ0As systematic parameter, xinitFormula (7) iteration is brought into 5 times as initial value
5 random numbers produced are as sequence Sp=< p0,p1,p2,p3,p4>
xi+1=μ xi(1-xi) (7);
By S in 5th steppInterval division sequence S ' in the range of structure (0,1)p=< p '0,p′1,p′2,p′3,p′4> tool
Body method is by SpMiddle element obtains interval division sequence S ' by descending orderp=< p '0,p′1,p′2,p′3,p′4>。
Further, the 6th step is by Yinit,μ0It is mapped as μ1The concrete grammar of ∈ [3.57,4] is formula (8):
6th step is by XinitAnd μ1The intermediate key ginseng in the range of (0,1) is produced respectively as initial value and systematic parameter iteration
Number ZinitConcrete grammar be by XinitAnd μ1Make for 1 time by formula (7) iteration respectively as the initial value in formula (7) and systematic parameter
For intermediate key parameter Zinit;
xi+1=μ xi(1-xi) (7);
7th step is by Xinit,Yinit,ZinitAs initial value, iteration produces 3 random numbers for 1 time successively as parameter X0,Y0,
Z0Concrete grammar be by Xinit,Yinit,ZinitAs the initial value of formula (9), produce 3 random numbers successively iterative (9) 1 times
As parameter X0,Y0,Z0, formula (9) systematic parameter takes a=b=0.2, c=5.7;
Further, the 8th step is by X0,Y0Being mapped as encrypted image is A=(ai,j)m×nOn random point (r0,v0) concrete side
Method is formula (10), in formula (10)Accord with for downward rounding operation;
9th step is by (r0,v0) as starting point, from image A=(a to be encryptedi,j)m×nFilter out the matrix fritter M of 4 × 4in=
(mu,w)4×4Concrete grammar be formula (11):
9th step calculates MinMapping value Map (Min) concrete grammar be by formula (12) calculate MinVariance:
9th step is to the matrix fritter M after encryptionoutCalculate mapping value Map (Mout) concrete grammar be same by formula (12)
Method calculate MoutVariance;
By X in 9th step0,Y0,Z0Mapping value be formula (13) as the concrete grammar of transformation parameter v:
9th step performs the spatial domain of correspondence and the concrete grammar of frequency domain displacement cryptographic operation is formula (14):
Mout=Encrypt (Min,v,P,f,Sid,S′p) (14)
In formula (14), f={f0,f1,…,f5It is encrypted event set, SidIt is the subscript index sequence of f, S 'pFor interval
Dividing sequence, corresponding 6 group encryption event, the wherein f of encrypted event set f0,f1,f2Spatial domain displacement box encrypted event, such as formula (15)
Shown in, f3,f4,f5Transform domain displacement box encrypted event, as shown in formula (16), f0,f1,…,f5Corresponding displacement box Px0,
Px1,…,Px5As shown in formula (17);
In formula (15), McodeIt is MinNumbering matrix, remember MinIn element mu,wAt McodeIn numbered id, then
Permute0The function that () function performs is by mu,wMove to PxiMiddle element value is the coordinate position of (id+v) mod16;
In formula (16), MHIt is Hadamard transform battle array, remembers MtempIn element mtu,wAt McodeIn numbered id and id ≠
×, Permute1The operation that () performs is by mtu,wMove to PxiMiddle element value is the coordinate position of (id+v) mod16+1, with
Permute0The difference of () is Permute1() in conversion process, MtempIn the element of (0,0) position, i.e. id=× element
Remaining at (0,0) position does not occur position to change;
Further, the 10th step utilizes X0,Y0,Z0To case index sequence SidCarry out resetting the concrete grammar updated for by X0,
Y0,Z0Being mapped as start, gap by formula (18) and formula (19), right back-pushed-type (20) is to case index sequence SidIt is updated:
Sid=Draw (Sid,start,gap,|Sid|) (20);
11st step utilizes X0,Y0,Z0To initial parameter μ0The concrete grammar updated is formula (22):
To S in 11st stepms=< msi>72In element be updated operation method particularly includes: first use X0,Y0,Z0By formula
(21) x is generatedinit, then by xinit,μ0Substitution formula (7) iteration produces random sequence SR=< ri>72, by formula (23) to Sms=<
msi>72In element be updated operation;
xinit=(X0+X0Y0+X0Y0Z0)mod1 (21)
xi+1=μ xi(1-xi) (7)
The image selectivity decryption method that a kind of dynamic probability and null tone territory are combined, comprises the following steps:
1st step: inputted key μ by user0∈[3.57,4],SMD5,SSHA-1, encrypt number of times t, t > 0 and encrypted image C,
Primary iteration controls parameter k=0, and input encryption judgment threshold δ, δ > 0, by SMD5And SSHA-1Series connection is 16 system Number Sequence Sms
=SMD5||SSHA-1=< smi>72And initialization encryption event subscript index sequence Sid=<0,1 ..., 5>and intermediate key parameter
Sequence SX >,SY >,SZ >,SX >,S′P >,SId >For empty sequence;
2nd step: by SmsIt is mapped as 16 system sequences Sh=< h0,h1,…,h39>;
3rd step: by ShIt is divided intoFour parts, then willI=0,1 ..., 3 are converted to (0,1)
In the range of 10 system decimal Gi, i=0,1 ..., 3;
4th step: by G3As initial parameter α, G0,G1,G2It is mapped as 10 system decimal G ' in the range of (0,1)0,G′1,
G′2, by G '0,G′1,G′2As key parameter Xinit,Yinit,xinit, i.e. Xinit=G '0,Yinit=G '1,xinit=G '2, by xinit
As sequence SX >In kth element
5th step: by initial parameter μ0As systematic parameter, intermediate parameters xinit5 (0,1) scopes are produced as initial value
Interior random number is as sequence Sp=< p0,p1,p2,p3,p4>, by SpInterval division sequence S ' in the range of structure (0,1)p=p
′0,p′1,p′2,p′3,p′4>, thus obtain 6 probability intervals [0, p '0),[p′0,p′1),[p′1,p′2),[p′2,p′3),
[p′3,p′4),[p′4, 1], by p '0,p′1,p′2,p′3,p′4As sequence S 'P >In 5k, 5k+1 ..., 5k+4 element
6th step: by Yinit, μ is mapped as the μ in the range of [3.57,4]1, by XinitAnd μ1Respectively as initial value and system
Parameter, then the mapping value of iteration 1 time is as intermediate key parameter Zinit;
7th step: by Xinit,Yinit,ZinitSubstitute into chaos system for 1 time as initial value iteration and produce 3 real-valued random numbers
X0,Y0,Z0, and by X0,Y0,Z0Successively respectively as SX >,SY >,SZ >In kth element
8th step: utilize X0,Y0,Z0To event subscript index sequence SidIt is updated, by SidIn all elements make successively
For SId >In 6k, 6k+1 ..., 6k+5 element
9th step: utilize X0,Y0,Z0To initial parameter μ0And Sms=< msi>72In element be updated operation;
10th step: if k ≠ t updates k=k+1, repeatedly perform the 2nd step~the 9th step, available sequence
11st step: by SX >,SY >-1 element of kthIt is mapped as image C=(c to be decryptedi,j)m×nOn random
Point (r0,v0), by SZ >-1 element of kth in sequenceWithIt is mapped as transformation parameter v;
12nd step: by (r0,v0) as starting point, from image C=(c to be decryptedi,j)m×nFilter out 4 × 4 matrix fritter Min=
(mu,w)4×4, calculate MinMapping value Map (Min), if Map is (Min) >=δ, then update k=k-1, perform the 11st step when k ≠ 0,
The 14th step is performed as k=0, if above-mentioned condition Map (Min) >=δ is not satisfied, and takes SX >-1 element of kthSentence as probability
Disconnected value P, utilizes S 'P >5k-5,5k-4 ..., 5k-1 elementStructure probability intervalTake SId >6k-6,6k-5 ..., 6k-1 unit
ElementAs subscript index sequence, with v as transformation parameter, the probability interval fallen into according to P,
By matrix fritter Min=(mu,w)4×4Deciphering is matrix fritter Mout;
13rd step: calculate MoutCorresponding mapping value Map (Mout), if Map is (Mout) < δ, then by MoutIn element make successively
For encrypted image C=(ci,j)m×nThe pixel of correspondence position, otherwise by MinMiddle pixel is as encrypted image C=(ci,j)m×nCorresponding
The pixel of position, updates k=k-1, repeatedly performs the 11st step~the 13rd step when k ≠ 0;
14th step: by C=(ci,j)m×nOutput is as decrypted image.
Further, by S in the 2nd stepmsIt is mapped as sequence Sh=< h0,h1,…,h39> concrete grammar be formula (1):
Sh=Draw (Sms,start,gap,|Sh|) (1)
In formula (1), Draw () is that sequential element extracts function, and wherein start is extraction starting point, and gap is the sample skipped
Number, | Sh| for ShMiddle number of elements, i.e. from SmsCirculation extraction | Sh| individual 16 system numbers are as Sh, start, gap are respectively by formula (2)
Map with formula (3) and obtain:
3rd step is by ShIt is divided intoTetrameric concrete grammar is formula (4):
3rd step willI=0,1 ..., 3 are converted to 10 system decimal G in the range of (0,1)i, i=0,1 ..., the tool of 3
Body method is formula (5):
4th step is by G3As initial parameter α, G0,G1,G2It is mapped as 10 system decimal G ' in the range of (0,1)0,G′1,
G′2Concrete grammar be by G0,G1,G2Respectively as the input parameter of formula (6), substitute into formula (6) iteration and produce 3 sequential values 1 time
G′0,G′1,G′2;
By μ in 5th step0As systematic parameter, xinitThe random number in the range of 5 (0,1) is produced as sequence as initial value
Row Sp=< p0,p1,p2,p3,p4> concrete grammar be as systematic parameter, x using μ 0initFormula (7) iteration 5 is brought into as initial value
Secondary generation sequence Sp=< p0,p1,p2,p3,p4>:
xi+1=μ xi(1-xi) (7);
By S in 5th steppInterval division sequence S ' in the range of structure (0,1)p=< p '0,p′1,p′2,p′3,p′4> tool
Body method is by SpMiddle element obtains interval division sequence S ' by descending orderp=< p '0,p′1,p′2,p′3,p′4>。
Further, the 6th step is by Yinit,μ0It is mapped as the μ in the range of [3.57,4]1Concrete grammar be formula (8):
6th step is by XinitAnd μ1Respectively as the mapping value of initial value and systematic parameter iteration 1 time as intermediate key parameter
ZinitConcrete grammar be use formula (7):
xi+1=μ xi(1-xi) (7);
7th step is by Xinit,Yinit,ZinitSubstitute into chaos system for 1 time as initial value iteration and produce 3 real-valued random numbers X0,
Y0,Z0Concrete grammar be by Xinit,Yinit,ZinitAs the initial value of formula (9), formula (9) systematic parameter takes a=b=0.2, c=
5.7, produce 3 real-valued random value X iterative (9) 1 times0,Y0,Z0:
8th step utilizes X0,Y0,Z0To event subscript index sequence SidThe concrete grammar being updated is for by X0,Y0,Z0By formula
(18) and formula (19) is mapped as start, gap, right back-pushed-type (20) is to SidIt is updated:
Sid=Draw (Sid,start,gap,|Sid|) (20);
9th step utilizes X0,Y0,Z0To initial parameter μ0The concrete grammar being updated is formula (22):
9th step is to Sms=< msi>72In element be updated operation method particularly includes: first use X0,Y0,Z0By formula (21)
Generate xinit, then by xinit,μ0Substitution formula (7) iteration produces random sequence SR=< ri>72, by formula (23) to Sms=< msi>72
In element be updated operation;
xinit=(X0+X0Y0+X0Y0Z0)mod1 (21)
xi+1=μ xi(1-xi) (7)
Further, by S in the 11st stepX >,SY >-1 element of kthIt is mapped as image C=(c to be decryptedi,j)m×n
Upper random point (r0,v0) concrete grammar be formula (24):
11st step is by SZ >-1 element of kth in sequenceWithIt is mapped as the concrete grammar of transformation parameter v
For formula (25):
12nd step is by (r0,v0) as starting point, from image C=(c to be decryptedi,j)m×nFilter out the matrix fritter M of 4 × 4in
=(mu,w)4×4Concrete grammar be formula (26):
12nd step calculates MinMapping value Map (Min) concrete grammar for calculate M by formula (12)inCorresponding variance:
By matrix M in 12nd stepin=(mu,w)4×4Deciphering is matrix MoutConcrete grammar be formula (27):
Mout=Decryption (Min,v,P,f′,SId >,S′P >) (27)
In formula (27), f '={ f '0,f′1,…,f′5It is program event set, f ' corresponding 6 groups of program event, wherein f '0,
f′1,f′2Spatial domain displacement box program event, as shown in formula (28), f '3,f′4,f′5Transform domain displacement box program event, such as formula (29)
Shown in, f '0,f′1,…,f′5Corresponding displacement box Px0,Px1,…,Px5As shown in formula (17):
In formula (28), McodeIt is numbering matrix, remembers MinIn element mu,wAt PxiIn numbered id, thenThe function that function performs is by mu,wMove to McodeMiddle element number is the coordinate bit of (id-v+16) mod16
Put;
In formula (29), MHIt is Hadamard transform battle array, Permute1 -1The operation that () performs is by PxiIn numbered id ≠
× element mtu,wMove to McodeIn the coordinate position of numbered (id-v+16) mod16+1, id=× element remain
Position is not occurred to change in (0,0) position;
13rd step calculates MoutCorresponding mapping value Map (Mout) concrete grammar be to calculate by the same method of formula (12)
MoutCorresponding variance.
Different compared with technology, advantages of the present invention is mainly reflected in:
1. The present invention gives a kind of selective image encryption compound based on dynamic probability event and null tone territory and deciphering
Method, improves carried AES by introducing MD5 value and the SHA-1 value with image to be encrypted attribute extreme sensitivity in plain text
Sensitiveness in plain text, and by MD5 value and the compound of SHA-1 value are improved single MD5 value or the crash-protective characteristics of SHA-1 value, institute
Extracting method is by the attribute of image to be encrypted, the probability interval fallen into, the encryption link of participation, and corresponding transformation parameter is closely
Be coupling in together, even if thus use identical key, different plaintext images is encrypted all by corresponding different adding
Close result.
2. convert plaintext into the encryption policy difference of random noise with tradition, designed encryption method only reduces image
Visual quality, the approximation characteristic of image can be retained while encryption, and this approximation characteristic can be by set in advance
Encryption threshold value is controlled, thus can conveniently treat encrypted image and extract for classifying and knowing another characteristic, simultaneously when deciphering,
Encrypted image can recover again in high quality.
The most traditional frequency domain selective cryptographic method may result in spatial domain pixel value when being encrypted frequency coefficient
Overflow, thus reduce the visual quality recovering image.Change the impact recovering visual quality of images for reducing frequency coefficient,
Present invention adds encryption threshold value screening strategy, for random selected block of pixels being encrypted the screening of before and after's threshold value, once
Before and after block of pixels encryption, threshold value screening exceedes threshold value set in advance, then abandon random selected block of pixels is encrypted to ensure that figure
Visual quality during as recovering, also retrains the encryption visual quality of image randomized block simultaneously.
What 4. the present invention was given be not only a kind of image encryption method based on probability encryption event, and be a kind of with
The image Probabilistic Encryption Methods of update mechanism.Institute's extracting method is key parameter user given and image MD5 to be encrypted, SHA-
It is interval that 1 value is mapped as different probability encryptions, is then come to be added by key parameter and MD5 value and SHA-1 value mapping parameters
Close pixel carries out random screening, performs different probability encryption events according to the different probability interval fallen into.Institute's extracting method is not
Only probability interval is updated, and by mapping parameters, probability encryption arrangement of objects order and initial key is all carried out
Update, then the multiplexed sequence being made up of MD5 value and SHA-1 value the initial key generation encryption random sequence after updating is carried out
Encryption updates, thus the encrypted state phase that the encrypted event corresponding to different probability intervals is the most incomplete same and the most different
Tangle mutually and close-coupled.
Accompanying drawing explanation
Fig. 1 is encryption flow figure;
Fig. 2 is deciphering flow chart;
Fig. 3 is image to be encrypted, is 8 gray level image face of 256 × 256 resolution ratio, and the MD5 value corresponding to Fig. 3 is
SMD5=<D, 1,1, C, B, B, B, C, 3,7, A, A, 8, B, F, 5,1,4,5,1,3, C, E, F, F, 3,4, E, 4,2,0,7>, SHA-1
Value is SSHA-1=< 2, A, E, 0, D, B, A, B, 1,1,6,3,2, E, 8,9, B, 4, A, D, D, 0,7,1, F, 9,3,7, C, 1,5,5,7,
0,E,C,2,A,1,E>;
Fig. 4 is embodiment: encrypted image when t=10000, δ=1300, relative to the PSNR=22.939dB of Fig. 3;
Fig. 5 is embodiment: decrypted image when t=10000, δ=1300, relative to the PSNR=50.825dB of Fig. 3;
Fig. 6 is embodiment: encrypted image when t=15000, δ=1600, relative to the PSNR=21.752dB of Fig. 3;
Fig. 7 is embodiment: decrypted image when t=15000, δ=1600, relative to the PSNR=48.276dB of Fig. 3;
Fig. 8 is embodiment: when t=10000, δ=1300, it is provided that corresponding (being revised as 3.989 of the μ value of mistake
3.989999998 decrypted image, relative to the PSNR=21.282dB of Fig. 3);
Fig. 9 is embodiment: when t=10000, δ=1300, it is provided that the S of mistakeMD5Value (SMD5=< D, 1,1, C, B, B, B, C,
3,7, A, A, 8, B, F, 5, Isosorbide-5-Nitrae, 5,1,3, C, E, F, F, 3,4, E, 4,2,0,8 >) corresponding decrypted image, relative to Fig. 3's
PSNR=21.278dB;
Figure 10 is embodiment: when t=10000, δ=1300, it is provided that the S of mistakeSHA-1Value (SSHA-1=< 2, A, E, 0, D, B,
A, B, 1,1,6,3,2, E, 8,9, B, 4, A, D, D, 0,7,1, F, 9,3,7, C, 1,5,5,7,0, E, C, 2, A, 1, F >) corresponding solution
Close image, is PSNR=21.253dB relative to the PSNR of Fig. 3;
Figure 11 is embodiment: encrypted image when t=10000, δ=2500, relative to the PSNR=22.352dB of Fig. 3;
Figure 12 is embodiment: decrypted image when t=10000, δ=2500, relative to the PSNR=43.642dB of Fig. 3;
Figure 13 is embodiment: encrypted image when t=10000, δ=3500, relative to the PSNR=22.049dB of Fig. 3;
Figure 14 is embodiment: decrypted image when t=10000, δ=3500, relative to the PSNR=46.990dB of Fig. 3;
Figure 15 is embodiment: encrypted image when t=15000, δ=2500, relative to the PSNR=21.415dB of Fig. 3;
Figure 16 is embodiment: decrypted image when t=15000, δ=2500, relative to the PSNR=39.739dB of Fig. 3;
Figure 17 is embodiment: encrypted image when t=15000, δ=3500, relative to the PSNR=21.092dB of Fig. 3;
Figure 18 is embodiment: decrypted image when t=15000, δ=3500, relative to the PSNR=37.506dB of Fig. 3.
Detailed description of the invention
Below in conjunction with specific embodiment, the present invention will be described:
With JAVA jdk1.8.0_20 for case implementation environment, in conjunction with accompanying drawing, embodiment of the present invention is carried out specifically
Bright, but it is not limited to the implementation case, wherein Fig. 1 is encryption flow figure, and Fig. 2 is deciphering flow chart;
Ciphering process is as follows:
1st step: choose image A as it is shown on figure 3, be the gray level image face of 256 × 256, remembers image A=to be encrypted
(ai,j)m×n40 corresponding 16 system MD5 values are SMD5=< D, 1,1, C, B, B, B, C, 3,7, A, A, 8, B, F, 5,1,4,5,1,
3, C, E, F, F, 3,4, E, 4,2,0,7 >, SHA-1 value is SSHA-1=< 2, A, E, 0, D, B, A, B, 1,1,6,3,2, E, 8,9, B, 4,
A, D, D, 0,7,1, F, 9,3,7, C, 1,5,5,7,0, E, C, 2, A, 1, E >, by SMD5And SSHA-1Series connection is 16 system Number Sequence Sms
=SMD5||SSHA-1=< smi>72And initialization encryption event subscript index sequence SidFor Sid=<0,1 ..., 5>, encryption time is set
Number t=10000, primary iteration controls parameter k=1, selected initial parameter μ0=3.989, encrypt judgment threshold δ=1300;
2nd step: by SmsSubstitution formula (1) is mapped as 16 system sequences Sh=< h0,h1,…,h39>, by SmsSubstitute into formula respectively
And formula (3) is mapped as start, gap (2);Such as: by Sms=< D, 1,1, C, B, B, B, C, 3,7, A, A, 8, B, F, 5,1,4,5,
1,3, C, E, F, F, 3,4, E, 4,2,0,7,2, A, E, 0, D, B, A, B, 1,1,6,3,2, E, 8,9, B, 4, A, D, D, 0,7,1, F,
9,3,7, C, 1,5,5,7,0, E, C, 2, A, 1, E > substitution formula (1) is mapped as Sh=< A, E, 7,2,4,0, A, B, 6,9,0, C, 2,
B, 5,4, B, 5, C, F, D, D, C, 1,7,3,1,1, B, 4,1,0,2,1, B, E, 3,7, D, 9 >, by SmsSubstitute into formula (2) and formula respectively
(3) start=43, gap=67 can be obtained;
3rd step: by ShIt is divided into by formula (4)Four parts, then willI=0,1 ..., 3 substitute into
Formula (5) is converted to 10 system decimal G in the range of (0,1)i, i=0,1 ..., 3;Such as: can be by ShIt is divided into Substitution formula (5) is mapped as: G0=0.6748477158235295, G1=
0.07244421382352942,G2=0.8483371302352942, G3=0.06013199052941176;
4th step: by G3As initial parameter α, G0,G1,G2Respectively as the input parameter of formula (6), substitute into formula (6) repeatedly
In generation, produces 3 sequential value G ' 1 time0,G′1,G′2, by G '0,G′1,G′2As key parameter Xinit,Yinit,xinit;
Such as: α=0.06013199052941176 is as initial parameter, by G0,G1,G2Substitute into formula (6) respectively and map G '0
=0.34595526276037764, G '1=0.9869000506772724, G '2=0.16136613677290165, Xinit=
0.34595526276037764,Yinit=0.9869000506772724, xinit=0.16136613677290165;
5th step: by μ0As systematic parameter, xinit5 random numbers works that formula (7) iteration produces for 5 times are brought into as initial value
For sequence Sp=< p0,p1,p2,p3,p4>, by SpMiddle element obtains interval division sequence S ' by descending orderp=< p '0,p
′1,p′2,p′3,p′4>;Such as: μ0=3.989, xinit=0.16136613677290165 substitutes into formula (7) iteration maps for 5 times, Sp
=< p0,p1,p2,p3,p4>,p0=0.5398198285301286, p1=0.9909249668295106, p2=
0.035871788327397826,p3=0.13795957748394325, p4=0.4743987358004721, then can obtain S 'p
=< p '0,p′1,p′2,p′3,p′4>, i.e. p '0=0.035871788327397826, p '1=0.13795957748394325, p '2
=0.4743987358004721, p '3=0.5398198285301286, p '4=0.9909249668295106;
6th step: by Yinit,μ0Substitution formula (8) is mapped as μ1∈ [3.57,4], by XinitAnd μ1Initial respectively as formula (7)
Value and systematic parameter by formula (7) iteration 1 time as intermediate key parameter Zinit;Such as: by μ0=3.989, Yinit=
0.9869000506772724 substitutes into formula (8) can obtain μ1=3.9916826088662414, by Xinit=
0.34595526276037764 and μ1=3.9916826088662414 substitute into formula (7) can obtain Zinit=
0.9031988978023509;
7th step: by Xinit,Yinit,ZinitAs the initial value of formula (9), produce 3 real-valued random numbers iterative (9) 1 times
Successively as parameter X0,Y0,Z0, formula (9) systematic parameter takes a=b=0.2, c=5.7;
Such as: Xinit=0.34595526276037764, Yinit=0.9869000506772724, Zinit=
0.9031988978023509 is obtained X by formula (9)0=0.1755933912994469, Y0=1.0326377639685018, Z0=
0.5476634933830886;
8th step: by X0,Y0It is A=(a that substitution formula (10) is mapped as encrypted imagei,j)m×nOn random point (r0,v0);
Such as: X0=0.1755933912994469, Y0=1.0326377639685018 substitute into formula (10), can be mapped as
Encrypted image is A=(ai,j)m×nOn random point r0=36, v0=6;
9th step: by (r0,v0) as starting point, by formula (11) from image A=(a to be encryptedi,j)m×nFilter out Min=
(mu,w)4×4, by MinSubstitution formula (12) calculates mapping value Map (Min), if Map is (Min) >=δ then performs the 10th step, otherwise by xinit
As probabilistic determination value P, by X0,Y0,Z0Substitution formula (13) mapping transformation parameter v, the probability interval fallen into according to P, by formula
(14) corresponding spatial domain and frequency domain displacement cryptographic operation are performed, the method calculating M that right back-pushed-type (12) is sameoutMapping value Map
(Mout), if Map is (Mout) < δ, then by MoutIn pixel successively as image A=(a to be encryptedi,j)m×nThe pixel of correspondence position,
Otherwise by MinMiddle pixel is directly as image A=(a to be encryptedi,j)m×nThe pixel of correspondence position;Such as: by (r0,v0) as rising
Point, by formula (11) from image A=(a to be encryptedi,j)m×nFilter out the matrix fritter of 4 × 4 By MinSubstitution formula (12), due to Map (Min)=172.4375 i.e. Map (Min) < δ passes through
Judge to continue executing with cryptographic operation, P=0.16136613677290165, pass through X0=0.1755933912994469, Y0=
1.0326377639685018,Z0=0.5476634933830886 substitutes into formula (13) mapping transformation parameter v=10, according to P institute
The probability interval fallen into, performs corresponding spatial domain by formula (14) and frequency domain displacement cryptographic operation obtains By MoutSubstitution formula (12) judges, Map (Mout)=172.4375 i.e. Map
(Mout) < δ, then by MoutMiddle element is successively as image A=(a to be encryptedi,j)m×nCorrespondence position pixel;
10th step: utilize X0,Y0,Z0Being mapped as start, gap by formula (18) and formula (19), right back-pushed-type (20) is to event
Index sequence SidIt is updated;Such as: by Sid=0,1,2 ..., 5} substitutes into formula (20) and maps new Sid=3,1,0,2,5,4},
By X0=0.1755933912994469, Y0=1.0326377639685018, Z0=0.5476634933830886 substitutes into respectively
Formula (18), (19) can obtain parameter start=0, gap=3;
11st step: utilize X0,Y0,Z0Substitution formula (22) maps initial parameter μ0, then use X0,Y0,Z0Generate by formula (21)
xinit, then by xinit,μ0Substitution formula (7) iteration produces random sequence SR=< ri>72, by formula (23) to Sms=< msi>72In
Element is updated operation;Such as: by X0,Y0,Z0Substitution formula (22) undated parameter μ0=3.7798190064841766, by X0,
Y0,Z0Substitution formula (21) maps xinit=0.45622249450285557, by xinit,μ0Substitution formula (7) maps random sequence SR=
<ri>72, and by SR=< ri>72To Sms=< msi>72Encrypt the most newly obtained new Sms=< D, 5,9,2, F, 8, E, 1, D, 1,6, F,
E,D,F,D,C,7,F,B,5,6,9,3,C,C,0,D,1,8,0,9,B,D,9,0,F,1,9,8,0,2,A,B,1,9,9,A,F,7,
0,A,E,C,C,B,9,D,E,9,1,8,1,6,E,6,3,5,D,3,E,E>;
12nd step: if during k≤t, updates k=k+1, repeatedly performs the 2nd step~the 11st step;
13rd step: by A=(ai,j)m×nOutput is as encrypted image as shown in Figure 4.
Decrypting process is as follows:
1st step: input key μ0=3.989, encryption number of times t=10000, juxtaposition k=0, input encryption judgment threshold δ=
1300, SMD5=<D, 1,1, C, B, B, B, C, 3,7, A, A, 8, B, F, 5, Isosorbide-5-Nitrae, 5,1,3, C, E, F, F, 3,4, E, 4,2,0,7>,
SSHA-1=< 2, A, E, 0, D, B, A, B, 1,1,6,3,2, E, 8,9, B, 4, A, D, D, 0,7,1, F, 9,3,7, C, 1,5,5,7,0, E,
C, 2, A, 1, E >, by SMD5And SSHA-1Series connection is 16 system Number Sequence Sms=SMD5||SSHA-1=< smi>72And initialization encryption thing
Part subscript index sequence Sid=<0,1 ..., 5>and intermediate key argument sequence SX >,SY >,SZ >,SX >,S′P >,SId >For empty sequence
Row, encrypted image C=(ci,j)m×nAs shown in Figure 4;
2nd step: by SmsSubstitution formula (1) is mapped as 16 system sequences Sh=< h0,h1,…,h39>, by SmsSubstitute into formula respectively
(2) and formula (3) map start, gap;Such as: by Sms=< D, 1,1, C, B, B, B, C, 3,7, A, A, 8, B, F, 5,1,4,5,1,
3, C, E, F, F, 3,4, E, 4,2,0,7,2, A, E, 0, D, B, A, B, 1,1,6,3,2, E, 8,9, B, 4, A, D, D, 0,7,1, F, 9,
3,7, C, 1,5,5,7,0, E, C, 2, A, 1, E > substitute into formula (1) mapping Sh=< A, E, 7,2,4,0, A, B, 6,9,0, C, 2, B, 5,
4, B, 5, C, F, D, D, C, 1,7,3,1,1, B, 4,1,0,2,1, B, E, 3,7, D, 9 >, wherein by SmsSubstitute into formula (2) and formula respectively
(3) start=43, gap=67 are mapped;
3rd step: by ShIt is divided into by formula (4)Four parts, then willI=0,1 ..., 3 substitute into
Formula (5) is converted to 10 system decimal G in the range of (0,1)i, i=0,1 ..., 3;Such as: by ShIt is divided into Substitution formula (5) is mapped as G0=0.6748477158235295, G1=
0.07244421382352942,G2=0.8483371302352942, G3=0.06013199052941176;
4th step: by G3As initial parameter α, G0,G1,G2Respectively as the input parameter of formula (6), substitute into formula (6) repeatedly
In generation, produces 3 sequential value G ' 1 time0,G′1,G′2, by G '0,G′1,G′2As key parameter Xinit,Yinit,xinit, by xinitAs
Sequence SX >In kth elementSuch as: α=0.06013199052941176 is as initial parameter, by G0,G1,G2Respectively
Substitution formula (6) is mapped as G '0=0.34595526276037764, G '1=0.9869000506772724, G '2=
0.16136613677290165 i.e. Xinit=0.34595526276037764, Yinit=0.9869000506772724, xinit=
0.16136613677290165, by xinitAs sequence SX >In kth element
5th step: by μ0As systematic parameter, xinit5 random numbers works that formula (7) iteration produces for 5 times are brought into as initial value
For sequence Sp=< p0,p1,p2,p3,p4>, by SpMiddle element obtains interval division sequence S ' by descending orderp=< p '0,p
′1,p′2,p′3,p′4>, by p '0,p′1,p′2,p′3,p′4As sequence S 'P >In 5k, 5k+1 ..., 5k+4 elementSuch as: μ0=3.989, xinit=0.16136613677290165 substitutes into formula (7) iteration maps for 5 times
Sp=< p0,p1,p2,p3,p4>,p0=0.5398198285301286, p1=0.9909249668295106, p2=
0.035871788327397826,p3=0.13795957748394325, p4=0.4743987358004721, then can get
S′p=< p '0,p′1,p′2,p′3,p′4>, i.e. p '0=0.035871788327397826, p '1=0.13795957748394325,
p′2=0.4743987358004721, p '3=0.5398198285301286, p '4=0.9909249668295106, by p '0,
p′1,p′2,p′3,p′4As sequence S 'P >In 5k, 5k+1 ..., 5k+4 element
6th step: by Yinit,μ0Substitution formula (8) is mapped as μ1∈ [3.57,4], by XinitAnd μ1Respectively as in formula (7)
Initial value and systematic parameter by formula (7) iteration 1 time as intermediate key parameter Zinit;Such as: μ0=3.989, Yinit=
0.9869000506772724 substitutes into formula (8) maps μ1=3.9916826088662414, by Xinit=
0.34595526276037764,μ1=3.9916826088662414 substitute into formula (7) can obtain: Zinit=
0.9031988978023509;
7th step: by Xinit,Yinit,ZinitAs the initial value of formula (9), produce 3 real-valued random numbers iterative (9) 1 times
Successively as parameter X0,Y0,Z0, formula (9) systematic parameter takes a=b=0.2, c=5.7, and by X0,Y0,Z0Successively respectively as
SX >,SY >,SZ >In kth elementSuch as: Xinit=0.34595526276037764, Yinit=
0.9869000506772724, Zinit=0.9031988978023509 substitutes into formula (9) iteration maps X 1 time0=
0.1755933912994469,Y0=1.0326377639685018, Z0=0.5476634933830886, by X0,Y0,Z0Successively
Respectively as SX >,SY >,SZ >In kth element
8th step: utilize X0,Y0,Z0Being mapped as start, gap by formula (18) and formula (19), right back-pushed-type (20) is to event rope
Draw sequence SidIt is updated, by SidIn all elements successively as SId >In 6k, 6k+1 ..., 6k+5 elementSuch as: by Sid=0,1,2 ..., 5} substitutes into formula (20) and maps new Sid=3,1,0,2,5,
4}, wherein by X0=0.1755933912994469, Y0=1.0326377639685018, Z0=0.5476634933830886
Substituting into formula (18) respectively, (19) mapping parameters start=0, gap=3, by SidIn all elements successively as SId >In
6k, 6k+1 ..., 6k+5 element
9th step: utilize X0,Y0,Z0Substitution formula (22) maps initial parameter μ0, then use X0,Y0,Z0X is generated by formula (21)init,
Then by xinit,μ0Substitution formula (7) iteration produces random sequence SR=< ri>72, by formula (23) to Sms=< msi>72In element enter
Row updates operation;Such as: by X0,Y0,Z0Substitution formula (22) undated parameter μ0=3.7798190064841766, by X0,Y0,Z0Generation
Enter formula (21) and map xinit=0.45622249450285557, by xinit,μ0Substitution formula (7) maps random sequence SR=< ri>72,
And by SR=< ri>72To Sms=< msi>72Encrypt the most newly obtained new Sms=< D, 5,9,2, F, 8, E, 1, D, 1,6, F, E, D, F,
D,C,7,F,B,5,6,9,3,C,C,0,D,1,8,0,9,B,D,9,0,F,1,9,8,0,2,A,B,1,9,9,A,F,7,0,A,E,
C,C,B,9,D,E,9,1,8,1,6,E,6,3,5,D,3,E,E>;
10th step: if k ≠ t updates k=k+1, repeatedly perform the 2nd step~the 9th step, available sequence
11st step: by SX >,SY >-1 element of kthSubstitution formula (24) is mapped as image C=to be decrypted
(ci,j)m×nOn random point (r0,v0), by SZ >-1 element of kth in sequenceWithSubstitute into formula (25) together
It is mapped as transformation parameter v;Such as: Substitution formula
(24) image C=(c to be decrypted is mappedi,j)m×nOn random point r0=238, v0=52, willWithSubstitution formula (25) maps v=1;
12nd step: by (r0,v0) as starting point, by formula (26) from image C=(c to be decryptedi,j)m×nFilter out 4 × 4 matrixes
Fritter Min=(mu,w)4×4, calculate M by formula (12)inMapping value Map (Min), if Map is (Min) >=δ, then update k when k ≠ 0
=k-1, performs the 11st step, performs the 14th step as k=0, if above-mentioned condition Map (Min) >=δ is not satisfied, and takes SX >Kth-1
ElementAs probabilistic determination value P, utilize S 'P >5k-5,5k-4 ..., 5k-1 elementStructure
Make probability intervalTake SId >6k-6,6k-5 ...,
6k-1 elementAs subscript index sequence, with v as transformation parameter, according to P fallen into general
Rate is interval, by formula (27) by matrix fritter Min=(mu,w)4×4Deciphering is matrix fritter Mout;Such as: by (r0,v0) as starting point,
By formula (26) from image C=(c to be decryptedi,j)m×nFilter out the matrix fritter of 4 × 4 Will
MinSubstitution formula (12) judges, due to Map (Min)=239.75 i.e. Map (Min) < δ, then by SX >-1 element of kthMake
For probabilistic determination value P=0.31040996788505415, utilize S 'P >5k-5,5k-4 ..., 5k-1 element Structure probability intervalTake SId >6k-6,6k-5 ..., 6k-1 unit
Element Sequence is indexed as subscript
Row, with v=1 as transformation parameter, the probability interval fallen into according to P, by matrix fritter Min=(mu,w)4×4Substitution formula (27) solves
Close for matrix fritter
13rd step: the method same by formula (12) calculates MoutCorresponding mapping value Map (Mout), if Map is (Mout) < δ, then
By MoutIn element successively as encrypted image C=(ci,j)m×nThe pixel of correspondence position, otherwise by MinMiddle pixel is as encryption
Image C=(ci,j)m×nThe pixel of correspondence position, updates k=k-1, repeatedly performs the 11st step~the 13rd step when k ≠ 0;Such as:
By MoutSubstitution formula (12), due to Map (Mout)=237.484375 i.e. Map (Mout) < δ, then by MoutMiddle pixel is successively as adding
Close image C=(ci,j)m×nThe pixel of correspondence position;
14th step: by C=(ci,j)m×nOutput is as decrypted image as shown in Figure 5.
Fig. 6 is that encryption number of times is respectively t=15000, δ=1600 encrypted image, and Fig. 7 is corresponding decrypted image, can from Fig. 6
Although finding out that the inventive method encrypted image can be with identification relative to artwork, but visual quality entirety is poor, solves as can be seen from Figure 7
Close image is clear relative to artwork visual quality, possesses certain using value;
Fig. 8~10 respectively revises the decrypted image of one of them correspondence;The inventive method is can be seen that from decrypted image, right
The key of user's offer and picture characteristics extreme sensitivity to be encrypted, if providing the parameter of mistake, will cause decrypted image vision matter
Amount declines, and decrypted image visual quality is the fuzzyyest;
Figure 11,13,15,17 is different encryption number of times t respectively, encrypted image embodiment corresponding during δ, Figure 12,14,
16,18 is corresponding decrypted image embodiment, can be seen that from decrypted image visual quality, by controlling t, δ, available
The decrypted image of different visual qualities, thus possess the most wide using value.
Claims (10)
1. the image selective cryptographic method that a dynamic probability and null tone territory are combined, it is characterised in that comprise the following steps:
1st step: remember that image to be encrypted is A=(ai,j)m×nAnd ai,j∈ 0,1 ..., and 255}, encryption number of times t, t > 0 are set, initially
Iteration control parameter k=1, selected initial parameter μ0∈ [3.57,4] and setting encryption judgment threshold δ, δ > 0, the MD5 of note A
Value and SHA-1 value are respectively 16 system Number Sequence SMD5=< m0,m1,…,m31> and SSHA-1=< s0,s1,…,s39>, by SMD5With
SSHA-1Series connection is 16 system Number Sequence Sms=SMD5||SSHA-1=< smi>72And initialization encryption event subscript index sequence SidFor
Sid=<0,1 ..., 5>, wherein " | | " it is bit bit string serial operation symbol;
2nd step: by SmsIt is mapped as 16 system sequences Sh=< h0,h1,…,h39>;
3rd step: by ShIt is divided intoFour parts, then willBe converted to 10 in the range of (0,1)
System decimal Gi, i=0,1 ..., 3;
4th step: by G3As initial parameter α, G0,G1,G2It is mapped as 10 system decimal G ' in the range of (0,1)0,G′1,G′2,
By G '0,G′1,G′2As key parameter Xinit,Yinit,xinit, i.e. Xinit=G '0,Yinit=G '1,xinit=G '2;
5th step: by initial parameter μ0As systematic parameter, key parameter xinitIn the range of producing 5 (0,1) as initial value
Random number is as sequence Sp=< p0,p1,p2,p3,p4>, by SpInterval division sequence S ' in the range of structure (0,1)p=< p '0,
p′1,p′2,p′3,p′4>, thus obtain probability interval [0, p '0),[p′0,p′1),[p′1,p′2),[p′2,p′3),[p′3,p′4),
[p′4,1];
6th step: by key parameter Yinit,μ0It is mapped as μ1∈ [3.57,4], by XinitAnd μ1Join respectively as initial value and system
Number iteration produces intermediate key parameter Z in the range of (0,1)init;
7th step: by Xinit,Yinit,ZinitAs initial value, iteration produces 3 real-valued random numbers for 1 time successively as parameter X0,Y0,
Z0;
8th step: by X0,Y0It is mapped as encrypted image A=(ai,j)m×nOn random point (r0,v0);
9th step: by (r0,v0) as starting point, from image A=(a to be encryptedi,j)m×nFilter out Min=(mu,w)4×4, calculate Min's
Mapping value Map (Min), if Map is (Min) >=δ then performs the 10th step, otherwise by xinitAs probabilistic determination value P, by X0,Y0,Z0's
Mapping value, as transformation parameter v, the probability interval fallen into according to P, performs corresponding spatial domain and frequency domain displacement cryptographic operation, so
Afterwards to the matrix fritter M after encryptionoutCalculate mapping value Map (Mout);If Map is (Mout) < δ, then by MoutIn pixel make successively
For image A=(a to be encryptedi,j)m×nThe pixel of correspondence position, otherwise by MinMiddle pixel is directly as image A=to be encrypted
(ai,j)m×nCorrespondence position pixel;
10th step: utilize X0,Y0,Z0To case index sequence SidCarry out resetting and update;
11st step: utilize X0,Y0,Z0To initial parameter μ0And Sms=< msi>72In element be updated operation;
12nd step: if during k≤t, updates k=k+1, repeatedly performs the 2nd step~the 11st step;
13rd step: by A=(ai,j)m×nOutput is as encrypted image.
The image selective cryptographic method that a kind of dynamic probability the most as claimed in claim 1 and null tone territory are combined, its feature exists
In: the 2nd step is by SmsIt is mapped as Sh=< h0,h1,…,h39> concrete grammar be formula (1):
Sh=Draw (Sms,start,gap,|Sh|) (1)
In formula (1), Draw () is that sequential element extracts function, and wherein start is extraction starting point, and gap is the sample number skipped, | Sh
| for ShMiddle number of elements, i.e. from SmsCirculation extraction | Sh| individual 16 system numbers are as Sh, start, gap are respectively by formula (2) and formula (3)
Mapping obtains:
3rd step is by ShIt is divided intoTetrameric concrete grammar is formula (4):
3rd step willBe converted to 10 system decimal G in the range of (0,1)i, i=0,1 ..., the concrete grammar of 3 is
Formula (5), in formula (5), [] is round function:
The image selective cryptographic method that a kind of dynamic probability the most as claimed in claim 1 and null tone territory are combined, its feature exists
In: the 4th step is by G3As initial parameter α, G0,G1,G2It is mapped as 10 system decimal G ' in the range of (0,1)0,G′1,G′2's
Concrete grammar is by G0,G1,G2Respectively as the input parameter of formula (6), substitute into formula (6) iteration and produce 3 sequential value G ' 1 time0,
G′1,G′2;
5th step is by μ0As systematic parameter, xinitThe random number in the range of 5 (0,1) is produced as sequence S as initial valuep=
<p0,p1,p2,p3,p4> concrete grammar be by μ0As systematic parameter, xinitBring formula (7) iteration into as initial value to produce for 5 times
5 random numbers as sequence Sp=< p0,p1,p2,p3,p4>
xi+1=μ xi(1-xi) (7);
By S in 5th steppInterval division sequence S ' in the range of structure (0,1)p=< p '0,p′1,p′2,p′3,p′4> concrete grammar
For by SpMiddle element obtains interval division sequence S ' by descending orderp=< p '0,p′1,p′2,p′3,p′4>。
The image selective cryptographic method that a kind of dynamic probability the most as claimed in claim 1 and null tone territory are combined, its feature exists
In: the 6th step is by Yinit,μ0It is mapped as μ1The concrete grammar of ∈ [3.57,4] is formula (8):
6th step is by XinitAnd μ1The intermediate key parameter in the range of (0,1) is produced respectively as initial value and systematic parameter iteration
ZinitConcrete grammar be by XinitAnd μ11 conduct of formula (7) iteration is pressed respectively as the initial value in formula (7) and systematic parameter
Intermediate key parameter Zinit;
xi+1=μ xi(1-xi) (7);
7th step is by Xinit,Yinit,ZinitAs initial value, iteration produces 3 random numbers for 1 time successively as parameter X0,Y0,Z0's
Concrete grammar is by Xinit,Yinit,ZinitAs the initial value of formula (9), produce 3 random number conducts successively iterative (9) 1 times
Parameter X0,Y0,Z0, formula (9) systematic parameter takes a=b=0.2, c=5.7;
The image selective cryptographic method that a kind of dynamic probability the most as claimed in claim 1 and null tone territory are combined, its feature exists
In: the 8th step is by X0,Y0Being mapped as encrypted image is A=(ai,j)m×nOn random point (r0,v0) concrete grammar be formula (10),
In formula (10)Accord with for downward rounding operation;
9th step is by (r0,v0) as starting point, from image A=(a to be encryptedi,j)m×nFilter out the matrix fritter M of 4 × 4in=
(mu,w)4×4Concrete grammar be formula (11):
9th step calculates MinMapping value Map (Min) concrete grammar be by formula (12) calculate MinVariance:
9th step is to the matrix fritter M after encryptionoutCalculate mapping value Map (Mout) concrete grammar be the side same by formula (12)
Method calculates MoutVariance;
By X in 9th step0,Y0,Z0Mapping value be formula (13) as the concrete grammar of transformation parameter v:
9th step performs the spatial domain of correspondence and the concrete grammar of frequency domain displacement cryptographic operation is formula (14):
Mout=Encrypt (Min,v,P,f,Sid,S′p) (14)
In formula (14), f={f0,f1,…,f5It is encrypted event set, SidIt is the subscript index sequence of f, S 'pFor interval division
Sequence, corresponding 6 group encryption event, the wherein f of encrypted event set f0,f1,f2Spatial domain displacement box encrypted event, as shown in formula (15),
f3,f4,f5Transform domain displacement box encrypted event, as shown in formula (16), f0,f1,…,f5Corresponding displacement box Px0,Px1,…,
Px5As shown in formula (17);
In formula (15), McodeIt is MinNumbering matrix, remember MinIn element mu,wAt McodeIn numbered id, then Permute0()
The function that function performs is by mu,wMove to PxiMiddle element value is the coordinate position of (id+v) mod16;
In formula (16), MHIt is Hadamard transform battle array, remembers MtempIn element mtu,wAt McodeIn numbered id and id ≠ ×,
Permute1The operation that () performs is by mtu,wMove to PxiMiddle element value is the coordinate position of (id+v) mod16+1, with
Permute0The difference of () is Permute1() in conversion process, MtempIn the element of (0,0) position, i.e. id=× element
Remaining at (0,0) position does not occur position to change;
The image selective cryptographic method that a kind of dynamic probability the most as claimed in claim 1 and null tone territory are combined, its feature exists
In: the 10th step utilizes X0,Y0,Z0To case index sequence SidCarry out resetting the concrete grammar updated for by X0,Y0,Z0By formula (18)
Being mapped as start, gap with formula (19), right back-pushed-type (20) is to case index sequence SidIt is updated:
Sid=Draw (Sid,start,gap,|Sid|) (20);
11st step utilizes X0,Y0,Z0To initial parameter μ0The concrete grammar updated is formula (22):
To S in 11st stepms=< msi>72In element be updated operation method particularly includes: first use X0,Y0,Z0By formula (21)
Generate xinit, then by xinit,μ0Substitution formula (7) iteration produces random sequence SR=< ri>72, by formula (23) to Sms=< msi>72
In element be updated operation;
xinit=(X0+X0Y0+X0Y0Z0)mod1 (21)
xi+1=μ xi(1-xi) (7)
7. the image selectivity decryption method that a kind of dynamic probability corresponding with claim 1 and null tone territory are combined, its feature
It is to comprise the following steps:
1st step: inputted key μ by user0∈[3.57,4],SMD5,SSHA-1, encrypt number of times t, t > 0 and encrypted image C, initially
Iteration control parameter k=0, input encryption judgment threshold δ, δ > 0, by SMD5And SSHA-1Series connection is 16 system Number Sequence Sms=SMD5
||SSHA-1=< smi>72And initialization encryption event subscript index sequence Sid=<0,1 ..., 5>and intermediate key argument sequence
SX >,SY >,SZ >,SX >,S′P >,SId >For empty sequence;
2nd step: by SmsIt is mapped as 16 system sequences Sh=< h0,h1,…,h39>;
3rd step: by ShIt is divided intoFour parts, then willBe converted to 10 in the range of (0,1)
System decimal Gi, i=0,1 ..., 3;
4th step: by G3As initial parameter α, G0,G1,G2It is mapped as 10 system decimal G in the range of (0,1)0′,G1′,G2',
By G0′,G1′,G2' as key parameter Xinit,Yinit,xinit, i.e. Xinit=G '0,Yinit=G '1,xinit=G '2, by xinitMake
For sequence SX >In kth element
5th step: by μ0As systematic parameter, xinitThe random number in the range of 5 (0,1) is produced as sequence S as initial valuep
=< p0,p1,p2,p3,p4>, by SpInterval division sequence S ' in the range of structure (0,1)p=< p '0,p′1,p′2,p′3,p′4>, from
And obtain 6 probability intervals [0, p '0),[p′0,p′1),[p′1,p′2),[p′2,p′3),[p′3,p′4),[p′4, 1], by p '0,
p′1,p′2,p′3,p′4As sequence S 'P >In 5k, 5k+1 ..., 5k+4 element
6th step: by Yinit, μ is mapped as the μ in the range of [3.57,4]1, by XinitAnd μ1Change respectively as initial value and systematic parameter
In generation, the mapping value of 1 time was as intermediate key parameter Zinit;
7th step: by Xinit,Yinit,ZinitSubstitute into chaos system for 1 time as initial value iteration and produce 3 real-valued random numbers X0,Y0,
Z0, and by X0,Y0,Z0Successively respectively as SX >,SY >,SZ >In kth element
8th step: utilize X0,Y0,Z0To event subscript index sequence SidIt is updated, by SidIn all elements conduct successively
SId >In 6k, 6k+1 ..., 6k+5 element
9th step: utilize X0,Y0,Z0To initial parameter μ0And Sms=< msi>72In element be updated operation;
10th step: if k ≠ t updates k=k+1, repeatedly perform the 2nd step~the 9th step, available sequence
11st step: by SX >,SY >-1 element of kthIt is mapped as image C=(c to be decryptedi,j)m×nOn random point
(r0,v0), by SZ >-1 element of kth in sequenceWithIt is mapped as transformation parameter v;
12nd step: by (r0,v0) as starting point, from image C=(c to be decryptedi,j)m×nFilter out 4 × 4 matrix fritter Min=
(mu,w)4×4, calculate MinMapping value Map (Min), if Map is (Min) >=δ, then update k=k-1, perform the 11st step when k ≠ 0,
The 14th step is performed as k=0, if above-mentioned condition Map (Min) >=δ is not satisfied, and takes SX >-1 element of kthAs probability
Judgment value P, utilizes S 'P >5k-5,5k-4 ..., 5k-1 elementStructure probability intervalTake SId >6k-6,6k-5 ..., 6k-1 unit
ElementAs subscript index sequence, with v as transformation parameter, the Probability Region fallen into according to P
Between, by matrix fritter Min=(mu,w)4×4Deciphering is matrix fritter Mout;
13rd step: calculate MoutCorresponding mapping value Map (Mout), if Map is (Mout) < δ, then by MoutIn element successively as adding
Close image C=(ci,j)m×nThe pixel of correspondence position, otherwise by MinMiddle pixel is as encrypted image C=(ci,j)m×nCorrespondence position
Pixel, update k=k-1 when k ≠ 0, repeatedly perform the 11st step~the 13rd step;
14th step: by C=(ci,j)m×nOutput is as decrypted image.
The image selectivity decryption method that a kind of dynamic probability the most as claimed in claim 7 and null tone territory are combined, its feature exists
In: by S in the 2nd stepmsIt is mapped as sequence Sh=< h0,h1,…,h39> concrete grammar be formula (1):
Sh=Draw (Sms,start,gap,|Sh|) (1)
In formula (1), Draw () is that sequential element extracts function, and wherein start is extraction starting point, and gap is the sample number skipped, | Sh
| for ShMiddle number of elements, i.e. from SmsCirculation extraction | Sh| individual 16 system numbers are as Sh, start, gap are respectively by formula (2) and formula (3)
Mapping obtains:
3rd step is by ShIt is divided intoTetrameric concrete grammar is formula (4):
3rd step willBe converted to 10 system decimal G in the range of (0,1)i, i=0,1 ..., the concrete grammar of 3 is
Formula (5):
4th step is by G3As initial parameter α, G0,G1,G2It is mapped as 10 system decimal G ' in the range of (0,1)0,G′1,G′2's
Concrete grammar is by G0,G1,G2Respectively as the input parameter of formula (6), substitute into formula (6) iteration and produce 3 sequential value G ' 1 time0,
G′1,G′2;
By μ in 5th step0As systematic parameter, xinitThe random number in the range of 5 (0,1) is produced as sequence S as initial valuep
=< p0,p1,p2,p3,p4> concrete grammar be by μ0As systematic parameter, xinitBring formula (7) iteration into as initial value to produce for 5 times
Raw sequence Sp=< p0,p1,p2,p3,p4>:
xi+1=μ xi(1-xi) (7);
By S in 5th steppInterval division sequence S ' in the range of structure (0,1)p=< p '0,p′1,p′2,p′3,p′4> concrete grammar
For by SpMiddle element obtains interval division sequence S ' by descending orderp=< p '0,p′1,p′2,p′3,p′4>。
9., as claimed in claim 7 based on the image selectivity decryption method that dynamic probability and null tone territory are compound, its feature exists
In: the 6th step is by Yinit,μ0It is mapped as the μ in the range of [3.57,4]1Concrete grammar be formula (8):
6th step is by XinitAnd μ1Respectively as the mapping value of initial value and systematic parameter iteration 1 time as intermediate key parameter Zinit
Concrete grammar be use formula (7):
xi+1=μ xi(1-xi) (7);
7th step is by Xinit,Yinit,ZinitSubstitute into chaos system for 1 time as initial value iteration and produce 3 real-valued random numbers X0,Y0,Z0
Concrete grammar be by Xinit,Yinit,ZinitAs the initial value of formula (9), formula (9) systematic parameter takes a=b=0.2, c=5.7,
Produce 3 real-valued random value X iterative (9) 1 times0,Y0,Z0:
8th step utilizes X0,Y0,Z0To event subscript index sequence SidThe concrete grammar being updated is for by X0,Y0,Z0By formula (18)
Being mapped as start, gap with formula (19), right back-pushed-type (20) is to SidIt is updated:
Sid=Draw (Sid,start,gap,|Sid|) (20);
9th step utilizes X0,Y0,Z0To initial parameter μ0The concrete grammar being updated is formula (22):
9th step is to Sms=< msi>72In element be updated operation method particularly includes: first use X0,Y0,Z0Generate by formula (21)
xinit, then by xinit,μ0Substitution formula (7) iteration produces random sequence SR=< ri>72, by formula (23) to Sms=< msi>72In
Element is updated operation;
xinit=(X0+X0Y0+X0Y0Z0)mod1 (21)
xi+1=μ xi(1-xi) (7)
The image selectivity decryption method that a kind of dynamic probability the most as claimed in claim 7 and null tone territory are combined, its feature exists
In: by S in the 11st stepX >,SY >-1 element of kthIt is mapped as image C=(c to be decryptedi,j)m×nUpper random point (r0,
v0) concrete grammar be formula (24):
11st step is by SZ >-1 element of kth in sequenceWithThe concrete grammar being mapped as transformation parameter v is formula
(25):
12nd step is by (r0,v0) as starting point, from image C=(c to be decryptedi,j)m×nFilter out the matrix fritter M of 4 × 4in=
(mu,w)4×4Concrete grammar be formula (26):
12nd step calculates MinMapping value Map (Min) concrete grammar for calculate M by formula (12)inCorresponding variance:
By matrix M in 12nd stepin=(mu,w)4×4Deciphering is matrix MoutConcrete grammar be formula (27):
Mout=Decryption (Min,v,P,f′,SId >,S′P >) (27)
In formula (27), f '={ f '0,f′1,…,f′5It is program event set, f ' corresponding 6 groups of program event, wherein f '0,f′1,
f′2Spatial domain displacement box program event, as shown in formula (28), f '3,f′4,f′5Transform domain displacement box program event, such as formula (29) institute
Show, f '0,f′1,…,f′5Corresponding displacement box Px0,Px1,…,Px5As shown in formula (17):
In formula (28), McodeIt is numbering matrix, remembers MinIn element mu,wAt PxiIn numbered id, thenLetter
The function that number performs is by mu,wMove to McodeMiddle element number is the coordinate position of (id-v+16) mod16;
In formula (29), MHIt is Hadamard transform battle array, Permute1 -1The operation that () performs is by PxiIn numbered id ≠ ×
Element mtu,wMove to McodeIn the coordinate position of numbered (id-v+16) mod16+1, id=× element remain at
(0,0) position does not occur position to change;
13rd step calculates MoutCorresponding mapping value Map (Mout) concrete grammar be to calculate M by the same method of formula (12)outInstitute
Corresponding variance.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610102071.1A CN105761198B (en) | 2016-02-24 | 2016-02-24 | The compound image selection encryption and decryption approaches of a kind of dynamic probability and null tone domain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610102071.1A CN105761198B (en) | 2016-02-24 | 2016-02-24 | The compound image selection encryption and decryption approaches of a kind of dynamic probability and null tone domain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105761198A true CN105761198A (en) | 2016-07-13 |
CN105761198B CN105761198B (en) | 2019-03-05 |
Family
ID=56331121
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610102071.1A Active CN105761198B (en) | 2016-02-24 | 2016-02-24 | The compound image selection encryption and decryption approaches of a kind of dynamic probability and null tone domain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105761198B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106485742A (en) * | 2016-07-26 | 2017-03-08 | 上海海洋大学 | A kind of remote sensing images based on Arnold chaotic maps encrypt search method |
CN106600517A (en) * | 2016-11-11 | 2017-04-26 | 陕西师范大学 | Multi-carrier secret image separate storage and reconstruction method based on EMD-3 |
CN110197077A (en) * | 2019-05-31 | 2019-09-03 | 长春理工大学 | Area-of-interest medical image chaos encrypting method based on comentropy more new key |
CN111865908A (en) * | 2020-06-08 | 2020-10-30 | 杭州电子科技大学 | Resource-constrained system secure communication method based on random encryption strategy |
CN113344853A (en) * | 2021-05-06 | 2021-09-03 | 东南大学 | Robustness detection method based on random displacement algorithm brain image omics |
CN114153411A (en) * | 2021-12-02 | 2022-03-08 | 上海交通大学 | Image optimization transmission system for remote terminal management and control |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20040073045A (en) * | 2003-02-13 | 2004-08-19 | 주식회사 디지트리얼테크놀로지 | Data Hiding and Extraction System Using JND and CSF |
CN1885342A (en) * | 2006-06-21 | 2006-12-27 | 北京交通大学 | Print domain trademark anti-counterfeit method based on digital watermark technology |
CN103402040A (en) * | 2013-08-06 | 2013-11-20 | 浙江农林大学 | Spatial domain and Fourier frequency domain double encryption-based dual image encryption method |
CN103929563A (en) * | 2014-04-11 | 2014-07-16 | 陕西师范大学 | Image encryption and decryption method based on improved Joseph traversal and generalized Henon mapping |
CN104851070A (en) * | 2015-05-08 | 2015-08-19 | 陕西师范大学 | Foreground and background separation-based image encryption and decryption methods |
-
2016
- 2016-02-24 CN CN201610102071.1A patent/CN105761198B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20040073045A (en) * | 2003-02-13 | 2004-08-19 | 주식회사 디지트리얼테크놀로지 | Data Hiding and Extraction System Using JND and CSF |
CN1885342A (en) * | 2006-06-21 | 2006-12-27 | 北京交通大学 | Print domain trademark anti-counterfeit method based on digital watermark technology |
CN103402040A (en) * | 2013-08-06 | 2013-11-20 | 浙江农林大学 | Spatial domain and Fourier frequency domain double encryption-based dual image encryption method |
CN103929563A (en) * | 2014-04-11 | 2014-07-16 | 陕西师范大学 | Image encryption and decryption method based on improved Joseph traversal and generalized Henon mapping |
CN104851070A (en) * | 2015-05-08 | 2015-08-19 | 陕西师范大学 | Foreground and background separation-based image encryption and decryption methods |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106485742A (en) * | 2016-07-26 | 2017-03-08 | 上海海洋大学 | A kind of remote sensing images based on Arnold chaotic maps encrypt search method |
CN106485742B (en) * | 2016-07-26 | 2019-08-23 | 上海海洋大学 | A kind of remote sensing images encryption search method based on Arnold chaotic maps |
CN106600517A (en) * | 2016-11-11 | 2017-04-26 | 陕西师范大学 | Multi-carrier secret image separate storage and reconstruction method based on EMD-3 |
CN110197077A (en) * | 2019-05-31 | 2019-09-03 | 长春理工大学 | Area-of-interest medical image chaos encrypting method based on comentropy more new key |
CN110197077B (en) * | 2019-05-31 | 2020-12-11 | 长春理工大学 | Region-of-interest medical image chaotic encryption method based on information entropy updating key |
CN111865908A (en) * | 2020-06-08 | 2020-10-30 | 杭州电子科技大学 | Resource-constrained system secure communication method based on random encryption strategy |
CN111865908B (en) * | 2020-06-08 | 2022-05-17 | 杭州电子科技大学 | Resource-constrained system secure communication method based on random encryption strategy |
CN113344853A (en) * | 2021-05-06 | 2021-09-03 | 东南大学 | Robustness detection method based on random displacement algorithm brain image omics |
CN113344853B (en) * | 2021-05-06 | 2024-03-12 | 东南大学 | Robustness detection method based on random displacement algorithm brain image histology |
CN114153411A (en) * | 2021-12-02 | 2022-03-08 | 上海交通大学 | Image optimization transmission system for remote terminal management and control |
CN114153411B (en) * | 2021-12-02 | 2024-01-12 | 上海交通大学 | Remote terminal control-oriented image optimization transmission system |
Also Published As
Publication number | Publication date |
---|---|
CN105761198B (en) | 2019-03-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105761198A (en) | Image selective encryption and decryption method based on dynamic probability and space-frequency domain compositing | |
CN112258520B (en) | Image encryption and decryption communication method based on two-dimensional hysteresis complex Logistic mapping | |
CN111105339B (en) | Image encryption method based on multidimensional chaotic system and Joseph scrambling | |
CN107492064B (en) | Image encryption method based on memristor chaos system, elementary cellular automata and compressed sensing | |
CN101739695B (en) | Three-dimensional Arnold mapping-based image grouping encryption method | |
CN106327414B (en) | A kind of double New chaotic image encryption methods based on plaintext self-characteristic | |
CN103167213B (en) | Digital image encryption method based on Cat mapping and hyper-chaos Lorenz system | |
CN105847629A (en) | Reversible information hiding method for encrypted image | |
Jose et al. | A separable reversible data hiding in encrypted image with improved performance | |
CN105577354A (en) | Image encryption and decryption method based on probability interval division and dynamic probability events | |
Belazi et al. | Algebraic analysis of a RGB image encryption algorithm based on DNA encoding and chaotic map | |
CN105681622A (en) | Color image encryption method based on cellular neural network hyperchaos and DNA sequence | |
CN105917381B (en) | Cryptography crack method and device based on double random phase image encoding system | |
CN114389788B (en) | Image encryption algorithm with mixed chaos and block scrambling | |
CN110299988B (en) | Method and device for detecting anti-attack capability of lightweight block cipher algorithm | |
Hassan | Proposed hyperchaotic system for image encryption | |
Wang et al. | An image scrambling encryption using chaos-controlled Poker shuffle operation | |
CN106780278A (en) | A kind of combination zero watermarking and the self- recoverage image encryption and decryption method of block sort fusion | |
CN105553639A (en) | Multi-image encryption and decryption method based on compression sensing | |
CN108075878A (en) | A kind of Chaotic Secure Speech Communication method based on transmitting terminal | |
CN109657484B (en) | Multi-channel image coding and decoding method based on gamma function and ciphertext splicing | |
CN115190216A (en) | Encryption image reversible data hiding and decrypting method based on prediction error map | |
Loidreau | Analysis of a public-key encryption scheme based on distorted Gabidulin codes | |
CN115170377A (en) | Progressive image sharing method based on super-resolution and encrypted domain information hiding | |
Jiang et al. | Compressive-sensing-based double-image encryption algorithm combining double random phase encoding with Josephus traversing operation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |