CN105761198B - The compound image selection encryption and decryption approaches of a kind of dynamic probability and null tone domain - Google Patents

The compound image selection encryption and decryption approaches of a kind of dynamic probability and null tone domain Download PDF

Info

Publication number
CN105761198B
CN105761198B CN201610102071.1A CN201610102071A CN105761198B CN 105761198 B CN105761198 B CN 105761198B CN 201610102071 A CN201610102071 A CN 201610102071A CN 105761198 B CN105761198 B CN 105761198B
Authority
CN
China
Prior art keywords
formula
init
parameter
sequence
specific method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610102071.1A
Other languages
Chinese (zh)
Other versions
CN105761198A (en
Inventor
邵利平
唐子龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shaanxi Normal University
Original Assignee
Shaanxi Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shaanxi Normal University filed Critical Shaanxi Normal University
Priority to CN201610102071.1A priority Critical patent/CN105761198B/en
Publication of CN105761198A publication Critical patent/CN105761198A/en
Application granted granted Critical
Publication of CN105761198B publication Critical patent/CN105761198B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The present invention provides a kind of dynamic probability and null tone domain compound image selection encryption and decryption approaches, by the compound crash-protective characteristics to improve list Hash feature of image MD5 value to be encrypted and SHA-1 value, divided by generating intermediate key parameter with user key close coupling for probability interval, probability generates, block of pixels to be encrypted is screened and determines probability encryption event and transformation parameter.Designed encrypted event includes airspace and frequency domain replacement operator to improve encryption efficiency and frequency coefficient is avoided to overflow the influence to visual quality of images is restored, mentioned method treats the encrypted feature of encrypted image and user key is all updated, so that the key parameters under different encryption numbers are very different simultaneously again with characteristics of image to be encrypted and user key tight association, while it can pass through that preset encryption threshold value carries out visual quality of images and frequency domain is overflowed to screen and be controlled again.In decryption, intermediate key collection need to be restored first, then reverse decryption oprerations are executed to the block of pixels filtered out.

Description

The compound image selection encryption and decryption approaches of a kind of dynamic probability and null tone domain
Technical field
The invention belongs to information securities and digital image signal process crossing research field, are related to a kind of image encryption reconciliation Decryption method, the in particular to compound image selection encryption and decryption approaches of a kind of dynamic probability and null tone domain.
Background technique
Traditional images encryption generally directed to be entire image, it is changed beyond recognition with secret for being converted to entire image Figure, not only brings high calculating cost, also masks all features of the image to be encrypted almost in addition to size.Very much It in practical application, is often not required to encrypt entire image, and only needs bit plane, region and the part picture selected to image Element is encrypted, and encryption while need to provide the Partial Feature of original image come to potential user more to experience, To exchange bigger commercial interest for, and the characteristics of image that these encrypted images are retained, can be further used for image classification, Retrieval and identification etc. have more use value to encrypt relative to traditional images.This bit that only image is selected The method that plane, region and partial pixel encrypt, referred to as selective encryption.
It encrypts for selective image, mainly has than more typical selective image encryption method at present:
1. the partial bit plane or bit to selection carry out selective encryption.For example, Rehman A U, 2015. (Rehman A U,Liao X,Kulsoom A,et al.Selective encryption for gray images based on chaos and DNA complementary rules[J].Multimedia Tools and Applications, 2015,74 (13): 4655-4677) it treats the high-low-position bit plane of encrypted image and is encrypted by different DNA sequence dnas. Kulsoom A,2016.(Kulsoom A,Xiao D,Aqeel-ur-Rehman,et al.An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules[J].Multimedia Tools and Applications,2016,75 (1): 1-23. it is further introduced into the MD5 value of image) to improve Rehman A U, the anti-chosen -plain attact of 2015 strategies Ability.Moon D,2006.(Moon D,Chung Y,Pan S B,et al.An efficient selective encryption of fingerprint images for embedded processors[J].ETRI journal, 2006,28 (4): 444-452.) using the LSB of pixel as random keystream and high order bit position carry out exclusive or encryption cover to Encrypted image feature, and improve by secrecy LSB the safety of the strategy.Vanogenbroeck M,2002. (Vanogenbroeck M,Benedett R.Techniques for a selective encryption of uncompressed and compressed images[C]//in Proceedings of Advanced Concepts For Intelligent Vision Systems (ACIVS) 2002.2002:90-97.) it is random using 2 values big with close figure etc. The selected bit plane of key pair carries out exclusive or by turn and encrypts.Zhong Ming, 2008. (Zhong Ming, Liao Xiaofeng, Zhou Qing one kind be based on four fork The spatial domain picture of tree selects Encryption Algorithm [J] computer engineering, 2008,34 (18): 174-178.) bit of selecting image Plane is divided into 8 × 8 fritters, and the position of node is decomposed by the positional relationship and exchange 8 × 8 fritters 4 fork tree same layer that change fritter Sequence is set to encrypt to selected bit plane.Xiang T,2007.(Xiang T,Wong K,Liao X.Selective image encryption using a spatiotemporal chaotic system[J].Chaos: An Interdisciplinary Journal of Nonlinear Science, 2007,17 (2): 415-427.) use base Selective encryption is carried out to the bit plane chosen in 1 dimension coupled map lattices of skew tent map, and by adjusting to be encrypted Significant bit plane quantity compromise in safety and encryption performance.Hoang T,2014.(Hoang T,Tran, D.Cryptanalysis and security improvement for selective image encryption[J] .European Physical Journal Special Topics, 2014,223 (8): 1635-1646.) to Xiang T, 2007 safety is analyzed, and improves the strategy by changing the significant number of bits of each pixel participation encryption Safety.Rehman A U, 2015, Kulsoom A, 2016, Moon D, 2006, Vanogenbroeck M, 2002, Zhong Ming, 2008, Xiang T, 2007 and Hoang T, 2014 are all based on the selective image encryption of bit plane or bit.It is different Be Rehman A U, 2015 and Kulsoom A, 2016 pairs of high-low-position bit planes use different encryption policies;Moon D, 2006 be using low-order bit plane as the key encrypted to high order bit plane exclusive or;Vanogenbroeck M, 2002, Zhong Ming, 2008 and Xiang T, 2007 are encrypted to the bit plane chosen;Hoang T, 2014 pairs of different pixels into The bit bit encryption of row different number.Selective encryption strategy based on bit plane and bit can be by adjusting the ratio of encryption The quantity of special plane and encrypting bit position tends to tradition if encryption amount is excessive to adjust the visual quality of image to be encrypted Image encryption loses the identification feature of image if only encrypting to significant position or significant plane, if only to not significant bit Plane encryption, then can not be effectively reduced the visual quality of image.If being easy to brokenly in transmission process using LSB as key It is bad, cause encrypted image that can not restore.For gray scale or color image, only limited alternative bit plane passes through Different bit planes is selected to regulate and control the visual quality of image encryption cost and encrypted image, the regulation that can be played It acts on extremely limited.
2. screening to image pixel and block of pixels, selective encryption is carried out to the pixel and block of pixels filtered out.Example Such as, Zhao Liang, 2010. (Zhao Liang, Liao Xiaofeng, to the such as great waves based on Z matrix map and select encryption color image degeneration algorithm grind Study carefully Acta Physica Sinica [J], 2010,59 [3]: 1507-1523.) it gives based on pixel random screening template and Pixel Information entropy Image degeneration encryption method.Lin Yangfei, a kind of 2015. (encryption method of medical image data selectivity of Lin Yangfei, Ye Shaozhen Application of electronic technology [J], 2015,41 (3): 107-110.) using image block pixel and to carry out the block of pixels of encryption Screening, encrypts the block of pixels filtered out by SCAN language and image hash value.Wen W,2015.(Wen W,Zhang Y,Fang Z,et al.Infrared target-based selective encryption bychaotic maps[J] .Optics Communications, 2015,341:131-139.) utilize geometric active contour and partial differential equation to infrared figure The target area of picture is screened, and is then encrypted to the block of pixels filtered out.Khashan O A,2014.(Khashan O A,Zin A M,Sundararajan E A.Performance study of selective encryption in comparison to full encryption for still visual images[J].Journal of Zhejiang University SCIENCE C, 2014,15 (6): 435-444.) pixel and root are calculated to the not overlap partition that image divides The block of pixels of blowfish encryption is filtered out according to the relationship between pixel and given threshold.Zhang T,2013.(Zhang T, El-Latif A,Han Q,et al.Selective Encryption for Cartoon Images[C]// Intelligent Human-Machine Systems and Cybernetics(IHMSC),2013 5th International Conference on.IEEE, 2013,2:198-201.) utilize the screening card release of scalable Shape context Important information block to be encrypted in logical image.Ayoup A M,2015.(Ayoup A M,Hussein A H,Attia M A A.Efficient selective image encryption[J].Multimedia Tools and Applications, AES encryption 2015:1-16.) is carried out to the comentropy largest block filtered out.Mehta G,2014.(Mehta G,Dutta M K, Travieso-Gonzalez C M,et al.Edge based selective encryption scheme for biometric data using chaotic theory[C]//Contemporary Computing and Informatics (IC3I), 2014International Conference on.IEEE, 2014:383-386.) only to edge It detects the significant block filtered out to be encrypted, and significant block and non-significant piece is distinguished by encryption vector.Zhao Liang, 2010, Wen W, 2015, the Khashan O A M of A, 2014, Mehta G, 2014, Zhang T, 2013, Ayoup, 2015 Hes Mehta G, 2014 be all to carry out selective encryption to the pixel and block of pixels filtered out on image, need to set screening in screening Threshold value filters out corresponding pixel and block of pixels, since encryption front and back block of pixels does not usually correspond to, to keep encryption policy Restorability need to generally guarantee that encryption screening feature does not change or by recording and being embedded in encryption parameter come to encryption and not The pixel and block of pixels of encryption distinguish.For the former, it is usually only capable of the fixed encrypted feature of selection, such as comentropy or only It can guarantee that encrypted feature does not change using simple encryption policy;For the latter, it is usual to store additional encryption parameter Need higher storage cost.
3. carrying out selective encryption to the sensitizing range that user selectes.Ravishankar K C,2006. (Ravishankar K C,Venkateshmurthy M G.Region based selective image encryption [C]//Computing&Informatics,2006.ICOCI'06.International Conference on.ieee, 2006:1-6.) sensitizing range for selecting user is divided into nonoverlapping fritter, selects the fritter comprising sensitizing range Property encryption.Ou Y,2007.(Ou Y,Sur C,Rhee K H.Region-based selective encryption for medical imaging[M]//Frontiers in Algorithmics.Springer Berlin Heidelberg, 2007:62-73.) specify sensitizing range to carry out AES decryption user.Ravishankar K C, 2006 and Ou Y, 2007 are all Selective encryption is carried out to the area-of-interest that user selectes, in decryption, sensitizing range selected in advance need to be provided, thus Bring additional storage cost.
4. carrying out selective encryption to the specific frequency coefficient of image.Wang Lihua, 2010. (Wang Lihua, Liao Xiaofeng, Xiang Tao Equal image of the based on wavelet transformation is manually degenerated algorithm [J] computer engineering, 2010,36 (16): 203-207.) by original graph Wavelet field subgraph as being converted to different frequency ingredient, by adding multiplicative noise and additive noise to high frequency section come to figure As carrying out frequency domain selective encryption.Nidhi Taneja,2011.(Nidhi Taneja,Balasubramanian Raman, Indra Gupta.Selective image encryption in fractionalwavelet domain[J].AEU- International Journal of Electronics and Communications,2011,65(4):338-344.) In Fourier Transform of Fractional Order domain, the displacement of the position Arnold is carried out to the sub-band that energy component is greater than threshold value and exclusive or encrypts. Wang Lihua, 2010 and Nidhi Taneja, 2011 be all to convert image to frequency domain, and specific frequency coefficient is selected to be added Close, in frequency domain, visual quality of images can effectively be regulated and controled by choosing the different frequency coefficient of significance level, but simultaneously to frequency coefficient Encryption can also change the amplitude area of frequency coefficient, overflow and fail to decrypt correctly so as to cause airspace pixel.
In addition to the above problems, the selective image encryption safety problem existing there is also traditional images encryption, example If replaced and the loose coupling of process of obfuscation, the problems such as specific encryption policy is unrelated with image to be encrypted.
Summary of the invention
Present invention aims to overcome that prior art defect, provide a kind of dynamic probability and null tone domain compound image selection Property encryption and decryption approaches, designed encrypted event includes airspace and frequency domain replacement operator to improve encryption efficiency and avoid frequency Domain coefficient overflows the influence to visual quality of images is restored, while can be by preset encryption threshold value to visual quality of images It is controlled.
To achieve the above object, the invention adopts the following technical scheme:
The compound image selection encryption method of a kind of dynamic probability and null tone domain, comprising the following steps:
Step 1: remember that image to be encrypted is A=(ai,j)m×nAnd ai,j∈ 0,1 ..., 255 }, i=0,1 ..., m-1, j=0, 1 ..., n-1, setting encryption number t, t > 0, primary iteration control parameter k=1, select initial parameter μ0∈ [3.57,4] and Setting encryption judgment threshold δ, δ > 0, remember the MD5 value of A and SHA-1 value are respectively 16 system Number Sequence SMD5=< m0,m1,…,m31 > and SSHA-1=< s0,s1,…,s39>, by SMD5And SSHA-1Series connection is 16 system Number Sequence Sms=SMD5||SSHA-1=< smi>72,i =0,1 ..., 71 and initialization encryption event subscript index sequence SidFor Sid=<0,1 ..., 5>, wherein " | | " it is bit bit string Serial operation symbol;
Step 2: by SmsIt is mapped as 16 system sequence Sh=< h0,h1,…,h39>;
Step 3: by ShIt is divided intoThen four parts willBe converted to (0,1) 10 system decimal G in rangei, i=0,1 ..., 3;
Step 4: by G3As parameter alpha, G0,G1,G210 system decimal G being mapped as in (0,1) range0′,G1′,G2', By G0′,G1′,G2' it is used as key parameter Xinit,Yinit,xinit, i.e. Xinit=G0′,Yinit=G1′,xinit=G2′;
Step 5: by initial parameter μ0As system parameter, key parameter xinit5 (0,1) ranges are generated as initial value Interior random number is as sequence Sp=< p0,p1,p2,p3,p4>, by SpConstruct the interval division sequence S ' in (0,1) rangep=< p′0,p1′,p′2,p′3,p′4>, to obtain probability interval [0, p '0),[p0′,p1′),[p1′,p2′),[p2′,p3′),[p3′, p4′),[p4′,1];
Step 6: by key parameter Yinit0It is mapped as μ1∈ [3.57,4], by XinitAnd μ1Respectively as initial value and it is Parameter iteration of uniting generates the intermediate key parameter Z in (0,1) rangeinit
Step 7: by Xinit,Yinit,ZinitAs initial value, 3 real value random numbers of iteration 1 time generation are successively used as parameter X0,Y0,Z0
Step 8: by X0,Y0It is mapped as image A=(a to be encryptedi,j)m×nOn random point (r0,v0);
Step 9: by (r0,v0) it is used as starting point, from image A=(a to be encryptedi,j)m×nFilter out Min=(mu,w)4×4, calculate MinMapping value Map (Min), if Map (Min) >=δ then executes step 10, on the contrary by xinitAs probabilistic determination value P, by X0,Y0, Z0Mapping value as transformation parameter v, according to the P probability interval fallen into and Sid, execute corresponding airspace and frequency domain displacement add Close operation, then to encrypted matrix fritter MoutCalculate mapping value Map (Mout);If Map (Mout) < δ, then by MoutIn picture Element is successively used as image A=(a to be encryptedi,j)m×nThe pixel of corresponding position, it is on the contrary by MinMiddle pixel is directly as figure to be encrypted As A=(ai,j)m×nCorresponding position pixel;
Step 10: X is utilized0,Y0,Z0To SidCarry out rearrangement update;
Step 11: X is utilized0,Y0,Z0To initial parameter μ0And Sms=< smi>72In element be updated operation;
Step 12: if when k≤t, updating k=k+1, step 2~step 11 is executed repeatedly;
Step 13: by A=(ai,j)m×nOutput is used as encrypted image.
Further, step 2 is by SmsIt is mapped as Sh=< h0,h1,…,h39> specific method be formula (1):
Sh=Draw (Sms,start,gap,|Sh|) (1)
In formula (1), Draw () is that sequential element extracts function, and wherein start is to extract starting point, and gap is the sample skipped Number, | Sh| it is ShMiddle number of elements, i.e., from SmsCirculation extracts | Sh| a 16 system number is as Sh, start, gap are respectively by formula (2) It is obtained with formula (3) mapping:
Step 3 is by ShIt is divided intoTetrameric specific method is formula (4):
Step 3 willBe converted to 10 system decimal G in (0,1) rangei, i=0,1 ..., 3 it is specific Method is formula (5), and in formula (5), [] is round function:
Further, step 4 is by G3As parameter alpha, G0,G1,G210 system decimal G being mapped as in (0,1) range0′, G1′,G2' specific method be by G0,G1,G2Respectively as the input parameter of formula (6), 3 sequences of formula (6) iteration 1 time generation are substituted into Train value G0′,G1′,G2′;
Step 5 is by μ0As system parameter, xinitThe random number in 5 (0,1) ranges is generated as sequence as initial value Sp=< p0,p1,p2,p3,p4> specific method be by μ0As system parameter, xinitFormula (7) are brought into iteration 5 times as initial value 5 random numbers generated are as sequence Sp=< p0,p1,p2,p3,p4>
xi+1=μ xi(1-xi) (7);
By S in step 5pConstruct the interval division sequence S ' in (0,1) rangep=< p '0,p1′,p′2,p′3,p′4< tool Body method is by SpMiddle element obtains interval division sequence S ' by descending orderp=< p '0,p1′,p′2,p3′,p′4<。
Further, step 6 is by Yinit0It is mapped as μ1The specific method of ∈ [3.57,4] is formula (8):
Step 6 is by XinitAnd μ1The intermediate key ginseng in (0,1) range is generated respectively as initial value and system parameter iteration Number ZinitSpecific method be by XinitAnd μ1Respectively as in formula (7) initial value and system parameter by formula (7) iteration 1 time work For intermediate key parameter Zinit
xi+1=μ xi(1-xi) (7);
Step 7 is by Xinit,Yinit,ZinitAs initial value, 3 random numbers of iteration 1 time generation are successively used as parameter X0,Y0, Z0Specific method be by Xinit,Yinit,ZinitAs the initial value of formula (9), 3 random numbers of iterative (9) 1 generations are successively As parameter X0,Y0,Z0, formula (9) system parameter takes a=b=0.2, c=5.7;
Further, step 8 is by X0,Y0It is mapped as image A=(a to be encryptedi,j)m×nOn random point (r0,v0) specific side Method is formula (10), in formula (10)For downward rounding operation symbol;
Step 9 is by (r0,v0) it is used as starting point, from image A=(a to be encryptedi,j)m×nFilter out 4 × 4 matrix fritter Min= (mu,w)4×4Specific method be formula (11):
Step 9 calculates MinMapping value Map (Min) specific method be by formula (12) calculate MinVariance:
Step 9 is to encrypted matrix fritter MoutCalculate mapping value Map (Mout) specific method be same by formula (12) Method calculate MoutVariance;
By X in step 90,Y0,Z0Mapping value as transformation parameter v specific method be formula (13):
The specific method that corresponding airspace and frequency domain displacement cryptographic operation are executed in step 9 is formula (14):
Mout=Encrypt (Min,v,P,f,Sid,S′p) (14)
In formula (14), f={ f0,f1,…,f5It is encrypted event set, SidIt is the encrypted event subscript index sequence of f, S′pFor interval division sequence, encrypted event set f corresponds to 6 group encryption events, wherein f0,f1,f2Airspace displacement box encrypted event, As shown in formula (15), f3,f4,f5Transform domain displacement box encrypted event, as shown in formula (16), f0,f1,…,f5Corresponding displacement Box Px0,Px1,…,Px5As shown in formula (17);
In formula (15), McodeIt is MinNumber matrix, remember MinIn element mu,wIn McodeIn number be id, then Permute0The function that () function executes is by mu,wIt is moved to PxiMiddle element value is the coordinate position of (id+v) mod16;
In formula (16), MHIt is Hadamard transform battle array, remembers MtempIn element mtu,wIn McodeIn number be id and id ≠ ×, Permute1The operation that () executes is by mtu,wIt is moved to PxiMiddle element value is the coordinate position of (id+v) mod16+1, together Permute0The difference of () is Permute1() in conversion process, MtempIn (0,0) position element, i.e. id=× element It remains at (0,0) position and position change does not occur;
Further, step 10 utilizes X0,Y0,Z0To SidThe specific method for carrying out resetting update is by X0,Y0,Z0By formula (18) It is mapped as start, gap with formula (19), right back-pushed-type (20) is to case index sequence SidIt is updated:
Sid=Draw (Sid,start,gap,|Sid|) (20);
X is utilized in step 110,Y0,Z0To initial parameter μ0The specific method of update is formula (22):
To S in step 11ms=< smi<72In element be updated operation method particularly includes: first use X0,Y0,Z0By formula (21) x is generatedinit, then by xinit0Substitution formula (7) iteration generates random sequence SR=< ri>72, by formula (23) to Sms=< smi>72In element be updated operation;
xinit=(X0+X0Y0+X0Y0Z0)mod1 (21)
xi+1=μ xi(1-xi) (7)
The compound image selection decryption method of a kind of dynamic probability and null tone domain, comprising the following steps:
Step 1: key μ is inputted by user0∈[3.57,4],SMD5=< m0,m1,…,m31>,SSHA-1=< s0,s1,…,s39 >, encrypt number t, t > 0 and encrypted image C=(ci,j)m×n, i=0,1 ..., m-1, j=0,1 ..., n-1, primary iteration control Parameter k=0, input encryption judgment threshold δ, δ > 0, by SMD5And SSHA-1Series connection is 16 system Number Sequence Sms=SMD5||SSHA-1= <smi>72, i=0,1 ..., 71 and initialization encryption event subscript index sequence Sid=<0,1 ..., 5>and intermediate key parameter sequence Arrange SX >,SY >,SZ >,SX >,Sp>,SId >For empty sequence;
Step 2: by SmsIt is mapped as 16 system sequence Sh=< h0,h1,…,h39>;
Step 3: by ShIt is divided intoThen four parts willBe converted to (0,1) 10 system decimal G in rangei, i=0,1 ..., 3;
Step 4: by G3As parameter alpha, G0,G1,G210 system decimal G being mapped as in (0,1) range0′,G1′,G2', By G0′,G1′,G2' it is used as key parameter Xinit,Yinit,xinit, i.e. Xinit=G0′,Yinit=G1′,xinit=G2', by xinitMake For sequence SX >In k-th of element
Step 5: by μ0As system parameter, xinitThe random number in 5 (0,1) ranges is generated as sequence as initial value Arrange Sp=< p0,p1,p2,p3,p4>, by SpConstruct the interval division sequence S ' in (0,1) rangep=< p '0,p1′,p′2,p′3,p′4 >, to obtain 6 probability intervals [0, p0′),[p′0,p1′),[p1′,p2′),[p2′,p3′),[p3′,p4′),[p4', 1], it will p0′,p1′,p2′,p3′,p4' it is used as sequence S 'P >In 5k, 5k+1 ..., 5k+4 element
Step 6: by Yinit0The μ being mapped as in [3.57,4] range1, by XinitAnd μ1Respectively as initial value and system Parameter, then iteration 1 time mapping value is as intermediate key parameter Zinit
Step 7: by Xinit,Yinit,Zinit3 real value random numbers of chaos system iteration 1 time generation are substituted into as initial value X0,Y0,Z0, and by X0,Y0,Z0Successively respectively as SX >,SY >,SZ >In k-th of element
Step 8: X is utilized0,Y0,Z0To SidIt is updated, by SidIn all elements be successively used as SId >In 6k, 6k+ 1 ..., 6k+5 element
Step 9: X is utilized0,Y0,Z0To μ0And Sms=< smi>72In element be updated operation;
Step 10: if k ≠ t updates k=k+1, step 2~step 9 is executed repeatedly, sequence can be obtained
Step 11: by SX >,SY >- 1 element of kthIt is mapped as C=(ci,j)m×nOn random point (r0,v0), By SZ >- 1 element of kth in sequenceWithIt is mapped as transformation parameter v;
Step 12: by (r0,v0) it is used as starting point, from C=(ci,j)m×nFilter out 4 × 4 matrix fritter Min=(mu,w)4×4, meter Calculate MinMapping value Map (Min), if Map (Min) >=δ then updates k=k-1 as k ≠ 0, executes step 11, holds as k=0 Row step 14, if above-mentioned condition Map (Min) >=δ is not satisfied, and takes SX >- 1 element of kthAs probabilistic determination value P, utilize S′P >5k-5,5k-4 ..., 5k-1 elementConstruct probability intervalTake SId >6k-6,6k-5 ..., 6k-1 elementAs Sid, using v as transformation parameter, the probability interval fallen into according to P, By matrix fritter Min=(mu,w)4×4Decryption is matrix fritter Mout
Step 13: M is calculatedoutCorresponding mapping value Map (Mout), if Map (Mout) < δ, then by MoutIn element successively make For C=(ci,j)m×nThe pixel of corresponding position, it is on the contrary by MinMiddle element is as C=(ci,j)m×nThe pixel of corresponding position, when k ≠ 0 Shi Gengxin k=k-1 executes step 11~step 13 repeatedly;
Step 14: by C=(ci,j)m×nOutput is used as decrypted image.
Further, by S in step 2msIt is mapped as sequence Sh=< h0,h1,…,h39< specific method be formula (1):
Sh=Draw (Sms,start,gap,|Sh|) (1)
In formula (1), Draw () is that sequential element extracts function, and wherein start is to extract starting point, and gap is the sample skipped Number, | Sh| it is ShMiddle number of elements, i.e., from SmsCirculation extracts | Sh| a 16 system number is as Sh, start, gap are respectively by formula (2) It is obtained with formula (3) mapping:
Step 3 is by ShIt is divided intoTetrameric specific method is formula (4):
Step 3 willBe converted to 10 system decimal G in (0,1) rangei, i=0,1 ..., 3 it is specific Method is formula (5), and [] is round function:
Step 4 is by G3As parameter alpha, G0,G1,G210 system decimal G being mapped as in (0,1) range0′,G1′,G2' Specific method is by G0,G1,G2Respectively as the input parameter of formula (6), 3 sequential value G of formula (6) iteration 1 time generation are substituted into0′, G1′,G2′;
By μ in step 50As system parameter, xinitThe random number in 5 (0,1) ranges is generated as sequence as initial value Arrange Sp=< p0,p1,p2,p3,p4> specific method be by μ0As system parameter, xinitFormula (7) iteration 5 is brought into as initial value Secondary generation sequence Sp=< p0,p1,p2,p3,p4>:
xi+1=μ xi(1-xi) (7);
By S in step 5pConstruct the interval division sequence S ' in (0,1) rangep=p '0,p1′,p′2,p′3,p′4> it is specific Method is by SpMiddle element obtains interval division sequence S ' by descending orderp=< p '0,p1′,p′2,p3′,p′4<。
Further, step 6 is by Yinit0The μ being mapped as in [3.57,4] range1Specific method be formula (8):
Step 6 is by XinitAnd μ1Respectively as initial value and system parameter iteration 1 time mapping value as intermediate key parameter ZinitSpecific method be use formula (7):
xi+1=μ xi(1-xi) (7);
Step 7 is by Xinit,Yinit,Zinit3 real value random number X of chaos system iteration 1 time generation are substituted into as initial value0, Y0,Z0Specific method be by Xinit,Yinit,ZinitAs the initial value of formula (9), formula (9) system parameter takes a=b=0.2, c= 5.7,3 real value random value X of iterative (9) 1 generations0,Y0,Z0:
Step 8 utilizes X0,Y0,Z0To SidThe specific method being updated is by X0,Y0,Z0It is mapped by formula (18) and formula (19) For start, gap, right back-pushed-type (20) is to SidIt is updated, whereinIt is accorded with for downward rounding operation:
Sid=Draw (Sid,start,gap,|Sid|) (20);
Step 9 utilizes X0,Y0,Z0To μ0The specific method being updated is formula (22):
Step 9 is to Sms=< smi<72In element be updated operation method particularly includes: first use X0,Y0,Z0By formula (21) Generate xinit, then by xinit0Substitution formula (7) iteration generates random sequence SR=< ri<72, by formula (23) to Sms=< smi<72 In element be updated operation;
xinit=(X0+X0Y0+X0Y0Z0)mod1 (21)
xi+1=μ xi(1-xi) (7)
Further, by S in step 11X >,SY >- 1 element of kthIt is mapped as C=(ci,j)m×nUpper random point (r0,v0) specific method be formula (24):
Step 11 is by SZ >- 1 element of kth in sequenceWithIt is mapped as the specific method of transformation parameter v For formula (25):
Step 12 is by (r0,v0) it is used as starting point, from C=(ci,j)m×nFilter out 4 × 4 matrix fritter Min=(mu,w)4×4's Specific method is formula (26):
Step 12 calculates MinMapping value Map (Min) specific method be by formula (12) to calculate MinCorresponding variance:
By matrix M in step 12in=(mu,w)4×4Decryption is matrix MoutSpecific method be formula (27):
Mout=Decryption (Min,v,P,f′,Sid,S′P >) (27)
In formula (27), f '={ f0′,f1′,…,f5' it is program event set, f ' corresponds to 6 groups of program events, wherein f0′, f1′,f2' airspace displacement box program event, as shown in formula (28), f3′,f4′,f5' transform domain displacement box program event, such as formula (29) It is shown, f0′,f1′,…,f5' corresponding displacement box Px0,Px1,…,Px5As shown in formula (17):
In formula (28), McodeIt is number matrix, remembers MinIn element mU, wIn PxiIn number be id, thenThe function that function executes is by mu,wIt is moved to McodeMiddle element number is the coordinate bit of (id-v+16) mod16 It sets;
In formula (29), MHIt is Hadamard transform battle array, Permute1 -1The operation that () executes is will be in PxiIn number be id ≠ × element mtu,wIt is moved to McodeIt is middle number be (id-v+16) mod16+1 coordinate position, id=× element protect always It holds and position change does not occur in (0,0) position;
Step 13 calculates MoutCorresponding mapping value Map (Mout) specific method be to be calculated by the same method of formula (12) MoutCorresponding variance.
Compared with technology difference, advantages of the present invention is mainly reflected in:
1. The present invention gives a kind of, the selective image compound based on dynamic probability event and null tone domain is encrypted and is decrypted Method improves proposed Encryption Algorithm by introducing with the MD5 value of image plaintext attribute extreme sensitivity to be encrypted and SHA-1 value Plaintext sensibility, and pass through the compound crash-protective characteristics to improve single MD5 value or SHA-1 value to MD5 value and SHA-1 value, institute Method is proposed by the attribute of image to be encrypted, the probability interval fallen into, the encryption link of participation, corresponding transformation parameter is closely Be coupled in together, thus even if using identical key, to different plaintext images encrypted all by correspondence it is different plus Close result.
2. different with the encryption policy that tradition converts plaintext into random noise, designed encryption method only reduces image Visual quality, the approximation characteristic of image can be retained while encryption, and this approximation characteristic can be by preset Encryption threshold value is controlled, and is extracted so as to conveniently treat encrypted image for classifying and knowing another characteristic, while in decryption, Encrypted image can restore in high quality again.
3. traditional frequency domain selective cryptographic method may result in airspace pixel value when encrypting to frequency coefficient It overflows, to reduce the visual quality for recovering image.To reduce influence of the frequency coefficient change to visual quality of images is restored, Present invention adds encryption threshold value screening strategies, for being encrypted the screening of front and back threshold value to block of pixels selected at random, once Threshold value screening is more than preset threshold value before and after pixel block encryption, then abandons being encrypted to ensure that figure to block of pixels selected at random Visual quality when as restoring, while also the encryption visual quality of image randomized block is constrained.
4. what the present invention provided is not only a kind of image encryption method based on probability encryption event, and is that one kind has The image Probabilistic Encryption Methods of update mechanism.Mentioned method is the key parameter for giving user and image MD5, SHA- to be encrypted 1 value is mapped as different probability encryption sections, then by key parameter and MD5 value and SHA-1 value mapping parameters come to be added Close pixel carries out random screening, and different probability encryption events is executed according to the different probability section fallen into.Mentioned method is not Only probability interval is updated, and probability encryption arrangement of objects sequence and initial key are all carried out by mapping parameters It updates, then encryption random sequence is generated by updated initial key, the multiplexed sequence that MD5 value and SHA-1 value form is carried out Encryption updates, thus the sequence of encrypted event corresponding to different probability intervals also not exactly the same and different encrypted state phase Mutually tangle and close-coupled.
Detailed description of the invention
Fig. 1 is encryption flow figure;
Fig. 2 is decryption flow chart;
Fig. 3 is image to be encrypted, and MD5 value corresponding to 8 gray level images face, Fig. 3 for 256 × 256 resolution ratio is SMD5=<D, 1,1, C, B, B, B, C, 3,7, A, A, 8, B, F, 5,1,4,5,1,3, C, E, F, F, 3,4, E, 4,2,0,7>, SHA-1 Value is SSHA-1=< 2, A, E, 0, D, B, A, B, 1,1,6,3,2, E, 8,9, B, 4, A, D, D, 0,7,1, F, 9,3,7, C, 1,5,5,7, 0,E,C,2,A,1,E>;
Fig. 4 is embodiment: t=10000, encrypted image when δ=1300, the PSNR=22.939dB relative to Fig. 3;
Fig. 5 is embodiment: t=10000, decrypted image when δ=1300, the PSNR=50.825dB relative to Fig. 3;
Fig. 6 is embodiment: t=15000, encrypted image when δ=1600, the PSNR=21.752dB relative to Fig. 3;
Fig. 7 is embodiment: t=15000, decrypted image when δ=1600, relative to Fig. 3 PSNR=48.276dB;
Fig. 8 is embodiment: t=10000, and when δ=1300, the μ value for providing mistake corresponding (is revised as 3.989 3.989999998) decrypted image, the PSNR=21.282dB relative to Fig. 3;
Fig. 9 is embodiment: t=10000, when δ=1300, provides the S of mistakeMD5It is worth (SMD5=< D, 1,1, C, B, B, B, C, 3,7, A, A, 8, B, F, 5, Isosorbide-5-Nitrae, 5,1,3, C, E, F, F, 3,4, E, 4,2,0,8 >) corresponding decrypted image, relative to Fig. 3's PSNR=21.278dB;
Figure 10 is embodiment: t=10000, when δ=1300, provides the S of mistakeSHA-1It is worth (SSHA-1=< 2, A, E, 0, D, B, A, B, 1,1,6,3,2, E, 8,9, B, 4, A, D, D, 0,7,1, F, 9,3,7, C, 1,5,5,7,0, E, C, 2, A, 1, F >) corresponding solution Close image, the PSNR relative to Fig. 3 are PSNR=21.253dB;
Figure 11 is embodiment: t=10000, encrypted image when δ=2500, the PSNR=22.352dB relative to Fig. 3;
Figure 12 is embodiment: t=10000, decrypted image when δ=2500, the PSNR=43.642dB relative to Fig. 3;
Figure 13 is embodiment: t=10000, encrypted image when δ=3500, the PSNR=22.049dB relative to Fig. 3;
Figure 14 is embodiment: t=10000, decrypted image when δ=3500, the PSNR=46.990dB relative to Fig. 3;
Figure 15 is embodiment: t=15000, encrypted image when δ=2500, the PSNR=21.415dB relative to Fig. 3;
Figure 16 is embodiment: t=15000, decrypted image when δ=2500, the PSNR=39.739dB relative to Fig. 3;
Figure 17 is embodiment: t=15000, encrypted image when δ=3500, the PSNR=21.092dB relative to Fig. 3;
Figure 18 is embodiment: t=15000, decrypted image when δ=3500, the PSNR=37.506dB relative to Fig. 3.
Specific embodiment
Below in conjunction with specific embodiment, the present invention will be described:
Using JAVA jdk1.8.0_20 as case implementation environment, embodiment of the present invention is carried out specifically in conjunction with attached drawing It is bright, but it is not limited to the implementation case, wherein Fig. 1 is encryption flow figure, and Fig. 2 is decryption flow chart;
Ciphering process is as follows:
Step 1: choose image A as shown in figure 3, be 256 × 256 gray level image face, remember image A=to be encrypted (ai,j)m×n, i=0,1 ..., m-1, j=0,1 ..., the corresponding 40 16 system MD5 values of n-1 are SMD5=< D, 1,1, C, B, B, B, C, 3,7, A, A, 8, B, F, 5,1,4,5,1,3, C, E, F, F, 3,4, E, 4,2,0,7 >, SHA-1 value is
SSHA-1=< 2, A, E, 0, D, B, A, B, 1,1,6,3,2, E, 8,9, B, 4, A, D, D, 0,7,1, F, 9,3,7, C, 1,5, 5,7,0, E, C, 2, A, 1, E >, by SMD5And SSHA-1Series connection is 16 system Number Sequence Sms=SMD5||SSHA-1=< smi>72, i=0, 1 ..., 71 and initialization encryption event subscript index sequence SidFor Sid=<0,1 ..., 5>, setting encryption number t=10000, Primary iteration control parameter k=1 selectes initial parameter μ0=3.989, encrypt judgment threshold δ=1300;
Step 2: by SmsSubstitution formula (1) is mapped as 16 system sequence Sh=< h0,h1,…,h39>, by SmsFormula is substituted into respectively (2) and formula (3) is mapped as start, gap;Such as: by Sms=< D, 1,1, C, B, B, B, C, 3,7, A, A, 8, B, F, 5,1,4,5, 1,3, C, E, F, F, 3,4, E, 4,2,0,7,2, A, E, 0, D, B, A, B, 1,1,6,3,2, E, 8,9, B, 4, A, D, D, 0,7,1, F, 9,3,7, C, 1,5,5,7,0, E, C, 2, A, 1, E > substitution formula (1) are mapped as Sh=< A, E, 7,2,4,0, A, B, 6,9,0, C, 2, B, 5,4, B, 5, C, F, D, D, C, 1,7,3,1,1, B, 4,1,0,2,1, B, E, 3,7, D, 9 >, by SmsFormula (2) and formula are substituted into respectively (3) start=43, gap=67 can be obtained;
Step 3: by ShIt is divided by formula (4)Then four parts willIt substitutes into Formula (5) is converted to 10 system decimal G in (0,1) rangei, i=0,1 ..., 3;Such as: it can be by ShIt is divided into Substitution formula (5) mapping are as follows: G0=0.6748477158235295, G1= 0.07244421382352942,G2=0.8483371302352942, G3=0.06013199052941176;
Step 4: by G3As parameter alpha, G0,G1,G2Respectively as the input parameter of formula (6), formula (6) are substituted into iteration 1 time Generate 3 sequential value G0′,G1′,G2', by G0′,G1′,G2' it is used as key parameter Xinit,Yinit,xinit
Such as: α=0.06013199052941176 is taken, by G0,G1,G2Formula (6) are substituted into respectively maps G0'= 0.34595526276037764,G1'=0.9869000506772724, G2'=0.16136613677290165, Xinit= 0.34595526276037764,Yinit=0.9869000506772724, xinit=0.16136613677290165;
Step 5: by μ0As system parameter, xinit5 random numbers for bringing formula (7) iteration 5 times generations into as initial value are made For sequence Sp=< p0,p1,p2,p3,p4>, by SpMiddle element obtains interval division sequence S ' by descending orderp=< p '0, p1′,p′2,p3′,p′4>;Such as: μ0=3.989, xinit=0.16136613677290165 substitutes into formula (7) iteration 5 times mappings, Sp=< p0,p1,p2,p3,p4>,p0=0.5398198285301286, p1=0.9909249668295106, p2= 0.035871788327397826,p3=0.13795957748394325, p4=0.4743987358004721, then it can obtain S 'p =< p '0,p1′,p′2,p′3,p′4<, i.e. p0'=0.035871788327397826, p1'=0.13795957748394325, p2′ =0.4743987358004721, p3'=0.5398198285301286, p4'=0.9909249668295106;
Step 6: by Yinit0Substitution formula (8) is mapped as μ1∈ [3.57,4], by XinitAnd μ1It is initial respectively as formula (7) Value and system parameter press formula (7) iteration 1 time as intermediate key parameter Zinit;Such as: by μ0=3.989, Yinit= 0.9869000506772724, which substitutes into formula (8), can obtain μ1=3.9916826088662414, by Xinit= 0.34595526276037764 and μ1=3.9916826088662414, which substitute into formula (7), can obtain Zinit= 0.9031988978023509;
Step 7: by Xinit,Yinit,ZinitAs the initial value of formula (9), 3 real value random numbers of iterative (9) 1 generations Successively it is used as parameter X0,Y0,Z0, formula (9) system parameter takes a=b=0.2, c=5.7;
Such as: Xinit=0.34595526276037764, Yinit=0.9869000506772724, Zinit= 0.9031988978023509 obtains X by formula (9)0=0.1755933912994469, Y0=1.0326377639685018, Z0= 0.5476634933830886;
Step 8: by X0,Y0It is A=(a that substitution formula (10), which is mapped as image to be encrypted,i,j)m×nOn random point (r0,v0);
Such as: X0=0.1755933912994469, Y0=1.0326377639685018 substitute into formula (10), can be mapped as Encrypted image is A=(ai,j)m×nOn random point r0=36, v0=6;
Step 9: by (r0,v0) it is used as starting point, by formula (11) from image A=(a to be encryptedi,j)m×nFilter out Min= (mu,w)4×4, by MinSubstitution formula (12) calculates mapping value Map (Min), if Map (Min) >=δ then executes step 10, on the contrary by xinit As probabilistic determination value P, by X0,Y0,Z0Substitution formula (13) mapping transformation parameter v, according to the P probability interval fallen into and Sid, press Formula (14) executes corresponding airspace and frequency domain displacement cryptographic operation, and the same method of right back-pushed-type (12) calculates MoutMapping value Map (Mout), if Map (Mout) < δ, then by MoutIn pixel be successively used as image A=(a to be encryptedi,j)m×nThe pixel of corresponding position, Otherwise by MinMiddle pixel is directly as image A=(a to be encryptedi,j)m×nThe pixel of corresponding position;Such as: by (r0,v0) be used as Point, by formula (11) from image A=(a to be encryptedi,j)m×nFilter out 4 × 4 matrix fritterBy MinSubstitution formula (12), due to Map (Min)=172.4375 are Map (Min) < δ passes through Judgement continues to execute cryptographic operation, and P=0.16136613677290165 passes through X0=0.1755933912994469, Y0= 1.0326377639685018,Z0=0.5476634933830886 substitutes into formula (13) mapping transformation parameter v=10, according to P institute The probability interval and S fallen intoid, corresponding airspace is executed by formula (14) and frequency domain displacement cryptographic operation obtainsBy MoutSubstitution formula (12) judged, Map (Mout)=172.4375 are Map (Mout) < δ, then by MoutMiddle element is successively used as image A=(a to be encryptedi,j)m×nCorresponding position pixel;
Step 10: X is utilized0,Y0,Z0It is mapped as start, gap by formula (18) and formula (19), right back-pushed-type (20) is to SidInto Row updates;Such as: by Sid=0,1,2 ..., and 5 } substitute into the new S of formula (20) mappingid={ 3,1,0,2,5,4 }, by X0= 0.1755933912994469,Y0=1.0326377639685018, Z0=0.5476634933830886 substitutes into formula respectively (18), (19) can obtain parameter start=0, gap=3;
Step 11: X is utilized0,Y0,Z0Substitution formula (22) maps initial parameter μ0, then use X0,Y0,Z0It is generated by formula (21) xinit, then by xinit0Substitution formula (7) iteration generates random sequence SR=< ri>72, by formula (23) to Sms=< smi>72In Element is updated operation;Such as: by X0,Y0,Z0Substitution formula (22) undated parameter μ0=3.7798190064841766, by X0, Y0,Z0Substitution formula (21) maps xinit=0.45622249450285557, by xinit0Substitution formula (7) maps random sequence SR= <ri>72, and by SR=< ri>72To Sms=< smi>72Encryption, which updates, obtains new Sms=< D, 5,9,2, F, 8, E, 1, D, 1,6, F, E,D,F,D,C,7,F,B,5,6,9,3,C,C,0,D,1,8,0,9,B,D,9,0,F,1,9,8,0,2,A,B,1,9,9,A,F,7, 0,A,E,C,C,B,9,D,E,9,1,8,1,6,E,6,3,5,D,3,E,E>;
Step 12: if when k≤t, updating k=k+1, step 2~step 11 is executed repeatedly;
Step 13: by A=(ai,j)m×nOutput is as shown in Figure 4 as encrypted image.
Decrypting process is as follows:
Step 1: input key μ0=3.989, encryption number t=10000, juxtaposition k=0, input encryption judgment threshold δ= 1300, SMD5=<D, 1,1, C, B, B, B, C, 3,7, A, A, 8, B, F, 5, Isosorbide-5-Nitrae, 5,1,3, C, E, F, F, 3,4, E, 4,2,0,7>, SSHA-1=< 2, A, E, 0, D, B, A, B, 1,1,6,3,2, E, 8,9, B, 4, A, D, D, 0,7,1, F, 9,3,7, C, 1,5,5,7,0, E, C, 2, A, 1, E >, by SMD5And SSHA-1Series connection is 16 system Number Sequence Sms=SMD5||SSHA-1=< smi>72, i=0,1 ..., 71 simultaneously Initialization encryption event subscript index sequence Sid=<0,1 ..., 5>and intermediate key argument sequence SX >,SY >,SZ >,SX >,Sp>,SId >For empty sequence, encrypted image C=(ci,j)m×n, i=0,1 ..., m-1, j=0,1 ..., n-1 is as shown in Figure 4;
Step 2: by SmsSubstitution formula (1) is mapped as 16 system sequence Sh=< h0,h1,…,h39>, by SmsFormula is substituted into respectively (2) and formula (3) maps start, gap;Such as: by Sms=< D, 1,1, C, B, B, B, C, 3,7, A, A, 8, B, F, 5,1,4,5,1, 3, C, E, F, F, 3,4, E, 4,2,0,7,2, A, E, 0, D, B, A, B, 1,1,6,3,2, E, 8,9, B, 4, A, D, D, 0,7,1, F, 9, 3,7, C, 1,5,5,7,0, E, C, 2, A, 1, E > substitute into formula (1) mapping Sh=< A, E, 7,2,4,0, A, B, 6,9,0, C, 2, B, 5, 4, B, 5, C, F, D, D, C, 1,7,3,1,1, B, 4,1,0,2,1, B, E, 3,7, D, 9 >, wherein by SmsFormula (2) and formula are substituted into respectively (3) start=43, gap=67 are mapped;
Step 3: by ShIt is divided by formula (4)Then four parts willIt substitutes into Formula (5) is converted to 10 system decimal G in (0,1) rangei, i=0,1 ..., 3;Such as: by ShIt is divided into Substitution formula (5) is mapped as G0=0.6748477158235295, G1= 0.07244421382352942,G2=0.8483371302352942, G3=0.06013199052941176;
Step 4: by G3As parameter alpha, G0,G1,G2Respectively as the input parameter of formula (6), formula (6) are substituted into iteration 1 time Generate 3 sequential value G0′,G1′,G2', by G0′,G1′,G2' it is used as key parameter Xinit,Yinit,xinit, by xinitAs sequence SX >In k-th of elementSuch as: α=0.06013199052941176 is used as initial parameter, by G0,G1,G2It substitutes into respectively Formula (6) is mapped as G0'=0.34595526276037764, G1'=0.9869000506772724, G2'= 0.16136613677290165 i.e. Xinit=0.34595526276037764, Yinit=0.9869000506772724, xinit= 0.16136613677290165, by xinitAs sequence SX >In k-th of element
Step 5: by μ0As system parameter, xinit5 random numbers for bringing formula (7) iteration 5 times generations into as initial value are made For sequence Sp=< p0,p1,p2,p3,p4>, by SpMiddle element obtains interval division sequence S ' by descending orderp=< p '0, p1′,p′2,p3′,p′4>, by p0′,p1′,p2′,p3′,p4' it is used as sequence S 'p5k in >, 5k+1 ..., 5k+4 elementSuch as: μ0=3.989, xinit=0.16136613677290165 substitutes into formula (7) iteration 5 times mappings Sp=< p0,p1,p2,p3,p4>,p0=0.5398198285301286, p1=0.9909249668295106, p2= 0.035871788327397826,p3=0.13795957748394325, p4=0.4743987358004721, then it can be obtained S′p=< p '0,p1′,p′2,p′3,p′4>, i.e. p0'=0.035871788327397826, p1'=0.13795957748394325, p2'=0.4743987358004721, p3'=0.5398198285301286, p4'=0.9909249668295106, by p0′, p1′,p2′,p3′,p4' it is used as sequence S 'P >In 5k, 5k+1 ..., 5k+4 element
Step 6: by Yinit0Substitution formula (8) is mapped as μ1∈ [3.57,4], by XinitAnd μ1Respectively as in formula (7) Initial value and system parameter press formula (7) iteration 1 time as intermediate key parameter Zinit;Such as: μ0=3.989, Yinit= 0.9869000506772724, which substitutes into formula (8), maps μ1=3.9916826088662414, by Xinit= 0.34595526276037764,μ1=3.9916826088662414, which substitute into formula (7), to obtain: Zinit= 0.9031988978023509;
Step 7: by Xinit,Yinit,ZinitAs the initial value of formula (9), 3 real value random numbers of iterative (9) 1 generations Successively it is used as parameter X0,Y0,Z0, formula (9) system parameter takes a=b=0.2, c=5.7, and by X0,Y0,Z0Successively respectively as SX >,SY >,SZ >In k-th of elementSuch as: Xinit=0.34595526276037764, Yinit= 0.9869000506772724, Zinit=0.9031988978023509 substitutes into 1 mapping X of formula (9) iteration0= 0.1755933912994469,Y0=1.0326377639685018, Z0=0.5476634933830886, by X0,Y0,Z0Successively Respectively as SX >,SY >,SZ >In k-th of element
Step 8: X is utilized0,Y0,Z0It is mapped as start, gap by formula (18) and formula (19), right back-pushed-type (20) is to SidIt carries out It updates, by SidIn all elements be successively used as SId >In 6k, 6k+1 ..., 6k+5 elementSuch as: by Sid=0,1,2 ..., and 5 } substitute into the new S of formula (20) mappingid=3,1,0,2, 5,4 }, wherein by X0=0.1755933912994469, Y0=1.0326377639685018, Z0= 0.5476634933830886 substitutes into formula (18) respectively, (19) mapping parameters start=0, gap=3, by SidIn all elements Successively it is used as SId >In 6k, 6k+1 ..., 6k+5 element
Step 9: X is utilized0,Y0,Z0Substitution formula (22) maps μ0, then use X0,Y0,Z0X is generated by formula (21)init, then will xinit0Substitution formula (7) iteration generates random sequence SR=< ri>72, by formula (23) to Sms=< msi>72In element be updated Operation;Such as: by X0,Y0,Z0Substitution formula (22) undated parameter μ0=3.7798190064841766, by X0,Y0,Z0Substitution formula (21) x is mappedinit=0.45622249450285557, by xinit, the substitution of μ 0 formula (7) mapping random sequence SR=< ri>72, and will SR=< ri>72To Sms=< smi>72Encryption, which updates, obtains new Sms=< D, 5,9,2, F, 8, E, 1, D, 1,6, F, E, D, F, D, C, 7,F,B,5,6,9,3,C,C,0,D,1,8,0,9,B,D,9,0,F,1,9,8,0,2,A,B,1,9,9,A,F,7,0,A,E,C,C, B,9,D,E,9,1,8,1,6,E,6,3,5,D,3,E,E>;
Step 10: if k ≠ t updates k=k+1, step 2~step 9 is executed repeatedly, sequence can be obtained
Step 11: by SX >,SY >- 1 element of kthSubstitution formula (24) is mapped as C=(ci,j)m×nOn it is random Point (r0,v0), by SZ >- 1 element of kth in sequenceWithFormula (25) are substituted into together is mapped as transformation parameter v;Such as:Substitution formula (24) maps C= (ci,j)m×nOn random point r0=238, v0=52, it willWithSubstitution formula (25) v=1 is mapped;
Step 12: by (r0,v0) it is used as starting point, by formula (26) from C=(ci,j)m×nFilter out 4 × 4 matrix fritter Min= (mu,w)4×4, M is calculated by formula (12)inMapping value Map (Min), if Map (Min) >=δ then updates k=k-1 as k ≠ 0, executes Step 11 executes step 14 as k=0, if above-mentioned condition Map (Min) >=δ is not satisfied, and takes SX >- 1 element of kthMake For probabilistic determination value P, S ' is utilizedP >5k-5,5k-4 ..., 5k-1 elementConstruct probability intervalTake SId >6k-6,6k-5 ..., 6k-1 member ElementAs Sid, using v as transformation parameter, the probability interval fallen into according to P, by formula (27) By matrix fritter Min=(mu,w)4×4Decryption is matrix fritter Mout;Such as: by (r0,v0) it is used as starting point, by formula (26) from C= (ci,j)m×nFilter out 4 × 4 matrix fritterBy MinSubstitution formula (12) judged, Due to Map (Min)=239.75 are Map (Min) < δ, then by SX >- 1 element of kthAs probabilistic determination value P= 0.31040996788505415, utilize S 'P >5k-5,5k-4 ..., 5k-1 element Construct probability intervalTake SId >6k-6,6k-5 ..., 6k-1 member ElementSequence is indexed as subscript Column, using v=1 as transformation parameter, the probability interval fallen into according to P, by matrix fritter Min=(mu,w)4×4Substitution formula (27) solution Close is matrix fritter
Step 13: M is calculated by formula (12) same methodoutCorresponding mapping value Map (Mout), if Map (Mout) < δ, then By MoutIn element be successively used as C=(ci,j)m×nThe pixel of corresponding position, it is on the contrary by MinMiddle element is as C=(ci,j)m×nIt is right The pixel for answering position updates k=k-1 as k ≠ 0, executes step 11~step 13 repeatedly;Such as: by MoutSubstitution formula (12), Due to Map (Mout)=237.484375 are Map (Mout) < δ, then by MoutMiddle pixel is successively used as C=(ci,j)m×nCorresponding position Pixel;
Step 14: by C=(ci,j)m×nOutput is as shown in Figure 5 as decrypted image.
Fig. 6 is that encryption number is respectively t=15000, and the encrypted image of δ=1600, Fig. 7 is corresponding decrypted image, can from Fig. 6 Find out the method for the present invention encrypted image relative to original image although can recognize, visual quality is integrally poor, solves as can be seen from Figure 7 Close image is clear relative to original image visual quality, has certain application value;
Fig. 8~10 are respectively to modify one of them corresponding decrypted image;It can be seen that the method for the present invention from decrypted image, it is right The key and picture characteristics extreme sensitivity to be encrypted that user provides will lead to decrypted image vision matter if providing the parameter of mistake Amount decline, decrypted image visual quality are more fuzzy;
Figure 11,13,15,17 encrypted image embodiments corresponding when being different encryption number t, δ respectively, Figure 12,14, 16,18 be corresponding decrypted image embodiment, be can be seen that from decrypted image visual quality, by controlling t, δ, be can be obtained The decrypted image of different visual qualities, to have more extensive application value.

Claims (10)

1. the compound image selection encryption method of a kind of dynamic probability and null tone domain, it is characterised in that the following steps are included:
Step 1: remember that image to be encrypted is A=(ai,j)m×nAnd ai,j∈ 0,1 ..., 255 }, i=0,1 ..., m-1, j=0, 1 ..., n-1, setting encryption number t, t > 0, primary iteration control parameter k=1, select initial parameter μ0∈ [3.57,4] and Setting encryption judgment threshold δ, δ > 0, remember the MD5 value of A and SHA-1 value are respectively 16 system Number Sequence SMD5=< m0,m1,…,m31 > and SSHA-1=< s0,s1,…,s39>, by SMD5And SSHA-1Series connection is 16 system Number Sequence Sms=SMD5||SSHA-1=< smi>72,i =0,1 ..., 71 and initialization encryption event subscript index sequence SidFor Sid=<0,1 ..., 5>, wherein " | | " it is bit bit string Serial operation symbol;
Step 2: by SmsIt is mapped as 16 system sequence Sh=< h0,h1,…,h39>;
Step 3: by ShIt is divided intoThen four parts willBe converted to (0,1) range 10 interior system decimal Gi, i=0,1 ..., 3;
Step 4: by G3As parameter alpha, G0,G1,G210 system decimal G ' being mapped as in (0,1) range0,G′1,G′2, by G ′0,G′1,G′2As key parameter Xinit,Yinit,xinit, i.e. Xinit=G '0,Yinit=G '1,xinit=G '2
Step 5: by initial parameter μ0As system parameter, key parameter xinitIt is generated in 5 (0,1) ranges as initial value Random number is as sequence Sp=< p0,p1,p2,p3,p4>, by SpConstruct the interval division sequence S ' in (0,1) rangep=< p '0, p′1,p′2,p′3,p′4>, to obtain probability interval [0, p '0),[p′0,p′1),[p′1,p′2),[p′2,p′3),[p′3,p′4), [p′4,1];
Step 6: by key parameter Yinit0It is mapped as μ1∈ [3.57,4], by XinitAnd μ1Join respectively as initial value and system Number iteration generates the intermediate key parameter Z in (0,1) rangeinit
Step 7: by Xinit,Yinit,ZinitAs initial value, 3 real value random numbers of iteration 1 time generation are successively used as parameter X0,Y0, Z0
Step 8: by X0,Y0It is mapped as image A=(a to be encryptedi,j)m×nOn random point (r0,v0);
Step 9: by (r0,v0) it is used as starting point, from image A=(a to be encryptedi,j)m×nFilter out Min=(mu,w)4×4, calculate Min's Mapping value Map (Min), if Map (Min) >=δ then executes step 10, on the contrary by xinitAs probabilistic determination value P, by X0,Y0,Z0's Mapping value is as transformation parameter v, according to the P probability interval fallen into and Sid, execute corresponding airspace and frequency domain displacement encryption behaviour Make, then to encrypted matrix fritter MoutCalculate mapping value Map (Mout);If Map (Mout) < δ, then by MoutIn pixel according to It is secondary to be used as image A=(a to be encryptedi,j)m×nThe pixel of corresponding position, it is on the contrary by MinMiddle pixel is directly as image A=to be encrypted (ai,j)m×nCorresponding position pixel;
Step 10: X is utilized0,Y0,Z0To SidCarry out rearrangement update;
Step 11: X is utilized0,Y0,Z0To initial parameter μ0And Sms=< smi>72In element be updated operation;
Step 12: if when k≤t, updating k=k+1, step 2~step 11 is executed repeatedly;
Step 13: by A=(ai,j)m×nOutput is used as encrypted image.
2. the compound image selection encryption method of a kind of dynamic probability as described in claim 1 and null tone domain, feature exist In: step 2 by SmsIt is mapped as Sh=< h0,h1,…,h39> specific method be formula (1):
Sh=Draw (Sms,start,gap,|Sh|) (1)
In formula (1), Draw () is that sequential element extracts function, and wherein start is to extract starting point, and gap is the sample number skipped, | Sh| it is ShMiddle number of elements, i.e., from SmsCirculation extracts | Sh| a 16 system number is as Sh, start, gap are respectively by formula (2) and formula (3) mapping obtains:
Step 3 is by ShIt is divided intoTetrameric specific method is formula (4):
Step 3 willBe converted to 10 system decimal G in (0,1) rangei, i=0,1 ..., 3 specific method For formula (5), in formula (5), [] is round function:
3. the compound image selection encryption method of a kind of dynamic probability as described in claim 1 and null tone domain, feature exist In: step 4 by G3As parameter alpha, G0,G1,G210 system decimal G ' being mapped as in (0,1) range0,G′1,G′2It is specific Method is by G0,G1,G2Respectively as the input parameter of formula (6), 3 sequential value G ' of formula (6) iteration 1 time generation are substituted into0,G′1, G′2
Step 5 is by μ0As system parameter, xinitThe random number in 5 (0,1) ranges is generated as sequence S as initial valuep= <p0,p1,p2,p3,p4> specific method be by μ0As system parameter, xinitFormula (7) iteration 5 times generations are brought into as initial value 5 random numbers as sequence Sp=< p0,p1,p2,p3,p4>
xi+1=μ xi(1-xi) (7);
By S in step 5pConstruct the interval division sequence S ' in (0,1) rangep=< p '0,p′1,p′2,p′3,p′4> specific method For by SpMiddle element obtains interval division sequence S ' by descending orderp=< p '0,p′1,p′2,p′3,p′4>。
4. the compound image selection encryption method of a kind of dynamic probability as described in claim 1 and null tone domain, feature exist In: step 6 by Yinit0It is mapped as μ1The specific method of ∈ [3.57,4] is formula (8):
Step 6 is by XinitAnd μ1The intermediate key parameter in (0,1) range is generated respectively as initial value and system parameter iteration ZinitSpecific method be by XinitAnd μ1Respectively as in formula (7) initial value and system parameter press 1 conduct of formula (7) iteration Intermediate key parameter Zinit
xi+1=μ xi(1-xi) (7);
Step 7 is by Xinit,Yinit,ZinitAs initial value, 3 random numbers of iteration 1 time generation are successively used as parameter X0,Y0,Z0's Specific method is by Xinit,Yinit,ZinitAs the initial value of formula (9), 3 random number successively conducts of iterative (9) 1 generations Parameter X0,Y0,Z0, formula (9) system parameter takes a=b=0.2, c=5.7;
5. the compound image selection encryption method of a kind of dynamic probability as described in claim 1 and null tone domain, feature exist In: step 8 by X0,Y0It is mapped as image A=(a to be encryptedi,j)m×nOn random point (r0,v0) specific method be formula (10), In formula (10)For downward rounding operation symbol;
Step 9 is by (r0,v0) it is used as starting point, from image A=(a to be encryptedi,j)m×nFilter out 4 × 4 matrix fritter Min= (mu,w)4×4Specific method be formula (11):
Step 9 calculates MinMapping value Map (Min) specific method be by formula (12) calculate MinVariance:
Step 9 is to encrypted matrix fritter MoutCalculate mapping value Map (Mout) specific method be by the same side of formula (12) Method calculates MoutVariance;
By X in step 90,Y0,Z0Mapping value as transformation parameter v specific method be formula (13):
The specific method that corresponding airspace and frequency domain displacement cryptographic operation are executed in step 9 is formula (14):
Mout=Encrypt (Min,v,P,f,Sid,S′p) (14)
In formula (14), f={ f0,f1,…,f5It is encrypted event set, SidIt is the encrypted event subscript index sequence of f, S 'pFor Interval division sequence, encrypted event set f correspond to 6 group encryption events, wherein f0,f1,f2Airspace displacement box encrypted event, such as formula (15) shown in, f3,f4,f5Transform domain displacement box encrypted event, as shown in formula (16), f0,f1,…,f5Corresponding displacement box Px0,Px1,…,Px5As shown in formula (17);
In formula (15), McodeIt is MinNumber matrix, remember MinIn element mu,wIn McodeIn number be id, then Permute0 The function that () function executes is by mu,wIt is moved to PxiMiddle element value is the coordinate position of (id+v) mod16;
In formula (16), MHIt is Hadamard transform battle array, remembers MtempIn element mtu,wIn McodeIn number be id and id ≠ ×, Permute1The operation that () executes is by mtu,wIt is moved to PxiMiddle element value is the coordinate position of (id+v) mod16+1, together Permute0The difference of () is Permute1() in conversion process, MtempIn (0,0) position element, i.e. id=× element It remains at (0,0) position and position change does not occur;
6. the compound image selection encryption method of a kind of dynamic probability as described in claim 1 and null tone domain, feature exist In: step 10 utilizes X0,Y0,Z0To SidThe specific method for carrying out resetting update is by X0,Y0,Z0It is mapped by formula (18) and formula (19) For start, gap, right back-pushed-type (20) is to case index sequence SidIt is updated:
Sid=Draw (Sid,start,gap,|Sid|) (20);
X is utilized in step 110,Y0,Z0To initial parameter μ0The specific method of update is formula (22):
To S in step 11ms=< smi>72In element be updated operation method particularly includes: first use X0,Y0,Z0By formula (21) Generate xinit, then by xinit0Substitution formula (7) iteration generates random sequence SR=< ri>72, by formula (23) to Sms=< smi>72 In element be updated operation;
xinit=(X0+X0Y0+X0Y0Z0)mod1 (21)
xi+1=μ xi(1-xi) (7)
7. the compound image selection decryption method of a kind of dynamic probability corresponding with claim 1 and null tone domain, feature Be the following steps are included:
Step 1: key μ is inputted by user0∈[3.57,4],SMD5=< m0,m1,…,m31>,SSHA-1=< s0,s1,…,s39>, add Close number t, t > 0 and encrypted image C=(ci,j)m×n, i=0,1 ..., m-1, j=0,1 ..., n-1, primary iteration control parameter K=0, input encryption judgment threshold δ, δ > 0, by SMD5And SSHA-1Series connection is 16 system Number Sequence Sms=SMD5||SSHA-1=< smi >72, i=0,1 ..., 71 and initialization encryption event subscript index sequence Sid=<0,1 ..., 5>and intermediate key argument sequence SX >,SY >,SZ >,SX >,S′P >,SId >For empty sequence;
Step 2: by SmsIt is mapped as 16 system sequence Sh=< h0,h1,…,h39>;
Step 3: by ShIt is divided intoThen four parts willBe converted to (0,1) range 10 interior system decimal Gi, i=0,1 ..., 3;
Step 4: by G3As parameter alpha, G0,G1,G210 system decimal G being mapped as in (0,1) range0′,G1′,G2', it will G0′,G1′,G2' it is used as key parameter Xinit,Yinit,xinit, i.e. Xinit=G0′,Yinit=G1′,xinit=G2', by xinitAs Sequence SX >In k-th of element
Step 5: by μ0As system parameter, xinitThe random number in 5 (0,1) ranges is generated as sequence S as initial valuep =< p0,p1,p2,p3,p4>, by SpConstruct the interval division sequence S ' in (0,1) rangep=< p '0,p′1,p′2,p′3,p′4>, from And obtain 6 probability intervals [0, p '0),[p′0,p′1),[p′1,p′2),[p′2,p′3),[p′3,p′4),[p′4, 1], by p '0, p′1,p′2,p′3,p′4As sequence S 'P >In 5k, 5k+1 ..., 5k+4 element
Step 6: by Yinit0The μ being mapped as in [3.57,4] range1, by XinitAnd μ1Respectively as initial value and system parameter The mapping value that iteration is 1 time is as intermediate key parameter Zinit
Step 7: by Xinit,Yinit,Zinit3 real value random number X of chaos system iteration 1 time generation are substituted into as initial value0,Y0, Z0, and by X0,Y0,Z0Successively respectively as SX >,SY >,SZ >In k-th of element
Step 8: X is utilized0,Y0,Z0To SidIt is updated, by SidIn all elements be successively used as SId >In 6k, 6k+1 ..., 6k+5 element
Step 9: X is utilized0,Y0,Z0To μ0And Sms=< smi>72In element be updated operation;
Step 10: if k ≠ t updates k=k+1, step 2~step 9 is executed repeatedly, sequence can be obtained
Step 11: by SX >,SY >- 1 element of kthIt is mapped as C=(ci,j)m×nOn random point (r0,v0), by SZ > - 1 element of kth in sequenceWithIt is mapped as transformation parameter v;
Step 12: by (r0,v0) it is used as starting point, from C=(ci,j)m×nFilter out 4 × 4 matrix fritter Min=(mu,w)4×4, calculate Min Mapping value Map (Min), if Map (Min) >=δ, then update k=k-1 as k ≠ 0, executes step 11, and the is executed as k=0 14 steps, if above-mentioned condition Map (Min) >=δ is not satisfied, and takes SX >- 1 element of kthAs probabilistic determination value P, S ' is utilizedP > 5k-5,5k-4 ..., 5k-1 elementConstruct probability intervalTake SId >6k-6,6k-5 ..., 6k-1 elementAs Sid, using v as transformation parameter, the probability interval fallen into according to P, By matrix fritter Min=(mu,w)4×4Decryption is matrix fritter Mout
Step 13: M is calculatedoutCorresponding mapping value Map (Mout), if Map (Mout) < δ, then by MoutIn element be successively used as C =(ci,j)m×nThe pixel of corresponding position, it is on the contrary by MinMiddle element is as C=(ci,j)m×nThe pixel of corresponding position, as k ≠ 0 K=k-1 is updated, executes step 11~step 13 repeatedly;
Step 14: by C=(ci,j)m×nOutput is used as decrypted image.
8. the compound image selection decryption method of a kind of dynamic probability as claimed in claim 7 and null tone domain, feature exist In: by S in step 2msIt is mapped as sequence Sh=< h0,h1,…,h39> specific method be formula (1):
Sh=Draw (Sms,start,gap,|Sh|) (1)
In formula (1), Draw () is that sequential element extracts function, and wherein start is to extract starting point, and gap is the sample number skipped, | Sh| it is ShMiddle number of elements, i.e., from SmsCirculation extracts | Sh| a 16 system number is as Sh, start, gap are respectively by formula (2) and formula (3) mapping obtains:
Step 3 is by ShIt is divided intoTetrameric specific method is formula (4):
Step 3 willBe converted to 10 system decimal G in (0,1) rangei, i=0,1 ..., 3 specific method For formula (5), [] is round function:
Step 4 is by G3As parameter alpha, G0,G1,G210 system decimal G ' being mapped as in (0,1) range0,G′1,G′2It is specific Method is by G0,G1,G2Respectively as the input parameter of formula (6), 3 sequential value G ' of formula (6) iteration 1 time generation are substituted into0,G′1, G′2
By μ in step 50As system parameter, xinitThe random number in 5 (0,1) ranges is generated as sequence S as initial valuep =< p0,p1,p2,p3,p4> specific method be by μ0As system parameter, xinitFormula (7) iteration 5 times productions are brought into as initial value Raw sequence Sp=< p0,p1,p2,p3,p4>:
xi+1=μ xi(1-xi) (7);
By S in step 5pConstruct the interval division sequence S ' in (0,1) rangep=< p '0,p′1,p′2,p′3,p′4> specific method For by SpMiddle element obtains interval division sequence S ' by descending orderp=< p '0,p′1,p′2,p′3,p′4>。
9. the compound image selection decryption method of a kind of dynamic probability as claimed in claim 7 and null tone domain, feature exist In: step 6 by Yinit0The μ being mapped as in [3.57,4] range1Specific method be formula (8):
Step 6 is by XinitAnd μ1Respectively as initial value and system parameter iteration 1 time mapping value as intermediate key parameter Zinit Specific method be use formula (7):
xi+1=μ xi(1-xi) (7);
Step 7 is by Xinit,Yinit,Zinit3 real value random number X of chaos system iteration 1 time generation are substituted into as initial value0,Y0,Z0 Specific method be by Xinit,Yinit,ZinitAs the initial value of formula (9), formula (9) system parameter takes a=b=0.2, c=5.7, 3 real value random value X of iterative (9) 1 generations0,Y0,Z0:
Step 8 utilizes X0,Y0,Z0To SidThe specific method being updated is by X0,Y0,Z0It is mapped as by formula (18) and formula (19) Start, gap, right back-pushed-type (20) is to SidIt is updated, whereinIt is accorded with for downward rounding operation:
Sid=Draw (Sid,start,gap,|Sid|) (20);
Step 9 utilizes X0,Y0,Z0To μ0The specific method being updated is formula (22):
Step 9 is to Sms=< smi>72In element be updated operation method particularly includes: first use X0,Y0,Z0It is generated by formula (21) xinit, then by xinit0Substitution formula (7) iteration generates random sequence SR=< ri>72, by formula (23) to Sms=< smi>72In Element is updated operation;
xinit=(X0+X0Y0+X0Y0Z0)mod1 (21)
xi+1=μ xi(1-xi) (7)
10. the compound image selection decryption method of a kind of dynamic probability as claimed in claim 7 and null tone domain, feature exist In: by S in step 11X >,SY >- 1 element of kthIt is mapped as C=(ci,j)m×nUpper random point (r0,v0) specific side Method is formula (24):
Step 11 is by SZ >- 1 element of kth in sequenceWithThe specific method for being mapped as transformation parameter v is formula (25):
Step 12 is by (r0,v0) it is used as starting point, from C=(ci,j)m×nFilter out 4 × 4 matrix fritter Min=(mu,w)4×4It is specific Method is formula (26):
Step 12 calculates MinMapping value Map (Min) specific method be by formula (12) to calculate MinCorresponding variance:
By matrix M in step 12in=(mu,w)4×4Decryption is matrix MoutSpecific method be formula (27):
Mout=Decryption (Min,v,P,f′,Sid,S′P >) (27)
In formula (27), f '={ f '0,f′1,…,f′5It is program event set, f ' corresponds to 6 groups of program events, wherein f '0,f′1, f′2Airspace displacement box program event, as shown in formula (28), f '3,f′4,f′5Transform domain displacement box program event, such as formula (29) institute Show, f '0,f′1,…,f′5Corresponding displacement box Px0,Px1,…,Px5As shown in formula (17):
In formula (28), McodeIt is number matrix, remembers MinIn element mu,wIn PxiIn number be id, thenLetter The function that number executes is by mu,wIt is moved to McodeMiddle element number is the coordinate position of (id-v+16) mod16;
In formula (29), MHIt is Hadamard transform battle array, Permute1 -1The operation that () executes is will be in PxiIn number be id ≠ × Element mtu,wIt is moved to McodeIt is middle number be (id-v+16) mod16+1 coordinate position, id=× element remain at (0,0) position change does not occur for position;
Step 13 calculates MoutCorresponding mapping value Map (Mout) specific method be to calculate M by the same method of formula (12)outInstitute Corresponding variance.
CN201610102071.1A 2016-02-24 2016-02-24 The compound image selection encryption and decryption approaches of a kind of dynamic probability and null tone domain Active CN105761198B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610102071.1A CN105761198B (en) 2016-02-24 2016-02-24 The compound image selection encryption and decryption approaches of a kind of dynamic probability and null tone domain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610102071.1A CN105761198B (en) 2016-02-24 2016-02-24 The compound image selection encryption and decryption approaches of a kind of dynamic probability and null tone domain

Publications (2)

Publication Number Publication Date
CN105761198A CN105761198A (en) 2016-07-13
CN105761198B true CN105761198B (en) 2019-03-05

Family

ID=56331121

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610102071.1A Active CN105761198B (en) 2016-02-24 2016-02-24 The compound image selection encryption and decryption approaches of a kind of dynamic probability and null tone domain

Country Status (1)

Country Link
CN (1) CN105761198B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106485742B (en) * 2016-07-26 2019-08-23 上海海洋大学 A kind of remote sensing images encryption search method based on Arnold chaotic maps
CN106600517B (en) * 2016-11-11 2019-06-11 陕西师范大学 The close figure of a kind of multichip carrier based on EMD-3 point is deposited and reconstructing method
CN110197077B (en) * 2019-05-31 2020-12-11 长春理工大学 Region-of-interest medical image chaotic encryption method based on information entropy updating key
CN111865908B (en) * 2020-06-08 2022-05-17 杭州电子科技大学 Resource-constrained system secure communication method based on random encryption strategy
CN113344853B (en) * 2021-05-06 2024-03-12 东南大学 Robustness detection method based on random displacement algorithm brain image histology
CN114153411B (en) * 2021-12-02 2024-01-12 上海交通大学 Remote terminal control-oriented image optimization transmission system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20040073045A (en) * 2003-02-13 2004-08-19 주식회사 디지트리얼테크놀로지 Data Hiding and Extraction System Using JND and CSF
CN1885342A (en) * 2006-06-21 2006-12-27 北京交通大学 Print domain trademark anti-counterfeit method based on digital watermark technology
CN103402040A (en) * 2013-08-06 2013-11-20 浙江农林大学 Spatial domain and Fourier frequency domain double encryption-based dual image encryption method
CN103929563A (en) * 2014-04-11 2014-07-16 陕西师范大学 Image encryption and decryption method based on improved Joseph traversal and generalized Henon mapping
CN104851070A (en) * 2015-05-08 2015-08-19 陕西师范大学 Foreground and background separation-based image encryption and decryption methods

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20040073045A (en) * 2003-02-13 2004-08-19 주식회사 디지트리얼테크놀로지 Data Hiding and Extraction System Using JND and CSF
CN1885342A (en) * 2006-06-21 2006-12-27 北京交通大学 Print domain trademark anti-counterfeit method based on digital watermark technology
CN103402040A (en) * 2013-08-06 2013-11-20 浙江农林大学 Spatial domain and Fourier frequency domain double encryption-based dual image encryption method
CN103929563A (en) * 2014-04-11 2014-07-16 陕西师范大学 Image encryption and decryption method based on improved Joseph traversal and generalized Henon mapping
CN104851070A (en) * 2015-05-08 2015-08-19 陕西师范大学 Foreground and background separation-based image encryption and decryption methods

Also Published As

Publication number Publication date
CN105761198A (en) 2016-07-13

Similar Documents

Publication Publication Date Title
CN105761198B (en) The compound image selection encryption and decryption approaches of a kind of dynamic probability and null tone domain
Wu et al. An improved reversible data hiding in encrypted images using parametric binary tree labeling
CN106600518B (en) Compressed sensing based visual security and the image encryption of data safety, decryption method
CN108322622B (en) Color digital image encryption method based on 2D-VMD and eight-dimensional hyper-chaotic system
Parameshachari et al. Partial image encryption algorithm using pixel position manipulation technique: The smart copyback system
CN105681622A (en) Color image encryption method based on cellular neural network hyperchaos and DNA sequence
CN112906043B (en) Image encryption method based on chaotic mapping and chaotic S-box substitution
CN105577354A (en) Image encryption and decryption method based on probability interval division and dynamic probability events
CN105917381B (en) Cryptography crack method and device based on double random phase image encoding system
CN108566501B (en) Color image encryption method based on mixed domain and LSS type coupling mapping grid
CN113271469B (en) Safety and reversible video privacy safety protection system and protection method
CN108737685A (en) A kind of image encryption method of the adaptation mechanism based on chaos
Chen et al. Error-free separable reversible data hiding in encrypted images using linear regression and prediction error map
CN114389788B (en) Image encryption algorithm with mixed chaos and block scrambling
Hassan Proposed hyperchaotic system for image encryption
Qiu et al. Reversible data hiding in encrypted images with dual data embedding
Ren et al. Separable reversible data hiding in homomorphic encrypted domain using POB number system
CN105553639B (en) The compressed sensing based more image encryptions of one kind and decryption method
Wang et al. New color image cryptosystem via SHA-512 and hybrid domain
Panchikkil et al. A pseudo-random pixel mapping with weighted mesh graph approach for reversible data hiding in encrypted image
Alsaedi Colored image encryption and decryption using multi-chaos 2D quadratic strange attractors and matrix transformations
CN109657484B (en) Multi-channel image coding and decoding method based on gamma function and ciphertext splicing
Yi et al. Adaptive code embedding for reversible data hiding in encrypted images
Chiu et al. An XOR-based progressive visual cryptography with meaningful shares
CN115190216A (en) Encryption image reversible data hiding and decrypting method based on prediction error map

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant