CN106127669B - Based on the New chaotic image encryption method for protecting area B aker mapping - Google Patents
Based on the New chaotic image encryption method for protecting area B aker mapping Download PDFInfo
- Publication number
- CN106127669B CN106127669B CN201610508547.1A CN201610508547A CN106127669B CN 106127669 B CN106127669 B CN 106127669B CN 201610508547 A CN201610508547 A CN 201610508547A CN 106127669 B CN106127669 B CN 106127669B
- Authority
- CN
- China
- Prior art keywords
- sequence
- image
- pixel
- mapping
- segmentation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 40
- 238000013507 mapping Methods 0.000 title claims abstract description 20
- 230000000739 chaotic effect Effects 0.000 title claims abstract description 17
- 230000011218 segmentation Effects 0.000 claims description 15
- 230000009466 transformation Effects 0.000 claims description 6
- 238000006243 chemical reaction Methods 0.000 claims description 4
- 230000021615 conjugation Effects 0.000 claims 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000004087 circulation Effects 0.000 description 1
- 239000002131 composite material Substances 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Facsimile Transmission Control (AREA)
Abstract
The present invention relates to a kind of image encryption methods, in particular to a kind of New chaotic image encryption method based on guarantor's area B aker mapping, this method process is simple, can not only enhance Space-time Complexity, Computer Precision restricted problem is solved, and is capable of increasing the complexity of Encryption Algorithm.Simultaneously because chaos system uses the quantumchaoticsystem more complicated than common chaos in text, in quantumchaoticsystem, the addition of disturbance quantity is so that chaos system aperiodicity is more preferable, sequence randomness is stronger, at the same common chaos system have " fixed point " and " stability window " the problem of be also improved and solve.
Description
Technical field
It is the present invention relates to a kind of image encryption method, in particular to a kind of based on the chaos image for protecting area B aker mapping
Encryption method.
Background technique
Conventional encryption methods (such as DES, RSA etc.) are all used in the lesser environment of data volume, although can effective protection it is more
Media copy enhances Information Security.But multi-medium data (including video, audio, image etc.) correlation is strong, and data volume is big.
Using conventional encryption methods, a large amount of overheads are needed in most occasions.Therefore, any behaviour for being likely to increase algorithm complexity
Make, will all drag down the efficiency of entire encryption system, influence practical function.
Chaos system is very sensitive to initial value, and slight variation occurs for original state, the generated chaos after iteration
Sequence is made a world of difference.And chaos sequence also has good randomness, and this two dot characteristics and cryptographic key uncertainty require contract
It closes.The mixed characteristic of chaotic orbit also matches with diffusivity in encryption system.Association on theoretical characteristics allows the two to be combined into
For certainty.Theoretically, chaos system generates random number series and is infinitely, does not recycle, the sequence of no periodic;And in fact, meter
Calculation machine is limited by computational accuracy, each operation all can lost part data, generate certain error.At this stage, it has been proposed that below
The new New chaotic image encryption method of three classes: 1, it is based on complicated chaotic systems image encryption method.Such as: being carried out first based on hyperchaotic system
Spread encryption method etc. twice afterwards.2, image encryption method is carried out in the transform domain as illustrated.Such as: DC coefficient being diffused in conjunction with DCT
And scrambling encryption method, the satellite chaos encrypting method based on WT, based on FrWT New chaotic image encryption method etc..3, it is based on quantum
Chaos system image encryption method.Such as: image being encrypted using the physical process of quantum chaos, with quantum chaotic sea
Equation is to image encryption.
Summary of the invention
The purpose of the present invention is to overcome the shortcomings of the existing technology and deficiency, provides a kind of based on guarantor's area B aker mapping
New chaotic image encryption method.This method process is simple, can not only enhance Space-time Complexity, solves Computer Precision limitation and asks
Topic, and it is capable of increasing the complexity of Encryption Algorithm.Simultaneously because chaos system is using more complicated than common chaos in text
Quantumchaoticsystem, in quantumchaoticsystem, the addition of disturbance quantity is so that chaos system aperiodicity is more preferable, and sequence randomness is more
By force, while commonly the problem of chaos system has " fixed point " and " stability window ", is also improved and solves.
A kind of New chaotic image encryption method based on guarantor's area B aker mapping, comprising the following steps:
(1) input size be N × M pixel original image, define here each pixel length and it is wide be 1.
(2) segmented image: image is divided into k in the horizontal direction, and (k is positive integer that can be evenly divisible by N, can arbitrarily be defined full
The number required enough) small rectangular block, each rectangular block has N × niA pixel, the width of each rectangular block is m after segmentation.It will segmentation
Small rectangular block afterwards continues on vertical direction and is divided into niA sub-block.It include N × n in each large rectangular blockiA pixel, point
The length for cutting rear sub-block is n.Therefore it is divided into n againiAfter a small rectangle, each small rectangle just has N number of pixel, after segmentation
Sub-block size is n × m.
(3) in the rectangular block of n × m size after each segmentation, according to sequence is successively read from top to bottom from left to right,
Obtain the position sequence of following pixel:
It recycles and protects area B aker mapping successively to the progress operation of its pixel.Successively to each rectangular block after segmentation
Baker mapping operations are carried out according to the method described above.Complete a Baker mapping scramble operation.For meet practical application need by
Whole image repeatedly carries out scramble, number is defined as S here, and (its size, which can according to need, to be set using S as one of key
It is fixed, it is contemplated that number will affect performance too much, and scramble number takes between 50~200 times in actual use).It is protected used in it
Area B aker mapping is as follows:
To use Baker mapping in this method, need to being mapped into some transformation of row, x ∈ (0,1) in original mapping,
To adapt to this method, need to be expanded.Obtain following guarantor's area B aker mapping.
(4) each pixel of image after scramble is read in the form of one-dimension array C, by pixel binary form
The element being expressed as in one-dimension array C.
(5) by external key xo,y0,z0,r0, β is iterated as the initial value of quantum Logistic chaos system, gives up
Abandon the first k times value for starting iteration (k value here uses the k in (1) step for convenience's sake).Iteration N × M times again, and
By the x of each iteration, the value of y, z are stored in EX respectively, and in tri- sequences of EY, EZ, wherein EX indicates the chaos sequence on the direction x
Column, EY indicate that the chaos sequence on the direction y, EZ indicate the chaos sequence on the direction z.Quantum Logistic chaos system is as follows:
R is adjustable parameter in formula, and β is Dissipation Parameters, xn、yn、znIt is the state value of system,It is x respectivelynAnd zn
Complex conjugate.System parameter value range r ∈ (3.74,4.00), β >=3.5, state value x ∈ (0,1), y ∈ (0,0.2461), z
The value of ∈ (0,0.2461) these parameters can be arbitrarily selected under the premise of meeting conditions above.
(6) then EX, these three sequences of EY, EZ are into such as down conversion:
Transformation obtains FX, FY, FZ sequence.The purpose of transformation is that the small Number Sequence that will be obtained is converted into integer sequence, in order to
Facilitate subsequent calculating, there is also the need to the sequence of decimal form is converted into binary form.
(7) by FXiExclusive or FYi, then by result exclusive or FZ againiObtain ciphering sequence P.
(8) following formula operation then is carried out to image sequence C after scramble:
Ciphering sequence C can be obtained1。
(9) encrypted sequence is reverted to image, completes whole image ciphering process.
Encryption research is carried out to image using a kind of composite chaotic Encryption Algorithm herein.First mapped using guarantor area B akert
Multiple piecemeal scramble is carried out to image, exclusive or encryption fortune is carried out to image after scramble in conjunction with quantum Logistic chaos system
It calculates, uses this new resume image for the first time.Quantum Logistic chaos system physical structure used herein is opposite
Simply, but in quantumchaoticsystem the presence of disturbance quantity makes mission nonlinear kinetic characteristics complexity, while also solving
Computer Precision loses problem, increases the difficulty of decoding.And the algorithm for encryption works well, and sensibility is strong.Therefore, the party
Safety of image can be effectively protected in method.
Detailed description of the invention
Fig. 1 is entire ciphering process flow chart;
Fig. 2 is original image before encrypting;
Fig. 3 is image after whole scramble;
Fig. 4 is the image completed after ciphering process.
Specific embodiment
Present invention will now be described in further detail with reference to the embodiments and the accompanying drawings, but embodiments of the present invention are unlimited
In this.
Embodiment
Such as Fig. 1, the detailed process of image encryption is carried out such as based on the New chaotic image encryption method for protecting area B aker mapping
Under:
(1) choosing the image that as above size shown in Fig. 2 is 256 × 256 is experimental subjects.
(2) segmented image: setting k value chooses k=32 here.In the horizontal direction picture segmentation at 32 rectangular blocks.Often
A rectangular block has 256 × 8 pixels.Image is divided into along the vertical direction again 8 rectangular blocks, then each small rectangle by
256 pixel compositions, the size of each rectangular block are 32 × 8.
(3) in the rectangular block of 32 × 8 sizes after each segmentation, according to sequence is successively read from top to bottom from left to right
The position (coordinate of i.e. first pixel be (0,0), and so on) of each pixel obtains following sequence:
Operation successively is carried out to it using area B aker mapping is protected to each coordinate, obtains the new position of the coordinate.
And rearrange pixel according to each new position, complete the ciphering process of the small rectangular block.Again to all segmentations after
Small rectangular block in each pixel carry out above-mentioned same operation, complete the wheel scramble operation.To reach better encryption
Effect need to carry out multiple scramble to whole image, and secondary numerical value S value is 83 here, 83 circulations be carried out to scrambling encryption, to figure
As carrying out multiple scramble.After completing entire scrambling process, image is as shown in Figure 3.
(4) the image after scramble in the form of one-dimension array C from top to bottom, sequence from left to right is read, obtain as
Under one-dimension array C=00101101,0101110,10111010,11011011 ..., C256×256}。
(5) generate ciphering sequence: ciphering sequence is obtained by quantum Logistic chaotic maps iteration, in this example use with
Lower parameter: x0=0.85845654, y0=0.03624551548, z0=0.02548634197 r0=3.821, β0=4.231 make
For the initial value iteration of quantum Logistic chaos system.Primary iteration value is substituted into quantum Logistic chaotic maps equation
In, give up preceding 16 values, then iteration 256*256 times again, the iterative value of x is taken to obtain chaos sequence EX=
{0.8319321839,0.8081942841,0.7391382913…,EX256×256, take the iterative value of y to obtain chaos sequence EY
={ 0.0321817542,0.0301387401,0.0279164138 ..., EY256×256, take the iterative value of z to obtain chaos sequence
EZ={ 0.0235964183,0.0211387403,0.0207916438 ..., Y256×256}。
(6) then EX, these three sequences of EY, EZ are into such as down conversion:
Transformation obtains sequence:
FX={ 839,841,913 ..., FX256×256,
FY={ 542,401,138 ..., FY256×256,
FZ={ 183,403,438 ..., FZ256×256};
Decimal sequence is converted to binary sequence, because of 8 images that image is, be converted into here two into
During system, in sequence conversion, binary first 8 are only taken to encrypt.It obtains:
FX={ 11010001,11010010,11100100 ..., FX256×256,
FY={ 10000111,11001000,10001010 ..., FY256×256,
FZ={ 10110111,11001001,11011011 ..., FZ256×256}
(7) FX is usediExclusive or FYiExclusive or FZ againiObtain sequence:
P={ 11100001,11010011,10110101..., P256×256}。
(8) image sequence C after scramble is carried outOperation, (by
There is no preceding paragraph in first element, therefore first element does not do the XOR operation in above formula.) encrypted according to the above operation
Sequence C1=00001110,00101100,10000001 ... .C256×256}。
(9) encrypted sequence is reverted to image again, as shown in figure 4 above, completes this image encryption process.
The above embodiment is a preferred embodiment of the present invention, but embodiments of the present invention are not by above-described embodiment
Limitation, other any changes, modifications, substitutions, combinations, simplifications made without departing from the spirit and principles of the present invention,
It should be equivalent substitute mode, be included within the scope of the present invention.
Claims (3)
1. a kind of based on the New chaotic image encryption method for protecting area B aker mapping, comprising the following steps:
(1) input size is the original image of N × M pixel;
(2) segmented image, the sub-block size after segmentation are n × m;
(3) it in the rectangular block of n × m size after each segmentation, according to sequence is successively read from top to bottom from left to right, obtains
The position sequence of following pixel:
It recycles and protects area B aker mapping successively to the progress operation of its pixel, successively each rectangular block after segmentation is carried out
Baker mapping operations complete a Baker mapping scramble operation, protect area B aker mapping are as follows:
(4) each pixel of image after scramble is read in the form of one-dimension array C, pixel is indicated with binary form
At the element in one-dimension array C;
(5) by external key x0,y0,z0,r0, β is iterated as the initial value of quantum Logistic chaos system, gives up beginning
First k times value of iteration, then iteration N × M times, and by the x of each iteration, the value of y, z are stored in EX, tri- sequences of EY, EZ respectively
In column, wherein EX indicates that the chaos sequence on the direction x, EY indicate that the chaos sequence on the direction y, EZ indicate the chaos on the direction z
Sequence, quantum Logistic chaos system are as follows:
Z is adjustable parameter in formula, and β is Dissipation Parameters, xn、yn、znIt is the state value of system,It is x respectivelynAnd znAnswer
Conjugation, system parameter value range r ∈ (3.74,4.00), β >=3.5, state value x ∈ (0,1), y ∈ (0,0.2461), z ∈
The value of (0,0.2461) these parameters can be arbitrarily selected under the premise of meeting conditions above;
(6) then EX, these three sequences of EY, EZ are into such as down conversion:
(7) transformation obtains FX, and FY, FZ sequence, the purpose of transformation is that the small Number Sequence that will be obtained is converted into integer sequence, for side
Just subsequent calculating, there is also the need to the sequence of decimal form is converted into binary form;
(8) by FXiExclusive or FYi, then by result exclusive or FZ againiObtain ciphering sequence P;
(9) following formula operation then is carried out to image sequence C after scramble:
Ciphering sequence C can be obtained1;
(10) encrypted sequence is reverted to image, completes whole image ciphering process.
2. New chaotic image encryption method according to claim 1, it is characterised in that: the length of each pixel and it is wide be 1.
3. New chaotic image encryption method according to claim 1, it is characterised in that: image is divided into k in the horizontal direction
Small rectangular block, k are positive integers that can be evenly divisible by N, can arbitrarily define the number met the requirements, each rectangular block has N × niA pixel,
The width of each rectangular block is m after segmentation, and the small rectangular block after segmentation is continued on vertical direction and is divided into niA sub-block, In
It include N × n in each large rectangular blockiA pixel, the length of sub-block is n after segmentation, therefore is divided into n againiA small rectangle
Afterwards, each small rectangle just has N number of pixel, and the sub-block size after segmentation is n × m.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610508547.1A CN106127669B (en) | 2016-06-29 | 2016-06-29 | Based on the New chaotic image encryption method for protecting area B aker mapping |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610508547.1A CN106127669B (en) | 2016-06-29 | 2016-06-29 | Based on the New chaotic image encryption method for protecting area B aker mapping |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106127669A CN106127669A (en) | 2016-11-16 |
CN106127669B true CN106127669B (en) | 2019-10-29 |
Family
ID=57468577
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610508547.1A Expired - Fee Related CN106127669B (en) | 2016-06-29 | 2016-06-29 | Based on the New chaotic image encryption method for protecting area B aker mapping |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106127669B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106683041B (en) * | 2016-12-12 | 2023-03-07 | 长春理工大学 | Quantum image miscut method based on NEQR expression |
CN111444522B (en) * | 2020-03-19 | 2024-02-27 | 南昌大学 | Random blocking chaotic image encryption method |
CN114157774B (en) * | 2021-11-23 | 2023-03-21 | 西南大学 | Image encryption method based on quantum Baker mapping and sine chaotization model |
CN114221756A (en) * | 2021-11-23 | 2022-03-22 | 西南大学 | Synchronous image encryption and fusion method based on quantum Baker mapping |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070189518A1 (en) * | 2005-03-30 | 2007-08-16 | Nanni Richard A | 3-D quaternion quantum fractal encryption |
CN102123026A (en) * | 2011-04-12 | 2011-07-13 | 南开大学 | Chaos and hyperchaos based two-level video streaming media encryption method |
CN102360488B (en) * | 2011-09-29 | 2013-02-13 | 付冲 | Digital image encryption method based on chaotic orbit perturbation |
CN103916234B (en) * | 2014-04-11 | 2016-09-07 | 中国人民解放军沈阳军区总医院 | A kind of chaos medical image encryption method being applied to secret protection |
CN105631796B (en) * | 2015-12-17 | 2019-04-16 | 广东工业大学 | Quantum chaos image encryption method based on bit scramble |
-
2016
- 2016-06-29 CN CN201610508547.1A patent/CN106127669B/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
CN106127669A (en) | 2016-11-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Man et al. | Double image encryption algorithm based on neural network and chaos | |
Xian et al. | Double parameters fractal sorting matrix and its application in image encryption | |
Zhan et al. | Cross-utilizing hyperchaotic and DNA sequences for image encryption | |
Li et al. | Asymmetric multiple-image encryption based on the cascaded fractional Fourier transform | |
CN106127669B (en) | Based on the New chaotic image encryption method for protecting area B aker mapping | |
CN103248854B (en) | Based on the medical image encryption method of even scramble and chaotic maps | |
CN106709854B (en) | Image information fusion encryption method based on cat face transformation and chaos | |
CN108199828B (en) | Method and device for encrypting color picture | |
CN101604439A (en) | A kind of color image encrypting method based on multi-chaos system | |
CN106651976B (en) | A kind of image encryption method based on cluster and chaos | |
Murugan et al. | A hybrid image encryption algorithm using chaos and Conway's game‐of‐life cellular automata | |
CN110225222B (en) | Image encryption method based on 3D orthogonal Latin square and chaotic system | |
Sinha et al. | Chaotic image encryption scheme based on modified arnold cat map and henon map | |
Sun et al. | An image encryption algorithm utilizing Mandelbrot set | |
Ali et al. | 3D Content Encryption Using Multi-Level Chaotic Maps | |
CN106530362A (en) | Calculating integral imaging technology and Fourier transform optical image encryption method | |
CN110473214A (en) | Image scrambling and restoration methods based on Ramanujan matrix | |
Zhuang et al. | A new digital image encryption algorithm based on improved logistic mapping and Josephus circle | |
Jiang et al. | Compressive-sensing-based double-image encryption algorithm combining double random phase encoding with Josephus traversing operation | |
Agarwal | Cryptographic key generation using burning ship fractal | |
Hu et al. | Research on encrypted face recognition algorithm based on new combined chaotic map and neural network | |
Li et al. | A Novel Scheme for the Preview of the Image Encryption Based on Chaotic Ikeda Map. | |
Yassir et al. | Hybrid Image Encryption Technique for Securing Color Images Transmitted Over Cloud Networks. | |
Paul et al. | RGB image encryption by using discrete log with and Lorenz's chaotic function | |
Ali et al. | Multi-level encryption for 3D mesh model based on 3D Lorenz chaotic map and random number generator. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20191029 Termination date: 20200629 |
|
CF01 | Termination of patent right due to non-payment of annual fee |