CN106127669B - Based on the New chaotic image encryption method for protecting area B aker mapping - Google Patents

Based on the New chaotic image encryption method for protecting area B aker mapping Download PDF

Info

Publication number
CN106127669B
CN106127669B CN201610508547.1A CN201610508547A CN106127669B CN 106127669 B CN106127669 B CN 106127669B CN 201610508547 A CN201610508547 A CN 201610508547A CN 106127669 B CN106127669 B CN 106127669B
Authority
CN
China
Prior art keywords
sequence
image
chaotic
divided
mapping
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201610508547.1A
Other languages
Chinese (zh)
Other versions
CN106127669A (en
Inventor
谢国波
杨彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong University of Technology
Original Assignee
Guangdong University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong University of Technology filed Critical Guangdong University of Technology
Priority to CN201610508547.1A priority Critical patent/CN106127669B/en
Publication of CN106127669A publication Critical patent/CN106127669A/en
Application granted granted Critical
Publication of CN106127669B publication Critical patent/CN106127669B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Facsimile Transmission Control (AREA)

Abstract

The present invention relates to a kind of image encryption methods, in particular to a kind of New chaotic image encryption method based on guarantor's area B aker mapping, this method process is simple, can not only enhance Space-time Complexity, Computer Precision restricted problem is solved, and is capable of increasing the complexity of Encryption Algorithm.Simultaneously because chaos system uses the quantumchaoticsystem more complicated than common chaos in text, in quantumchaoticsystem, the addition of disturbance quantity is so that chaos system aperiodicity is more preferable, sequence randomness is stronger, at the same common chaos system have " fixed point " and " stability window " the problem of be also improved and solve.

Description

基于保面积Baker映射的混沌图像加密方法Chaotic Image Encryption Method Based on Area Preserving Baker Map

技术领域technical field

本发明涉及一种图像加密方法,特别涉及一种基于保面积Baker映射的混沌图像加密方法。The invention relates to an image encryption method, in particular to a chaotic image encryption method based on area-preserving Baker mapping.

背景技术Background technique

传统加密方法(如DES,RSA等)都是用在数据量较小的环境,虽然能够有效保护多媒体版权,增强数据安全性。但多媒体数据(包括视频,音频,图像等)相关性强,数据量大。使用传统加密方法,在多数场合需要大量系统开销。因此,任何有可能增加算法复杂度的操作,都将拉低整个加密系统的效率,影响实用效果。Traditional encryption methods (such as DES, RSA, etc.) are used in an environment with a small amount of data, although they can effectively protect multimedia copyrights and enhance data security. However, multimedia data (including video, audio, image, etc.) has strong correlation and a large amount of data. Using traditional encryption methods requires a lot of system overhead in most occasions. Therefore, any operation that may increase the complexity of the algorithm will reduce the efficiency of the entire encryption system and affect the practical effect.

混沌系统对初始值非常敏感,初始状态发生轻微的变化,经迭代后所产生的混沌序列大不一样。而且混沌序列亦有良好随机性,此两点特性与密码学密钥不确定性要求契合。混沌轨道的混合特性亦与加密体制中扩散性相吻合。理论特性上的关联让二者结合成为必然。从理论上讲,混沌系统产生随机数列是无限、不循环、无周期的序列;而实际上,计算机受计算精度限制,每次运算都会丢失部分数据,产生一定误差。现阶段,人们提出以下三类新混沌图像加密方法:1、基于复杂混沌系统图像加密方法。如:基于超混沌系统进行先后两次扩散加密方法等。2、在变换域中进行图像加密方法。如:结合DCT对DC系数进行扩散和置乱加密方法,基于WT的卫星混沌加密方法,基于FrWT混沌图像加密方法等。3、基于量子混沌系统图像加密方法。如:使用量子混沌的物理过程对图像进行加密,用量子混沌非线性方程对图像加密。The chaotic system is very sensitive to the initial value, the initial state changes slightly, and the chaotic sequence produced after iteration is quite different. Moreover, the chaotic sequence also has good randomness, and these two characteristics meet the requirements of cryptographic key uncertainty. The mixed nature of the chaotic orbit also coincides with the diffusion in the encryption system. The correlation of theoretical characteristics makes the combination of the two inevitable. Theoretically speaking, the random number sequence generated by the chaotic system is an infinite, non-cyclic, and non-periodic sequence; but in fact, the computer is limited by the calculation accuracy, and each operation will lose part of the data, resulting in a certain error. At present, people propose the following three new chaotic image encryption methods: 1. Image encryption methods based on complex chaotic systems. Such as: two successive diffusion encryption methods based on the hyper-chaotic system, etc. 2. Carry out image encryption method in transform domain. Such as: combined with DCT to diffuse and scramble the DC coefficient encryption method, WT-based satellite chaotic encryption method, FrWT-based chaotic image encryption method, etc. 3. Image encryption method based on quantum chaotic system. Such as: use the physical process of quantum chaos to encrypt the image, and use the nonlinear equation of quantum chaos to encrypt the image.

发明内容Contents of the invention

本发明的目的在于克服现有技术的缺点与不足,提供一种基于保面积Baker映射的混沌图像加密方法。该方法过程简单,不仅能够增强时空复杂度,解决计算机精度限制问题,而且能够增大加密算法的复杂性。同时由于文中混沌系统采用比普通混沌更加复杂的量子混沌系统,量子混沌系统中,扰动量的加入使得混沌系统非周期性更好,序列随机性更强,同时普通混沌系统具有的“固定点”和“稳定窗”的问题也得到了改善和解决。The purpose of the present invention is to overcome the shortcomings and deficiencies of the prior art, and provide a chaotic image encryption method based on area-preserving Baker mapping. The process of the method is simple, not only can enhance the space-time complexity, solve the problem of computer precision limitation, but also can increase the complexity of the encryption algorithm. At the same time, because the chaotic system in this paper uses a quantum chaotic system that is more complex than ordinary chaos, the addition of disturbances in the quantum chaotic system makes the chaotic system more non-periodic, and the sequence randomness is stronger. At the same time, the "fixed point" of the ordinary chaotic system And "stability window" issues have also been improved and resolved.

一种基于保面积Baker映射的混沌图像加密方法,包括以下步骤:A chaotic image encryption method based on area-preserving Baker mapping, comprising the following steps:

(1)输入大小为N×M像素的原始图像,这里定义每个像素点的长和宽均为1。(1) Input the original image whose size is N×M pixels, where the length and width of each pixel are defined as 1.

(2)分割图像:图像沿水平方向分割成k个(k是能被N整除的正整数,可任意定义满足要求的数)小矩形块,每个矩形块有N×ni个像素,分割后每个矩形块的宽度为m。将分割后的小矩形块继续沿着竖直方向分割成ni个子块。在每个大矩形块内包含N×ni个像素,分割后子块的长度为n。因此再将其分割成ni个小矩形后,每个小矩形恰有N个像素,分割后的子块大小为n×m。(2) Segmented image: the image is divided into k (k is a positive integer divisible by N, which can be arbitrarily defined to meet the requirements) small rectangular blocks along the horizontal direction, and each rectangular block has N×n i pixels. After that, the width of each rectangular block is m. The divided small rectangular block is further divided into n i sub-blocks along the vertical direction. Each large rectangular block contains N×n i pixels, and the length of the divided sub-block is n. Therefore, after it is divided into n i small rectangles, each small rectangle has exactly N pixels, and the size of the divided sub-block is n×m.

(3)在每个分割后的n×m大小的矩形块中,按照从左往右从上往下顺序依次取读,得到如下像素点的位置序列:(3) In each divided rectangular block of n×m size, read and read sequentially from left to right and from top to bottom to obtain the following sequence of pixel positions:

再利用保面积Baker映射依次对其像素进行运算。依次对分割后的每一个矩形块按照上述方法进行Baker映射运算。完成一次Baker映射置乱运算。为满足实际应用需要将整个图像多次进行置乱,这里将次数定义为S,并将S作为密钥之一(其大小可以根据需要设定,考虑到次数太多会影响性能,在实际使用中置乱次数取50~200次之间)。其所使用的保面积Baker映射如下:Then use the area-preserving Baker map to perform operations on its pixels in turn. Carry out the Baker mapping operation on each divided rectangular block sequentially according to the above method. Complete a Baker mapping scrambling operation. In order to meet the needs of practical applications, the entire image needs to be scrambled multiple times. Here, the number of times is defined as S, and S is used as one of the keys (its size can be set according to needs. Considering that too many times will affect performance, in actual use The number of scrambling in the middle is between 50 and 200 times). The area-preserving Baker mapping used is as follows:

为将Baker映射使用到本方法中,需要对映射进行一些变换,原映射中x∈(0,1),为适应本方法,需要将其扩大。得到如下的保面积Baker映射。In order to use the Baker mapping in this method, some transformations are needed on the mapping. In the original mapping, x∈(0,1), in order to adapt to this method, it needs to be enlarged. The following area-preserving Baker map is obtained.

(4)把置乱后图像的每个像素点以一维数组C的形式读取,将像素点用二进制形式表示成一维数组C中的元素。(4) Read each pixel of the scrambled image in the form of a one-dimensional array C, and represent the pixels as elements in the one-dimensional array C in binary form.

(5)由外部密钥xo,y0,z0,r0,β作为量子Logistic混沌系统的初始值进行迭代,舍弃开始迭代的前k次的值(为了方便起见这里的k值使用(1)步骤中的k)。再迭代N×M次,并将每次迭代的x,y,z的值分别保存在EX,EY,EZ三个序列中,其中EX表示x方向上的混沌序列,EY表示y方向上的混沌序列,EZ表示z方向上的混沌序列。量子Logistic混沌系统如下:(5) Use the external key x o , y 0 , z 0 , r 0 , β as the initial value of the quantum Logistic chaotic system to iterate, and discard the value of the first k times of iteration (for convenience, the k value here uses ( 1) k) in step. Iterate again N×M times, and save the values of x, y, and z for each iteration in three sequences of EX, EY, and EZ, where EX represents the chaotic sequence in the x direction, and EY represents the chaos in the y direction sequence, EZ represents the chaotic sequence in the z direction. The quantum logistic chaotic system is as follows:

式中r为可调参数,β是耗散参数,xn、yn、zn是系统的状态值,分别是xn和zn的复共轭。系统参数取值范围r∈(3.74,4.00),β≥3.5,状态值x∈(0,1),y∈(0,0.2461),z∈(0,0.2461)这些参量的值可以在满足以上条件的前提下,任意选定。where r is an adjustable parameter, β is a dissipation parameter, x n , y n , z n are the state values of the system, are the complex conjugates of x n and z n , respectively. The value range of system parameters r∈(3.74,4.00), β≥3.5, state values x∈(0,1), y∈(0,0.2461), z∈(0,0.2461) The values of these parameters can satisfy the above Under the premise of the conditions, it can be selected arbitrarily.

(6)然后把EX,EY,EZ这三个序列进如下变换:(6) Then transform the three sequences of EX, EY, and EZ into the following transformation:

变换得到FX,FY,FZ序列。变换的目的是将得到的小数序列转换成整数序列,为了方便后续的计算,这里还需要将十进制形式的序列转换成二进制形式。Transform to get FX, FY, FZ sequence. The purpose of the transformation is to convert the obtained decimal sequence into an integer sequence. In order to facilitate subsequent calculations, the sequence in decimal form needs to be converted into binary form.

(7)将FXi异或FYi,再将结果再次异或FZi得到加密序列P。(7) XOR FX i to FY i , and then XOR the result to FZ i again to obtain the encrypted sequence P.

(8)然后对置乱后图像序列C进行下式运算:(8) Then perform the following calculation on the scrambled image sequence C:

即可得到加密序列C1The encrypted sequence C 1 can be obtained.

(9)把加密后的序列恢复成图像,完成整个图像加密过程。(9) Restoring the encrypted sequence into an image to complete the entire image encryption process.

本文使用一种复合混沌加密算法对图像进行加密研究。先使用保面积Bakert映射对图像进行多次分块置乱,再结合量子Logistic混沌系统对置乱后图像进行异或加密运算,首次采用了这种新的图像加密算法。文中使用的量子Logistic混沌系统物理结构相对简单,但是量子混沌系统中扰动量的存在使得系统非线性动力学特性复杂,同时也解决了计算机精度丢失问题,加大了破译的难度。而且该算法加密效果良好,敏感性强。因此,该方法能够有效的保护图像安全。In this paper, a composite chaotic encryption algorithm is used to encrypt images. First, the area-preserving Bakert map is used to scramble the image multiple times, and then the quantum Logistic chaotic system is used to perform XOR encryption on the scrambled image. This new image encryption algorithm is used for the first time. The physical structure of the quantum Logistic chaotic system used in this paper is relatively simple, but the existence of disturbances in the quantum chaotic system makes the nonlinear dynamics of the system complex, and also solves the problem of loss of computer precision, which increases the difficulty of deciphering. Moreover, the algorithm has good encryption effect and strong sensitivity. Therefore, this method can effectively protect image security.

附图说明Description of drawings

图1是整个加密过程流程图;Figure 1 is a flowchart of the entire encryption process;

图2是加密前原始图像;Figure 2 is the original image before encryption;

图3是整体置乱后图像;Fig. 3 is the image after overall scrambling;

图4是完成加密过程后的图像。Figure 4 is the image after completing the encryption process.

具体实施方式Detailed ways

下面结合实施例及附图对本发明作进一步详细的描述,但本发明的实施方式不限于此。The present invention will be further described in detail below in conjunction with the embodiments and the accompanying drawings, but the embodiments of the present invention are not limited thereto.

实施例Example

如图1,基于保面积Baker映射的混沌图像加密方法进行图像加密的具体过程如下:As shown in Figure 1, the specific process of image encryption by the chaotic image encryption method based on the area-preserving Baker map is as follows:

(1)选取如上图2所示的大小为256×256的图像为实验对象。(1) Select an image with a size of 256×256 as shown in Figure 2 above as the experimental object.

(2)分割图像:设定k值,这里选取k=32。沿水平方向把图片分割成32个矩形块。每个矩形块有256×8个像素。再把图像沿竖直方向分割成8个矩形块,那么每一个小矩形由256个像素组成,每个矩形块的大小为32×8。(2) Segment the image: set k value, choose k=32 here. Divide the picture into 32 rectangular blocks along the horizontal direction. Each rectangular block has 256×8 pixels. Then divide the image into 8 rectangular blocks along the vertical direction, then each small rectangle consists of 256 pixels, and the size of each rectangular block is 32×8.

(3)在每个分割后的32×8大小的矩形块中,按照从左往右从上往下顺序依次取读每个像素点的位置(即第一个像素点的坐标为(0,0),依次类推)得到如下的序列:(3) In each divided rectangular block of size 32×8, the position of each pixel is sequentially read from left to right and from top to bottom (that is, the coordinates of the first pixel are (0, 0), and so on) to get the following sequence:

依次对每一个坐标利用保面积Baker映射对其进行运算,得到该坐标的新的位置。并将像素点按照每个新的位置重新排列,完成该小矩形块的加密过程。再对所有的分割后的小矩形块中的每个像素点进行上述同样的运算,完成该轮置乱运算。为达到更好的加密效果,需对整个图像进行多次置乱,这里次数值S取值为83,对置乱加密进行83次循环,对图像进行多次置乱。完成整个置乱过程后,图像如图3所示。For each coordinate in turn, use the area-preserving Baker map to perform calculations to obtain the new position of the coordinate. And the pixels are rearranged according to each new position to complete the encryption process of the small rectangular block. Then, the same operation as above is performed on each pixel in all the divided small rectangular blocks to complete this round of scrambling operation. In order to achieve a better encryption effect, the entire image needs to be scrambled multiple times. Here, the value S is 83, and the scrambling encryption is performed 83 times, and the image is scrambled multiple times. After completing the entire scrambling process, the image is shown in Figure 3.

(4)把置乱后的图像以一维数组C的形式从上往下,从左往右的顺序读取,得到如下的一维数组C={00101101,0101110,10111010,11011011,…,C256×256}。(4) Read the scrambled image from top to bottom and from left to right in the form of a one-dimensional array C to obtain the following one-dimensional array C={00101101,0101110,10111010,11011011,...,C 256×256 }.

(5)生成加密序列:加密序列由量子Logistic混沌映射迭代得到,本实例中使用以下参数:x0=0.85845654,y0=0.03624551548,z0=0.02548634197 r0=3.821,β0=4.231作为量子Logistic混沌系统的初始值迭代。将初始迭代值代入量子Logistic混沌映射方程中,舍弃前16次的值,然后再迭代256*256次,取x的迭代值得到混沌序列EX={0.8319321839,0.8081942841,0.7391382913…,EX256×256},取y的迭代值得到混沌序列EY={0.0321817542,0.0301387401,0.0279164138…,EY256×256},取z的迭代值得到混沌序列EZ={0.0235964183,0.0211387403,0.0207916438…,Y256×256}。(5) Generating an encrypted sequence: the encrypted sequence is iteratively obtained by quantum Logistic chaotic mapping, and the following parameters are used in this example: x 0 =0.85845654, y 0 =0.03624551548, z 0 =0.02548634197 r 0 =3.821, β 0 =4.231 as quantum Logistic Initial value iteration for a chaotic system. Substitute the initial iteration value into the quantum Logistic chaotic mapping equation, discard the value of the first 16 times, and then iterate 256*256 times, take the iteration value of x to get the chaotic sequence EX={0.8319321839,0.8081942841,0.7391382913...,EX 256×256 } , take the iterative value of y to get the chaotic sequence EY={0.0321817542,0.0301387401,0.0279164138...,EY 256×256 }, take the iterative value of z to get the chaotic sequence EZ={0.0235964183,0.0211387403,0.0207916438...,Y 6 256}× .

(6)然后把EX,EY,EZ这三个序列进如下变换:(6) Then transform the three sequences of EX, EY, and EZ into the following transformation:

变换得到序列:Transform to get sequence:

FX={839,841,913…,FX256×256},FX={839,841,913...,FX 256×256 },

FY={542,401,138…,FY256×256},FY={542,401,138...,FY 256×256 },

FZ={183,403,438…,FZ256×256};FZ={183,403,438...,FZ 256×256 };

将十进制序列转换得到二进制序列,因为图像是用的8位的图像,这里转换成二进制的过程中,在序列转换时,只取二进制的前8位来加密。得到:The decimal sequence is converted to a binary sequence, because the image is an 8-bit image. In the process of converting to binary, only the first 8 bits of the binary are used for encryption during sequence conversion. get:

FX={11010001,11010010,11100100…,FX256×256},FX={11010001,11010010,11100100...,FX 256×256 },

FY={10000111,11001000,10001010…,FY256×256},FY={10000111,11001000,10001010...,FY 256×256 },

FZ={10110111,11001001,11011011…,FZ256×256}FZ={10110111,11001001,11011011...,FZ 256×256 }

(7)使用FXi异或FYi再次异或FZi得到序列:(7) Use FX i to XOR FY i to XOR FZ i again to get the sequence:

P={11100001,11010011,10110101...,P256×256}。P={11100001,11010011,10110101...,P 256×256 }.

(8)对置乱后图像序列C进行运算,(由于第一个元素没有前项,因此第一个元素不做上式中的异或运算。)按照以上运算得到加密序列C1={00001110,00101100,10000001,....C256×256}。(8) Perform scrambled image sequence C Operation, (since the first element has no preceding item, so the first element does not perform the XOR operation in the above formula.) According to the above operation, the encrypted sequence C 1 ={00001110,00101100,10000001,....C 256 ×256 }.

(9)把加密后的序列再恢复成图像,如上图4所示,完成这个图像加密过程。(9) Restore the encrypted sequence into an image, as shown in Figure 4 above, to complete the image encryption process.

上述实施例为本发明较佳的实施方式,但本发明的实施方式并不受上述实施例的限制,其他的任何未背离本发明的精神实质与原理下所作的改变、修饰、替代、组合、简化,均应为等效的置换方式,都包含在本发明的保护范围之内。The above-mentioned embodiment is a preferred embodiment of the present invention, but the embodiment of the present invention is not limited by the above-mentioned embodiment, and any other changes, modifications, substitutions, combinations, Simplifications should be equivalent replacement methods, and all are included in the protection scope of the present invention.

Claims (3)

1.一种基于保面积Baker映射的混沌图像加密方法,包括以下步骤:1. A chaotic image encryption method based on area-preserving Baker mapping, comprising the following steps: (1)输入大小为N×M像素的原始图像;(1) The input size is an original image of N×M pixels; (2)分割图像,分割后的子块大小为n×m;(2) Segment the image, and the sub-block size after segmentation is n×m; (3)在每个分割后的n×m大小的矩形块中,按照从左往右从上往下顺序依次取读,得到如下像素点的位置序列:(3) In each divided rectangular block of n×m size, read and read sequentially from left to right and from top to bottom to obtain the following sequence of pixel positions: 再利用保面积Baker映射依次对其像素进行运算,依次对分割后的每一个矩形块进行Baker映射运算,完成一次Baker映射置乱运算,保面积Baker映射为:Then use the area-preserving Baker mapping to perform operations on its pixels in turn, and perform Baker mapping operations on each of the divided rectangular blocks in turn to complete a Baker mapping scrambling operation. The area-preserving Baker mapping is: (4)把置乱后图像的每个像素点以一维数组C的形式读取,将像素点用二进制形式表示成一维数组C中的元素;(4) read each pixel of the scrambled image in the form of a one-dimensional array C, and represent the pixel in binary form as an element in the one-dimensional array C; (5)由外部密钥x0,y0,z0,r0,β作为量子Logistic混沌系统的初始值进行迭代,舍弃开始迭代的前k次的值,再迭代N×M次,并将每次迭代的x,y,z的值分别保存在EX,EY,EZ三个序列中,其中EX表示x方向上的混沌序列,EY表示y方向上的混沌序列,EZ表示z方向上的混沌序列,量子Logistic混沌系统如下:(5) Use the external key x 0 , y 0 , z 0 , r 0 , β as the initial value of the quantum Logistic chaotic system to iterate, discard the value of the first k times of iteration, and then iterate N×M times, and set The values of x, y, and z for each iteration are stored in three sequences EX, EY, and EZ, where EX represents the chaotic sequence in the x direction, EY represents the chaotic sequence in the y direction, and EZ represents the chaotic sequence in the z direction The sequence, quantum Logistic chaotic system is as follows: 式中z为可调参数,β是耗散参数,xn、yn、zn是系统的状态值,分别是xn和zn的复共轭,系统参数取值范围r∈(3.74,4.00),β≥3.5,状态值x∈(0,1),y∈(0,0.2461),z∈(0,0.2461)这些参量的值可以在满足以上条件的前提下,任意选定;In the formula, z is an adjustable parameter, β is a dissipation parameter, x n , y n , z n are the state values of the system, are the complex conjugates of x n and z n respectively, the value range of system parameters r∈(3.74,4.00), β≥3.5, the state value x∈(0,1), y∈(0,0.2461), z∈( 0,0.2461) The values of these parameters can be selected arbitrarily under the premise of satisfying the above conditions; (6)然后把EX,EY,EZ这三个序列进如下变换:(6) Then the three sequences of EX, EY, and EZ are transformed as follows: (7)变换得到FX,FY,FZ序列,变换的目的是将得到的小数序列转换成整数序列,为了方便后续的计算,这里还需要将十进制形式的序列转换成二进制形式;(7) transform to obtain FX, FY, FZ sequence, the purpose of transformation is to convert the obtained decimal sequence into an integer sequence, in order to facilitate subsequent calculations, the sequence in decimal form needs to be converted into binary form here; (8)将FXi异或FYi,再将结果再次异或FZi得到加密序列P;(8) XOR FX i to FY i , and then XOR the result to FZ i again to obtain the encrypted sequence P; (9)然后对置乱后图像序列C进行下式运算:(9) Then perform the following calculation on the scrambled image sequence C: 即可得到加密序列C1The encrypted sequence C 1 can be obtained; (10)把加密后的序列恢复成图像,完成整个图像加密过程。(10) Restoring the encrypted sequence into an image to complete the entire image encryption process. 2.根据权利要求1所述的混沌图像加密方法,其特征在于:每个像素点的长和宽均为1。2. The chaotic image encryption method according to claim 1, characterized in that: the length and width of each pixel are 1. 3.根据权利要求1所述的混沌图像加密方法,其特征在于:图像沿水平方向分割成k个小矩形块,k是能被N整除的正整数,可任意定义满足要求的数,每个矩形块有N×ni个像素,分割后每个矩形块的宽度为m,将分割后的小矩形块继续沿着竖直方向分割成ni个子块,在每个大矩形块内包含N×ni个像素,分割后子块的长度为n,因此再将其分割成ni个小矩形后,每个小矩形恰有N个像素,分割后的子块大小为n×m。3. chaotic image encryption method according to claim 1, is characterized in that: image is divided into k small rectangular blocks along horizontal direction, and k is the positive integer that can be divisible by N, can arbitrarily define the number that satisfies the requirement, each The rectangular block has N×n i pixels, the width of each rectangular block after division is m, and the divided small rectangular block is divided into n i sub-blocks along the vertical direction, and each large rectangular block contains N ×n i pixels, the length of the divided sub-block is n, so after dividing it into n i small rectangles, each small rectangle has exactly N pixels, and the size of the divided sub-block is n×m.
CN201610508547.1A 2016-06-29 2016-06-29 Based on the New chaotic image encryption method for protecting area B aker mapping Expired - Fee Related CN106127669B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610508547.1A CN106127669B (en) 2016-06-29 2016-06-29 Based on the New chaotic image encryption method for protecting area B aker mapping

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610508547.1A CN106127669B (en) 2016-06-29 2016-06-29 Based on the New chaotic image encryption method for protecting area B aker mapping

Publications (2)

Publication Number Publication Date
CN106127669A CN106127669A (en) 2016-11-16
CN106127669B true CN106127669B (en) 2019-10-29

Family

ID=57468577

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610508547.1A Expired - Fee Related CN106127669B (en) 2016-06-29 2016-06-29 Based on the New chaotic image encryption method for protecting area B aker mapping

Country Status (1)

Country Link
CN (1) CN106127669B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106683041B (en) * 2016-12-12 2023-03-07 长春理工大学 A Quantum Image Miscutting Method Based on NEQR Expression
CN111444522B (en) * 2020-03-19 2024-02-27 南昌大学 Random blocking chaotic image encryption method
CN114157774B (en) * 2021-11-23 2023-03-21 西南大学 Image encryption method based on quantum Baker mapping and sine chaotization model
CN114221756A (en) * 2021-11-23 2022-03-22 西南大学 Synchronous image encryption and fusion method based on quantum Baker mapping

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070189518A1 (en) * 2005-03-30 2007-08-16 Nanni Richard A 3-D quaternion quantum fractal encryption
CN102123026A (en) * 2011-04-12 2011-07-13 南开大学 Chaos and hyperchaos based two-level video streaming media encryption method
CN102360488B (en) * 2011-09-29 2013-02-13 付冲 Digital image encryption method based on chaotic orbit perturbation
CN103916234B (en) * 2014-04-11 2016-09-07 中国人民解放军沈阳军区总医院 A kind of chaos medical image encryption method being applied to secret protection
CN105631796B (en) * 2015-12-17 2019-04-16 广东工业大学 Quantum chaos image encryption method based on bit scramble

Also Published As

Publication number Publication date
CN106127669A (en) 2016-11-16

Similar Documents

Publication Publication Date Title
CN113538203B (en) Image encryption method and device based on novel two-dimensional composite chaotic mapping and SHA-256
CN113297606B (en) Color quantum image encryption and decryption method based on multiple chaos and DNA operation
Patro et al. A novel multi-dimensional multiple image encryption technique
CN106327414B (en) A double chaotic image encryption method based on the characteristics of plaintext itself
CN107239709B (en) Chaotic image encryption method, device and system
CN107659753B (en) Image compression encryption method
CN106127669B (en) Based on the New chaotic image encryption method for protecting area B aker mapping
CN107239708A (en) It is a kind of that the image encryption method converted with score field is mapped based on quantum chaos
CN112906043B (en) Image encryption method based on chaotic mapping and chaotic S-box substitution
CN110519037B (en) Image Encryption Method of Hyperchaotic Pseudo-random Sequence
CN105631796A (en) Quantum chaotic image encryption method based on bit scrambling
CN104268825B (en) A kind of method that image procossing is carried out to ciphertext graph picture
CN111832035A (en) An image encryption storage method and device
CN105450899A (en) Multi-image encryption method based on piecewise linear chaotic map (PWLCM)
CN108833733B (en) A kind of decryption method of the resume image based on chaos S box
CN107292805A (en) A kind of image encryption method based on the discrete Tchebichef conversion of multi-parameter fractional order
CN113407955A (en) Image encryption method, medium, equipment and terminal based on four-dimensional hyper-chaotic system
CN106530197A (en) Image encryption method based on Kent mapping and generalized Gray codes
CN106875323B (en) Information hiding method and device based on image encryption
CN113098676A (en) Vector map two-position random scrambling encryption method based on four-dimensional chaos
CN117353894A (en) A high-dimensional hyper-chaotic image encryption method using Arnold transform and DNA hybrid coding scrambling
CN108717683A (en) A kind of close figure camouflage restoration methods of combination key and random orthogonal tensor base
CN106683030A (en) Quantum multi-image encryption algorithm based on quantum multi-image model and three-dimensional conversion
Liu et al. Image sharing scheme based on discrete fractional random transform
CN106408496B (en) An Image Scrambling Method Based on Byte Splitting

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20191029

Termination date: 20200629