CN106570814A - Novel hyper-chaotic image encryption method - Google Patents
Novel hyper-chaotic image encryption method Download PDFInfo
- Publication number
- CN106570814A CN106570814A CN201610908104.1A CN201610908104A CN106570814A CN 106570814 A CN106570814 A CN 106570814A CN 201610908104 A CN201610908104 A CN 201610908104A CN 106570814 A CN106570814 A CN 106570814A
- Authority
- CN
- China
- Prior art keywords
- column vector
- circleplus
- vector groups
- key
- ciphertext
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Facsimile Transmission Control (AREA)
- Storage Device Security (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
The invention puts forward a novel hyper-chaotic image encryption method which is mainly used in the field of gray image encryption. The algorithm mainly comprises the following steps: first, a plain image of which the size is N*M is segmented into M column vector groups, the pixels in the obtained vector groups are converted into bits to get 8*M vector groups, and scrambling operation is carried out; then, the obtained scrambled pixel values are re-mapped to an interval [0, 255] to get an intermediate cipher text; and finally, diffusion operation is carried out on a chaotic sequence generated by a Hyperhenon chaotic system and the intermediate cipher text to get a final cipher text. Experimental simulation shows that the algorithm not only can improve the disadvantages of a low-dimensional chaotic system and resist statistical characteristic attack and differential attack, but also can effectively resist four classic attacks, well hide plaintext information and achieve a good encryption effect.
Description
Technical field
The invention belongs to gray level image encryption method, more particularly to a kind of new hyperchaos image encryption method.
Background technology
With the fast development of computer network, the quantity that picture is transmitted in a network is more and more, causes people to figure
The concern that piece safe transmission is asked, nowadays Chinese scholars the encryption that picture how is carried out in image transmitting is given height
Pay attention to.
The features such as due to the strong correlation of image itself pixel, highly redundant and big data volume, determine that traditional text adds
Decryption method is difficult to be applied in the middle of image encryption.In recent years, expert points out that chaos system has to the extremely sensitive of primary condition
Property, positive Lyapunov indexes, point shape with point dimension property the features such as, can apply with the middle of image encryption, gradually propose some chaos
Image encryption method:Such as one-time pad, bit encryption, Mathematical Modeling encryption and DNA sequence dna encryption
But there is clearly disadvantageous part in method indicated above:
As one time key has very big difficulty in transmission and distribution;Bit encryption method need when being encrypted by
Pixel value is wholly converted into binary system and carries out image encryption, and such encryption efficiency is very time-consuming than relatively low;Mathematical Modeling encryption method
The factor that need to be considered compares, and is unfavorable for the realization of AES;And the pixel coefficient correlation in DNA sequence dna encryption method is compared with Gao Rong
It is subject to attacker's decryption.
The content of the invention
For the weak point that above-mentioned encryption method is present, the present invention proposes a kind of new hyperchaos image encryption side
Method.The present invention is directly encrypted and generates key according to plaintext pixel value, can solve well the efficiency of image encryption with
The problem of cipher key delivery, in addition also introduces Hyperhenon hyperchaotic systems and is encrypted, and not only simplifies encryption system
Realize, and reduce the correlation of ciphertext image pixel.Except, the present invention can effectively resist classical four kinds of attack methods, reach
Good cipher round results.
The hyperchaos image encryption method of the present invention, it is characterised in that including procedure for cipher key initialization, scramble transformation mistake
Journey, Hyperhenon hyperchaotic map diffusion processes.
(1) procedure for cipher key initialization
Encryption key K is mainly that 400 binary systems aid in close K by length1, it is input into key X0, Y0Three parts constitute.
Step 1:It is that 400 binary systems aid in close K first by length1It is cut into the binary system list that ten parts of length is 40
Unit, respectively K10, K11..., K19。
Step 2:Will input key X0, Y0As the initial key of Hyperhenon mappings, as shown in formula (1), wherein making c
=1.76, d=0.1, and X0, Y0(0,1) between value, producing one group of Hyperchaotic Sequence is used to spread computing.
K=0,1,2 ... (1)
(2) scramble transformation process
Step 1:First N × M plaintext images are divided into into M Column vector groups, and by the pixel of each Vector Groups with 8 two
System is represented, therefore can obtain 8 × M Column vector groups.
Step 2:According to auxiliary key matrix K10, K11..., K19Value, calculate two control parameters v in Cat maps
And w, such as shown in formula (2):
Step 3:The v tried to achieve with reference to step 2 and w, and become with being designated as input under each column vector, substitute into Arnold mappings and work as
In, such as shown in formula (3), s and t, wherein r=0 being tried to achieve, 1,2 ..., 8 × M is expressed as the position scalar of each Column vector groups;s
=0,1,2 ..., 8 × M represent column vector after Arnold conversion, new position scalar;T be expressed as column vector bit group to
The digit of upper swing offset.
Step 4:According to step 3 gained s, the Column vector groups that r is represented are moved in the Column vector groups represented by s.According to
The t of step 3 gained, each element that will be moved into the Column vector groups of s positions is circulated up moving t.
Step 5:Repeat step 3,4 is carried out 8 × M time, obtains intermediate ciphertext B.
(3) Hyperhenon hyperchaotic maps diffusion process
Step 1:By the binary system intermediate ciphertext B for obtaining, become decimal system ciphertext P, size is N × M.
Step 2:If initial value X0For x1, Y0For y1, in substituting into Hyperhenon hyperchaotic map systems, give up first 200 times
Iteration result, then N × M iteration is carried out, obtain the chaos sequence L={ l that length is N × M1, l2..., lN×M, it is mixed by what is obtained
Ignorant sequence L is updated in formula (4), makes element value range conversion between [0,255], obtaining new chaos sequence Q={ q1,
q2..., qN×M}。
qi=mod (li×105, 256) 1≤i≤N × M (4)
Step 3:To intermediate ciphertext P, each pixel carries out formula (5) operation, makes c0For intermediate ciphertext P pixel value it is flat
Average, so increases plaintext and ciphertext correlation, to reach pixel diffusion effect, obtains final ciphertext C={ c1, c2...,
cN×M}。
Beneficial effect of the present invention:
The present invention increases key by constituting encryption key with input key by the auxiliary key that length is 400 bits
Length with combine, allow exhaustive attack become it is impossible.Then by auxiliary key information, plaintext shuffle operation, Neng Gouyou are carried out
Effect is resisted in plain text (ciphertext only attack).The intermediate ciphertext for obtaining and hyper-henon hyperchaotic maps are produced into chaos sequence is carried out
Xor operation, improves the undesirable features such as the period windows that low-dimensional chaos conversion is present.The present invention can effectively resist classical attack,
Ensure the security in transmission, have wide application prospects in digital medium information security fields.
Description of the drawings
Fig. 1 is the encryption flow figure of the present invention
Fig. 2 is key K1Composition figure
Fig. 3 is intermediate ciphertext bit composition figure
Fig. 4 (a) is 256 × 256 gray scales Lena figure
Fig. 4 (b) is final encrypted image
Fig. 5 (a) plaintext grey level histograms
Fig. 5 (b) ciphertext image grey level histograms
Fig. 6 (a) plaintext graphs of a relation
Fig. 6 (b) ciphertext graphs of a relation
Fig. 7 (a) K2Decryption figure
Fig. 7 (b) K3Decryption figure
Fig. 7 (c) K4Decryption figure
Specific embodiment
Specific implementation step is as shown in the encryption flow figure of Fig. 1.
The present invention will realize image encryption, first have to realize the initialization procedure of key, as shown in Figure 2.
Encryption key K is mainly that 400 binary systems aid in close K by length1, it is input into key X0, Y0Three parts constitute.
Step 1:It is that 400 binary systems aid in close K first by length1It is cut into the binary system list that ten parts of length is 40
Unit, respectively K10, K11..., K19。
Step 2:Will input key X0, Y0As the initial key of Hyperhenon mappings, as shown in formula (1), wherein making c
=1.76, d=0.1, and X0, Y0(0,1) between value, producing one group of Hyperchaotic Sequence is used to spread computing.
K=0,1,2 ... (1)
After Fig. 2 procedure for cipher key initialization is completed, then the image encryption process of Fig. 1 is carried out, period can also produce middle ratio
Special ciphertext matrix, as shown in Figure 3.
Step 1:First N × M plaintext images are divided into into M Column vector groups, and by the pixel of each Vector Groups with 8 two
System is represented, therefore can obtain 8 × M Column vector groups.
Step 2:According to auxiliary key matrix K10, K11..., K19Value, calculate two control parameters v in Cat maps
And w, such as shown in formula (2):
Step 3:The v tried to achieve with reference to step 2 and w, and become with being designated as input under each column vector, substitute into Arnold mappings and work as
In, such as shown in formula (3), s and t, wherein r=0 being tried to achieve, 1,2 ..., 8 × M is expressed as the position scalar of each Column vector groups;s
=0,1,2 ..., 8 × M represent column vector after Arnold conversion, new position scalar;T be expressed as column vector bit group to
The digit of upper swing offset.
Step 4:According to step 3 gained s, the Column vector groups that r is represented are moved in the Column vector groups represented by s.According to
The t of step 3 gained, each element that will be moved into the Column vector groups of s positions is circulated up moving t.
Step 5:Repeat step 3,4 is carried out 8 × M time, obtains intermediate ciphertext B.
Step 6:By the binary system intermediate ciphertext B for obtaining, become decimal system ciphertext P, size is N × M.
Step 7:If initial value X0For x1, Y0For y1, in substituting into Hyperhenon hyperchaotic map systems, give up first 200 times
Iteration result, then N × M iteration is carried out, obtain the chaos sequence L={ l that length is N × M1, l2..., lN×M, it is mixed by what is obtained
Ignorant sequence L is updated in formula (4), makes element value range conversion between [0,255], obtaining new chaos sequence Q={ q1,
q2..., qN×M}。
qi=mod (li×105, 256) 1≤i≤N × M (4)
Step 8:To intermediate ciphertext P, each pixel carries out formula (5) operation, makes c0For intermediate ciphertext P pixel value it is flat
Average, so increases plaintext and ciphertext correlation, to reach pixel diffusion effect, obtains final ciphertext C={ c1, c2...,
cN×M}。
Experiment simulation, plaintext image such as Fig. 4 are carried out for 256 × 256 gray scale Lena figure to size using matlab 2014
A shown in (), wherein system input key is respectively:X0=0.314 852 2456, Y0=0.425 852 7320.Finally can obtain
Shown in encrypted image such as Fig. 4 (b).
Carry out the analysis of secure context to the image encryption method of the present invention below.
1st, histogram analysis
Fig. 5 (a) (b) is respectively plaintext and ciphertext histogram.It can be seen that plaintext histogram pixel value point
Cloth is quite uneven, and attacker can obtain image information according to pixel distribution information.It is close and image is after present invention encryption
Texts and pictures are quite uniform as histogram distribution, and pixel value information is hidden well, reach cipher round results.
2nd, statistical analysis
It is random to choose two groups of adjacent horizontal directions, vertical direction and diagonal pictures in plaintext and ciphertext graph picture respectively
Vegetarian refreshments, draws to obtain the related figure of pixel.As Fig. 7 (a) show plaintext graph of a relation, Fig. 7 (b) show ciphertext graph of a relation, and according to public affairs
Formula (6)-(9) calculate the coefficient correlation between pixel.
In formula, x and y represents respectively the gray value of image sets of adjacent pixels, E (.) expression mathematic expectaion, cov (.) represent association
Variance, γxyIt is expressed as the coefficient of relationship of neighbor.As shown in table 1, coefficient correlation represents correlation to result of calculation closer to 1
It is stronger, it is less to represent more uncorrelated.
The neighbor correlation coefficient charts of table 1
3rd, the sensitivity analysis of initial value
The decruption key K of the present invention consists of K=[K1, X0, Y0], wherein correct decruption key K2=[K1, X0, Y0], its
Middle K1For 400 groups of binary bits for giving, X0=0.314 852 2456, Y0=0.425 8527320, when input key
X0, Y0It is to obtain decruption key K respectively that minor variations occur respectively3, K4, wherein K3Middle X0=0.314 852 2457, other values are not
Become a solution, K4Middle Y0=0.425 852 7321, other values do not become another solution.As seen from Figure 6, if decruption key occurs
10-10Minor variations also cannot successful decryption, it is seen that invention is extremely strong to initial value sensitivity, and it is poor to be effective against
Divide and attack.
4th, classical type flaw attack
According to Kerckhoff principles, following four type is defined as into classical attack:
(1) attack with known plaintext (Ciphertext only attack):In attacker's hand in addition to the ciphertext intercepted and captured, do not have
Other any auxiliary informations.
(2) known plain text attack (Known plaintext attack):Attacker has also grasped portion except grasping ciphertext
The corresponding relation of clearly demarcated text and ciphertext.
(3) chosen -plain attact (Chosen plaintext attack):Attacker knows AES, while can
Select in plain text and obtain the ciphertext corresponding to corresponding plaintext.
(4) chosen ciphertext attacks (Chosen ciphertext attack):Attacker knows AES, while can be with
Select ciphertext and obtain corresponding plaintext.
Obviously chosen -plain attact is maximally effective attack method, adds AES effectively to resist this method excessively
Attack, also just can effectively resist attacking for additive method.
But chosen -plain attact is invalid to the present invention, mainly there are following 2 reasons:First, the present invention is to key
Sensitiveness is high, as long as input key has minor variations, cannot all be normally carried out decryption;Second, when computing is diffused, draw
Cleartext information is entered, has allowed and want to carry out cracking by the two-dimensional matrix of full 0 to become impossible.In sum, the present invention can be supported effectively
The classical attack of system.
5th, plaintext sensitivity analysis
The sensitiveness of plaintext is referred to when the pixel value in image occurs minor variations, can all obtain completely different close
Texts and pictures picture.Typically it is analyzed using NPCR (change ratio of pixel) and UACI (normalization pixel mean change) the two parameters.
Input same key, obtains two width identical ciphertexts.Wherein one secondary ciphertext graph picture is taken, will (438, pixel 337)
Value 174 changes over 173, and according to formula (10), (11) can obtain, NPCR=99.64%, UACI=33.78%.As a result show, this
Invention is very strong to plaintext sensitiveness, can effectively resist differential attack.
6th, key space analysis
The input key of the present invention is all that significance bit reaches 16, therefore key space reaches using double-precision floating point type
To 1032If 400 groups of binary bits in auxiliary key are considered into key space length, key space of the present invention will become
Obtain and more increase, want to obtain plaintext image information by exhaustive attack, almost become impossible.As can be seen here, the present invention's is close
Key space can effectively resist exhaustive attack, reach the effect of safe transmission, it is ensured that image information is not compromised.
Claims (1)
1. a kind of hyperchaos image encryption method, successively including procedure for cipher key initialization, scramble transformation process, Hyperhenon surpass
Chaotic maps diffusion process, it is characterised in that
(1) procedure for cipher key initialization
Encryption key K is that 400 binary systems aid in close K by length1, it is input into key X0, Y0Three parts constitute;
Step 1:It is that 400 binary systems aid in close K first by length1The binary cell that ten parts of length is 40 is cut into, is obtained final product
To auxiliary key matrix K10, K11..., K19;
Step 2:Will input key X0, Y0As the initial key of Hyperhenon mappings, such as shown in following formula (1), wherein making c=
1.76, d=0.1, and X0, Y0(0,1) between value, producing one group of Hyperchaotic Sequence is used to spread computing;
(2) scramble transformation process
Step 1:N × M plaintext images are divided into into M Column vector groups, and by the pixel of each Vector Groups with 8 binary forms
Show, obtain 8 × M Column vector groups;
Step 2:According to auxiliary key matrix K10, K11..., K19Value, calculate two control parameters v and the w in Cat maps,
As shown in following formula (2):
Step 3:The v tried to achieve with reference to step 2 and w, and to be designated as input variable under each column vector, substitute into Arnold mappings and work as
In, such as shown in following formula (3), s and t, wherein r=0 being tried to achieve, 1,2 ..., 8 × M is expressed as the position scalar of each Column vector groups;s
=0,1,2 ..., 8 × M represent the new position scalar after Arnold conversion of column vector;T be expressed as column vector bit group to
The digit of upper swing offset;
Step 4:According to step 3 gained s, the Column vector groups that r is represented are moved in the Column vector groups represented by s, according to step 3
The t of gained, each element that will be moved into the Column vector groups of s positions is circulated up moving t;
Step 5:Repeat step 3,4 is carried out 8 × M time, obtains intermediate ciphertext B;
(3) Hyperhenon hyperchaotic maps diffusion process
Step 1:By the binary system intermediate ciphertext B for obtaining, it is changed into decimal system ciphertext P, size is N × M;
Step 2:If initial value X0For x1, Y0For y1, in substituting into Hyperhenon hyperchaotic map systems, give up front 200 iteration
As a result, then N × M iteration is carried out, obtains the chaos sequence L={ l that length is N × M1, l2..., lN×M, by the chaos sequence for obtaining
Row L is updated in following formula (4), makes element value range conversion between [0,255], obtains new chaos sequence
Q={ q1, q2..., qN×M}
qi=mod (li×105, 256) 1≤i≤N × M (4)
Step 3:To intermediate ciphertext P, each pixel carries out following formula (5) operation, makes c0For the mean value of the pixel value of intermediate ciphertext P,
Plaintext and ciphertext correlation are so increased, to reach pixel diffusion effect, final ciphertext C={ c is obtained1, c2..., cN×M}。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610908104.1A CN106570814B (en) | 2016-10-17 | 2016-10-17 | Hyperchaotic image encryption method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610908104.1A CN106570814B (en) | 2016-10-17 | 2016-10-17 | Hyperchaotic image encryption method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106570814A true CN106570814A (en) | 2017-04-19 |
CN106570814B CN106570814B (en) | 2020-09-29 |
Family
ID=58533101
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610908104.1A Active CN106570814B (en) | 2016-10-17 | 2016-10-17 | Hyperchaotic image encryption method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106570814B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107292802A (en) * | 2017-05-10 | 2017-10-24 | 广东工业大学 | A kind of parallel image encryption method of quantum chaos |
CN112383523A (en) * | 2020-11-02 | 2021-02-19 | 国网电子商务有限公司 | Image encryption method and related device |
CN115499557A (en) * | 2022-09-13 | 2022-12-20 | 洛阳师范学院 | Delay chaotic image encryption method based on Arnold mapping and multi-shift mapping function |
CN116582247A (en) * | 2023-07-13 | 2023-08-11 | 深圳市柏英特电子科技有限公司 | Intelligent encryption method and system for home security camera shooting data |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6094483A (en) * | 1997-08-06 | 2000-07-25 | Research Foundation Of State University Of New York | Secure encryption and hiding of data and messages in images |
CN103167213A (en) * | 2013-02-07 | 2013-06-19 | 东北大学 | Digital image encryption method based on Cat mapping and hyper-chaos Lorenz system |
CN103440613A (en) * | 2013-09-04 | 2013-12-11 | 上海理工大学 | Color-image encryption method for hyperchaotic Rossler system |
CN103489151A (en) * | 2013-09-11 | 2014-01-01 | 河南大学 | Color image encryption method based on chaos sequence and hyper-chaos system |
CN104680475A (en) * | 2015-02-27 | 2015-06-03 | 柳州职业技术学院 | Image hybrid encrypting method based on hyperchaotic system |
-
2016
- 2016-10-17 CN CN201610908104.1A patent/CN106570814B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6094483A (en) * | 1997-08-06 | 2000-07-25 | Research Foundation Of State University Of New York | Secure encryption and hiding of data and messages in images |
CN103167213A (en) * | 2013-02-07 | 2013-06-19 | 东北大学 | Digital image encryption method based on Cat mapping and hyper-chaos Lorenz system |
CN103440613A (en) * | 2013-09-04 | 2013-12-11 | 上海理工大学 | Color-image encryption method for hyperchaotic Rossler system |
CN103489151A (en) * | 2013-09-11 | 2014-01-01 | 河南大学 | Color image encryption method based on chaos sequence and hyper-chaos system |
CN104680475A (en) * | 2015-02-27 | 2015-06-03 | 柳州职业技术学院 | Image hybrid encrypting method based on hyperchaotic system |
Non-Patent Citations (3)
Title |
---|
潘雪梅 等: "《基于复振幅场信息复用和RSA算法的非对称多幅图像认证方法》", 《物理学报》 * |
谢国波 等: "《Hyperhenon超混沌映射扩散》", 《微电子学与计算机》 * |
赵君勤 等: "《一种基于混沌和置换-替代机制的图像加密算法》", 《汕头大学学报(自然科学版)》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107292802A (en) * | 2017-05-10 | 2017-10-24 | 广东工业大学 | A kind of parallel image encryption method of quantum chaos |
CN112383523A (en) * | 2020-11-02 | 2021-02-19 | 国网电子商务有限公司 | Image encryption method and related device |
CN112383523B (en) * | 2020-11-02 | 2022-02-22 | 国网电子商务有限公司 | Image encryption method, related device and storage medium |
CN115499557A (en) * | 2022-09-13 | 2022-12-20 | 洛阳师范学院 | Delay chaotic image encryption method based on Arnold mapping and multi-shift mapping function |
CN116582247A (en) * | 2023-07-13 | 2023-08-11 | 深圳市柏英特电子科技有限公司 | Intelligent encryption method and system for home security camera shooting data |
CN116582247B (en) * | 2023-07-13 | 2023-09-26 | 深圳市柏英特电子科技有限公司 | Intelligent encryption method and system for home security camera shooting data |
Also Published As
Publication number | Publication date |
---|---|
CN106570814B (en) | 2020-09-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108898025B (en) | Chaotic image encryption method based on double scrambling and DNA coding | |
Malik et al. | Color multiple image encryption scheme based on 3D-chaotic maps | |
Yuan et al. | A new parallel image cryptosystem based on 5D hyper-chaotic system | |
CN104751403B (en) | A kind of plaintext associated picture encryption method based on multi-chaos system | |
Mohamed et al. | New DNA coded fuzzy based (DNAFZ) S-boxes: Application to robust image encryption using hyper chaotic maps | |
CN106339976A (en) | Encryption method | |
CN106910156B (en) | A kind of New chaotic image encryption method with plaintext association key stream generting machanism | |
CN109104544B (en) | Chaotic image encryption method based on complex network synchronization | |
CN107094072B (en) | Mixed chaotic encryption method based on generalized Henon mapping | |
CN104851071B (en) | A kind of digital image encryption method based on three-dimensional chaotic system | |
CN107239708A (en) | It is a kind of that the image encryption method converted with score field is mapped based on quantum chaos | |
CN106570814A (en) | Novel hyper-chaotic image encryption method | |
Man et al. | An image segmentation encryption algorithm based on hybrid chaotic system | |
CN106778304A (en) | A kind of quick New chaotic image encryption method with related scramble mechanism in plain text | |
CN107292802A (en) | A kind of parallel image encryption method of quantum chaos | |
CN103167213A (en) | Digital image encryption method based on Cat mapping and hyper-chaos Lorenz system | |
CN107274457A (en) | Double color image encrypting methods based on DNA sequence dna computing and Coupling Deformation image grid | |
CN108319859A (en) | A kind of grade synchronizes scramble diffusion and Pixel-level annular diffusion image encryption method | |
CN105447396A (en) | Fractional domain image encryption method based on Arnold transformation and compound chaos | |
CN106709854A (en) | Cat mapping and chaos based image information fusion and encryption method | |
CN107592198A (en) | The four-dimensional Hopfield neural network images encryption method of quantum Fourier conversion | |
CN107220923A (en) | Digital picture feedback encryption method based on image network | |
CN107911572A (en) | The image encryption method of logistic chaos system is improved based on fractional fourier transform | |
CN115580687B (en) | Multi-image encryption method based on variable parameter hyperchaotic system and S-shaped diffusion | |
Li et al. | Design of cross-plane colour image encryption based on a new 2D chaotic map and combination of ECIES framework |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |