CN106570814A - Novel hyper-chaotic image encryption method - Google Patents

Novel hyper-chaotic image encryption method Download PDF

Info

Publication number
CN106570814A
CN106570814A CN201610908104.1A CN201610908104A CN106570814A CN 106570814 A CN106570814 A CN 106570814A CN 201610908104 A CN201610908104 A CN 201610908104A CN 106570814 A CN106570814 A CN 106570814A
Authority
CN
China
Prior art keywords
column vector
circleplus
vector groups
key
ciphertext
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610908104.1A
Other languages
Chinese (zh)
Other versions
CN106570814B (en
Inventor
谢国波
姜先值
王朝阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong University of Technology
Original Assignee
Guangdong University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong University of Technology filed Critical Guangdong University of Technology
Priority to CN201610908104.1A priority Critical patent/CN106570814B/en
Publication of CN106570814A publication Critical patent/CN106570814A/en
Application granted granted Critical
Publication of CN106570814B publication Critical patent/CN106570814B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Facsimile Transmission Control (AREA)
  • Storage Device Security (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The invention puts forward a novel hyper-chaotic image encryption method which is mainly used in the field of gray image encryption. The algorithm mainly comprises the following steps: first, a plain image of which the size is N*M is segmented into M column vector groups, the pixels in the obtained vector groups are converted into bits to get 8*M vector groups, and scrambling operation is carried out; then, the obtained scrambled pixel values are re-mapped to an interval [0, 255] to get an intermediate cipher text; and finally, diffusion operation is carried out on a chaotic sequence generated by a Hyperhenon chaotic system and the intermediate cipher text to get a final cipher text. Experimental simulation shows that the algorithm not only can improve the disadvantages of a low-dimensional chaotic system and resist statistical characteristic attack and differential attack, but also can effectively resist four classic attacks, well hide plaintext information and achieve a good encryption effect.

Description

A kind of new hyperchaos image encryption method
Technical field
The invention belongs to gray level image encryption method, more particularly to a kind of new hyperchaos image encryption method.
Background technology
With the fast development of computer network, the quantity that picture is transmitted in a network is more and more, causes people to figure The concern that piece safe transmission is asked, nowadays Chinese scholars the encryption that picture how is carried out in image transmitting is given height Pay attention to.
The features such as due to the strong correlation of image itself pixel, highly redundant and big data volume, determine that traditional text adds Decryption method is difficult to be applied in the middle of image encryption.In recent years, expert points out that chaos system has to the extremely sensitive of primary condition Property, positive Lyapunov indexes, point shape with point dimension property the features such as, can apply with the middle of image encryption, gradually propose some chaos Image encryption method:Such as one-time pad, bit encryption, Mathematical Modeling encryption and DNA sequence dna encryption
But there is clearly disadvantageous part in method indicated above:
As one time key has very big difficulty in transmission and distribution;Bit encryption method need when being encrypted by Pixel value is wholly converted into binary system and carries out image encryption, and such encryption efficiency is very time-consuming than relatively low;Mathematical Modeling encryption method The factor that need to be considered compares, and is unfavorable for the realization of AES;And the pixel coefficient correlation in DNA sequence dna encryption method is compared with Gao Rong It is subject to attacker's decryption.
The content of the invention
For the weak point that above-mentioned encryption method is present, the present invention proposes a kind of new hyperchaos image encryption side Method.The present invention is directly encrypted and generates key according to plaintext pixel value, can solve well the efficiency of image encryption with The problem of cipher key delivery, in addition also introduces Hyperhenon hyperchaotic systems and is encrypted, and not only simplifies encryption system Realize, and reduce the correlation of ciphertext image pixel.Except, the present invention can effectively resist classical four kinds of attack methods, reach Good cipher round results.
The hyperchaos image encryption method of the present invention, it is characterised in that including procedure for cipher key initialization, scramble transformation mistake Journey, Hyperhenon hyperchaotic map diffusion processes.
(1) procedure for cipher key initialization
Encryption key K is mainly that 400 binary systems aid in close K by length1, it is input into key X0, Y0Three parts constitute.
Step 1:It is that 400 binary systems aid in close K first by length1It is cut into the binary system list that ten parts of length is 40 Unit, respectively K10, K11..., K19
Step 2:Will input key X0, Y0As the initial key of Hyperhenon mappings, as shown in formula (1), wherein making c =1.76, d=0.1, and X0, Y0(0,1) between value, producing one group of Hyperchaotic Sequence is used to spread computing.
K=0,1,2 ... (1)
(2) scramble transformation process
Step 1:First N × M plaintext images are divided into into M Column vector groups, and by the pixel of each Vector Groups with 8 two System is represented, therefore can obtain 8 × M Column vector groups.
Step 2:According to auxiliary key matrix K10, K11..., K19Value, calculate two control parameters v in Cat maps And w, such as shown in formula (2):
Step 3:The v tried to achieve with reference to step 2 and w, and become with being designated as input under each column vector, substitute into Arnold mappings and work as In, such as shown in formula (3), s and t, wherein r=0 being tried to achieve, 1,2 ..., 8 × M is expressed as the position scalar of each Column vector groups;s =0,1,2 ..., 8 × M represent column vector after Arnold conversion, new position scalar;T be expressed as column vector bit group to The digit of upper swing offset.
Step 4:According to step 3 gained s, the Column vector groups that r is represented are moved in the Column vector groups represented by s.According to The t of step 3 gained, each element that will be moved into the Column vector groups of s positions is circulated up moving t.
Step 5:Repeat step 3,4 is carried out 8 × M time, obtains intermediate ciphertext B.
(3) Hyperhenon hyperchaotic maps diffusion process
Step 1:By the binary system intermediate ciphertext B for obtaining, become decimal system ciphertext P, size is N × M.
Step 2:If initial value X0For x1, Y0For y1, in substituting into Hyperhenon hyperchaotic map systems, give up first 200 times Iteration result, then N × M iteration is carried out, obtain the chaos sequence L={ l that length is N × M1, l2..., lN×M, it is mixed by what is obtained Ignorant sequence L is updated in formula (4), makes element value range conversion between [0,255], obtaining new chaos sequence Q={ q1, q2..., qN×M}。
qi=mod (li×105, 256) 1≤i≤N × M (4)
Step 3:To intermediate ciphertext P, each pixel carries out formula (5) operation, makes c0For intermediate ciphertext P pixel value it is flat Average, so increases plaintext and ciphertext correlation, to reach pixel diffusion effect, obtains final ciphertext C={ c1, c2..., cN×M}。
Beneficial effect of the present invention:
The present invention increases key by constituting encryption key with input key by the auxiliary key that length is 400 bits Length with combine, allow exhaustive attack become it is impossible.Then by auxiliary key information, plaintext shuffle operation, Neng Gouyou are carried out Effect is resisted in plain text (ciphertext only attack).The intermediate ciphertext for obtaining and hyper-henon hyperchaotic maps are produced into chaos sequence is carried out Xor operation, improves the undesirable features such as the period windows that low-dimensional chaos conversion is present.The present invention can effectively resist classical attack, Ensure the security in transmission, have wide application prospects in digital medium information security fields.
Description of the drawings
Fig. 1 is the encryption flow figure of the present invention
Fig. 2 is key K1Composition figure
Fig. 3 is intermediate ciphertext bit composition figure
Fig. 4 (a) is 256 × 256 gray scales Lena figure
Fig. 4 (b) is final encrypted image
Fig. 5 (a) plaintext grey level histograms
Fig. 5 (b) ciphertext image grey level histograms
Fig. 6 (a) plaintext graphs of a relation
Fig. 6 (b) ciphertext graphs of a relation
Fig. 7 (a) K2Decryption figure
Fig. 7 (b) K3Decryption figure
Fig. 7 (c) K4Decryption figure
Specific embodiment
Specific implementation step is as shown in the encryption flow figure of Fig. 1.
The present invention will realize image encryption, first have to realize the initialization procedure of key, as shown in Figure 2.
Encryption key K is mainly that 400 binary systems aid in close K by length1, it is input into key X0, Y0Three parts constitute.
Step 1:It is that 400 binary systems aid in close K first by length1It is cut into the binary system list that ten parts of length is 40 Unit, respectively K10, K11..., K19
Step 2:Will input key X0, Y0As the initial key of Hyperhenon mappings, as shown in formula (1), wherein making c =1.76, d=0.1, and X0, Y0(0,1) between value, producing one group of Hyperchaotic Sequence is used to spread computing.
K=0,1,2 ... (1)
After Fig. 2 procedure for cipher key initialization is completed, then the image encryption process of Fig. 1 is carried out, period can also produce middle ratio Special ciphertext matrix, as shown in Figure 3.
Step 1:First N × M plaintext images are divided into into M Column vector groups, and by the pixel of each Vector Groups with 8 two System is represented, therefore can obtain 8 × M Column vector groups.
Step 2:According to auxiliary key matrix K10, K11..., K19Value, calculate two control parameters v in Cat maps And w, such as shown in formula (2):
Step 3:The v tried to achieve with reference to step 2 and w, and become with being designated as input under each column vector, substitute into Arnold mappings and work as In, such as shown in formula (3), s and t, wherein r=0 being tried to achieve, 1,2 ..., 8 × M is expressed as the position scalar of each Column vector groups;s =0,1,2 ..., 8 × M represent column vector after Arnold conversion, new position scalar;T be expressed as column vector bit group to The digit of upper swing offset.
Step 4:According to step 3 gained s, the Column vector groups that r is represented are moved in the Column vector groups represented by s.According to The t of step 3 gained, each element that will be moved into the Column vector groups of s positions is circulated up moving t.
Step 5:Repeat step 3,4 is carried out 8 × M time, obtains intermediate ciphertext B.
Step 6:By the binary system intermediate ciphertext B for obtaining, become decimal system ciphertext P, size is N × M.
Step 7:If initial value X0For x1, Y0For y1, in substituting into Hyperhenon hyperchaotic map systems, give up first 200 times Iteration result, then N × M iteration is carried out, obtain the chaos sequence L={ l that length is N × M1, l2..., lN×M, it is mixed by what is obtained Ignorant sequence L is updated in formula (4), makes element value range conversion between [0,255], obtaining new chaos sequence Q={ q1, q2..., qN×M}。
qi=mod (li×105, 256) 1≤i≤N × M (4)
Step 8:To intermediate ciphertext P, each pixel carries out formula (5) operation, makes c0For intermediate ciphertext P pixel value it is flat Average, so increases plaintext and ciphertext correlation, to reach pixel diffusion effect, obtains final ciphertext C={ c1, c2..., cN×M}。
Experiment simulation, plaintext image such as Fig. 4 are carried out for 256 × 256 gray scale Lena figure to size using matlab 2014 A shown in (), wherein system input key is respectively:X0=0.314 852 2456, Y0=0.425 852 7320.Finally can obtain Shown in encrypted image such as Fig. 4 (b).
Carry out the analysis of secure context to the image encryption method of the present invention below.
1st, histogram analysis
Fig. 5 (a) (b) is respectively plaintext and ciphertext histogram.It can be seen that plaintext histogram pixel value point Cloth is quite uneven, and attacker can obtain image information according to pixel distribution information.It is close and image is after present invention encryption Texts and pictures are quite uniform as histogram distribution, and pixel value information is hidden well, reach cipher round results.
2nd, statistical analysis
It is random to choose two groups of adjacent horizontal directions, vertical direction and diagonal pictures in plaintext and ciphertext graph picture respectively Vegetarian refreshments, draws to obtain the related figure of pixel.As Fig. 7 (a) show plaintext graph of a relation, Fig. 7 (b) show ciphertext graph of a relation, and according to public affairs Formula (6)-(9) calculate the coefficient correlation between pixel.
In formula, x and y represents respectively the gray value of image sets of adjacent pixels, E (.) expression mathematic expectaion, cov (.) represent association Variance, γxyIt is expressed as the coefficient of relationship of neighbor.As shown in table 1, coefficient correlation represents correlation to result of calculation closer to 1 It is stronger, it is less to represent more uncorrelated.
The neighbor correlation coefficient charts of table 1
3rd, the sensitivity analysis of initial value
The decruption key K of the present invention consists of K=[K1, X0, Y0], wherein correct decruption key K2=[K1, X0, Y0], its Middle K1For 400 groups of binary bits for giving, X0=0.314 852 2456, Y0=0.425 8527320, when input key X0, Y0It is to obtain decruption key K respectively that minor variations occur respectively3, K4, wherein K3Middle X0=0.314 852 2457, other values are not Become a solution, K4Middle Y0=0.425 852 7321, other values do not become another solution.As seen from Figure 6, if decruption key occurs 10-10Minor variations also cannot successful decryption, it is seen that invention is extremely strong to initial value sensitivity, and it is poor to be effective against Divide and attack.
4th, classical type flaw attack
According to Kerckhoff principles, following four type is defined as into classical attack:
(1) attack with known plaintext (Ciphertext only attack):In attacker's hand in addition to the ciphertext intercepted and captured, do not have Other any auxiliary informations.
(2) known plain text attack (Known plaintext attack):Attacker has also grasped portion except grasping ciphertext The corresponding relation of clearly demarcated text and ciphertext.
(3) chosen -plain attact (Chosen plaintext attack):Attacker knows AES, while can Select in plain text and obtain the ciphertext corresponding to corresponding plaintext.
(4) chosen ciphertext attacks (Chosen ciphertext attack):Attacker knows AES, while can be with Select ciphertext and obtain corresponding plaintext.
Obviously chosen -plain attact is maximally effective attack method, adds AES effectively to resist this method excessively Attack, also just can effectively resist attacking for additive method.
But chosen -plain attact is invalid to the present invention, mainly there are following 2 reasons:First, the present invention is to key Sensitiveness is high, as long as input key has minor variations, cannot all be normally carried out decryption;Second, when computing is diffused, draw Cleartext information is entered, has allowed and want to carry out cracking by the two-dimensional matrix of full 0 to become impossible.In sum, the present invention can be supported effectively The classical attack of system.
5th, plaintext sensitivity analysis
The sensitiveness of plaintext is referred to when the pixel value in image occurs minor variations, can all obtain completely different close Texts and pictures picture.Typically it is analyzed using NPCR (change ratio of pixel) and UACI (normalization pixel mean change) the two parameters.
Input same key, obtains two width identical ciphertexts.Wherein one secondary ciphertext graph picture is taken, will (438, pixel 337) Value 174 changes over 173, and according to formula (10), (11) can obtain, NPCR=99.64%, UACI=33.78%.As a result show, this Invention is very strong to plaintext sensitiveness, can effectively resist differential attack.
6th, key space analysis
The input key of the present invention is all that significance bit reaches 16, therefore key space reaches using double-precision floating point type To 1032If 400 groups of binary bits in auxiliary key are considered into key space length, key space of the present invention will become Obtain and more increase, want to obtain plaintext image information by exhaustive attack, almost become impossible.As can be seen here, the present invention's is close Key space can effectively resist exhaustive attack, reach the effect of safe transmission, it is ensured that image information is not compromised.

Claims (1)

1. a kind of hyperchaos image encryption method, successively including procedure for cipher key initialization, scramble transformation process, Hyperhenon surpass Chaotic maps diffusion process, it is characterised in that
(1) procedure for cipher key initialization
Encryption key K is that 400 binary systems aid in close K by length1, it is input into key X0, Y0Three parts constitute;
Step 1:It is that 400 binary systems aid in close K first by length1The binary cell that ten parts of length is 40 is cut into, is obtained final product To auxiliary key matrix K10, K11..., K19
Step 2:Will input key X0, Y0As the initial key of Hyperhenon mappings, such as shown in following formula (1), wherein making c= 1.76, d=0.1, and X0, Y0(0,1) between value, producing one group of Hyperchaotic Sequence is used to spread computing;
X K + 1 = c - Y 2 k + 1 - d * Z k + 1 Y k + 1 = X k Z k + 1 = Y k k = 0 , 1 , 2 , ... - - - ( 1 )
(2) scramble transformation process
Step 1:N × M plaintext images are divided into into M Column vector groups, and by the pixel of each Vector Groups with 8 binary forms Show, obtain 8 × M Column vector groups;
Step 2:According to auxiliary key matrix K10, K11..., K19Value, calculate two control parameters v and the w in Cat maps, As shown in following formula (2):
v = b i n 2 d e c ( K 10 ⊕ K 11 ⊕ K 12 ⊕ K 13 ⊕ K 14 ) mod ( 8 × M ) w = b i n 2 d e c ( K 15 ⊕ K 16 ⊕ K 17 ⊕ K 18 ⊕ K 19 ) mod ( 8 × M ) - - - ( 2 )
Step 3:The v tried to achieve with reference to step 2 and w, and to be designated as input variable under each column vector, substitute into Arnold mappings and work as In, such as shown in following formula (3), s and t, wherein r=0 being tried to achieve, 1,2 ..., 8 × M is expressed as the position scalar of each Column vector groups;s =0,1,2 ..., 8 × M represent the new position scalar after Arnold conversion of column vector;T be expressed as column vector bit group to The digit of upper swing offset;
s t = A r r mod ( 8 × M ) = 1 v w v w r r mod ( 8 × M ) - - - ( 3 )
Step 4:According to step 3 gained s, the Column vector groups that r is represented are moved in the Column vector groups represented by s, according to step 3 The t of gained, each element that will be moved into the Column vector groups of s positions is circulated up moving t;
Step 5:Repeat step 3,4 is carried out 8 × M time, obtains intermediate ciphertext B;
(3) Hyperhenon hyperchaotic maps diffusion process
Step 1:By the binary system intermediate ciphertext B for obtaining, it is changed into decimal system ciphertext P, size is N × M;
Step 2:If initial value X0For x1, Y0For y1, in substituting into Hyperhenon hyperchaotic map systems, give up front 200 iteration As a result, then N × M iteration is carried out, obtains the chaos sequence L={ l that length is N × M1, l2..., lN×M, by the chaos sequence for obtaining Row L is updated in following formula (4), makes element value range conversion between [0,255], obtains new chaos sequence
Q={ q1, q2..., qN×M}
qi=mod (li×105, 256) 1≤i≤N × M (4)
Step 3:To intermediate ciphertext P, each pixel carries out following formula (5) operation, makes c0For the mean value of the pixel value of intermediate ciphertext P, Plaintext and ciphertext correlation are so increased, to reach pixel diffusion effect, final ciphertext C={ c is obtained1, c2..., cN×M}。
c i = mod ( q i + p i , 256 ) ⊕ c i - 1 , 1 ≤ i ≤ N × M - - - ( 5 ) .
CN201610908104.1A 2016-10-17 2016-10-17 Hyperchaotic image encryption method Active CN106570814B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610908104.1A CN106570814B (en) 2016-10-17 2016-10-17 Hyperchaotic image encryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610908104.1A CN106570814B (en) 2016-10-17 2016-10-17 Hyperchaotic image encryption method

Publications (2)

Publication Number Publication Date
CN106570814A true CN106570814A (en) 2017-04-19
CN106570814B CN106570814B (en) 2020-09-29

Family

ID=58533101

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610908104.1A Active CN106570814B (en) 2016-10-17 2016-10-17 Hyperchaotic image encryption method

Country Status (1)

Country Link
CN (1) CN106570814B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107292802A (en) * 2017-05-10 2017-10-24 广东工业大学 A kind of parallel image encryption method of quantum chaos
CN112383523A (en) * 2020-11-02 2021-02-19 国网电子商务有限公司 Image encryption method and related device
CN115499557A (en) * 2022-09-13 2022-12-20 洛阳师范学院 Delay chaotic image encryption method based on Arnold mapping and multi-shift mapping function
CN116582247A (en) * 2023-07-13 2023-08-11 深圳市柏英特电子科技有限公司 Intelligent encryption method and system for home security camera shooting data

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6094483A (en) * 1997-08-06 2000-07-25 Research Foundation Of State University Of New York Secure encryption and hiding of data and messages in images
CN103167213A (en) * 2013-02-07 2013-06-19 东北大学 Digital image encryption method based on Cat mapping and hyper-chaos Lorenz system
CN103440613A (en) * 2013-09-04 2013-12-11 上海理工大学 Color-image encryption method for hyperchaotic Rossler system
CN103489151A (en) * 2013-09-11 2014-01-01 河南大学 Color image encryption method based on chaos sequence and hyper-chaos system
CN104680475A (en) * 2015-02-27 2015-06-03 柳州职业技术学院 Image hybrid encrypting method based on hyperchaotic system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6094483A (en) * 1997-08-06 2000-07-25 Research Foundation Of State University Of New York Secure encryption and hiding of data and messages in images
CN103167213A (en) * 2013-02-07 2013-06-19 东北大学 Digital image encryption method based on Cat mapping and hyper-chaos Lorenz system
CN103440613A (en) * 2013-09-04 2013-12-11 上海理工大学 Color-image encryption method for hyperchaotic Rossler system
CN103489151A (en) * 2013-09-11 2014-01-01 河南大学 Color image encryption method based on chaos sequence and hyper-chaos system
CN104680475A (en) * 2015-02-27 2015-06-03 柳州职业技术学院 Image hybrid encrypting method based on hyperchaotic system

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
潘雪梅 等: "《基于复振幅场信息复用和RSA算法的非对称多幅图像认证方法》", 《物理学报》 *
谢国波 等: "《Hyperhenon超混沌映射扩散》", 《微电子学与计算机》 *
赵君勤 等: "《一种基于混沌和置换-替代机制的图像加密算法》", 《汕头大学学报(自然科学版)》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107292802A (en) * 2017-05-10 2017-10-24 广东工业大学 A kind of parallel image encryption method of quantum chaos
CN112383523A (en) * 2020-11-02 2021-02-19 国网电子商务有限公司 Image encryption method and related device
CN112383523B (en) * 2020-11-02 2022-02-22 国网电子商务有限公司 Image encryption method, related device and storage medium
CN115499557A (en) * 2022-09-13 2022-12-20 洛阳师范学院 Delay chaotic image encryption method based on Arnold mapping and multi-shift mapping function
CN116582247A (en) * 2023-07-13 2023-08-11 深圳市柏英特电子科技有限公司 Intelligent encryption method and system for home security camera shooting data
CN116582247B (en) * 2023-07-13 2023-09-26 深圳市柏英特电子科技有限公司 Intelligent encryption method and system for home security camera shooting data

Also Published As

Publication number Publication date
CN106570814B (en) 2020-09-29

Similar Documents

Publication Publication Date Title
CN108898025B (en) Chaotic image encryption method based on double scrambling and DNA coding
Malik et al. Color multiple image encryption scheme based on 3D-chaotic maps
Yuan et al. A new parallel image cryptosystem based on 5D hyper-chaotic system
CN104751403B (en) A kind of plaintext associated picture encryption method based on multi-chaos system
Mohamed et al. New DNA coded fuzzy based (DNAFZ) S-boxes: Application to robust image encryption using hyper chaotic maps
CN106339976A (en) Encryption method
CN106910156B (en) A kind of New chaotic image encryption method with plaintext association key stream generting machanism
CN109104544B (en) Chaotic image encryption method based on complex network synchronization
CN107094072B (en) Mixed chaotic encryption method based on generalized Henon mapping
CN104851071B (en) A kind of digital image encryption method based on three-dimensional chaotic system
CN107239708A (en) It is a kind of that the image encryption method converted with score field is mapped based on quantum chaos
CN106570814A (en) Novel hyper-chaotic image encryption method
Man et al. An image segmentation encryption algorithm based on hybrid chaotic system
CN106778304A (en) A kind of quick New chaotic image encryption method with related scramble mechanism in plain text
CN107292802A (en) A kind of parallel image encryption method of quantum chaos
CN103167213A (en) Digital image encryption method based on Cat mapping and hyper-chaos Lorenz system
CN107274457A (en) Double color image encrypting methods based on DNA sequence dna computing and Coupling Deformation image grid
CN108319859A (en) A kind of grade synchronizes scramble diffusion and Pixel-level annular diffusion image encryption method
CN105447396A (en) Fractional domain image encryption method based on Arnold transformation and compound chaos
CN106709854A (en) Cat mapping and chaos based image information fusion and encryption method
CN107592198A (en) The four-dimensional Hopfield neural network images encryption method of quantum Fourier conversion
CN107220923A (en) Digital picture feedback encryption method based on image network
CN107911572A (en) The image encryption method of logistic chaos system is improved based on fractional fourier transform
CN115580687B (en) Multi-image encryption method based on variable parameter hyperchaotic system and S-shaped diffusion
Li et al. Design of cross-plane colour image encryption based on a new 2D chaotic map and combination of ECIES framework

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant