CN106600518A - Image encryption method and image decryption method with visual security and data security based on compressed sensing - Google Patents

Image encryption method and image decryption method with visual security and data security based on compressed sensing Download PDF

Info

Publication number
CN106600518A
CN106600518A CN201611046541.3A CN201611046541A CN106600518A CN 106600518 A CN106600518 A CN 106600518A CN 201611046541 A CN201611046541 A CN 201611046541A CN 106600518 A CN106600518 A CN 106600518A
Authority
CN
China
Prior art keywords
matrix
image
size
parameter
compressed sensing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611046541.3A
Other languages
Chinese (zh)
Other versions
CN106600518B (en
Inventor
甘志华
韩道军
朱长江
柴秀丽
路杨
符翔龙
郑晓宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Henan University
Original Assignee
Henan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Henan University filed Critical Henan University
Priority to CN201611046541.3A priority Critical patent/CN106600518B/en
Publication of CN106600518A publication Critical patent/CN106600518A/en
Application granted granted Critical
Publication of CN106600518B publication Critical patent/CN106600518B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Compression Or Coding Systems Of Tv Signals (AREA)
  • Compression Of Band Width Or Redundancy In Fax (AREA)

Abstract

The invention relates to an image encryption method and an image decryption method with visual security and data security based on compressed sensing. The image encryption method comprises the steps of: firstly, utilizing an SHA 256 hash function to obtain a 256-bit hash value of a plaintext image as an image secret key, and calculating initial numerical values of one-dimensional skew tent chaotic mapping and zigzag scrambling; carrying out sparse processing on the plaintext image, and carrying out zigzag scrambling on a coefficient matrix; and then utilizing the one-dimensional skew tent chaotic mapping to generate a measurement matrix, measuring and quantifying a scrambling matrix to obtain a compressed and encrypted image, and embedding the image into a carrier image with visual significance to obtain a final ciphertext image with visual significance. The image encryption method realizes the visual security and data security of the plaintext image, has large secret key space, is highly sensitive to plaintext, has higher capacity of resisting brute-force attack, chosen-plaintext attack and known-plaintext attack, does not need an additional storage space, and can transmit and store the ciphertext image quickly and effectively.

Description

Image encryption, the decryption method of visual security and data safety based on compressed sensing
Technical field
The present invention relates to image Encrypt and Decrypt technical field, more particularly to a kind of visual security sum based on compressed sensing According to the image encryption of safety, decryption method.
Background technology
As the fast development of digital technology and network technology, increasing multi-medium data are produced, passed by network It is defeated and stored in platforms such as Cloud Servers.Numerical data includes bulk information, and for example, a military oil depot picture not only may be used To teach that its size and number, but also its Position Approximate can be provided;One width human face photo not only can expose His or her appearance, can also provide general age and health.Therefore, in medical image system, military picture system In video conference, the safety for protecting view data causes extensive concern, and image encryption is that one kind can be with effective protection number According to the method for safety.
At present, many resume images are suggested, and they have used chaos system, DNA calculating, cellular automata, light Learn the technologies such as conversion, Brownian movement, wave function transmission.One most important feature of known most of resume images is just It is:Plaintext image is converted into a width noise like ciphertext, the rectangular histogram of ciphertext graph picture be it is smooth, pixel value [0,255] it Between be uniformly distributed, the comentropy close 8 of ciphertext graph picture, ciphertext graph picture is delivered to recipient by sender, and network attack person pass through Analysis ciphertext hardly results in key and corresponding plaintext.Most of AESs can effective protection view data safety, Some of them algorithm due to key space is little or algorithm and plaintext dependency it is little and be broken.Additionally, these algorithms have one Common drawback, is exactly that the ciphertext of noise like is easy to cause the attention of attacker in transmission and storage, so as to being found and attacking Hit.Based on this, if we design a kind of ciphertext of visual security, i.e. ciphertext graph picture has significant outward appearance, in their quilts In storage and transmission, it is difficult to be found, so as to avoid the possibility attacked, it is ensured that the safety of itself.Therefore, design tool The resume image for having visual security and data safety is a job highly significant.Simultaneously, it is contemplated that transmission bandwidth, deposit Storage space and the consideration of real-time application, the size that we are not intended to the ciphertext graph picture obtained after image encryption is bright more than corresponding Texts and pictures picture.
2006, Candes and Donoho proposed the concept of compressed sensing, and its core concept is tied using information space Structure, merging of compressing and sample is carried out, and breaches the restriction of Shannon's sampling theorem, can greatly reduce sampling number, in compression Perception concept occurs shortly having researcher to consider compressed sensing is used in image encryption.For example, H.Fang etc. is zigzag Scramble and compressed sensing are used in the compression encryption of image and video, find zigzag scrambles can effectively improve reconstruction image and The signal to noise ratio of video.Zhang Yushu etc. is used in the compression of image encryption using chaos system and compressed sensing, and first image is dilute Sparse coefficient is sorted scramble by chaos sequence, then measures encryption, the ciphertext graph of last noise like using compressed sensing As being obtained.Zhou Nanrun etc. devises a kind of new image using non-linear fractional order Mellin transform and two dimensional compaction cognition technology Compression AES, the tested moment matrix of plaintext image is measured from both direction, is then become using non-linear fractional order plum forests The secondary encryption of swap-in row.In these AESs, the combination of scrambling process and compressed sensing process can effectively loosen compression The limited equidistant restriction for perceiving, reduces the computation complexity of algorithm, while enhancing compression and the encryption performance of algorithm.But It is that in AES, scrambling process and plaintext are unrelated, this means that identical scramble vector adds for different plaintext images It is close, the anti-chosen -plain attact of algorithm and known plain text attack it is poor.Therefore, increase the association between algorithm and plaintext, contribute to The further safety of boosting algorithm.
The content of the invention
For deficiency of the prior art, the present invention proposes a kind of visual security and data safety based on compressed sensing Image encryption, decryption method, height is relied in plain text, the energy of anti-selection plaintext and known plain text attack in raising encryption process Power, using so that key space greatly improves for the hash functions of SHA 256, strengthens the opposing brute force attack of image encrypting and decrypting technology Ability.
According to design provided by the present invention, a kind of image of the visual security and data safety based on compressed sensing Encryption method, comprises the steps of:
Plaintext image P of the step 1. using the hash functions of SHA 256 to size for m × n is calculated, and obtains image key Key, and calculate the initial value of one-dimensional skew tent chaotic maps and zigzag scrambles;
Step 2. carries out sparse process using wavelet transform to plaintext image P, obtains coefficient matrix P1;To coefficient square Battle array P1 enters line shuffle according to zigzag paths, obtains the matrix P2 after scramble;By predetermined threshold value TS, matrix P2 is repaiied Just, revised matrix P3 is obtained;
Step 3. utilizes one-dimensional skew tent chaotic maps to generate the calculation matrix Φ for compressed sensing, and to matrix P3 is measured, and obtains measuring value matrix P4, wherein, the compression ratio of plaintext image P is expressed as CR, and the size of calculation matrix Φ is The size of M × N, then M=CR × m, N=m, matrix P4 is M × n;
Step 4. quantifies to the element of matrix P4, obtains matrix P5, as the ciphertext graph picture after compression encryption;
It is the significant image of vision of m × n as carrier image CI that step 5. selects size, and to it implement from Scattered wavelet transformation, obtains four matrixes:Low frequency part decomposition coefficient LL, horizontal direction decomposition coefficient LH, vertical direction resolving system Number HL and diagonal decomposition coefficient HH, is embedded matrix P5, and discrete wavelet inverse transformation is carried out again, obtains final The significant ciphertext graph picture of vision.
Above-mentioned, the initial value of one-dimensional skew tent chaotic maps and zigzag scrambles is calculated in step 1, comprising:Will Image key key is scaled 32 decimal number k1, k2..., k32, and calculate the parameter and just of one-dimensional skewtent chaotic maps Initial value, and the initial position co-ordinates of zigzag scrambles.
Preferably, one-dimensional skew tent chaotic maps are expressed as:
,
Wherein, r ∈ (0, be 1) systematic parameter, z ∈ (0,1) be chaos system state variable;And according to formula:
To calculate 4 intermediate parameters ti(i=1,2,3,4), wherein, li(i=1,2,3, are 4) preliminary setting parameters, respectively Representation parameter x '0, y '0, r ', z '0, calculated t3And t4Parameter r and just of one-dimensional skew tent chaotic maps is represented respectively Initial value z0;The initial position co-ordinates x of zigzag scrambles0And y0By formula:
It is calculated, wherein, abs (x) represents the absolute value for seeking x, and mod is modulo operation.
Above-mentioned, matrix P2 is modified in the step 2, specifically include:By predetermined threshold value TS, to the unit in P2 Element is modified, and the element less than or equal to TS is changed into 0.
Above-mentioned, the one-dimensional skew tent chaotic maps that utilize in step 3 generate the calculation matrix for compressed sensing Φ, comprising following content:
Step 3.1, orderWherein, d represents sampling Interval, r, z0The parameter mapped for one-dimensional skew tent and initial value, l represents sampling length, and n represents Sampling starting point, will be step Parameter r and initial value z of rapid 1 calculated one-dimensional skew tent chaotic maps0Substitute into one-dimensional skew tent chaotic maps In, generate chaos sequence;
Step 3.2, according to formulaLine translation is entered to the numerical value of chaos sequence;
Step 3.3, generateArranged by row, obtained calculation matrix, size is M × N,
In formula,For normalized.
Preferably, following content is also included in step 3.1:The front n-1 numerical value of chaos sequence is abandoned, from nth Value starts, and at interval of d numbers, takes out one, obtains new sequence of the length for MN, used as the new chaos sequence replaced.
Above-mentioned, the element in step 4 to size for the matrix P4 of M × n quantifies, specifically comprising following content:Will Element in matrix P4 is converted into a vector according to order from left to right, from top to bottom, according to formula:
p5i=floor (255 × (p4i-min)/(max-min))
Vector element is quantified one by one, wherein, min represents the minima of element in matrix P4, and max represents matrix P4 The maximum of middle element, floor (x) is represented and is taken the no more than maximum integer of x, p4iRepresent matrix P4 according to from left to right, from upper I-th element (1≤i≤Mn) in the vector that order under is obtained, by p5iThe vector of composition is converted into size for M × n's Matrix P5.
Above-mentioned, step 5 specifically includes following content:
Step 5.1, according to formula:
D1 (i, j)=P5 (i, j) mod10, D2 (i, j)=floor (P5 (i, j)/10)
Element in matrix P5 is processed one by one, matrix D 1 and D2 is obtained, wherein, D1 (i, j), D2 (i, j) and P5 (i, j) is represented respectively in matrix D 1, D2 and P5 positioned at the element at (i, j) place, 1≤i≤M, 1≤j≤n;
Step 5.2, according to compression ratio CR of plaintext image P, the size of matrix D 1, D2 and P5 is set;
Step 5.3, wavelet transform is carried out to carrier image CI, obtain four matrixes, be expressed as:Low frequency part Decomposition coefficient LL, horizontal direction decomposition coefficient LH, vertical direction decomposition coefficient HL and diagonal decomposition coefficient HH, they Size is identical with matrix D 1, D2 sizes;
Step 5.4, one size of definition and matrix D 1, D2 size identical empty matrix IT, calculate LL squares Meansigma methodss MV of all elements in battle array, according to rule:
Rule 1:If LL (i, j) >=MV, then IT (i, j)=1, LH (i, j)=D1 (i, j), HL (i, j)=D2 (i, j),
Rule 2:If LL (i, j)<MV, then IT (i, j)=0, LH (i, j)=D2 (i, j), HL (i, j)=D1 (i, j), In D1, D2 embeded matrix LH and HL, wherein, 1≤i≤m/2,1≤j≤n/2;
Step 5.5, to be embedded in after four matrix Ls L, LH, HL and HH carry out discrete wavelet inverse transformation, obtain vision intentional The ciphertext graph picture of justice, ciphering process terminates.
A kind of image decryption method of the visual security and data safety based on compressed sensing, concrete decryption step is as follows:
Step a:Obtain image key key of plaintext image P, and parameter x '0、y′0、r′、z′0, min and max;
Step b:Image key key is scaled into 32 decimal number k1, k2..., k32, and calculate one-dimensional skew tent The parameter and initial value of chaotic maps, and the initial position co-ordinates of zigzag scrambles;One-dimensional skewtent chaotic maps are expressed as:
,
Wherein, r ∈ (0, be 1) systematic parameter, z ∈ (0,1) be chaos system state variable;And according to formula:
To calculate 4 intermediate parameters ti(i=1,2,3,4), wherein, li(i=1,2,3, are 4) preliminary setting parameters, respectively Representation parameter x '0, y '0, r ', z '0, calculated t3And t4Parameter r and just of one-dimensional skew tent chaotic maps is represented respectively Initial value z0;The initial position co-ordinates x of zigzag scrambles0And y0By formula:
It is calculated, wherein, abs (x) represents the absolute value for seeking x, and mod is modulo operation;
Step c:To size to be decrypted for m × n ciphertext graph as C, carry out wavelet transform, obtaining 4 sizes is (m/2) matrix of × (n/2), respectively:Low frequency part decomposition coefficient LL1, horizontal direction decomposition coefficient LH1, vertical direction point Solution coefficient HL1 and diagonal decomposition coefficient HH1;
Step d:Define empty matrix IT1 of the size for (m/2) × (n/2), the meansigma methodss of all elements of calculating matrix LL1 MV1, according to rule:
Regular A:If LL1 (i, j) >=MV1, then IT1 (i, j)=1, D11 (i, j)=LH1 (i, j), D21 (i, j)= HL1 (i, j),
Regular B:If LL1 (i, j)<MV1, then IT1 (i, j)=0, D21 (i, j)=LH1 (i, j), D11 (i, j)=HL1 (i, j), extracts cleartext information from LH1 and HL1, obtains matrix D 11 and D21, wherein, 1≤i≤m/2,1≤j≤n/ 2;
Step e:Matrix D 11, D21 is transformed to into the matrix that size is (m/4) × n, and by formula:P51 (i, j)= D21 (i, j) × 10+D11 (i, j), obtains matrix P51, wherein, D11 (i, j), D21 (i, j) and P51 (i, j) represent respectively square Battle array D11, D21 and P51 are located at the element at (i, j) place, 1≤i≤m/4,1≤j≤n;
Step f:Matrix P51 according to order from left to right, from top to bottom be converted into length for 1 × (mn/4) to Amount, p51i(1≤i≤mn/4) is i-th element of vector, according to formula:To vector Element carries out one by one inverse quantization operation, obtains p41i(1≤i≤mn/4), vector the matrix that size is (m/4) × n is changed into P41;
Step g:The calculation matrix Φ 1 for compressed sensing is generated using one-dimensional skew tent chaotic maps, using compression Perceive algorithm for reconstructing to be reconstructed P41, obtain matrix P31 of the size for m × n;
Step h:Using the initial position co-ordinates x of the calculated zigzag scrambles of step b0And y0Inverse is implemented to matrix P31 Zigzag is converted, and obtains matrix P11, discrete wavelet is carried out to matrix P11 and is operated against sparse transformation, the plaintext figure after being decrypted As P.
Above-mentioned, the one-dimensional skew tent chaotic maps that utilize in step g generate the calculation matrix Φ for compressed sensing 1, comprising following content:
Step g1, orderWherein, d is represented between sampling Every r, z0The parameter mapped for one-dimensional skew tent and initial value, l represents sampling length, and n represents Sampling starting point, by step b Parameter r and initial value z of calculated one-dimensional skew tent chaotic maps0In substituting into one-dimensional skew tent chaotic maps, Formation sequence, the front n-1 numerical value of sequence is abandoned, and from the beginning of n-th numerical value, at interval of d numbers, takes out one, obtains length The new sequence for MN is spent, as chaos sequence;
Step g2, according to formulaLine translation is entered to the numerical value of chaos sequence;
Step g3, generateArranged by row, obtained calculation matrix, size is M × N,
In formula,For normalized.
Beneficial effects of the present invention:
1st, the present invention proposes a kind of image encryption method of visual security, by using zigzag scrambles and compressed sensing skill Art is compressed and encrypts to plaintext image, obtains the ciphertext of width compression, and it is embedded into the significant carrier of a width vision In image, the significant ciphertext graph picture of a width vision is obtained;Compared with conventional noise like ciphertext graph picture, significant ciphertext graph As being not easy to be found by attacker, the safety of image is effectively ensured.
2nd, image encryption method proposed by the present invention, plaintext image is sparse first, and the sparse coefficient for obtaining is according to one kind Zigzag paths scramble, the initial position of zigzag scrambles is controlled by plaintext, and it is adjacent that scrambling process not only can reduce image Dependency between pixel, and after can strengthening compressed sensing under identical compression ratio image reconstruction effect;Using in plain text Related key generates calculation matrix, and measurement encryption is compressed to the matrix after scramble;In telescopiny, first to carrier Image implements wavelet transform, obtains 4 matrix Ls L, LH, HL and HH, according to the element value of LL matrixes, after compression encryption Ciphertext matrix element be embedded into one by one in LH the and HL matrixes of carrier image, the data safety of plaintext image has been effectively ensured.
3rd, image encryption method proposed by the present invention is extremely sensitive to plaintext, using the Hash letters of SHA 256 of plaintext image Numerical value increased key space as key, while calculating the parameter of one-dimensional skew tent chaotic maps and initial using it Value, and the initial position co-ordinates x that zigzag scrambles need0And y0, change in elevation sensitivity of the whole ciphering process to plaintext, increasing Strong encryption method opposing brute force attack, chosen -plain attact, the ability of known plain text attack, further increase image encryption side The safety of method, effectiveness.
4th, carrier image of the present invention can choose at random, and increased the key space of image encryption, while obtaining after encryption Ciphertext graph picture it is identical with plaintext picture size, it is not necessary to extra memory space, ciphertext graph picture can be passed fast and effectively Defeated and storage, algorithm is convenient to carry out.
Description of the drawings:
Fig. 1 is one of image encryption method flow chart of the present invention;
Fig. 2 is the two of the image encryption method flow chart of the present invention;
Fig. 3 is the decrypting process flow chart of resume image of the present invention;
In Fig. 4:A () is original image used by example one, (b) compress the ciphertext graph picture after encryption for example one, (c) is The carrier image of example one, is (d) the ciphertext graph picture of the visual security of example one, (e) is the correct key decrypted image of example one, (f) Decrypted image when being decrypted using wrong key for example one;
Fig. 5 is zigzag scramble schematic diagrams in example one;
Fig. 6 be in example one initial position co-ordinates for (1, the matrix before and after zigzag scrambles 1) (a) is put for zigzag Matrix before unrest, is (b) matrix after zigzag scrambles;
Fig. 7 be in example one initial position co-ordinates for (3, the matrix before and after zigzag scrambles 4) (a) is put for zigzag Matrix before unrest, is (b) matrix after zigzag scrambles;
In Fig. 8:A () is original image used by example two, be (b) the ciphertext graph picture after the correspondence compression encryption of example two, C () is the carrier image of example two, be (d) the ciphertext graph picture of the visual security of example two, is (e) the correct key of example two decryption figure Picture, decrypted image when (f) being decrypted using wrong key for example two.
Specific embodiment:
Below in conjunction with the accompanying drawings the present invention is further detailed explanation with technical scheme, and detailed by preferred embodiment Describe bright embodiments of the present invention in detail, but embodiments of the present invention are not limited to this.
Embodiment one, a kind of shown in Figure 1, image encryption side of the visual security and data safety based on compressed sensing Method, comprises the steps of:
Plaintext image P of the step 1. using the hash functions of SHA 256 to size for m × n is calculated, and obtains image key Key, and calculate the initial value of one-dimensional skew tent chaotic maps and zigzag scrambles;
Step 2. carries out sparse process using wavelet transform to plaintext image P, obtains coefficient matrix P1;To coefficient square Battle array P1 enters line shuffle according to zigzag paths, obtains the matrix P2 after scramble;By predetermined threshold value TS, matrix P2 is repaiied Just, revised matrix P3 is obtained;
Step 3. utilizes one-dimensional skew tent chaotic maps to generate the calculation matrix Φ for compressed sensing, and to matrix P3 is measured, and obtains measuring value matrix P4, wherein, the compression ratio of plaintext image P is expressed as CR, and the size of calculation matrix Φ is The size of M × N, then M=CR × m, N=m, matrix P4 is M × n;
Step 4. quantifies to the element of matrix P4, obtains matrix P5, as the ciphertext graph picture after compression encryption;
It is the significant image of vision of m × n as carrier image CI that step 5. selects size, and to it implement from Scattered wavelet transformation, obtains four matrixes:Low frequency part decomposition coefficient LL, horizontal direction decomposition coefficient LH, vertical direction resolving system Number HL and diagonal decomposition coefficient HH, is embedded matrix P5, and discrete wavelet inverse transformation is carried out again, obtains final The significant ciphertext graph picture of vision.
The present invention can simultaneously realize the data safety and visual security of plaintext image to be encrypted, effectively increase image The anti-selection of encryption in plain text and known plain text attack ability, the hash functions of SHA 256 use the key space for causing algorithm Greatly improve, enhance the ability that algorithm resists brute force attack.
Embodiment two, a kind of shown in Figure 2, image encryption side of the visual security and data safety based on compressed sensing Method, comprising following content:
One) the plaintext image P using the hash functions of SHA 256 to size for m × n is calculated, and obtains image key Key, and calculate the initial value of one-dimensional skew tent chaotic maps and zigzag scrambles;Calculate one-dimensional skew tent chaos to reflect The initial value with zigzag scrambles is penetrated, comprising:Image key key is scaled into 32 decimal number k1, k2..., k32, and count Calculate the parameter and initial value of one-dimensional skew tent chaotic maps, and the initial position co-ordinates of zigzag scrambles.
Preferably, one-dimensional skew tent chaotic maps are expressed as:
Wherein, r ∈ (0, be 1) systematic parameter, z ∈ (0,1) be chaos system state variable;And according to formula:
To calculate 4 intermediate parameters ti(i=1,2,3,4), wherein, li(i=1,2,3, are 4) preliminary setting parameters, respectively Representation parameter x '0, y '0, r ', z '0, calculated t3And t4Parameter r and just of one-dimensional skew tent chaotic maps is represented respectively Initial value z0;The initial position co-ordinates x of zigzag scrambles0And y0By formula:
It is calculated, wherein, abs (x) represents the absolute value for seeking x, and mod is modulo operation.
Two) sparse process is carried out to plaintext image P using wavelet transform, obtains coefficient matrix P1;To coefficient matrix P1 enters line shuffle according to zigzag paths, obtains the matrix P2 after scramble;By predetermined threshold value TS, the element less than or equal to TS It is changed into 0, matrix P2 is modified, obtains revised matrix P3.
Three) the calculation matrix Φ for compressed sensing is generated using one-dimensional skew tent chaotic maps, in following Hold:
1), makeWherein, d represents the sampling interval, r,z0The parameter mapped for one-dimensional skew tent and initial value, l represents sampling length, and n represents Sampling starting point, will be step one) Parameter r and initial value z of calculated one-dimensional skew tent chaotic maps0In substituting into one-dimensional skew tent chaotic maps, Formation sequence, in order to avoid the transient effect of chaos, the front n-1 numerical value of sequence is abandoned, from the beginning of n-th numerical value, per Every d numbers, one is taken out, new sequence of the length for MN is obtained, as chaos sequence;
2), according to formulaLine translation is entered to the numerical value of chaos sequence;
3), generationArranged by row, obtained calculation matrix, size is M × N,
In formula,For normalized.
And matrix P3 is measured according to calculation matrix Φ, obtain measuring value matrix P4, wherein, the pressure of plaintext image P Shrinkage is expressed as CR, and the size of calculation matrix Φ is M × N, then M=CR × m, and the size of N=m, matrix P4 is M × n.
Four) element in matrix P4 is converted into into a vector according to order from left to right, from top to bottom, according to public affairs Formula:
p5i=floor (255 × (p4i-min)/(max-min))
Vector element is quantified one by one, wherein, min represents the minima of element in matrix P4, and max represents matrix P4 The maximum of middle element, floor (x) is represented and is taken the no more than maximum integer of x, p4iRepresent matrix P4 according to from left to right, from upper I-th element (1≤i≤Mn) in the vector that order under is obtained, by p5iThe vector of composition is converted into size for M × n's Ciphertext graph picture after matrix P5, as compression encryption.
Five) size is selected to be the significant image of vision of m × n as carrier image CI and discrete to its enforcement Wavelet transformation, obtains four matrixes:Low frequency part decomposition coefficient LL, horizontal direction decomposition coefficient LH, vertical direction decomposition coefficient HL and diagonal decomposition coefficient HH, is embedded matrix P5, and discrete wavelet inverse transformation is carried out again, obtains final regarding Significant ciphertext graph picture is felt, specifically comprising following content:
1st, according to formula:
D1 (i, j)=P5 (i, j) mod10, D2 (i, j)=floor (P5 (i, j)/10)
Element in matrix P5 is processed one by one, matrix D 1 and D2 is obtained, wherein, D1 (i, j), D2 (i, j) and P5 (i, j) is represented respectively in matrix D 1, D2 and P5 positioned at the element at (i, j) place, 1≤i≤M, 1≤j≤n;
2nd, according to compression ratio CR of plaintext image P, the size of matrix D 1, D2 and P5 is set;
3rd, wavelet transform is carried out to carrier image CI, obtains four matrixes, be expressed as:Low frequency part resolving system Number LL, horizontal direction decomposition coefficient LH, vertical direction decomposition coefficient HL and diagonal decomposition coefficient HH, their size is big It is little identical with matrix D 1, D2 sizes;
4th, a size and matrix D 1, D2 size identical empty matrix IT are defined, calculates institute in LL matrixes There are meansigma methodss MV of element, according to rule:
Rule 1:If LL (i, j) >=MV, then IT (i, j)=1, LH (i, j)=D1 (i, j), HL (i, j)=D2 (i, j),
Rule 2:If LL (i, j)<MV, then IT (i, j)=0, LH (i, j)=D2 (i, j), HL (i, j)=D1 (i, j), In D1, D2 embeded matrix LH and HL, wherein, 1≤i≤m/2,1≤j≤n/2;
5th, to be embedded in after four matrix Ls L, LH, HL and HH carry out discrete wavelet inverse transformation, obtain vision significant close Texts and pictures picture, ciphering process terminates.
By a kind of zigzag paths scramble, scrambling process is subject to plaintext to the small echo sparse coefficient of plaintext image in the present invention Control, is compressed and is encrypted using compressed sensing to scramble image, and one-dimensional skew tent chaotic maps are used to produce measurement Matrix, using cleartext information the parameter and initial value of chaotic maps are produced, in the embedded width carrier image of the ciphertext graph picture for obtaining, The ciphertext graph picture of final width visual security is obtained;Based on compressed sensing and zigzag scrambles, plaintext image is compressed simultaneously And encryption, random zigzag scramble strategies select can effectively reducing compressed perception theory limited equidistant restriction, raising The compression performance of algorithm, the ciphertext graph picture for obtaining is identical with plaintext picture size, it is not necessary to which extra transmission bandwidth and storage is empty Between, ciphertext graph picture can fast and effectively be transmitted and stored;Again, the hash functions of SHA 256 of plaintext image are used to meter Some parameters in encryption method are calculated, algorithm is highly relied in plain text, improve the anti-selection plaintext and known plain text attack of algorithm Ability, using so that the key space of algorithm greatly improves for the hash functions of SHA 256 enhance algorithm opposing brute force attack Ability.
Image decryption process is the inverse process of ciphering process.Before image decryption, decryption side needs to obtain plaintext image P Image key key and parameter x '0、y′0、r′、z′0, min and max, these are given datas, and this case application also provides one kind The image decryption method of visual security and data safety based on compressed sensing, shown in Figure 3, concrete decryption step is as follows:
Step a:Obtain image key key of plaintext image P, and parameter x '0、y′0、r′、z′0, min and max;
Step b:Image key key is scaled into 32 decimal number k1, k2..., k32, and calculate one-dimensional skew tent The parameter and initial value of chaotic maps, and the initial position co-ordinates of zigzag scrambles.
One-dimensional skew tent chaotic maps are expressed as:
,
Wherein, r ∈ (0, be 1) systematic parameter, z ∈ (0,1) be chaos system state variable;And according to formula:
To calculate 4 intermediate parameters ti(i=1,2,3,4), wherein, li(i=1,2,3, are 4) preliminary setting parameters, respectively Representation parameter x '0, y '0, r ', z '0, calculated t3And t4Parameter r and just of one-dimensional skew tent chaotic maps is represented respectively Initial value z0;The initial position co-ordinates x of zigzag scrambles0And y0By formula:
It is calculated, wherein, abs (x) represents the absolute value for seeking x, and mod is modulo operation.
Step c:To size to be decrypted for m × n ciphertext graph as C, carry out wavelet transform, obtaining 4 sizes is (m/2) matrix of × (n/2), respectively:Low frequency part decomposition coefficient LL1, horizontal direction decomposition coefficient LH1, vertical direction point Solution coefficient HL1 and diagonal decomposition coefficient HH1;
Step d:Define empty matrix IT1 of the size for (m/2) × (n/2), the meansigma methodss of all elements of calculating matrix LL1 MV1, according to rule:
Regular A:If LL1 (i, j) >=MV1, then IT1 (i, j)=1, D11 (i, j)=LH1 (i, j), D21 (i, j)= HL1 (i, j),
Regular B:If LL1 (i, j)<MV1, then IT1 (i, j)=0, D21 (i, j)=LH1 (i, j), D11 (i, j)=HL1 (i, j), extracts cleartext information from LH1 and HL1, obtains matrix D 11 and D21, wherein, 1≤i≤m/2,1≤j≤n/ 2;
Step e:Matrix D 11, D21 is transformed to into the matrix that size is (m/4) × n, and by formula:P51 (i, j)= D21 (i, j) × 10+D11 (i, j), obtains matrix P51, wherein, D11 (i, j), D21 (i, j) and P51 (i, j) represent respectively square Battle array D11, D21 and P51 are located at the element at (i, j) place, 1≤i≤m/4,1≤j≤n;
Step f:Matrix P51 according to order from left to right, from top to bottom be converted into length for 1 × (mn/4) to Amount, p51i(1≤i≤mn/4) is i-th element of vector, according to formula:To vector Element carries out one by one inverse quantization operation, obtains p41i(1≤i≤mn/4), vector the matrix that size is (m/4) × n is changed into P41;
Step g:Method according to calculation matrix is produced in encrypting step, is generated using one-dimensional skew tent chaotic maps For the calculation matrix Φ 1 of compressed sensing, P41 is reconstructed using compressed sensing reconstruction algorithm, obtains size for m × n's Matrix P31;
Step h:The initial position co-ordinates x of the zigzag scrambles obtained using step b0And y0Inverse is implemented to matrix P31 Zigzag is converted, and obtains matrix P11, discrete wavelet is carried out to matrix P11 and is operated against sparse transformation, the plaintext figure after being decrypted As P.
Further to verify effectiveness of the invention, with reference to image encrypting and decrypting method of the instantiation to this case application It is further explained explanation:
Example one, referring to shown in Fig. 4~7, in the present embodiment, the programming software for adopting is Matlab R2014a, chooses Size for 512 × 512 Lena gray level images as experimental subject, concrete ciphering process is as follows:Step 1:Input original size For 512 × 512 Lena gray level images, image information is read with P=imread (' Lena.bmp '), using the Hash of SHA 256 Function pair plaintext image P is calculated, and the cryptographic Hash of a group 256 is obtained and using it as image key key, then by 256 The key of position is converted into 32 decimal number k1, k2..., k32, then calculate the parameter and just of one-dimensional skew tent chaotic maps Initial value, and the initial position co-ordinates that zigzag scrambles need comprise the following steps that:
1.1) expression formula of one-dimensional skew tent chaotic maps that the present invention is adopted for:
Wherein, r ∈ (0, be 1) systematic parameter, z ∈ (0,1) be chaos system state variable.
1.2) plaintext image is calculated using the hash functions of SHA 256, the cryptographic Hash of a group 256 can be obtained (hexadecimal representation is:[b32171537de519d7c1c83ff25989a559532c6b269a303ac19d3d0a906bb5 E250]), and using it as image key key, then by the cryptographic Hash of 256 be converted into 32 decimal numbers (179,33, 113,83,125,229,25,215,193,200,63,242,89,137,165,89,83,44,107,38,154), and determined Justice is k1, k2..., k32
1.3) for the ease of the parameter and initial value of the one-dimensional skew tent mappings of calculating, and zigzag scrambles needs Initial position co-ordinates, are first according to following formula and are calculated 4 intermediate parameters ti(i=1,2,3,4),
Wherein, li(i=1,2,3, are 4) given parameters, respectively representation parameter x '0、y′0、r′、z′0, now, x '0= 0.2796、y′0=0.7531, r '=0.5678, z '0=0.8652.Calculated t3And t4One-dimensional skew is represented respectively Parameter r and initial value z of tent mappings0, now, r=0.2122, z0=0.3539.
1.4) the initial position co-ordinates x that zigzag scrambles need0And y0Can be obtained by formula below,
Wherein, abs (x) represents the absolute value for seeking x, and mod is a modulo operation symbol, and result of calculation is as follows:x0=177 And y0=260.
Step 2:Sparse process is carried out to plaintext image P using wavelet transform, coefficient matrix P1 is obtained;Then to being Matrix number P1 enters line shuffle according to zigzag paths, and the matrix after scramble is P2;Then one threshold value TS is set, to the unit in P2 Element is modified, and the element less than or equal to TS is changed into 0, and the matrix after process is denoted as comprising the following steps that for P3:
2.1) according to following program, sparse process is carried out to plaintext image P using wavelet transform, obtains coefficient matrix P1;
Ww=DWT (512);
P1=ww*P*ww';
2.2) a kind of zigzag paths as shown in Figure 5 are chosen, then according to the initial position co-ordinates that step 1 is calculated (x0=177 and y0=260), and line shuffle is entered according to zigzag paths to coefficient matrix P1, the matrix after scramble is P2;
Scramble schematic diagram is as shown in figure 5, zigzag scrambling process is illustrated below:It is (a) before scramble shown in Fig. 6 Matrix, (b) be from (1,1) position that position i.e. element 1 are located come into effect the matrix obtained after zigzag scrambles;Fig. 7 In, it is matrix before scramble to scheme (a), figure (b) be from (3,4) position that position i.e. element 160 are located come into effect The matrix obtained after zigzag scrambles.
2.3) threshold value TS=50 is set, the element in P2 is modified, the element less than or equal to 50 is changed into 0, Matrix after process is denoted as P3.
Step 3:The calculation matrix Φ produced for compressed sensing is mapped using one-dimensional skew tent, then to matrix P3 Measure, obtain measuring comprising the following steps that for value matrix P4:
If 3.1) compression ratio of plaintext image selects to be CR=0.25 in compressed sensing, it is assumed that the size of calculation matrix Φ is M × N, then M=CR × m=128, N=m=512.
3.2)Wherein, sampling interval d=20, r, z0For the parameter and initial value of one-dimensional skew tent mappings, parameter l=65535, n=500.Specifically, step 1 is counted first Parameter r and initial value z of the one-dimensional skew tent mappings for obtaining0In substituting into one-dimensional skew tent mappings, iterate, it is raw Into a chaos sequence, in order to avoid the transient effect of chaos, front 499 numerical value of chaos sequence is dropped, then from the 500th Individual numerical value starts, and at interval of 20 numbers, takes out one, obtains the new chaos sequence that length is 65536.
3.3) then according to formulaLine translation is entered to the numerical value of new chaos sequence.
3.4) and then generationArranged by row, it is possible to obtain following calculation matrix Φ, size is 128 × 512,
In formula,For normalized.
3.5) then according to formula below, using calculation matrix Φ, matrix P3 is measured, obtains measuring value matrix P4, size is 128 × 512.
P4=Φ * P3
Step 4:The element of matrix P4 is quantified, element value the integer between 0~255 is converted to, after conversion Matrix is denoted as comprising the following steps that for P5:
4.1) size is turned for the element in 128 × 512 matrix P4 according to order from left to right, from top to bottom first Change a vector into;
4.2) then according to equation below quantifies one by one to vector element,
p5i=floor (255 × (p4i-min)/(max-min))
Wherein, min represents the minima of element in matrix P4, is -843.7286;Max represents in matrix P4 element most Big value, is that 891.1269, floor (x) expressions take the no more than maximum integer of x.p4iRepresent matrix P4 according to from left to right, from upper I-th element (1≤i≤65536) in the vector that order under is obtained, finally p5iThe vector of composition is converted into matrix P5, size is 128 × 512.
Step 5:The significant image of vision that a size is 512 × 512 is selected as carrier image CI, and it is real to it Wavelet transform is applied, four matrixes are obtained, is respectively low frequency part decomposition coefficient LL, horizontal direction decomposition coefficient LH, vertical Directional Decomposition coefficient HL and diagonal decomposition coefficient HH, is then embedded matrix P5, then carries out discrete wavelet to it Inverse transformation, obtains comprising the following steps that for the significant ciphertext graph picture of final vision:
5.1) element in matrix P5 is processed one by one according to equation below, obtains two matrix Ds 1 and D2.
D1 (i, j)=P5 (i, j) mod10
D2 (i, j)=floor (P5 (i, j)/10)
Wherein, D1 (i, j), D2 (i, j) and P5 (i, j) are represented respectively in matrix D 1, D2 and P5 positioned at the unit at (i, j) place Element, 1≤i≤128,1≤j≤512.
(2) select the Baboon images that size is 512 × 512 as carrier image CI, then matrix D 1, D2 is turned respectively It is changed to the matrix that size is 256 × 256.
(3) Haar wavelet functions are selected, wavelet transform is carried out to carrier image CI according to following program, obtain four Matrix, is respectively low frequency part decomposition coefficient LL, horizontal direction decomposition coefficient LH, vertical direction decomposition coefficient HL and diagonal side To decomposition coefficient HH, their size is all 256 × 256.
[LL, LH, HL, HH]=dwt2 (CI, ' haar');
(4) the empty matrix IT that size is for 256 × 256 is defined, the average of all elements in LL matrixes is then calculated Value MV=258.2940, then according to following rule is in D1, D2 embeded matrix LH and HL.
Rule 1:If LL (i, j) >=MV, then IT (i, j)=1, LH (i, j)=D1 (i, j), HL (i, j)=D2 (i, j).
Rule 2:If LL (i, j)<MV, then IT (i, j)=0, LH (i, j)=D2 (i, j), HL (i, j)=D1 (i, j).
In above-mentioned rule, 1≤i≤256,1≤j≤256.
(5) Haar wavelet functions are then used by, discrete is implemented to four matrix Ls L, LH, HL and HH according to following program Inverse wavelet transform, obtains the significant ciphertext graph of a pair vision as C, and ciphering process terminates.
C=idwt2 (LL, LH, HL, HH, ' haar').
Image decryption process is the inverse process of ciphering process.Before image decryption, decryption side needs to obtain decryption key, Specifically include:(hexadecimal representation is 256 cryptographic Hash key of plaintext image
[b32171537de519d7c1c83ff25989a559532c6b269a303ac19d3d0a90 6bb5e250]), 6 Individual parameter x '0=0.2796, y '0=0.7531, r '=0.5678, z '0=0.8652, min=-843.7286 and max= 891.1269.Decryption step is as follows:
Step 1:256 cryptographic Hash key are scaled into 32 decimal number k1, k2..., k32(179,33,113,83, 125,229,25,215,193,200,63,242,89,137,165,89,83,44,107,38,154), then according to following formula meter Calculation obtains 4 intermediate parameters ti(i=1,2,3,4),
Wherein, li(i=1,2,3, are 4) given parameters, respectively representation parameter x '0、y′0、r′、z′0, now, x '0= 0.2796、y′0=0.7531, r '=0.5678, z '0=0.8652.Calculated t3And t4One-dimensional skew is represented respectively Parameter r and initial value z of tent mappings0, now, r=0.2122, z0=0.3539.
Step 2:The initial position co-ordinates x that zigzag scrambles need0And y0Can be obtained by formula below,
Wherein, abs (x) represents the absolute value for seeking x, and mod is a modulo operation symbol, and result of calculation is as follows:x0=177 And y0=260.
Step 3:Assume that ciphertext graph picture to be decrypted is C, size is 512 × 512, Haar wavelet functions is selected, according to such as Lower program implements wavelet transform to ciphertext graph picture, obtains the matrix that 4 sizes are 256 × 256, is respectively low frequency part point Solution coefficient LL1, horizontal direction decomposition coefficient LH1, vertical direction decomposition coefficient HL1 and diagonal decomposition coefficient HH1.
[LL1, LH1, HL1, HH1]=dwt2 (C, ' haar');
Step 4:The empty matrix IT1 that a size is for 256 × 256 is defined, then all elements of calculating matrix LL1 is flat Average MV1=258.2940, extracts plaintext relevant information from LH1 and HL1 according to following rule, obtains matrix D 11 And D21.
Rule 1:If LL1 (i, j) >=MV1, then IT1 (i, j)=1, D11 (i, j)=LH1 (i, j), D21 (i, j)= HL1(i,j).Rule 2:If LL1 (i, j)<MV1, then IT1 (i, j)=0, D21 (i, j)=LH1 (i, j), D11 (i, j)= HL1(i,j).In above-mentioned rule, 1≤i≤256,1≤j≤256.
Step 5:Matrix D 11, D21 is transformed to the matrix that size is 128 × 512, equation below is then passed through and is obtained square Battle array P51,
P51 (i, j)=D21 (i, j) × 10+D11 (i, j)
Wherein, D11 (i, j), D21 (i, j) and P51 (i, j) represent respectively matrix D 11, D21 and P51 positioned at (i, j) place Element, 1≤i≤128,1≤j≤512.
Step 6:Matrix P51 is converted into the vector that length is 1 × 65536 according to order from left to right, from top to bottom p51i(1≤i≤65536), inverse quantization operation is implemented one by one then according to equation below to vector element, obtains p41i(1≤i≤ 65536), then vector changed into 128 × 512 matrix P41.
Wherein, min and max are the keys obtained from sender.
Step 7:Parameter r and initial value z of the one-dimensional skew tent mappings obtained using step 10, according to encrypting step 3 Identical method obtains calculation matrix Φ 1, then selects a kind of conventional algorithm for reconstructing of compressed sensing:Orthogonal matching pursuit is calculated Method (OMP) obtains matrix P31 from P41 reconstruction signals, and size is 512 × 512.Step 8:The zigzag obtained using step 1 is put Random initial position co-ordinates x0And y0Implement inverse zigzag conversion to matrix P31, obtain matrix P11.
Step 9:Implement discrete wavelet according to following program to matrix P11 to operate against sparse transformation, it is possible to decrypted Plaintext image P afterwards, size is 512 × 512.
Ww=DWT (512);
P=ww'*P1*ww;
The AES that the present invention is provided has very big key space, it is sufficient to resist any brute force attack.Specifically, it is secret Key includes:(1) 256 cryptographic Hash produced by the hash functions of SHA 256;(2) given parameter x '0, y '0, r ', z '0.Additionally, Can choose at random with carrier image equivalently-sized in plain text, when carrying out wavelet transform to carrier image, existing small echo Function has 37 kinds of different selections.If the computational accuracy of computer is 10-14, then the key space of this paper algorithms be at least 37 ×2296, it is seen that key space is sufficiently large, can effectively resist any brute force attack.
In Fig. 4:A () is original image used by example one, (b) be the ciphertext graph picture after compression encryption, (c) is carrier figure Picture, is (d) the ciphertext graph picture of visual security, (e) is correct key decrypted image, (f) is solution when being decrypted using wrong key Close image.As shown in Figure 4, after being encrypted to plaintext image (a) according to encipherment scheme of the present invention, ciphertext graph picture (d) for obtaining It is the significant ciphertext graph picture of a width vision, when it is in transmission over networks and storage, visually with carrier image (c) phase Together, found and cracked by attacker so as to avoid, increased transmission and the safety for storing.Simultaneously according to decryption side of the present invention Case, using correct key, the decrypted image (e) for obtaining is essentially the same with plaintext image (a), can correctly decrypt, and uses wrong Miss key (x0'=0.2796+10-14, other keys are constant), decrypted image (f) class for obtaining is noise-like, and this illustrates this The encryption method that bright scheme is proposed has very high susceptiveness to key, and algorithm has very high safety.
Example two, shown in Figure 8, in the present embodiment, the programming software for adopting is Matlab R2014a, chooses big It is little be 256 × 256 Finger gray level images as experimental subject, concrete ciphering process is as follows:
Step 1:Size is calculated for 256 × 256 plaintext image P using the hash functions of SHA 256, obtains one group (hexadecimal representation is the cryptographic Hash of 256:
[0f2f217b7ac7eabce5c26ed2333b7b44d8f8c0ff889e05aa0918d fa715e3396d]), And using it as image key key, then by key be scaled 32 decimal numbers (15,47,33,123,122,199,234, 188,229,194,110,210,51,59,123,68,216,248,192,255,136,158,5,170,9,24,223,167, 21,227,57,109), and it is defined as k1, k2..., k32.4 key parameters are set to, x '0=0.2796, y '0= 0.7531, r '=0.5678, z '0=0.8652, parameter r=0.3602 of one-dimensional skew tent chaotic maps is then calculated, Initial value z0=0.189, and the initial position co-ordinates that zigzag scrambles need, x0=153, y0=227.
Step 2:Sparse process is carried out to plaintext image P using wavelet transform, coefficient matrix P1 is obtained;Then to being Matrix number P1 enters line shuffle according to zigzag paths, and the matrix after scramble is P2;Then one threshold value TS=50 is set, in P2 Element be modified, being changed into 0 less than or equal to the element of TS, the matrix after process is denoted as P3.
Step 3:The compression ratio for arranging plaintext image is CR=0.25, is produced for pressing using one-dimensional skew tent mappings The calculation matrix Φ that contracting is perceived, size is 64 × 256, and then matrix P3 is measured, and obtains measuring value matrix P4, and size is 64×256。
Step 4:The minima for calculating element in matrix P4 is min=-933.5953, and the maximum of element is max= =805.7708, then the element of matrix P4 is quantified, element value is converted to the integer between 0~255, after conversion Matrix is denoted as P5, and size is 64 × 256, as the ciphertext graph picture after compression encryption.
Step 5:Select the Cameraman that size is 256 × 256 as carrier image CI, discrete wavelet transformer is carried out to it Change, obtain four matrixes, be respectively low frequency part decomposition coefficient LL, horizontal direction decomposition coefficient LH, vertical direction decomposition coefficient HL and diagonal decomposition coefficient HH, is then embedded matrix P5, then carries out discrete wavelet inverse transformation to it, just obtains The significant ciphertext graph of final vision is as C.
Image decryption process is the inverse process of ciphering process.Before image decryption, decryption side needs to obtain decryption key, Specifically include:256 cryptographic Hash key of plaintext image, 6 parameter x '0、y′0、r′、z′0, min and max.Decryption step is as follows:
Step 1:By cryptographic Hash key of 256 be scaled 32 decimal numbers (15,47,33,123,122,199,234, 188,229,194,110,210,51,59,123,68,216,248,192,255,136,158,5,170,9,24,223,167, 21,227,57,109), and it is defined as k1, k2..., k32.4 key parameters are, x '0=0.2796, y '0=0.7531, R '=0.5678, z '0=0.8652, then calculate parameter r=0.3602 of one-dimensional skew tent chaotic maps, initial value z0 =0.189, and the initial position co-ordinates that zigzag scrambles need, x0=153, y0=227.
Step 2:Assume that ciphertext graph picture to be decrypted is C, size is 256 × 256, and to it wavelet transform is implemented, and is obtained To 4 sizes for 128 × 128 matrix, be respectively low frequency part decomposition coefficient LL1, horizontal direction decomposition coefficient LH1, vertical Directional Decomposition coefficient HL1 and diagonal decomposition coefficient HH1.
Step 3:The empty matrix IT1 that a size is for 128 × 128 is defined, then all elements of calculating matrix LL1 is flat Average MV1, according to following rule matrix D 11 and D21 are obtained from LH1 and HL1.
Rule 1:If LL1 (i, j) >=MV1, then IT1 (i, j)=1, D11 (i, j)=LH1 (i, j), D21 (i, j)= HL1(i,j)。
Rule 2:If LL1 (i, j)<MV1, then IT1 (i, j)=0, D21 (i, j)=LH1 (i, j), D11 (i, j)=HL1 (i,j).In above-mentioned rule, 1≤i≤128,1≤j≤128.
Step 4:Matrix D 11, D21 is transformed to the matrix that size is 64 × 256, equation below is then passed through and is obtained matrix P51,
P51 (i, j)=D21 (i, j) × 10+D11 (i, j)
Wherein, D11 (i, j), D21 (i, j) and P51 (i, j) represent respectively matrix D 11, D21 and P51 positioned at (i, j) place Element, 1≤i≤64,1≤j≤256.
Step 5:Matrix P51 is converted into the vector that length is 1 × 16384 according to order from left to right, from top to bottom p51i(1≤i≤16384), inverse quantization operation is implemented one by one then according to equation below to vector element, obtains p41i(1≤i≤ 16384), then vector changed into 64 × 256 matrix P41.
Wherein, min and max are the keys obtained from sender.
Step 6:Parameter r and initial value z of the one-dimensional skew tent mappings obtained using step 10, according to encrypting step 3 Identical method obtains calculation matrix Φ 1, followed by orthogonal matching pursuit algorithm (OMP) from P41 reconstruction signals, obtains matrix P31, size is 256 × 256.
Step 7:The initial position co-ordinates x of the zigzag scrambles obtained using step 10And y0Inverse is applied to matrix P31 Zigzag is converted, and obtains matrix P1, is then implemented discrete wavelet to matrix P1 and is operated against sparse transformation, it is possible to after being decrypted Plaintext image P, size be 256 × 256.
Concrete steps are referred to described in example one.
In Fig. 8:A () is original image used by example two, (b) be the ciphertext graph picture after compression encryption, (c) is carrier figure Picture, is (d) the ciphertext graph picture of visual security, (e) is correct key decrypted image, (f) is solution when being decrypted using wrong key Close image.As shown in Figure 8, after being encrypted to plaintext image (a) according to encipherment scheme of the present invention, ciphertext graph picture (d) for obtaining It is the significant ciphertext graph picture of a width vision, when it is in transmission over networks and storage, visually with carrier image (c) phase Together, found and cracked by attacker so as to avoid, increased transmission and the safety for storing.Simultaneously according to decryption side of the present invention Case, using correct key, the decrypted image (e) for obtaining is essentially the same with plaintext image (a), can correctly decrypt, and uses wrong Miss key (y '0=0.7531+10-14, other keys are constant), decrypted image (f) class for obtaining is noise-like, and this illustrates this The encryption method that bright scheme is proposed is extremely sensitive to key, and algorithm has very high safety.
From above-described embodiment, the AES that the present invention is provided can carry out visual security and data peace to gray level image Full double-encryption, has broad application prospects in field of information encryption.
Above-mentioned specific embodiment is the invention is not limited in, those skilled in the art can also accordingly make various changes, But it is any all to cover within the scope of the claims with equivalent of the invention or similar change.

Claims (10)

1. a kind of image encryption method of the visual security and data safety based on compressed sensing, it is characterised in that:Comprising as follows Step:
Plaintext image P of the step 1. using the hash functions of SHA 256 to size for m × n is calculated, and obtains image key key, And calculate the initial value of one-dimensional skew tent chaotic maps and zigzag scrambles;
Step 2. carries out sparse process using wavelet transform to plaintext image P, obtains coefficient matrix P1;To coefficient matrix P1 Enter line shuffle according to zigzag paths, obtain the matrix P2 after scramble;By predetermined threshold value TS, matrix P2 is modified, is obtained To revised matrix P3;
Step 3. utilizes one-dimensional skew tent chaotic maps to generate the calculation matrix Φ for compressed sensing, and matrix P3 is entered Row measurement, obtains measuring value matrix P4, wherein, the compression ratio of plaintext image P is expressed as CR, the size of calculation matrix Φ be M × The size of N, then M=CR × m, N=m, matrix P4 is M × n;
Step 4. quantifies to the element of matrix P4, obtains matrix P5, as the ciphertext graph picture after compression encryption;
It is the visual pattern of m × n as carrier image CI that step 5. selects size, and implements wavelet transform to it, Obtain four matrixes:Low frequency part decomposition coefficient LL, horizontal direction decomposition coefficient LH, vertical direction decomposition coefficient HL and diagonal Directional Decomposition coefficient HH, is embedded matrix P5, and discrete wavelet inverse transformation is carried out again, obtains final vision significant Ciphertext graph picture.
2. the image encryption method of the visual security and data safety based on compressed sensing according to claim 1, it is special Levy and be:The initial value of one-dimensional skew tent chaotic maps and zigzag scrambles is calculated in the step 1, comprising:By image Key key is scaled 32 decimal number k1, k2..., k32, and calculate the parameter of one-dimensional skew tent chaotic maps and initial Value, and the initial position co-ordinates of zigzag scrambles.
3. the image encryption method of the visual security and data safety based on compressed sensing according to claim 2, it is special Levy and be:One-dimensional skew tent chaotic maps are expressed as:
z ( k + 1 ) = T &lsqb; z ( k ) ; r &rsqb; = z ( k ) r , 0 < z ( k ) < r 1 - z ( k ) 1 - r , r &le; z ( k ) < 1 ,
Wherein, r ∈ (0, be 1) systematic parameter, z ∈ (0,1) be chaos system state variable;And according to formula:
t i = &lsqb; l i + ( k 4 i - 2 + ( 4 i - 2 ) k 3 i + 3 i + k 5 i - 3 + ( 5 i - 3 ) k 4 i + 4 i ) &times; &Sigma; j = 1 32 k j &times; 2 8 &times; ( j - 1 ) 2 256 &rsqb; mod 1 , i = 1 , 2 , 3 , 4
To calculate 4 intermediate parameters ti(i=1,2,3,4), wherein, li(i=1,2,3,4) are preliminary setting parameter, represent respectively Parameter x '0, y '0, r ', z '0, calculated t3And t4Parameter r and initial value of one-dimensional skew tent chaotic maps are represented respectively z0;The initial position co-ordinates x of zigzag scrambles0And y0By formula:
It is calculated, wherein, abs (x) represents the absolute value for seeking x, and mod is modulo operation.
4. the image encryption method of the visual security and data safety based on compressed sensing according to claim 1, it is special Levy and be:Matrix P2 is modified in the step 2, is specifically included:By predetermined threshold value TS, the element in P2 is repaiied Just, the element less than or equal to TS is changed into 0.
5. the image encryption method of the visual security and data safety based on compressed sensing according to claim 1, it is special Levy and be:The one-dimensional skew tent chaotic maps that utilize in step 3 generate the calculation matrix Φ for compressed sensing, comprising such as Lower content:
Step 3.1, orderWherein, d represents the sampling interval, r,z0The parameter mapped for one-dimensional skew tent and initial value, l represents sampling length, and n represents Sampling starting point, step 1 will be counted Parameter r and initial value z of the one-dimensional skew tent chaotic maps for obtaining0It is raw in substituting into one-dimensional skew tent chaotic maps Into chaos sequence;
Step 3.2, according to formulaLine translation is entered to the numerical value of chaos sequence;
Step 3.3, generateArranged by row, obtained calculation matrix, size is M × N,
In formula,For normalized.
6. the image encryption method of the visual security and data safety based on compressed sensing according to claim 5, it is special Levy and be:Following content is also included in the step 3.1:The front n-1 numerical value of chaos sequence is abandoned, is opened from n-th numerical value Begin, at interval of d numbers, take out one, obtain new sequence of the length for MN, as the new chaos sequence replaced.
7. the image encryption method of the visual security and data safety based on compressed sensing according to claim 1, it is special Levy and be:Element in the step 4 to size for the matrix P4 of M × n quantifies, specifically comprising following content:By matrix Element in P4 is converted into a vector according to order from left to right, from top to bottom, according to formula:
p5i=floor (255 × (p4i-min)/(max-min))
Vector element is quantified one by one, wherein, min represents the minima of element in matrix P4, and max represents unit in matrix P4 The maximum of element, floor (x) is represented and is taken the no more than maximum integer of x, p4iMatrix P4 is represented according to from left to right, from top to bottom The vector that obtains of order in i-th element (1≤i≤Mn), by p5iThe vector of composition is converted into the matrix that size is M × n P5。
8. the image encryption method of the visual security and data safety based on compressed sensing according to claim 1, it is special Levy and be:The step 5 specifically includes following content:
Step 5.1, according to formula:
D1 (i, j)=P5 (i, j) mod10, D2 (i, j)=floor (P5 (i, j)/10)
Element in matrix P5 is processed one by one, matrix D 1 and D2 is obtained, wherein, D1 (i, j), D2 (i, j) and P5 (i, j) Represent respectively in matrix D 1, D2 and P5 positioned at the element at (i, j) place, 1≤i≤M, 1≤j≤n;
Step 5.2, according to compression ratio CR of plaintext image P, the size of matrix D 1, D2 and P5 is set;
Step 5.3, wavelet transform is carried out to carrier image CI, obtain four matrixes, be expressed as:Low frequency part is decomposed Coefficient LL, horizontal direction decomposition coefficient LH, vertical direction decomposition coefficient HL and diagonal decomposition coefficient HH, their size Size is identical with matrix D 1, D2 sizes;
Step 5.4, one size of definition and matrix D 1, D2 size identical empty matrix IT, in calculating LL matrixes Meansigma methodss MV of all elements, according to rule:
Rule 1:If LL (i, j) >=MV, then IT (i, j)=1, LH (i, j)=D1 (i, j), HL (i, j)=D2 (i, j),
Rule 2:If LL (i, j)<MV, then IT (i, j)=0, LH (i, j)=D2 (i, j), HL (i, j)=D1 (i, j), D1, In D2 embeded matrix LH and HL, wherein, 1≤i≤m/2,1≤j≤n/2;
Step 5.5, to be embedded in after four matrix Ls L, LH, HL and HH carry out discrete wavelet inverse transformation, obtain vision significant Ciphertext graph picture, ciphering process terminates.
9. a kind of image decryption method of the visual security and data safety based on compressed sensing, it is characterised in that:Specifically include Step is as follows:
Step a:Obtain image key key of plaintext image P, and parameter x '0、y′0、r′、z′0, min and max;
Step b:Image key key is scaled into 32 decimal number k1, k2..., k32, and calculate one-dimensional skew tent chaos and reflect The parameter penetrated and initial value, and the initial position co-ordinates of zigzag scrambles;One-dimensional skewtent chaotic maps are expressed as:
z ( k + 1 ) = T &lsqb; z ( k ) ; r &rsqb; = z ( k ) r , 0 < z ( k ) < r 1 - z ( k ) 1 - r , r &le; z ( k ) < 1 ,
Wherein, r ∈ (0, be 1) systematic parameter, z ∈ (0,1) be chaos system state variable;And according to formula:
t i = &lsqb; l i + ( k 4 i - 2 + ( 4 i - 2 ) k 3 i + 3 i + k 5 i - 3 + ( 5 i - 3 ) k 4 i + 4 i ) &times; &Sigma; j = 1 32 k j &times; 2 8 &times; ( j - 1 ) 2 256 &rsqb; mod 1 , i = 1 , 2 , 3 , 4
To calculate 4 intermediate parameters ti(i=1,2,3,4), wherein, li(i=1,2,3,4) are preliminary setting parameter, represent respectively Parameter x '0, y '0, r ', z '0, calculated t3And t4Parameter r and initial value of one-dimensional skew tent chaotic maps are represented respectively z0;The initial position co-ordinates x of zigzag scrambles0And y0By formula:
It is calculated, wherein, abs (x) represents the absolute value for seeking x, and mod is modulo operation;
Step c:To size to be decrypted for m × n ciphertext graph as C, carry out wavelet transform, obtain 4 sizes for (m/2) The matrix of × (n/2), respectively:Low frequency part decomposition coefficient LL1, horizontal direction decomposition coefficient LH1, vertical direction decomposition coefficient HL1 and diagonal decomposition coefficient HH1;
Step d:Define size for (m/2) × (n/2) empty matrix IT1, meansigma methodss MV1 of all elements of calculating matrix LL1, According to rule:
Regular A:If LL1 (i, j) >=MV1, then IT1 (i, j)=1, D11 (i, j)=LH1 (i, j), D21 (i, j)=HL1 (i, J),
Regular B:If LL1 (i, j)<MV1, then IT1 (i, j)=0, D21 (i, j)=LH1 (i, j), D11 (i, j)=HL1 (i, J), cleartext information is extracted from LH1 and HL1, obtains matrix D 11 and D21, wherein, 1≤i≤m/2,1≤j≤n/2;
Step e:Matrix D 11, D21 is transformed to into the matrix that size is (m/4) × n, and by formula:P51 (i, j)=D21 (i, J) × 10+D11 (i, j), obtains matrix P51, wherein, D11 (i, j), D21 (i, j) and P51 (i, j) represent respectively matrix D 11, D21 and P51 is located at the element at (i, j) place, 1≤i≤m/4,1≤j≤n;
Step f:Matrix P51 is converted into the vector that length is 1 × (mn/4), p according to order from left to right, from top to bottom51i (1≤i≤mn/4) is i-th element of vector, according to formula:
Inverse quantization operation is carried out one by one to vector element, p is obtained41i(1≤i≤mn/ 4), vector is changed into the matrix P41 that size is (m/4) × n;
Step g:The calculation matrix Φ 1 for compressed sensing is generated using one-dimensional skew tent chaotic maps, using compressed sensing Algorithm for reconstructing is reconstructed to P41, obtains matrix P31 of the size for m × n;
Step h:Using the calculated x of step b0And y0Implement inverse zigzag conversion to matrix P31, matrix P11 is obtained, to square Battle array P11 carries out discrete wavelet and operates against sparse transformation, the plaintext image P after being decrypted.
10. the image decryption method of the visual security and data safety based on compressed sensing according to claim 9, it is special Levy and be:The one-dimensional skew tent chaotic maps that utilize in step g generate the calculation matrix Φ 1 for compressed sensing, bag Containing following content:
Step g1, orderWherein, d represents the sampling interval, r,z0The parameter mapped for one-dimensional skew tent and initial value, l represents sampling length, and n represents Sampling starting point, and step b is calculated Parameter r and initial value z of the one-dimensional skew tent chaotic maps for obtaining0In substituting into one-dimensional skew tent chaotic maps, generate Sequence, the front n-1 numerical value of sequence is abandoned, and from the beginning of n-th numerical value, at interval of d numbers, takes out one, and obtaining length is The new sequence of MN, as chaos sequence;
Step g2, according to formulaLine translation is entered to the numerical value of chaos sequence;
Step g3, generateArranged by row, obtained calculation matrix, size is M × N,
In formula,For normalized.
CN201611046541.3A 2016-11-23 2016-11-23 Compressed sensing based visual security and the image encryption of data safety, decryption method Active CN106600518B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611046541.3A CN106600518B (en) 2016-11-23 2016-11-23 Compressed sensing based visual security and the image encryption of data safety, decryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611046541.3A CN106600518B (en) 2016-11-23 2016-11-23 Compressed sensing based visual security and the image encryption of data safety, decryption method

Publications (2)

Publication Number Publication Date
CN106600518A true CN106600518A (en) 2017-04-26
CN106600518B CN106600518B (en) 2019-06-21

Family

ID=58592154

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611046541.3A Active CN106600518B (en) 2016-11-23 2016-11-23 Compressed sensing based visual security and the image encryption of data safety, decryption method

Country Status (1)

Country Link
CN (1) CN106600518B (en)

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107481180A (en) * 2017-07-06 2017-12-15 河南大学 The image encryption method perceived based on cellular automata and splits' positions
CN107492064A (en) * 2017-07-06 2017-12-19 河南大学 Image encryption method based on memristor chaos system, elementary cellular automata and compressed sensing
CN107563949A (en) * 2017-08-31 2018-01-09 湖北工程学院 Image guard method and device, image restoring method and device
CN107659753A (en) * 2017-10-23 2018-02-02 北京邮电大学 The compression encryption method of image
CN107770405A (en) * 2017-10-23 2018-03-06 北京邮电大学 Image encryption method and device
CN108040191A (en) * 2017-12-20 2018-05-15 北京邮电大学 Image encryption and decryption method based on hash chain compressed sensing
CN108235029A (en) * 2018-01-05 2018-06-29 广西师范大学 A kind of compression of images encryption method based on compressed sensing and cai's circuit
CN108989029A (en) * 2018-07-18 2018-12-11 北京理工大学 Netkey distribution method, the device and system of imaging are calculated based on disturbance
CN109088725A (en) * 2018-07-18 2018-12-25 北京理工大学 The netkey distribution method for calculating imaging, device and system are disturbed based on cascade
CN109360141A (en) * 2018-09-11 2019-02-19 河南大学 Image encryption method based on compressed sensing and three-dimensional Cat maps
CN109558701A (en) * 2018-11-14 2019-04-02 成都理工大学 A kind of method of medical CT images secret sharing
CN110148078A (en) * 2019-05-15 2019-08-20 河南大学 The two width color image compression encryption methods based on two dimensional compaction perception
CN110944096A (en) * 2019-12-11 2020-03-31 齐齐哈尔大学 Image encryption method for meaningful ciphertext
CN111611604A (en) * 2020-05-15 2020-09-01 山东科技大学 Encrypted image reversible information hiding method based on integer wavelet transformation
CN111614455A (en) * 2020-04-30 2020-09-01 河南大学 Color image compression encryption method based on two-dimensional compression sensing and memristor chaotic system
CN111865553A (en) * 2020-06-05 2020-10-30 中国矿业大学 Multi-audio encryption method based on chaos and Zigzag transformation
CN112134681A (en) * 2020-08-19 2020-12-25 河南大学 Image compression encryption method and cloud-assisted decryption method based on compressed sensing and optical transformation
CN112311523A (en) * 2020-09-23 2021-02-02 西南大学 Signal compression encryption method based on coupling circuit system
CN113301046A (en) * 2021-05-25 2021-08-24 北京邮电大学 Compressed sensing data secure transmission method based on DRPE
CN113660079A (en) * 2021-08-13 2021-11-16 辽宁工程技术大学 Image encryption method based on self diffusion and DNA coding
CN113852827A (en) * 2021-08-18 2021-12-28 河海大学 Image encryption method based on partial block matching and half tensor product
CN113904764A (en) * 2021-09-18 2022-01-07 大连大学 Image encryption method based on multi-scale compressed sensing and Markov model
CN114157771A (en) * 2021-11-12 2022-03-08 广东海洋大学 Asymmetric reversible image hiding method based on compressed sensing
CN114553483A (en) * 2022-01-18 2022-05-27 北京工业大学 Novel image encryption algorithm based on Rucklip and compressed sensing
CN115442492A (en) * 2022-08-31 2022-12-06 河南大学 Visual security image encryption method based on newly designed one-dimensional sine chaotic mapping and discrete U transformation embedding mode

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103489151A (en) * 2013-09-11 2014-01-01 河南大学 Color image encryption method based on chaos sequence and hyper-chaos system
CN104881837A (en) * 2015-05-21 2015-09-02 河南大学 Hyper-chaotic system-based secret key dynamic selection image encryption algorithm
CN106023052A (en) * 2016-05-09 2016-10-12 河南大学 Image encryption algorithm based on memoristor hyper-chaotic system, cellular automaton and DNA calculation

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103489151A (en) * 2013-09-11 2014-01-01 河南大学 Color image encryption method based on chaos sequence and hyper-chaos system
CN104881837A (en) * 2015-05-21 2015-09-02 河南大学 Hyper-chaotic system-based secret key dynamic selection image encryption algorithm
CN106023052A (en) * 2016-05-09 2016-10-12 河南大学 Image encryption algorithm based on memoristor hyper-chaotic system, cellular automaton and DNA calculation

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
柴秀丽等: "一种基于时空混沌系统的彩色图像自适应位级加密算法", 《计算机科学》 *

Cited By (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107492064A (en) * 2017-07-06 2017-12-19 河南大学 Image encryption method based on memristor chaos system, elementary cellular automata and compressed sensing
CN107481180A (en) * 2017-07-06 2017-12-15 河南大学 The image encryption method perceived based on cellular automata and splits' positions
CN107481180B (en) * 2017-07-06 2019-10-22 河南大学 The image encryption method perceived based on cellular automata and splits' positions
CN107492064B (en) * 2017-07-06 2019-10-08 河南大学 Image encryption method based on memristor chaos system, elementary cellular automata and compressed sensing
CN107563949A (en) * 2017-08-31 2018-01-09 湖北工程学院 Image guard method and device, image restoring method and device
CN107659753B (en) * 2017-10-23 2019-08-06 北京邮电大学 The compression encryption method of image
CN107659753A (en) * 2017-10-23 2018-02-02 北京邮电大学 The compression encryption method of image
CN107770405A (en) * 2017-10-23 2018-03-06 北京邮电大学 Image encryption method and device
CN108040191A (en) * 2017-12-20 2018-05-15 北京邮电大学 Image encryption and decryption method based on hash chain compressed sensing
CN108235029A (en) * 2018-01-05 2018-06-29 广西师范大学 A kind of compression of images encryption method based on compressed sensing and cai's circuit
CN108235029B (en) * 2018-01-05 2021-03-23 广西师范大学 Image compression encryption method based on compressed sensing and Chua's circuit
CN109088725A (en) * 2018-07-18 2018-12-25 北京理工大学 The netkey distribution method for calculating imaging, device and system are disturbed based on cascade
CN108989029B (en) * 2018-07-18 2020-11-13 北京理工大学 Network key distribution method, device and system based on disturbance calculation imaging
CN108989029A (en) * 2018-07-18 2018-12-11 北京理工大学 Netkey distribution method, the device and system of imaging are calculated based on disturbance
CN109360141B (en) * 2018-09-11 2022-10-11 河南大学 Image encryption method based on compressed sensing and three-dimensional cat mapping
CN109360141A (en) * 2018-09-11 2019-02-19 河南大学 Image encryption method based on compressed sensing and three-dimensional Cat maps
CN109558701A (en) * 2018-11-14 2019-04-02 成都理工大学 A kind of method of medical CT images secret sharing
CN109558701B (en) * 2018-11-14 2022-11-22 成都理工大学 Medical CT image secret sharing method
CN110148078A (en) * 2019-05-15 2019-08-20 河南大学 The two width color image compression encryption methods based on two dimensional compaction perception
CN110944096A (en) * 2019-12-11 2020-03-31 齐齐哈尔大学 Image encryption method for meaningful ciphertext
CN110944096B (en) * 2019-12-11 2021-06-08 齐齐哈尔大学 Image encryption method for meaningful ciphertext
CN111614455A (en) * 2020-04-30 2020-09-01 河南大学 Color image compression encryption method based on two-dimensional compression sensing and memristor chaotic system
CN111611604A (en) * 2020-05-15 2020-09-01 山东科技大学 Encrypted image reversible information hiding method based on integer wavelet transformation
CN111865553A (en) * 2020-06-05 2020-10-30 中国矿业大学 Multi-audio encryption method based on chaos and Zigzag transformation
CN112134681A (en) * 2020-08-19 2020-12-25 河南大学 Image compression encryption method and cloud-assisted decryption method based on compressed sensing and optical transformation
CN112134681B (en) * 2020-08-19 2021-11-19 河南大学 Image compression encryption method and cloud-assisted decryption method
CN112311523A (en) * 2020-09-23 2021-02-02 西南大学 Signal compression encryption method based on coupling circuit system
CN113301046A (en) * 2021-05-25 2021-08-24 北京邮电大学 Compressed sensing data secure transmission method based on DRPE
CN113660079A (en) * 2021-08-13 2021-11-16 辽宁工程技术大学 Image encryption method based on self diffusion and DNA coding
CN113660079B (en) * 2021-08-13 2023-09-29 辽宁工程技术大学 Image encryption method based on self diffusion and DNA coding
CN113852827A (en) * 2021-08-18 2021-12-28 河海大学 Image encryption method based on partial block matching and half tensor product
CN113852827B (en) * 2021-08-18 2023-10-17 河海大学 Image encryption method based on partial block matching and half tensor product
CN113904764A (en) * 2021-09-18 2022-01-07 大连大学 Image encryption method based on multi-scale compressed sensing and Markov model
WO2023040365A1 (en) * 2021-09-18 2023-03-23 大连理工大学 Image encryption method based on multi-scale compressed sensing and markov model
CN114157771A (en) * 2021-11-12 2022-03-08 广东海洋大学 Asymmetric reversible image hiding method based on compressed sensing
CN114157771B (en) * 2021-11-12 2023-10-27 广东海洋大学 Asymmetric reversible image hiding method based on compressed sensing
CN114553483A (en) * 2022-01-18 2022-05-27 北京工业大学 Novel image encryption algorithm based on Rucklip and compressed sensing
CN114553483B (en) * 2022-01-18 2024-02-23 北京工业大学 Novel image encryption method based on Ruckedge and compressed sensing
CN115442492A (en) * 2022-08-31 2022-12-06 河南大学 Visual security image encryption method based on newly designed one-dimensional sine chaotic mapping and discrete U transformation embedding mode
CN115442492B (en) * 2022-08-31 2024-05-24 北京龙翼风科技有限公司 Visual security image encryption method based on one-dimensional sine chaotic mapping and discrete U-transformation embedding mode

Also Published As

Publication number Publication date
CN106600518B (en) 2019-06-21

Similar Documents

Publication Publication Date Title
CN106600518B (en) Compressed sensing based visual security and the image encryption of data safety, decryption method
Ghadirli et al. An overview of encryption algorithms in color images
Hosny et al. Novel encryption for color images using fractional-order hyperchaotic system
CN104680476B (en) The lossless encryption method of coloured image based on two-dimensional discrete wavelet conversion and space-time chaos
CN103167213B (en) Digital image encryption method based on Cat mapping and hyper-chaos Lorenz system
Khan et al. A literature review on image encryption techniques
CN108696666B (en) Color image encrypting method based on Latin square scramble
Wang et al. Multiple medical image encryption algorithm based on scrambling of region of interest and diffusion of odd-even interleaved points
CN109360141A (en) Image encryption method based on compressed sensing and three-dimensional Cat maps
CN108898539A (en) A kind of color image encrypting method of compatible JPEG compression standard
CN109660696A (en) A kind of new image encryption method
Yahi et al. A color image encryption scheme based on 1D cubic map
CN112202545B (en) Image encryption method based on Y-type filling curve and variable-step Joseph traversal
Zhang et al. A new algorithm of image compression and encryption based on spatiotemporal cross chaotic system
CN114157772B (en) Digital image encryption method based on space-time chaotic system and half tensor product compressed sensing
Zhang et al. Image encryption algorithm based on the Matryoshka transform and modular-inverse matrix
Sharma et al. Multi-image steganography and authentication using crypto-stego techniques
Saeed et al. A gray-scale image encryption using Fisher-Yates chaotic shuffling in wavelet domain
Banday et al. Multilevel medical image encryption for secure communication
Singh et al. DIP using image encryption and XOR operation affine transform
Abu-Alhaija Crypto-Steganographic LSB-based System for AES-Encrypted Data
Naik et al. An image cryptosystem based on diffusion of significant bit-planes of a scrambled image with generated binary key matrices
Parekh et al. Multilayer symmetric and asymmetric technique for audiovisual cryptography
Ye et al. Secure medical image sharing for smart healthcare system based on cellular neural network
Shyamala Chaos based image encryption scheme

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant