CN108513038A - A kind of image encryption transmission method - Google Patents

A kind of image encryption transmission method Download PDF

Info

Publication number
CN108513038A
CN108513038A CN201810347869.1A CN201810347869A CN108513038A CN 108513038 A CN108513038 A CN 108513038A CN 201810347869 A CN201810347869 A CN 201810347869A CN 108513038 A CN108513038 A CN 108513038A
Authority
CN
China
Prior art keywords
image information
key
recipient
upsetting
image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201810347869.1A
Other languages
Chinese (zh)
Inventor
刘慧�
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Foshan Travel Frog Technology Co Ltd
Original Assignee
Foshan Travel Frog Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Foshan Travel Frog Technology Co Ltd filed Critical Foshan Travel Frog Technology Co Ltd
Priority to CN201810347869.1A priority Critical patent/CN108513038A/en
Publication of CN108513038A publication Critical patent/CN108513038A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering

Abstract

The invention discloses a kind of image encryption transmission methods, it is used to safe transmit image information, after upsetting described image information the method includes sender and key sends jointly to recipient, and the image information after then being upset using the key pair by recipient is restored.This method encryption is good, and the time that Brute Force needs is very long, and processing procedure is more succinct.In terms of existing technologies, has the great advantage that high speed is completed.

Description

A kind of image encryption transmission method
Technical field
The invention belongs to the communications field more particularly to a kind of image encryption transmission methods of safety strong security.
Background technology
Image transmitting includes the image transmitting of dynamic and static state, and in being transmitted equal communication process to it, secrecy is one A very important link often has image or video to be stolen and impaired news report by hacker now.Therefore in image It after acquisition, is handled, then transmits again and reduction is a prodigious demand.
The application provides for a kind of image transfer method, be used for it is safe image information is transmitted, including hair After the side of sending upsets described image information and key sends jointly to recipient, is then upset using the key pair by recipient Image information afterwards is restored.
On the one hand this method is that encryption is good, the time that Brute Force needs is very long, and processing procedure is more succinct. In terms of existing technologies, has the great advantage that high speed is completed.
Invention content
The present invention gives a kind of image transfer method, be used for it is safe image information is transmitted, the method After upsetting described image information including sender and key sends jointly to recipient, then uses the key by recipient Image information after upsetting is restored.
Further, it is described by described image information upset including:
A detaches the three primary colours of image information, and the pixel value of its RGB three primary colours is stored in R [m] [n], G [m] respectively [n], B [m] [n], wherein R [m] [n], G [m] [n], B [m] [n] are three two-dimensional arrays;
B carries out Chebyshev to the two-dimensional array using the key as the initial value of Chebyshev's chaos system and reflects The iteration penetrated;
C is by iteration 2nOutput of the value as Chebyshev's system after secondary, wherein n are the digit of the key;
D carries out Rogers spy's chaos system iteration to the output, to obtain 3 chaos sequences X1, X2, X3;
E sorts from small to large to 3 chaos sequences and generates 3 for recording each element in original series New sequence Y1, Y2, Y3 of position;
F regard (X1 [x], Y1 [y]), (X2 [x], Y2 [y]), (X3 [x], Y3 [y]) as three groups of location index values, image Each pixel (x, y) of information, wherein x ∈ [0, m-1], y ∈ [0, n-1], in three color component values, i.e. three primary colours Each pixel value R [x] [y], G [x] [y], B [x] [y] are respectively (X1 [x], Y1 to replace position in R, G, B two-dimensional array [y]), three color component values of (X2 [x], Y2 [y]), (X3 [x], Y3 [y]), it is 3m × n to obtain the size after the scramble of position Scrambled matrix C1 be upset after image information.
Further, the method further includes after the recipient receives the image information after upsetting, using institute It states key and carries out the above-mentioned inverse operation for upsetting operation, obtain original image information.
The present invention has technique effect below:
On the one hand it is that encryption is good, the time that Brute Force needs is very long;
Another aspect processing procedure is more succinct, in terms of existing technologies, has the great advantage that high speed is completed, Reduce the time cost needed for processing.
Description of the drawings
Fig. 1 is that the image information of the present invention upsets operational instances figure.
Specific implementation mode
Embodiment one.
A kind of transmission of image encryption, be used for it is safe image information is transmitted, the method includes senders will After described image information is upset and key sends jointly to recipient, the figure after then being upset using the key pair by recipient As information is restored.
Further, it is described by described image information upset including:
A detaches the three primary colours of image information, and the pixel value of its RGB three primary colours is stored in R [m] [n], G [m] respectively [n], B [m] [n], wherein R [m] [n], G [m] [n], B [m] [n] are three two-dimensional arrays;
B carries out Chebyshev to the two-dimensional array using the key as the initial value of Chebyshev's chaos system and reflects The iteration penetrated;
C is by iteration 2nOutput of the value as Chebyshev's system after secondary, wherein n are the digit of the key;
D carries out Rogers spy's chaos system iteration to the output, to obtain 3 chaos sequences X1, X2, X3;
E sorts from small to large to 3 chaos sequences and generates 3 for recording each element in original series New sequence Y1, Y2, Y3 of position;
F regard (X1 [x], Y1 [y]), (X2 [x], Y2 [y]), (X3 [x], Y3 [y]) as three groups of location index values, image Each pixel (x, y) of information, wherein x ∈ [0, m-1], y ∈ [0, n-1], in three color component values, i.e. three primary colours Each pixel value R [x] [y], G [x] [y], B [x] [y] are respectively (X1 [x], Y1 to replace position in R, G, B two-dimensional array [y]), three color component values of (X2 [x], Y2 [y]), (X3 [x], Y3 [y]), it is 3m × n to obtain the size after the scramble of position Scrambled matrix C1 be upset after image information.
Further, the method further includes after the recipient receives the image information after upsetting, using institute It states key and carries out the above-mentioned inverse operation for upsetting operation, obtain original image information.
Embodiment two.
A kind of transmission of image encryption, be used for it is safe image information is transmitted, the method includes senders will After described image information is upset and key sends jointly to recipient, the figure after then being upset using the key pair by recipient As information is restored.
Further, it is described by described image information upset including:
A detaches the three primary colours of image information, and the pixel value of its RGB three primary colours is stored in R [m] [n], G [m] respectively [n], B [m] [n], wherein R [m] [n], G [m] [n], B [m] [n] are three two-dimensional arrays;
B carries out Chebyshev to the two-dimensional array using the key as the initial value of Chebyshev's chaos system and reflects The iteration penetrated;
C is by iteration 2nOutput of the value as Chebyshev's system after secondary, wherein n are 128;
D carries out Rogers spy's chaos system iteration to the output, to obtain 3 chaos sequences X1, X2, X3;
E sorts from small to large to 3 chaos sequences and generates 3 for recording each element in original series New sequence Y1, Y2, Y3 of position;
F regard (X1 [x], Y1 [y]), (X2 [x], Y2 [y]), (X3 [x], Y3 [y]) as three groups of location index values, image Each pixel (x, y) of information, wherein x ∈ [0, m-1], y ∈ [0, n-1], in three color component values, i.e. three primary colours Each pixel value R [x] [y], G [x] [y], B [x] [y] are respectively (X1 [x], Y1 to replace position in R, G, B two-dimensional array [y]), three color component values of (X2 [x], Y2 [y]), (X3 [x], Y3 [y]), it is 3m × n to obtain the size after the scramble of position Scrambled matrix C1 be upset after image information.
Further, the method further includes after the recipient receives the image information after upsetting, using institute It states key and carries out the above-mentioned inverse operation for upsetting operation, obtain original image information.
Embodiment three.
A kind of transmission of image encryption, be used for it is safe image information is transmitted, the method includes senders will Described image information is sent to recipient after upsetting, the image information after then being upset using key pair by recipient is gone back It is former.Here the mode that dedicated network or special messenger transmit is taken in the transmission of key, close to prevent stopping leak.
Further, it is described by described image information upset including:
A detaches the three primary colours of image information, and the pixel value of its RGB three primary colours is stored in R [m] [n], G [m] respectively [n], B [m] [n], wherein R [m] [n], G [m] [n], B [m] [n] are three two-dimensional arrays;
B carries out Chebyshev to the two-dimensional array using the key as the initial value of Chebyshev's chaos system and reflects The iteration penetrated;
C is by iteration 2nOutput of the value as Chebyshev's system after secondary, wherein n are 256;
D carries out Rogers spy's chaos system iteration to the output, to obtain 3 chaos sequences X1, X2, X3;
E sorts from small to large to 3 chaos sequences and generates 3 for recording each element in original series New sequence Y1, Y2, Y3 of position;
F regard (X1 [x], Y1 [y]), (X2 [x], Y2 [y]), (X3 [x], Y3 [y]) as three groups of location index values, image Each pixel (x, y) of information, wherein x ∈ [0, m-1], y ∈ [0, n-1], in three color component values, i.e. three primary colours Each pixel value R [x] [y], G [x] [y], B [x] [y] are respectively (X1 [x], Y1 to replace position in R, G, B two-dimensional array [y]), three color component values of (X2 [x], Y2 [y]), (X3 [x], Y3 [y]), it is 3m × n to obtain the size after the scramble of position Scrambled matrix C1 be upset after image information.
Further, the method further includes after the recipient receives the image information after upsetting, using institute It states key and carries out the above-mentioned inverse operation for upsetting operation, obtain original image information.
The above embodiment is a preferred embodiment of the present invention, but embodiments of the present invention are not by above-described embodiment Limitation, it is other it is any without departing from the spirit and principles of the present invention made by changes, modifications, substitutions, combinations, simplifications, Equivalent substitute mode is should be, is included within the scope of the present invention.

Claims (3)

1. a kind of image encryption transmission method, it is used to safe transmit image information, which is characterized in that the method After upsetting described image information including sender and key sends jointly to recipient, then uses the key by recipient Image information after upsetting is restored.
2. image encryption transmission method as described in claim 1, which is characterized in that described that described image information is upset packet It includes:
A detaches the three primary colours of image information, by the pixel value of its RGB three primary colours be stored in respectively R [m] [n], G [m] [n], B [m] [n], wherein R [m] [n], G [m] [n], B [m] [n] are three two-dimensional arrays;
B uses the key to carry out Chebyshev map to the two-dimensional array as the initial value of Chebyshev's chaos system Iteration;
C is by iteration 2nOutput of the value as Chebyshev's system after secondary, wherein n are the digit of the key;
D carries out Rogers spy's chaos system iteration to the output, to obtain 3 chaos sequences X1, X2, X3;
E sorts from small to large to 3 chaos sequences and generates 3 for recording each element position in original series New sequence Y1, Y2, Y3;
F regard (X1 [x], Y1 [y]), (X2 [x], Y2 [y]), (X3 [x], Y3 [y]) as three groups of location index values, image information Each pixel (x, y), wherein x ∈ [0, m-1], y ∈ [0, n-1], in three color component values, i.e. each picture of three primary colours Element value R [x] [y], G [x] [y], B [x] [y], come replace in R, G, B two-dimensional array position be respectively (X1 [x], Y1 [y]), Three color component values of (X2 [x], Y2 [y]), (X3 [x], Y3 [y]) obtain the encryption that the size after the scramble of position is 3m × n Matrix C 1 is the image information after upsetting.
3. image encryption transmission method as claimed in claim 2, which is characterized in that the method further includes the recipient After receiving the image information after described upset, the above-mentioned inverse operation for upsetting operation is carried out using the key, obtains original image Information.
CN201810347869.1A 2018-04-18 2018-04-18 A kind of image encryption transmission method Withdrawn CN108513038A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810347869.1A CN108513038A (en) 2018-04-18 2018-04-18 A kind of image encryption transmission method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810347869.1A CN108513038A (en) 2018-04-18 2018-04-18 A kind of image encryption transmission method

Publications (1)

Publication Number Publication Date
CN108513038A true CN108513038A (en) 2018-09-07

Family

ID=63382755

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810347869.1A Withdrawn CN108513038A (en) 2018-04-18 2018-04-18 A kind of image encryption transmission method

Country Status (1)

Country Link
CN (1) CN108513038A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109729234A (en) * 2017-10-31 2019-05-07 六安市华海电子器材科技有限公司 A kind of image transfer method
WO2021104344A1 (en) * 2019-11-29 2021-06-03 童勤业 Anti-counterfeiting and encryption method based on random image scrambling technique

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106327414A (en) * 2016-08-16 2017-01-11 广东工业大学 Plaintext feature-based double-chaos image encryption method
CN107330338A (en) * 2017-08-22 2017-11-07 衡阳师范学院 The color image encryption and decryption method and system spread based on double chaotic crossovers

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106327414A (en) * 2016-08-16 2017-01-11 广东工业大学 Plaintext feature-based double-chaos image encryption method
CN107330338A (en) * 2017-08-22 2017-11-07 衡阳师范学院 The color image encryption and decryption method and system spread based on double chaotic crossovers

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109729234A (en) * 2017-10-31 2019-05-07 六安市华海电子器材科技有限公司 A kind of image transfer method
WO2021104344A1 (en) * 2019-11-29 2021-06-03 童勤业 Anti-counterfeiting and encryption method based on random image scrambling technique

Similar Documents

Publication Publication Date Title
Sheela et al. Image encryption based on modified Henon map using hybrid chaotic shift transform
Ahmad et al. Security analysis and enhancements of an image cryptosystem based on hyperchaotic system
EP0966809B1 (en) Method of and apparatus for encrypting signals for transmission
CH641300A5 (en) DEVICE FOR TESTING AND ENSURE INTEGRITY of transmitted data.
Philjon et al. Metamorphic cryptography—A paradox between cryptography and steganography using dynamic encryption
CN108513038A (en) A kind of image encryption transmission method
Abusukhon et al. Secure network communication based on text-to-image encryption
Osman et al. Hybrid multistage framework for data manipulation by combining cryptography and steganography
CN109302282B (en) Commercial secret sending method based on data encryption technology
CN111556004A (en) Hybrid dual network encryption system
Balakrishnan et al. An improved image encryption using 2d logistic adjusted sine chaotic map with shuffled index matrix
CN109729234A (en) A kind of image transfer method
Rani et al. A novel and efficient approach to encrypt images using chaotic logistic map and stream cipher
Dansarie et al. Breaking HALFLOOP-24
CN105847233A (en) Switch which carries out encrypted transmission according to fields
Raj et al. An expeditious chaos based digital image encryption algorithm
CN105550972A (en) Image encryption method for high dimension digital domain chaotic system
CN112637442B (en) Method and device for encrypting circulating images by cloud server and local end
CN101330513A (en) Method for synchronizing initiation vectors IV in an applied block cipher operation mode
Hossain et al. An extension of vigenere technique to enhance the security of communication
Dixit et al. Multilevel network security combining cryptography and steganography on ARM platform
CN109831295A (en) A kind of Encryption Algorithm based on power emergency communication system
ايناس طارق et al. Image encryption and decryption using CAST-128 with proposed adaptive key
Ganeshkumar et al. Advance cryptography algorithm for symmetric image encryption and decryption scheme for improving data security
Ping et al. A two-dimensional cellular automata based method for multiple image

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20180907