CN108513038A - A kind of image encryption transmission method - Google Patents
A kind of image encryption transmission method Download PDFInfo
- Publication number
- CN108513038A CN108513038A CN201810347869.1A CN201810347869A CN108513038A CN 108513038 A CN108513038 A CN 108513038A CN 201810347869 A CN201810347869 A CN 201810347869A CN 108513038 A CN108513038 A CN 108513038A
- Authority
- CN
- China
- Prior art keywords
- image information
- key
- recipient
- upsetting
- image
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32267—Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
- H04N1/32272—Encryption or ciphering
Abstract
The invention discloses a kind of image encryption transmission methods, it is used to safe transmit image information, after upsetting described image information the method includes sender and key sends jointly to recipient, and the image information after then being upset using the key pair by recipient is restored.This method encryption is good, and the time that Brute Force needs is very long, and processing procedure is more succinct.In terms of existing technologies, has the great advantage that high speed is completed.
Description
Technical field
The invention belongs to the communications field more particularly to a kind of image encryption transmission methods of safety strong security.
Background technology
Image transmitting includes the image transmitting of dynamic and static state, and in being transmitted equal communication process to it, secrecy is one
A very important link often has image or video to be stolen and impaired news report by hacker now.Therefore in image
It after acquisition, is handled, then transmits again and reduction is a prodigious demand.
The application provides for a kind of image transfer method, be used for it is safe image information is transmitted, including hair
After the side of sending upsets described image information and key sends jointly to recipient, is then upset using the key pair by recipient
Image information afterwards is restored.
On the one hand this method is that encryption is good, the time that Brute Force needs is very long, and processing procedure is more succinct.
In terms of existing technologies, has the great advantage that high speed is completed.
Invention content
The present invention gives a kind of image transfer method, be used for it is safe image information is transmitted, the method
After upsetting described image information including sender and key sends jointly to recipient, then uses the key by recipient
Image information after upsetting is restored.
Further, it is described by described image information upset including:
A detaches the three primary colours of image information, and the pixel value of its RGB three primary colours is stored in R [m] [n], G [m] respectively
[n], B [m] [n], wherein R [m] [n], G [m] [n], B [m] [n] are three two-dimensional arrays;
B carries out Chebyshev to the two-dimensional array using the key as the initial value of Chebyshev's chaos system and reflects
The iteration penetrated;
C is by iteration 2nOutput of the value as Chebyshev's system after secondary, wherein n are the digit of the key;
D carries out Rogers spy's chaos system iteration to the output, to obtain 3 chaos sequences X1, X2, X3;
E sorts from small to large to 3 chaos sequences and generates 3 for recording each element in original series
New sequence Y1, Y2, Y3 of position;
F regard (X1 [x], Y1 [y]), (X2 [x], Y2 [y]), (X3 [x], Y3 [y]) as three groups of location index values, image
Each pixel (x, y) of information, wherein x ∈ [0, m-1], y ∈ [0, n-1], in three color component values, i.e. three primary colours
Each pixel value R [x] [y], G [x] [y], B [x] [y] are respectively (X1 [x], Y1 to replace position in R, G, B two-dimensional array
[y]), three color component values of (X2 [x], Y2 [y]), (X3 [x], Y3 [y]), it is 3m × n to obtain the size after the scramble of position
Scrambled matrix C1 be upset after image information.
Further, the method further includes after the recipient receives the image information after upsetting, using institute
It states key and carries out the above-mentioned inverse operation for upsetting operation, obtain original image information.
The present invention has technique effect below:
On the one hand it is that encryption is good, the time that Brute Force needs is very long;
Another aspect processing procedure is more succinct, in terms of existing technologies, has the great advantage that high speed is completed,
Reduce the time cost needed for processing.
Description of the drawings
Fig. 1 is that the image information of the present invention upsets operational instances figure.
Specific implementation mode
Embodiment one.
A kind of transmission of image encryption, be used for it is safe image information is transmitted, the method includes senders will
After described image information is upset and key sends jointly to recipient, the figure after then being upset using the key pair by recipient
As information is restored.
Further, it is described by described image information upset including:
A detaches the three primary colours of image information, and the pixel value of its RGB three primary colours is stored in R [m] [n], G [m] respectively
[n], B [m] [n], wherein R [m] [n], G [m] [n], B [m] [n] are three two-dimensional arrays;
B carries out Chebyshev to the two-dimensional array using the key as the initial value of Chebyshev's chaos system and reflects
The iteration penetrated;
C is by iteration 2nOutput of the value as Chebyshev's system after secondary, wherein n are the digit of the key;
D carries out Rogers spy's chaos system iteration to the output, to obtain 3 chaos sequences X1, X2, X3;
E sorts from small to large to 3 chaos sequences and generates 3 for recording each element in original series
New sequence Y1, Y2, Y3 of position;
F regard (X1 [x], Y1 [y]), (X2 [x], Y2 [y]), (X3 [x], Y3 [y]) as three groups of location index values, image
Each pixel (x, y) of information, wherein x ∈ [0, m-1], y ∈ [0, n-1], in three color component values, i.e. three primary colours
Each pixel value R [x] [y], G [x] [y], B [x] [y] are respectively (X1 [x], Y1 to replace position in R, G, B two-dimensional array
[y]), three color component values of (X2 [x], Y2 [y]), (X3 [x], Y3 [y]), it is 3m × n to obtain the size after the scramble of position
Scrambled matrix C1 be upset after image information.
Further, the method further includes after the recipient receives the image information after upsetting, using institute
It states key and carries out the above-mentioned inverse operation for upsetting operation, obtain original image information.
Embodiment two.
A kind of transmission of image encryption, be used for it is safe image information is transmitted, the method includes senders will
After described image information is upset and key sends jointly to recipient, the figure after then being upset using the key pair by recipient
As information is restored.
Further, it is described by described image information upset including:
A detaches the three primary colours of image information, and the pixel value of its RGB three primary colours is stored in R [m] [n], G [m] respectively
[n], B [m] [n], wherein R [m] [n], G [m] [n], B [m] [n] are three two-dimensional arrays;
B carries out Chebyshev to the two-dimensional array using the key as the initial value of Chebyshev's chaos system and reflects
The iteration penetrated;
C is by iteration 2nOutput of the value as Chebyshev's system after secondary, wherein n are 128;
D carries out Rogers spy's chaos system iteration to the output, to obtain 3 chaos sequences X1, X2, X3;
E sorts from small to large to 3 chaos sequences and generates 3 for recording each element in original series
New sequence Y1, Y2, Y3 of position;
F regard (X1 [x], Y1 [y]), (X2 [x], Y2 [y]), (X3 [x], Y3 [y]) as three groups of location index values, image
Each pixel (x, y) of information, wherein x ∈ [0, m-1], y ∈ [0, n-1], in three color component values, i.e. three primary colours
Each pixel value R [x] [y], G [x] [y], B [x] [y] are respectively (X1 [x], Y1 to replace position in R, G, B two-dimensional array
[y]), three color component values of (X2 [x], Y2 [y]), (X3 [x], Y3 [y]), it is 3m × n to obtain the size after the scramble of position
Scrambled matrix C1 be upset after image information.
Further, the method further includes after the recipient receives the image information after upsetting, using institute
It states key and carries out the above-mentioned inverse operation for upsetting operation, obtain original image information.
Embodiment three.
A kind of transmission of image encryption, be used for it is safe image information is transmitted, the method includes senders will
Described image information is sent to recipient after upsetting, the image information after then being upset using key pair by recipient is gone back
It is former.Here the mode that dedicated network or special messenger transmit is taken in the transmission of key, close to prevent stopping leak.
Further, it is described by described image information upset including:
A detaches the three primary colours of image information, and the pixel value of its RGB three primary colours is stored in R [m] [n], G [m] respectively
[n], B [m] [n], wherein R [m] [n], G [m] [n], B [m] [n] are three two-dimensional arrays;
B carries out Chebyshev to the two-dimensional array using the key as the initial value of Chebyshev's chaos system and reflects
The iteration penetrated;
C is by iteration 2nOutput of the value as Chebyshev's system after secondary, wherein n are 256;
D carries out Rogers spy's chaos system iteration to the output, to obtain 3 chaos sequences X1, X2, X3;
E sorts from small to large to 3 chaos sequences and generates 3 for recording each element in original series
New sequence Y1, Y2, Y3 of position;
F regard (X1 [x], Y1 [y]), (X2 [x], Y2 [y]), (X3 [x], Y3 [y]) as three groups of location index values, image
Each pixel (x, y) of information, wherein x ∈ [0, m-1], y ∈ [0, n-1], in three color component values, i.e. three primary colours
Each pixel value R [x] [y], G [x] [y], B [x] [y] are respectively (X1 [x], Y1 to replace position in R, G, B two-dimensional array
[y]), three color component values of (X2 [x], Y2 [y]), (X3 [x], Y3 [y]), it is 3m × n to obtain the size after the scramble of position
Scrambled matrix C1 be upset after image information.
Further, the method further includes after the recipient receives the image information after upsetting, using institute
It states key and carries out the above-mentioned inverse operation for upsetting operation, obtain original image information.
The above embodiment is a preferred embodiment of the present invention, but embodiments of the present invention are not by above-described embodiment
Limitation, it is other it is any without departing from the spirit and principles of the present invention made by changes, modifications, substitutions, combinations, simplifications,
Equivalent substitute mode is should be, is included within the scope of the present invention.
Claims (3)
1. a kind of image encryption transmission method, it is used to safe transmit image information, which is characterized in that the method
After upsetting described image information including sender and key sends jointly to recipient, then uses the key by recipient
Image information after upsetting is restored.
2. image encryption transmission method as described in claim 1, which is characterized in that described that described image information is upset packet
It includes:
A detaches the three primary colours of image information, by the pixel value of its RGB three primary colours be stored in respectively R [m] [n], G [m] [n],
B [m] [n], wherein R [m] [n], G [m] [n], B [m] [n] are three two-dimensional arrays;
B uses the key to carry out Chebyshev map to the two-dimensional array as the initial value of Chebyshev's chaos system
Iteration;
C is by iteration 2nOutput of the value as Chebyshev's system after secondary, wherein n are the digit of the key;
D carries out Rogers spy's chaos system iteration to the output, to obtain 3 chaos sequences X1, X2, X3;
E sorts from small to large to 3 chaos sequences and generates 3 for recording each element position in original series
New sequence Y1, Y2, Y3;
F regard (X1 [x], Y1 [y]), (X2 [x], Y2 [y]), (X3 [x], Y3 [y]) as three groups of location index values, image information
Each pixel (x, y), wherein x ∈ [0, m-1], y ∈ [0, n-1], in three color component values, i.e. each picture of three primary colours
Element value R [x] [y], G [x] [y], B [x] [y], come replace in R, G, B two-dimensional array position be respectively (X1 [x], Y1 [y]),
Three color component values of (X2 [x], Y2 [y]), (X3 [x], Y3 [y]) obtain the encryption that the size after the scramble of position is 3m × n
Matrix C 1 is the image information after upsetting.
3. image encryption transmission method as claimed in claim 2, which is characterized in that the method further includes the recipient
After receiving the image information after described upset, the above-mentioned inverse operation for upsetting operation is carried out using the key, obtains original image
Information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810347869.1A CN108513038A (en) | 2018-04-18 | 2018-04-18 | A kind of image encryption transmission method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810347869.1A CN108513038A (en) | 2018-04-18 | 2018-04-18 | A kind of image encryption transmission method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108513038A true CN108513038A (en) | 2018-09-07 |
Family
ID=63382755
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810347869.1A Withdrawn CN108513038A (en) | 2018-04-18 | 2018-04-18 | A kind of image encryption transmission method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108513038A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109729234A (en) * | 2017-10-31 | 2019-05-07 | 六安市华海电子器材科技有限公司 | A kind of image transfer method |
WO2021104344A1 (en) * | 2019-11-29 | 2021-06-03 | 童勤业 | Anti-counterfeiting and encryption method based on random image scrambling technique |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106327414A (en) * | 2016-08-16 | 2017-01-11 | 广东工业大学 | Plaintext feature-based double-chaos image encryption method |
CN107330338A (en) * | 2017-08-22 | 2017-11-07 | 衡阳师范学院 | The color image encryption and decryption method and system spread based on double chaotic crossovers |
-
2018
- 2018-04-18 CN CN201810347869.1A patent/CN108513038A/en not_active Withdrawn
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106327414A (en) * | 2016-08-16 | 2017-01-11 | 广东工业大学 | Plaintext feature-based double-chaos image encryption method |
CN107330338A (en) * | 2017-08-22 | 2017-11-07 | 衡阳师范学院 | The color image encryption and decryption method and system spread based on double chaotic crossovers |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109729234A (en) * | 2017-10-31 | 2019-05-07 | 六安市华海电子器材科技有限公司 | A kind of image transfer method |
WO2021104344A1 (en) * | 2019-11-29 | 2021-06-03 | 童勤业 | Anti-counterfeiting and encryption method based on random image scrambling technique |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sheela et al. | Image encryption based on modified Henon map using hybrid chaotic shift transform | |
Ahmad et al. | Security analysis and enhancements of an image cryptosystem based on hyperchaotic system | |
EP0966809B1 (en) | Method of and apparatus for encrypting signals for transmission | |
CH641300A5 (en) | DEVICE FOR TESTING AND ENSURE INTEGRITY of transmitted data. | |
Philjon et al. | Metamorphic cryptography—A paradox between cryptography and steganography using dynamic encryption | |
CN108513038A (en) | A kind of image encryption transmission method | |
Abusukhon et al. | Secure network communication based on text-to-image encryption | |
Osman et al. | Hybrid multistage framework for data manipulation by combining cryptography and steganography | |
CN109302282B (en) | Commercial secret sending method based on data encryption technology | |
CN111556004A (en) | Hybrid dual network encryption system | |
Balakrishnan et al. | An improved image encryption using 2d logistic adjusted sine chaotic map with shuffled index matrix | |
CN109729234A (en) | A kind of image transfer method | |
Rani et al. | A novel and efficient approach to encrypt images using chaotic logistic map and stream cipher | |
Dansarie et al. | Breaking HALFLOOP-24 | |
CN105847233A (en) | Switch which carries out encrypted transmission according to fields | |
Raj et al. | An expeditious chaos based digital image encryption algorithm | |
CN105550972A (en) | Image encryption method for high dimension digital domain chaotic system | |
CN112637442B (en) | Method and device for encrypting circulating images by cloud server and local end | |
CN101330513A (en) | Method for synchronizing initiation vectors IV in an applied block cipher operation mode | |
Hossain et al. | An extension of vigenere technique to enhance the security of communication | |
Dixit et al. | Multilevel network security combining cryptography and steganography on ARM platform | |
CN109831295A (en) | A kind of Encryption Algorithm based on power emergency communication system | |
ايناس طارق et al. | Image encryption and decryption using CAST-128 with proposed adaptive key | |
Ganeshkumar et al. | Advance cryptography algorithm for symmetric image encryption and decryption scheme for improving data security | |
Ping et al. | A two-dimensional cellular automata based method for multiple image |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20180907 |