CN108718232A - Image encryption method based on AES and chaos - Google Patents
Image encryption method based on AES and chaos Download PDFInfo
- Publication number
- CN108718232A CN108718232A CN201810938159.6A CN201810938159A CN108718232A CN 108718232 A CN108718232 A CN 108718232A CN 201810938159 A CN201810938159 A CN 201810938159A CN 108718232 A CN108718232 A CN 108718232A
- Authority
- CN
- China
- Prior art keywords
- chaos
- aes
- image
- big integer
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/001—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
Abstract
One kind being based on high-level data encryption standard(Advanced Encryption Standard, AES)With the image encryption method of chaos, belong to information security field.Currently, how the fast development of multimedia communication technology, protect the safety of picture material to cause the common concern of industrial quarters and academia.The present invention proposes a kind of image encryption method based on AES and chaos.First, number is encrypted to reduce, sender converts multiple pixels to a big integer;Secondly, with AES and chaos encryption these big integers;Finally, encrypted image is constituted by encrypting big integer.Experiment shows:This method is safe efficient and cipher round results are good.
Description
Technical field
The present invention relates to a kind of information encryptions, more particularly to a kind of image encryption method.
Background technology
In fields such as military system, E-Government, financial system and daily lifes, a large amount of figure can be all generated daily
Picture.To protect these image information contents not to be stolen, image encryption technology causes the extensive concern of academia and industrial quarters.
Researcher has proposed a variety of image encryption methods.However, these method some have been decrypted, some safeties are weak, some efficiency
The problems such as low, it is difficult to satisfactory.
To improve safety and the efficiency of image encryption, ensures the safe and efficient transmission of image, encrypted in conjunction with high-level data
Standard(Advanced Encryption Standard, AES)And chaology, devise a kind of figure based on AES and chaos
As encryption method.This process employs AES high securities and the randomnesss and complexity of chaos, are effectively protected interaction
The safety of image network transimission and storage.
Invention content
The purpose of the present invention:It is weak or the problems such as encryption efficiency is low for conventional images encryption method safety, it proposes a kind of
Image encryption method based on AES and chaos.
Technical scheme of the present invention:For achieving the above object, the technical solution used is the figure based on AES and chaos
As encryption method, it is Alice to enable sender, and the encrypting step of recipient Bob, Alice are as follows:
Step 1:Enable plaintext imageISize ism×n, obtained using hash algorithm SHA-256ICorresponding 256 cryptographic HashK=k 1,k 2, …, k i, …, k 32, whereink iIt is 8, enables Piecewise linear chaotic map(Piecewise Linear Chaotic
Map, PLCM)Initial valuex 0And parameterq, the iteration mappingm×nIt is secondary, generate a chaos sequenceX={x i } mn ;
Step 2:Alice willXIt is converted into a new integer chaos sequenceY={y i } mn ;It, will according to element positionYBe converted to one
Width size ism×nChaos imageC;
Step 3:For gray image, pixel value is usually indicated with 8 binary systems;16 pixel values are merged into one
Big integer;Thus can be from plaintext imageIObtain (m×nThe big integer in)/16b 1, b 2, …, b (m×n)/16};Similarly, may be used
From chaos imageCObtain (m×nThe big integer of)/16 chaosr 1, r 2, …, r (m×n)/16};
Step 4:It enablesK 1For the encryption key of AES, big integer sequence in plain text is encrypted using AES and the big integer sequence of chaos
Operation, can must encrypt big integerc 1, c 2, …, c (m×n)/16};
Step 5:Big integer will each be encryptedc i,i=1, 2, 3, …,(m×n)/16 are divided into 16 equal portions, and they are converted
Pixel valuep i 1, p i 2, …, p i 16,};According to location of pixels, converting these pixel values to a width size ism×nPlus
Close imageE。
Further, in the step 1, PLCM equations are:
,(1).
Further, in the step 1, the initial value of PLCM is:x 0=(k 1⊕k 2⊕…⊕k 16The parameter of)/255, PLCM
For:q=(k 17⊕k 18⊕…⊕k 32)/510。
Further, in the step 2, if the precision of computer is 10-16, Alice calculating
y i =mod(x i×1016, 256),(2)
Wherein,x iForX?iA element, it is all y iConstitute a new integer chaos sequenceY={y i } mn 。
Further, in the step 3, first big integer is:
b 1=I 1,1 I 1,2…I 1,16(3)
Wherein,I 1,1 I 1,2…I 1,16The binary representation of element value.
Further, in the step 4, cryptographic operation is:
c 1=AES e(K 1 b 1)⊕r 1,(4)
c i =b i⊕c 1⊕r i,i=2, 3, …, (m×n)/16,(5)
Wherein,AES e() is the encryption function of AES.
In decrypting process, using identical chaos sequence and corresponding AES decryption methods to encrypted imageEIt is solved
It is close, original interactive graphic picture can be obtained.The decrypting process of Bob is the encrypted inverse process of Alice.
Advantageous effect:The present invention is directed to the disadvantages such as existing image encryption method safety is poor or encryption efficiency is low, proposes
A kind of image encryption method based on AES and chaos.Main contributions have:(1)This process employs the high securities of AES, have
Improve to effect the safety of encryption method;(2)This process employs the randomness of chaos and complexity, improve adding for image
Close effect;(3)This method reduces encryption number, improves encryption efficiency using big integer as encrypted object.It is therefore proposed that
Image encryption method has efficient, safety and the good feature of cipher round results, can be effectively protected interaction figure picture network transmission
With the safety of storage.
Description of the drawings
Fig. 1:The encryption flow figure of image encryption method based on AES and chaos;
Fig. 2:The decryption flow chart of image encryption method based on AES and chaos;
Fig. 3:Original image;
Fig. 4:Chaos image;
Fig. 5:Encrypted image.
Specific implementation mode
The implementation process of the present invention is further described with reference to specific attached drawing and example.
Fig. 1 is the encryption flow figure of this method, and Fig. 2 is the decryption flow chart of this method.
For the programming software used for 2015 CI of MyEclipse, it is 512 × 512 to choose width size shown in Fig. 3
Lena images are as original interactive graphic picture.Using this method, Alice is described as follows the encrypted detailed process of interaction figure picture:
Step 1:Corresponding 256 cryptographic Hash of original image are obtained using hash algorithm SHA-256K=
9ae48c65bb78a5c6d0 d9496f9364f36efc2bd2f2a3f521763e16edc434977e9e(Hexadecimal table
Show), calculation formula(1)Shown in PLCM chaotic maps initial valuex 0=0.447058823529412 and parameterq=
0.352941176470588, iterative formula(1)512 × 512 times, generate a chaos sequenceX={x i }262144。
Step 2:Alice is according to formula(2)An integer chaos sequence is calculatedY={y i }262144;According to element position
It sets, it willYBe converted to the chaos image that a width size is 512 × 512C, as shown in Figure 4.
Step 3:According to formula(3), 16 pixel values are merged into a big integer;To be obtained from plaintext image
4096 big integerb 1, b 2, …, b 4096};It similarly, also can be from chaos imageCObtain 4096 big integerr 1, r 2,
…, r 4096}。
Step 4:Choose the encryption key of AESK 1=84AAC 12F54AB666ECFC2A83C676908C8BBC381
Behaviour is encrypted to big integer sequence in plain text using AES and the big integer sequence of chaos in B1F11EF5B2B433F3962493F52C
Make, can must encrypt big integerc 1, c 2, …, c (m×n)/16};
Step 5:By encrypted big integerc i,i=1,2,3 ..., 4096 are divided into 16 equal portions, and convert them to pixel
Valuep i 1, p i 2, …, p i 16};According to location of pixels, it converts these pixel values to the encryption that a width size is 512 × 512
Image,As shown in Figure 5.
In decrypting process, encrypted image is acted on using identical chaos sequence and corresponding AES decryption methods, can be obtained
Decrypted image is the same as shown in Fig. 3.The decrypting process of Bob is the encrypted inverse process of Alice, and Fig. 2 is the decryption flow chart of this method.
Claims (7)
1. the image encryption method based on AES and chaos, which is characterized in that ciphering process includes the following steps:
Step 1:Enable plaintext imageISize ism×n, obtained using hash algorithm SHA-256ICorresponding 256 cryptographic HashK=k 1,k 2, …, k i, …, k 32, whereink iIt is 8, enables Piecewise linear chaotic map(Piecewise Linear Chaotic
Map, PLCM)Initial valuex 0And parameterq, the iteration mappingm×nIt is secondary, generate a chaos sequenceX={x i } mn ;
Step 2:It willXIt is converted into a new integer chaos sequenceY={y i } mn ;It, will according to element positionYBe converted to a width size
Form×nChaos imageC;
Step 3:For gray image, pixel value is usually indicated with 8 binary systems;16 pixel values are merged into one
Big integer;Thus can be from plaintext imageIObtain (m×nThe big integer in)/16b 1, b 2, …, b (m×n)/16};Similarly, may be used
From chaos imageCObtain (m×nThe big integer of)/16 chaosr 1, r 2, …, r (m×n)/16};
Step 4:It enablesK 1For the encryption key of AES, big integer sequence in plain text is encrypted using AES and the big integer sequence of chaos
Operation, can must encrypt big integerc 1, c 2, …, c (m×n)/16};
Step 5:Big integer will each be encryptedc i,i=1, 2, 3, …,(m×n)/16 are divided into 16 equal portions, and they are converted
Pixel valuep i 1, p i 2, …, p i 16,};According to location of pixels, converting these pixel values to a width size ism×nPlus
Close imageE。
2. according to the method described in claim 1, it is characterized in that:In the step 1, PLCM equations are:
,(1).
3. according to the method described in claim 1, it is characterized in that:In the step 1, the initial value of PLCM is:x 0=(k 1⊕k 2
⊕…⊕k 16The parameter of)/255, PLCM is:q=(k 17⊕k 18⊕…⊕k 32)/510。
4. according to the method described in claim 1, it is characterized in that:In the step 2, if the precision of computer is 10-16,
Alice is calculated
y i =mod(x i×1016, 256),(2)
Wherein,x iForX?iA element, it is all y iConstitute a new integer chaos sequenceY={y i } mn 。
5. according to the method described in claim 1, it is characterized in that:In the step 3, first big integer is:
b 1=I 1,1 I 1,2…I 1,16(3)
Wherein,I 1,1 I 1,2…I 1,16The binary representation of element value.
6. according to the method described in claim 1, it is characterized in that:In the step 4, cryptographic operation is:
c 1=AES e(K 1 b 1)⊕r 1,(4)
c i =b i⊕c 1⊕r i,i=2, 3, …, (m×n)/16,(5)
Wherein,AES e() is the encryption function of AES.
7. the image encryption method based on AES and chaos, it is characterised in that:Decrypting process is encrypted inverse process;Using identical
Chaos sequence and corresponding AES decryption methods to encrypted imageEOperation is decrypted, original interactive graphic picture can be obtained.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810938159.6A CN108718232B (en) | 2018-08-17 | 2018-08-17 | Image encryption method based on AES and chaos |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810938159.6A CN108718232B (en) | 2018-08-17 | 2018-08-17 | Image encryption method based on AES and chaos |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108718232A true CN108718232A (en) | 2018-10-30 |
CN108718232B CN108718232B (en) | 2021-03-26 |
Family
ID=63913877
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810938159.6A Active CN108718232B (en) | 2018-08-17 | 2018-08-17 | Image encryption method based on AES and chaos |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108718232B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109660695A (en) * | 2018-12-06 | 2019-04-19 | 广西师范大学 | A kind of color image encrypting method based on Global Genetic Simulated Annealing Algorithm and chaotic maps |
CN110086601A (en) * | 2019-04-28 | 2019-08-02 | 郑州轻工业学院 | Based on the associated Josephus traversing of pixel value and hyperchaotic system image encryption method |
CN112953890A (en) * | 2021-01-12 | 2021-06-11 | 国电南瑞南京控制系统有限公司 | Information encryption method and device for client side energy utilization control system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1467514A1 (en) * | 2003-04-07 | 2004-10-13 | STMicroelectronics S.r.l. | Encryption process employing modified chaotic maps and relative digital signature process |
CN104868989A (en) * | 2015-06-11 | 2015-08-26 | 湘潭大学 | Encryption method for image data secure transmission |
CN105450899A (en) * | 2015-12-07 | 2016-03-30 | 中国矿业大学 | Multi-image encryption method based on piecewise linear chaotic map (PWLCM) |
CN106604040A (en) * | 2016-12-12 | 2017-04-26 | 中国矿业大学 | Multi-image encryption method based on mixed primitives and full permutation |
CN108199824A (en) * | 2018-01-18 | 2018-06-22 | 黑龙江大学 | Video encryption method and video flowing method for safety monitoring based on AES-CTR and chaos algorithm |
-
2018
- 2018-08-17 CN CN201810938159.6A patent/CN108718232B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1467514A1 (en) * | 2003-04-07 | 2004-10-13 | STMicroelectronics S.r.l. | Encryption process employing modified chaotic maps and relative digital signature process |
CN104868989A (en) * | 2015-06-11 | 2015-08-26 | 湘潭大学 | Encryption method for image data secure transmission |
CN105450899A (en) * | 2015-12-07 | 2016-03-30 | 中国矿业大学 | Multi-image encryption method based on piecewise linear chaotic map (PWLCM) |
CN106604040A (en) * | 2016-12-12 | 2017-04-26 | 中国矿业大学 | Multi-image encryption method based on mixed primitives and full permutation |
CN108199824A (en) * | 2018-01-18 | 2018-06-22 | 黑龙江大学 | Video encryption method and video flowing method for safety monitoring based on AES-CTR and chaos algorithm |
Non-Patent Citations (1)
Title |
---|
XIAOQIANG ZHANG ET AL.: "Digital Image Encryption Algorithm Based on Elliptic Curve Public Cryptosystem", 《2018 IEEE》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109660695A (en) * | 2018-12-06 | 2019-04-19 | 广西师范大学 | A kind of color image encrypting method based on Global Genetic Simulated Annealing Algorithm and chaotic maps |
CN109660695B (en) * | 2018-12-06 | 2020-03-10 | 广西师范大学 | Color image encryption method based on genetic simulated annealing algorithm and chaotic mapping |
CN110086601A (en) * | 2019-04-28 | 2019-08-02 | 郑州轻工业学院 | Based on the associated Josephus traversing of pixel value and hyperchaotic system image encryption method |
CN112953890A (en) * | 2021-01-12 | 2021-06-11 | 国电南瑞南京控制系统有限公司 | Information encryption method and device for client side energy utilization control system |
CN112953890B (en) * | 2021-01-12 | 2023-11-21 | 国电南瑞南京控制系统有限公司 | Information encryption method and device for client side energy consumption control system |
Also Published As
Publication number | Publication date |
---|---|
CN108718232B (en) | 2021-03-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110235409B (en) | Method for protected RSA signature or decryption using homomorphic encryption | |
CN107657579B (en) | Image encryption method based on DNA coding and chaos | |
US6490353B1 (en) | Data encrypting and decrypting apparatus and method | |
Ali et al. | A novel color image encryption scheme based on a new dynamic compound chaotic map and S-box | |
CN109241755A (en) | Image encryption method based on three-dimensional scramble model and chaos | |
Li | Fingerprint-related chaotic image encryption scheme based on blockchain framework | |
CN105184115A (en) | Method For Including An Implicit Integrity Or Authenticity Check Into A White-box Implementation | |
CN108718232A (en) | Image encryption method based on AES and chaos | |
Abusukhon et al. | Secure network communication based on text-to-image encryption | |
CN105095695A (en) | Realizing authorization via incorrect functional behavior of a white-box implementation | |
EP3226164A1 (en) | Watermarking input and output of a white-box implementation | |
Nazarkevych et al. | Data protection based on encryption using Ateb-functions | |
Yahaya et al. | Cryptosystem for secure data transmission using Advance Encryption Standard (AES) and Steganography | |
Ahmad et al. | Distributed text-to-image encryption algorithm | |
CN105281893A (en) | Method for introducing dependence of white-box implementation on a set of strings | |
US8130949B2 (en) | Partially reversible key obfuscation | |
Karolin et al. | Authentic secret share creation techniques using visual cryptography with public key encryption | |
Sharma et al. | Multi-image steganography and authentication using crypto-stego techniques | |
CN109274856B (en) | Asymmetrical image encryption method based on ECC and chaos | |
CN115765963A (en) | Text image audit information recording and extracting method based on reversible steganography of ciphertext domain | |
Sarmah et al. | Cryptography and digital image steganography techniques | |
Goudar et al. | Secure data transmission using steganography based data hiding in TCP/IP | |
Dweik et al. | A survey of lightweight image encryption for IoT | |
Ferdush et al. | A new image encryption technique combining the idea of one time pad with RGB value | |
Acharya et al. | Encryption and decryption of informative image by key image using modified Hill cipher technique based on non-invertible matrices |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |