CN108833733A - A kind of decryption method of the resume image based on chaos S box - Google Patents

A kind of decryption method of the resume image based on chaos S box Download PDF

Info

Publication number
CN108833733A
CN108833733A CN201810561623.4A CN201810561623A CN108833733A CN 108833733 A CN108833733 A CN 108833733A CN 201810561623 A CN201810561623 A CN 201810561623A CN 108833733 A CN108833733 A CN 108833733A
Authority
CN
China
Prior art keywords
image
pixel
value
box
pixel value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810561623.4A
Other languages
Chinese (zh)
Other versions
CN108833733B (en
Inventor
李名
黄蓉
李玲玲
徐亚楠
杨俊雪
郝远静
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Henan Normal University
Original Assignee
Henan Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Henan Normal University filed Critical Henan Normal University
Priority to CN201810561623.4A priority Critical patent/CN108833733B/en
Publication of CN108833733A publication Critical patent/CN108833733A/en
Application granted granted Critical
Publication of CN108833733B publication Critical patent/CN108833733B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering

Abstract

The invention discloses a kind of decryption methods of resume image based on chaos S box, selected pixels value is full 0, complete 1, complete 2 ... complete 255 256 gray level images first, this 256 gray level images are encrypted by former Encryption Algorithm, obtain 256 plaintext pixel matrixes;Then the pixel matrix to encrypted ciphertext image is obtained;Then by the pixel value of each position in 256 plaintext pixel matrixes, compared with the pixel value on the corresponding position of the pixel matrix of ciphertext image carries out traversal, each original pixel value corresponding to the pixel value of each position of ciphertext image is found out, to obtain original image corresponding to encrypted ciphertext image.The present invention can successfully crack out encrypted image in the case where not obtaining key, and not only image recovery rate is high, but also simplifies calculating process;The present invention is applicable not only to former Encryption Algorithm, and is suitable for any encryption system based on S box, has the advantages that image recovery rate is high, applied widely.

Description

A kind of decryption method of the resume image based on chaos S box
Technical field
The present invention relates to cryptanalysis technical field more particularly to a kind of solutions of the resume image based on chaos S box Decryption method.
Background technique
With the fast development of network technology, while bringing various convenient lives for people's lives, network information peace It also more attracts people's attention entirely.People carry out communication exchange by various transmission mediums, such as video, audio, file, image Deng inevitably generating some information security issues in the transmission process of transmission medium.For information security, need Guarantee the safety of the confidentiality, authenticity, integrality, unauthorised copies and institute's parasitic system of information.Letter under network security Breath secure scheme is the key that we ensure that information security, to carry out message authentication, data encryption, image encryption guarantee to pacify Full mechanism it is perfect, security system it is sound be our emphasis of interest.
Digital picture is a kind of image indicated in the form of two-dimensional digital group, has the characteristics that intuitive, is a kind of extensive The digital information of application.Since Digital Image Processing contains much information, occupied bandwidth, data redudancy is big, between adjacent pixel The high feature of similarity, using traditional encryption technology can generation efficiency be low, wastes the shortcomings that computing resource.Chaos system has The features such as intrinsic stochasticity, sensibility, ergodic, non-convergence, pseudo-randomness, the shortcomings that conventional encryption algorithm can be overcome, It is therefore widely used in image encryption field, therefore chaos cipher becomes one of the hot spot studied in novel cipher.
While cryptographic technique development, cryptanalysis technology has also obtained unprecedented development.To promote cryptographic system Safety, many new password cracking schemes are based on cryptanalysis technology and are suggested.The replacement of S box is normal in encryption system design It is a kind of classics technology, S box be used as non-linear components unique in Advanced Encryption Standard, be influence algorithm performance it is important because One of element helps to carry out safe encryption, resists differential cryptanalysis using powerful S box structure.
Et al. a kind of chaos system with high initial value sensitivity and wide key space was devised in 2017 System, so that the random sequence generated shows fabulous randomness in NIST test, and simple using chaos system design The low algorithm steps of computation complexity generate S box, experiments have shown that the S box generated has good performance, can effectively improve and add The safety of close algorithm.
In the S box resume image based on chaos, the decrypting process of Encryption Algorithm must only rely upon key, decryption Person can not be decrypted encrypted image when not knowing the key of encryption system;The method of S box replacement only changes square The numerical value of battle array, and the position of each pixel is had not been changed, start with and easily encrypted image can be solved from the replacement of S box It is close.
Summary of the invention
The purpose of the present invention is to provide a kind of decryption methods of resume image based on chaos S box, can be in nothing Method is decrypted encrypted image in the case where learning key, has calculating process simple, the high advantage of image restoring degree.
To achieve the above object, the present invention adopts the following technical scheme that:
A kind of decryption method of the resume image based on chaos S box, successively includes the following steps:
(1) selected pixels value is full 0, complete 1, complete 2 ... complete 255 256 gray level images, by this 256 gray level images It is encrypted by former Encryption Algorithm, obtains 256 plaintext pixel matrixes;
(2) pixel matrix of encrypted ciphertext image is obtained;
(3) in 256 plaintext pixel matrixes for obtaining step (1) each position pixel value, with ciphertext image Pixel value on the corresponding position of pixel matrix carries out traversal comparison, corresponding to the pixel value for finding out each position of ciphertext image Each original pixel value;
The process traversed to pixel is as follows:
If 256 plaintext pixel matrixes are that (M_j is added by the gray level image for being all j (j=1,2 ... ..., 256) to M_j It is close and obtain), ciphertext pixel matrix is C, and image size is M*N, successively compares plaintext picture element matrix M_j and ciphertext pixel square The pixel value of each position of battle array C if they are the same then records this value M_j (m, n), and (m, n) is the position of current pixel, So original pixel value j corresponding to this identical value M_j (m, n) is just denoted as corresponding to the pixel value of ciphertext image on the position Original pixel value;
(4) original pixel value according to corresponding to each pixel value of each position of ciphertext image, can be obtained encrypted Original image corresponding to ciphertext image.
Preferably, in the step (1), the process encrypted using former Encryption Algorithm to 256 gray level images is as follows:
1. substituting into chaos system equation, and choosing step delta h=0.0001 system parameter values, primary condition value;
2. iterative chaotic system equation obtains floating-point value sequence, this floating-point value sequence is analyzed using RK4 algorithm;
3. the floating point values in floating-point value sequence is converted into binary value (32), and position appropriate is chosen from 32;
4. going to step 2., the bit sequence until generating 100 myriabit sizes;
5. the bit sequence 4. generated with NIST test testing procedure, if by test, this bit sequence can be used In encryption, and the S box for encryption is produced, key is also determined;Otherwise adjust Δ h or set-up procedure 3. in choose Digit then goes to step and 1. continues to generate bit sequence;
6. key is transmitted to user with RSA Algorithm;
7. the image of 256*256 size is handled by bits switch;
8. by bits switch treated video bits sequence and the bit that can be used for encrypting of NIST test will be passed through Facies-suite step-by-step exclusive or;
9. the bit sequence after exclusive or is carried out the replacement of S box according to S box generated, encrypted image is finally obtained.
The present invention is replaced by S box, encrypted image can be successfully cracked out in the case where not obtaining key, not only Image recovery rate is high, and simplifies calculating process;The present invention is applicable not only to former Encryption Algorithm, and is suitable for any be based on The encryption system of S box has the advantages that image recovery rate is high, applied widely.
Detailed description of the invention
Fig. 1 is the flow chart of former Encryption Algorithm of the present invention;
Fig. 2 is flow chart of the invention;
Fig. 3 is the picture after original image, encrypted picture and utilization scheme of the present invention decryption.
Specific embodiment
Technical solution of the present invention is clearly and completely described below in conjunction with attached drawing, it is clear that described embodiment Only section Example of the invention, instead of all the embodiments.Based on the embodiments of the present invention, the common skill in this field Art personnel other all embodiments obtained without making creative work, belong to protection model of the invention It encloses.
In former Encryption Algorithm, a new chaos system is devised first, is passed through repeatedly based on this new chaos system Generation and selection generate the random bit sequence for meeting NIST test, and then generating the S box based on chaos by design calculates encryption Method can more effective defensive attack, keep it more safe.
As shown in Figure 1, former ciphering process is specific as follows:
1. system parameter values, primary condition value substitute into chaos system equation, and choose step delta h=0.0001;
The fact that chaos system is had high dynamic feature, is used to generate the randomness of quantity, designs for RNG technology New accountant rule, equation is represented by formula (1):
Wherein a, b, c and d are system parameter, and a=1, b=1, c=2, d=-3;
Just set the value of condition:x0=1, y0=-1, z0=0.01;
2. iterative chaotic system equation obtains floating-point value sequence, floated obtained in the chaos system using the analysis of RK4 algorithm Point value sequence;
3. the floating point values in floating-point value sequence is converted into binary value (32), and position appropriate is chosen from 32;
4. going to step 2., the bit sequence until generating 100 myriabit sizes;
5. the bit sequence 4. generated with NIST test testing procedure, if by test, this bit sequence can be used In encryption, and the S box for encryption is produced, key is also determined;Otherwise adjust Δ h or set-up procedure 3. in choose Digit then goes to step and 1. continues to generate bit sequence;
Chaos system is introduced in Encryption Algorithm, and adds primary condition and system parameter, after this, is based on pseudorandom Number generator generates the random bit sequence by NIST 3 stages tested, and utilizes the primary condition and system of chaos system Parameter is encrypted as key, is used as the key of encryption.The image that the size to be encrypted is 256 × 256 undergoes bit to become Processing is changed, it is different in the random bit treatment process in the y stage that the image for initially having already passed through bit conversion is placed in chaos PRNG Or value is converted into decimal value, and has carried out sub- byte processing.It is generated needed for sub- byte by using S-box generating algorithm Then the S box of 16 × 16 sizes is exported using x with the z phase that PRNG is generated, byte conversion during sub- byte is logical It crosses and they is replaced with the equivalent character of row and column on matrix to realize.
6. key is transmitted to user with RSA Algorithm;
7. the image of 256*256 size is handled by bits switch;
8. by bits switch treated video bits sequence and the bit that can be used for encrypting of NIST test will be passed through Facies-suite step-by-step exclusive or;
9. the bit sequence after exclusive or is carried out the replacement of S box according to S box generated, encrypted image is finally obtained.
S box generates following steps:
a:Primary condition and system parameter are input to chaos system, iteration obtains chaos sequence (comprising x, y and x tri- The sequence of phase);
b:XOR (exclusive or) processing is just carried out from 8 binary values of every extraction in the chaos sequence of x phase and z phase, and is turned 8 new binary values are changed to, then are converted into decimal value;
c:It checks that the decimal value generated whether there is in S box, if existing, abandons, if it does not exist, then adding It adds;
d:Above-mentioned steps are continuously carried out, until piling 256 different values in S box.
The above-mentioned resume image based on chaos S box is the prior art, is not described in detail.
Former Encryption Algorithm has used S box to carry out image encryption, during changing pixel matrix, although using complicated Chaos system generate more random S box, but the method for S box replacement only changes the numerical value of matrix, and has not been changed every The position of a pixel, so that encrypted image has the possibility being cracked.
In fact, drawbacks described above is all existed in any cryptographic system encrypted using S box merely.If our energy The encryption of S box is directly cracked in the case where not considering specific chaotic maps, then the crack method proposed just can be suitably used for appointing What is based purely on the encryption mechanism of S box.The tonal range of gray level image is 0 to 255, shares 256 limited pixel values, And after using the encryption of S box, ciphertext pixel value remains as 256 integers in 0 to 255 ranges, this is that one kind has been limited to The mapping of limit, and sample space very little.If it is possible to which the totally 256 kinds of mappings for obtaining 256 to 256 pixel values are closed Ciphertext, can be reduced by this mapping relations in the case where not knowing about the S box generating process based on chaos system by system In plain text.
Based on the above principles, the invention discloses a kind of decryption methods of resume image based on chaos S box, such as scheme Shown in 2, successively include the following steps:
(1) selected pixels value is full 0, complete 1, complete 2 ... complete 255 256 gray level images, by this 256 gray level images It is encrypted by former Encryption Algorithm, obtains 256 plaintext pixel matrixes;
In former encryption method, the pixel value mapping principle of each location of pixels is different in image, therefore obtains pixel-by-pixel Take mapping relations and unrealistic.But for whole picture known-plaintext image, we can disposably obtain each pixel position Set the correspondence ciphertext of known pixel values.Similarly, change the pixel value of all positions in image, so that it may disposably obtain again Take the correspondence ciphertext that pixel value is selected on each location of pixels.Therefore, whole pixel values on image all pixels position to be obtained Cleartext-ciphertext mapping relations, it is only necessary to 256 times encryption.
For simplicity, 256 gray level images for choosing full 0, complete 1 ... complete 255 first, this 256 gray level images are led to It crosses former Encryption Algorithm to be encrypted, i.e. introducing chaos system, and adds primary condition and system parameter, generated based on pseudo random number Device generates random bit sequence, the original image for needing to encrypt is carried out bit conversion, logic encryption unit carries out sub- byte again Processing, respectively obtains 256 corresponding encrypted plaintext pixel matrixes.
(2) pixel matrix of encrypted ciphertext image is obtained;
(3) in 256 plaintext pixel matrixes for obtaining step (1) each position pixel value, with ciphertext image Pixel value on the corresponding position of pixel matrix carries out traversal comparison, corresponding to the pixel value for finding out each position of ciphertext image Each original pixel value;
The process traversed to pixel is as follows:
If 256 plaintext pixel matrixes are that (M_j is added by the gray level image for being all j (j=1,2 ... ..., 256) to M_j It is close and obtain), ciphertext pixel matrix is C, and image size is M*N, successively compares plaintext picture element matrix M_j and ciphertext pixel square The pixel value of each position of battle array C if they are the same then records this value M_j (m, n), and (m, n) is the position of current pixel, So original pixel value j corresponding to this identical value M_j (m, n) is just denoted as corresponding to the pixel value of ciphertext image on the position Original pixel value;
(4) original pixel value according to corresponding to each pixel value of each position of ciphertext image, can be obtained encrypted Original image corresponding to ciphertext image.
By obtained 256 encrypted results, it is known that each pixel of each position (total M*M position) in image Original pixel value corresponding to value (totally 256 values), therefore, for any given ciphertext image, all encrypted pixel values Corresponding plaintext can be found out.
Original image partial pixel value matrix is as shown in table 1, and encrypted image partial pixel value matrix is as shown in table 2, in matrix The first row first be classified as numerical value 22, followed by the correspondence same position for pixel value being ciphertext image of the full 0 to complete 255 On pixel value carry out traversal comparison, find out numerical value corresponding to the position.If pixel value is the corresponding ciphertext image of full 0 The first row first is classified as 22, then the original pixel value of the first row first row of the corresponding plaintext image of encrypted image is 0.Table 3 indicates The pixel matrix value of image after decryption.
1 original image partial pixel value matrix (8*8) of table
2 encrypted image partial pixel value matrix (8*8) of table
Image portion pixels value matrix (8*8) after table 3 is decrypted
By the comparison of table 1, table 2 and table 3 as can be seen that being original graph using the image of the solution of the present invention reduction Picture.
The solution of the present invention is verified below.
Classical gray level image " Woman " is chosen, the size of the image is 256*256, and the experiment porch of this experiment is The MATLAB 2010 of Pentium4 CPU 1.80GHz, 1G memory, operating system used are Microsoft Windows XP SP3.As shown in figure 3,3 (a) be original image, 3 (b) be encrypted image, and 3 (c) be using after obtained decryption of the invention Image, by Fig. 3, it can be seen that, the chosen -plain attact method proposed can like clockwork be restored encrypted image.
In conclusion can successfully solve ciphertext by S box replacement matrix in the case where not obtaining key.The present invention does not have Consider that specific S box realizes details, but directly against in the encryption of S box the one-to-one transformation of pixel value as a result, therefore regardless of S box How to construct, as long as the present invention can come out plaintext image decryption merely using the resume image of S box encryption, from And the present invention is made to have the advantages that image recovery rate is high, applied widely.

Claims (2)

1. a kind of decryption method of the resume image based on chaos S box, which is characterized in that successively include the following steps:
(1) selected pixels value is full 0, complete 1, complete 2 ... complete 255 256 gray level images, this 256 gray level images are passed through Former Encryption Algorithm is encrypted, and 256 plaintext pixel matrixes are obtained;
(2) pixel matrix of encrypted ciphertext image is obtained;
(3) in 256 plaintext pixel matrixes for obtaining step (1) each position pixel value, the pixel with ciphertext image Pixel value on the corresponding position of value matrix carries out traversal comparison, finds out every corresponding to the pixel value of each position of ciphertext image A original pixel value;
The process traversed to pixel is as follows:
If 256 plaintext pixel matrixes be M_j (M_j be by be all the gray level image of j (j=1,2 ... ..., 256) encrypt and Obtain), ciphertext pixel matrix is C, and image size is M*N, successively compares plaintext picture element matrix M_j and ciphertext picture element matrix C The pixel value of each position then this value M_j (m, n) is recorded if they are the same, (m, n) is the position of current pixel, then Original pixel value j corresponding to this identical value M_j (m, n) is just denoted as original corresponding to the pixel value of ciphertext image on the position Pixel value;
(4) original pixel value according to corresponding to each pixel value of each position of ciphertext image, can be obtained encrypted ciphertext Original image corresponding to image.
2. a kind of decryption method of the resume image based on chaos S box as described in claim 1, which is characterized in that institute It states in step (1), the process encrypted using former Encryption Algorithm to 256 gray level images is as follows:
1. substituting into chaos system equation, and choosing step delta h=0.0001 system parameter values, primary condition value;
2. iterative chaotic system equation obtains floating-point value sequence, this floating-point value sequence is analyzed using RK4 algorithm;
3. the floating point values in floating-point value sequence is converted into binary value (32), and position appropriate is chosen from 32;
4. going to step 2., the bit sequence until generating 100 myriabit sizes;
5. the bit sequence 4. generated with NIST test testing procedure, if this bit sequence can be used for adding by test It is close, and the S box for encryption is produced, key is also determined;Otherwise Δ h or the set-up procedure 3. middle digit chosen are adjusted, Step is then gone to 1. to continue to generate bit sequence;
6. key is transmitted to user with RSA Algorithm;
7. the image of 256*256 size is handled by bits switch;
8. by bits switch treated video bits sequence and the bit phase sequence that can be used for encrypting of NIST test will be passed through Column step-by-step exclusive or;
9. the bit sequence after exclusive or is carried out the replacement of S box according to S box generated, encrypted image is finally obtained.
CN201810561623.4A 2018-06-04 2018-06-04 A kind of decryption method of the resume image based on chaos S box Active CN108833733B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810561623.4A CN108833733B (en) 2018-06-04 2018-06-04 A kind of decryption method of the resume image based on chaos S box

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810561623.4A CN108833733B (en) 2018-06-04 2018-06-04 A kind of decryption method of the resume image based on chaos S box

Publications (2)

Publication Number Publication Date
CN108833733A true CN108833733A (en) 2018-11-16
CN108833733B CN108833733B (en) 2019-08-16

Family

ID=64143379

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810561623.4A Active CN108833733B (en) 2018-06-04 2018-06-04 A kind of decryption method of the resume image based on chaos S box

Country Status (1)

Country Link
CN (1) CN108833733B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109920015A (en) * 2019-03-05 2019-06-21 重庆工程学院 A kind of significant encryption method of image vision generated based on fractal graph
CN110855362A (en) * 2019-11-18 2020-02-28 南京工程学院 Secret communication method and system based on visible light LED matrix
CN112887079A (en) * 2021-03-11 2021-06-01 中国石油大学(华东) Transformation encryption algorithm based on generation of random bit sequence
CN113744437A (en) * 2021-09-15 2021-12-03 南京润海科星物联网智能科技有限公司 Intelligent house renting management method and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020114454A1 (en) * 2000-12-21 2002-08-22 Hamilton Jon W. Method and system for trusted digital camera
CN101604439A (en) * 2008-06-13 2009-12-16 西北工业大学 A kind of color image encrypting method based on multi-chaos system
CN101814985A (en) * 2010-02-08 2010-08-25 河南大学 Block cipher system using multi-chaotic mapping multi-dynamic S-box
US20130114805A1 (en) * 2010-04-29 2013-05-09 Dongguk University Industry-Academic Cooperate Foundation Encryption system using discrete chaos function
CN106910156A (en) * 2017-02-27 2017-06-30 东北大学 A kind of New chaotic image encryption method with plaintext association key stream generting machanism
CN107481294A (en) * 2017-08-08 2017-12-15 重庆邮电大学 A kind of resume image and system based on chaotic maps

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020114454A1 (en) * 2000-12-21 2002-08-22 Hamilton Jon W. Method and system for trusted digital camera
CN101604439A (en) * 2008-06-13 2009-12-16 西北工业大学 A kind of color image encrypting method based on multi-chaos system
CN101814985A (en) * 2010-02-08 2010-08-25 河南大学 Block cipher system using multi-chaotic mapping multi-dynamic S-box
US20130114805A1 (en) * 2010-04-29 2013-05-09 Dongguk University Industry-Academic Cooperate Foundation Encryption system using discrete chaos function
CN106910156A (en) * 2017-02-27 2017-06-30 东北大学 A kind of New chaotic image encryption method with plaintext association key stream generting machanism
CN107481294A (en) * 2017-08-08 2017-12-15 重庆邮电大学 A kind of resume image and system based on chaotic maps

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109920015A (en) * 2019-03-05 2019-06-21 重庆工程学院 A kind of significant encryption method of image vision generated based on fractal graph
CN109920015B (en) * 2019-03-05 2022-11-29 重庆工程学院 Image visual meaningful encryption method based on fractal graph generation
CN110855362A (en) * 2019-11-18 2020-02-28 南京工程学院 Secret communication method and system based on visible light LED matrix
CN112887079A (en) * 2021-03-11 2021-06-01 中国石油大学(华东) Transformation encryption algorithm based on generation of random bit sequence
CN112887079B (en) * 2021-03-11 2022-10-04 中国石油大学(华东) Transformation encryption algorithm based on generation of random bit sequence
CN113744437A (en) * 2021-09-15 2021-12-03 南京润海科星物联网智能科技有限公司 Intelligent house renting management method and system

Also Published As

Publication number Publication date
CN108833733B (en) 2019-08-16

Similar Documents

Publication Publication Date Title
CN112084517B (en) Image encryption method based on chaotic mapping and bit-level permutation
Li et al. A novel plaintext-related image encryption scheme using hyper-chaotic system
Zhang et al. A plaintext-related image encryption algorithm based on chaos
Kumar et al. Development of modified AES algorithm for data security
Huang et al. Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system
CN108833733B (en) A kind of decryption method of the resume image based on chaos S box
Panduranga et al. Image encryption based on permutation-substitution using chaotic map and Latin Square Image Cipher
Zhang et al. Cryptanalysis and improvement of an image encryption algorithm based on hyper-chaotic system and dynamic S-box
Gnanajeyaraman et al. Audio encryption using higher dimensional chaotic map
CN107330338B (en) Color image encryption and decryption method and system based on double-chaos cross diffusion
Hua et al. Image encryption using 2D Logistic-Sine chaotic map
CN112906043A (en) Image encryption method based on chaotic mapping and chaotic S-box substitution
Laiphrakpam et al. Encrypting multiple images with an enhanced chaotic map
Kumaresan et al. An analytical study of cellular automata and its applications in cryptography
Guanghui et al. Chaotic image encryption based on running-key related to plaintext
Acharya Image encryption using a new chaos based encryption algorithm
Kumar et al. A new RGB image encryption using generalized Vigenére-type table over symmetric group associated with virtual planet domain
Ahmad Abusukhon et al. A novel network security algorithm based on encrypting text into a white-page image
CN112769545B (en) Image encryption method based on adjacent pixel Joseph transformation and Mealy state machine
CN114143413B (en) Image data PUF (physical unclonable function) secure encryption system and encryption method
Mohammed et al. Secure image encryption scheme using chaotic maps and rc4 algorithm
Khalaf et al. Biometric Template Protection based on Hill Cipher Algorithm with Two Invertible keys
Patro et al. Text-to-Image Encryption and Decryption Using Piece Wise Linear Chaotic Maps
Arun et al. AES based Text to Pixel Encryption using Color Code Conversion by Modulo Arithmetic
Manliclic et al. Improving the extended 10x10 polybius square key matrix for playfair bifid and polybius cipher

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant