CN108833733B - A kind of decryption method of the resume image based on chaos S box - Google Patents
A kind of decryption method of the resume image based on chaos S box Download PDFInfo
- Publication number
- CN108833733B CN108833733B CN201810561623.4A CN201810561623A CN108833733B CN 108833733 B CN108833733 B CN 108833733B CN 201810561623 A CN201810561623 A CN 201810561623A CN 108833733 B CN108833733 B CN 108833733B
- Authority
- CN
- China
- Prior art keywords
- image
- pixel
- value
- box
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 33
- 239000011159 matrix material Substances 0.000 claims abstract description 26
- 230000008569 process Effects 0.000 claims abstract description 12
- 238000012360 testing method Methods 0.000 claims description 11
- 230000000739 chaotic effect Effects 0.000 claims description 4
- 238000007667 floating Methods 0.000 claims description 3
- 238000012956 testing procedure Methods 0.000 claims description 3
- 238000000819 phase cycle Methods 0.000 claims 1
- 238000011084 recovery Methods 0.000 abstract description 5
- 230000008901 benefit Effects 0.000 abstract description 4
- 238000005516 engineering process Methods 0.000 description 6
- 238000013507 mapping Methods 0.000 description 6
- 238000012545 processing Methods 0.000 description 5
- 238000013461 design Methods 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 238000006243 chemical reaction Methods 0.000 description 3
- 238000011161 development Methods 0.000 description 3
- 238000002474 experimental method Methods 0.000 description 3
- 208000035126 Facies Diseases 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 230000003071 parasitic effect Effects 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32267—Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
- H04N1/32272—Encryption or ciphering
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Facsimile Transmission Control (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of decryption methods of resume image based on chaos S box, selected pixels value is full 0, complete 1, complete 2 ... complete 255 256 gray level images first, this 256 gray level images are encrypted by former Encryption Algorithm, obtain 256 plaintext pixel matrixes;Then the pixel matrix to encrypted ciphertext image is obtained;Then by the pixel value of each position in 256 plaintext pixel matrixes, compared with the pixel value on the corresponding position of the pixel matrix of ciphertext image carries out traversal, each original pixel value corresponding to the pixel value of each position of ciphertext image is found out, to obtain original image corresponding to encrypted ciphertext image.The present invention can successfully crack out encrypted image in the case where not obtaining key, and not only image recovery rate is high, but also simplifies calculating process;The present invention is applicable not only to former Encryption Algorithm, and is suitable for any encryption system based on S box, has the advantages that image recovery rate is high, applied widely.
Description
Technical field
The present invention relates to cryptanalysis technical field more particularly to a kind of solutions of the resume image based on chaos S box
Decryption method.
Background technique
With the fast development of network technology, while bringing various convenient lives for people's lives, network information peace
It also more attracts people's attention entirely.People carry out communication exchange by various transmission mediums, such as video, audio, file, image
Deng inevitably generating some information security issues in the transmission process of transmission medium.For information security, need
Guarantee the safety of the confidentiality, authenticity, integrality, unauthorised copies and institute's parasitic system of information.Letter under network security
Breath secure scheme is the key that we ensure that information security, to carry out message authentication, data encryption, image encryption guarantee to pacify
Full mechanism it is perfect, security system it is sound be our emphasis of interest.
Digital picture is a kind of image indicated in the form of two-dimensional digital group, has the characteristics that intuitive, is a kind of extensive
The digital information of application.Since Digital Image Processing contains much information, occupied bandwidth, data redudancy is big, between adjacent pixel
The high feature of similarity, using traditional encryption technology can generation efficiency be low, wastes the shortcomings that computing resource.Chaos system has
The features such as intrinsic stochasticity, sensibility, ergodic, non-convergence, pseudo-randomness, the shortcomings that conventional encryption algorithm can be overcome,
It is therefore widely used in image encryption field, therefore chaos cipher becomes one of the hot spot studied in novel cipher.
While cryptographic technique development, cryptanalysis technology has also obtained unprecedented development.To promote cryptographic system
Safety, many new password cracking schemes are based on cryptanalysis technology and are suggested.The replacement of S box is normal in encryption system design
It is a kind of classics technology, S box be used as non-linear components unique in Advanced Encryption Standard, be influence algorithm performance it is important because
One of element helps to carry out safe encryption, resists differential cryptanalysis using powerful S box structure.
Et al. a kind of chaos system with high initial value sensitivity and wide key space was devised in 2017
System, so that the random sequence generated shows fabulous randomness in NIST test, and simple using chaos system design
The low algorithm steps of computation complexity generate S box, experiments have shown that the S box generated has good performance, can effectively improve and add
The safety of close algorithm.
In the S box resume image based on chaos, the decrypting process of Encryption Algorithm must only rely upon key, decryption
Person can not be decrypted encrypted image when not knowing the key of encryption system;The method of S box replacement only changes square
The numerical value of battle array, and the position of each pixel is had not been changed, start with and easily encrypted image can be solved from the replacement of S box
It is close.
Summary of the invention
The purpose of the present invention is to provide a kind of decryption methods of resume image based on chaos S box, can be in nothing
Method is decrypted encrypted image in the case where learning key, has calculating process simple, the high advantage of image restoring degree.
To achieve the above object, the present invention adopts the following technical scheme:
A kind of decryption method of the resume image based on chaos S box, successively the following steps are included:
(1) selected pixels value is full 0, complete 1, complete 2 ... complete 255 256 gray level images, by this 256 gray level images
It is encrypted by former Encryption Algorithm, obtains 256 plaintext pixel matrixes;
(2) pixel matrix of encrypted ciphertext image is obtained;
(3) in 256 plaintext pixel matrixes for obtaining step (1) each position pixel value, with ciphertext image
Pixel value on the corresponding position of pixel matrix carries out traversal comparison, corresponding to the pixel value for finding out each position of ciphertext image
Each original pixel value;
The process traversed to pixel is as follows:
If 256 plaintext pixel matrixes are that (M_j is added by the gray level image for being all j (j=1,2 ... ..., 256) to M_j
It is close and obtain), ciphertext pixel matrix is C, and image size is M*N, successively compares plaintext picture element matrix M_j and ciphertext pixel square
The pixel value of each position of battle array C if they are the same then records this value M_j (m, n), and (m, n) is the position of current pixel,
So original pixel value j corresponding to this identical value M_j (m, n) is just denoted as corresponding to the pixel value of ciphertext image on the position
Original pixel value;
(4) original pixel value according to corresponding to each pixel value of each position of ciphertext image, can be obtained encrypted
Original image corresponding to ciphertext image.
Preferably, in the step (1), the process encrypted using former Encryption Algorithm to 256 gray level images is as follows:
1. substituting into chaos system equation, and choosing step delta h=0.0001 system parameter values, primary condition value;
2. iterative chaotic system equation obtains floating-point value sequence, this floating-point value sequence is analyzed using RK4 algorithm;
3. the floating point values in floating-point value sequence is converted into binary value (32), and position appropriate is chosen from 32;
4. going to step 2., the bit sequence until generating 100 myriabit sizes;
5. the bit sequence 4. generated with NIST test testing procedure, if by test, this bit sequence can be used
In encryption, and the S box for encryption is produced, key is also determined;Otherwise adjust Δ h or set-up procedure 3. in choose
Digit then goes to step and 1. continues to generate bit sequence;
6. key is transmitted to user with RSA Algorithm;
7. the image of 256*256 size is handled by bits switch;
8. by bits switch treated video bits sequence and the bit that can be used for encrypting of NIST test will be passed through
Facies-suite step-by-step exclusive or;
9. the bit sequence after exclusive or is carried out the replacement of S box according to S box generated, encrypted image is finally obtained.
The present invention is replaced by S box, encrypted image can be successfully cracked out in the case where not obtaining key, not only
Image recovery rate is high, and simplifies calculating process;The present invention is applicable not only to former Encryption Algorithm, and is suitable for any be based on
The encryption system of S box has the advantages that image recovery rate is high, applied widely.
Detailed description of the invention
Fig. 1 is the flow chart of former Encryption Algorithm of the present invention;
Fig. 2 is flow chart of the invention;
Fig. 3 is the picture after original image, encrypted picture and utilization scheme of the present invention decryption.
Specific embodiment
Technical solution of the present invention is clearly and completely described below in conjunction with attached drawing, it is clear that described embodiment
Only section Example of the invention, instead of all the embodiments.Based on the embodiments of the present invention, the common skill in this field
Art personnel other all embodiments obtained without making creative work, belong to protection model of the invention
It encloses.
In former Encryption Algorithm, a new chaos system is devised first, is passed through repeatedly based on this new chaos system
Generation and selection generate the random bit sequence for meeting NIST test, and then generating the S box based on chaos by design calculates encryption
Method can more effective defensive attack, keep it more safe.
As shown in Figure 1, former ciphering process is specific as follows:
1. system parameter values, primary condition value substitute into chaos system equation, and choose step delta h=0.0001;
The fact that chaos system is had high dynamic feature, is used to generate the randomness of quantity, designs for RNG technology
New accountant rule, equation is represented by formula (1):
Wherein a, b, c and d are system parameter, and a=1, b=1, c=2, d=-3;
Just set the value of condition: x0=1, y0=-1, z0=0.01;
2. iterative chaotic system equation obtains floating-point value sequence, floated obtained in the chaos system using the analysis of RK4 algorithm
Point value sequence;
3. the floating point values in floating-point value sequence is converted into binary value (32), and position appropriate is chosen from 32;
4. going to step 2., the bit sequence until generating 100 myriabit sizes;
5. the bit sequence 4. generated with NIST test testing procedure, if by test, this bit sequence can be used
In encryption, and the S box for encryption is produced, key is also determined;Otherwise adjust Δ h or set-up procedure 3. in choose
Digit then goes to step and 1. continues to generate bit sequence;
Chaos system is introduced in Encryption Algorithm, and adds primary condition and system parameter, after this, is based on pseudorandom
Number generator generates the random bit sequence by NIST 3 stages tested, and utilizes the primary condition and system of chaos system
Parameter is encrypted as key, is used as the key of encryption.The image that the size to be encrypted is 256 × 256 undergoes bit to become
Processing is changed, it is different in the random bit treatment process in the y stage that the image for initially having already passed through bit conversion is placed in chaos PRNG
Or value is converted into decimal value, and has carried out sub- byte processing.It is generated needed for sub- byte by using S-box generating algorithm
Then the S box of 16 × 16 sizes is exported using x with the z phase that PRNG is generated, byte conversion during sub- byte is logical
It crosses and they is replaced with the equivalent character of row and column on matrix to realize.
6. key is transmitted to user with RSA Algorithm;
7. the image of 256*256 size is handled by bits switch;
8. by bits switch treated video bits sequence and the bit that can be used for encrypting of NIST test will be passed through
Facies-suite step-by-step exclusive or;
9. the bit sequence after exclusive or is carried out the replacement of S box according to S box generated, encrypted image is finally obtained.
S box generates following steps:
A: primary condition and system parameter are input to chaos system, iteration obtains chaos sequence (comprising x, y and x tri-
The sequence of phase);
B: XOR (exclusive or) processing is just carried out from 8 binary values of every extraction in the chaos sequence of x phase and z phase, and is turned
8 new binary values are changed to, then are converted into decimal value;
C: it checks that the decimal value of generation whether there is in S box, if existing, abandons, if it does not exist, then adding
It adds;
D: continuously carrying out above-mentioned steps, until piling 256 different values in S box.
The above-mentioned resume image based on chaos S box is the prior art, is not described in detail.
Former Encryption Algorithm has used S box to carry out image encryption, during changing pixel matrix, although using complicated
Chaos system generate more random S box, but the method for S box replacement only changes the numerical value of matrix, and has not been changed every
The position of a pixel, so that encrypted image has the possibility being cracked.
In fact, drawbacks described above is all existed in any cryptographic system encrypted using S box merely.If our energy
The encryption of S box is directly cracked in the case where not considering specific chaotic maps, then the crack method proposed just can be suitably used for appointing
What is based purely on the encryption mechanism of S box.The tonal range of gray level image is 0 to 255, shares 256 limited pixel values,
And after using the encryption of S box, ciphertext pixel value remains as 256 integers in 0 to 255 ranges, this is that one kind has been limited to
The mapping of limit, and sample space very little.If it is possible to which the totally 256 kinds of mappings for obtaining 256 to 256 pixel values are closed
Ciphertext, can be reduced by this mapping relations in the case where not knowing about the S box generating process based on chaos system by system
In plain text.
Based on the above principles, the invention discloses a kind of decryption methods of resume image based on chaos S box, such as scheme
Shown in 2, successively the following steps are included:
(1) selected pixels value is full 0, complete 1, complete 2 ... complete 255 256 gray level images, by this 256 gray level images
It is encrypted by former Encryption Algorithm, obtains 256 plaintext pixel matrixes;
In former encryption method, the pixel value mapping principle of each location of pixels is different in image, therefore obtains pixel-by-pixel
Take mapping relations and unrealistic.But for whole picture known-plaintext image, we can disposably obtain each pixel position
Set the correspondence ciphertext of known pixel values.Similarly, change the pixel value of all positions in image, so that it may disposably obtain again
Take the correspondence ciphertext that pixel value is selected on each location of pixels.Therefore, whole pixel values on image all pixels position to be obtained
Cleartext-ciphertext mapping relations, it is only necessary to 256 times encryption.
For simplicity, 256 gray level images for choosing full 0, complete 1 ... complete 255 first, this 256 gray level images are led to
It crosses former Encryption Algorithm to be encrypted, i.e. introducing chaos system, and adds primary condition and system parameter, generated based on pseudo random number
Device generates random bit sequence, the original image for needing to encrypt is carried out bit conversion, logic encryption unit carries out sub- byte again
Processing, respectively obtains 256 corresponding encrypted plaintext pixel matrixes.
(2) pixel matrix of encrypted ciphertext image is obtained;
(3) in 256 plaintext pixel matrixes for obtaining step (1) each position pixel value, with ciphertext image
Pixel value on the corresponding position of pixel matrix carries out traversal comparison, corresponding to the pixel value for finding out each position of ciphertext image
Each original pixel value;
The process traversed to pixel is as follows:
If 256 plaintext pixel matrixes are that (M_j is added by the gray level image for being all j (j=1,2 ... ..., 256) to M_j
It is close and obtain), ciphertext pixel matrix is C, and image size is M*N, successively compares plaintext picture element matrix M_j and ciphertext pixel square
The pixel value of each position of battle array C if they are the same then records this value M_j (m, n), and (m, n) is the position of current pixel,
So original pixel value j corresponding to this identical value M_j (m, n) is just denoted as corresponding to the pixel value of ciphertext image on the position
Original pixel value;
(4) original pixel value according to corresponding to each pixel value of each position of ciphertext image, can be obtained encrypted
Original image corresponding to ciphertext image.
By obtained 256 encrypted results, it is known that each pixel of each position (total M*M position) in image
Original pixel value corresponding to value (totally 256 values), therefore, for any given ciphertext image, all encrypted pixel values
Corresponding plaintext can be found out.
Original image partial pixel value matrix is as shown in table 1, and encrypted image partial pixel value matrix is as shown in table 2, in matrix
The first row first be classified as numerical value 22, followed by the correspondence same position for pixel value being ciphertext image of the full 0 to complete 255
On pixel value carry out traversal comparison, find out numerical value corresponding to the position.If pixel value is the corresponding ciphertext image of full 0
The first row first is classified as 22, then the original pixel value of the first row first row of the corresponding plaintext image of encrypted image is 0.Table 3 indicates
The pixel matrix value of image after decryption.
1 original image partial pixel value matrix (8*8) of table
2 encrypted image partial pixel value matrix (8*8) of table
Image portion pixels value matrix (8*8) after table 3 is decrypted
By the comparison of table 1, table 2 and table 3 as can be seen that being original graph using the image of the solution of the present invention reduction
Picture.
The solution of the present invention is verified below.
Classical gray level image " Woman " is chosen, the size of the image is 256*256, and the experiment porch of this experiment is
The MATLAB 2010 of Pentium4 CPU 1.80GHz, 1G memory, operating system used are Microsoft Windows XP
SP3.As shown in figure 3,3 (a) be original image, 3 (b) be encrypted image, and 3 (c) be using after obtained decryption of the invention
Image, by Fig. 3, it can be seen that, the chosen -plain attact method proposed can like clockwork be restored encrypted image.
In conclusion can successfully solve ciphertext by S box replacement matrix in the case where not obtaining key.The present invention does not have
Consider that specific S box realizes details, but directly against in the encryption of S box the one-to-one transformation of pixel value as a result, therefore regardless of S box
How to construct, as long as the present invention can come out plaintext image decryption merely using the resume image of S box encryption, from
And the present invention is made to have the advantages that image recovery rate is high, applied widely.
Claims (2)
1. a kind of decryption method of the resume image based on chaos S box, which is characterized in that successively the following steps are included:
(1) selected pixels value is full 0, complete 1, complete 2 ... complete 255 256 gray level images, this 256 gray level images are passed through
Former Encryption Algorithm is encrypted, and 256 plaintext pixel matrixes are obtained;
(2) pixel matrix of encrypted ciphertext image is obtained;
(3) in 256 plaintext pixel matrixes for obtaining step (1) each position pixel value, the pixel with ciphertext image
Pixel value on the corresponding position of value matrix carries out traversal comparison, finds out every corresponding to the pixel value of each position of ciphertext image
A original pixel value;
The process traversed to pixel is as follows:
If 256 plaintext pixel matrixes are M_j, M_j is by being all j, j=1, and 2 ... ..., 256 gray level image is encrypted and obtained
It arrives, ciphertext pixel matrix is C, and image size is M*N, successively compares the every of plaintext picture element matrix M_j and ciphertext picture element matrix C
The pixel value of a position if they are the same then records this value M_j (m, n), and (m, n) is the position of current pixel, then this phase
Original pixel value j corresponding to same value M_j (m, n) is just denoted as original pixel corresponding to the pixel value of ciphertext image on the position
Value;
(4) original pixel value according to corresponding to each pixel value of each position of ciphertext image, can be obtained encrypted ciphertext
Original image corresponding to image.
2. a kind of decryption method of the resume image based on chaos S box as described in claim 1, which is characterized in that institute
It states in step (1), the process encrypted using former Encryption Algorithm to 256 gray level images is as follows:
1. substituting into chaos system equation, and choosing step delta h=0.0001 system parameter values, primary condition value;
2. iterative chaotic system equation obtains floating-point value sequence, this floating-point value sequence is analyzed using RK4 algorithm;
3. the floating point values in floating-point value sequence is converted into binary value 32, and position appropriate is chosen from 32;
4. going to step 2., the bit sequence until generating 100 myriabit sizes;
5. the bit sequence 4. generated with NIST test testing procedure, if this bit sequence can be used for adding by test
It is close, and the S box for encryption is produced, key is also determined;Otherwise Δ h or the set-up procedure 3. middle digit chosen are adjusted,
Step is then gone to 1. to continue to generate bit sequence;
6. key is transmitted to user with RSA Algorithm;
7. the image of 256*256 size is handled by bits switch;
8. by bits switch treated video bits sequence and the bit phase sequence that can be used for encrypting of NIST test will be passed through
Column step-by-step exclusive or;
9. the bit sequence after exclusive or is carried out the replacement of S box according to S box generated, encrypted image is finally obtained.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810561623.4A CN108833733B (en) | 2018-06-04 | 2018-06-04 | A kind of decryption method of the resume image based on chaos S box |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810561623.4A CN108833733B (en) | 2018-06-04 | 2018-06-04 | A kind of decryption method of the resume image based on chaos S box |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108833733A CN108833733A (en) | 2018-11-16 |
CN108833733B true CN108833733B (en) | 2019-08-16 |
Family
ID=64143379
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810561623.4A Expired - Fee Related CN108833733B (en) | 2018-06-04 | 2018-06-04 | A kind of decryption method of the resume image based on chaos S box |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108833733B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109920015B (en) * | 2019-03-05 | 2022-11-29 | 重庆工程学院 | Image visual meaningful encryption method based on fractal graph generation |
CN110855362B (en) * | 2019-11-18 | 2021-08-03 | 南京工程学院 | Secret communication method and system based on visible light LED matrix |
CN112887079B (en) * | 2021-03-11 | 2022-10-04 | 中国石油大学(华东) | Transformation encryption algorithm based on generation of random bit sequence |
CN113744437A (en) * | 2021-09-15 | 2021-12-03 | 南京润海科星物联网智能科技有限公司 | Intelligent house renting management method and system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101604439A (en) * | 2008-06-13 | 2009-12-16 | 西北工业大学 | A kind of color image encrypting method based on multi-chaos system |
CN101814985A (en) * | 2010-02-08 | 2010-08-25 | 河南大学 | Block cipher system using multi-chaotic mapping multi-dynamic S-box |
CN106910156A (en) * | 2017-02-27 | 2017-06-30 | 东北大学 | A kind of New chaotic image encryption method with plaintext association key stream generting machanism |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU2002231260A1 (en) * | 2000-12-21 | 2002-07-01 | Eastman Kodak Company | Method and system for trusted digital camera |
KR101095386B1 (en) * | 2010-04-29 | 2011-12-16 | 동국대학교 산학협력단 | A Cryptosystem with a Discretized Chaotic Map |
CN107481294A (en) * | 2017-08-08 | 2017-12-15 | 重庆邮电大学 | A kind of resume image and system based on chaotic maps |
-
2018
- 2018-06-04 CN CN201810561623.4A patent/CN108833733B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101604439A (en) * | 2008-06-13 | 2009-12-16 | 西北工业大学 | A kind of color image encrypting method based on multi-chaos system |
CN101814985A (en) * | 2010-02-08 | 2010-08-25 | 河南大学 | Block cipher system using multi-chaotic mapping multi-dynamic S-box |
CN106910156A (en) * | 2017-02-27 | 2017-06-30 | 东北大学 | A kind of New chaotic image encryption method with plaintext association key stream generting machanism |
Also Published As
Publication number | Publication date |
---|---|
CN108833733A (en) | 2018-11-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112084517B (en) | Image encryption method based on chaotic mapping and bit-level permutation | |
Li et al. | A novel plaintext-related image encryption scheme using hyper-chaotic system | |
Zhang et al. | A plaintext-related image encryption algorithm based on chaos | |
Kumar et al. | Development of modified AES algorithm for data security | |
Huang et al. | Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system | |
Ping et al. | Image encryption based on non-affine and balanced cellular automata | |
CN108833733B (en) | A kind of decryption method of the resume image based on chaos S box | |
Panduranga et al. | Image encryption based on permutation-substitution using chaotic map and Latin Square Image Cipher | |
Zhang et al. | Cryptanalysis and improvement of an image encryption algorithm based on hyper-chaotic system and dynamic S-box | |
Gnanajeyaraman et al. | Audio encryption using higher dimensional chaotic map | |
CN107330338B (en) | Color image encryption and decryption method and system based on double-chaos cross diffusion | |
Zhang et al. | A novel chaotic image encryption algorithm based on latin square and random shift | |
CN112769545A (en) | Image encryption method based on adjacent pixel Joseph transformation and Mealy state machine | |
Kumaresan et al. | An analytical study of cellular automata and its applications in cryptography | |
Manucom et al. | Analysis of key randomness in improved one-time pad cryptography | |
Guanghui et al. | Chaotic Image Encryption Based on Running‐Key Related to Plaintext | |
Kumar et al. | A new RGB image encryption using generalized Vigenére-type table over symmetric group associated with virtual planet domain | |
Acharya | Image encryption using a new chaos based encryption algorithm | |
Ahmad Abusukhon et al. | A novel network security algorithm based on encrypting text into a white-page image | |
Mohammed et al. | Secure image encryption scheme using chaotic maps and rc4 algorithm | |
Patro et al. | Text-to-image encryption and decryption using piece wise linear chaotic maps | |
Manliclic et al. | Improving the extended 10× 10 Polybius square key matrix for playfair, bifid, and polybius cipher | |
Khalaf et al. | Biometric Template Protection based on Hill Cipher Algorithm with Two Invertible keys | |
Chandran et al. | VLSI Implementaion of Image Encryption and Decryption Using Reversible Logic Gates | |
Arun et al. | AES based Text to Pixel Encryption using Color Code Conversion by Modulo Arithmetic |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190816 |