CN109214972A - A kind of image encryption method based on chaos pseudo random DNA enhancing - Google Patents
A kind of image encryption method based on chaos pseudo random DNA enhancing Download PDFInfo
- Publication number
- CN109214972A CN109214972A CN201810933328.7A CN201810933328A CN109214972A CN 109214972 A CN109214972 A CN 109214972A CN 201810933328 A CN201810933328 A CN 201810933328A CN 109214972 A CN109214972 A CN 109214972A
- Authority
- CN
- China
- Prior art keywords
- image
- dna
- chaos
- formula
- value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Measuring Or Testing Involving Enzymes Or Micro-Organisms (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a kind of image encryption methods based on chaos pseudo random DNA enhancing, comprising the following steps: S1, input normal image and displacement;S2, random permutation sequence is obtained;S3, random permutation is carried out, obtains random replacement image matrix;S4, key matrix is generated;S5, it maps to obtain new chaos image condition value using direct loic;S6, rounding obtains constant value downwards;S7, selection DNA encoding rule;S8, the DNA sequence dna for obtaining replacement image matrix;S9, the DNA sequence dna for obtaining key matrix;S10, selection correspond to the DNA linear operation of current constant value;S11, the DNA sequence dna for obtaining password image;S12, the corresponding DNA encryption rule with current constant value of selection;S13, password image is obtained, realizes image encryption.The present invention solves the problems, such as low efficiency existing in the prior art, dangerous and not available.
Description
Technical field
The invention belongs to image encryption technology fields, and in particular to it is a kind of based on chaos pseudo random DNA enhancing image add
Decryption method.
Background technique
With the rapid development of computer technology and network technology, people there is an urgent need to research and develop out more safety,
Efficiently, reliably method protects the safety of data.Chaos system has many good properties, such as to primary condition and control
The sensibility of parameter, the density of period point set and topological transitivity.Obscuring in these properties and cryptography and diffusion property
There is close relationship.Since the eighties in last century, the research of Chaos Immune Algorithm is of increasing concern, proposes and is largely based on
The Encryption Algorithm of chaos achieves many progress full of hope.However, recent studies have indicated that, it is before considered practical
Property strong and highly-safe chaos cipher scheme have proven to as low efficiency, dangerous and unavailable.How deep analysis is passed through
Research designs practical and highly-safe chaos cipher scheme with gradually as outstanding problem anxious to be resolved.
Summary of the invention
For above-mentioned deficiency in the prior art, a kind of chaos provided by the invention is in conjunction with DNA encoding, high-efficient, peace
Quan Xinggao and the practical image encryption method based on chaos pseudo random DNA enhancing, improve cipher round results, solve
Low efficiency existing in the prior art, dangerous and not available problem.
In order to achieve the above object of the invention, the technical solution adopted by the present invention are as follows:
A kind of image encryption method based on chaos pseudo random DNA enhancing, comprising the following steps:
S1: acquisition normal image and displacement, and obtain the dimension of normal image;
S2: according to the dimension of normal image, random permutation sequence is obtained using displacement and random permutation function;
S3: random permutation is carried out to the pixel in image according to random permutation sequence, obtains random replacement image matrix;
S4: according to random replacement image matrix, chaos image initial condition and control are generated using hash function
Variable, and key matrix is generated using the logical mappings that pseudorandom enhances;
S5: it according to chaos image initial condition and control variable, maps to obtain new chaos image using direct loic
Condition;
S6: it is rounded downwards according to current chaos image condition value and obtains a constant value;
S7: selection corresponds to the DNA encoding rule of current constant value, and carries out to all pixels on all rows of image
Coding;
S8: the DNA sequence dna of replacement image matrix is obtained;
S9: according to key matrix, step S5 to S7 is repeated, the DNA sequence dna of key matrix is obtained;
S10: repeating step S5 to S6, and selection corresponds to the DNA linear operation of current constant value;
S11: it according to the DNA sequence dna of the DNA sequence dna of replacement image matrix and key matrix, is obtained using DNA linear operation
The DNA sequence dna of password image;
S12: step S5 to S6, the corresponding DNA encryption rule with current constant value of selection are repeated;
S13: encrypting according to each row of the DNA encryption rule to the DNA sequence dna of password image, obtain password image,
Realize image encryption.
Further, in step S2, the formula of random permutation sequence are as follows:
O=randperm (M × N)
In formula, O is random permutation sequence;Randperm () is random permutation sequential function;M, N are the dimension of normal image
Degree.
Further, in step S3, the formula of replacement image matrix are as follows:
I'=reshape (I (O), M, N)
In formula, I' is replacement image matrix;I is the normal image of input;Reshape () is replacement image matrix letter
Number;O is random permutation sequence;M, N are the dimension of normal image.
Further, in step S4, the method for generating key matrix includes the following steps:
S4-1: the serial data that hash function SHA-256 obtains one 64 16 systems is executed on replacement image matrix;
S4-2: the serial data of 16 systems is converted to 256 data flows;
S4-3: data flow is respectively put into 4 64 different masses, and each piece is handled, after obtaining processing
Block value, formula are as follows:
In formula, ψ1、ψ2、ψ3、ψ4For treated block value;biFor corresponding data flow;J is indicatrix, j ∈ 1,2 ..,
256};
S4-4: according to treated block value, the initial conditions value and control variable of chaos image are obtained;
The calculation formula of the initial conditions value of chaos image are as follows:
xo=(ψ1+ψ2)mod1
In formula, xoFor the initial conditions value of chaos image;ψ1、ψ2For treated block value;Mod is modulo operation;
Control the calculation formula of variable are as follows:
P=3.999+ (((ψ3+ψ4)mod1)×0.001)
In formula, p is control variable;ψ3、ψ4For treated block value;Mod is modulo operation;
S4-5: it according to chaos image initial condition and control variable, is changed using the logical mappings that pseudorandom enhances
In generation, obtains chaos sequence;
The calculation formula of the logical mappings of pseudorandom enhancing are as follows:
xi+1=((pxi(1-xi))100000)mod1
In formula, xi+1For next-generation chaos image condition value;xiFor current chaos image condition value;P is control variable;mod
For modulo operation;I is indicatrix, i ∈ { 1,2 .., MN };
S4-6: chaos sequence is converted into Serial No., and key matrix is obtained according to the Serial No.;
In formula, kiFor Serial No. pixel, and ki∈ K, K are key matrix;siFor corresponding chaos sequence;I is instruction
Amount, i ∈ { 1,2 .., MN }.
Further, it in step S5, maps to obtain new chaos image condition value, calculation formula using direct loic are as follows:
xi+1=pxi(1-xi)
In formula, xi+1For next-generation chaos image condition value;xiFor current chaos image condition value;P is control variable;I is
Indicatrix, i ∈ { 1,2 .., M }.
Further, in step S6, the calculation formula of constant value are as follows:
R=floor (xM×8)+1
In formula, R is current constant value;Floor () is downward rounding operation;xMFor current chaos image condition value.
Further, in step S10, selection corresponds to the DNA linear operation of current constant value, the calculation formula of constant value
Are as follows:
Y=floor (xM×3)+1
In formula, Y is the corresponding current constant value of selection DNA linear operation;Floor () is downward rounding operation;xMFor
Current chaos image condition value.
Further, in step S11, the calculation formula of the DNA sequence dna of password image are as follows:
In formula, QδFor the DNA sequence dna of password image;l'δFor the DNA sequence dna of replacement image matrix;KδFor key matrix
DNA sequence dna;For optional DNA linear operation.
This programme has the beneficial effect that
(1) simple structure that this programme uses, discreteness, high output processing, less arithmetical operation and relatively easy
Low-dimensional system has saved computing capability when using, time and resource, and has preferably attacked recovery rate, improves practicability;
(2) on the basis of DNA encoding and decoding rule and DNA algebraic manipulation are mapped random selection and are expert at by direct loic
Operation, improves safety, executes the time to greatly reduce, improves encryption efficiency.
Detailed description of the invention
Fig. 1 is the image encryption method flow chart enhanced based on chaos pseudo random DNA;
Fig. 2 is that the logical mappings enhanced using pseudorandom generate the method flow diagram of key matrix;
Fig. 3 is existing encryption method histogram;
Fig. 4 is this programme encryption method histogram;
Fig. 5 is that encrypted image and normal image pixel interdependence compare figure;
Fig. 6 compares figure for the noise resistance degree of this programme and the prior art.
Specific embodiment
A specific embodiment of the invention is described below, in order to facilitate understanding by those skilled in the art this hair
It is bright, it should be apparent that the present invention is not limited to the ranges of specific embodiment, for those skilled in the art,
As long as various change is in the spirit and scope of the present invention that the attached claims limit and determine, these variations are aobvious and easy
See, all are using the innovation and creation of present inventive concept in the column of protection.
In the embodiment of the present invention, a kind of image encryption method based on chaos pseudo random DNA enhancing, as shown in Figure 1, including
Following steps:
S1: acquisition normal image and displacement, and obtain the dimension of normal image;
S2: according to the dimension of normal image, random permutation sequence, formula are obtained using displacement and random permutation function
Are as follows:
O=randperm (M × N)
In formula, O is random permutation sequence;Randperm () is random permutation sequential function;M, N are the dimension of normal image
Degree;
S3: carrying out random permutation to the pixel in image according to random permutation sequence, obtain random replacement image matrix,
Formula are as follows:
I'=reshape (I (O), M, N)
In formula, I' is replacement image matrix;I is the normal image of input;Reshape () is replacement image matrix letter
Number;O is random permutation sequence;M, N are the dimension of normal image;
S4: according to random replacement image matrix, chaos image initial condition and control are generated using hash function
Variable, and key matrix is generated using the logical mappings that pseudorandom enhances, as shown in Fig. 2, including the following steps:
S4-1: the serial data that hash function SHA-256 obtains one 64 16 systems is executed on replacement image matrix;
H=h1,h2,...,h64
S4-2: the serial data of 16 systems is converted to 256 data flows;ψ=b1,b2,...,b256
S4-3: data flow is respectively put into 4 64 different masses, and each piece is handled, after obtaining processing
Block value, formula are as follows:
In formula, ψ1、ψ2、ψ3、ψ4For treated block value;biFor corresponding data flow;J is indicatrix, j ∈ 1,2 ..,
256};
S4-4: according to treated block value, the initial conditions value and control variable of chaos image are obtained;
The calculation formula of the initial conditions value of chaos image are as follows:
xo=(ψ1+ψ2)mod1
In formula, xoFor the initial conditions value of chaos image;ψ1、ψ2For treated block value;Mod is modulo operation;
Control the calculation formula of variable are as follows:
P=3.999+ (((ψ3+ψ4)mod1)×0.001)
In formula, p is control variable;ψ3、ψ4For treated block value;Mod is modulo operation;
S4-5: it according to chaos image initial condition and control variable, is changed using the logical mappings that pseudorandom enhances
In generation, obtains chaos sequence S={ s1,s2,...,sMN};
The calculation formula of the logical mappings of pseudorandom enhancing are as follows:
xi+1=((pxi(1-xi))100000)mod1
In formula, xi+1For next-generation chaos image condition value;xiFor current chaos image condition value;P is control variable;mod
For modulo operation;I is indicatrix, i ∈ { 1,2 .., MN };
S4-6: chaos sequence is converted into Serial No., and key matrix is obtained according to the Serial No.;
In formula, kiFor Serial No. pixel, and ki∈ K, K are key matrix;siFor corresponding chaos sequence;
I is indicatrix, i ∈ { 1,2 .., MN };
S5: according to chaos image initial condition and control variable uses, direct loic maps to obtain new chaos image
Condition, calculation formula are as follows:
xi+1=pxi(1-xi)
In formula, xi+1For next-generation chaos image condition value;xiFor current chaos image condition value;P is control variable;I is
Indicatrix, i ∈ { 1,2 .., M };
S6: it is rounded downwards according to current chaos image condition value and obtains a constant value;
The calculation formula of constant value are as follows:
R=floor (xM×8)+1
In formula, R is current constant value;Floor () is downward rounding operation;xMFor current chaos image condition value;
S7: selection corresponds to the DNA encoding rule of current constant value, and carries out to all pixels on all rows of image
Coding;
S8: the DNA sequence dna of replacement image matrix is obtained;
S9: according to key matrix, step S5 to S7 is repeated, the DNA sequence dna of key matrix is obtained;
S10: repeating step S5 to S6, and selection corresponds to the DNA linear operation of current constant value, the calculation formula of constant value
Are as follows:
Y=floor (xM×3)+1
In formula, Y is the corresponding current constant value of selection DNA linear operation;Floor () is downward rounding operation;xMFor
Current chaos image condition value;
S11: it according to the DNA sequence dna of the DNA sequence dna of replacement image matrix and key matrix, is obtained using DNA linear operation
The DNA sequence dna of password image, calculation formula are as follows:
In formula, QδFor the DNA sequence dna of password image;l'δFor the DNA sequence dna of replacement image matrix;KδFor key matrix
DNA sequence dna;For optional DNA linear operation;
S12: step S5 to S6, the corresponding DNA encryption rule with current constant value of selection are repeated;
S13: encrypting according to each row of the DNA encryption rule to the DNA sequence dna of password image, obtain password image,
Realize image encryption.
Analysis of experimental data:
The histogram that is obtained using conventional encryption methods is as shown in figure 3, highly reactive each pixel information for including is big
Small, the histogram obtained using the encryption method of this programme is as shown in figure 4, the confusion degree in each part (includes information
Degree) be the same so that the acquisition information in the picture that attacker is more difficult, that is, have powerful impact resistance, safety
Property it is high.
As shown in figure 5, the pixel interdependence between the encrypted image and normal image of this programme is compared, encrypting
In image afterwards, this correlation is almost disappeared, this illustrates that our scheme is also to have to resist well for Data attack
Power.
As shown in fig. 6, be compared the noise resistance degree of this programme and the prior art in terms of antinoise, it is available
Compared with prior art, this encryption method is not only greatly improved on cipher round results and degree of stability, in antinoise
Also there is preferable performance in interference.
A kind of chaos provided by the invention in conjunction with DNA encoding, it is high-efficient, highly-safe and practical based on mixed
The image encryption method of ignorant pseudorandom DNA enhancing, improves cipher round results, solves low efficiency existing in the prior art, no
Safe and not available problem.
Claims (8)
1. a kind of image encryption method based on chaos pseudo random DNA enhancing, which comprises the following steps:
S1: acquisition normal image and displacement, and obtain the dimension of normal image;
S2: according to the dimension of normal image, random permutation sequence is obtained using displacement and random permutation function;
S3: random permutation is carried out to the pixel in image according to random permutation sequence, obtains random replacement image matrix;
S4: according to random replacement image matrix, generating chaos image initial condition and control variable using hash function,
And key matrix is generated using the logical mappings that pseudorandom enhances;
S5: it according to chaos image initial condition and control variable, maps to obtain new chaos image condition using direct loic
Value;
S6: it is rounded downwards according to current chaos image condition value and obtains a constant value;
S7: selection corresponds to the DNA encoding rule of current constant value, and compiles to all pixels on all rows of image
Code;
S8: the DNA sequence dna of replacement image matrix is obtained;
S9: according to key matrix, step S5 to S7 is repeated, the DNA sequence dna of key matrix is obtained;
S10: repeating step S5 to S6, and selection corresponds to the DNA linear operation of current constant value;
S11: according to the DNA sequence dna of the DNA sequence dna of replacement image matrix and key matrix, password is obtained using DNA linear operation
The DNA sequence dna of image;
S12: step S5 to S6, the corresponding DNA encryption rule with current constant value of selection are repeated;
S13: encrypting according to each row of the DNA encryption rule to the DNA sequence dna of password image, obtain password image, realizes
Image encryption.
2. the image encryption method according to claim 1 based on chaos pseudo random DNA enhancing, which is characterized in that described
In step S2, the formula of random permutation sequence are as follows:
O=randperm (M × N)
In formula, O is random permutation sequence;Randperm () is random permutation sequential function;M, N are the dimension of normal image.
3. the image encryption method according to claim 1 based on chaos pseudo random DNA enhancing, which is characterized in that described
In step S3, the formula of replacement image matrix are as follows:
I'=reshape (I (O), M, N)
In formula, I' is replacement image matrix;I is the normal image of input;Reshape () is replacement image matrix function;O is
Random permutation sequence;M, N are the dimension of normal image.
4. the image encryption method according to claim 1 based on chaos pseudo random DNA enhancing, which is characterized in that described
In step S4, the method for generating key matrix includes the following steps:
S4-1: the serial data that hash function SHA-256 obtains one 64 16 systems is executed on replacement image matrix;
S4-2: the serial data of 16 systems is converted to 256 data flows;
S4-3: data flow being respectively put into 4 64 different masses, and handle each piece, the block that obtains that treated
Value, formula are as follows:
In formula, ψ1、ψ2、ψ3、ψ4For treated block value;biFor corresponding data flow;J is indicatrix, j ∈ { 1,2 .., 256 };
S4-4: according to treated block value, the initial conditions value and control variable of chaos image are obtained;
The calculation formula of the initial conditions value of chaos image are as follows:
xo=(ψ1+ψ2)mod1
In formula, xoFor the initial conditions value of chaos image;ψ1、ψ2For treated block value;Mod is modulo operation;
Control the calculation formula of variable are as follows:
P=3.999+ (((ψ3+ψ4)mod1)×0.001)
In formula, p is control variable;ψ3、ψ4For treated block value;Mod is modulo operation;
S4-5: it according to chaos image initial condition and control variable, is iterated using the logical mappings that pseudorandom enhances
To chaos sequence;
The calculation formula of the logical mappings of pseudorandom enhancing are as follows:
xi+1=((pxi(1-xi))100000)mod1
In formula, xi+1For next-generation chaos image condition value;xiFor current chaos image condition value;P is control variable;Mod is to take
Modular arithmetic;I is indicatrix, i ∈ { 1,2 .., MN };
S4-6: chaos sequence is converted into Serial No., and key matrix is obtained according to the Serial No.;
In formula, kiFor Serial No. pixel, and ki∈ K, K are key matrix;siFor corresponding chaos sequence;I is indicatrix, i ∈
{1,2,..,MN}。
5. the image encryption method according to claim 1 based on chaos pseudo random DNA enhancing, which is characterized in that described
In step S5, map to obtain new chaos image condition value, calculation formula using direct loic are as follows:
xi+1=pxi(1-xi)
In formula, xi+1For next-generation chaos image condition value;xiFor current chaos image condition value;P is control variable;I is instruction
Amount, i ∈ { 1,2 .., M }.
6. the image encryption method according to claim 1 based on chaos pseudo random DNA enhancing, which is characterized in that described
In step S6, the calculation formula of constant value are as follows:
R=floor (xM×8)+1
In formula, R is current constant value;Floor () is downward rounding operation;xMFor current chaos image condition value.
7. the image encryption method according to claim 1 based on chaos pseudo random DNA enhancing, which is characterized in that described
In step S10, selection corresponds to the DNA linear operation of current constant value, the calculation formula of constant value are as follows:
Y=floor (xM×3)+1
In formula, Y is the corresponding current constant value of selection DNA linear operation;Floor () is downward rounding operation;xMCurrently to mix
Ignorant image condition value.
8. the image encryption method according to claim 1 based on chaos pseudo random DNA enhancing, which is characterized in that described
In step S11, the calculation formula of the DNA sequence dna of password image are as follows:
Qδ=l'δ⊕Kδ
In formula, QδFor the DNA sequence dna of password image;l'δFor the DNA sequence dna of replacement image matrix;KδFor the DNA sequence of key matrix
Column;⊕ is optional DNA linear operation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810933328.7A CN109214972B (en) | 2018-08-16 | 2018-08-16 | Image encryption method based on chaos pseudorandom DNA enhancement |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810933328.7A CN109214972B (en) | 2018-08-16 | 2018-08-16 | Image encryption method based on chaos pseudorandom DNA enhancement |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109214972A true CN109214972A (en) | 2019-01-15 |
CN109214972B CN109214972B (en) | 2020-04-14 |
Family
ID=64988330
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810933328.7A Expired - Fee Related CN109214972B (en) | 2018-08-16 | 2018-08-16 | Image encryption method based on chaos pseudorandom DNA enhancement |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109214972B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110502907A (en) * | 2019-07-22 | 2019-11-26 | 西安理工大学 | A kind of image encryption method based on genetic algorithm |
CN110969564A (en) * | 2019-11-29 | 2020-04-07 | 珠海大横琴科技发展有限公司 | Image encryption method and device, electronic equipment and readable storage medium |
CN111832052A (en) * | 2020-07-13 | 2020-10-27 | 江西财经大学 | Non-peer image encryption method based on significance detection |
CN113722746A (en) * | 2021-10-29 | 2021-11-30 | 广东安恒电力科技有限公司 | Chaos encryption method and system for cable construction drawing |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103473733A (en) * | 2013-09-12 | 2013-12-25 | 东北林业大学 | Image encryption algorithm based on DNA encoding and chaotic mapping |
CN105046161A (en) * | 2015-07-29 | 2015-11-11 | 河南大学 | DNA dynamic coding based colored image encryption method |
CN107067359A (en) * | 2016-06-08 | 2017-08-18 | 电子科技大学 | Contourlet area image sharing methods based on Brownian movement and DNA encoding |
CN107657579A (en) * | 2017-09-19 | 2018-02-02 | 中国矿业大学 | Image encryption method based on DNA encoding and chaos |
-
2018
- 2018-08-16 CN CN201810933328.7A patent/CN109214972B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103473733A (en) * | 2013-09-12 | 2013-12-25 | 东北林业大学 | Image encryption algorithm based on DNA encoding and chaotic mapping |
CN105046161A (en) * | 2015-07-29 | 2015-11-11 | 河南大学 | DNA dynamic coding based colored image encryption method |
CN107067359A (en) * | 2016-06-08 | 2017-08-18 | 电子科技大学 | Contourlet area image sharing methods based on Brownian movement and DNA encoding |
CN107657579A (en) * | 2017-09-19 | 2018-02-02 | 中国矿业大学 | Image encryption method based on DNA encoding and chaos |
Non-Patent Citations (2)
Title |
---|
JOSHUA C. DAGADU 等: "An image cryptosystem based on pseudorandomly enhanced chaotic DNA and random permutation enhanced chaotic DNA and random permutation", 《MULTIMEDIA TOOLS AND APPLICATIONS》 * |
JOSHUA C. DAGADU 等: "Chaotic Medical Image Encryption Based on Arnold Transformation and Pseudorandomly Enhanced Logistic Map", 《JOURNAL OF MULTIDISCIPLINARY ENGINEERING SCIENCE AND TECHNOLOGY》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110502907A (en) * | 2019-07-22 | 2019-11-26 | 西安理工大学 | A kind of image encryption method based on genetic algorithm |
CN110969564A (en) * | 2019-11-29 | 2020-04-07 | 珠海大横琴科技发展有限公司 | Image encryption method and device, electronic equipment and readable storage medium |
CN111832052A (en) * | 2020-07-13 | 2020-10-27 | 江西财经大学 | Non-peer image encryption method based on significance detection |
CN111832052B (en) * | 2020-07-13 | 2024-02-20 | 江西财经大学 | Unequal image encryption method based on significance detection |
CN113722746A (en) * | 2021-10-29 | 2021-11-30 | 广东安恒电力科技有限公司 | Chaos encryption method and system for cable construction drawing |
CN113722746B (en) * | 2021-10-29 | 2022-02-18 | 广东安恒电力科技有限公司 | Chaos encryption method and system for cable construction drawing |
Also Published As
Publication number | Publication date |
---|---|
CN109214972B (en) | 2020-04-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109214972A (en) | A kind of image encryption method based on chaos pseudo random DNA enhancing | |
Zhang et al. | A novel color image encryption scheme using fractional-order hyperchaotic system and DNA sequence operations | |
Liu et al. | Color image encryption using three-dimensional sine ICMIC modulation map and DNA sequence operations | |
CN108111295B (en) | Homomorphic encryption method based on analog-to-analog operation | |
CN109376540A (en) | A kind of image encryption method based on Duffing mapping and genetic manipulation | |
Zhang et al. | A fast image encryption scheme based on AES | |
CN107659752A (en) | More image encryption methods based on DNA encoding and chaos | |
CN106997606A (en) | A kind of image encryption method based on hyperchaotic system Projective Synchronization | |
CN113660079B (en) | Image encryption method based on self diffusion and DNA coding | |
CN108429613A (en) | A kind of electric network information encryption method based on EN-PRESENT algorithms | |
CN103916248A (en) | Fully homomorphic encryption public key space compression method | |
Walia et al. | Implementation of new modified MD5-512 bit algorithm for cryptography | |
Zhou et al. | A summarization on image encryption | |
CN109618073A (en) | A kind of more figure encryption methods based on Hyperchaotic Chen System | |
KR20120129045A (en) | Method for implementing symmetric key encryption algorithm against power analysis attacks | |
CN117527223B (en) | Distributed decryption method and system for quantum-password-resistant grid | |
CN111682932B (en) | Single-round image encryption method based on mixed chaotic mapping | |
HK1062510A1 (en) | Cryptography private key storage and recovery method and apparatus | |
Tong et al. | A novel image encryption scheme based on dynamical multiple chaos and baker map | |
CN101958790A (en) | Encryption or decryption method of wireless communication network digital information | |
Jagdale et al. | Securing MMS with high performance elliptic curve cryptography | |
Vigila et al. | Key generation based on elliptic curve over finite prime field | |
CN115865313A (en) | Lightweight privacy protection longitudinal federal learning model parameter aggregation method | |
CN112737767B (en) | Method and system for generating message authentication code resisting differential power analysis and time attack | |
Stanciu et al. | Atmel AVR microcontroller implementation of a new enciphering algorithm based on a chaotic Generalized Hénon Map |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20200414 Termination date: 20210816 |
|
CF01 | Termination of patent right due to non-payment of annual fee |