CN109214972A - A kind of image encryption method based on chaos pseudo random DNA enhancing - Google Patents

A kind of image encryption method based on chaos pseudo random DNA enhancing Download PDF

Info

Publication number
CN109214972A
CN109214972A CN201810933328.7A CN201810933328A CN109214972A CN 109214972 A CN109214972 A CN 109214972A CN 201810933328 A CN201810933328 A CN 201810933328A CN 109214972 A CN109214972 A CN 109214972A
Authority
CN
China
Prior art keywords
image
dna
chaos
formula
value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810933328.7A
Other languages
Chinese (zh)
Other versions
CN109214972B (en
Inventor
李建平
顾小丰
胡健
葛学志
李平
杨久东
周望
张建国
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China filed Critical University of Electronic Science and Technology of China
Priority to CN201810933328.7A priority Critical patent/CN109214972B/en
Publication of CN109214972A publication Critical patent/CN109214972A/en
Application granted granted Critical
Publication of CN109214972B publication Critical patent/CN109214972B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Measuring Or Testing Involving Enzymes Or Micro-Organisms (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a kind of image encryption methods based on chaos pseudo random DNA enhancing, comprising the following steps: S1, input normal image and displacement;S2, random permutation sequence is obtained;S3, random permutation is carried out, obtains random replacement image matrix;S4, key matrix is generated;S5, it maps to obtain new chaos image condition value using direct loic;S6, rounding obtains constant value downwards;S7, selection DNA encoding rule;S8, the DNA sequence dna for obtaining replacement image matrix;S9, the DNA sequence dna for obtaining key matrix;S10, selection correspond to the DNA linear operation of current constant value;S11, the DNA sequence dna for obtaining password image;S12, the corresponding DNA encryption rule with current constant value of selection;S13, password image is obtained, realizes image encryption.The present invention solves the problems, such as low efficiency existing in the prior art, dangerous and not available.

Description

A kind of image encryption method based on chaos pseudo random DNA enhancing
Technical field
The invention belongs to image encryption technology fields, and in particular to it is a kind of based on chaos pseudo random DNA enhancing image add Decryption method.
Background technique
With the rapid development of computer technology and network technology, people there is an urgent need to research and develop out more safety, Efficiently, reliably method protects the safety of data.Chaos system has many good properties, such as to primary condition and control The sensibility of parameter, the density of period point set and topological transitivity.Obscuring in these properties and cryptography and diffusion property There is close relationship.Since the eighties in last century, the research of Chaos Immune Algorithm is of increasing concern, proposes and is largely based on The Encryption Algorithm of chaos achieves many progress full of hope.However, recent studies have indicated that, it is before considered practical Property strong and highly-safe chaos cipher scheme have proven to as low efficiency, dangerous and unavailable.How deep analysis is passed through Research designs practical and highly-safe chaos cipher scheme with gradually as outstanding problem anxious to be resolved.
Summary of the invention
For above-mentioned deficiency in the prior art, a kind of chaos provided by the invention is in conjunction with DNA encoding, high-efficient, peace Quan Xinggao and the practical image encryption method based on chaos pseudo random DNA enhancing, improve cipher round results, solve Low efficiency existing in the prior art, dangerous and not available problem.
In order to achieve the above object of the invention, the technical solution adopted by the present invention are as follows:
A kind of image encryption method based on chaos pseudo random DNA enhancing, comprising the following steps:
S1: acquisition normal image and displacement, and obtain the dimension of normal image;
S2: according to the dimension of normal image, random permutation sequence is obtained using displacement and random permutation function;
S3: random permutation is carried out to the pixel in image according to random permutation sequence, obtains random replacement image matrix;
S4: according to random replacement image matrix, chaos image initial condition and control are generated using hash function Variable, and key matrix is generated using the logical mappings that pseudorandom enhances;
S5: it according to chaos image initial condition and control variable, maps to obtain new chaos image using direct loic Condition;
S6: it is rounded downwards according to current chaos image condition value and obtains a constant value;
S7: selection corresponds to the DNA encoding rule of current constant value, and carries out to all pixels on all rows of image Coding;
S8: the DNA sequence dna of replacement image matrix is obtained;
S9: according to key matrix, step S5 to S7 is repeated, the DNA sequence dna of key matrix is obtained;
S10: repeating step S5 to S6, and selection corresponds to the DNA linear operation of current constant value;
S11: it according to the DNA sequence dna of the DNA sequence dna of replacement image matrix and key matrix, is obtained using DNA linear operation The DNA sequence dna of password image;
S12: step S5 to S6, the corresponding DNA encryption rule with current constant value of selection are repeated;
S13: encrypting according to each row of the DNA encryption rule to the DNA sequence dna of password image, obtain password image, Realize image encryption.
Further, in step S2, the formula of random permutation sequence are as follows:
O=randperm (M × N)
In formula, O is random permutation sequence;Randperm () is random permutation sequential function;M, N are the dimension of normal image Degree.
Further, in step S3, the formula of replacement image matrix are as follows:
I'=reshape (I (O), M, N)
In formula, I' is replacement image matrix;I is the normal image of input;Reshape () is replacement image matrix letter Number;O is random permutation sequence;M, N are the dimension of normal image.
Further, in step S4, the method for generating key matrix includes the following steps:
S4-1: the serial data that hash function SHA-256 obtains one 64 16 systems is executed on replacement image matrix;
S4-2: the serial data of 16 systems is converted to 256 data flows;
S4-3: data flow is respectively put into 4 64 different masses, and each piece is handled, after obtaining processing Block value, formula are as follows:
In formula, ψ1、ψ2、ψ3、ψ4For treated block value;biFor corresponding data flow;J is indicatrix, j ∈ 1,2 .., 256};
S4-4: according to treated block value, the initial conditions value and control variable of chaos image are obtained;
The calculation formula of the initial conditions value of chaos image are as follows:
xo=(ψ12)mod1
In formula, xoFor the initial conditions value of chaos image;ψ1、ψ2For treated block value;Mod is modulo operation;
Control the calculation formula of variable are as follows:
P=3.999+ (((ψ34)mod1)×0.001)
In formula, p is control variable;ψ3、ψ4For treated block value;Mod is modulo operation;
S4-5: it according to chaos image initial condition and control variable, is changed using the logical mappings that pseudorandom enhances In generation, obtains chaos sequence;
The calculation formula of the logical mappings of pseudorandom enhancing are as follows:
xi+1=((pxi(1-xi))100000)mod1
In formula, xi+1For next-generation chaos image condition value;xiFor current chaos image condition value;P is control variable;mod For modulo operation;I is indicatrix, i ∈ { 1,2 .., MN };
S4-6: chaos sequence is converted into Serial No., and key matrix is obtained according to the Serial No.;
In formula, kiFor Serial No. pixel, and ki∈ K, K are key matrix;siFor corresponding chaos sequence;I is instruction Amount, i ∈ { 1,2 .., MN }.
Further, it in step S5, maps to obtain new chaos image condition value, calculation formula using direct loic are as follows:
xi+1=pxi(1-xi)
In formula, xi+1For next-generation chaos image condition value;xiFor current chaos image condition value;P is control variable;I is Indicatrix, i ∈ { 1,2 .., M }.
Further, in step S6, the calculation formula of constant value are as follows:
R=floor (xM×8)+1
In formula, R is current constant value;Floor () is downward rounding operation;xMFor current chaos image condition value.
Further, in step S10, selection corresponds to the DNA linear operation of current constant value, the calculation formula of constant value Are as follows:
Y=floor (xM×3)+1
In formula, Y is the corresponding current constant value of selection DNA linear operation;Floor () is downward rounding operation;xMFor Current chaos image condition value.
Further, in step S11, the calculation formula of the DNA sequence dna of password image are as follows:
In formula, QδFor the DNA sequence dna of password image;l'δFor the DNA sequence dna of replacement image matrix;KδFor key matrix DNA sequence dna;For optional DNA linear operation.
This programme has the beneficial effect that
(1) simple structure that this programme uses, discreteness, high output processing, less arithmetical operation and relatively easy Low-dimensional system has saved computing capability when using, time and resource, and has preferably attacked recovery rate, improves practicability;
(2) on the basis of DNA encoding and decoding rule and DNA algebraic manipulation are mapped random selection and are expert at by direct loic Operation, improves safety, executes the time to greatly reduce, improves encryption efficiency.
Detailed description of the invention
Fig. 1 is the image encryption method flow chart enhanced based on chaos pseudo random DNA;
Fig. 2 is that the logical mappings enhanced using pseudorandom generate the method flow diagram of key matrix;
Fig. 3 is existing encryption method histogram;
Fig. 4 is this programme encryption method histogram;
Fig. 5 is that encrypted image and normal image pixel interdependence compare figure;
Fig. 6 compares figure for the noise resistance degree of this programme and the prior art.
Specific embodiment
A specific embodiment of the invention is described below, in order to facilitate understanding by those skilled in the art this hair It is bright, it should be apparent that the present invention is not limited to the ranges of specific embodiment, for those skilled in the art, As long as various change is in the spirit and scope of the present invention that the attached claims limit and determine, these variations are aobvious and easy See, all are using the innovation and creation of present inventive concept in the column of protection.
In the embodiment of the present invention, a kind of image encryption method based on chaos pseudo random DNA enhancing, as shown in Figure 1, including Following steps:
S1: acquisition normal image and displacement, and obtain the dimension of normal image;
S2: according to the dimension of normal image, random permutation sequence, formula are obtained using displacement and random permutation function Are as follows:
O=randperm (M × N)
In formula, O is random permutation sequence;Randperm () is random permutation sequential function;M, N are the dimension of normal image Degree;
S3: carrying out random permutation to the pixel in image according to random permutation sequence, obtain random replacement image matrix, Formula are as follows:
I'=reshape (I (O), M, N)
In formula, I' is replacement image matrix;I is the normal image of input;Reshape () is replacement image matrix letter Number;O is random permutation sequence;M, N are the dimension of normal image;
S4: according to random replacement image matrix, chaos image initial condition and control are generated using hash function Variable, and key matrix is generated using the logical mappings that pseudorandom enhances, as shown in Fig. 2, including the following steps:
S4-1: the serial data that hash function SHA-256 obtains one 64 16 systems is executed on replacement image matrix; H=h1,h2,...,h64
S4-2: the serial data of 16 systems is converted to 256 data flows;ψ=b1,b2,...,b256
S4-3: data flow is respectively put into 4 64 different masses, and each piece is handled, after obtaining processing Block value, formula are as follows:
In formula, ψ1、ψ2、ψ3、ψ4For treated block value;biFor corresponding data flow;J is indicatrix, j ∈ 1,2 .., 256};
S4-4: according to treated block value, the initial conditions value and control variable of chaos image are obtained;
The calculation formula of the initial conditions value of chaos image are as follows:
xo=(ψ12)mod1
In formula, xoFor the initial conditions value of chaos image;ψ1、ψ2For treated block value;Mod is modulo operation;
Control the calculation formula of variable are as follows:
P=3.999+ (((ψ34)mod1)×0.001)
In formula, p is control variable;ψ3、ψ4For treated block value;Mod is modulo operation;
S4-5: it according to chaos image initial condition and control variable, is changed using the logical mappings that pseudorandom enhances In generation, obtains chaos sequence S={ s1,s2,...,sMN};
The calculation formula of the logical mappings of pseudorandom enhancing are as follows:
xi+1=((pxi(1-xi))100000)mod1
In formula, xi+1For next-generation chaos image condition value;xiFor current chaos image condition value;P is control variable;mod For modulo operation;I is indicatrix, i ∈ { 1,2 .., MN };
S4-6: chaos sequence is converted into Serial No., and key matrix is obtained according to the Serial No.;
In formula, kiFor Serial No. pixel, and ki∈ K, K are key matrix;siFor corresponding chaos sequence;
I is indicatrix, i ∈ { 1,2 .., MN };
S5: according to chaos image initial condition and control variable uses, direct loic maps to obtain new chaos image Condition, calculation formula are as follows:
xi+1=pxi(1-xi)
In formula, xi+1For next-generation chaos image condition value;xiFor current chaos image condition value;P is control variable;I is Indicatrix, i ∈ { 1,2 .., M };
S6: it is rounded downwards according to current chaos image condition value and obtains a constant value;
The calculation formula of constant value are as follows:
R=floor (xM×8)+1
In formula, R is current constant value;Floor () is downward rounding operation;xMFor current chaos image condition value;
S7: selection corresponds to the DNA encoding rule of current constant value, and carries out to all pixels on all rows of image Coding;
S8: the DNA sequence dna of replacement image matrix is obtained;
S9: according to key matrix, step S5 to S7 is repeated, the DNA sequence dna of key matrix is obtained;
S10: repeating step S5 to S6, and selection corresponds to the DNA linear operation of current constant value, the calculation formula of constant value Are as follows:
Y=floor (xM×3)+1
In formula, Y is the corresponding current constant value of selection DNA linear operation;Floor () is downward rounding operation;xMFor Current chaos image condition value;
S11: it according to the DNA sequence dna of the DNA sequence dna of replacement image matrix and key matrix, is obtained using DNA linear operation The DNA sequence dna of password image, calculation formula are as follows:
In formula, QδFor the DNA sequence dna of password image;l'δFor the DNA sequence dna of replacement image matrix;KδFor key matrix DNA sequence dna;For optional DNA linear operation;
S12: step S5 to S6, the corresponding DNA encryption rule with current constant value of selection are repeated;
S13: encrypting according to each row of the DNA encryption rule to the DNA sequence dna of password image, obtain password image, Realize image encryption.
Analysis of experimental data:
The histogram that is obtained using conventional encryption methods is as shown in figure 3, highly reactive each pixel information for including is big Small, the histogram obtained using the encryption method of this programme is as shown in figure 4, the confusion degree in each part (includes information Degree) be the same so that the acquisition information in the picture that attacker is more difficult, that is, have powerful impact resistance, safety Property it is high.
As shown in figure 5, the pixel interdependence between the encrypted image and normal image of this programme is compared, encrypting In image afterwards, this correlation is almost disappeared, this illustrates that our scheme is also to have to resist well for Data attack Power.
As shown in fig. 6, be compared the noise resistance degree of this programme and the prior art in terms of antinoise, it is available Compared with prior art, this encryption method is not only greatly improved on cipher round results and degree of stability, in antinoise Also there is preferable performance in interference.
A kind of chaos provided by the invention in conjunction with DNA encoding, it is high-efficient, highly-safe and practical based on mixed The image encryption method of ignorant pseudorandom DNA enhancing, improves cipher round results, solves low efficiency existing in the prior art, no Safe and not available problem.

Claims (8)

1. a kind of image encryption method based on chaos pseudo random DNA enhancing, which comprises the following steps:
S1: acquisition normal image and displacement, and obtain the dimension of normal image;
S2: according to the dimension of normal image, random permutation sequence is obtained using displacement and random permutation function;
S3: random permutation is carried out to the pixel in image according to random permutation sequence, obtains random replacement image matrix;
S4: according to random replacement image matrix, generating chaos image initial condition and control variable using hash function, And key matrix is generated using the logical mappings that pseudorandom enhances;
S5: it according to chaos image initial condition and control variable, maps to obtain new chaos image condition using direct loic Value;
S6: it is rounded downwards according to current chaos image condition value and obtains a constant value;
S7: selection corresponds to the DNA encoding rule of current constant value, and compiles to all pixels on all rows of image Code;
S8: the DNA sequence dna of replacement image matrix is obtained;
S9: according to key matrix, step S5 to S7 is repeated, the DNA sequence dna of key matrix is obtained;
S10: repeating step S5 to S6, and selection corresponds to the DNA linear operation of current constant value;
S11: according to the DNA sequence dna of the DNA sequence dna of replacement image matrix and key matrix, password is obtained using DNA linear operation The DNA sequence dna of image;
S12: step S5 to S6, the corresponding DNA encryption rule with current constant value of selection are repeated;
S13: encrypting according to each row of the DNA encryption rule to the DNA sequence dna of password image, obtain password image, realizes Image encryption.
2. the image encryption method according to claim 1 based on chaos pseudo random DNA enhancing, which is characterized in that described In step S2, the formula of random permutation sequence are as follows:
O=randperm (M × N)
In formula, O is random permutation sequence;Randperm () is random permutation sequential function;M, N are the dimension of normal image.
3. the image encryption method according to claim 1 based on chaos pseudo random DNA enhancing, which is characterized in that described In step S3, the formula of replacement image matrix are as follows:
I'=reshape (I (O), M, N)
In formula, I' is replacement image matrix;I is the normal image of input;Reshape () is replacement image matrix function;O is Random permutation sequence;M, N are the dimension of normal image.
4. the image encryption method according to claim 1 based on chaos pseudo random DNA enhancing, which is characterized in that described In step S4, the method for generating key matrix includes the following steps:
S4-1: the serial data that hash function SHA-256 obtains one 64 16 systems is executed on replacement image matrix;
S4-2: the serial data of 16 systems is converted to 256 data flows;
S4-3: data flow being respectively put into 4 64 different masses, and handle each piece, the block that obtains that treated Value, formula are as follows:
In formula, ψ1、ψ2、ψ3、ψ4For treated block value;biFor corresponding data flow;J is indicatrix, j ∈ { 1,2 .., 256 };
S4-4: according to treated block value, the initial conditions value and control variable of chaos image are obtained;
The calculation formula of the initial conditions value of chaos image are as follows:
xo=(ψ12)mod1
In formula, xoFor the initial conditions value of chaos image;ψ1、ψ2For treated block value;Mod is modulo operation;
Control the calculation formula of variable are as follows:
P=3.999+ (((ψ34)mod1)×0.001)
In formula, p is control variable;ψ3、ψ4For treated block value;Mod is modulo operation;
S4-5: it according to chaos image initial condition and control variable, is iterated using the logical mappings that pseudorandom enhances To chaos sequence;
The calculation formula of the logical mappings of pseudorandom enhancing are as follows:
xi+1=((pxi(1-xi))100000)mod1
In formula, xi+1For next-generation chaos image condition value;xiFor current chaos image condition value;P is control variable;Mod is to take Modular arithmetic;I is indicatrix, i ∈ { 1,2 .., MN };
S4-6: chaos sequence is converted into Serial No., and key matrix is obtained according to the Serial No.;
In formula, kiFor Serial No. pixel, and ki∈ K, K are key matrix;siFor corresponding chaos sequence;I is indicatrix, i ∈ {1,2,..,MN}。
5. the image encryption method according to claim 1 based on chaos pseudo random DNA enhancing, which is characterized in that described In step S5, map to obtain new chaos image condition value, calculation formula using direct loic are as follows:
xi+1=pxi(1-xi)
In formula, xi+1For next-generation chaos image condition value;xiFor current chaos image condition value;P is control variable;I is instruction Amount, i ∈ { 1,2 .., M }.
6. the image encryption method according to claim 1 based on chaos pseudo random DNA enhancing, which is characterized in that described In step S6, the calculation formula of constant value are as follows:
R=floor (xM×8)+1
In formula, R is current constant value;Floor () is downward rounding operation;xMFor current chaos image condition value.
7. the image encryption method according to claim 1 based on chaos pseudo random DNA enhancing, which is characterized in that described In step S10, selection corresponds to the DNA linear operation of current constant value, the calculation formula of constant value are as follows:
Y=floor (xM×3)+1
In formula, Y is the corresponding current constant value of selection DNA linear operation;Floor () is downward rounding operation;xMCurrently to mix Ignorant image condition value.
8. the image encryption method according to claim 1 based on chaos pseudo random DNA enhancing, which is characterized in that described In step S11, the calculation formula of the DNA sequence dna of password image are as follows:
Qδ=l'δ⊕Kδ
In formula, QδFor the DNA sequence dna of password image;l'δFor the DNA sequence dna of replacement image matrix;KδFor the DNA sequence of key matrix Column;⊕ is optional DNA linear operation.
CN201810933328.7A 2018-08-16 2018-08-16 Image encryption method based on chaos pseudorandom DNA enhancement Expired - Fee Related CN109214972B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810933328.7A CN109214972B (en) 2018-08-16 2018-08-16 Image encryption method based on chaos pseudorandom DNA enhancement

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810933328.7A CN109214972B (en) 2018-08-16 2018-08-16 Image encryption method based on chaos pseudorandom DNA enhancement

Publications (2)

Publication Number Publication Date
CN109214972A true CN109214972A (en) 2019-01-15
CN109214972B CN109214972B (en) 2020-04-14

Family

ID=64988330

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810933328.7A Expired - Fee Related CN109214972B (en) 2018-08-16 2018-08-16 Image encryption method based on chaos pseudorandom DNA enhancement

Country Status (1)

Country Link
CN (1) CN109214972B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110502907A (en) * 2019-07-22 2019-11-26 西安理工大学 A kind of image encryption method based on genetic algorithm
CN110969564A (en) * 2019-11-29 2020-04-07 珠海大横琴科技发展有限公司 Image encryption method and device, electronic equipment and readable storage medium
CN111832052A (en) * 2020-07-13 2020-10-27 江西财经大学 Non-peer image encryption method based on significance detection
CN113722746A (en) * 2021-10-29 2021-11-30 广东安恒电力科技有限公司 Chaos encryption method and system for cable construction drawing

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103473733A (en) * 2013-09-12 2013-12-25 东北林业大学 Image encryption algorithm based on DNA encoding and chaotic mapping
CN105046161A (en) * 2015-07-29 2015-11-11 河南大学 DNA dynamic coding based colored image encryption method
CN107067359A (en) * 2016-06-08 2017-08-18 电子科技大学 Contourlet area image sharing methods based on Brownian movement and DNA encoding
CN107657579A (en) * 2017-09-19 2018-02-02 中国矿业大学 Image encryption method based on DNA encoding and chaos

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103473733A (en) * 2013-09-12 2013-12-25 东北林业大学 Image encryption algorithm based on DNA encoding and chaotic mapping
CN105046161A (en) * 2015-07-29 2015-11-11 河南大学 DNA dynamic coding based colored image encryption method
CN107067359A (en) * 2016-06-08 2017-08-18 电子科技大学 Contourlet area image sharing methods based on Brownian movement and DNA encoding
CN107657579A (en) * 2017-09-19 2018-02-02 中国矿业大学 Image encryption method based on DNA encoding and chaos

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
JOSHUA C. DAGADU 等: "An image cryptosystem based on pseudorandomly enhanced chaotic DNA and random permutation enhanced chaotic DNA and random permutation", 《MULTIMEDIA TOOLS AND APPLICATIONS》 *
JOSHUA C. DAGADU 等: "Chaotic Medical Image Encryption Based on Arnold Transformation and Pseudorandomly Enhanced Logistic Map", 《JOURNAL OF MULTIDISCIPLINARY ENGINEERING SCIENCE AND TECHNOLOGY》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110502907A (en) * 2019-07-22 2019-11-26 西安理工大学 A kind of image encryption method based on genetic algorithm
CN110969564A (en) * 2019-11-29 2020-04-07 珠海大横琴科技发展有限公司 Image encryption method and device, electronic equipment and readable storage medium
CN111832052A (en) * 2020-07-13 2020-10-27 江西财经大学 Non-peer image encryption method based on significance detection
CN111832052B (en) * 2020-07-13 2024-02-20 江西财经大学 Unequal image encryption method based on significance detection
CN113722746A (en) * 2021-10-29 2021-11-30 广东安恒电力科技有限公司 Chaos encryption method and system for cable construction drawing
CN113722746B (en) * 2021-10-29 2022-02-18 广东安恒电力科技有限公司 Chaos encryption method and system for cable construction drawing

Also Published As

Publication number Publication date
CN109214972B (en) 2020-04-14

Similar Documents

Publication Publication Date Title
CN109214972A (en) A kind of image encryption method based on chaos pseudo random DNA enhancing
Zhang et al. A novel color image encryption scheme using fractional-order hyperchaotic system and DNA sequence operations
Liu et al. Color image encryption using three-dimensional sine ICMIC modulation map and DNA sequence operations
CN108111295B (en) Homomorphic encryption method based on analog-to-analog operation
CN109376540A (en) A kind of image encryption method based on Duffing mapping and genetic manipulation
Zhang et al. A fast image encryption scheme based on AES
CN107659752A (en) More image encryption methods based on DNA encoding and chaos
CN106997606A (en) A kind of image encryption method based on hyperchaotic system Projective Synchronization
CN113660079B (en) Image encryption method based on self diffusion and DNA coding
CN108429613A (en) A kind of electric network information encryption method based on EN-PRESENT algorithms
CN103916248A (en) Fully homomorphic encryption public key space compression method
Walia et al. Implementation of new modified MD5-512 bit algorithm for cryptography
Zhou et al. A summarization on image encryption
CN109618073A (en) A kind of more figure encryption methods based on Hyperchaotic Chen System
KR20120129045A (en) Method for implementing symmetric key encryption algorithm against power analysis attacks
CN117527223B (en) Distributed decryption method and system for quantum-password-resistant grid
CN111682932B (en) Single-round image encryption method based on mixed chaotic mapping
HK1062510A1 (en) Cryptography private key storage and recovery method and apparatus
Tong et al. A novel image encryption scheme based on dynamical multiple chaos and baker map
CN101958790A (en) Encryption or decryption method of wireless communication network digital information
Jagdale et al. Securing MMS with high performance elliptic curve cryptography
Vigila et al. Key generation based on elliptic curve over finite prime field
CN115865313A (en) Lightweight privacy protection longitudinal federal learning model parameter aggregation method
CN112737767B (en) Method and system for generating message authentication code resisting differential power analysis and time attack
Stanciu et al. Atmel AVR microcontroller implementation of a new enciphering algorithm based on a chaotic Generalized Hénon Map

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200414

Termination date: 20210816

CF01 Termination of patent right due to non-payment of annual fee