CN109214972B - Image encryption method based on chaos pseudorandom DNA enhancement - Google Patents

Image encryption method based on chaos pseudorandom DNA enhancement Download PDF

Info

Publication number
CN109214972B
CN109214972B CN201810933328.7A CN201810933328A CN109214972B CN 109214972 B CN109214972 B CN 109214972B CN 201810933328 A CN201810933328 A CN 201810933328A CN 109214972 B CN109214972 B CN 109214972B
Authority
CN
China
Prior art keywords
image
dna
chaotic
formula
random
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201810933328.7A
Other languages
Chinese (zh)
Other versions
CN109214972A (en
Inventor
李建平
顾小丰
胡健
葛学志
李平
杨久东
周望
张建国
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China filed Critical University of Electronic Science and Technology of China
Priority to CN201810933328.7A priority Critical patent/CN109214972B/en
Publication of CN109214972A publication Critical patent/CN109214972A/en
Application granted granted Critical
Publication of CN109214972B publication Critical patent/CN109214972B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Measuring Or Testing Involving Enzymes Or Micro-Organisms (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses an image encryption method based on chaos pseudorandom DNA enhancement, which comprises the following steps: s1, inputting a common image and a permutator; s2, obtaining a random permutation sequence; s3, carrying out random replacement to obtain a random replacement image matrix; s4, generating a key matrix; s5, obtaining a new chaotic image condition value by using direct logic mapping; s6, rounding down to obtain a constant value; s7, selecting a DNA coding rule; s8, obtaining a DNA sequence of the replacement image matrix; s9, obtaining a DNA sequence of the key matrix; s10, selecting a DNA linear operation corresponding to the current constant value; s11, obtaining a DNA sequence of the password image; s12, selecting a DNA encryption rule corresponding to the current constant value; and S13, obtaining the password image and realizing image encryption. The invention solves the problems of low efficiency, insecurity and unavailability in the prior art.

Description

Image encryption method based on chaos pseudorandom DNA enhancement
Technical Field
The invention belongs to the technical field of image encryption, and particularly relates to an image encryption method based on chaos pseudorandom DNA enhancement.
Background
With the rapid development of computer technology and network technology, people are urgently required to research and develop more safe, efficient and reliable methods for protecting the data security. The chaotic system has many good properties such as sensitivity to initial conditions and control parameters, consistency of periodic point sets and topological transitivity. These properties and the confusion in cryptography are closely related to diffusion characteristics. Since the 80 s of the last century, the research of chaotic cryptography has attracted increasing attention, and a large number of chaotic-based encryption algorithms have been proposed, and have made many hopeful developments. However, recent studies have shown that chaotic cryptographic schemes, previously considered to be highly practical and safe, have proven to be inefficient, unsafe, and unusable. Through deep analysis and research, the chaos password scheme with strong practicability and high safety is designed to become a prominent problem to be solved urgently.
Disclosure of Invention
Aiming at the defects in the prior art, the image encryption method based on chaos pseudorandom DNA enhancement, which is provided by the invention and has the advantages of combination of chaos and DNA coding, high efficiency, high safety and strong practicability, improves the encryption effect and solves the problems of low efficiency, unsafety and unavailability in the prior art.
In order to achieve the purpose of the invention, the invention adopts the technical scheme that:
an image encryption method based on chaos pseudorandom DNA enhancement comprises the following steps:
s1: acquiring a common image and a displacer, and obtaining the dimensionality of the common image;
s2: obtaining a random permutation sequence by using a permutation sub and a random permutation function according to the dimensionality of the common image;
s3: carrying out random replacement on pixels in the image according to the random replacement sequence to obtain a random replacement image matrix;
s4: generating an initial condition value and a control variable of the chaotic image by using a hash function according to the random permutation image matrix, and generating a key matrix by using pseudo-random enhanced logic mapping;
s5: obtaining a new chaotic image condition value by using direct logic mapping according to the chaotic image initial condition value and the control variable;
s6: obtaining a constant value by rounding down according to the current chaotic image condition value;
s7: selecting a DNA coding rule corresponding to the current constant value and coding all pixels on all lines of the image;
s8: obtaining a DNA sequence of a displacement image matrix;
s9: repeating the steps S5 to S7 according to the key matrix to obtain a DNA sequence of the key matrix;
s10: repeating the step S5, and performing DNA linear operation on the chaotic image condition value to obtain linear parameters;
s11: according to the DNA sequence of the displaced image matrix and the DNA sequence of the key matrix, using the DNA linear operation corresponding to the linear parameters to obtain the DNA sequence of the password image;
s12: repeating steps S5 to S6, selecting a DNA encryption rule corresponding to the current constant value;
s13: and encrypting each line of the DNA sequence of the password image according to the DNA encryption rule to obtain the password image, thereby realizing image encryption.
Further, in step S2, the formula of the random permutation order is:
O=randperm(M×N)
wherein O is a random permutation order; randderm (·) is a random permutation order function; m and N are the dimensions of the common image.
Further, in step S3, the formula of the permuted image matrix is:
I'=reshape(I(O),M,N)
in the formula, I' is a permutation image matrix; i is an input common image; reshape (·) is a permuted image matrix function; o is a random permutation order; m and N are the dimensions of the common image.
Further, in step S4, the method for generating the key matrix includes the following steps:
s4-1: executing a hash function SHA-256 on the replacement image matrix to obtain a 64-bit 16-system data string;
s4-2: converting the 16-system data string into a 256-bit data stream;
s4-3: respectively putting the data streams into 4 64-bit different blocks, and processing each block to obtain a processed block value, wherein the formula is as follows:
Figure GDA0002366442650000031
in the formula, #1、ψ2、ψ3、ψ4Is the processed block value; biIs a corresponding data stream; j is an indication quantity, j belongs to {1, 2., 256 };
s4-4: obtaining an initial condition value and a control variable of the chaotic image according to the processed block value;
the calculation formula of the initial condition value of the chaotic image is as follows:
xo=(ψ12)mod1
in the formula, xoThe initial condition value of the chaotic image is obtained; psi1、ψ2Is the processed block value; mod is a modulo operation;
the calculation formula of the control variable is as follows:
p=3.999+(((ψ34)mod1)×0.001)
wherein p is a control variable; psi3、ψ4Is the processed block value; mod is a modulo operation;
s4-5: according to the initial condition value and the control variable of the chaotic image, iteration is carried out by using pseudo-random enhanced logic mapping to obtain a chaotic sequence;
the formula for the calculation of the pseudo-randomly enhanced logical mapping is:
xi+1=((pxi(1-xi))100000)mod1
in the formula, xi+1The next generation chaotic image condition value; x is the number ofiThe current chaotic image condition value; p is a control variable; mod is a modulo operation; i is an indication quantity, i belongs to {1, 2., MN };
s4-6: converting the chaotic sequence into a digital sequence, and obtaining a key matrix according to the digital sequence;
Figure GDA0002366442650000041
in the formula, kiIs a digital sequence of pixels, and kiE.g. K, wherein K is a key matrix; siIs a corresponding chaotic sequence; i is the indicated quantity, i ∈ {1, 2., MN }.
Further, in step S5, a new chaotic image condition value is obtained by using direct logic mapping, and the calculation formula is:
xi+1=pxi(1-xi)
in the formula, xi+1The next generation chaotic image condition value; x is the number ofiThe current chaotic image condition value; p is a control variable; i is an indicator quantity, i ∈ {1,2,. multidot.m }.
Further, in step S6, the calculation formula of the constant value is:
R=floor(xM×8)+1
in the formula, R is a current constant value; floor (·) is a downward rounding operation; x is the number ofMIs the current chaotic image condition value.
Further, in step S10, performing DNA linear operation on the chaotic image condition value to obtain a linear parameter, wherein the linear parameter is calculated by the following formula:
Y=floor(xM×3)+1
in the formula, Y is a linear parameter; floor (·) is a downward rounding operation; x is the number ofMIs the current chaotic image condition value.
Further, in step S11, the calculation formula of the DNA sequence of the password image is:
Figure GDA0002366442650000051
in the formula, QδA DNA sequence that is a cryptographic image; l'δIs a DNA sequence of a displaced image matrix; kδDNA sequences that are key matrices;
Figure GDA0002366442650000052
linear manipulation for arbitrarily selected DNA.
The beneficial effect of this scheme does:
(1) the scheme has the advantages of simple structure, discreteness, high output processing, less arithmetic operation and relatively easy low-dimensional system, saves the computing power, time and resources during use, has better attack recovery rate and improves the practicability;
(2) the DNA coding and decoding rules and the DNA algebra operation are randomly selected by direct logic mapping and operated on a row basis, so that the safety is improved, the execution time is greatly reduced, and the encryption efficiency is improved.
Drawings
FIG. 1 is a flow chart of an image encryption method based on chaos pseudorandom DNA enhancement;
FIG. 2 is a flow diagram of a method for generating a key matrix using pseudo-randomly enhanced logical mapping;
FIG. 3 is a prior art encryption method histogram;
FIG. 4 is a histogram of the encryption method according to the present embodiment;
FIG. 5 is a comparison graph of pixel correlation between an encrypted image and a generic image;
fig. 6 is a graph comparing the noise immunity of the present embodiment and the prior art.
Detailed Description
The following description of the embodiments of the present invention is provided to facilitate the understanding of the present invention by those skilled in the art, but it should be understood that the present invention is not limited to the scope of the embodiments, and it will be apparent to those skilled in the art that various changes may be made without departing from the spirit and scope of the invention as defined and defined in the appended claims, and all matters produced by the invention using the inventive concept are protected.
In the embodiment of the invention, an image encryption method based on chaos pseudorandom DNA enhancement, as shown in FIG. 1, comprises the following steps:
s1: acquiring a common image and a displacer, and obtaining the dimensionality of the common image;
s2: according to the dimensionality of the common image, a random permutation sequence is obtained by using a permutator and a random permutation function, and the formula is as follows:
O=randperm(M×N)
wherein O is a random permutation order; randderm (·) is a random permutation order function; m and N are the dimensionalities of the common image;
s3: carrying out random replacement on pixels in the image according to a random replacement sequence to obtain a random replacement image matrix, wherein the formula is as follows:
I'=reshape(I(O),M,N)
in the formula, I' is a permutation image matrix; i is an input common image; reshape (·) is a permuted image matrix function; o is a random permutation order; m and N are the dimensionalities of the common image;
s4: according to the random permutation image matrix, a hash function is used for generating an initial condition value and a control variable of the chaotic image, and a pseudo-random enhanced logic mapping is used for generating a key matrix, as shown in fig. 2, the method comprises the following steps:
s4-1: executing a hash function SHA-256 on the replacement image matrix to obtain a 64-bit 16-system data string; h ═ H1,h2,...,h64
S4-2: converting the 16-system data string into a 256-bit data stream; psi ═ b1,b2,...,b256
S4-3: respectively putting the data streams into 4 64-bit different blocks, and processing each block to obtain a processed block value, wherein the formula is as follows:
Figure GDA0002366442650000071
in the formula, #1、ψ2、ψ3、ψ4Is the processed block value; biIs a corresponding data stream; j is an indication quantity, j belongs to {1, 2., 256 };
s4-4: obtaining an initial condition value and a control variable of the chaotic image according to the processed block value;
the calculation formula of the initial condition value of the chaotic image is as follows:
xo=(ψ12)mod1
in the formula, xoAs a chaotic imageAn initial condition value of; psi1、ψ2Is the processed block value; mod is a modulo operation;
the calculation formula of the control variable is as follows:
p=3.999+(((ψ34)mod1)×0.001)
wherein p is a control variable; psi3、ψ4Is the processed block value; mod is a modulo operation;
s4-5: according to the initial condition value and the control variable of the chaotic image, iteration is carried out by using the logic mapping enhanced by the pseudo-random to obtain a chaotic sequence S ═ S1,s2,...,sMN};
The formula for the calculation of the pseudo-randomly enhanced logical mapping is:
xi+1=((pxi(1-xi))100000)mod1
in the formula, xi+1The next generation chaotic image condition value; x is the number ofiThe current chaotic image condition value; p is a control variable; mod is a modulo operation; i is an indication quantity, i belongs to {1, 2., MN };
s4-6: converting the chaotic sequence into a digital sequence, and obtaining a key matrix according to the digital sequence;
Figure GDA0002366442650000081
in the formula, kiIs a digital sequence of pixels, and kiE.g. K, wherein K is a key matrix; siIs a corresponding chaotic sequence; i is an indication quantity, i belongs to {1, 2., MN };
s5: according to the use of the initial condition value and the control variable of the chaotic image, a new chaotic image condition value is obtained by direct logic mapping, and the calculation formula is as follows:
xi+1=pxi(1-xi)
in the formula, xi+1The next generation chaotic image condition value; x is the number ofiThe current chaotic image condition value; p is a control variable; i is an indication quantity, i belongs to {1, 2.., M };
s6: obtaining a constant value by rounding down according to the current chaotic image condition value;
the calculation formula for the constant values is:
R=floor(xM×8)+1
in the formula, R is a current constant value; floor (·) is a downward rounding operation; x is the number ofMThe current chaotic image condition value;
s7: selecting a DNA coding rule corresponding to the current constant value and coding all pixels on all lines of the image;
s8: obtaining a DNA sequence of a displacement image matrix;
s9: repeating the steps S5 to S7 according to the key matrix to obtain a DNA sequence of the key matrix;
s10: repeating the step S5 to obtain the chaotic image condition value xMPerforming DNA linear operation to obtain a linear parameter Y, wherein the calculation formula of the linear parameter Y is as follows:
Y=floor(xM×3)+1
in the formula, floor (·) is a downward rounding operation; x is the number ofMThe current chaotic image condition value;
s11: according to the DNA sequence of the displaced image matrix and the DNA sequence of the key matrix, the DNA sequence of the password image is obtained by using the DNA linear operation corresponding to the linear parameter Y, and the calculation formula is as follows:
Figure GDA0002366442650000091
in the formula, QδA DNA sequence that is a cryptographic image; l'δIs a DNA sequence of a displaced image matrix; kδDNA sequences that are key matrices;
Figure GDA0002366442650000092
linear manipulation for arbitrarily selected DNA;
s12: repeating steps S5 to S6, selecting a DNA encryption rule corresponding to the current constant value;
s13: and encrypting each line of the DNA sequence of the password image according to the DNA encryption rule to obtain the password image, thereby realizing image encryption.
And (3) analyzing experimental data:
the histogram obtained by the traditional encryption method is shown in fig. 3, which highly reflects the size of information contained in each pixel point, and the histogram obtained by the encryption method of the scheme is shown in fig. 4, and the chaos degree (i.e. the degree of containing information) of each part is the same, so that an attacker is more difficult to obtain information in an image, i.e. the histogram has strong impact resistance and high safety.
Comparing the pixel correlation between the encrypted image and the normal image in the present scheme, as shown in fig. 5, the correlation is almost disappeared in the encrypted image, which shows that our scheme is also very resistant to data attack.
As shown in fig. 6, comparing the noise immunity of the present scheme with that of the prior art, it can be seen that the encryption method not only has a great improvement in encryption effect and stability, but also has better performance in noise immunity, compared with the prior art.
The image encryption method based on chaos pseudorandom DNA enhancement, which is provided by the invention and combines chaos with DNA coding, has high efficiency, high safety and strong practicability, improves the encryption effect, and solves the problems of low efficiency, insecurity and unavailability in the prior art.

Claims (7)

1. An image encryption method based on chaos pseudorandom DNA enhancement is characterized by comprising the following steps:
s1: acquiring a common image and a displacer, and obtaining the dimensionality of the common image;
s2: obtaining a random permutation sequence by using a permutation sub and a random permutation function according to the dimensionality of the common image;
s3: carrying out random replacement on pixels in the image according to the random replacement sequence to obtain a random replacement image matrix;
s4: generating an initial condition value and a control variable of the chaotic image by using a hash function according to the random permutation image matrix, and generating a key matrix by using pseudo-random enhanced logic mapping;
in step S4, the method for generating a key matrix includes the following steps:
s4-1: executing a hash function SHA-256 on the replacement image matrix to obtain a 64-bit 16-system data string;
s4-2: converting the 16-system data string into a 256-bit data stream;
s4-3: respectively putting the data streams into 4 64-bit different blocks, and processing each block to obtain a processed block value, wherein the formula is as follows:
Figure FDA0002366442640000011
in the formula, #1、ψ2、ψ3、ψ4Is the processed block value; biIs a corresponding data stream; j is an indication quantity, j belongs to {1, 2., 256 };
s4-4: obtaining an initial condition value and a control variable of the chaotic image according to the processed block value;
the calculation formula of the initial condition value of the chaotic image is as follows:
xo=(ψ12)mod 1
in the formula, xoThe initial condition value of the chaotic image is obtained; psi1、ψ2Is the processed block value; mod is a modulo operation;
the calculation formula of the control variable is as follows:
p=3.999+(((ψ34)mod1)×0.001)
wherein p is a control variable; psi3、ψ4Is the processed block value; mod is a modulo operation;
s4-5: according to the initial condition value and the control variable of the chaotic image, iteration is carried out by using pseudo-random enhanced logic mapping to obtain a chaotic sequence;
the formula for the calculation of the pseudo-randomly enhanced logical mapping is:
xi+1=((pxi(1-xi))100000)mod1
in the formula, xi+1The next generation chaotic image condition value; x is the number ofiIs as followsA pre-chaotic image condition value; p is a control variable; mod is a modulo operation; i is an indication quantity, i belongs to {1, 2., MN };
s4-6: converting the chaotic sequence into a digital sequence, and obtaining a key matrix according to the digital sequence;
Figure FDA0002366442640000021
in the formula, kiIs a digital sequence of pixels, and kiE.g. K, wherein K is a key matrix; siIs a corresponding chaotic sequence; i is an indication quantity, i belongs to {1, 2., MN }; s5: obtaining a new chaotic image condition value by using direct logic mapping according to the chaotic image initial condition value and the control variable;
s6: obtaining a constant value by rounding down according to the current chaotic image condition value;
s7: selecting a DNA coding rule corresponding to the current constant value and coding all pixels on all lines of the image;
s8: obtaining a DNA sequence of a displacement image matrix;
s9: repeating the steps S5 to S7 according to the key matrix to obtain a DNA sequence of the key matrix;
s10: repeating the step S5, and performing DNA linear operation on the chaotic image condition value to obtain linear parameters;
s11: according to the DNA sequence of the displaced image matrix and the DNA sequence of the key matrix, using the DNA linear operation corresponding to the linear parameters to obtain the DNA sequence of the password image;
s12: repeating steps S5 to S6, selecting a DNA encryption rule corresponding to the current constant value;
s13: and encrypting each line of the DNA sequence of the password image according to the DNA encryption rule to obtain the password image, thereby realizing image encryption.
2. The image encryption method based on chaos pseudo-random DNA enhancement as claimed in claim 1, wherein in step S2, the formula of random permutation sequence is:
O=randperm(M×N)
wherein O is a random permutation order; randderm (·) is a random permutation order function; m and N are the dimensions of the common image.
3. The image encryption method based on chaos pseudo-random DNA enhancement as claimed in claim 1, wherein in step S3, the formula of the permutation image matrix is:
I'=reshape(I(O),M,N)
in the formula, I' is a permutation image matrix; i is an input common image; reshape (·) is a permuted image matrix function; o is a random permutation order; m and N are the dimensions of the common image.
4. The image encryption method based on chaos pseudo-random DNA enhancement according to claim 1, wherein in step S5, a new chaos image condition value is obtained by using direct logic mapping, and the calculation formula is:
xi+1=pxi(1-xi)
in the formula, xi+1The next generation chaotic image condition value; x is the number ofiThe current chaotic image condition value; p is a control variable; i is an indicator quantity, i ∈ {1,2,. multidot.m }.
5. The image encryption method based on chaos pseudo-random DNA enhancement according to claim 1, wherein in step S6, the calculation formula of the constant value is:
R=floor(xM×8)+1
in the formula, R is a current constant value; floor (·) is a downward rounding operation; x is the number ofMIs the current chaotic image condition value.
6. The image encryption method based on chaos pseudo-random DNA enhancement according to claim 1, wherein in step S10, DNA linear operation is performed on the chaos image condition value, and the calculation formula of the linear parameter is:
Y=floor(xM×3)+1
in which Y is a linear parameter, flor (-) is a round-down operation; x is the number ofMIs the current chaotic image condition value.
7. The image encryption method based on chaos pseudo-random DNA enhancement as claimed in claim 1, wherein in step S11, the calculation formula of the DNA sequence of the password image is:
Qδ=l'δ⊕Kδ
in the formula, QδA DNA sequence that is a cryptographic image; l'δIs a DNA sequence of a displaced image matrix; kδDNA sequence of key matrix ⊕ is the linear operation of arbitrarily chosen DNA.
CN201810933328.7A 2018-08-16 2018-08-16 Image encryption method based on chaos pseudorandom DNA enhancement Expired - Fee Related CN109214972B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810933328.7A CN109214972B (en) 2018-08-16 2018-08-16 Image encryption method based on chaos pseudorandom DNA enhancement

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810933328.7A CN109214972B (en) 2018-08-16 2018-08-16 Image encryption method based on chaos pseudorandom DNA enhancement

Publications (2)

Publication Number Publication Date
CN109214972A CN109214972A (en) 2019-01-15
CN109214972B true CN109214972B (en) 2020-04-14

Family

ID=64988330

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810933328.7A Expired - Fee Related CN109214972B (en) 2018-08-16 2018-08-16 Image encryption method based on chaos pseudorandom DNA enhancement

Country Status (1)

Country Link
CN (1) CN109214972B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110502907A (en) * 2019-07-22 2019-11-26 西安理工大学 A kind of image encryption method based on genetic algorithm
CN110969564B (en) * 2019-11-29 2020-11-24 珠海大横琴科技发展有限公司 Image encryption method and device, electronic equipment and readable storage medium
CN111832052B (en) * 2020-07-13 2024-02-20 江西财经大学 Unequal image encryption method based on significance detection
CN113722746B (en) * 2021-10-29 2022-02-18 广东安恒电力科技有限公司 Chaos encryption method and system for cable construction drawing

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103473733A (en) * 2013-09-12 2013-12-25 东北林业大学 Image encryption algorithm based on DNA encoding and chaotic mapping
CN105046161A (en) * 2015-07-29 2015-11-11 河南大学 DNA dynamic coding based colored image encryption method
CN107067359A (en) * 2016-06-08 2017-08-18 电子科技大学 Contourlet area image sharing methods based on Brownian movement and DNA encoding
CN107657579A (en) * 2017-09-19 2018-02-02 中国矿业大学 Image encryption method based on DNA encoding and chaos

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103473733A (en) * 2013-09-12 2013-12-25 东北林业大学 Image encryption algorithm based on DNA encoding and chaotic mapping
CN105046161A (en) * 2015-07-29 2015-11-11 河南大学 DNA dynamic coding based colored image encryption method
CN107067359A (en) * 2016-06-08 2017-08-18 电子科技大学 Contourlet area image sharing methods based on Brownian movement and DNA encoding
CN107657579A (en) * 2017-09-19 2018-02-02 中国矿业大学 Image encryption method based on DNA encoding and chaos

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
An image cryptosystem based on pseudorandomly enhanced chaotic DNA and random permutation enhanced chaotic DNA and random permutation;Joshua C. Dagadu 等;《Multimedia Tools and Applications》;20190516;第78卷(第17期);24979-25000 *
Chaotic Medical Image Encryption Based on Arnold Transformation and Pseudorandomly Enhanced Logistic Map;Joshua C. Dagadu 等;《Journal of Multidisciplinary Engineering Science and Technology》;20170930;第4卷(第9期);8096-8102 *

Also Published As

Publication number Publication date
CN109214972A (en) 2019-01-15

Similar Documents

Publication Publication Date Title
CN109214972B (en) Image encryption method based on chaos pseudorandom DNA enhancement
CN113225449B (en) Image encryption method based on chaos sequence and DNA coding
AU702766B2 (en) A non-deterministic public key encryption system
CN109889686B (en) Image encryption method based on H fractal structure and dynamic self-reversible matrix
Liu et al. Color image encryption using three-dimensional sine ICMIC modulation map and DNA sequence operations
CN108712256B (en) Encryption and decryption algorithm based on elliptic curve subdomain subcodes
CN103761702A (en) Image hiding and authentication method based on secret sharing
CN110086600B (en) Image encryption method based on hyperchaotic system and variable step length Joseph problem
CN114549266B (en) Image encryption method based on DNA replacement rule and chaotic system
Liu et al. Cryptanalysis and enhancement of an image encryption scheme based on bit-plane extraction and multiple chaotic maps
Alsaffar et al. An encryption based on DNA and AES algorithms for hiding a compressed text in colored Image
CN112769545B (en) Image encryption method based on adjacent pixel Joseph transformation and Mealy state machine
CN109242751B (en) Image encryption method based on chaotic tent mapping and DNA decoding
JP2003535362A (en) Decryption of cryptographic polynomial
Romeo et al. Cryptosystem architectures for very high throughput multimedia encryption: the RPK solution
CN105678677B (en) Image encryption method based on hash function and insertion-case-deleted models
Wu et al. A compound chaos-based encryption algorithm for vector geographic data under network circumstance
CN114710264A (en) Physical layer encryption and decryption method and system based on Spinal code
Katti et al. On the security of key-based interval splitting arithmetic coding with respect to message indistinguishability
Soleymani et al. A binary grouping approach for image encryption based on elliptic curves over prime group field
Yassir et al. Hybrid Image Encryption Technique for Securing Color Images Transmitted Over Cloud Networks.
CN114244552B (en) Data encryption transmission method and device based on block chain
Hisbullah et al. Hybrid Encryption Based on Fernet and Rivest Shamir Adleman (RSA)
Das et al. Statistical Cryptanalysis of ElGamal Cryptosystem for measuring security in disruptive technology
CN117114959B (en) Image encryption method based on key feedback mechanism of multi-parameter one-dimensional chaotic system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200414

Termination date: 20210816