CN109242751B - Image encryption method based on chaotic tent mapping and DNA decoding - Google Patents
Image encryption method based on chaotic tent mapping and DNA decoding Download PDFInfo
- Publication number
- CN109242751B CN109242751B CN201810933329.1A CN201810933329A CN109242751B CN 109242751 B CN109242751 B CN 109242751B CN 201810933329 A CN201810933329 A CN 201810933329A CN 109242751 B CN109242751 B CN 109242751B
- Authority
- CN
- China
- Prior art keywords
- image
- chaotic
- value
- dna
- formula
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T9/00—Image coding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/001—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Storage Device Security (AREA)
- Measuring Or Testing Involving Enzymes Or Micro-Organisms (AREA)
Abstract
The invention discloses an image encryption method based on chaotic tent mapping and DNA decoding, which comprises the following steps: s1, acquiring an ASCII sequence, a tent map and parameters of the common image, and obtaining the dimensionality of the common image; s2, generating a key image and a chaotic image initial condition value by using chaotic tent mapping; s3, obtaining a new chaotic image condition value by using logic mapping; s4, rounding down to obtain a constant value; s5, selecting a DNA coding rule; s6, obtaining a DNA sequence of the common image; s7, obtaining a DNA sequence of the key image; s8, selecting DNA algebra operation; s9, obtaining a DNA sequence of the semi-password image by using DNA algebraic operation; s10, selecting a DNA decoding rule; s11, carrying out DNA decoding according to the DNA decoding rule to obtain a password image; the invention solves the problems of low safety and practicability and direct generation of the secret key in the prior art.
Description
Technical Field
The invention belongs to the technical field of image encryption, and particularly relates to an image encryption method based on chaotic tent mapping and DNA decoding.
Background
Chaos in combination with DNA coding for image encryption has attracted considerable interest in recent years because it has proven to provide powerful image ciphers. The DNA coding is widely applied to chaotic systems in recent years due to the characteristics of large storage capacity, good parallelism and low power consumption. For example, an encryption algorithm combining DNA sequence manipulation and chaotic mapping has recently been proposed as part of a cross-receive system for medical image security, using 1D logical mapping to select DNA encoding and decoding rules, and PWLCM for pixel scrambling. Chaotic tent mapping is an image cryptosystem developed in recent years. In the proposed cryptosystem, the chaotic sequence is mixed with the ordinary image pixels and directly applied to the ordinary image to generate the cryptoimage.
The prior art has the following problems:
(1) in the system of the chaos sequence and the common image pixel in the prior art, once an attacker knows the initial conditions and the control parameters, the attacker can easily recognize important information in the chaos sequence and the common image pixel is low in safety and practicability.
(2) Furthermore, some of the drawbacks found in most low-dimensional chaos based schemes are the direct generation of keys.
Disclosure of Invention
Aiming at the defects in the prior art, the chaos tent mapping and DNA decoding-based image encryption method provided by the invention has high safety and practicability, can randomly generate the key image, can resist statistical attack and has strong anti-noise attack capability, and solves the problems of low safety and practicability and direct generation of the key in the prior art.
In order to achieve the purpose of the invention, the invention adopts the technical scheme that:
an image encryption method based on chaotic tent mapping and DNA decoding comprises the following steps:
s1: acquiring a 16-bit ASCII sequence, a tent map and parameters of the common image, and obtaining the dimensionality of the common image;
s2: generating a key image and a chaotic image initial condition value by using chaotic tent mapping according to the dimensionality of a common image, an ASCII sequence and a tent map;
s3: obtaining a new chaotic image condition value by using logic mapping according to the chaotic image initial condition value and the tent map parameter;
s4: obtaining a constant value by rounding down according to the current chaotic image condition value;
s5: selecting a DNA coding rule corresponding to the current constant value and coding all pixels on all lines of the image;
s6: obtaining a DNA sequence of a common image;
s7: repeating the steps S3 to S5 according to the key image to obtain a DNA sequence of the key image;
s8: repeating the steps S3 to S4, and selecting a DNA algebraic operation corresponding to the current constant value;
s9: obtaining a DNA sequence of the semi-password image by using DNA algebraic operation according to the DNA sequence of the common image and the DNA sequence of the key image;
s10: repeating steps S3 to S5, selecting a DNA decoding rule corresponding to the current constant value;
s11: and performing DNA decoding on each line of the DNA sequence of the password image according to the DNA decoding rule to obtain the password image, thereby realizing image encryption.
Further, in step S2, the method for generating the key image and the chaotic image initial condition value using the chaotic tent map includes the following steps:
s2-1: converting the first eight characters of the ASCII sequence into a 16-system form, and converting the last eight characters into a 64-system form;
s2-2: processing the value in the 16-system form to obtain a first chaotic image value, wherein the formula is as follows:
in the formula, xaIs a first chaotic image value; h isqA value in 16-ary form; q is an indicated amount;
s2-3: processing the value in the 64-system form to obtain a second chaotic image value, wherein the formula is as follows:
in the formula, xbIs a second chaotic image value; bpA value in 16-ary form; p is an indicated amount;
s2-4: obtaining an initial condition value of the chaotic image according to the first chaotic image value and the second chaotic image value, wherein the formula is as follows:
x0=(xa+xb)mod 1
in the formula, x0The initial condition value of the chaotic image is obtained; x is the number ofaIs a first chaotic image value; x is the number ofbIs a second chaotic image value; mod is a modulo operation;
s2-5: according to the initial condition value of the chaotic image and the tent map, using the chaotic tent map to carry out iteration to generate a chaotic sequence X ═ { X ═ X1,x2,...,xMNThe chaotic tent mapping formula is:
in the formula, xi+1The next generation chaotic image condition value; x is the number ofiThe image is a current chaotic image condition value, r is a tent map, i is an indicating quantity, i ∈ {1, 2.., MN }, and M and N are dimensions of a common image;
s2-6: generating a chaotic key image according to the chaotic sequence, wherein a calculation formula is as follows:
in the formula, kiIs a key image factor, and ki∈ K, K being a key image, xiIs the current chaotic image condition value, and xi∈ X, X is the chaotic sequence and mod is the modulo operation.
Further, in step S3, a new chaotic image condition value is obtained by using logical mapping, and the calculation formula is:
xi+1=uxi(1-xi)
in the formula, xi+1The next generation chaotic image condition value; x is the number ofiIs the current chaotic image condition value, u is a tent map parameter, i is an indicating quantity, i ∈ {1, 2.
Further, in step S4, a constant value is obtained by rounding down the current chaotic image condition value, and the calculation formula is:
Z=floor(xM×7)+1
in the formula, Z is a current constant value; floor (·) is a downward rounding operation; x is the number ofMIs the current chaotic image condition value.
Further, in step S8, the calculation formula of the constant value is:
Y=floor(xM×3)+1
in the formula, Y is a current constant value corresponding to the selected DNA algebraic operation; floor (·) is a downward rounding operation; x is the number ofMIs the current chaotic image condition value.
Further, in step S9, the calculation formula of the DNA sequence of the half-cipher image is:
in the formula, I' is a DNA sequence of a semi-password image; lδA DNA sequence that is a generic image; kδA DNA sequence that is a key image;is an algebraic operation of the DNA selected arbitrarily.
The beneficial effect of this scheme does:
(1) pixels in the password image are uniformly distributed, and an attacker can hardly recognize any meaningful information in the password image because the password image cannot recognize the mode of the password image, so that the safety and the practicability are improved;
(2) the key image is randomly generated, so that the direct generation of the key image is avoided, and the safety is further improved;
(3) the password image of the scheme destroys the correlation between adjacent pixels, has enough oppressiveness and enough robustness to statistical attack, and can resist the statistical attack;
(4) the scheme can recover the image after the noise attack and has the capability of resisting the noise attack.
Drawings
FIG. 1 is a flow chart of an image encryption method based on chaotic tent mapping and DNA decoding;
FIG. 2 is a flow chart of generating a key image and chaotic image initial condition values using chaotic tent mapping;
FIG. 3 is a graph of the results of histogram analysis;
FIG. 4 is a comparison graph of pixel correlation of pepper test images;
FIG. 5 is a comparison graph of the correlation of pixels in a Lena test image;
FIG. 6 is a diagram of the results of decrypting an image after introducing Gaussian noise;
fig. 7 is a diagram of the results of decrypting an image after introduction of salt and pepper noise.
Detailed Description
The following description of the embodiments of the present invention is provided to facilitate the understanding of the present invention by those skilled in the art, but it should be understood that the present invention is not limited to the scope of the embodiments, and it will be apparent to those skilled in the art that various changes may be made without departing from the spirit and scope of the invention as defined and defined in the appended claims, and all matters produced by the invention using the inventive concept are protected.
In the embodiment of the invention, an image encryption method based on chaotic tent mapping and DNA decoding comprises the following steps:
s1: acquiring a 16-bit ASCII sequence, a tent map and parameters of the common image, and obtaining the dimensionality of the common image;
s2: generating a key image and an initial condition value of the chaotic image by using chaotic tent mapping according to the dimensionality of a common image, an ASCII sequence and a tent map, and comprising the following steps of:
s2-1: converting the first eight characters of the ASCII sequence into a 16-system form, and converting the last eight characters into a 64-system form;
s2-2: processing the value in the 16-system form to obtain a first chaotic image value, wherein the formula is as follows:
in the formula, xaIs a first chaotic image value; h isqA value in 16-ary form; q is an indicated amount;
s2-3: processing the value in the 64-system form to obtain a second chaotic image value, wherein the formula is as follows:
in the formula, xbIs a second chaotic image value; bpA value in 16-ary form; p is an indicated amount;
s2-4: obtaining an initial condition value of the chaotic image according to the first chaotic image value and the second chaotic image value, wherein the formula is as follows:
x0=(xa+xb)mod 1
in the formula, x0The initial condition value of the chaotic image is obtained; x is the number ofaIs a first chaotic image value; x is the number ofbIs a second chaotic image value; mod is a modulo operation;
s2-5: according to the initial condition value of the chaotic image and the tent map, performing iteration by using chaotic tent mapping to generate a chaotic sequence, wherein the chaotic tent mapping formula is as follows:
in the formula, xi+1The next generation chaotic image condition value; x is the number ofiThe image is a current chaotic image condition value, r is a tent map, i is an indicating quantity, i ∈ {1, 2.., MN }, and M and N are dimensions of a common image;
s2-6: generating a chaotic key image according to the chaotic sequence, wherein a calculation formula is as follows:
in the formula, kiIs a key image factor, and ki∈ K, K being a key image, xiIs the current chaotic image condition value, and xi∈ X, X is the chaos sequence, mod is the modulus operation;
s3: obtaining a new chaotic image condition value by using logic mapping according to the chaotic image initial condition value and the tent map parameter, wherein the calculation formula is as follows:
xi+1=uxi(1-xi)
in the formula, xi+1The next generation chaotic image condition value; x is the number ofiThe image is a current chaotic image condition value, u is a tent map parameter, i is an indication quantity, i ∈ {1, 2., M };
s4: obtaining a constant value by rounding down according to the current chaotic image condition value, wherein the current chaotic image condition value comprises a chaotic image condition value corresponding to a common image and a chaotic image condition value corresponding to a key image, and the calculation formula is as follows:
Z=floor(xM×7)+1
in the formula, Z is a current constant value; floor (·) is a downward rounding operation; x is the number ofMThe current chaotic image condition value;
s5: selecting a DNA coding rule corresponding to the current constant value and coding all pixels on all lines of the image;
s6: obtaining a DNA sequence of a common image;
s7: repeating the steps S3 to S5 according to the key image to obtain a DNA sequence of the key image;
s8: repeating steps S3 to S4, and selecting a DNA algebra operation corresponding to the current constant value, wherein the calculation formula of the constant value is as follows:
Y=floor(xM×3)+1
wherein Y is the current norm corresponding to the selected DNA algebra operationA numerical value; floor (·) is a downward rounding operation; x is the number ofMThe current chaotic image condition value;
s9: obtaining the DNA sequence of the semi-password image by using DNA algebraic operation according to the DNA sequence of the common image and the DNA sequence of the key image, wherein the calculation formula is as follows:
in the formula, I' is a DNA sequence of a semi-password image; lδA DNA sequence that is a generic image; kδA DNA sequence that is a key image;algebraically operating for arbitrarily selected DNA;
s10: repeating steps S3 to S5, selecting a DNA decoding rule corresponding to the current constant value;
s11: and performing DNA decoding on each line of the DNA sequence of the password image according to the DNA decoding rule to obtain the password image, thereby realizing image encryption.
And (3) analyzing experimental data:
a robust image encryption scheme will produce a cryptographic image with a uniform histogram distribution. The results of the histogram analysis are shown in fig. 3 (a) and (b), and it is apparent from the figure that the proposed encryption scheme uniformly distributes pixels in the password image. Since the pattern is not seen in the histogram of the password image, it is difficult for an attacker to recognize any meaningful information therein. It can be concluded that: the scheme provides sufficient resistance to statistical attacks.
Two thousand pairs of adjacent pixels are randomly selected from an original image and an encrypted image, and the horizontal, vertical and diagonal correlation coefficients of the pixels are calculated, fig. 4 and 5 show the correlation graphs of two test images, namely pepper (512 × 512) and Lena (256 × 256), and as is obvious from the correlation coefficient table of the common image and the password image in table 1, the scheme sufficiently destroys the correlation between the adjacent pixels, so that the scheme has enough oppressibility to statistical attacks, has enough robustness and can resist the statistical attacks.
TABLE 1
The cryptographic image is subjected to various noises during transmission, which may cause difficulties in decryption and restoration of the image. Two different levels of noise (gaussian noise, salt and pepper noise) are introduced into the cryptographic image before decryption. Fig. 6, 7 and table 2 noise impact comparison tables show the results of decrypting images after different degrees of noise introduction. As can be seen from the figure, the proposed scheme is still able to recover the image after a noise attack, and thus has the ability to resist noise attacks.
TABLE 2
The image encryption method based on chaotic tent mapping and DNA decoding, which is provided by the invention, has high safety and practicability, random generation of key images, and strong capability of resisting statistical attack and anti-noise attack, solves the problems of low safety and practicability and direct generation of keys in the prior art.
Claims (5)
1. An image encryption method based on chaotic tent mapping and DNA decoding is characterized by comprising the following steps:
s1: acquiring a 16-bit ASCII sequence, a tent map and parameters of the common image, and obtaining the dimensionality of the common image;
s2: generating a key image and a chaotic image initial condition value by using chaotic tent mapping according to the dimensionality of a common image, an ASCII sequence and a tent map;
in step S2, the method for generating the key image and the chaotic image initial condition value using the chaotic tent map includes the following steps:
s2-1: converting the first eight characters of the ASCII sequence into a 16-system form, and converting the last eight characters into a 64-system form;
s2-2: processing the value in the 16-system form to obtain a first chaotic image value, wherein the formula is as follows:
in the formula, xaIs a first chaotic image value; h isqA value in 16-ary form; q is an indicated amount;
s2-3: processing the value in the 64-system form to obtain a second chaotic image value, wherein the formula is as follows:
in the formula, xbIs a second chaotic image value; bpA value in 16-ary form; p is an indicated amount;
s2-4: obtaining an initial condition value of the chaotic image according to the first chaotic image value and the second chaotic image value, wherein the formula is as follows:
x0=(xa+xb)mod1
in the formula, x0The initial condition value of the chaotic image is obtained; x is the number ofaIs a first chaotic image value; x is the number ofbIs a second chaotic image value; mod is a modulo operation;
s2-5: according to the initial condition value of the chaotic image and the tent map, performing iteration by using chaotic tent mapping to generate a chaotic sequence, wherein the chaotic tent mapping formula is as follows:
in the formula, xi+1The next generation chaotic image condition value; x is the number ofiThe image is a current chaotic image condition value, r is a tent map, i is an indicating quantity, i ∈ {1, 2.., MN }, and M and N are dimensions of a common image;
s2-6: generating a chaotic key image according to the chaotic sequence, wherein a calculation formula is as follows:
in the formula, kiIs a key image factor, and ki∈ K, K being a key image, xiIs the current chaotic image condition value, and xi∈ X, X is the chaos sequence, mod is the modulus operation;
s3: obtaining a new chaotic image condition value by using logic mapping according to the chaotic image initial condition value and the tent map parameter;
s4: obtaining a constant value by rounding down according to the current chaotic image condition value;
s5: selecting a DNA coding rule corresponding to the current constant value and coding all pixels on all lines of the image;
s6: obtaining a DNA sequence of a common image;
s7: repeating the steps S3 to S5 according to the key image to obtain a DNA sequence of the key image;
s8: repeating the steps S3 to S4, and selecting a DNA algebraic operation corresponding to the current constant value;
s9: obtaining a DNA sequence of the semi-password image by using DNA algebraic operation according to the DNA sequence of the common image and the DNA sequence of the key image;
s10: repeating steps S3 to S5, selecting a DNA decoding rule corresponding to the current constant value;
s11: and performing DNA decoding on each line of the DNA sequence of the password image according to the DNA decoding rule to obtain the password image, thereby realizing image encryption.
2. The image encryption method based on chaotic tent mapping and DNA decoding of claim 1, wherein in step S3, a new chaotic image condition value is obtained using logical mapping, and the calculation formula is:
xi+1=uxi(1-xi)
in the formula, xi+1The next generation chaotic image condition value; x is the number ofiIs the current chaotic image condition value, u is a tent map parameter, i is an indicating quantity, i ∈ {1, 2.
3. The image encryption method based on chaotic tent mapping and DNA decoding of claim 1, wherein in step S4, a constant value is obtained by rounding down according to the current chaotic image condition value, and the calculation formula is:
Z=floor(xM×7)+1
in the formula, Z is a current constant value; floor (·) is a downward rounding operation; x is the number ofMIs the current chaotic image condition value.
4. The image encryption method based on chaotic tent mapping and DNA decoding as claimed in claim 1, wherein in step S8, the constant value is calculated as:
Y=floor(xM×3)+1
in the formula, Y is a current constant value corresponding to the selected DNA algebraic operation; floor (·) is a downward rounding operation; x is the number ofMIs the current chaotic image condition value.
5. The image encryption method based on chaotic tent mapping and DNA decoding of claim 1, wherein in step S9, the calculation formula of the DNA sequence of the semi-cipher image is:
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810933329.1A CN109242751B (en) | 2018-08-16 | 2018-08-16 | Image encryption method based on chaotic tent mapping and DNA decoding |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810933329.1A CN109242751B (en) | 2018-08-16 | 2018-08-16 | Image encryption method based on chaotic tent mapping and DNA decoding |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109242751A CN109242751A (en) | 2019-01-18 |
CN109242751B true CN109242751B (en) | 2020-06-30 |
Family
ID=65070446
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810933329.1A Expired - Fee Related CN109242751B (en) | 2018-08-16 | 2018-08-16 | Image encryption method based on chaotic tent mapping and DNA decoding |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109242751B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111294481B (en) * | 2020-01-14 | 2021-06-22 | 河南大学 | Image encryption method based on self-updating transformation, double random three-dimensional matrix scrambling and DNA calculation |
CN111984978B (en) * | 2020-08-13 | 2022-11-29 | 成都安恒信息技术有限公司 | High-expansibility password encryption storage method |
CN116455546B (en) * | 2022-12-09 | 2023-10-10 | 兰州交通大学 | Vector map DNA dynamic coding encryption method considering global element |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6094483A (en) * | 1997-08-06 | 2000-07-25 | Research Foundation Of State University Of New York | Secure encryption and hiding of data and messages in images |
CN101706946A (en) * | 2009-11-26 | 2010-05-12 | 大连大学 | Digital image encryption method based on DNA sequence and multi-chaotic mapping |
CN107659752A (en) * | 2017-09-19 | 2018-02-02 | 中国矿业大学 | More image encryption methods based on DNA encoding and chaos |
-
2018
- 2018-08-16 CN CN201810933329.1A patent/CN109242751B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6094483A (en) * | 1997-08-06 | 2000-07-25 | Research Foundation Of State University Of New York | Secure encryption and hiding of data and messages in images |
CN101706946A (en) * | 2009-11-26 | 2010-05-12 | 大连大学 | Digital image encryption method based on DNA sequence and multi-chaotic mapping |
CN107659752A (en) * | 2017-09-19 | 2018-02-02 | 中国矿业大学 | More image encryption methods based on DNA encoding and chaos |
Non-Patent Citations (2)
Title |
---|
Chaos-Based color image encryption and compression scheme using DNA complementary rule and Chinese remainder theorem;Guo L 等;《International Computer Conference on Wavelet Active Media Technology & Information Processing》;20161218;第208-212页 * |
基于混沌映射和DNA编码的图像加密算法;梁涛 等;《计算机工程》;20140630;第40卷(第6期);第70-74页 * |
Also Published As
Publication number | Publication date |
---|---|
CN109242751A (en) | 2019-01-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hua et al. | Image encryption using Josephus problem and filtering diffusion | |
CN108898025B (en) | Chaotic image encryption method based on double scrambling and DNA coding | |
Mirzaei et al. | A new image encryption method: parallel sub-image encryption with hyper chaos | |
CN109889686B (en) | Image encryption method based on H fractal structure and dynamic self-reversible matrix | |
CN107094072B (en) | Mixed chaotic encryption method based on generalized Henon mapping | |
CN107220923B (en) | Digital picture feedback encryption method based on image network | |
Abraham et al. | Secure image encryption algorithms: A review | |
CN108122188B (en) | Image encryption method | |
CN107292184B (en) | Image encryption method, device and key stream generating method and key stream generator | |
CN102982499A (en) | Color image encryption and decryption method based on multiple-fractional-order chaotic systems | |
CN109242751B (en) | Image encryption method based on chaotic tent mapping and DNA decoding | |
CN112769545B (en) | Image encryption method based on adjacent pixel Joseph transformation and Mealy state machine | |
Liu et al. | Cryptanalysis and enhancement of an image encryption scheme based on bit-plane extraction and multiple chaotic maps | |
CN114579993A (en) | Image encryption method based on quantum key distribution and pixel scrambling | |
Slimane et al. | An efficient nested chaotic image encryption algorithm based on DNA sequence | |
CN117499005A (en) | Image encryption method based on 4D chaotic system | |
Sun et al. | A new hyperchaotic image encryption algorithm based on stochastic signals | |
CN104050617A (en) | Method for image encryption based on Liu chaotic system | |
CN104680475A (en) | Image hybrid encrypting method based on hyperchaotic system | |
Sabery et al. | A new approach for image encryption using chaotic logistic map | |
Slimane et al. | Nested chaotic image encryption scheme using two-diffusion process and the Secure Hash Algorithm SHA-1 | |
CN113076551B (en) | Color image encryption method based on lifting scheme and cross-component scrambling | |
Patro et al. | Novel data encryption scheme using DNA computing | |
CN114374775A (en) | Image encryption method based on Julia set and DNA coding | |
CN116886270B (en) | Three-band encryption method based on national encryption algorithm and double-chaotic system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20200630 Termination date: 20210816 |