CN109391463A - A kind of image encryption, decryption method, equipment and computer readable storage medium - Google Patents

A kind of image encryption, decryption method, equipment and computer readable storage medium Download PDF

Info

Publication number
CN109391463A
CN109391463A CN201710672751.1A CN201710672751A CN109391463A CN 109391463 A CN109391463 A CN 109391463A CN 201710672751 A CN201710672751 A CN 201710672751A CN 109391463 A CN109391463 A CN 109391463A
Authority
CN
China
Prior art keywords
image
chaos
encrypted
ciphering sequence
mentioned
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710672751.1A
Other languages
Chinese (zh)
Inventor
师东海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sanechips Technology Co Ltd
Shenzhen ZTE Microelectronics Technology Co Ltd
Original Assignee
Shenzhen ZTE Microelectronics Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen ZTE Microelectronics Technology Co Ltd filed Critical Shenzhen ZTE Microelectronics Technology Co Ltd
Priority to CN201710672751.1A priority Critical patent/CN109391463A/en
Publication of CN109391463A publication Critical patent/CN109391463A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T9/00Image coding

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Facsimile Transmission Control (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses a kind of image encryption methods, this method comprises: setting initial key;Simplify system using preset chaos and the initial key is generated into M ciphering sequence according to preset iterative strategy;Wherein, it is the obtained state equation after carrying out dimension-reduction treatment to complex field chaos system that the chaos, which simplifies system,;M is the state variable number that the chaos simplifies system;Encrypting plaintext image is treated using above-mentioned M ciphering sequence to be encrypted, and encrypted ciphertext image is obtained.The embodiment of the present invention also discloses a kind of image decryption method and image encryption, decryption device and computer readable storage medium simultaneously.

Description

A kind of image encryption, decryption method, equipment and computer readable storage medium
Technical field
The present invention relates to field of image processing more particularly to a kind of image encryption, decryption method, equipment and computer-readable Storage medium.
Background technique
In a deterministic system, there is seemingly random irregular movement, behavior expression is uncertain, no Repeatable and unpredictability, here it is chaos phenomenons.Usually the nonlinear dynamic system for being presented with chaos phenomenon is known as mixed Ignorant system, since the system has good pseudo-random characteristics, the unpredictability of track, to original state and control parameter The series of characteristics such as sensibility allow the system to generate a large amount of, irrelevant chaos sequence with pseudo-randomness Column, therefore the data such as image are carried out to encrypt application value with higher using the chaos sequence that chaos system generates.
Currently based on the image encryption method of chaos system be concentrated mainly on to high-dimension chaotic system (it is i.e. three-dimensional or it is three-dimensional with On chaos system) research.Typical high-dimension chaotic system, for example, complex field chaos system, since the system mainly will Obtained from real chaos system expands to complex field as real number field, i.e., state variable is deployable at real component and imaginary component again Amount, therefore, compared to mutually isostructural real chaos system, complex field chaos system has more state variable dimensions.It is higher Although the complex field chaos system of dimension can enhance the safety of image, since dimension and the image of chaos system add Close series is directly proportional, and the dimension of chaos system is higher, and image encryption method is more complicated, when completing spent by image encryption Length is also longer.Therefore, the image encryption method based on complex field chaos system has image encryption method complexity, encryption consumption When longer defect.
Summary of the invention
In order to solve the above technical problems, an embodiment of the present invention is intended to provide a kind of image encryption, decryption method, equipment and meters Calculation machine readable storage medium storing program for executing, this method are intended to reduce duration spent by image encryption process and image decryption process.
The technical scheme of the present invention is realized as follows:
In a first aspect, the embodiment of the invention provides a kind of image encryption methods, which comprises
Initial key is set;
Simplify system using preset chaos and the initial key is generated into M encryption sequence according to preset iterative strategy Column;Wherein, it is the obtained state equation after carrying out dimension-reduction treatment to complex field chaos system that the chaos, which simplifies system,;M Simplify the state variable number of system for the chaos;
Encrypting plaintext image is treated using the M ciphering sequence to be encrypted, and the encrypted ciphertext image is obtained.
In the above scheme, simplify system for the initial key according to preset iteration using preset chaos described Before M ciphering sequence of strategy generating, the method also includes:
According to the linear relationship between the real component and imaginary of state variable multiple in the complex field chaos system, Dimension-reduction treatment is carried out to the complex field chaos system, the chaos is obtained and simplifies system.
In the above scheme, described to simplify system for the initial key according to preset iteration plan using preset chaos M ciphering sequence is slightly generated, is specifically included:
The initial value for simplifying system using the initial key as the chaos simplifies system to the chaos and carries out n times Interative computation, the iterative value after obtaining the n times interative computation;Wherein, N is preset value, and N >=0;
The initial value for simplifying system using the iterative value after the n times interative computation as the chaos, to the chaos letter Change system carries out L interative computation, and using the iterative value of the L interative computation as the ciphering sequence;Wherein, L is institute State the pixel unit number of plaintext image to be encrypted.
In the above scheme, described to treat encrypting plaintext image using the M ciphering sequence and encrypted, it obtains described Encrypted ciphertext image, specifically includes:
Pixel permutation behaviour is carried out to the plaintext image to be encrypted using any ciphering sequence in the M ciphering sequence Make, 1 grade of encrypted image after obtaining the pixel permutation operation;
Xor operation is carried out to m grades of encrypted images using any ciphering sequence in not used M-m ciphering sequence, is obtained M+1 grade encrypted image after to the xor operation;Wherein, successively value is 1,2,3 to m ..., M-1.
Second aspect, the embodiment of the invention provides a kind of image decryption methods, which comprises
It obtains used initial key, chaos when the plaintext image to ciphertext graph picture to be decrypted encrypts and simplifies system System and iterative strategy;
Simplify system using the chaos and the initial key is generated into M ciphering sequence according to the iterative strategy;Its In, it is the obtained state equation after carrying out dimension-reduction treatment to complex field chaos system that the chaos, which simplifies system,;M is described Chaos simplifies the state variable number of system;
The ciphertext image to be decrypted is decrypted using the M ciphering sequence, the plaintext after obtaining the decryption Image.
In the above scheme, described to simplify system for the initial key according to iterative strategy life using the chaos At M ciphering sequence, specifically include:
The initial value for simplifying system using the initial key as the chaos simplifies system to the chaos and carries out n times Interative computation, the iterative value after obtaining the n times interative computation;Wherein, N is preset value, and N >=0;
The initial value for simplifying system using the iterative value after the n times interative computation as the chaos, to the chaos letter Change system carries out L interative computation, and using the iterative value of the L interative computation as the ciphering sequence;Wherein, L is institute State the pixel unit number of plaintext image to be encrypted.
In the above scheme, described that the ciphertext image to be decrypted is decrypted using the M ciphering sequence, it obtains Plaintext image after the decryption, specifically includes:
Add used when obtaining the n+1 grade encrypted image of the plaintext image is determined from the M ciphering sequence Close sequence;
Described n+1 grades is added according to ciphering sequence used when obtaining the n+1 grade encrypted image of the plaintext image Close image carries out xor operation, the n grade encrypted image after obtaining the xor operation;Wherein, successively value is M-1, M- to n 2,…,3,2,1;
1 grade of encryption is schemed according to ciphering sequence used when obtaining 1 grade of encrypted image of the plaintext image As carrying out the anti-shuffle operation of pixel, the plaintext image is obtained.
The third aspect, the embodiment of the invention provides a kind of image encrypting apparatus, the encryption device includes: key setting Unit, the first chaos pseudo sequence generation unit and image encryption unit;Wherein,
The setting unit is configured to setting initial key;
The first chaos pseudo sequence generation unit, being configured to will be described initial close using the simplified system of preset chaos Key generates M ciphering sequence according to preset iterative strategy;Wherein, it is to complex field chaos system that the chaos, which simplifies system, Obtained state equation after progress dimension-reduction treatment;M is the state variable number that the chaos simplifies system;
Described image encryption unit, is configured to treat encrypting plaintext image using the M ciphering sequence and is encrypted, and obtains To the encrypted ciphertext image.
In the above scheme, described device further include: dimension-reduction treatment unit, the dimension-reduction treatment unit are configured to basis Linear relationship in the complex field chaos system between the real component and imaginary of multiple state variable, to the complex field Chaos system carries out dimension-reduction treatment, obtains the chaos and simplifies system.
In the above scheme, the first chaos pseudo sequence generation unit, concrete configuration are as follows: make the initial key The initial value for simplifying system for the chaos simplifies system to the chaos and carries out n times interative computation, obtains the n times iteration Iterative value after operation;Wherein, N is preset value, and N >=0;Using the iterative value after the n times interative computation as the chaos The initial value for simplifying system simplifies system to the chaos and carries out L interative computation, and by the iteration of the L interative computation Value is used as the ciphering sequence;Wherein, L is the pixel unit number of the plaintext image to be encrypted.
In the above scheme, described image encryption unit, concrete configuration are as follows: utilize any in the M ciphering sequence Ciphering sequence carries out pixel permutation operation to the plaintext image to be encrypted, 1 grade of encryption after obtaining the pixel permutation operation Image;Xor operation is carried out to m grades of encrypted images using any ciphering sequence in not used M-m ciphering sequence, is obtained M+1 grade encrypted image after the xor operation;Wherein, successively value is 1,2,3 to m ..., M-1.
Fourth aspect, the embodiment of the invention provides a kind of image decrypting device, described device includes: that parameter obtains list Member, the second chaos pseudo sequence generation unit and image decryption unit;Wherein,
The parameter acquiring unit, being configured to obtain is made when the plaintext image to ciphertext graph picture to be decrypted encrypts Initial key, chaos simplify system and iterative strategy;
The second chaos pseudo sequence generation unit is configured to simplify system for the initial key using the chaos M ciphering sequence is generated according to the iterative strategy;Wherein, the chaos, which simplifies system, is carried out to complex field chaos system Obtained state equation after dimension-reduction treatment;M is the state variable number that the chaos simplifies system;
Described image decryption unit is configured to solve the ciphertext image to be decrypted using the M ciphering sequence It is close, the plaintext image after obtaining the decryption.
In the above scheme, the second chaos pseudo sequence generation unit, concrete configuration are as follows: make the initial key The initial value for simplifying system for the chaos simplifies system to the chaos and carries out n times interative computation, obtains the n times iteration Iterative value after operation;Wherein, N is preset value, and N >=0;Using the iterative value after the n times interative computation as the chaos The initial value for simplifying system simplifies system to the chaos and carries out L interative computation, and by the iteration of the L interative computation Value is used as the ciphering sequence;Wherein, L is the pixel unit number of the plaintext image to be encrypted.
In the above scheme, described image decryption unit, concrete configuration are as follows: determination is obtaining from the M ciphering sequence Used ciphering sequence when taking the n+1 grade encrypted image of the plaintext image;According in the n+1 grade for obtaining the plaintext image Used ciphering sequence carries out xor operation to the n+1 grades of encrypted image when encrypted image, after obtaining the xor operation N grade encrypted image;Wherein, successively value is M-1, M-2 ..., 3,2,1 to n;Add according in 1 grade for obtaining the plaintext image Used ciphering sequence carries out the anti-shuffle operation of pixel to 1 grade of encrypted image when close image, obtains the plaintext image.
5th aspect, the embodiment of the invention provides a kind of image encryption device, the equipment include: first memory, First processor and it is stored in the first program of computer that can be run on the first memory and on the first processor; Wherein, the method and step of above-mentioned image encryption is realized when the first processor executes first program.
6th aspect, the embodiment of the invention provides a kind of image decrypting devices, the equipment include: second memory, Second processor and it is stored in the second program of computer that can be run on the second memory and in the second processor; Wherein, the method and step of above-mentioned image decryption is realized when the second processor executes second program.
7th aspect, the embodiment of the invention provides a kind of computer readable storage medium, the computer-readable storage Media storage has one or more program, and one or more of programs can be executed by one or more processor, with Realize the method and step of above-mentioned image encryption.
Eighth aspect, the embodiment of the invention provides a kind of computer readable storage medium, the computer-readable storage Media storage has one or more program, and one or more of programs can be executed by one or more processor, with Realize the method and step of above-mentioned image decryption.
The embodiment of the invention provides a kind of image encryption and the method for decryption, mainly utilize to complex field chaos system State equation (i.e. chaos simplifies system) after system progress dimensionality reduction generates the chaos sequence required for image encryption or decryption, by Simplify system compared to complex field chaos system in chaos, the number of state variable is less, so it generates chaos sequence institute It is shorter to take length, meanwhile, the simplified system of chaos is identical as the topological structure of complex field chaos system, therefore, is guaranteeing image peace Under the premise of full property, the complexity of image encryption and decryption method based on the simplified system of chaos is lower and time-consuming shorter.
Detailed description of the invention
Fig. 1 is a kind of method schematic diagram of image encryption provided in an embodiment of the present invention;
Fig. 2 is a kind of flow diagram that image encryption is carried out using ciphering sequence provided in an embodiment of the present invention;
Fig. 3 is a kind of method schematic diagram of image decryption provided in an embodiment of the present invention;
Fig. 4 is a kind of flow diagram that image decryption is carried out using ciphering sequence provided in an embodiment of the present invention;
Fig. 5 is the flow diagram of a kind of image encryption and image decryption provided in an embodiment of the present invention;
Fig. 6 is a kind of structural schematic diagram of image encrypting apparatus provided in an embodiment of the present invention;
Fig. 7 is the structural schematic diagram of another image encrypting apparatus provided in an embodiment of the present invention;
Fig. 8 is a kind of structural schematic diagram of image decrypting device provided in an embodiment of the present invention;
Fig. 9 is a kind of structural schematic diagram of image encryption device provided in an embodiment of the present invention;
Figure 10 is a kind of structural schematic diagram of image decrypting devices provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description.
Embodiment one
As shown in Figure 1, the figure shows a kind of image encryption method provided in an embodiment of the present invention, it can from figure Out, this method mainly includes the following steps:
S110, setting initial key;
Here, it should be noted that initial key can be set to any real number, and the dimension of initial key with it is following pre- If chaos simplify system equation in state variable number it is identical, i.e., be all M.
S120, above-mentioned initial key is added for M according to the generation of preset iterative strategy using the simplified system of preset chaos Close sequence;Wherein, it is the obtained state side after carrying out dimension-reduction treatment to complex field chaos system that above-mentioned chaos, which simplifies system, Journey;M is the state variable number that above-mentioned chaos simplifies system;
It is to be appreciated that the dimension of the chaos system for generating ciphering sequence, i.e. the state variable number of chaos system Directly affect duration needed for generating ciphering sequence, that is to say, that generate the ciphering sequence of equal length, the dimension of chaos system Degree is higher, and it is also longer to generate time-consuming used in ciphering sequence.Therefore, here, system is simplified (i.e. to multiple using preset chaos Number field chaos system carries out obtained state equation after dimension-reduction treatment) Lai Shengcheng ciphering sequence, it is corresponding compared to the system Complex field chaos system can be completed in a relatively short time the generation of ciphering sequence.
S130, encrypting plaintext image is treated using above-mentioned M ciphering sequence encrypted, obtain encrypted ciphertext graph Picture.
Under normal conditions, the number of ciphering sequence and the state variable number for generating chaos system used in the ciphering sequence Mesh is equal, and the number of ciphering sequence directly determines and treats used encryption when encrypting plaintext image is encrypted The complexity of method.For example, generate ciphering sequence used in chaos system state variable be x, y, z, then accordingly with The ciphering sequence of the chaos system grey iterative generation is respectively X (n), Y (n), Z (n), and here, n refers to the length of ciphering sequence, And n is equal with the pixel unit number of above-mentioned plaintext image to be encrypted.At this point, utilizing the ciphering sequence X (n), Y (n), Z that generate (n) it treats encrypting plaintext image to be encrypted, treatment process is usual are as follows: firstly, using ciphering sequence X (n) to be added Close plaintext image is encrypted (such as pixel permutation operation), obtains level-one encrypted image;Then, using ciphering sequence Y (n) to one Grade encrypted image is encrypted (such as xor operation), obtains second level encrypted image;Finally, being added using ciphering sequence Z (n) to second level Close image is encrypted (such as xor operation), obtains three-level encrypted image (i.e. ciphertext image).It can be seen by above-mentioned treatment process Out, it treats encrypting plaintext image using above three ciphering sequence to be encrypted, treatment process includes adding for 3 ranks Close treatment process.Similarly, if the number of ciphering sequence is more, using these ciphering sequences treat encrypting plaintext image into Row encryption encryption level experienced can be more, and encryption method also can be more complicated.Therefore, here with above-mentioned chaos Simplify the ciphering sequence that system generates to encrypt above-mentioned plaintext image to be encrypted, simplifies system pair compared to using the chaos The complex field chaos system ciphering sequence generated answered carries out the encryption of plaintext image to be encrypted, can simplify above-mentioned It is time-consuming to save encryption for the encryption method of plaintext image to be encrypted.
Illustratively, before executing step S120, method shown in FIG. 1 can also include: according to above-mentioned complex field chaos Above-mentioned complex field chaos system, drops in the linear relationship in system between the real component and imaginary of multiple state variable Dimension processing obtains above-mentioned chaos and simplifies system.
It is to be appreciated that if being between the real component and imaginary of multiple state variable in certain complex field chaos system Existing linear relationship then can use the linear relationship for the real component of state variable multiple in the chaos system with imaginary generation It replaces, or replaces real component with imaginary, to reduce the number of state variable in the chaos system, realize to the chaos The dimension-reduction treatment of system.For example, shown in the state equation such as formula (1) of certain multiple Lorenz-like system:
B=d1+d2 sgn(|x|-θ)
A, c, d in formula1、d2It is real constant, b is STATE FEEDBACK CONTROL function, and θ is preset threshold.X and y is complex variable, z It is real variable.X=xr+jxi, y=yr+jyi, WithThe conjugation of x and y are respectively indicated, | x | it indicates to complex variable x Modulus,If xr=kxi, yr=kyi, wherein k is proportionality coefficient, then can be by xr=kxi, yr=kyi In substitution formula (1), after substitution shown in obtained result such as formula (2):
Wherein, k is proportionality coefficient.Formula (2) is to obtained system equation after formula (1) progress dimension-reduction treatment, from formula (2) as can be seen that the state variable for including in formula (2) is xi,yi, z lacked state variable x compared to formula (1)r,yr.Also, By comparing the equation structure of formula (1) and formula (2), topological structure of the formula (2) due to remaining formula (1), formula (2) be ensure that Generate the randomness of ciphering sequence.
Linear close is presented in complex field chaos system, between the real component and imaginary of common multiple state variable Other than the system of system system shown in above-mentioned formula (1), there are also Chen systems again and multiple L ü system, wherein multiple Chen system State equation such as formula (3) shown in:
σ, γ, a in formula (3), the real parameter that b is all positive, x and y are complex variables, and z is real variable,WithRespectively indicate x and The conjugation of y.And x=xr+jxi, y=yr+jyi,Due to xr=kxi, yr=kyi, i.e. the real component x of complex variable xr With imaginary xiBetween in a linear relationship, the real component y of complex variable yrWith imaginary yiBetween it is in a linear relationship, therefore It can be by xr=kxi, yr=kyiIn substitution formula (3), to obtain shown in such as formula of the state equation after dimension-reduction treatment (4).
Shown in the state equation such as formula (5) of multiple L ü system:
σ in formula, a, the real parameter that b is all positive, x and y are complex variables, and z is real variable,WithRespectively indicate being total to for x and y Yoke.And x=xr+jxi, y=yr+jyi,Due to xr=kxi, yr=kyi, i.e. the real component x of complex variable xrAnd imaginary part Component xiBetween in a linear relationship, the real component y of complex variable yrWith imaginary yiBetween it is in a linear relationship, therefore can will xr=kxi, yr=kyiIn substitution formula (5), to obtain shown in such as formula of the state equation after dimension-reduction treatment (6).
Here, it should be noted that linear for meeting between real component and imaginary in complex field chaos system The number of the multiple state variable of relationship is without limitation, that is to say, that the reality of at least one complex variable in complex field chaos system It is in a linear relationship between partial amount and imaginary, it can realize the dimension-reduction treatment of the system.In addition, it is above-mentioned provide it is several In kind complex field chaos system, the real component and imaginary of complex variable are to meet identical linear relationship, i.e. xr=kxi, yr=kyi, the purpose illustrated in this way is the simplification to complex field chaos system for convenience.In fact, being not required for multiple change here The real component and imaginary of amount are all satisfied identical linear relationship, i.e. xr=k1xi, yr=k2yi, k1K can be equal to2, k1? K can be not equal to2, for k1With k2Between size relation with no restrictions.
Illustratively, above-mentioned to simplify system for above-mentioned initial key according to pre- using preset chaos for step S120 If iterative strategy generate M ciphering sequence, can specifically include: using above-mentioned initial key as above-mentioned chaos simplification system Initial value simplifies system to above-mentioned chaos and carries out n times interative computation, the iterative value after obtaining above-mentioned secondary interative computation;Wherein, N For preset value, and N >=0;The initial value for simplifying system using the iterative value after above-mentioned n times interative computation as above-mentioned chaos, to upper It states chaos and simplifies system L interative computation of progress, and using the iterative value of above-mentioned L interative computation as above-mentioned ciphering sequence;Its In, L is the pixel unit number of above-mentioned plaintext image to be encrypted.
Here, it should be noted that computer is to use 8bit (i.e. 256) grade or 16bit (i.e. when indicating image 65536) grade distinguishes the brightness of image, therefore, in practical applications, before executing step S130, it is also necessary to will be above-mentioned Ciphering sequence is converted into system number identical with the pixel format of above-mentioned plaintext image to be encrypted, then utilizes the encryption after conversion Sequence carries out the encryption of plaintext image to be encrypted.
For example, it is respectively x, y, z, initial key x that above-mentioned preset chaos, which simplifies the state variable of system,0,y0,z0, then By initial key x0,y0,z0It is input to the chaos to simplify in system, after N+L iteration, the sequence of iterations of generation is distinguished For X (i), Y (i), Z (i), wherein i=1,2,3 ..., N+L, in order to ensure filling for each element in the ciphering sequence of generation Divide chaotic property, sequence of iterations X (i) can be intercepted here, L iterative value in Y (i), Z (i) is as plaintext image institute to be encrypted The ciphering sequence needed, L are the pixel unit number of above-mentioned plaintext image to be encrypted;For example, X (i) is intercepted, in Y (i), Z (i) The ciphering sequence that the N+1 element to the N+L element is arrived as ciphering sequence needed for image to be encrypted is X1(i), Y1(i),Z1(i), i=N+1, N+2 ..., N+L.
Illustratively, above-mentioned to treat encrypting plaintext image using above-mentioned M ciphering sequence and added for step S130 It is close, encrypted ciphertext image is obtained, can specifically include: using any ciphering sequence in above-mentioned M ciphering sequence to upper It states plaintext image to be encrypted and carries out pixel permutation operation, 1 grade of encrypted image after obtaining above-mentioned pixel permutation operation;Using not making Any ciphering sequence in M-m ciphering sequence carries out xor operation to m grades of encrypted images, after obtaining above-mentioned xor operation M+1 grade encrypted image;Wherein, successively value is 1,2,3 to m ..., M-1.
For example, plaintext image to be encrypted is colored Lena image (referring specifically to Fig. 2 (a)), and the image is in RGB color The number of pixels in space is L, and simplifying system ciphering sequence generated using preset chaos is X1(i),Y1(i),Z1(i),i =N+1, N+2 ..., N+L then treat encrypting plaintext image using this 3 ciphering sequences and are encrypted, ciphering process such as Fig. 2 It is shown, it can be seen from the figure that the ciphering process may include steps of:
S1301, ciphering sequence X is utilized1(i), i=N+1, N+2 ..., N+L treats encrypting plaintext image and carries out pixel permutation Operation, 1 grade of encrypted image as shown in Fig. 2 (b), after obtaining pixel permutation operation;
S1302, ciphering sequence Y is utilized1(i), i=N+1, N+2 ..., N+L carries out exclusive or behaviour to above-mentioned 1 grade of encrypted image Make, 2 grades of encrypted images as shown in Fig. 2 (c), after obtaining xor operation;
S1303, ciphering sequence Z is utilized1(i), i=N+1, N+2 ..., N+L carries out exclusive or behaviour to above-mentioned 2 grades of encrypted images Make, as shown in Fig. 2 (d), 3 grades of encrypted images after obtaining xor operation, i.e. final required ciphertext image.
Here, it should be noted that when plaintext image to be encrypted is color image, color space is usually RGB face The colour space, R are red channels, and G is green channel, and B is blue channel, carry out pixel permutation operation treating encrypting plaintext image When, pixel permutation can be carried out in RGB color, that is to say, that setting for pixel can be carried out between different colours space It changes.For example, the pixel in the channel R can be with the pixel replacement in the channel G, the pixel of channel B can be with the pixel replacement in the channel G.It can To understand ground, as m=M-1, obtained m+1 grade encrypted image, i.e. M grades of encrypted image is exactly the ciphertext image of final output. In addition, in order to make ciphertext image that there is higher safety, it is generally the case that ciphering sequence used in every level-one cryptographic operation is equal It is different.
The embodiment of the invention provides a kind of image encryption method, this method mainly simplifies system using preset chaos (i.e. the obtained state equation after carrying out dimension-reduction treatment to complex field chaos system) ciphering sequence generated is to be encrypted Plaintext image is encrypted, and since the chaos simplifies system compared to complex field chaos system, the dimension of state variable is lower, Therefore, this method can reduce under the premise of guaranteeing encrypted image safety and generate duration used in ciphering sequence and add The complexity of close process.
Embodiment two
On the basis of a kind of image encryption method that above-described embodiment one provides, as shown in figure 3, the figure shows this hairs A kind of image decryption method that bright embodiment provides, it can be seen from the figure that this method mainly includes the following steps:
S210, used initial key, chaos when the plaintext image to ciphertext graph picture to be decrypted encrypts are obtained Simplify system and iterative strategy;
It is to be appreciated that above-mentioned ciphertext graph to be decrypted seem by being encrypted to its plaintext image, therefore When above-mentioned ciphertext image to be decrypted is decrypted, used initial key, chaos simplify system and iterative strategy with Used initial key, the chaos for generating ciphering sequence simplify system and iteration when encrypting to its plaintext image Strategy is identical.Here, at image decryption end, can be made according to when the plaintext image to ciphertext graph picture to be decrypted encrypts Initial key, chaos simplify system and iterative strategy, pre-establish ciphertext image to be decrypted and these initial keys, mix Corresponding relationship between ignorant simplified system and iterative strategy, to be obtained according to the corresponding relationship required initial close when decrypting Key, chaos simplify system and iterative strategy.
S220, simplify system using above-mentioned chaos for above-mentioned initial key according to above-mentioned iterative strategy M encryption sequence of generation Column;Wherein, it is the obtained state equation after carrying out dimension-reduction treatment to complex field chaos system that above-mentioned chaos, which simplifies system,;M Simplify the state variable number of system for above-mentioned chaos;
It is to be appreciated that working as initial key used in image decryption end, chaos simplifies system and iterative strategy and figure When the initial key as used in encryption end, chaos simplify system and identical iterative strategy, the decryption of image decryption end generation Sequence is inevitable identical as image encryption end ciphering sequence generated, therefore, can will be used for here to above-mentioned ciphertext to be decrypted The decrypted sequences that image is decrypted are referred to as ciphering sequence.
S230, above-mentioned ciphertext image to be decrypted is decrypted using above-mentioned M ciphering sequence, the plaintext after being decrypted Image.
In fact, the process that above-mentioned ciphertext image to be decrypted is decrypted using above-mentioned M ciphering sequence, is exactly utilized The inverse process encrypted with plaintext image of the above-mentioned M ciphering sequence to above-mentioned ciphertext image to be decrypted.
Illustratively, above-mentioned to simplify system for above-mentioned initial key according to above-mentioned using above-mentioned chaos for step S220 Iterative strategy generates M ciphering sequence, can specifically include: simplifying the initial of system for above-mentioned initial key as above-mentioned chaos Value simplifies system to above-mentioned chaos and carries out n times interative computation, the iterative value after obtaining above-mentioned n times interative computation;Wherein, N is pre- If value, and N >=0;The initial value for simplifying system using the iterative value after above-mentioned n times interative computation as above-mentioned chaos, to above-mentioned mixed Ignorant simplified system carries out L interative computation, and using the iterative value of above-mentioned L interative computation as above-mentioned ciphering sequence;Wherein, L For the pixel unit number of above-mentioned plaintext image to be encrypted.
Similarly, it before executing step S230, needs for above-mentioned ciphering sequence to be converted into and above-mentioned plaintext figure to be encrypted The identical system number of the pixel format of picture, the ciphering sequence after then recycling conversion carry out the decryption of ciphertext image to be decrypted.
Illustratively, above-mentioned that above-mentioned ciphertext image to be decrypted is carried out using above-mentioned M ciphering sequence for step S230 Decryption, the plaintext image after being decrypted can specifically include: determining from above-mentioned M ciphering sequence and obtaining above-mentioned plaintext Used ciphering sequence when the n+1 grade encrypted image of image;According to when obtaining the n+1 grade encrypted image of above-mentioned plaintext image Used ciphering sequence carries out xor operation to above-mentioned n+1 grades of encrypted image, the n grade encrypted image after obtaining xor operation; Wherein, successively value is M-1, M-2 ..., 3,2,1 to n;It is used according to when obtaining 1 grade of encrypted image of above-mentioned plaintext image Ciphering sequence to above-mentioned 1 grade of encrypted image carry out the anti-shuffle operation of pixel, obtain above-mentioned plaintext image.
Here it is possible to understand ground, as n=M-1, the n+1 grade encrypted image of above-mentioned plaintext image is exactly above-mentioned to be decrypted Ciphertext image.
Similarly, ciphering sequence X shown in Fig. 2 in embodiment one is utilized1(i),Y1(i),Z1(i), i=N+1, N+2 ..., The resulting ciphertext image of Fig. 2 is decrypted in N+L, and decrypting process is as shown in figure 4, it can be seen from the figure that the decrypting process It may include steps of:
S2301, ciphering sequence Z is utilized1(i), i=N+1, N+2 ..., N+L is to ciphertext graph picture to be decrypted (referring specifically to Fig. 4 (a)) xor operation, 2 grades of encrypted images as shown in Fig. 4 (b), after obtaining xor operation are carried out;
S2302, ciphering sequence Y is utilized1(i), i=N+1, N+2 ..., N+L carries out exclusive or behaviour to above-mentioned 2 grades of encrypted images Make, 1 grade of encrypted image as shown in Fig. 4 (c), after obtaining xor operation;
S2303, ciphering sequence X is utilized1(i), i=N+1, N+2 ..., it is anti-that N+L carries out pixel to above-mentioned 1 grade of encrypted image Shuffle operation, the plaintext image as shown in Fig. 4 (d), after obtaining the anti-shuffle operation of pixel.
The embodiment of the invention provides a kind of image decryption method, this method by obtain to ciphertext graph to be decrypted as Plaintext image used initial key when being encrypted, chaos simplify system and iterative strategy to complete to ciphertext to be decrypted Image is decrypted correctly, and is the gained after carrying out dimension-reduction treatment to complex field chaos system since its chaos used simplifies system The state equation arrived, therefore, this method can be realized the fast decryption of ciphertext image to be decrypted.
Embodiment three
For convenience of understanding to above-mentioned technical proposal, preset will be mixed using above-mentioned formula (2) as above-mentioned in the present embodiment Ignorant simplified system treats the process that encrypting plaintext image is encrypted and decrypted, wherein plaintext image to be encrypted is each pixel It is worth the RGB image in 0~255 tonal range, then specific implementation process is as shown in figure 5, it can be seen from the figure that image Encryption method process may include steps of:
S301, setting initial key are xi(0),yi(0),zi(0);
S302, by initial key xi(0),yi(0),zi(0) initial value as above-mentioned formula (2) carries out formula (2) N+L times Iteration, and iterative value x in L × 3 is chosen from iterative value caused by N+L iterationi(n),yi(n),zi(n), n=N+1, N+ 2 ..., N+L is as ciphering sequence;Wherein, L is the pixel unit number of plaintext image to be encrypted;
S303, according to the following formula (7) are to ciphering sequence xi(n),yi(n),zi(n), n=N+1, N+2 ..., N+L carries out data Type conversion, obtains Keyxi(n),Keyyi(n),Keyzi(n), n=N+1, N+2 ..., N+L;
T [x, y]=mod ((| x |-floor (| x |)) × 1014,y)
In formula, L=3 × H × V, H are plaintext image pixel width to be encrypted, and V is pixels tall, and 3 represent number of active lanes (R,G,B);KeyxiIt (n) is pixel coordinate sequence.
S304, ciphering sequence Keyx is utilizedi(n), n=N+1, N+2 ..., N+L treats encrypting plaintext image progress pixel and sets Disorderly operation, 1 grade of encrypted image after obtaining above-mentioned pixel permutation operation;
For example, can be by successively exchanging Keyxi(n) pixel in sequence at adjacent coordinates completes pixel permutation.
S305, ciphering sequence Keyy is utilizedi(n), n=N+1, N+2 ..., N+L carries out exclusive or to above-mentioned 1 grade of encrypted image Operation, 2 grades of encrypted images after obtaining above-mentioned xor operation;
S306, ciphering sequence Keyz is utilizedi(n), n=N+1, N+2 ..., N+L carries out exclusive or to above-mentioned 2 grades of encrypted images Operation, the ciphertext image after obtaining above-mentioned xor operation;
When above-mentioned ciphertext image is when decrypting end needs to be decrypted, figure 4, it is seen that specific image decryption method It may include steps of:
S307, initial key x is obtainedi(0),yi(0),zi(0);
S308, by initial key xi(0),yi(0),zi(0) initial value as above-mentioned formula (2) carries out n times to formula (2) and changes Generation, and iterative value x in L × 3 is chosen from iterative value caused by n times iterationi(n),yi(n),zi(n), n=N+1, N+2 ..., N+L is as ciphering sequence;Wherein, L is the pixel unit number of above-mentioned ciphertext image;
S309, according to above formula (7) to ciphering sequence xi(n),yi(n),zi(n), n=N+1, N+2 ..., N+L carries out data Type conversion, obtains Keyxi(n),Keyyi(n),Keyzi(n), n=N+1, N+2 ..., N+L;
S310, ciphering sequence Keyz is utilizedi(n), n=N+1, N+2 ..., N+L carries out exclusive or behaviour to above-mentioned ciphertext image Make, 2 grades of encrypted images after obtaining above-mentioned xor operation;
S311, ciphering sequence Keyy is utilizedi(n), n=N+1, N+2 ..., N+L carries out exclusive or to above-mentioned 2 grades of ciphering sequences Operation, 1 grade of encrypted image after obtaining above-mentioned xor operation;
S312, ciphering sequence Keyx is utilizedi(n), n=N+1, N+2 ..., N+L carries out pixel to above-mentioned 1 grade of encrypted image Anti- shuffle operation, the plaintext image after obtaining the anti-shuffle operation of above-mentioned pixel.
Example IV
Based on technical concept same as before, as shown in fig. 6, the figure shows a kind of images provided in an embodiment of the present invention Encryption device 40, it can be seen from the figure that encryption device 40 includes: key setting unit 410, the generation of the first chaos pseudo sequence Unit 420 and image encryption unit 430;Wherein,
Key setting unit 410 is configured to setting initial key;
First chaos pseudo sequence generation unit 420, being configured to will be described initial close using the simplified system of preset chaos Key generates M ciphering sequence according to preset iterative strategy;Wherein, it is to complex field chaos system that the chaos, which simplifies system, Obtained state equation after progress dimension-reduction treatment;M is the state variable number that the chaos simplifies system;
Image encryption unit 430, is configured to treat encrypting plaintext image using above-mentioned M ciphering sequence and is encrypted, and obtains To encrypted ciphertext image.
In the above scheme, as shown in fig. 7, the device 40 further include: dimension-reduction treatment unit 440, dimension-reduction treatment unit 440, the line being configurable between the real component and imaginary according to state variable multiple in above-mentioned complex field chaos system Sexual intercourse carries out dimension-reduction treatment to above-mentioned complex field chaos system, obtains above-mentioned chaos and simplifies system.
In the above scheme, the first chaos pseudo sequence generation unit 420, is specifically configurable to: will be above-mentioned initial close Key simplifies the initial value of system as above-mentioned chaos, simplifies system to above-mentioned chaos and carries out n times interative computation, obtains above-mentioned time repeatedly For the iterative value after operation;Wherein, N is preset value, and N >=0;Using the iterative value after above-mentioned n times interative computation as above-mentioned mixed The initial value of ignorant simplified system simplifies system to above-mentioned chaos and carries out L interative computation, and changing above-mentioned L interative computation Generation value is used as above-mentioned ciphering sequence;Wherein, L is the pixel unit number of above-mentioned plaintext image to be encrypted.
In the above scheme, image encryption unit 430, is specifically configurable to: utilizing appointing in above-mentioned M ciphering sequence One ciphering sequence carries out pixel permutation operation to above-mentioned plaintext image to be encrypted, and 1 grade after obtaining above-mentioned pixel permutation operation adds Close image;Xor operation is carried out to m grades of encrypted images using any ciphering sequence in not used M-m ciphering sequence, is obtained M+1 grade encrypted image after to above-mentioned xor operation;Wherein, successively value is 1,2,3 to m ..., M-1.
Embodiment five
Based on technical concept same as before, as shown in figure 8, the figure shows a kind of images provided in an embodiment of the present invention Device 50 is decrypted, it can be seen from the figure that image decrypting device 50 may include: that parameter acquiring unit 510, the second chaos are random Sequence generating unit 520 and image decryption unit 530;Wherein,
Parameter acquiring unit 510, being configured to obtain is made when the plaintext image to ciphertext graph picture to be decrypted encrypts Initial key, chaos simplify system and iterative strategy;
Second chaos pseudo sequence generation unit 520 is configured to simplify system for the initial key using the chaos M ciphering sequence is generated according to the iterative strategy;Wherein, the chaos, which simplifies system, is carried out to complex field chaos system Obtained state equation after dimension-reduction treatment;M is the state variable number that the chaos simplifies system;
Image decryption unit 530 is configured to solve above-mentioned ciphertext image to be decrypted using above-mentioned M ciphering sequence It is close, the plaintext image after obtaining above-mentioned decryption.
In the above scheme, the second chaos pseudo sequence generation unit 520, is specifically configurable to: will be described initial close Key simplifies the initial value of system as the chaos, simplifies system to the chaos and carries out n times interative computation, obtains the n times Iterative value after interative computation;Wherein, N is preset value, and N >=0;Using the iterative value after the n times interative computation as described in Chaos simplifies the initial value of system, simplifies system to the chaos and carries out L interative computation, and by the L interative computation Iterative value is as the ciphering sequence;Wherein, L is the pixel unit number of the plaintext image to be encrypted.
In the above scheme, image decryption unit 530, is specifically configurable to: determining from above-mentioned M ciphering sequence Obtain used ciphering sequence when the n+1 grade encrypted image of above-mentioned plaintext image;According in the n+1 for obtaining above-mentioned plaintext image Used ciphering sequence carries out xor operation to above-mentioned n+1 grades of encrypted image when grade encrypted image, obtains above-mentioned xor operation N grade encrypted image afterwards;Wherein, successively value is M-1, M-2 ..., 3,2,1 to n;According to obtaining 1 grade of above-mentioned plaintext image Used ciphering sequence carries out the anti-shuffle operation of pixel to above-mentioned 1 grade of encrypted image when encrypted image, obtains above-mentioned plaintext figure Picture.
Embodiment six
Based on technical concept same as before, as shown in figure 9, the figure shows a kind of images provided in an embodiment of the present invention Equipment 60 is encrypted, it can be seen from the figure that image encryption device 60 may include: first memory 610, first processor 620 And it is stored in the first program of computer 630 that can be run on first memory 610 and on first processor 620, the first processing Device 620 performs the steps of when executing the first program 630
Initial key is set;
Simplify system using preset chaos and the initial key is generated into M encryption sequence according to preset iterative strategy Column;Wherein, it is the obtained state equation after carrying out dimension-reduction treatment to complex field chaos system that the chaos, which simplifies system,;M Simplify the state variable number of system for the chaos;
Encrypting plaintext image is treated using above-mentioned M ciphering sequence to be encrypted, and above-mentioned encrypted ciphertext image is obtained.
In practical applications, above-mentioned first memory 610 can be volatile memory (volatile memory), example Such as random access memory (RAM, Random-Access Memory);Or non-volatile reservoir (non-volatile Memory), such as read-only memory (ROM, Read-Only Memory), flash memory (flash memory), hard disk (HDD, Hard Disk Drive) or solid state hard disk (SSD, Solid-State Drive);Or the memory of mentioned kind Combination, and computer program is provided to first processor 620.
Above-mentioned first processor 620 can be application-specific IC (ASIC, Application Specific Integrated Circuit), digital signal processor (DSP, Digital Signal Processor), Digital Signal Processing Device (DSPD, Digital Signal Processing Device), programmable logic device (PLD, Programmable Logic Device), field programmable gate array (FPGA, Field Programmable Gate Array), central processing unit At least one of (CPU, Central Processing Unit), controller, microcontroller, microprocessor.It is understood that Ground, for different equipment, the electronic device for realizing above-mentioned processor function can also be it is other, the embodiment of the present invention is not Make specific limit.
Illustratively, simplify system for the initial key according to preset iterative strategy using preset chaos above-mentioned Before generating M ciphering sequence, first processor 620 can also be performed the steps of when executing the first program 630 according to above-mentioned Linear relationship in complex field chaos system between the real component and imaginary of multiple state variable, to above-mentioned complex field chaos System carries out dimension-reduction treatment, obtains above-mentioned chaos and simplifies system.
Illustratively, above-mentioned to simplify system for the initial key according to the life of preset iterative strategy using preset chaos The step of at M ciphering sequence, can also be executed by first processor 620, using perform the steps of by above-mentioned initial key as Above-mentioned chaos simplifies the initial value of system, simplifies system to above-mentioned chaos and carries out n times interative computation, obtains above-mentioned secondary interative computation Iterative value afterwards;Wherein, N is preset value, and N >=0;Simplify the iterative value after above-mentioned n times interative computation as above-mentioned chaos The initial value of system simplifies system to above-mentioned chaos and carries out L interative computation, and the iterative value of above-mentioned L interative computation is made For above-mentioned ciphering sequence;Wherein, L is the pixel unit number of above-mentioned plaintext image to be encrypted.
Illustratively, above-mentioned to treat encrypting plaintext image using above-mentioned M ciphering sequence and encrypted, obtain above-mentioned encryption It the step of rear ciphertext image, can also be executed by first processor 620, utilize above-mentioned M ciphering sequence to perform the steps of In any ciphering sequence pixel permutation operation is carried out to above-mentioned plaintext image to be encrypted, after obtaining above-mentioned pixel permutation operation 1 grade of encrypted image;Exclusive or behaviour is carried out to m grades of encrypted images using any ciphering sequence in not used M-m ciphering sequence Make, the m+1 grade encrypted image after obtaining above-mentioned xor operation;Wherein, successively value is 1,2,3 to m ..., M-1.
Embodiment seven
Based on technical concept same as before, as shown in Figure 10, the figure shows a kind of figures provided in an embodiment of the present invention As decryption device 70, it can be seen from the figure that image decrypting devices 70 may include: second memory 710, second processor 720 and it is stored in the second program of computer 730 that can be run on second memory 710 and in second processor 720, at second Reason device 720 performs the steps of when executing the second program 730
It obtains used initial key, chaos when the plaintext image to ciphertext graph picture to be decrypted encrypts and simplifies system System and iterative strategy;
Simplify system using above-mentioned chaos and above-mentioned initial key is generated into M ciphering sequence according to above-mentioned iterative strategy;Its In, it is the obtained state equation after carrying out dimension-reduction treatment to complex field chaos system that above-mentioned chaos, which simplifies system,;M is above-mentioned Chaos simplifies the state variable number of system;
Above-mentioned ciphertext image to be decrypted is decrypted using above-mentioned M ciphering sequence, the plaintext after obtaining above-mentioned decryption Image.
In practical applications, above-mentioned second memory 710 can be volatile memory (volatile memory), example Such as random access memory (RAM, Random-Access Memory);Or non-volatile reservoir (non-volatile Memory), such as read-only memory (ROM, Read-Only Memory), flash memory (flash memory), hard disk (HDD, Hard Disk Drive) or solid state hard disk (SSD, Solid-State Drive);Or the memory of mentioned kind Combination, and computer program is provided to second processor 720.
Above-mentioned second processor 720 can be application-specific IC (ASIC, Application Specific Integrated Circuit), digital signal processor (DSP, Digital Signal Processor), Digital Signal Processing Device (DSPD, Digital Signal Processing Device), programmable logic device (PLD, Programmable Logic Device), field programmable gate array (FPGA, Field Programmable Gate Array), central processing unit At least one of (CPU, Central Processing Unit), controller, microcontroller, microprocessor.It is understood that Ground, for different equipment, the electronic device for realizing above-mentioned processor function can also be it is other, the embodiment of the present invention is not Make specific limit.
Illustratively, above-mentioned to simplify system for the initial key according to iterative strategy generation M using the chaos The step of a ciphering sequence, can also be executed by second processor 720, to perform the steps of the initial key as institute The initial value that chaos simplifies system is stated, system is simplified to the chaos and carries out n times interative computation, obtains the n times interative computation Iterative value afterwards;Wherein, N is preset value, and N >=0;Simplify the iterative value after the n times interative computation as the chaos The initial value of system simplifies system to the chaos and carries out L interative computation, and the iterative value of the L interative computation is made For the ciphering sequence;Wherein, L is the pixel unit number of the plaintext image to be encrypted.
Illustratively, above-mentioned that above-mentioned ciphertext image to be decrypted is decrypted using above-mentioned M ciphering sequence, it obtains above-mentioned It the step of plaintext image after decryption, can also be executed by second processor 720, to perform the steps of from above-mentioned M encryption sequence The used ciphering sequence when obtaining the n+1 grade encrypted image of above-mentioned plaintext image is determined in column;It is stated clearly according in acquisition Used ciphering sequence carries out xor operation to above-mentioned n+1 grades of encrypted image when the n+1 grade encrypted image of texts and pictures picture, obtains N grade encrypted image after stating xor operation;Wherein, successively value is M-1, M-2 ..., 3,2,1 to n;According in the above-mentioned plaintext of acquisition Used ciphering sequence carries out the anti-shuffle operation of pixel to above-mentioned 1 grade of encrypted image when 1 grade of encrypted image of image, obtains State texts and pictures picture clearly.
Embodiment eight
The technical solution of any of the above-described embodiment substantially the part that contributes to existing technology or the skill in other words The all or part of art scheme can be embodied in the form of software products, which is stored in a calculating In machine readable storage medium storing program for executing, including some instructions are used so that computer equipment (it can be personal computer, server, Or network equipment etc.) or processor (processor) execute the present embodiment the method all or part of the steps.And it is aforementioned Computer readable storage medium include: USB flash disk, mobile hard disk, read-only memory (ROM, Read Only Memory), deposit at random The various media that can store program code such as access to memory (RAM, Random Access Memory), magnetic or disk.
Specifically, the corresponding computer program instructions of one of the present embodiment image encryption method can be stored in CD, hard disk, on the computer readable storage mediums such as USB flash disk, i.e., above-mentioned computer-readable recording medium storage has one or more A program, said one or multiple programs can be executed by one or more processor, to perform the steps of
Initial key is set;
Simplify system using preset chaos and above-mentioned initial key is generated into M encryption sequence according to preset iterative strategy Column;Wherein, it is the obtained state equation after carrying out dimension-reduction treatment to complex field chaos system that above-mentioned chaos, which simplifies system,;M Simplify the state variable number of system for above-mentioned chaos;
Encrypting plaintext image is treated using above-mentioned M ciphering sequence to be encrypted, and above-mentioned encrypted ciphertext image is obtained.
Illustratively, simplify system for the initial key according to preset iterative strategy using preset chaos described Before generating M ciphering sequence, it can also be executed by said one or multiple processors, to perform the steps of according to above-mentioned Linear relationship in complex field chaos system equation between the real component and imaginary of multiple state variable, to above-mentioned complex field Chaos system equation carries out dimension-reduction treatment.
Illustratively, above-mentioned to simplify system for the initial key according to the life of preset iterative strategy using preset chaos The step of at M ciphering sequence, can also be executed by said one or multiple processors, with perform the steps of will it is above-mentioned just Beginning key simplifies the initial value of system as above-mentioned chaos, simplifies system to above-mentioned chaos and carries out n times interative computation, obtains above-mentioned Iterative value after secondary interative computation;Wherein, N is preset value, and N >=0;Using the iterative value after above-mentioned n times interative computation as upper The initial value that chaos simplifies system is stated, system is simplified to above-mentioned chaos and carries out L interative computation, and by above-mentioned L interative computation Iterative value as above-mentioned ciphering sequence;Wherein, L is the pixel unit number of above-mentioned plaintext image to be encrypted.
Illustratively, above-mentioned to treat encrypting plaintext image using above-mentioned M ciphering sequence and encrypted, obtain above-mentioned encryption It the step of rear ciphertext image, can also be executed by said one or multiple processors, utilize above-mentioned M to perform the steps of Any ciphering sequence in a ciphering sequence carries out pixel permutation operation to above-mentioned plaintext image to be encrypted, obtains above-mentioned pixel and sets Disorderly 1 grade of encrypted image after operation;Using any ciphering sequence in not used M-m ciphering sequence to m grades of encrypted images Carry out xor operation, the m+1 grade encrypted image after obtaining above-mentioned xor operation;Wherein, successively value is 1,2,3 to m ..., M-1.
In addition, the corresponding computer program instructions of one of the present embodiment image decryption method can also be stored in light Disk, hard disk, on the computer readable storage mediums such as USB flash disk, i.e., above-mentioned computer-readable recording medium storage has one or more Program, said one or multiple programs can be executed by one or more processor, to perform the steps of
It obtains used initial key, chaos when the plaintext image to ciphertext graph picture to be decrypted encrypts and simplifies system System and iterative strategy;
Simplify system using above-mentioned chaos and above-mentioned initial key is generated into M ciphering sequence according to above-mentioned iterative strategy;Its In, it is the obtained state equation after carrying out dimension-reduction treatment to complex field chaos system that above-mentioned chaos, which simplifies system,;M is above-mentioned Chaos simplifies the state variable number of system;
Above-mentioned ciphertext image to be decrypted is decrypted using above-mentioned M ciphering sequence, the plaintext after obtaining above-mentioned decryption Image.
Illustratively, above-mentioned to simplify system for the initial key according to iterative strategy generation M using the chaos The step of a ciphering sequence, can also be executed by said one or multiple processors, with perform the steps of will be above-mentioned initial close Key simplifies the initial value of system as above-mentioned chaos, simplifies system to above-mentioned chaos and carries out n times interative computation, obtains above-mentioned n times Iterative value after interative computation;Wherein, N is preset value, and N >=0;Using the iterative value after above-mentioned n times interative computation as above-mentioned Chaos simplifies the initial value of system, simplifies system to above-mentioned chaos and carries out L interative computation, and by above-mentioned L interative computation Iterative value is as above-mentioned ciphering sequence;Wherein, L is the pixel unit number of above-mentioned plaintext image to be encrypted.
Illustratively, above-mentioned that above-mentioned ciphertext image to be decrypted is decrypted using above-mentioned M ciphering sequence, it obtains above-mentioned The step of plaintext image after decryption, can also be executed by said one or multiple processors, to perform the steps of from above-mentioned The used ciphering sequence when obtaining the n+1 grade encrypted image of above-mentioned plaintext image is determined in M ciphering sequence;According to obtaining Used ciphering sequence when the n+1 grade encrypted image of above-mentioned plaintext image is taken to carry out exclusive or behaviour to above-mentioned n+1 grades of encrypted image Make, the n grade encrypted image after obtaining above-mentioned xor operation;Wherein, successively value is M-1, M-2 ..., 3,2,1 to n;According to obtaining Used ciphering sequence when 1 grade of encrypted image of above-mentioned plaintext image is taken to invert unrest to above-mentioned 1 grade of encrypted image progress pixel Operation, obtains above-mentioned plaintext image.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program Product.Therefore, the shape of hardware embodiment, software implementation or embodiment combining software and hardware aspects can be used in the present invention Formula.Moreover, the present invention, which can be used, can use storage in the computer that one or more wherein includes computer usable program code The form for the computer program product implemented on medium (including but not limited to magnetic disk storage and optical memory etc.).
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the scope of the present invention.

Claims (18)

1. a kind of image encryption method, which is characterized in that the described method includes:
Initial key is set;
Simplify system using preset chaos and the initial key is generated into M ciphering sequence according to preset iterative strategy;Its In, it is the obtained state equation after carrying out dimension-reduction treatment to complex field chaos system that the chaos, which simplifies system,;M is described Chaos simplifies the state variable number of system;
Encrypting plaintext image is treated using the M ciphering sequence to be encrypted, and the encrypted ciphertext image is obtained.
2. the method according to claim 1, wherein utilizing the simplified system of preset chaos described first described Before beginning key generates M ciphering sequence according to preset iterative strategy, the method also includes:
According to the linear relationship between the real component and imaginary of state variable multiple in the complex field chaos system, to institute It states complex field chaos system and carries out dimension-reduction treatment, obtain the chaos and simplify system.
3. the method according to claim 1, wherein described will be described initial using the simplified system of preset chaos Key generates M ciphering sequence according to preset iterative strategy, specifically includes:
The initial value for simplifying system using the initial key as the chaos simplifies system to the chaos and carries out n times iteration Operation, the iterative value after obtaining the n times interative computation;Wherein, N is preset value, and N >=0;
The initial value for simplifying system using the iterative value after the n times interative computation as the chaos simplifies system to the chaos System carries out L interative computation, and using the iterative value of the L interative computation as the ciphering sequence;Wherein, L be it is described to The pixel unit number of encrypting plaintext image.
4. the method according to claim 1, wherein described treat encrypting plaintext using the M ciphering sequence Image is encrypted, and is obtained the encrypted ciphertext image, is specifically included:
Pixel permutation operation is carried out to the plaintext image to be encrypted using any ciphering sequence in the M ciphering sequence, 1 grade of encrypted image after obtaining the pixel permutation operation;
Xor operation is carried out to m grades of encrypted images using any ciphering sequence in not used M-m ciphering sequence, obtains institute M+1 grade encrypted image after stating xor operation;Successively value is 1,2,3 to m ..., M-1.
5. a kind of image decryption method, which is characterized in that the described method includes:
Obtain when the plaintext image to ciphertext graph picture to be decrypted encrypts used initial key, chaos simplify system with And iterative strategy;
Simplify system using the chaos and the initial key is generated into M ciphering sequence according to the iterative strategy;Wherein, institute Stating chaos to simplify system is the obtained state equation after carrying out dimension-reduction treatment to complex field chaos system;M is the chaos Simplify the state variable number of system;
The ciphertext image to be decrypted is decrypted using the M ciphering sequence, the plaintext image after obtaining the decryption.
6. according to the method described in claim 5, it is characterized in that, described will be described initial close using the simplified system of the chaos Key generates M ciphering sequence according to the iterative strategy, specifically includes:
The initial value for simplifying system using the initial key as the chaos simplifies system to the chaos and carries out n times iteration Operation, the iterative value after obtaining the n times interative computation;Wherein, N is preset value, and N >=0;
The initial value for simplifying system using the iterative value after the n times interative computation as the chaos simplifies system to the chaos System carries out L interative computation, and using the iterative value of the L interative computation as the ciphering sequence;Wherein, L be it is described to The pixel unit number of encrypting plaintext image.
7. according to the method described in claim 5, it is characterized in that, described utilize the M ciphering sequence to described to be decrypted Ciphertext image is decrypted, and the plaintext image after obtaining the decryption specifically includes:
The used encryption sequence when obtaining the n+1 grade encrypted image of the plaintext image is determined from the M ciphering sequence Column;
The n+1 grades of encryption is schemed according to ciphering sequence used when obtaining the n+1 grade encrypted image of the plaintext image As carrying out xor operation, the n grade encrypted image after obtaining the xor operation;Wherein, n successively value be M-1, M-2 ..., 3, 2,1;
According to ciphering sequence used when obtaining 1 grade of encrypted image of the plaintext image to 1 grade of encrypted image into The anti-shuffle operation of row pixel obtains the plaintext image.
8. a kind of image encrypting apparatus, which is characterized in that the encryption device includes: that key setting unit, the first chaos are random Sequence generating unit and image encryption unit;Wherein,
The setting unit is configured to setting initial key;
The first chaos pseudo sequence generation unit, be configured to using preset chaos simplify system by the initial key by M ciphering sequence is generated according to preset iterative strategy;Wherein, the chaos, which simplifies system, is carried out to complex field chaos system Obtained state equation after dimension-reduction treatment;M is the state variable number that the chaos simplifies system;
Described image encryption unit, is configured to treat encrypting plaintext image using the M ciphering sequence and is encrypted, and obtains institute State encrypted ciphertext image.
9. device according to claim 8, which is characterized in that described device further include: dimension-reduction treatment unit, the dimensionality reduction Processing unit, the line being configured between the real component and imaginary according to state variable multiple in the complex field chaos system Sexual intercourse carries out dimension-reduction treatment to the complex field chaos system, obtains the chaos and simplifies system.
10. device according to claim 8, which is characterized in that the first chaos pseudo sequence generation unit is specifically matched It is set to: simplifying the initial value of system using the initial key as the chaos, system is simplified to the chaos and carries out n times iteration Operation, the iterative value after obtaining the n times interative computation;Wherein, N is preset value, and N >=0;After the n times interative computation Iterative value simplify the initial value of system as the chaos, system is simplified to the chaos and carries out L interative computation, and by institute The iterative value of L interative computation is stated as the ciphering sequence;Wherein, L is the number of pixel cells of the plaintext image to be encrypted Mesh.
11. device according to claim 8, which is characterized in that described image encryption unit, concrete configuration are as follows: utilize institute Any ciphering sequence stated in M ciphering sequence carries out pixel permutation operation to the plaintext image to be encrypted, obtains the picture 1 grade of encrypted image after plain shuffle operation;M grades are encrypted using any ciphering sequence in not used M-m ciphering sequence Image carries out xor operation, the m+1 grade encrypted image after obtaining the xor operation;Wherein, successively value is 1,2,3 to m ..., M-1。
12. a kind of image decrypting device, which is characterized in that described device includes: parameter acquiring unit, the second chaos pseudo sequence Generation unit and image decryption unit;Wherein,
The parameter acquiring unit is configured to obtain used when the plaintext image to ciphertext graph picture to be decrypted encrypts Initial key, chaos simplify system and iterative strategy;
The second chaos pseudo sequence generation unit, be configured to using the chaos simplify system by the initial key according to The iterative strategy generates M ciphering sequence;Wherein, it is to carry out dimensionality reduction to complex field chaos system that the chaos, which simplifies system, Obtained state equation after processing;M is the state variable number that the chaos simplifies system;
Described image decryption unit is configured to that the ciphertext image to be decrypted is decrypted using the M ciphering sequence, obtained Plaintext image after to the decryption.
13. device according to claim 12, which is characterized in that the second chaos pseudo sequence generation unit, specifically It is configured that the initial value for simplifying system using the initial key as the chaos, system progress n times is simplified to the chaos and are changed Iterative value for operation, after obtaining the n times interative computation;Wherein, N is preset value, and N >=0;By the n times interative computation Iterative value afterwards simplifies the initial value of system as the chaos, simplifies system to the chaos and carries out L interative computation, and will The iterative value of the L interative computation is as the ciphering sequence;Wherein, L is the pixel unit of the plaintext image to be encrypted Number.
14. device according to claim 12, which is characterized in that described image decryption unit, concrete configuration are as follows: from described The used ciphering sequence when obtaining the n+1 grade encrypted image of the plaintext image is determined in M ciphering sequence;According to obtaining Used ciphering sequence when the n+1 grade encrypted image of the plaintext image is taken to carry out exclusive or behaviour to the n+1 grades of encrypted image Make, the n grade encrypted image after obtaining the xor operation;Wherein, successively value is M-1, M-2 ..., 3,2,1 to n;According to obtaining Used ciphering sequence when 1 grade of encrypted image of the plaintext image is taken to invert unrest to 1 grade of encrypted image progress pixel Operation, obtains the plaintext image.
15. a kind of image encryption device, which is characterized in that the equipment includes: first memory, first processor and is stored in On the first memory and the first program of computer that can be run on the first processor;Wherein, first processing Device realizes the method and step of image encryption described in Claims 1-4 when executing first program.
16. a kind of image decrypting devices, which is characterized in that the equipment includes: second memory, second processor and is stored in On the second memory and the second program of computer that can be run in the second processor;Wherein, the second processing Device realizes the method and step of image decryption described in claim 5 to 7 when executing second program.
17. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage have one or Multiple programs, one or more of programs can be executed by one or more processor, to realize Claims 1-4 institute The method and step for the image encryption stated.
18. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage have one or Multiple programs, one or more of programs can be executed by one or more processor, to realize claim 5 to 7 institute The method and step for the image decryption stated.
CN201710672751.1A 2017-08-08 2017-08-08 A kind of image encryption, decryption method, equipment and computer readable storage medium Pending CN109391463A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710672751.1A CN109391463A (en) 2017-08-08 2017-08-08 A kind of image encryption, decryption method, equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710672751.1A CN109391463A (en) 2017-08-08 2017-08-08 A kind of image encryption, decryption method, equipment and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN109391463A true CN109391463A (en) 2019-02-26

Family

ID=65414062

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710672751.1A Pending CN109391463A (en) 2017-08-08 2017-08-08 A kind of image encryption, decryption method, equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN109391463A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112272082A (en) * 2020-09-28 2021-01-26 珠海大横琴科技发展有限公司 Image encryption/decryption method and device, electronic equipment and storage medium
CN113742739A (en) * 2020-05-28 2021-12-03 中国电信股份有限公司 Image encryption method, device and storage medium
CN114117502A (en) * 2022-01-21 2022-03-01 苏州浪潮智能科技有限公司 Data encryption and decryption method, system, equipment and computer readable storage medium
CN114866811A (en) * 2022-03-31 2022-08-05 广州科拓科技有限公司 Video encryption method and device and video decryption method and device
CN115208863A (en) * 2022-09-14 2022-10-18 浙江大华技术股份有限公司 Code stream encryption and decryption method, and related device, equipment, system and medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103761703A (en) * 2014-01-15 2014-04-30 西安理工大学 Single channel color image encryption method based on GT conversion and chaos
CN104182926A (en) * 2014-07-25 2014-12-03 南京邮电大学 Color image encryption method based on Hilbert transform and chaos Liu algorithm
CN106385311A (en) * 2016-09-08 2017-02-08 哈尔滨工程大学 Chaotic signal generator of complex chaotic simplified system based on FPGA
CN106558015A (en) * 2016-10-08 2017-04-05 广东工业大学 A kind of new intersection composite chaotic multicolor image encryption algorithm

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103761703A (en) * 2014-01-15 2014-04-30 西安理工大学 Single channel color image encryption method based on GT conversion and chaos
CN104182926A (en) * 2014-07-25 2014-12-03 南京邮电大学 Color image encryption method based on Hilbert transform and chaos Liu algorithm
CN106385311A (en) * 2016-09-08 2017-02-08 哈尔滨工程大学 Chaotic signal generator of complex chaotic simplified system based on FPGA
CN106558015A (en) * 2016-10-08 2017-04-05 广东工业大学 A kind of new intersection composite chaotic multicolor image encryption algorithm

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
HUANG, LL等: "The Design and Its Application In Secure Communication and Image Encryption of A New Lorenz-like System with Varying Parameter", 《MATHEMATICAL PROBLEMS IN ENGINEERING》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113742739A (en) * 2020-05-28 2021-12-03 中国电信股份有限公司 Image encryption method, device and storage medium
CN112272082A (en) * 2020-09-28 2021-01-26 珠海大横琴科技发展有限公司 Image encryption/decryption method and device, electronic equipment and storage medium
CN112272082B (en) * 2020-09-28 2022-03-29 珠海大横琴科技发展有限公司 Image encryption/decryption method and device, electronic equipment and storage medium
CN114117502A (en) * 2022-01-21 2022-03-01 苏州浪潮智能科技有限公司 Data encryption and decryption method, system, equipment and computer readable storage medium
WO2023138265A1 (en) * 2022-01-21 2023-07-27 苏州浪潮智能科技有限公司 Data encryption and decryption method and system, device, and computer-readable storage medium
CN114866811A (en) * 2022-03-31 2022-08-05 广州科拓科技有限公司 Video encryption method and device and video decryption method and device
CN115208863A (en) * 2022-09-14 2022-10-18 浙江大华技术股份有限公司 Code stream encryption and decryption method, and related device, equipment, system and medium

Similar Documents

Publication Publication Date Title
CN109391463A (en) A kind of image encryption, decryption method, equipment and computer readable storage medium
Xu et al. A novel bit-level image encryption algorithm based on chaotic maps
CN101739695B (en) Three-dimensional Arnold mapping-based image grouping encryption method
Zhu et al. A chaos-based symmetric image encryption scheme using a bit-level permutation
CN106997606B (en) A kind of image encryption method based on hyperchaotic system Projective Synchronization
CN108234813A (en) Plaintext associated images Encryption Algorithm based on Hyperchaotic Chen System
CN103491279B (en) The 4-neighborhood XOR image encryption method of Hyperchaotic Lorenz system
CN107220923B (en) Digital picture feedback encryption method based on image network
CN106327414A (en) Plaintext feature-based double-chaos image encryption method
Feng et al. Cryptanalysis of the integrated chaotic systems based image encryption algorithm
CN106778304A (en) A kind of quick New chaotic image encryption method with related scramble mechanism in plain text
CN103440613B (en) The color image encrypting method of hyperchaos Rossler system
CN106100819B (en) Image encrypting and decrypting system and image encrypting and decrypting method
CN106651735A (en) Chaos theory-based digital image parallel encryption method
CN107094072A (en) A kind of mixed chaos encryption method based on general Henon Map
CN108932691A (en) More diffusion image encrypting and decrypting methods of quantum cellular neural chaos
CN107633474B (en) A kind of chaos color image encrypting method with fast key stream generating process
Sajitha et al. Review on various image encryption schemes
CN114389788B (en) Image encryption algorithm with mixed chaos and block scrambling
CN107578363A (en) Digital picture encipher-decipher method based on more chaos chain algorithms and bit plane
CN108174053B (en) Decryption area limited image encryption method based on oriented area and playing card mapping
CN104348611B (en) Melt file in the camouflage encryption method of image
CN107590843B (en) The image encryption method of the reversible cellular automata of two dimension based on construction
CN110213050A (en) Key generation method, device and storage medium
Dey et al. Linear‐feedback shift register‐based multi‐ant cellular automation and chaotic map‐based image encryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190226