CN109558701A - A kind of method of medical CT images secret sharing - Google Patents
A kind of method of medical CT images secret sharing Download PDFInfo
- Publication number
- CN109558701A CN109558701A CN201811353873.5A CN201811353873A CN109558701A CN 109558701 A CN109558701 A CN 109558701A CN 201811353873 A CN201811353873 A CN 201811353873A CN 109558701 A CN109558701 A CN 109558701A
- Authority
- CN
- China
- Prior art keywords
- images
- subgraph
- medical
- snowflake
- secret sharing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 19
- 239000011159 matrix material Substances 0.000 claims abstract description 34
- 241000533950 Leucojum Species 0.000 claims abstract description 23
- 238000002592 echocardiography Methods 0.000 claims abstract description 10
- 238000000354 decomposition reaction Methods 0.000 claims abstract description 8
- 238000013507 mapping Methods 0.000 claims abstract description 4
- 238000005215 recombination Methods 0.000 claims 1
- 230000006798 recombination Effects 0.000 claims 1
- 230000001737 promoting effect Effects 0.000 abstract 1
- 230000005540 biological transmission Effects 0.000 description 3
- 230000001351 cycling effect Effects 0.000 description 3
- 239000003814 drug Substances 0.000 description 3
- 239000000203 mixture Substances 0.000 description 3
- 206010038743 Restlessness Diseases 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 239000000284 extract Substances 0.000 description 2
- 101000911390 Homo sapiens Coagulation factor VIII Proteins 0.000 description 1
- 229910002056 binary alloy Inorganic materials 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 102000057593 human F8 Human genes 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
- 229940047431 recombinate Drugs 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000000638 solvent extraction Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16H—HEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
- G16H30/00—ICT specially adapted for the handling or processing of medical images
- G16H30/20—ICT specially adapted for the handling or processing of medical images for handling medical images, e.g. DICOM, HL7 or PACS
Abstract
The invention discloses a kind of methods of medical CT images secret sharing, this method includes encrypting stage and decryption phase, wherein in encrypting stage, clarity CT images subgraph corresponding with recipient's Permission Levels and a small matrix number are obtained by sparse singular value decomposition first, then the key of Logistic Map is obtained by the small matrix number and generates two chaos sequences using the mapping, shuffle operation is carried out to the location of pixels of CT images subgraph and obtains snowflake figure, then snowflake figure is divided by five function value matrixs by multinomial, finally element in function value matrix is embedded into low two of the camouflage figure that user selectes, obtain five width echoes.Through the above scheme, invention achieves the recipients for only obtaining five width echoes and the recipient for saving key to simultaneously participate in decryption, can Restore Secret CT images subgraph completely purpose, with very high practical value and promotional value.
Description
Technical field
The invention belongs to medical information security fields, in particular, being to be related to a kind of side of medical CT images secret sharing
Method.
Background technique
With the fast development of Tele medicine, more and more patients benefit from it.The remote transmission of CT images is
The important component of tele-medicine, with tele-medicine extensive use it is incident be a large amount of CT images on the internet
It stores and transmits.Since the acquisition cost of CT image is high, scientific research value is big, at the same it is certain in politics, military and economic field tool
Having the CT images of the very important person of larger impact power also has important privacy value.What CT images suffered from transmission process
It steals, distort and will cause huge loss.Therefore, carrying out encryption to it before transmitting CT images has extremely strong practical value.
The current CT images encipherment scheme disadvantage weak due to generally existing anti-plaintext or selectivity plaintext attack ability, is actually being answered
In can not effective protection CT images from stealing and distorting.Meanwhile current CT images encipherment scheme cannot be according to reception
The Permission Levels of side transmit the CT images subgraphs of different clarity, and the encrypted image that transmission obtains is often that approximate image is made an uproar
The snowflake figure of sound easily causes the interest of thief, and This further reduces its practical values.
Summary of the invention
The purpose of the present invention is to provide a kind of methods of medical CT images secret sharing, mainly solve to deposit in the prior art
CT images encipherment scheme due to generally existing anti-plaintext or the weak disadvantage of selective plaintext attack ability, in practical application
In can not effective protection CT images from stealing and distorting the problem of.
To achieve the goals above, The technical solution adopted by the invention is as follows:
A kind of method of medical CT images secret sharing, includes the following steps:
1) in encrypting stage, it is corresponding with recipient's Permission Levels that clarity is obtained by sparse singular value decomposition first
Then CT images subgraph and a small matrix number are obtained the key of Logistic Map and are used and be somebody's turn to do by the small matrix number
Mapping generates two chaos sequences, carries out shuffle operation to the location of pixels of CT images subgraph and obtains snowflake figure, then passes through
Snowflake figure is divided into five function value matrixs by multinomial, and the element in five function value matrixs is finally embedded into user and is selected
Five width camouflage low two of figure in, obtain corresponding five width echo;
2) in decryption phase, user passes through the different echo of five width of collection and extracts low two of these echoes, weight
Five function value matrixs of group, then obtain snowflake figure by look-up table, finally by key obtain used in scramble two it is mixed
Ignorant sequence will be restored by the location of pixels of scramble in snowflake figure with the two chaos sequences, obtain secret CT subgraph.
Further, it is corresponding with recipient's Permission Levels to obtain clarity for the sparse singular value decomposition in the step 1
CT images subgraph and a small matrix number be to complete to obtain clarity and recipient by way of being rounded element downwards
The matched CT subgraph of Permission Levels.
Further, a small matrix number in the step 1 is to be obtained by the key of Logistic Map
The decimal matrix B that size is M × N by modekBig four pieces such as it is divided into, obtaining four sizes isMinor matrix.
Further, four minor matrixs are respectively B1,k、B2,k、B3,k、B4,k, and μ is used respectively1、μ2、γ1、γ2It represents
Its mean value, wherein Bk(1,1) it is used as x0, Bk(m, n) is used as y0。
Further, multinomial is in the step 1
Specifically, the binary sequence of the pixel of multinomial corresponding position is recombinated in the step 1, specific weight
Group mode are as follows: a0=s8s7、a1=s6s5、a2=s4s3、a3=s2s1。
Compared with prior art, the invention has the following advantages:
The present invention can determine the levels of sharpness for the CT image to be encrypted to be transmitted according to the Permission Levels of recipient,
The CT image of different clarity corresponding key in encryption is different simultaneously, has accomplished that a figure one is close to the use of key, secret
The information of image is divided by the multinomial invented, and five partitioning portions that only gather together enough can restore secret figure completely
Picture, which allows the present invention to be highly resistant to plaintext attack or selective plaintext attack, and is replaced by low level by effective information
It is hidden into the low level of camouflage figure, constitutes echo.Simultaneously echo In the view of visually scheme with original common camouflage it is almost the same,
Even if stealer can also utmostly be reduced to the suspection in image including secret information by being stolen in transmit process.
Detailed description of the invention
Fig. 1 is cryptographic structure flow chart of the present invention.
Fig. 2 is present invention decryption structure flow chart.
(a) is the original CT images of the present invention in Fig. 3, and CT subgraph when (b) taking 300 for k (c) is that will obtain after the unrest of CT subgraph
The snowflake figure arrived.
Fig. 4 is the different camouflage figure of five width of a-e of the present invention.
Fig. 5 is the corresponding five width echo of Fig. 4.
Fig. 6 is the CT subgraph that present invention decryption obtains.
Specific embodiment
Present invention will be further explained below with reference to the attached drawings and examples, and embodiments of the present invention include but is not limited to
The following example.
Embodiment
As shown in Figures 1 to 6, a kind of method of medical CT images secret sharing, includes the following steps:
In encrypting stage, clarity CT corresponding with recipient's Permission Levels is obtained by sparse singular value decomposition first
Then image subgraph and a small matrix number are obtained the key of Logistic Map by the small matrix number and are reflected using this
It penetrates and generates two chaos sequences, shuffle operation is carried out to the location of pixels of CT images subgraph and obtain snowflake figure, then by more
Snowflake figure is divided into five function value matrixs by item formula, and element in function value matrix is finally embedded into the camouflage figure that user selectes
Low two in, obtain five width echoes;In decryption phase, user is by collecting the different echo of five width and extracting these yin
Low two of shadow figure, recombinate five function value matrixs, snowflake figure are then obtained by look-up table, is set finally by key
Two chaos sequences used in unrest will be restored by the location of pixels of scramble in snowflake figure with the two chaos sequences, obtain secret
CT subgraph.
(1) production of the CT subgraph of different clarity:
CT images (M × N) are input in encrypting module and carry out sparse singular value decomposition (sparse singular
Value decomposition, SSVD), obtain the outer product expansion of CT images matrix A Preceding k minor (k < N) is constitutedBy matrix AkIn each element
Downward floor operation is carried out, new INTEGER MATRICES A ' is obtainedkWith a decimal matrix Bk=Ak-A‘k.The value of k is bigger, obtains
Image closer to original image, original image is obtained as k=n, crosses CT images of the available different clarity of this kind of mode
Figure, while according to the Permission Levels of recipient, the CT images subgraph that sender can choose different clarity is fabricated to camouflage figure
It is sent to recipient, such as n=300, the outer product expansion of CT images matrix APreceding 300 minors are taken to constituteBy matrix A300In each element carry out downward floor operation, obtain new INTEGER MATRICES A '300
With a decimal matrix B300=A300-A‘300;
(2) scramble of CT subgraph:
The decimal matrix B for being 340 × 338 by size300Big four pieces such as it is divided into, obtaining four sizes isMinor matrix, enable it for B respectively1,300、B2,300、B3,300、B4,300.Seek B1,300、B2,300、B3,300、B4,300
Mean value and enable it be respectively equal to μ1、μ2、γ1、γ2.B is taken simultaneously300(1,1) it is used as x0, take B300(340,338) it is used as y0.?
Set μ1、μ2、γ1、γ2、x0And y0After this six initial parameters, the Logistic mapping in pairs of two dimension shown in formula (1) is called,
Generate two chaos sequence xm∈ { 1,2 ..., 340 }, m=1,2 ..., 340, yn∈ { 1,2 ..., 338 }, n=1,2 ... 338,
According to formula (m, n)=A '300(xm,yn), (m=1,2 ..., 340, n=1,2 ..., 338) is completed to A '300Location of pixels
Scramble obtains the snowflake figure after scramble;
(3) cutting of snowflake figure:
Binary sequence is converted by the decimal system by each pixel value of snowflake figure.For example, the pixel that m row n-th arranges
Value is (m, n)=s8s7s6s5s4s3s2s1, the corresponding multinomial of each pixel valueThe polynomial coefficient is respectively as follows: a0=s8s7、a1=s6s5、
a2=s4s3、a3=s2s1.All multinomials constitute one 340 × 338 polynomial matrix, then bring setting value x into respectively1
=1, x2=2, x3=3, x4=4, x5=5 arrive the polynomial matrix, respectively obtain five functional value matrix Fsi(i=1,2,3,4,
5), due to there are four types of the values of four coefficients, f (x1)、f(x2)、f(x3)、f(x4)、f(x5) share 4^4=256 kind group
It closes.Due to having carried out mod16 operation, F1、F2、F3、F4、F5All elements value in [0,15], simultaneously because F1In
Element by four two binary numbers carry out with or operation obtain, therefore F1The value range of middle element is [0,3].
(4)Fi(i=1,2,3,4,5) low two replacements with camouflage figure:
Following step is to randomly select 5 unworthy gray level image C as shown in Fig. 4 (a-e)1、C2、C3、C4、C5
As camouflage test, with above-mentioned 5 functional value matrix Fsi(i=1,2,3,4,5) carries out minimum 2 replacements, generates yin respectively
Shadow figure S1、S2、S3、S4、S5.Due to F2、F3、F4、F5The value of element be converted into binary system from the decimal system and at most have 4, need
Two pixels accommodate, therefore F2、F3、F4、F5C is schemed in corresponding camouflage2、C3、C4、C5It needs to be twice than original CT image.If
If the size of original CT image is 340 × 338, then pretend figure C2、C3、C4、C5It need to be 340 × 676.And C1It only need to be with original CT figure
As the size maintained like.
To C1It is minimum two replacement detailed processes it is as follows:
Input: camouflage figure C as shown in Figure 41, functional value matrix F1;
Output: echo S1。
Step 1: C is schemed into camouflage1Each pixel value be converted into 8 bit sequences, such as the pixel of m row n column
Value C1(m, n)=c8c7c6c5c4c3c2c1。
Step 2: by F1Each cycling of elements be 8 bit sequences, such as m row n column pixel value F1(m,n)
=000000f2f1。
Step 3: by C1Minimum two of (m, n) replace with F1Minimum two of (m, n), obtain S after replacement1(m, n)=
c8c7c6c5c4c3f2f1。
Step 4: repeating step 3 until C1Middle all pixels value is completed to replace.
Assuming that i ∈ { 2,3,4,5 }, m ∈ { 1,2 ..., 340 }, n ∈ { 1,2 ..., 388 }, to CiIt is minimum two replacement
Detailed process is as follows:
Input: camouflage figure C as shown in Figure 4i, functional value matrix Fi;
Output: echo Si。
Step 1: C is schemed into camouflageiEach pixel value be converted into 8 bit sequences, such as the pixel of m row n column
Value Ci(m, n)=c8c7c6c5c4c3c2c1;
Step 2: by FiEach cycling of elements be 8 bit sequences, such as m row n column pixel value Fi(m,n)
=0000f4f3f2f1, then take out FiMinimum three, four composition F of (m, n)i,1(m, n)=000000f4f3, take out Fi(m,n)
Minimum two compositions Fi,2(m, n)=000000f2f1;
Step 3: by CiMinimum two of (m, 2 × n-1) replace with Fi,1Minimum two of (m, n), obtain Si(m,2×n-
1)=c8c7c6c5c4c3f4f3;
Step 4: by CiMinimum two of (m, 2 × n) replace with Fi,2Minimum two of (m, n), obtain Si(m, 2 × n)=
c8c7c6c5c4c3f2f1;
Step 5: repeating step 3 and step 4 until CiIn all pixel value complete to replace.
Five echoes obtained after completion come completely the same with camouflage figure from the appearance, this, which is greatly reduced, causes
A possibility that thief's interest.
The detailed operational process of deciphering module is as follows:
The recovery of secret CT images subgraph needs the common participation of multiple recipients for possessing different rights, different rights etc.
The solution secret meeting that the recipient of grade and quantity participates in obtains Different Results, it is however generally that, there are several types of situations:
Situation 1: if a recipient for saving different echoes of only n (n < 5) participates in decryption, cannot obtain it is any about
The information of secret CT images subgraph;
Situation 2: if there are 5 recipients for saving different echoes to participate in decryption, scramble figure snowflake figure can be restored;
Situation 3: if thering are 5 recipients for saving different echoes and the recipient of preservation key to simultaneously participate in decryption, just
It can complete Restore Secret CT images subgraph.
Wherein the decryption step in situation 1,2 is all a part of the decryption step of situation 3.It is specifically described situation below
3 decryption step.
Input: 5 different echoes, key μ1、μ2、γ1、γ2、x0And y0;
Output: CT images subgraph.
Step 1: S is confirmed according to the size of image1, and will cycling of elements be wherein binary sequence, such as m row n is arranged
Element is S1(m, n)=s8s7s6s5s4s3s2s1, then extract minimum two compositions matrix F of all elements1Corresponding position
Element, such as F1(m, n)=000000s2s1;
Step 2: remaining four width shadow image is respectively designated as Sa、Sb、Sc、Sd, a, b, c, d ∈ { 2,3,4,5 }, and
Binary sequence, such as S are converted by all elements of this four matrixesbM row n column element is Sb(m, n)=
s8s7s6s5s4s3s2s1, then F is generated according to formula (2)a、Fb、Fc、Fd, a, b, c, d ∈ { 2,3,4,5 };
Step 3: from F1(1,1)、Fi(1,1), i=a, b, c, d start, and arrive F1(340,338)、Fi(340,338), i=a,
B, c, d, the value of corresponding four coefficients of F (m, n) is sequentially found by look-up table, and is reassembled as in the snowflake figure after scramble corresponding
The pixel of position.Snowflake figure after finally obtaining scramble;
Step 4: bringing key into Logistic Map, obtain the chaos sequence x of scramblem∈{1,2,…,340},m
=1,2 ..., 340, yn∈ { 1,2 ..., 338 }, n=1,2 ... 338, by the two chaos sequences by the pixel in snowflake figure
It is transferred to correct position, obtains secret CT images subgraph shown in fig. 6.
Above-described embodiment is merely a preferred embodiment of the present invention, and it is not intended to limit the protection scope of the present invention, as long as using
Design principle of the invention, and the non-creative variation worked and made is carried out on this basis, it should belong to of the invention
Within protection scope.
Claims (6)
1. a kind of method of medical CT images secret sharing, which comprises the steps of:
1) in encrypting stage, clarity CT shadow corresponding with recipient's Permission Levels is obtained by sparse singular value decomposition first
As subgraph and a small matrix number, the key of Logistic Map is then obtained by the small matrix number and uses the mapping
Two chaos sequences are generated, shuffle operation is carried out to the location of pixels of CT images subgraph and obtain snowflake figure, then by multinomial
Snowflake figure is divided into five function value matrixs by formula, the element in five function value matrixs is finally embedded into that user selectes five
Width pretends to obtain corresponding five width echo in low two of figure;
2) in decryption phase, user recombinates five by low two collecting the different echo of five width and extracting these echoes
A function value matrix, then obtains snowflake figure by look-up table, obtains two chaos sequences used in scramble finally by key
Column will be restored by the location of pixels of scramble in snowflake figure with the two chaos sequences, obtain secret CT subgraph.
2. a kind of method of medical CT images secret sharing according to claim 1, which is characterized in that in the step 1
Sparse singular value decomposition obtain clarity CT images subgraph corresponding with recipient's Permission Levels and a small matrix number is
It completes to obtain clarity and the matched CT subgraph of recipient's Permission Levels by way of being rounded element downwards.
3. a kind of method of medical CT images secret sharing according to claim 2, which is characterized in that in the step 1
A small matrix number be the decimal matrix B for being M × N by size in such a way that the key of Logistic Map obtainsk
Big four pieces such as it is divided into, obtaining four sizes isMinor matrix.
4. a kind of method of medical CT images secret sharing according to claim 3, which is characterized in that four small squares
Battle array is respectively B1,k、B2,k、B3,k、B4,k, and μ is used respectively1、μ2、γ1、γ2Its mean value is represented, wherein Bk(1,1) it is used as x0, Bk(m,
N) it is used as y0。
5. a kind of method of medical CT images secret sharing according to claim 4, which is characterized in that in the step 1
Multinomial is
6. a kind of method of medical CT images secret sharing according to claim 5, which is characterized in that in the step 1
The binary sequence of the pixel of multinomial corresponding position is recombinated, specific recombination form are as follows: a0=s8s7、a1=s6s5、
a2=s4s3、a3=s2s1。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811353873.5A CN109558701B (en) | 2018-11-14 | 2018-11-14 | Medical CT image secret sharing method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811353873.5A CN109558701B (en) | 2018-11-14 | 2018-11-14 | Medical CT image secret sharing method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109558701A true CN109558701A (en) | 2019-04-02 |
CN109558701B CN109558701B (en) | 2022-11-22 |
Family
ID=65866330
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811353873.5A Active CN109558701B (en) | 2018-11-14 | 2018-11-14 | Medical CT image secret sharing method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109558701B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113160944A (en) * | 2021-02-03 | 2021-07-23 | 江西财经大学 | Medical image sharing method based on block chain |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040223616A1 (en) * | 2003-04-07 | 2004-11-11 | Stmicroelectronics S.R.I. | Encryption process employing chaotic maps and digital signature process |
CN103530571A (en) * | 2013-09-25 | 2014-01-22 | 上海理工大学 | Image encryption method based on sine mapping and Logistic chaos sequence |
CN106600518A (en) * | 2016-11-23 | 2017-04-26 | 河南大学 | Image encryption method and image decryption method with visual security and data security based on compressed sensing |
CN107798708A (en) * | 2017-11-16 | 2018-03-13 | 深圳大学 | A kind of out of order codings of DNA and the image encryption and decryption method of chaotic maps |
CN108513135A (en) * | 2017-02-27 | 2018-09-07 | 诺基亚技术有限公司 | Image encryption and decryption |
CN108629728A (en) * | 2018-05-06 | 2018-10-09 | 北京工业大学 | A kind of high power capacity bianry image information concealing method |
-
2018
- 2018-11-14 CN CN201811353873.5A patent/CN109558701B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040223616A1 (en) * | 2003-04-07 | 2004-11-11 | Stmicroelectronics S.R.I. | Encryption process employing chaotic maps and digital signature process |
CN103530571A (en) * | 2013-09-25 | 2014-01-22 | 上海理工大学 | Image encryption method based on sine mapping and Logistic chaos sequence |
CN106600518A (en) * | 2016-11-23 | 2017-04-26 | 河南大学 | Image encryption method and image decryption method with visual security and data security based on compressed sensing |
CN108513135A (en) * | 2017-02-27 | 2018-09-07 | 诺基亚技术有限公司 | Image encryption and decryption |
CN107798708A (en) * | 2017-11-16 | 2018-03-13 | 深圳大学 | A kind of out of order codings of DNA and the image encryption and decryption method of chaotic maps |
CN108629728A (en) * | 2018-05-06 | 2018-10-09 | 北京工业大学 | A kind of high power capacity bianry image information concealing method |
Non-Patent Citations (3)
Title |
---|
R. M. SAFFARI等: "A novel image encryption algorithm based on discrete wavelet transform using two dimensional logistic map", 《2016 24TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE)》 * |
张定会等: "彩色数字图像的混沌加密和解密方法研究", 《通信技术》 * |
薛香莲等: "一种新的基于超混沌映射的图像融合加密算法", 《计算机安全》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113160944A (en) * | 2021-02-03 | 2021-07-23 | 江西财经大学 | Medical image sharing method based on block chain |
CN113160944B (en) * | 2021-02-03 | 2023-11-14 | 江西财经大学 | Medical image sharing method based on blockchain |
Also Published As
Publication number | Publication date |
---|---|
CN109558701B (en) | 2022-11-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Shankar et al. | RGB-based secure share creation in visual cryptography using optimal elliptic curve cryptography technique | |
Chen et al. | Cryptanalysis and improvement in an image encryption scheme using combination of the 1D chaotic map | |
Shankar et al. | RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography | |
CN105681622B (en) | A kind of color image encrypting method based on cell neural network hyperchaos and DNA sequence dna | |
CN101739695B (en) | Three-dimensional Arnold mapping-based image grouping encryption method | |
CN105513002B (en) | A kind of image encryption method | |
CN107274457B (en) | The encryption method of double color images based on DNA sequence dna operation and Coupling Deformation image grid | |
CN105847629A (en) | Reversible information hiding method for encrypted image | |
CN104468090A (en) | Chinese character password encoding method based on image pixel coordinates | |
CN103440613B (en) | The color image encrypting method of hyperchaos Rossler system | |
Abusukhon et al. | New direction of cryptography: A review on text-to-image encryption algorithms based on RGB color value | |
CN107392970B (en) | Digital image encryption method based on bit plane and high-dimensional chaotic system | |
CN106296560A (en) | A kind of multicolor image encryption algorithm of complex cascade chaos | |
CN106296561A (en) | Image encryption method based on hyperchaotic system and device, decryption method and device | |
CN106558015A (en) | A kind of new intersection composite chaotic multicolor image encryption algorithm | |
CN108898024B (en) | Encrypted image decryption method based on hyperchaotic system and automatic cell machine | |
CN105812614B (en) | More image encryptions and decryption method based on optical field imaging with digital refocusing technology | |
Singh et al. | Image encryption scheme based on Knight's tour problem | |
Kumar et al. | Image cryptography with matrix array symmetric key using chaos based approach | |
Wang et al. | Chaotic image encryption algorithm based on dynamic spiral scrambling transform and deoxyribonucleic acid encoding operation | |
CN114449127A (en) | Image encryption method based on controlled magic cube and alternate quantum walking | |
Sinha et al. | Chaotic image encryption scheme based on modified arnold cat map and henon map | |
Shankar et al. | Secure image transmission in wireless sensor network (WSN) applications | |
CN109558701A (en) | A kind of method of medical CT images secret sharing | |
Jabbar et al. | Property Comparison of Intellectual Property Rights of Image-Based on Encryption Techniques. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |