CN109558701A - A kind of method of medical CT images secret sharing - Google Patents

A kind of method of medical CT images secret sharing Download PDF

Info

Publication number
CN109558701A
CN109558701A CN201811353873.5A CN201811353873A CN109558701A CN 109558701 A CN109558701 A CN 109558701A CN 201811353873 A CN201811353873 A CN 201811353873A CN 109558701 A CN109558701 A CN 109558701A
Authority
CN
China
Prior art keywords
images
subgraph
medical
snowflake
secret sharing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811353873.5A
Other languages
Chinese (zh)
Other versions
CN109558701B (en
Inventor
刘明哲
赵飞翔
刘艳华
刘祥和
蒋鑫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Univeristy of Technology
Original Assignee
Chengdu Univeristy of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Univeristy of Technology filed Critical Chengdu Univeristy of Technology
Priority to CN201811353873.5A priority Critical patent/CN109558701B/en
Publication of CN109558701A publication Critical patent/CN109558701A/en
Application granted granted Critical
Publication of CN109558701B publication Critical patent/CN109558701B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H30/00ICT specially adapted for the handling or processing of medical images
    • G16H30/20ICT specially adapted for the handling or processing of medical images for handling medical images, e.g. DICOM, HL7 or PACS

Abstract

The invention discloses a kind of methods of medical CT images secret sharing, this method includes encrypting stage and decryption phase, wherein in encrypting stage, clarity CT images subgraph corresponding with recipient's Permission Levels and a small matrix number are obtained by sparse singular value decomposition first, then the key of Logistic Map is obtained by the small matrix number and generates two chaos sequences using the mapping, shuffle operation is carried out to the location of pixels of CT images subgraph and obtains snowflake figure, then snowflake figure is divided by five function value matrixs by multinomial, finally element in function value matrix is embedded into low two of the camouflage figure that user selectes, obtain five width echoes.Through the above scheme, invention achieves the recipients for only obtaining five width echoes and the recipient for saving key to simultaneously participate in decryption, can Restore Secret CT images subgraph completely purpose, with very high practical value and promotional value.

Description

A kind of method of medical CT images secret sharing
Technical field
The invention belongs to medical information security fields, in particular, being to be related to a kind of side of medical CT images secret sharing Method.
Background technique
With the fast development of Tele medicine, more and more patients benefit from it.The remote transmission of CT images is The important component of tele-medicine, with tele-medicine extensive use it is incident be a large amount of CT images on the internet It stores and transmits.Since the acquisition cost of CT image is high, scientific research value is big, at the same it is certain in politics, military and economic field tool Having the CT images of the very important person of larger impact power also has important privacy value.What CT images suffered from transmission process It steals, distort and will cause huge loss.Therefore, carrying out encryption to it before transmitting CT images has extremely strong practical value. The current CT images encipherment scheme disadvantage weak due to generally existing anti-plaintext or selectivity plaintext attack ability, is actually being answered In can not effective protection CT images from stealing and distorting.Meanwhile current CT images encipherment scheme cannot be according to reception The Permission Levels of side transmit the CT images subgraphs of different clarity, and the encrypted image that transmission obtains is often that approximate image is made an uproar The snowflake figure of sound easily causes the interest of thief, and This further reduces its practical values.
Summary of the invention
The purpose of the present invention is to provide a kind of methods of medical CT images secret sharing, mainly solve to deposit in the prior art CT images encipherment scheme due to generally existing anti-plaintext or the weak disadvantage of selective plaintext attack ability, in practical application In can not effective protection CT images from stealing and distorting the problem of.
To achieve the goals above, The technical solution adopted by the invention is as follows:
A kind of method of medical CT images secret sharing, includes the following steps:
1) in encrypting stage, it is corresponding with recipient's Permission Levels that clarity is obtained by sparse singular value decomposition first Then CT images subgraph and a small matrix number are obtained the key of Logistic Map and are used and be somebody's turn to do by the small matrix number Mapping generates two chaos sequences, carries out shuffle operation to the location of pixels of CT images subgraph and obtains snowflake figure, then passes through Snowflake figure is divided into five function value matrixs by multinomial, and the element in five function value matrixs is finally embedded into user and is selected Five width camouflage low two of figure in, obtain corresponding five width echo;
2) in decryption phase, user passes through the different echo of five width of collection and extracts low two of these echoes, weight Five function value matrixs of group, then obtain snowflake figure by look-up table, finally by key obtain used in scramble two it is mixed Ignorant sequence will be restored by the location of pixels of scramble in snowflake figure with the two chaos sequences, obtain secret CT subgraph.
Further, it is corresponding with recipient's Permission Levels to obtain clarity for the sparse singular value decomposition in the step 1 CT images subgraph and a small matrix number be to complete to obtain clarity and recipient by way of being rounded element downwards The matched CT subgraph of Permission Levels.
Further, a small matrix number in the step 1 is to be obtained by the key of Logistic Map The decimal matrix B that size is M × N by modekBig four pieces such as it is divided into, obtaining four sizes isMinor matrix.
Further, four minor matrixs are respectively B1,k、B2,k、B3,k、B4,k, and μ is used respectively1、μ2、γ1、γ2It represents Its mean value, wherein Bk(1,1) it is used as x0, Bk(m, n) is used as y0
Further, multinomial is in the step 1
Specifically, the binary sequence of the pixel of multinomial corresponding position is recombinated in the step 1, specific weight Group mode are as follows: a0=s8s7、a1=s6s5、a2=s4s3、a3=s2s1
Compared with prior art, the invention has the following advantages:
The present invention can determine the levels of sharpness for the CT image to be encrypted to be transmitted according to the Permission Levels of recipient, The CT image of different clarity corresponding key in encryption is different simultaneously, has accomplished that a figure one is close to the use of key, secret The information of image is divided by the multinomial invented, and five partitioning portions that only gather together enough can restore secret figure completely Picture, which allows the present invention to be highly resistant to plaintext attack or selective plaintext attack, and is replaced by low level by effective information It is hidden into the low level of camouflage figure, constitutes echo.Simultaneously echo In the view of visually scheme with original common camouflage it is almost the same, Even if stealer can also utmostly be reduced to the suspection in image including secret information by being stolen in transmit process.
Detailed description of the invention
Fig. 1 is cryptographic structure flow chart of the present invention.
Fig. 2 is present invention decryption structure flow chart.
(a) is the original CT images of the present invention in Fig. 3, and CT subgraph when (b) taking 300 for k (c) is that will obtain after the unrest of CT subgraph The snowflake figure arrived.
Fig. 4 is the different camouflage figure of five width of a-e of the present invention.
Fig. 5 is the corresponding five width echo of Fig. 4.
Fig. 6 is the CT subgraph that present invention decryption obtains.
Specific embodiment
Present invention will be further explained below with reference to the attached drawings and examples, and embodiments of the present invention include but is not limited to The following example.
Embodiment
As shown in Figures 1 to 6, a kind of method of medical CT images secret sharing, includes the following steps:
In encrypting stage, clarity CT corresponding with recipient's Permission Levels is obtained by sparse singular value decomposition first Then image subgraph and a small matrix number are obtained the key of Logistic Map by the small matrix number and are reflected using this It penetrates and generates two chaos sequences, shuffle operation is carried out to the location of pixels of CT images subgraph and obtain snowflake figure, then by more Snowflake figure is divided into five function value matrixs by item formula, and element in function value matrix is finally embedded into the camouflage figure that user selectes Low two in, obtain five width echoes;In decryption phase, user is by collecting the different echo of five width and extracting these yin Low two of shadow figure, recombinate five function value matrixs, snowflake figure are then obtained by look-up table, is set finally by key Two chaos sequences used in unrest will be restored by the location of pixels of scramble in snowflake figure with the two chaos sequences, obtain secret CT subgraph.
(1) production of the CT subgraph of different clarity:
CT images (M × N) are input in encrypting module and carry out sparse singular value decomposition (sparse singular Value decomposition, SSVD), obtain the outer product expansion of CT images matrix A Preceding k minor (k < N) is constitutedBy matrix AkIn each element Downward floor operation is carried out, new INTEGER MATRICES A ' is obtainedkWith a decimal matrix Bk=Ak-A‘k.The value of k is bigger, obtains Image closer to original image, original image is obtained as k=n, crosses CT images of the available different clarity of this kind of mode Figure, while according to the Permission Levels of recipient, the CT images subgraph that sender can choose different clarity is fabricated to camouflage figure It is sent to recipient, such as n=300, the outer product expansion of CT images matrix APreceding 300 minors are taken to constituteBy matrix A300In each element carry out downward floor operation, obtain new INTEGER MATRICES A '300 With a decimal matrix B300=A300-A‘300
(2) scramble of CT subgraph:
The decimal matrix B for being 340 × 338 by size300Big four pieces such as it is divided into, obtaining four sizes isMinor matrix, enable it for B respectively1,300、B2,300、B3,300、B4,300.Seek B1,300、B2,300、B3,300、B4,300 Mean value and enable it be respectively equal to μ1、μ2、γ1、γ2.B is taken simultaneously300(1,1) it is used as x0, take B300(340,338) it is used as y0.? Set μ1、μ2、γ1、γ2、x0And y0After this six initial parameters, the Logistic mapping in pairs of two dimension shown in formula (1) is called, Generate two chaos sequence xm∈ { 1,2 ..., 340 }, m=1,2 ..., 340, yn∈ { 1,2 ..., 338 }, n=1,2 ... 338, According to formula (m, n)=A '300(xm,yn), (m=1,2 ..., 340, n=1,2 ..., 338) is completed to A '300Location of pixels Scramble obtains the snowflake figure after scramble;
(3) cutting of snowflake figure:
Binary sequence is converted by the decimal system by each pixel value of snowflake figure.For example, the pixel that m row n-th arranges Value is (m, n)=s8s7s6s5s4s3s2s1, the corresponding multinomial of each pixel valueThe polynomial coefficient is respectively as follows: a0=s8s7、a1=s6s5、 a2=s4s3、a3=s2s1.All multinomials constitute one 340 × 338 polynomial matrix, then bring setting value x into respectively1 =1, x2=2, x3=3, x4=4, x5=5 arrive the polynomial matrix, respectively obtain five functional value matrix Fsi(i=1,2,3,4, 5), due to there are four types of the values of four coefficients, f (x1)、f(x2)、f(x3)、f(x4)、f(x5) share 4^4=256 kind group It closes.Due to having carried out mod16 operation, F1、F2、F3、F4、F5All elements value in [0,15], simultaneously because F1In Element by four two binary numbers carry out with or operation obtain, therefore F1The value range of middle element is [0,3].
(4)Fi(i=1,2,3,4,5) low two replacements with camouflage figure:
Following step is to randomly select 5 unworthy gray level image C as shown in Fig. 4 (a-e)1、C2、C3、C4、C5 As camouflage test, with above-mentioned 5 functional value matrix Fsi(i=1,2,3,4,5) carries out minimum 2 replacements, generates yin respectively Shadow figure S1、S2、S3、S4、S5.Due to F2、F3、F4、F5The value of element be converted into binary system from the decimal system and at most have 4, need Two pixels accommodate, therefore F2、F3、F4、F5C is schemed in corresponding camouflage2、C3、C4、C5It needs to be twice than original CT image.If If the size of original CT image is 340 × 338, then pretend figure C2、C3、C4、C5It need to be 340 × 676.And C1It only need to be with original CT figure As the size maintained like.
To C1It is minimum two replacement detailed processes it is as follows:
Input: camouflage figure C as shown in Figure 41, functional value matrix F1
Output: echo S1
Step 1: C is schemed into camouflage1Each pixel value be converted into 8 bit sequences, such as the pixel of m row n column Value C1(m, n)=c8c7c6c5c4c3c2c1
Step 2: by F1Each cycling of elements be 8 bit sequences, such as m row n column pixel value F1(m,n) =000000f2f1
Step 3: by C1Minimum two of (m, n) replace with F1Minimum two of (m, n), obtain S after replacement1(m, n)= c8c7c6c5c4c3f2f1
Step 4: repeating step 3 until C1Middle all pixels value is completed to replace.
Assuming that i ∈ { 2,3,4,5 }, m ∈ { 1,2 ..., 340 }, n ∈ { 1,2 ..., 388 }, to CiIt is minimum two replacement Detailed process is as follows:
Input: camouflage figure C as shown in Figure 4i, functional value matrix Fi
Output: echo Si
Step 1: C is schemed into camouflageiEach pixel value be converted into 8 bit sequences, such as the pixel of m row n column Value Ci(m, n)=c8c7c6c5c4c3c2c1
Step 2: by FiEach cycling of elements be 8 bit sequences, such as m row n column pixel value Fi(m,n) =0000f4f3f2f1, then take out FiMinimum three, four composition F of (m, n)i,1(m, n)=000000f4f3, take out Fi(m,n) Minimum two compositions Fi,2(m, n)=000000f2f1
Step 3: by CiMinimum two of (m, 2 × n-1) replace with Fi,1Minimum two of (m, n), obtain Si(m,2×n- 1)=c8c7c6c5c4c3f4f3
Step 4: by CiMinimum two of (m, 2 × n) replace with Fi,2Minimum two of (m, n), obtain Si(m, 2 × n)= c8c7c6c5c4c3f2f1
Step 5: repeating step 3 and step 4 until CiIn all pixel value complete to replace.
Five echoes obtained after completion come completely the same with camouflage figure from the appearance, this, which is greatly reduced, causes A possibility that thief's interest.
The detailed operational process of deciphering module is as follows:
The recovery of secret CT images subgraph needs the common participation of multiple recipients for possessing different rights, different rights etc. The solution secret meeting that the recipient of grade and quantity participates in obtains Different Results, it is however generally that, there are several types of situations:
Situation 1: if a recipient for saving different echoes of only n (n < 5) participates in decryption, cannot obtain it is any about The information of secret CT images subgraph;
Situation 2: if there are 5 recipients for saving different echoes to participate in decryption, scramble figure snowflake figure can be restored;
Situation 3: if thering are 5 recipients for saving different echoes and the recipient of preservation key to simultaneously participate in decryption, just It can complete Restore Secret CT images subgraph.
Wherein the decryption step in situation 1,2 is all a part of the decryption step of situation 3.It is specifically described situation below 3 decryption step.
Input: 5 different echoes, key μ1、μ2、γ1、γ2、x0And y0
Output: CT images subgraph.
Step 1: S is confirmed according to the size of image1, and will cycling of elements be wherein binary sequence, such as m row n is arranged Element is S1(m, n)=s8s7s6s5s4s3s2s1, then extract minimum two compositions matrix F of all elements1Corresponding position Element, such as F1(m, n)=000000s2s1
Step 2: remaining four width shadow image is respectively designated as Sa、Sb、Sc、Sd, a, b, c, d ∈ { 2,3,4,5 }, and Binary sequence, such as S are converted by all elements of this four matrixesbM row n column element is Sb(m, n)= s8s7s6s5s4s3s2s1, then F is generated according to formula (2)a、Fb、Fc、Fd, a, b, c, d ∈ { 2,3,4,5 };
Step 3: from F1(1,1)、Fi(1,1), i=a, b, c, d start, and arrive F1(340,338)、Fi(340,338), i=a, B, c, d, the value of corresponding four coefficients of F (m, n) is sequentially found by look-up table, and is reassembled as in the snowflake figure after scramble corresponding The pixel of position.Snowflake figure after finally obtaining scramble;
Step 4: bringing key into Logistic Map, obtain the chaos sequence x of scramblem∈{1,2,…,340},m =1,2 ..., 340, yn∈ { 1,2 ..., 338 }, n=1,2 ... 338, by the two chaos sequences by the pixel in snowflake figure It is transferred to correct position, obtains secret CT images subgraph shown in fig. 6.
Above-described embodiment is merely a preferred embodiment of the present invention, and it is not intended to limit the protection scope of the present invention, as long as using Design principle of the invention, and the non-creative variation worked and made is carried out on this basis, it should belong to of the invention Within protection scope.

Claims (6)

1. a kind of method of medical CT images secret sharing, which comprises the steps of:
1) in encrypting stage, clarity CT shadow corresponding with recipient's Permission Levels is obtained by sparse singular value decomposition first As subgraph and a small matrix number, the key of Logistic Map is then obtained by the small matrix number and uses the mapping Two chaos sequences are generated, shuffle operation is carried out to the location of pixels of CT images subgraph and obtain snowflake figure, then by multinomial Snowflake figure is divided into five function value matrixs by formula, the element in five function value matrixs is finally embedded into that user selectes five Width pretends to obtain corresponding five width echo in low two of figure;
2) in decryption phase, user recombinates five by low two collecting the different echo of five width and extracting these echoes A function value matrix, then obtains snowflake figure by look-up table, obtains two chaos sequences used in scramble finally by key Column will be restored by the location of pixels of scramble in snowflake figure with the two chaos sequences, obtain secret CT subgraph.
2. a kind of method of medical CT images secret sharing according to claim 1, which is characterized in that in the step 1 Sparse singular value decomposition obtain clarity CT images subgraph corresponding with recipient's Permission Levels and a small matrix number is It completes to obtain clarity and the matched CT subgraph of recipient's Permission Levels by way of being rounded element downwards.
3. a kind of method of medical CT images secret sharing according to claim 2, which is characterized in that in the step 1 A small matrix number be the decimal matrix B for being M × N by size in such a way that the key of Logistic Map obtainsk Big four pieces such as it is divided into, obtaining four sizes isMinor matrix.
4. a kind of method of medical CT images secret sharing according to claim 3, which is characterized in that four small squares Battle array is respectively B1,k、B2,k、B3,k、B4,k, and μ is used respectively1、μ2、γ1、γ2Its mean value is represented, wherein Bk(1,1) it is used as x0, Bk(m, N) it is used as y0
5. a kind of method of medical CT images secret sharing according to claim 4, which is characterized in that in the step 1 Multinomial is
6. a kind of method of medical CT images secret sharing according to claim 5, which is characterized in that in the step 1 The binary sequence of the pixel of multinomial corresponding position is recombinated, specific recombination form are as follows: a0=s8s7、a1=s6s5、 a2=s4s3、a3=s2s1
CN201811353873.5A 2018-11-14 2018-11-14 Medical CT image secret sharing method Active CN109558701B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811353873.5A CN109558701B (en) 2018-11-14 2018-11-14 Medical CT image secret sharing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811353873.5A CN109558701B (en) 2018-11-14 2018-11-14 Medical CT image secret sharing method

Publications (2)

Publication Number Publication Date
CN109558701A true CN109558701A (en) 2019-04-02
CN109558701B CN109558701B (en) 2022-11-22

Family

ID=65866330

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811353873.5A Active CN109558701B (en) 2018-11-14 2018-11-14 Medical CT image secret sharing method

Country Status (1)

Country Link
CN (1) CN109558701B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113160944A (en) * 2021-02-03 2021-07-23 江西财经大学 Medical image sharing method based on block chain

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040223616A1 (en) * 2003-04-07 2004-11-11 Stmicroelectronics S.R.I. Encryption process employing chaotic maps and digital signature process
CN103530571A (en) * 2013-09-25 2014-01-22 上海理工大学 Image encryption method based on sine mapping and Logistic chaos sequence
CN106600518A (en) * 2016-11-23 2017-04-26 河南大学 Image encryption method and image decryption method with visual security and data security based on compressed sensing
CN107798708A (en) * 2017-11-16 2018-03-13 深圳大学 A kind of out of order codings of DNA and the image encryption and decryption method of chaotic maps
CN108513135A (en) * 2017-02-27 2018-09-07 诺基亚技术有限公司 Image encryption and decryption
CN108629728A (en) * 2018-05-06 2018-10-09 北京工业大学 A kind of high power capacity bianry image information concealing method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040223616A1 (en) * 2003-04-07 2004-11-11 Stmicroelectronics S.R.I. Encryption process employing chaotic maps and digital signature process
CN103530571A (en) * 2013-09-25 2014-01-22 上海理工大学 Image encryption method based on sine mapping and Logistic chaos sequence
CN106600518A (en) * 2016-11-23 2017-04-26 河南大学 Image encryption method and image decryption method with visual security and data security based on compressed sensing
CN108513135A (en) * 2017-02-27 2018-09-07 诺基亚技术有限公司 Image encryption and decryption
CN107798708A (en) * 2017-11-16 2018-03-13 深圳大学 A kind of out of order codings of DNA and the image encryption and decryption method of chaotic maps
CN108629728A (en) * 2018-05-06 2018-10-09 北京工业大学 A kind of high power capacity bianry image information concealing method

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
R. M. SAFFARI等: "A novel image encryption algorithm based on discrete wavelet transform using two dimensional logistic map", 《2016 24TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE)》 *
张定会等: "彩色数字图像的混沌加密和解密方法研究", 《通信技术》 *
薛香莲等: "一种新的基于超混沌映射的图像融合加密算法", 《计算机安全》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113160944A (en) * 2021-02-03 2021-07-23 江西财经大学 Medical image sharing method based on block chain
CN113160944B (en) * 2021-02-03 2023-11-14 江西财经大学 Medical image sharing method based on blockchain

Also Published As

Publication number Publication date
CN109558701B (en) 2022-11-22

Similar Documents

Publication Publication Date Title
Shankar et al. RGB-based secure share creation in visual cryptography using optimal elliptic curve cryptography technique
Chen et al. Cryptanalysis and improvement in an image encryption scheme using combination of the 1D chaotic map
Shankar et al. RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography
CN105681622B (en) A kind of color image encrypting method based on cell neural network hyperchaos and DNA sequence dna
CN101739695B (en) Three-dimensional Arnold mapping-based image grouping encryption method
CN105513002B (en) A kind of image encryption method
CN107274457B (en) The encryption method of double color images based on DNA sequence dna operation and Coupling Deformation image grid
CN105847629A (en) Reversible information hiding method for encrypted image
CN104468090A (en) Chinese character password encoding method based on image pixel coordinates
CN103440613B (en) The color image encrypting method of hyperchaos Rossler system
Abusukhon et al. New direction of cryptography: A review on text-to-image encryption algorithms based on RGB color value
CN107392970B (en) Digital image encryption method based on bit plane and high-dimensional chaotic system
CN106296560A (en) A kind of multicolor image encryption algorithm of complex cascade chaos
CN106296561A (en) Image encryption method based on hyperchaotic system and device, decryption method and device
CN106558015A (en) A kind of new intersection composite chaotic multicolor image encryption algorithm
CN108898024B (en) Encrypted image decryption method based on hyperchaotic system and automatic cell machine
CN105812614B (en) More image encryptions and decryption method based on optical field imaging with digital refocusing technology
Singh et al. Image encryption scheme based on Knight's tour problem
Kumar et al. Image cryptography with matrix array symmetric key using chaos based approach
Wang et al. Chaotic image encryption algorithm based on dynamic spiral scrambling transform and deoxyribonucleic acid encoding operation
CN114449127A (en) Image encryption method based on controlled magic cube and alternate quantum walking
Sinha et al. Chaotic image encryption scheme based on modified arnold cat map and henon map
Shankar et al. Secure image transmission in wireless sensor network (WSN) applications
CN109558701A (en) A kind of method of medical CT images secret sharing
Jabbar et al. Property Comparison of Intellectual Property Rights of Image-Based on Encryption Techniques.

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant