CN109558701B - Medical CT image secret sharing method - Google Patents

Medical CT image secret sharing method Download PDF

Info

Publication number
CN109558701B
CN109558701B CN201811353873.5A CN201811353873A CN109558701B CN 109558701 B CN109558701 B CN 109558701B CN 201811353873 A CN201811353873 A CN 201811353873A CN 109558701 B CN109558701 B CN 109558701B
Authority
CN
China
Prior art keywords
image
matrix
snowflake
value
shadow
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811353873.5A
Other languages
Chinese (zh)
Other versions
CN109558701A (en
Inventor
刘明哲
赵飞翔
刘艳华
刘祥和
蒋鑫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Univeristy of Technology
Original Assignee
Chengdu Univeristy of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Univeristy of Technology filed Critical Chengdu Univeristy of Technology
Priority to CN201811353873.5A priority Critical patent/CN109558701B/en
Publication of CN109558701A publication Critical patent/CN109558701A/en
Application granted granted Critical
Publication of CN109558701B publication Critical patent/CN109558701B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H30/00ICT specially adapted for the handling or processing of medical images
    • G16H30/20ICT specially adapted for the handling or processing of medical images for handling medical images, e.g. DICOM, HL7 or PACS

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Nuclear Medicine, Radiotherapy & Molecular Imaging (AREA)
  • Epidemiology (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Radiology & Medical Imaging (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Primary Health Care (AREA)
  • Public Health (AREA)
  • Image Processing (AREA)
  • Apparatus For Radiation Diagnosis (AREA)

Abstract

The invention discloses a medical CT image secret sharing method which comprises an encryption stage and a decryption stage, wherein in the encryption stage, a CT image subgraph and a decimal matrix with the definition corresponding to the authority level of a receiver are obtained through sparse singular value decomposition, then a key of two-dimensional Logistic mapping is obtained through the decimal matrix, two chaotic sequences are generated through the mapping, the pixel position of the CT image subgraph is scrambled to obtain a snowflake graph, then the snowflake graph is divided into five function value matrixes through a polynomial, and finally elements in the function value matrixes are embedded into the lower two positions of a camouflage graph selected by a user to obtain five shadow graphs. By the scheme, the invention achieves the aim of completely recovering the secret CT image subgraph only by simultaneously participating in decryption by the receiver obtaining the five shadow images and the receiver storing the secret key, and has very high practical value and popularization value.

Description

Medical CT image secret sharing method
Technical Field
The invention belongs to the field of medical information security, and particularly relates to a medical CT image secret sharing method.
Background
With the rapid development of telemedicine technology, more and more patients benefit from it. Telemedicine is an important component of telemedicine, and the widespread use of telemedicine is accompanied by the storage and transmission of large numbers of CT images over the internet. Due to the high acquisition cost and high scientific research value of the CT images, the CT images of some important figures with great influence in the fields of politics, military affairs and economy also have important confidentiality value. The theft and tampering of the CT image during transmission can cause huge losses. Therefore, the CT image is encrypted before being transmitted, so that the CT image has extremely high practical value. The current CT image encryption scheme cannot effectively protect CT images from being stolen and tampered in practical application due to the ubiquitous defect of weak ability to resist plaintext or selective plaintext attack. Meanwhile, the current CT image encryption scheme cannot transmit CT image subgraphs with different definitions according to the authority level of a receiver, and the transmitted encrypted image is often a snowflake image similar to image noise, so that the interest of a thief is easily aroused, and the practical value of the CT image encryption scheme is further reduced.
Disclosure of Invention
The invention aims to provide a medical CT image secret sharing method, which mainly solves the problem that in the prior art, a CT image encryption scheme cannot effectively protect CT images from being stolen and tampered in practical application due to the defect of poor plaintext or selective plaintext attack resistance generally existing in the prior art.
In order to achieve the purpose, the technical scheme adopted by the invention is as follows:
a secret sharing method for medical CT images comprises the following steps:
1) In the encryption stage, firstly, a CT image subgraph and a decimal matrix with the definition corresponding to the authority level of a receiver are obtained through sparse singular value decomposition, then a key of two-dimensional Logistic mapping is obtained through the decimal matrix, two chaotic sequences are generated through the mapping, scrambling operation is carried out on the pixel position of the CT image subgraph to obtain a snowflake graph, then the snowflake graph is divided into five function value matrixes through a polynomial, and finally elements in the five function value matrixes are embedded into the lower two bits of the five camouflage graphs selected by a user to obtain the corresponding five shadow graphs;
2) In the decryption stage, a user recombines five function value matrixes by collecting five different shadow maps and extracting the lower two bits of the shadow maps, then obtains the snowflake map by a table look-up method, finally obtains two chaotic sequences used for scrambling by a secret key, and restores the scrambled pixel positions in the snowflake map by the two chaotic sequences to obtain the secret CT subgraph.
Further, the sparse singular value decomposition in the step 1 obtains a CT image subgraph with the definition corresponding to the authority level of the receiver and a decimal matrix, and the acquisition of the CT subgraph with the definition matched with the authority level of the receiver is completed by rounding elements downwards.
Further, one decimal matrix in step 1 is a decimal matrix B with a size of M × N obtained by means of key acquisition of two-dimensional Logistic mapping k Dividing into four equal blocks to obtain four blocks with equal size
Figure BDA0001865580120000021
A small matrix of (a).
Further, the four small matrixes are respectively B 1,k 、B 2,k 、B 3,k 、B 4,k And respectively use mu 1 、μ 2 、γ 1 、γ 2 Represents the mean value thereof, wherein B k (1, 1) as x 0 ,B k (m, n) as y 0
Further, the polynomial in the step 1 is
Figure BDA0001865580120000022
Specifically, in step 1, the binary sequence of the pixel point at the position corresponding to the polynomial is recombined in the following specific manner: a is a 0 =s 8 s 7 、a 1 =s 6 s 5 、a 2 =s 4 s 3 、a 3 =s 2 s 1
Compared with the prior art, the invention has the following beneficial effects:
the invention can determine the definition grade of the CT image to be encrypted to be transmitted according to the authority grade of a receiver, meanwhile, the CT images with different definitions have different corresponding keys when being encrypted, the use of the keys is realized by one figure and one secret, the information of the secret image is divided by the polynomial of the invention, and the secret image can be completely restored only by making up five divided parts. Meanwhile, the shadow map is basically consistent with the original common camouflage map seen by naked eyes, and the suspicion that an eavesdropper suspects that the image contains the secret information can be reduced to the maximum extent even if the shadow map is stolen in the transmission process.
Drawings
FIG. 1 is a flow chart of an encryption scheme of the present invention.
FIG. 2 is a flowchart of the decryption structure according to the present invention.
FIG. 3 shows (a) the original CT image of the present invention, (b) the CT sub-image with k taken at 300 times, and (c) the snowflake image obtained by scrambling the CT sub-images.
Fig. 4 shows five different camouflage images a-e according to the invention.
Fig. 5 is five shadow images corresponding to fig. 4.
FIG. 6 is a CT sub-graph obtained by decryption according to the present invention.
Detailed Description
The present invention is further illustrated by the following figures and examples, which include, but are not limited to, the following examples.
Examples
As shown in fig. 1 to 6, a method for secret sharing of medical CT images includes the following steps:
in the encryption stage, a CT image subgraph and a decimal matrix with the definition corresponding to the authority level of a receiver are obtained through sparse singular value decomposition, then a key of two-dimensional Logistic mapping is obtained through the decimal matrix, two chaotic sequences are generated through the mapping, scrambling operation is carried out on the pixel position of the CT image subgraph to obtain a snowflake graph, then the snowflake graph is divided into five function value matrixes through a polynomial, and finally elements in the function value matrixes are embedded into the lower two bits of the camouflage graph selected by a user to obtain five shadow graphs; in a decryption stage, a user recombines five function value matrixes by collecting five different shadow maps and extracting low two bits of the shadow maps, then obtains a snowflake map by a table look-up method, finally obtains two chaotic sequences used for scrambling by a secret key, and restores the scrambled pixel positions in the snowflake map by the two chaotic sequences to obtain a secret CT sub-map.
(1) And (3) making CT sub-images with different definitions:
inputting the CT image (M multiplied by N) into an encryption module to carry out Sparse Single Value Decomposition (SSVD) to obtain an outer product expansion formula of a CT image matrix A
Figure BDA0001865580120000031
Figure BDA0001865580120000032
Front k sub-formula (k)<N) is formed
Figure BDA0001865580120000033
Will matrix A k Each element of the array is subjected to a down rounding operation to obtain a new integer matrix A' k And a decimal matrix B k =A k -A‘ k . The larger the value of k is, the closer the obtained image is to the original image, the original image is obtained when k = n, CT image subgraphs with different definitions can be obtained by the method, meanwhile, according to the authority level of the receiver, the sender can select the CT image subgraphs with different definitions to make a camouflage image and send the camouflage image to the receiver, for example, when n =300, the outer product expansion of the CT image matrix A is
Figure BDA0001865580120000041
Form by taking the first 300 pieces
Figure BDA0001865580120000042
Will matrix A 300 Performing a rounding down operation on each element to obtain a new integer matrix A' 300 And a decimal matrix B 300 =A 300 -A‘ 300
(2) Scrambling of CT subgraphs:
a decimal matrix B with the size of 340 multiplied by 338 300 Divided into four equal-sized blocks to obtain four blocks with equal sizes
Figure BDA0001865580120000043
Respectively let it be B 1,300 、B 2,300 、B 3,300 、B 4,300 . Finding B 1,300 、B 2,300 、B 3,300 、B 4,300 And are respectively made equal to mu 1 、μ 2 、γ 1 、γ 2 . Get B at the same time 300 (1, 1) as x 0 Taking out B 300 (340, 338) as y 0 . At a setting of mu 1 、μ 2 、γ 1 、γ 2 、x 0 And y 0 After the six initial parameters, calling two-dimensional pairwise Logistic mapping shown in formula (1) to generate two chaotic sequences x m ∈{1,2,…,340},m=1,2,…,340,y n E {1,2, \ 8230;, 338}, n =1,2, \8230; 338, according to the formula (m, n) = A' 300 (x m ,y n ) (m =1,2, \ 8230;, 340,n =1,2, \ 8230;, 338) to accomplish the pair A' 300 Scrambling the pixel positions to obtain a snowflake image after scrambling;
Figure BDA0001865580120000044
(3) Cutting of snowflake pattern:
each pixel value of the snowflake map is converted into a binary sequence by decimal. For example, the pixel value of the mth row and nth column is (m, n) = s 8 s 7 s 6 s 5 s 4 s 3 s 2 s 1 Each pixel value corresponding to a polynomial
Figure BDA0001865580120000045
The coefficients of the polynomial are respectively a 0 =s 8 s 7 、a 1 =s 6 s 5 、a 2 =s 4 s 3 、a 3 =s 2 s 1 . All polynomials form a 340X 338 polynomial matrix, which is then respectively substituted into the set value x 1 =1、x 2 =2、x 3 =3、x 4 =4、x 5 =5 to the polynomial matrix, to obtain five function value matrices F, respectively i (i =1,2,3,4,5), f (x) is given by four coefficients, four of which take on values 1 )、f(x 2 )、f(x 3 )、f(x 4 )、f(x 5 ) There are 4^4=256 combinations. Since mod16 operation is performed, F 1 、F 2 、F 3 、F 4 、F 5 All elements of (2) have values of [0,15 ]]While due to F 1 The middle elements are each OR-ed by four two-bit binary numbers, thus F 1 The value range of the medium element is [0,3 ]]。
(4)F i (i =1,2,3,4,5) and the lower two-bit substitution of the camouflage pattern:
the next step is to randomly pick 5 worthless grayscale images C as shown in FIG. 4 (a-e) 1 、C 2 、C 3 、C 4 、C 5 As a dummy image, the 5 function value matrixes F i (i =1,2,3,4,5) the lowest 2 bits are replaced, and a shadow map S is generated respectively 1 、S 2 、S 3 、S 4 、S 5 . Due to F 2 、F 3 、F 4 、F 5 The value of the element(s) of (1) is converted from decimal to binary with a maximum of 4 bits, requiring two pixel points to accommodate, thus F 2 、F 3 、F 4 、F 5 Corresponding camouflage figure C 2 、C 3 、C 4 、C 5 It needs to be twice as large as the original CT image. If the size of the original CT image is 340 × 338, the camouflage image C 2 、C 3 、C 4 、C 5 It is required to be 340 × 676. And C 1 It is only necessary to maintain the same size as the original CT image.
To C 1 The specific flow of the lowest two-bit replacement is as follows:
inputting: camouflage figure C as shown in figure 4 1 Matrix of function values F 1
And (3) outputting: shadow map S 1
Step 1, camouflage painting C 1 Each pixel value of (a) is converted into an 8-bit binary number sequence, e.g.Pixel value C of m row and n column 1 (m,n)=c 8 c 7 c 6 c 5 c 4 c 3 c 2 c 1
Step 2, F is 1 Is converted into an 8-bit binary number sequence, e.g. pixel value F of the m-th row and n-th column 1 (m,n)=000000f 2 f 1
Step 3, adding C 1 The lowest two bits of (m, n) are replaced by F 1 The lowest two bits of (m, n) are replaced to obtain S 1 (m,n)=c 8 c 7 c 6 c 5 c 4 c 3 f 2 f 1
Step 4, repeating the step 3 till C 1 All pixel values in the group are replaced.
Suppose i is equal to {2,3,4,5}, m is equal to {1,2, \8230, 340}, n is equal to {1,2, \8230, 388}, and for C i The specific flow of the lowest two-bit replacement is as follows:
inputting: camouflage C as shown in FIG. 4 i Matrix of function values F i
And (3) outputting: shadow map S i
Step 1, camouflage pattern C i Each pixel value of (a) is converted into an 8-bit binary number sequence, e.g. a pixel value C of the m-th row and n-th column i (m,n)=c 8 c 7 c 6 c 5 c 4 c 3 c 2 c 1
Step 2, F is added i Is converted into an 8-bit binary number sequence, e.g. pixel value F of the m-th row and n-th column i (m,n)=0000f 4 f 3 f 2 f 1 Then taking out F i The lowest three or four bits of (m, n) form F i,1 (m,n)=000000f 4 f 3 Taking out F i The lowest two bits of (m, n) form F i,2 (m,n)=000000f 2 f 1
Step 3, adding C i The lowest two bits of (m, 2 Xn-1) are replaced by F i,1 The lowest two bits of (m, n) are obtained as S i (m,2×n-1)=c 8 c 7 c 6 c 5 c 4 c 3 f 4 f 3
Step 4, adding C i The lowest two bits of (m, 2 xn) are replaced by F i,2 The lowest two bits of (m, n) are obtained to obtain S i (m,2×n)=c 8 c 7 c 6 c 5 c 4 c 3 f 2 f 1
Step 5, repeating the step 3 and the step 4 until C i All the pixel values in (a) complete the replacement.
The five shadowgraphs obtained after completion are identical in appearance to the camouflage graph, which greatly reduces the likelihood of interest to the thief.
The detailed operation flow of the decryption module is as follows:
the recovery of the secret CT image subgraph requires the participation of a plurality of receivers with different authorities, and the decryption of the participation of the receivers with different authority levels and numbers can obtain different results, generally speaking, there are several situations as follows:
case 1: if only n (n < 5) receivers storing different shadow images participate in decryption, any information about the secret CT image subgraph cannot be obtained;
case 2: if 5 receivers storing different shadow maps participate in decryption, the snowflake map of the scrambled map can be recovered;
and 3, if 5 receivers storing different shadow maps and receivers storing the secret key participate in decryption at the same time, the secret CT image subgraph can be completely recovered.
Where the decryption steps in cases 1,2 are only part of the decryption step of case 3. The decryption step of case 3 is specifically set forth below.
Inputting: 5 different shadow maps, key mu 1 、μ 2 、γ 1 、γ 2 、x 0 And y 0
And (3) outputting: and (5) CT image subgraph.
Step 1-confirmation S of the size of the image 1 And converting the elements therein into a binary sequence, e.g. the m-th row and n-th column having S elements 1 (m,n)=s 8 s 7 s 6 s 5 s 4 s 3 s 2 s 1 Then extracting the lowest two bits of all elements to form a matrix F 1 Of corresponding positions, e.g. F 1 (m,n)=000000s 2 s 1
Step 2, respectively naming the remaining four shadow images as S a 、S b 、S c 、S d A, b, c, d ∈ {2,3,4,5}, and all elements of the four matrices are converted into binary sequences, e.g., S b The m row and n column elements are S b (m,n)=s 8 s 7 s 6 s 5 s 4 s 3 s 2 s 1 Then F is generated according to the formula (2) a 、F b 、F c 、F d ,a,b,c,d∈{2,3,4,5};
Figure BDA0001865580120000071
Step 3 from F 1 (1,1)、F i (1, 1), i = a, b, c, d starts, to F 1 (340,338)、F i (340, 338), i = a, b, c, d, finding the values of the four coefficients corresponding to F (m, n) in turn by a table look-up method, and recombining the values into pixels at corresponding positions in the scrambled snowflake pattern. Finally obtaining a snowflake pattern after scrambling;
step 4, bringing the secret key into two-dimensional Logistic mapping to obtain a scrambled chaotic sequence x m ∈{1,2,…,340},m=1,2,…,340,y n E {1,2, \8230;, 338}, n =1,2, … 338), the pixels in the snowflake map are transferred to the correct positions through the two chaotic sequences, resulting in the secret CT image subgraph shown in fig. 6.
The above-described embodiments are only preferred embodiments of the present invention, and are not intended to limit the scope of the present invention, but all changes that can be made by applying the principles of the present invention and performing non-inventive work on the basis of the principles shall fall within the scope of the present invention.

Claims (1)

1. A secret sharing method for medical CT images is characterized by comprising the following steps:
1) In the encryption stage, a CT image subgraph and a decimal matrix, the definition of which corresponds to the authority level of a receiving party, are obtained through sparse singular value decomposition; then, a key of two-dimensional Logistic mapping is obtained through the decimal matrix, two chaotic sequences are generated by using the mapping, scrambling operation is carried out on the pixel position of the CT image sub-image to obtain a snowflake pattern, then the snowflake pattern is divided into five function value matrixes through a polynomial, and finally elements in the five function value matrixes are embedded into the lower two bits of the five camouflage patterns selected by a user to obtain the corresponding five shadow patterns;
2) In a decryption stage, a user recombines five function value matrixes by collecting five different shadow maps and extracting the lower two bits of the shadow maps, then obtains a snowflake map by a table look-up method, finally obtains two chaotic sequences used for scrambling by a secret key, and restores the scrambled pixel positions in the snowflake map by the two chaotic sequences to obtain a secret CT sub-map;
the method for acquiring the CT image subgraph comprises the following steps:
s11, inputting the CT image into an encryption module for sparse singular value decomposition to obtain an outer product expansion of a CT image matrix A;
s12, forming a matrix A by the first k sub-expressions of the outer product expansion k The value of k is determined according to the authority level of the receiver;
s13, combining the matrix A k Performing down-rounding operation on each element to obtain a CT image subgraph A' k
The formula for calculating the decimal matrix is:
B k =A k -A‘ k
the method for acquiring the two chaotic sequences comprises the following steps:
s21, forming a decimal matrix B k Divided into four equal-sized blocks, respectively denoted as B 1k 、B 2k 、B 3k 、B 4k
S22, respectively obtaining B 1k 、B 2k 、B 3k 、B 4k Respectively, are recorded as μ 1 、μ 2 、γ 1 、γ 2
S23, recording decimal momentArray B k Is p × q, B is taken k (1, 1) is denoted by x 0 Taking out B k (p, q) is denoted by y 0
S24, according to the secret key mu 1 、μ 2 、γ 1 、γ 2 、x 0 、y 0 Using two-dimensional pairwise Logistic mapping formula
Figure FDA0003852274320000011
Two chaotic sequences are generated and are respectively marked as x m And y n
The snowflake pattern acquisition method comprises the following steps:
according to the formula
(m,n)=A‘ 300 (x m ,y n ),(m=1,2,…,340,n=1,2,…,338)
Finish sub-image A 'of CT image' k Scrambling the pixel positions to obtain a snowflake image after scrambling;
the method for acquiring the five shadow maps comprises the following steps:
converting each pixel value of the snowflake into a binary sequence from a decimal system, wherein each pixel value corresponds to a polynomial
Figure FDA0003852274320000021
The coefficients of the polynomial are respectively a 0 =s 8 s 7 、a 1 =s 6 s 5 、a 2 =s 4 s 3 、a 3 =s 2 s 1 The pixel values of a decimal representation are split into binary representations s i ,1≤i≤8,s i An ith bit, representing the low to high binary pixel value, having a value of 0 or 1,
all polynomials form a polynomial matrix of p × q, which is then respectively substituted into the set value x 1 =1、x 2 =2、x 3 =3、x 4 =4、x 5 =5 toThe polynomial matrix obtains five function value matrixes F i (i=1,2,3,4,5),
Randomly selecting 5 worthless gray level images C 1 、C 2 、C 3 、C 4 、C 5 As a dummy image, with a matrix of five function values F i (i =1,2,3,4,5) to carry out replacement of the lowest 2 bits, and obtain corresponding five shadow maps S 1 、S 2 、S 3 、S 4 And S 5
The decryption stage specifically comprises the following steps:
s31, confirming a shadow map S according to the size of the image 1 Converting the elements into binary sequences, and extracting the lowest two bits of all the elements to form a matrix F 1 The element of the corresponding position of (a);
s32, respectively naming the remaining four shadow images as S a 、S b 、S c 、S d A, b, c, d ∈ {2,3,4,5}, and all elements of the four shadow images are converted into a binary sequence, and then according to a formula
Figure FDA0003852274320000022
Generation of F a 、F b 、F c 、F d ,a,b,c,d∈{2,3,4,5};
S33, from F 1 (1,1)、F i (1, 1), i = a, b, c, d starts, to F 1 (p,q)、F i (p, q), i = a, b, c, d, sequentially finding the values of the four coefficients corresponding to the F (m, n) through a table look-up method, recombining the values into pixels at corresponding positions in the scrambled snowflake image, and finally obtaining the scrambled snowflake image;
s34, the key mu is processed 1 、μ 2 、γ 1 、γ 2 、x 0 、y 0 Substituting two-dimensional pairwise Logistic mapping formula
Figure FDA0003852274320000031
And obtaining two scrambled chaotic sequences, and transferring the pixels in the snowflake graph obtained in the step S33 to correct positions through the two chaotic sequences to obtain the secret CT subgraph.
CN201811353873.5A 2018-11-14 2018-11-14 Medical CT image secret sharing method Active CN109558701B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811353873.5A CN109558701B (en) 2018-11-14 2018-11-14 Medical CT image secret sharing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811353873.5A CN109558701B (en) 2018-11-14 2018-11-14 Medical CT image secret sharing method

Publications (2)

Publication Number Publication Date
CN109558701A CN109558701A (en) 2019-04-02
CN109558701B true CN109558701B (en) 2022-11-22

Family

ID=65866330

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811353873.5A Active CN109558701B (en) 2018-11-14 2018-11-14 Medical CT image secret sharing method

Country Status (1)

Country Link
CN (1) CN109558701B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113160944B (en) * 2021-02-03 2023-11-14 江西财经大学 Medical image sharing method based on blockchain

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103530571A (en) * 2013-09-25 2014-01-22 上海理工大学 Image encryption method based on sine mapping and Logistic chaos sequence
CN106600518A (en) * 2016-11-23 2017-04-26 河南大学 Image encryption method and image decryption method with visual security and data security based on compressed sensing
CN107798708A (en) * 2017-11-16 2018-03-13 深圳大学 A kind of out of order codings of DNA and the image encryption and decryption method of chaotic maps
CN108513135A (en) * 2017-02-27 2018-09-07 诺基亚技术有限公司 Image encryption and decryption
CN108629728A (en) * 2018-05-06 2018-10-09 北京工业大学 A kind of high power capacity bianry image information concealing method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE60322338D1 (en) * 2003-04-07 2008-09-04 St Microelectronics Srl Encryption method using chaotic mappings and digital signature methods

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103530571A (en) * 2013-09-25 2014-01-22 上海理工大学 Image encryption method based on sine mapping and Logistic chaos sequence
CN106600518A (en) * 2016-11-23 2017-04-26 河南大学 Image encryption method and image decryption method with visual security and data security based on compressed sensing
CN108513135A (en) * 2017-02-27 2018-09-07 诺基亚技术有限公司 Image encryption and decryption
CN107798708A (en) * 2017-11-16 2018-03-13 深圳大学 A kind of out of order codings of DNA and the image encryption and decryption method of chaotic maps
CN108629728A (en) * 2018-05-06 2018-10-09 北京工业大学 A kind of high power capacity bianry image information concealing method

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
A novel image encryption algorithm based on discrete wavelet transform using two dimensional logistic map;R. M. Saffari等;《2016 24th Iranian Conference on Electrical Engineering (ICEE)》;20161010;全文 *
一种新的基于超混沌映射的图像融合加密算法;薛香莲等;《计算机安全》;20130115(第01期);全文 *
彩色数字图像的混沌加密和解密方法研究;张定会等;《通信技术》;20090110(第01期);全文 *

Also Published As

Publication number Publication date
CN109558701A (en) 2019-04-02

Similar Documents

Publication Publication Date Title
Li et al. Cryptanalyzing an image-scrambling encryption algorithm of pixel bits
Zhu et al. Plaintext-related image encryption algorithm based on block structure and five-dimensional chaotic map
CN105681622B (en) A kind of color image encrypting method based on cell neural network hyperchaos and DNA sequence dna
Ahmad et al. A new algorithm of encryption and decryption of images using chaotic mapping
CN104751403B (en) A kind of plaintext associated picture encryption method based on multi-chaos system
Wu et al. A user-friendly secret image sharing scheme with reversible steganography based on cellular automata
CN101739695B (en) Three-dimensional Arnold mapping-based image grouping encryption method
CN107492064B (en) Image encryption method based on memristor chaos system, elementary cellular automata and compressed sensing
CN104751401B (en) A kind of novel Piecewise linear chaotic map image encryption and coding method
Sha et al. A chaotic image encryption scheme based on genetic central dogma and KMP method
CN107220923B (en) Digital picture feedback encryption method based on image network
CN104851071B (en) A kind of digital image encryption method based on three-dimensional chaotic system
CN107392970B (en) Digital image encryption method based on bit plane and high-dimensional chaotic system
Li et al. On the security of a class of image encryption schemes
CN101604439A (en) A kind of color image encrypting method based on multi-chaos system
CN113556223B (en) Image encryption method based on fractional order drive response system finite time synchronization
Hua et al. Image encryption using 2D Logistic-Sine chaotic map
CN105701755A (en) Image encryption method based on fractal and DNA sequence operation
Lin et al. An image compression-encryption algorithm based on cellular neural network and compressive sensing
CN116383837A (en) Image hiding method, system and equipment
CN109558701B (en) Medical CT image secret sharing method
CN113746997A (en) Image compression encryption method based on compressed sensing and fractional order chaos
Durafe et al. Image steganography using fractal cover and combined chaos-DNA based encryption
CN116827509A (en) Image encryption method based on five-dimensional conserved hyperchaotic system and bit plane segmentation diffusion
CN105827632A (en) Cloud computing CCS fine-grained data control method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant