CN109657484A - The multichannel image decoding method spliced based on gamma function and ciphertext - Google Patents

The multichannel image decoding method spliced based on gamma function and ciphertext Download PDF

Info

Publication number
CN109657484A
CN109657484A CN201811514614.6A CN201811514614A CN109657484A CN 109657484 A CN109657484 A CN 109657484A CN 201811514614 A CN201811514614 A CN 201811514614A CN 109657484 A CN109657484 A CN 109657484A
Authority
CN
China
Prior art keywords
image
column
exp
ciphertext
channel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811514614.6A
Other languages
Chinese (zh)
Other versions
CN109657484B (en
Inventor
蔡达岭
孙文卿
陈宝华
王军
吴泉英
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou University of Science and Technology
Original Assignee
Suzhou University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou University of Science and Technology filed Critical Suzhou University of Science and Technology
Priority to CN201811514614.6A priority Critical patent/CN109657484B/en
Publication of CN109657484A publication Critical patent/CN109657484A/en
Application granted granted Critical
Publication of CN109657484B publication Critical patent/CN109657484B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Facsimile Transmission Control (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The present invention relates to a kind of color image decoding methods of gyrator transformation and gamma random function, can be used for image encryption.In encryption side, color image is decomposed into three individual color channel component pictures of RGB, then generates three group encryption parameters, then generate three groups of random phase functions, and component image is encrypted respectively in airspace and frequency domain using gyrator transformation, obtains ciphertext.Three random integers are finally generated, by ciphertext data being spliced in a matrix at random.In decryption side, matrix decomposition will be spliced and be decrypted at the ciphertext data of three components, then with each channel image of conjugate phase key pair, recovery synthesizes color image.Ciphertext phase distribution mode can be changed in the method for the present invention, the attack for resisting Phase Retrieve Algorithm is attacked from other algorithms for cracking scheme by splicing to resist at random, improves encryption intensity, this method can encrypt Three Channel Color image, have excellent Social benefit and economic benefit.

Description

The multichannel image decoding method spliced based on gamma function and ciphertext
Technical field
The invention belongs to field of information security technology, and in particular to a kind of image encryption and decryption technology.
Background technique
With the continuous development of internet and multimedia technology, in terms of information security the problem of, be can not be ignored.Digitized map As one of most important information transmitting carrier.In fields such as military affairs, finance, medical treatment, scientific researches, image data will often be carried out It is being transmitted after encryption, for preventing stealing for information, therefore, image encryption technology is also increasingly by the weight of people Depending on.
The purpose of image encryption is to be hidden the expressed information of image itself, makes the user for not grasping key can not The true content of image is obtained, and the user for grasping key can obtain true image information by decipherment algorithm.Optical picture As encryption technology is, using certain algorithm, to carry out certain disturb to original image by electro-optical system or virtual optical system Disorderly operation, realizes the encryption of image data.Earliest optical image encryption system be Refregier and Javidi propose it is double with Machine phase code system, the system is in typical 4f system, respectively on the input plane of optical signal and fourier spectrum face It is respectively put into one piece of random phase mask plate, the purpose is to the amplitudes to input picture to encrypt respectively with phase information, To achieve the purpose that the ciphertext for enabling output becomes a width white noise acoustic image completely.Hereafter the system has been extended to score Fourier again Leaf domain, Fresnel domain etc..There has also been sizable development for the means and application field of encryption, to also further improve The safety of system.
But there is result of study to show through Phase Retrieve Algorithm, it can recover by white noise random phase plate Encrypted image, even if passing through iterative calculation in the case where key is totally unknown, it is also possible to enough recover the letter of image Breath, and the degree of human readable can be reached.Therefore, according to Phase Retrieve Algorithm the characteristics of, improves adding for this kind of system Close mode is to need further to solve the problems, such as.In recent years it has been proposed that the mode that the phase key of structuring is encrypted, this Structuring phase key used in class system is some functions, by inputting random parameter, generates different phase distribution moulds Formula, but the number of parameters in generic function only has 2-3 or so, this will make the space of key be obviously reduced.Especially When cracking the encryption of color image, a part if image of each individual color channel is cracked respectively, but pass through the folded of channel Add, is then easier that image can be distinguished by the mankind.Moreover, we also note that, Phase Retrieve Algorithm can recover Original image, one of particularly significant reason are exactly that the phase distribution of encrypted image has equally distributed statistical property.
The invention proposes codings and solution based on gyrator transformation and the color image of Gamma distribution random phase function Code method, can be used in the encryption to color image.To the component image in each channel, different encryption parameters is used respectively Encrypted, can change the phase distribution statistical law of encrypted image, hinder using Phase Retrieve Algorithm to ciphertext image into Row cracks.Meanwhile method the characteristics of multichannel image is utilized that this patent proposes, by the ciphertext data in each channel carry out with Machine splicing, further enhances the resistivity that this method cracks other scheme, improves the safety of encryption system.The party Method can be also used for other than it can encrypt to color image to other multi-pass such as high spectrum image and multiple image The encryption of road image.
Summary of the invention
In view of the deficiencies of the prior art, the invention proposes based on gyrator transformation and Gamma distribution random phase function Color image encryption and decryption method.The present invention will be further described in detail with reference to the accompanying drawing.To realize above-mentioned mesh , the solution of the present invention includes:
As shown in Figure 1, ciphering process is as follows:
1) image to be encrypted is I (x, y), for the color image of RGB triple channel, can be decomposed into point in three channels Spirogram picture, uses I respectivelyR(x, y), IG(x, y) and IB(x,y).The image in each channel is real number on each pixel, can be with It is seen as an amplitude function, x and y indicate the pixel coordinate of image.The Pixel Dimensions of image are M*N.
2) random phase function R1 (x, y)=exp [i*m is generated1(x, y)], wherein i indicates imaginary unit, m1(x, y) is indicated The random matrix of Gamma distribution by linear transformation, m1(x, y) can be write as
m1(x,y)=a1+b1*g(α11, x, y), (1)
Wherein, a1And b1It is linear transformation parameter, takes real number, according to the definition of gamma function, which is contained Form parameter and scale parameter respectively use α in formula (1)1And β1It indicates.
3) by image I to be encryptedR(x, y) is multiplied with random phase function R1 (x, y), and as the defeated of system Enter, i.e.,
t(x,y)=IR(x,y)*R1(x,y).(2)
4) it is converted with gyrator and input t (x, y) is encrypted, which can use Fast Fourier Transform in a computer Algorithm is realized, can be indicated with following formula,
T(x,y)=FFT[t(x,y)*exp[i*2π*x*y*cot(ξ1)]]*exp[i*2π*x*y*cot(ξ1)], (3)
Wherein, ξ1The angle parameter for indicating gyrator transformation, generally takes 0 < ξ1<2π。
5) it is used in identical method in step 2, but selects another group of linear transformation parameter a1、b1, form parameter α1 With scale parameter β1, generate random phase function R2 (x, y)=exp [i*m2(x, y)], then the output function T that gyrator is converted (x, y) multiplied by R2 (x, y), i.e.,
T´(x,y)=T(x,y)*R2(x,y).(4)
6) gyrator transformation is carried out again, obtains encrypted image cR(x, y) can be indicated with following formula,
cR(x,y)=FFT[T´(x,y)*exp[i*2π*x*y*cot(ξ2)]]*exp[i*2π*x*y*cot(ξ2)], (5)
Wherein, ξ2It is also the angle parameter for indicating gyrator transformation, ξ1And ξ2Different values can be taken, encryption can be improved in this way Intensity, the encrypted image c of outputR(x, y) is that complex function contains amplitude and phase two parts.
7) to the image I in green and blue channelG(x, y) and IB(x, y) repeats step 2 and is added respectively to step 6) It is close, obtain ciphertext cG(x, y) and cB(x,y)。
8) selection generates three integers between 1~N, k1, k2 and k3.By cRThe column of kth 1 of (x, y) are put into new matrix c In 1 column of (x, y), then by cGThe k2 column of (x, y) are put into the 2nd column of matrix c (x, y), finally by cBThe k3 column of (x, y) are put into In the 3rd column of matrix c (x, y), after completing this circulation, k1, k2 and k3 are added 1 respectively, if k1, k2 or k3 are greater than N, then will It is set as 1.It repeats cR(x,y)、cG(x, y) and cBCiphertext data in (x, y) are put into line by line in c (x, y), Zhi Daosuo Until some data are stuffed entirely with c (x, y).
9) by spliced ciphertext c (x, y) by common signal channel, and three groups of random phase function R2 (x, y) and angle of transformation Spend parameter ξ1And ξ2And k1, k2, k3 are transferred to recipient by cryptochannel, can be decrypted.
As shown in Fig. 2, decrypting process comprises the following steps:
1) according to the value of k1, k2, k3, the 1st column of c (x, y) are put into cRIn the column of (x, y) kth 1, the 2nd column of c (x, y) are put into cGIn the column of (x, y) kth 2, the 3rd column of c (x, y) are put into cBIn the column of (x, y) kth 3, after completing this circulation, by k1, k2 and k3 Respectively plus 1, if k1, k2 or k3 are greater than N, then it is set to 1.Above-mentioned steps are repeated, by data all in c (x, y) Column are all restored to cR(x,y)、cG(x,y)、cBIn (x, y).
2) it is obtained being distributed R3 (x, y) for the conjugate function of decryption by R2 (x, y), i.e.,
R3(x,y)=exp[-i*m2(x,y)].(6)
3) decrypted image is calculated according to the following formula,
rT(x,y)=FFT[cR(x,y)*exp[i*2π*x*y*cot(-ξ2)]]*exp[i*2π*x*y*cot(-ξ2)], (7)
RT ' (x, y)=rT (x, y) * R3 (x, y), (8)
rt(x,y)=FFT[rT´(x,y)*exp[i*2π*x*y*cot(-ξ1)]]*exp[i*2π*x*y*cot(-ξ1)].(9)
4) amplitude components for taking decrypted result are exactly original plaintext image,
rIR(x, y)=Abs [rt (x, y)], (10)
Wherein, Abs [-] indicates to take the amplitude components of plural number.
5) decryption step 1 is repeated) to 3), respectively to the ciphertext c in green and blue channelG(x, y) and cB(x, y) is solved It is close.
6) by the image combined color image in three channels.
Compared with prior art, the present invention beneficial effect is: the invention proposes based on gyrator transformation and gamma point The color image encoding and coding/decoding method of cloth random phase function, can be used for the encryption to color image, to each channel Component image is encrypted using different encryption parameters respectively, can change the phase distribution statistical law of encrypted image, resistance Hinder and ciphertext image is cracked using Phase Retrieve Algorithm.Meanwhile multichannel image is utilized in the method that this patent proposes Feature is spliced the ciphertext data in each channel at random, is further enhanced this method and is cracked supporting for scheme for other Anti- ability improves the safety of encryption system.This method can be also used for pair other than it can encrypt to color image The encryption of other multichannel images such as high spectrum image and multiple image has excellent Social benefit and economic benefit.
Detailed description of the invention
Present invention will be further explained below with reference to the attached drawings and examples.
Fig. 1 is the color image encryption stream of the present invention using gyrator transformation and Gamma distribution random phase function Cheng Tu.
Fig. 2 is that the color image of the present invention using gyrator transformation and Gamma distribution random phase function decrypts stream Cheng Tu.
Fig. 3 is three channels of red, green and blue of color image to be encrypted used in the embodiment of the present invention.
Fig. 4 is the three channel Gamma distribution random phase encryption function R1 generated in the embodiment of the present invention.
Fig. 5 is the three channel Gamma distribution random phase encryption function R2 generated in the embodiment of the present invention.
Fig. 6 is the distribution of amplitudes in three channels of encrypted image in the embodiment of the present invention.
Fig. 7 is the phase distribution in three channels of encrypted image in the embodiment of the present invention.
Fig. 8 is the distribution of amplitudes of three random stitching images in channel of encrypted image in the embodiment of the present invention.
Fig. 9 is the phase distribution of three random stitching images in channel of encrypted image in the embodiment of the present invention.
Figure 10 is the three channel Gamma distribution random phase decryption function R3 generated in the embodiment of the present invention.
Figure 11 is the three channel decrypted images obtained in the embodiment of the present invention.
Specific embodiment
In order to make the foregoing objectives, features and advantages of the present invention clearer and more comprehensible, with reference to the accompanying drawing and specific real Applying mode, invention is further described in detail.
Embodiment:
Image encryption process: as shown in figure 3, logical to RGB three of the image " pepper " that pixel resolution is 512*512 Road is encrypted respectively.
According to encrypting step 2), set the form parameter α of red channel1=2, scale parameter β1=1, linear transformation parameter a1= 1, b1=1, and generate random phase function R1 (x, y);Set the form parameter α of green channel1=2, scale parameter β1=2, linearly Transformation parameter a1=2, b1=1, and generate random phase function R1 (x, y);Set the form parameter α of blue channel1=1, scale ginseng Number β1=1, linear transformation parameter a1=1, b1=1, and random phase function R1 (x, y) is generated, as shown in Figure 4.
According to encrypting step 3), by image IR(x, y), IG(x, y) and IB(x, y), respectively with respective random phase function R1 (x, y) is multiplied.
According to encrypting step 4), the parameter in three channels, red component ξ is set separately1=π/4, green component ξ1The He of=π/5 Blue component ξ1=π/2.And gyrator transformation is carried out to the input picture of component.
According to encrypting step 5), the form parameter in three channels, scale parameter and linear transformation parameter is set separately.It is right In red channel α2=2, β2=1, a2=2, b2=0;For green channel α2=2, β2=1, a2=3, b2=2;For blue channel α2=2, β2=2, a2=3, b2=3.To each channel, random phase function R2 (x, y) is generated respectively.Again by encrypting step 4) in output letter Number is respectively multiplied by R2 (x, y), as shown in Figure 5.
According to encrypting step 6) -7), the gyrator transformation parameter in three channels, red component ξ is set separately2=π/3, it is green Colouring component ξ2=π/4, blue component ξ2=π/4 carry out a gyrator transformation to the output of step 5) again, obtain ciphertext image, Phase and distribution of amplitudes difference are as shown in Figure 6 and Figure 7.
According to encrypting step 8), set k1=10, k2=30, k3=40, by the ciphertext of triple channel be spliced into a matrix c (x, Y), phase and distribution of amplitudes difference are as shown in Figure 8 and Figure 9.
According to encrypting step 9), by the corresponding R1 (x, y) in each channel, R2 (x, y), ξ1And ξ2It is transmitted by cryptochannel Recipient is transferred to by common signal channel to recipient, and by ciphertext c (x, y).
Image decryption process:
According to decryption step 1), according to the value of k1, k2, k3, the component in three channels is isolated from c (x, y).
According to decryption step 2), the conjugate function R3 (x, y) of each channel R2 (x, y) is obtained, as shown in Figure 10.
According to decryption step 3) and each channel parameter ξ1, ξ2With R3 (x, y), calculated from formula (7)-(9) Decrypted result.
According to decryption step 4), the amplitude components of each channel decryption function in result are taken out, are exactly plaintext image.
According to decryption step 5), the plaintext image in three channels is calculated, as shown in figure 11.
According to decryption step 6), the decrypted image in three channels is synthesized to original color image.

Claims (1)

  1. The color image encryption and decryption method of 1.gyrator transformation and Gamma distribution random phase function, which is characterized in that packet Include following steps:
    As shown in Figure 1, ciphering process is as follows:
    1) image to be encrypted is I (x, y), for the color image of RGB triple channel, can be decomposed into point in three channels Spirogram picture, uses I respectivelyR(x, y), IG(x, y) and IB(x, y), the image in each channel are real number on each pixel, can be with It is seen as an amplitude function, x and y indicate the pixel coordinate of image, and the Pixel Dimensions of image are M*N;
    2) random phase function R1 (x, y)=exp [i*m is generated1(x, y)], wherein i indicates imaginary unit, m1(x, y) indicates to pass through The random matrix of the Gamma distribution of linear transformation, m1(x, y) can be write as
    m1(x,y)=a1+b1*g(α11, x, y), (1)
    Wherein, a1And b1It is linear transformation parameter, takes real number, according to the definition of gamma function, which contains shape Shape parameter and scale parameter respectively use α in formula (1)1And β1It indicates;
    3) by image I to be encryptedR(x, y) is multiplied with random phase function R1 (x, y), and as the input of system, i.e.,
    t(x,y)=IR(x,y)*R1(x,y);(2)
    4) it is converted with gyrator and input t (x, y) is encrypted, which can use Fast Fourier Transform in a computer Algorithm is realized, can be indicated with following formula,
    T(x,y)=FFT[t(x,y)*exp[i*2π*x*y*cot(ξ1)]]*exp[i*2π*x*y*cot(ξ1)], (3)
    Wherein, ξ1The angle parameter for indicating gyrator transformation, generally takes 0 < ξ1<2π;
    5) it is used in identical method in step 2, but selects another group of linear transformation parameter a1、b1, form parameter α1And ruler Spend parameter beta1, generate random phase function R2 (x, y)=exp [i*m2(x, y)], then by gyrator transformation output function T (x, Y) multiplied by R2 (x, y), i.e.,
    T´(x,y)=T(x,y)*R2(x,y);(4)
    6) gyrator transformation is carried out again, obtains encrypted image cR(x, y) can be indicated with following formula,
    cR(x,y)=FFT[T´(x,y)*exp[i*2π*x*y*cot(ξ2)]]*exp[i*2π*x*y*cot(ξ2)], (5)
    Wherein, ξ2It is also the angle parameter for indicating gyrator transformation, ξ1And ξ2Different values can be taken, encryption can be improved in this way Intensity, the encrypted image c of outputR(x, y) is that complex function contains amplitude and phase two parts;
    7) to the image I in green and blue channelG(x, y) and IB(x, y) repeats step 2 and is encrypted respectively to step 6), obtained To ciphertext cG(x, y) and cB(x,y);
    8) selection generates three integers between 1~N, k1, k2 and k3, by cRThe column of kth 1 of (x, y) are put into new matrix c (x, y) In 1 column, then by cGThe k2 column of (x, y) are put into the 2nd column of matrix c (x, y), finally by cB(x, y) k3 column be put into matrix c (x, Y) in the 3rd column, after completing this circulation, k1, k2 and k3 are added 1 respectively, if k1, k2 or k3 are greater than N, are then set to 1, it repeats cR(x,y)、cG(x, y) and cBCiphertext data in (x, y) are put into line by line in c (x, y), until all data Until being stuffed entirely with c (x, y);
    9) by spliced ciphertext c (x, y) by common signal channel, and three groups of random phase function R2 (x, y) and transformation angle are joined Number ξ1And ξ2And k1, k2, k3 are transferred to recipient by cryptochannel, can be decrypted;
    As shown in Fig. 2, decrypting process comprises the following steps:
    1) according to the value of k1, k2, k3, the 1st column of c (x, y) are put into cRIn the column of (x, y) kth 1, the 2nd column of c (x, y) are put into cGIn the column of (x, y) kth 2, the 3rd column of c (x, y) are put into cBIn the column of (x, y) kth 3, after completing this circulation, by k1, k2 and k3 Respectively plus 1, if k1, k2 or k3 are greater than N, then it is set to 1, repeats above-mentioned steps, by data all in c (x, y) Column are all restored to cR(x,y)、cG(x,y)、cBIn (x, y);
    2) it is obtained being distributed R3 (x, y) for the conjugate function of decryption by R2 (x, y), i.e.,
    R3(x,y)=exp[-i*m2(x,y)];(6)
    3) decrypted image is calculated according to the following formula,
    rT(x,y)=FFT[cR(x,y)*exp[i*2π*x*y*cot(-ξ2)]]*exp[i*2π*x*y*cot(-ξ2)], (7)
    RT ' (x, y)=rT (x, y) * R3 (x, y), (8)
    rt(x,y)=FFT[rT´(x,y)*exp[i*2π*x*y*cot(-ξ1)]]*exp[i*2π*x*y*cot(-ξ1)];(9)
    4) amplitude components for taking decrypted result are exactly original plaintext image,
    rIR(x, y)=Abs [rt (x, y)], (10)
    Wherein, Abs [-] indicates to take the amplitude components of plural number;
    5) decryption step 1 is repeated) to 3), respectively to the ciphertext c in green and blue channelG(x, y) and cB(x, y) is decrypted;
    6) by the image combined color image in three channels.
CN201811514614.6A 2018-12-12 2018-12-12 Multi-channel image coding and decoding method based on gamma function and ciphertext splicing Active CN109657484B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811514614.6A CN109657484B (en) 2018-12-12 2018-12-12 Multi-channel image coding and decoding method based on gamma function and ciphertext splicing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811514614.6A CN109657484B (en) 2018-12-12 2018-12-12 Multi-channel image coding and decoding method based on gamma function and ciphertext splicing

Publications (2)

Publication Number Publication Date
CN109657484A true CN109657484A (en) 2019-04-19
CN109657484B CN109657484B (en) 2022-09-02

Family

ID=66114098

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811514614.6A Active CN109657484B (en) 2018-12-12 2018-12-12 Multi-channel image coding and decoding method based on gamma function and ciphertext splicing

Country Status (1)

Country Link
CN (1) CN109657484B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110232285A (en) * 2019-06-19 2019-09-13 首都师范大学 A kind of method and device of image encryption
CN110532793A (en) * 2019-08-30 2019-12-03 首都师范大学 Image encryption method, image encrypting apparatus, electronic equipment and readable storage medium storing program for executing

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102567943A (en) * 2012-01-09 2012-07-11 浙江农林大学 Asymmetric double image encryption method based on joint of fourier transformation and phase cutting
CN103295185A (en) * 2013-06-28 2013-09-11 浙江农林大学 Asymmetrical image encryption method based on random amplitude plate and Fourier transformation
CN103761703A (en) * 2014-01-15 2014-04-30 西安理工大学 Single channel color image encryption method based on GT conversion and chaos
CN106504175A (en) * 2016-09-30 2017-03-15 天津大学 Nonlinear optics image encryption method in Gyrator transform domains

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102567943A (en) * 2012-01-09 2012-07-11 浙江农林大学 Asymmetric double image encryption method based on joint of fourier transformation and phase cutting
CN103295185A (en) * 2013-06-28 2013-09-11 浙江农林大学 Asymmetrical image encryption method based on random amplitude plate and Fourier transformation
CN103761703A (en) * 2014-01-15 2014-04-30 西安理工大学 Single channel color image encryption method based on GT conversion and chaos
CN106504175A (en) * 2016-09-30 2017-03-15 天津大学 Nonlinear optics image encryption method in Gyrator transform domains

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110232285A (en) * 2019-06-19 2019-09-13 首都师范大学 A kind of method and device of image encryption
CN110232285B (en) * 2019-06-19 2021-02-26 首都师范大学 Image encryption method and device
CN110532793A (en) * 2019-08-30 2019-12-03 首都师范大学 Image encryption method, image encrypting apparatus, electronic equipment and readable storage medium storing program for executing
CN110532793B (en) * 2019-08-30 2021-06-11 首都师范大学 Image encryption method, image encryption device, electronic equipment and readable storage medium

Also Published As

Publication number Publication date
CN109657484B (en) 2022-09-02

Similar Documents

Publication Publication Date Title
Shankar et al. RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography
Broumandnia The 3D modular chaotic map to digital color image encryption
Chen et al. Cryptanalysis and improvement in an image encryption scheme using combination of the 1D chaotic map
Shankar et al. A new k out of n secret image sharing scheme in visual cryptography
CN108322622A (en) A kind of color digital image encryption method based on 2D-VMD and octuple hyperchaotic system
Kester Image Encryption based on the RGB PIXEL Transposition and Shuffling
CN107239708A (en) It is a kind of that the image encryption method converted with score field is mapped based on quantum chaos
Chen et al. Generalized optical encryption framework based on Shearlets for medical image
CN107516332B (en) Color image encryption and hiding method based on PT-L CT and DWT-SVD
Masood et al. A novel image encryption scheme based on Arnold cat map, Newton-Leipnik system and Logistic Gaussian map
CN109614808B (en) Gray level image encryption and decryption method based on linear canonical transformation and gamma function
Hussain et al. A novel algorithm for thermal image encryption
CN109657484A (en) The multichannel image decoding method spliced based on gamma function and ciphertext
Zhou et al. Encryption method based on a new secret key algorithm for color images
Thenmozhi et al. A novel technique for image steganography using nonlinear chaotic map
Fang et al. A secure chaotic block image encryption algorithm using generative adversarial networks and DNA sequence coding
Jasra et al. Image encryption techniques: A review
Maurya et al. An extended visual cryptography technique for medical image security
Wang et al. New color image cryptosystem via SHA-512 and hybrid domain
Ghosh A systematic review on image encryption techniques
Harjo et al. Improved Color Image Encryption using Hybrid Modulus Substitution Cipher and Chaotic Method.
Shankar et al. A novel hybrid encryption method using S-box and Henon maps for multidimensional 3D medical images
CN104143174A (en) Image disguising and reconstructing method based on Tangram algorithm and two-dimensional double-scale rectangular mapping
Kumar et al. Image encryption using simplified data encryption standard (S-DES)
Zhang et al. Fast image encryption algorithm based on 2D-FCSM and pseudo-wavelet transform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant