CN109660696A - A kind of new image encryption method - Google Patents
A kind of new image encryption method Download PDFInfo
- Publication number
- CN109660696A CN109660696A CN201811457278.6A CN201811457278A CN109660696A CN 109660696 A CN109660696 A CN 109660696A CN 201811457278 A CN201811457278 A CN 201811457278A CN 109660696 A CN109660696 A CN 109660696A
- Authority
- CN
- China
- Prior art keywords
- image
- pixel
- scramble
- encryption method
- matrix
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/44—Secrecy systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/001—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Power Engineering (AREA)
- Multimedia (AREA)
- Storage Device Security (AREA)
- Facsimile Transmission Control (AREA)
Abstract
The invention belongs to field of image processings, propose a kind of new image encryption method, image encryption method based on image block and coupled map lattices, the main thought of this method is first by carrying out piecemeal operation to image, then the pixel in each piece is all diffused into entire image, the shuffle operation of image is completed after loop iteration whole block of pixels.Finally, carrying out xor operation by the pixel stream after coupled map lattices chaos sequence generated and scramble, the dispersion operation to image is realized, generate ciphertext image.The Encryption Algorithm proposed has the key sensibility and key space of height, can effectively resist various statistical attacks and brute force attack, safety with higher.Therefore the present invention has very strong applicability and safety.
Description
Technical field
The invention belongs to field of image processings, are related to a kind of image encryption side based on image block and coupled map lattices
Method is applied particularly to during image encryption.
Background technique
With the fast development of computer picture transmission technology in a network, especially in Internet, digitized map
The safety of picture has been increasingly becoming focus concerned by people.For image encryption, there have compared with text encryption to be special
Demand.Being primarily due to digital picture has the characteristics that data space greatly and high correlation, this makes largely traditional encryption
Technology is difficult to the design of resume image.Therefore, many novel resume images are suggested in recent years, a kind of feasible
Solution be the resume image based on chaology.
The core of image encryption generally comprises two big principles, and the resume image frame based on chaology is also to set
Disorderly and it is diffused as algorithm core.In scrambling process, the position of pixel is relocated the size without change pixel value.?
It is just the opposite in diffusion process, change position of the size of pixel value without changing them;Also, a pixel is clicked through
The subtle change of row will likely bring the variation of very more pixel point values.Scramble and diffusion are the mistakes of two independences and iteration
Journey, but both of which obtains sequence of pixel values and operation and has inevitable association again.Currently, there is anti-attack in many Encryption Algorithm
The disadvantages of hitting scarce capacity, this chapter algorithm is based on the basis of image block, to pixel according to the regular scramble of loop iteration
It combines more mature Spatiotemporal Chaotic Systems to complete the encryption of image afterwards, significantly improves the safety of algorithm.
Wang etc. proposes a kind of image Alternate Encryption algorithm (X Wang, K Guo.A new in Logistic mapping
image alternate encryption algorithm based on chaotic map.Nonlinear Dynamics,
2014,76 (4): 1943-1950), Wang also proposed one kind in the Image Encryption Scheme of coupled map lattices and " selector "
(XY Wang, XM Bao.A novel block cryptosystem based on the coupled chaotic map
Lattice.Nonlinear Dynamics, 2013,72 (4): 707-715), safety analysis is carried out to it and can be found that its picture
Correlation between element, which is smeared, goes out not strong enough, and comentropy also shows that its chaos degree is inadequate, therefore its attack tolerant is not strong.
Summary of the invention
It is an object of the invention to improve the safety of Encryption Algorithm and efficiency, a kind of combination maturation reason is proposed
The image encryption method of opinion.Piecemeal operation and coupled map lattices based on image propose a kind of new image encryption method,
The main thought of this method is then to be diffused into first to the pixel in each block of pixels whole by carrying out piecemeal processing to image
Width image realizes the shuffle operation of pixel, carries out corresponding exclusive or behaviour to the pixel after scramble then in conjunction with coupled map lattices
Make, realizes the encryption of image.The specific technical solution of the present invention is as follows:
The first step calculates the pixel of image and the average value with pixel first, as key a part and pass through peace
Full hashing algorithm calculates the initial value of chaos system.
Second step, shuffle operation: the initial value and auxiliary function iteration coupled map lattices obtained by the first step, it will
The chaos sequence generated is converted to two-dimensional pixel matrix, and the matrix is then carried out piecemeal operation according to suitable size,
Pixel in each block of pixels is diffused into the picture element matrix of storage scramble image, after being iterated, completes entire image
Operation, generate scramble image.
Diffusion: third step takes the coupled map lattices in second step to generate other three groups of chaos sequences, carries out data processing
Afterwards, xor operation is carried out with the image pixel stream after scramble, obtained processing result is the image pixel value after spreading, real
Now to the change of pixel value size.
Secure hash algorithm used in the above-mentioned first step is SHA-512, which is to previous SHA-1 and SHA-2
The supplement of algorithm has higher initial value sensitivity and stronger safety.In the present invention, it is calculated first by SHA-512
Method the pixel of known image and on the basis of generate with 512 closely related cryptographic Hash of cleartext information, then generate change
For initial value all required for coupled map lattices, formula is as follows:
H=SHA3-512 (sum) (1)
In formula, d1、d2、d3And d4It is to be extracted from cryptographic Hash h, wherein each diIndicate a byte.Here
It is significant to note that needing first to convert binary system to after the decimal system can just be obtained required for chaos by formula
Initial value.
Chaos used in above-mentioned second step and third step is coupled map lattices, since it is the system of higher-dimension, therefore
Have the characteristics that more complicated non-linear and high randomness, is suitable for image encryption and operates.Typical coupled map lattices system
CML, dynamics formula are as follows:
Wherein, j is space index, and n is time index, and ε is coupling parameter, and L is the quantity of grid.Auxiliary function f (x) is
Logistic mapping is as follows:
F (x)=x=μ x (1-x), x ∈ (0,1), μ ∈ [3.57,4] (4)
Shuffle operation in above-mentioned second step are as follows: equal-sized with image firstly the need of being converted to one-dimensional chaos sequence
Then two-dimensional pixel matrix carries out piecemeal processing according to suitable size to matrix, if cannot be uniformly added if piecemeal to matrix
Pixel 0 is transformed.Pixel in first block of pixels is diffused into the matrix for being used to store scramble image, then circulation changes
For each block of pixels, finally upset the location of pixels of original image completely.
Diffusing step in above-mentioned third step is specifically to obtain three chaos sequence streams first, and two sequence flows are carried out
After xor operation modulus, then with third sequence flows and scramble pixel stream xor operation is carried out, to change scramble pixel value
Size, obtained diffusion data are final ciphertext pixel.Xor operation is increased by high complicated calculating as far as possible
The safety of strong algorithms.
Beneficial effects of the present invention are that the Encryption Algorithm effect that is proposed is more excellent, have very strong safety, can
Various attacks are resisted, key sensibility is strong.And the present invention be based on mature Theoretical Design, have strong applicability and
Safety.
Detailed description of the invention
Fig. 1 is ciphering process figure of the invention.
Fig. 2 is encryption and decryption effect picture of the invention.(a) Lena plaintext image;(b) Lena ciphertext image;(c)Lena
Decrypted image;
Fig. 3 is histogram distribution of the invention.(a) plaintext image Lena;(b) histogram of plaintext image Lena;(c) close
Texts and pictures are as Lena;(d) histogram of ciphertext image Lena.
Fig. 4 is key sensitivity tests of the invention.(a) image of successful decryption;(b) the subtle decryption figure for changing key
Picture;(c) difference of two width ciphertext images.
Specific embodiment
Present invention encryption is described in more detail below with reference to Fig. 1
The process of Encryption Algorithm is as follows:
In order to which without loss of generality, if gray level image P is M × N size, wherein M is line number, and N is columns.
1) the size piecemeal for being 8 × 8 according to every piece by image, is divided into Z-block.If pixel value total number is not 64 times
Number will be transformed to be suitable for the size of image.Calculate pixel value summation sum and pixel value average value ag, Xiang Yingji
It is as follows to calculate formula:
Wherein one-dimension array corresponding to image is g (i), and i ∈ (1, M × N).
2) 512 cryptographic Hash closely related with plaintext image P are generated by formula (1) first, then according to formula (2)
Secure hash algorithm the initial value x for coupled map lattices is generated since the bit of kth position0(j),j∈0,1,2…L。
3) pass through initial parameter x0(j) and two auxiliary functions are by the logistic chaotic maps represented by formula (4),
The chaos sequence of dispersion operation is available for by iteration coupled map lattices formula (3).Record the generation of each grid
It is worth, then the raw M × N × L chaos sequence of common property.
4) the grid g generated in previous step is taken1(i) total M × N number of chaos sequence, after being handled according to formula (7),
Shuffle operation for image.Three grid g in previous step are taken again2(i),g3(i) and g4(i) chaos sequence is for spreading
Operation, it is handled according to formula (8-10):
C (i)=(g1(i)×1015+ag×1015)mod(M×N) (7)
e1(i)=(g2(i)×1015+sum×106)mod 256 (8)
e2(i)=(g3(i)×1015+ag×1013)mod 256 (9)
e3(i)=(g4(i)×1015)mod256 (10)
5) it will be used for the one-dimensional chaos sequence c (i) of scramble, i ∈ 0,1 ... M × N to be converted to size and plaintext image P phase
Same two-dimensional matrix H1, one two-dimensional matrix H of reproduction2For storing the pixel after scramble.By matrix H1It is divided into Z-block, every piece
Comprising 64 pixels, while by matrix H2It is divided into 64 pieces, every block size is Z1=sum/64 pixel, wherein Z and Z1Number
It is worth equal.By H1In 64 pixels of first block of image spread storage respectively to H264 blocks of images each first
In a position, then by H1In second block of image in 64 pixels be equally stored in H2In each piece of second position
In, after circulate operation Z times, the shuffle operation of whole pixels is completed, scramble image Pc is generated.
6) by formula (8-10) chaos sequence generated, xor operation, mistake are carried out with the image pixel stream after scramble
Journey is as follows:
Pc (i) is the image pixel value in step 5 after scramble in formula, and Pe (i) is then the encrypted result of Pc (i), that is,
The pixel value of finally obtained ciphertext image.
So far, the image encryption operation of the algorithm is fully completed, and generates ciphertext image Pe.
2 pairs of present invention decryption are explained as follows:
The Encryption Algorithm that this chapter is proposed has invertibity, and the decryption processes and ciphering process of algorithm are quite similar,
Some steps inversely perform.
1) first by known key according to secure hash algorithm and coupled maps lattice used in Encryption Algorithm
Son etc. calculates the parameters for needing to use in decrypting process, due to key include pixel value and and average value and chaos
The initial value etc. of mapping, it is only necessary to be executed according to encrypting step.
2) ciphertext image is carried out by exclusive or decryption oprerations by the inverse operation of the 6th step of encrypting step, obtains scramble image
Pc。
3) operation is decrypted to scramble step, 64 pieces is divided into the image after scramble first, extract the of each piece
One pixel value, using this 64 pixel values as first piece of plaintext image, iteration obtains plaintext image slices afterwards several times
Prime matrix.
4) plaintext image is converted by picture element matrix, obtained result is decrypted image P.
3 are analyzed as follows algorithm in conjunction with the data in attached drawing and table:
1 plaintext of table and ciphertext image relative coefficient
The comentropy of the invention of table 2 and compared with existing algorithm
NPCR the and UACI value of ciphertext image and compared with existing algorithm when 3 plaintext one bit of image modification of table
Table 1 shows the original text of Lena image and the relative coefficient of ciphertext adjacent pixel in three directions, passes through table
Middle data, and can it can be found that Encryption Algorithm proposed by the invention has broken the strong correlation between adjacent pixel well
To resist the attack such as statistical analysis well.Table 2 illustrates the comparison result of this chapter algorithm Yu other algorithms, in completely random
In the case of, the comentropy size of image is 8, it can be concluded that comentropy of the invention is very close to theoretical value from table, therefore this hair
Bright the Analysis of Entropy of resisting that can be safe is attacked.In order to effectively resist differential attack, subtle in plaintext image changes
This makes ciphertext image change completely to allergic effect, by the realization data of table 3 it is found that the present invention have compared to other algorithms it is high
Safety can effectively resist known plain text attack.For encryption system, the statistical property of ciphertext image is a Xiang Shifen
Important index.Ciphertext image should have certain robustness to resist arbitrary Statistical Analysis Attacks.Fig. 3 shows Lena
The histogram of plaintext image and ciphertext image, by histogram can intuitively see the pixel value of encrypted image near
It is evenly distributed in each gray level of image, has reacted good statistical property.There is safe enough for one
For encryption system, algorithm will have higher key sensibility and biggish key space, just can effectively resist various sudden and violent
Power attack.Fig. 4 is the test result to key sensibility, therefrom it will be seen that after subtle change key value, decryption figure
As completely chaotic state is presented, illustrate that the algorithm has stronger key sensibility.And for the selection of the key present invention
Key is chosen in conjunction with plaintext image, is ensured that different plaintext images has different keys in this way, be can be the present invention
Known plain text attack and chosen -plain attact can be effectively resisted, it is highly-safe.
Claims (8)
1. a kind of new image encryption method, which comprises the steps of:
The first step calculates the pixel of image and the average value with pixel first, as key a part and by safety dissipate
Column algorithm calculates the initial value of chaos system;
Second step, shuffle operation: the initial value and auxiliary function iteration coupled map lattices obtained by the first step will generate
A chaos sequence be converted to two-dimensional pixel matrix, then by the matrix carry out piecemeal operation, will be in each block of pixels
Pixel is diffused into the picture element matrix of storage scramble image, after being iterated, is completed the operation of entire image, is generated scramble figure
Picture;
Third step, diffusion: taking the coupled map lattices in second step to generate other three groups of chaos sequences, after carrying out data processing,
Xor operation is carried out with the image pixel stream after scramble, obtained processing result is the image pixel value after spreading, and is realized
Change to pixel value size.
2. the new image encryption method of one kind according to claim 1, which is characterized in that used in second step and third step
Coupled map lattices be typical CML, dynamics formula are as follows:
Wherein, ε is coupling parameter, and n is time index, and j is space index, and L is the quantity of grid;Mapping function f (x) is
Logistic mapping is as follows:
F (x)=x=μ x (1-x), x ∈ (0,1), μ ∈ [3.57,4] (4).
3. the new image encryption method of one kind according to claim 1 or 2, which is characterized in that the scramble behaviour in second step
As: firstly the need of by one-dimensional chaos sequence be converted to the equal-sized two-dimensional pixel matrix of image, then to matrix according to
Suitable size carries out piecemeal processing, if cannot be uniformly transformed if piecemeal to matrix addition pixel 0;By first block of pixels
Interior pixel is diffused into the matrix for storing scramble image, and then each block of pixels of loop iteration, finally upsets completely
The location of pixels of original image.
4. the new image encryption method of one kind according to claim 1 or 2, which is characterized in that the diffusion step in third step
It is rapid to be specifically, obtain three chaos sequence streams first, after two sequence flows are carried out xor operation modulus, then with third sequence
Stream and scramble pixel stream carry out xor operation, change the size of scramble pixel value, obtained diffusion data is final
Ciphertext pixel.
5. the new image encryption method of one kind according to claim 3, which is characterized in that the diffusing step tool in third step
Body is, obtains three chaos sequence streams first, after two sequence flows are carried out xor operation modulus, then with third sequence flows with
And scramble pixel stream carries out xor operation, changes the size of scramble pixel value, obtained diffusion data is final ciphertext
Pixel.
6. the new image encryption method of one kind described according to claim 1 or 2 or 5, which is characterized in that used in the first step
Secure hash algorithm is SHA-512, obtains the initial value for chaotic maps, steps are as follows
H=SHA3-512 (sum) (1)
In formula, d1、d2、d3And d4It is to be extracted from cryptographic Hash h, wherein each diIndicate a byte.
7. the new image encryption method of one kind according to claim 3, which is characterized in that the safety used in the first step dissipates
Column algorithm is SHA-512, obtains the initial value for chaotic maps, steps are as follows
H=SHA3-512 (sum) (1)
In formula, d1、d2、d3And d4It is to be extracted from cryptographic Hash h, wherein each diIndicate a byte.
8. the new image encryption method of one kind according to claim 4, which is characterized in that the safety used in the first step dissipates
Column algorithm is SHA-512, obtains the initial value for chaotic maps, steps are as follows
H=SHA3-512 (sum) (1)
In formula, d1、d2、d3And d4It is to be extracted from cryptographic Hash h, wherein each diIndicate a byte.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811457278.6A CN109660696B (en) | 2018-11-30 | 2018-11-30 | New image encryption method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811457278.6A CN109660696B (en) | 2018-11-30 | 2018-11-30 | New image encryption method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109660696A true CN109660696A (en) | 2019-04-19 |
CN109660696B CN109660696B (en) | 2020-07-14 |
Family
ID=66111157
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811457278.6A Expired - Fee Related CN109660696B (en) | 2018-11-30 | 2018-11-30 | New image encryption method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109660696B (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111327900A (en) * | 2020-01-21 | 2020-06-23 | 河南大学 | Color image encryption method based on compressed sensing and deformation coupling mapping grid |
CN111444522A (en) * | 2020-03-19 | 2020-07-24 | 南昌大学 | Random blocking chaotic image encryption method |
CN112330521A (en) * | 2020-10-21 | 2021-02-05 | 南京航空航天大学 | Image encryption method |
CN112751981A (en) * | 2021-02-20 | 2021-05-04 | 新疆医科大学第一附属医院 | Batch transmission encryption method for sliced digital images |
CN112887507A (en) * | 2021-03-04 | 2021-06-01 | 大连海事大学 | Image encryption method for spatiotemporal chaos in multi-coupling mapping lattice with multiple dynamic coupling coefficients |
CN113645367A (en) * | 2021-07-14 | 2021-11-12 | 河南大学 | Batch image combined encryption method and device |
CN114143413A (en) * | 2021-11-26 | 2022-03-04 | 佛山芯珠微电子有限公司 | Image data PUF (physical unclonable function) security encryption system and encryption method |
CN114615392A (en) * | 2022-03-18 | 2022-06-10 | 东北大学 | Image encryption method based on bit linkage |
CN115174036A (en) * | 2022-09-06 | 2022-10-11 | 华信咨询设计研究院有限公司 | Medical insurance data security transmission system and method based on data processing |
CN115242557A (en) * | 2022-09-22 | 2022-10-25 | 江苏广海检验检测有限公司 | Safe transmission method and system for environmental protection monitoring data |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110311042A1 (en) * | 2008-10-23 | 2011-12-22 | University Of Ulster | Encryption method |
CN105488426A (en) * | 2015-11-30 | 2016-04-13 | 西安闻泰电子科技有限公司 | Mobile platform image encryption method |
CN107133994A (en) * | 2017-05-05 | 2017-09-05 | 大连理工大学 | A kind of new image encryption method |
CN108537716A (en) * | 2018-01-24 | 2018-09-14 | 重庆邮电大学 | A kind of color image encryption embedding grammar based on discrete domain |
-
2018
- 2018-11-30 CN CN201811457278.6A patent/CN109660696B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110311042A1 (en) * | 2008-10-23 | 2011-12-22 | University Of Ulster | Encryption method |
CN105488426A (en) * | 2015-11-30 | 2016-04-13 | 西安闻泰电子科技有限公司 | Mobile platform image encryption method |
CN107133994A (en) * | 2017-05-05 | 2017-09-05 | 大连理工大学 | A kind of new image encryption method |
CN108537716A (en) * | 2018-01-24 | 2018-09-14 | 重庆邮电大学 | A kind of color image encryption embedding grammar based on discrete domain |
Non-Patent Citations (1)
Title |
---|
刘清文: "基于混沌的图像加密算法的研究", 《大连理工大学硕士学位论文》 * |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111327900B (en) * | 2020-01-21 | 2022-03-01 | 河南大学 | Color image encryption method based on compressed sensing and deformation coupling mapping grid |
CN111327900A (en) * | 2020-01-21 | 2020-06-23 | 河南大学 | Color image encryption method based on compressed sensing and deformation coupling mapping grid |
CN111444522A (en) * | 2020-03-19 | 2020-07-24 | 南昌大学 | Random blocking chaotic image encryption method |
CN111444522B (en) * | 2020-03-19 | 2024-02-27 | 南昌大学 | Random blocking chaotic image encryption method |
CN112330521A (en) * | 2020-10-21 | 2021-02-05 | 南京航空航天大学 | Image encryption method |
CN112751981B (en) * | 2021-02-20 | 2022-09-23 | 新疆医科大学第一附属医院 | Batch transmission encryption method for sliced digital images |
CN112751981A (en) * | 2021-02-20 | 2021-05-04 | 新疆医科大学第一附属医院 | Batch transmission encryption method for sliced digital images |
CN112887507A (en) * | 2021-03-04 | 2021-06-01 | 大连海事大学 | Image encryption method for spatiotemporal chaos in multi-coupling mapping lattice with multiple dynamic coupling coefficients |
CN112887507B (en) * | 2021-03-04 | 2022-09-27 | 大连海事大学 | Image encryption method for spatiotemporal chaos in multi-coupling mapping lattice with multiple dynamic coupling coefficients |
CN113645367B (en) * | 2021-07-14 | 2022-04-29 | 河南大学 | Batch image combined encryption method and device |
CN113645367A (en) * | 2021-07-14 | 2021-11-12 | 河南大学 | Batch image combined encryption method and device |
CN114143413A (en) * | 2021-11-26 | 2022-03-04 | 佛山芯珠微电子有限公司 | Image data PUF (physical unclonable function) security encryption system and encryption method |
CN114143413B (en) * | 2021-11-26 | 2023-11-03 | 佛山芯珠微电子有限公司 | Image data PUF (physical unclonable function) secure encryption system and encryption method |
CN114615392A (en) * | 2022-03-18 | 2022-06-10 | 东北大学 | Image encryption method based on bit linkage |
CN115174036A (en) * | 2022-09-06 | 2022-10-11 | 华信咨询设计研究院有限公司 | Medical insurance data security transmission system and method based on data processing |
CN115242557A (en) * | 2022-09-22 | 2022-10-25 | 江苏广海检验检测有限公司 | Safe transmission method and system for environmental protection monitoring data |
CN115242557B (en) * | 2022-09-22 | 2023-01-06 | 江苏广海检验检测有限公司 | Safe transmission method and system for environmental protection monitoring data |
Also Published As
Publication number | Publication date |
---|---|
CN109660696B (en) | 2020-07-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109660696A (en) | A kind of new image encryption method | |
CN108898025B (en) | Chaotic image encryption method based on double scrambling and DNA coding | |
Zhu et al. | A chaos-based symmetric image encryption scheme using a bit-level permutation | |
Ye et al. | An efficient chaotic image encryption algorithm based on a generalized Arnold map | |
Yang et al. | A fast image encryption and authentication scheme based on chaotic maps | |
Ye et al. | An image encryption scheme based on time-delay and hyperchaotic system | |
Chen et al. | Cryptanalysis and improvement in an image encryption scheme using combination of the 1D chaotic map | |
CN108122188B (en) | Image encryption method | |
Fu-Yan et al. | Image encryption using high-dimension chaotic system | |
Soleymani et al. | A novel public key image encryption based on elliptic curves over prime group field | |
CN106709854A (en) | Cat mapping and chaos based image information fusion and encryption method | |
CN112134688A (en) | Asymmetric image encryption method based on quantum chaotic mapping and SHA-3 | |
CN112311524A (en) | Image encryption method based on new chaotic mapping and compressed sensing | |
Hussain et al. | A novel algorithm for thermal image encryption | |
Ye | A novel image encryption scheme based on generalized multi-sawtooth maps | |
Ahadpour et al. | A chaos-based image encryption scheme using chaotic coupled map lattices | |
Singh et al. | Improvement of image transmission using chaotic system and elliptic curve cryptography | |
Zarei Zefreh et al. | LSIE: a fast and secure Latin square-based image encryption scheme | |
Dixit et al. | Image encryption using permutation and rotational XOR technique | |
Chapaneri et al. | Chaos based image encryption using latin rectangle scrambling | |
CN107133994B (en) | Image encryption method | |
CN109712204A (en) | A kind of image encryption method based on FCM cluster | |
Nayak et al. | An improved image encryption technique using diffusion method associated with hill cipher and chaotic logistic map | |
Soleymani et al. | A binary grouping approach for image encryption based on elliptic curves over prime group field | |
CN117118591B (en) | Chaotic cryptographic system based on fractal sequencing vector S box |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20200714 Termination date: 20211130 |
|
CF01 | Termination of patent right due to non-payment of annual fee |