CN109660696A - A kind of new image encryption method - Google Patents

A kind of new image encryption method Download PDF

Info

Publication number
CN109660696A
CN109660696A CN201811457278.6A CN201811457278A CN109660696A CN 109660696 A CN109660696 A CN 109660696A CN 201811457278 A CN201811457278 A CN 201811457278A CN 109660696 A CN109660696 A CN 109660696A
Authority
CN
China
Prior art keywords
image
pixel
scramble
encryption method
matrix
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811457278.6A
Other languages
Chinese (zh)
Other versions
CN109660696B (en
Inventor
范冬梅
卢志茂
王贺
姚念民
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dalian University of Technology
Original Assignee
Dalian University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dalian University of Technology filed Critical Dalian University of Technology
Priority to CN201811457278.6A priority Critical patent/CN109660696B/en
Publication of CN109660696A publication Critical patent/CN109660696A/en
Application granted granted Critical
Publication of CN109660696B publication Critical patent/CN109660696B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Power Engineering (AREA)
  • Multimedia (AREA)
  • Storage Device Security (AREA)
  • Facsimile Transmission Control (AREA)

Abstract

The invention belongs to field of image processings, propose a kind of new image encryption method, image encryption method based on image block and coupled map lattices, the main thought of this method is first by carrying out piecemeal operation to image, then the pixel in each piece is all diffused into entire image, the shuffle operation of image is completed after loop iteration whole block of pixels.Finally, carrying out xor operation by the pixel stream after coupled map lattices chaos sequence generated and scramble, the dispersion operation to image is realized, generate ciphertext image.The Encryption Algorithm proposed has the key sensibility and key space of height, can effectively resist various statistical attacks and brute force attack, safety with higher.Therefore the present invention has very strong applicability and safety.

Description

A kind of new image encryption method
Technical field
The invention belongs to field of image processings, are related to a kind of image encryption side based on image block and coupled map lattices Method is applied particularly to during image encryption.
Background technique
With the fast development of computer picture transmission technology in a network, especially in Internet, digitized map The safety of picture has been increasingly becoming focus concerned by people.For image encryption, there have compared with text encryption to be special Demand.Being primarily due to digital picture has the characteristics that data space greatly and high correlation, this makes largely traditional encryption Technology is difficult to the design of resume image.Therefore, many novel resume images are suggested in recent years, a kind of feasible Solution be the resume image based on chaology.
The core of image encryption generally comprises two big principles, and the resume image frame based on chaology is also to set Disorderly and it is diffused as algorithm core.In scrambling process, the position of pixel is relocated the size without change pixel value.? It is just the opposite in diffusion process, change position of the size of pixel value without changing them;Also, a pixel is clicked through The subtle change of row will likely bring the variation of very more pixel point values.Scramble and diffusion are the mistakes of two independences and iteration Journey, but both of which obtains sequence of pixel values and operation and has inevitable association again.Currently, there is anti-attack in many Encryption Algorithm The disadvantages of hitting scarce capacity, this chapter algorithm is based on the basis of image block, to pixel according to the regular scramble of loop iteration It combines more mature Spatiotemporal Chaotic Systems to complete the encryption of image afterwards, significantly improves the safety of algorithm.
Wang etc. proposes a kind of image Alternate Encryption algorithm (X Wang, K Guo.A new in Logistic mapping image alternate encryption algorithm based on chaotic map.Nonlinear Dynamics, 2014,76 (4): 1943-1950), Wang also proposed one kind in the Image Encryption Scheme of coupled map lattices and " selector " (XY Wang, XM Bao.A novel block cryptosystem based on the coupled chaotic map Lattice.Nonlinear Dynamics, 2013,72 (4): 707-715), safety analysis is carried out to it and can be found that its picture Correlation between element, which is smeared, goes out not strong enough, and comentropy also shows that its chaos degree is inadequate, therefore its attack tolerant is not strong.
Summary of the invention
It is an object of the invention to improve the safety of Encryption Algorithm and efficiency, a kind of combination maturation reason is proposed The image encryption method of opinion.Piecemeal operation and coupled map lattices based on image propose a kind of new image encryption method, The main thought of this method is then to be diffused into first to the pixel in each block of pixels whole by carrying out piecemeal processing to image Width image realizes the shuffle operation of pixel, carries out corresponding exclusive or behaviour to the pixel after scramble then in conjunction with coupled map lattices Make, realizes the encryption of image.The specific technical solution of the present invention is as follows:
The first step calculates the pixel of image and the average value with pixel first, as key a part and pass through peace Full hashing algorithm calculates the initial value of chaos system.
Second step, shuffle operation: the initial value and auxiliary function iteration coupled map lattices obtained by the first step, it will The chaos sequence generated is converted to two-dimensional pixel matrix, and the matrix is then carried out piecemeal operation according to suitable size, Pixel in each block of pixels is diffused into the picture element matrix of storage scramble image, after being iterated, completes entire image Operation, generate scramble image.
Diffusion: third step takes the coupled map lattices in second step to generate other three groups of chaos sequences, carries out data processing Afterwards, xor operation is carried out with the image pixel stream after scramble, obtained processing result is the image pixel value after spreading, real Now to the change of pixel value size.
Secure hash algorithm used in the above-mentioned first step is SHA-512, which is to previous SHA-1 and SHA-2 The supplement of algorithm has higher initial value sensitivity and stronger safety.In the present invention, it is calculated first by SHA-512 Method the pixel of known image and on the basis of generate with 512 closely related cryptographic Hash of cleartext information, then generate change For initial value all required for coupled map lattices, formula is as follows:
H=SHA3-512 (sum) (1)
In formula, d1、d2、d3And d4It is to be extracted from cryptographic Hash h, wherein each diIndicate a byte.Here It is significant to note that needing first to convert binary system to after the decimal system can just be obtained required for chaos by formula Initial value.
Chaos used in above-mentioned second step and third step is coupled map lattices, since it is the system of higher-dimension, therefore Have the characteristics that more complicated non-linear and high randomness, is suitable for image encryption and operates.Typical coupled map lattices system CML, dynamics formula are as follows:
Wherein, j is space index, and n is time index, and ε is coupling parameter, and L is the quantity of grid.Auxiliary function f (x) is Logistic mapping is as follows:
F (x)=x=μ x (1-x), x ∈ (0,1), μ ∈ [3.57,4] (4)
Shuffle operation in above-mentioned second step are as follows: equal-sized with image firstly the need of being converted to one-dimensional chaos sequence Then two-dimensional pixel matrix carries out piecemeal processing according to suitable size to matrix, if cannot be uniformly added if piecemeal to matrix Pixel 0 is transformed.Pixel in first block of pixels is diffused into the matrix for being used to store scramble image, then circulation changes For each block of pixels, finally upset the location of pixels of original image completely.
Diffusing step in above-mentioned third step is specifically to obtain three chaos sequence streams first, and two sequence flows are carried out After xor operation modulus, then with third sequence flows and scramble pixel stream xor operation is carried out, to change scramble pixel value Size, obtained diffusion data are final ciphertext pixel.Xor operation is increased by high complicated calculating as far as possible The safety of strong algorithms.
Beneficial effects of the present invention are that the Encryption Algorithm effect that is proposed is more excellent, have very strong safety, can Various attacks are resisted, key sensibility is strong.And the present invention be based on mature Theoretical Design, have strong applicability and Safety.
Detailed description of the invention
Fig. 1 is ciphering process figure of the invention.
Fig. 2 is encryption and decryption effect picture of the invention.(a) Lena plaintext image;(b) Lena ciphertext image;(c)Lena Decrypted image;
Fig. 3 is histogram distribution of the invention.(a) plaintext image Lena;(b) histogram of plaintext image Lena;(c) close Texts and pictures are as Lena;(d) histogram of ciphertext image Lena.
Fig. 4 is key sensitivity tests of the invention.(a) image of successful decryption;(b) the subtle decryption figure for changing key Picture;(c) difference of two width ciphertext images.
Specific embodiment
Present invention encryption is described in more detail below with reference to Fig. 1
The process of Encryption Algorithm is as follows:
In order to which without loss of generality, if gray level image P is M × N size, wherein M is line number, and N is columns.
1) the size piecemeal for being 8 × 8 according to every piece by image, is divided into Z-block.If pixel value total number is not 64 times Number will be transformed to be suitable for the size of image.Calculate pixel value summation sum and pixel value average value ag, Xiang Yingji It is as follows to calculate formula:
Wherein one-dimension array corresponding to image is g (i), and i ∈ (1, M × N).
2) 512 cryptographic Hash closely related with plaintext image P are generated by formula (1) first, then according to formula (2) Secure hash algorithm the initial value x for coupled map lattices is generated since the bit of kth position0(j),j∈0,1,2…L。
3) pass through initial parameter x0(j) and two auxiliary functions are by the logistic chaotic maps represented by formula (4), The chaos sequence of dispersion operation is available for by iteration coupled map lattices formula (3).Record the generation of each grid It is worth, then the raw M × N × L chaos sequence of common property.
4) the grid g generated in previous step is taken1(i) total M × N number of chaos sequence, after being handled according to formula (7), Shuffle operation for image.Three grid g in previous step are taken again2(i),g3(i) and g4(i) chaos sequence is for spreading Operation, it is handled according to formula (8-10):
C (i)=(g1(i)×1015+ag×1015)mod(M×N) (7)
e1(i)=(g2(i)×1015+sum×106)mod 256 (8)
e2(i)=(g3(i)×1015+ag×1013)mod 256 (9)
e3(i)=(g4(i)×1015)mod256 (10)
5) it will be used for the one-dimensional chaos sequence c (i) of scramble, i ∈ 0,1 ... M × N to be converted to size and plaintext image P phase Same two-dimensional matrix H1, one two-dimensional matrix H of reproduction2For storing the pixel after scramble.By matrix H1It is divided into Z-block, every piece Comprising 64 pixels, while by matrix H2It is divided into 64 pieces, every block size is Z1=sum/64 pixel, wherein Z and Z1Number It is worth equal.By H1In 64 pixels of first block of image spread storage respectively to H264 blocks of images each first In a position, then by H1In second block of image in 64 pixels be equally stored in H2In each piece of second position In, after circulate operation Z times, the shuffle operation of whole pixels is completed, scramble image Pc is generated.
6) by formula (8-10) chaos sequence generated, xor operation, mistake are carried out with the image pixel stream after scramble Journey is as follows:
Pc (i) is the image pixel value in step 5 after scramble in formula, and Pe (i) is then the encrypted result of Pc (i), that is, The pixel value of finally obtained ciphertext image.
So far, the image encryption operation of the algorithm is fully completed, and generates ciphertext image Pe.
2 pairs of present invention decryption are explained as follows:
The Encryption Algorithm that this chapter is proposed has invertibity, and the decryption processes and ciphering process of algorithm are quite similar, Some steps inversely perform.
1) first by known key according to secure hash algorithm and coupled maps lattice used in Encryption Algorithm Son etc. calculates the parameters for needing to use in decrypting process, due to key include pixel value and and average value and chaos The initial value etc. of mapping, it is only necessary to be executed according to encrypting step.
2) ciphertext image is carried out by exclusive or decryption oprerations by the inverse operation of the 6th step of encrypting step, obtains scramble image Pc。
3) operation is decrypted to scramble step, 64 pieces is divided into the image after scramble first, extract the of each piece One pixel value, using this 64 pixel values as first piece of plaintext image, iteration obtains plaintext image slices afterwards several times Prime matrix.
4) plaintext image is converted by picture element matrix, obtained result is decrypted image P.
3 are analyzed as follows algorithm in conjunction with the data in attached drawing and table:
1 plaintext of table and ciphertext image relative coefficient
The comentropy of the invention of table 2 and compared with existing algorithm
NPCR the and UACI value of ciphertext image and compared with existing algorithm when 3 plaintext one bit of image modification of table
Table 1 shows the original text of Lena image and the relative coefficient of ciphertext adjacent pixel in three directions, passes through table Middle data, and can it can be found that Encryption Algorithm proposed by the invention has broken the strong correlation between adjacent pixel well To resist the attack such as statistical analysis well.Table 2 illustrates the comparison result of this chapter algorithm Yu other algorithms, in completely random In the case of, the comentropy size of image is 8, it can be concluded that comentropy of the invention is very close to theoretical value from table, therefore this hair Bright the Analysis of Entropy of resisting that can be safe is attacked.In order to effectively resist differential attack, subtle in plaintext image changes This makes ciphertext image change completely to allergic effect, by the realization data of table 3 it is found that the present invention have compared to other algorithms it is high Safety can effectively resist known plain text attack.For encryption system, the statistical property of ciphertext image is a Xiang Shifen Important index.Ciphertext image should have certain robustness to resist arbitrary Statistical Analysis Attacks.Fig. 3 shows Lena The histogram of plaintext image and ciphertext image, by histogram can intuitively see the pixel value of encrypted image near It is evenly distributed in each gray level of image, has reacted good statistical property.There is safe enough for one For encryption system, algorithm will have higher key sensibility and biggish key space, just can effectively resist various sudden and violent Power attack.Fig. 4 is the test result to key sensibility, therefrom it will be seen that after subtle change key value, decryption figure As completely chaotic state is presented, illustrate that the algorithm has stronger key sensibility.And for the selection of the key present invention Key is chosen in conjunction with plaintext image, is ensured that different plaintext images has different keys in this way, be can be the present invention Known plain text attack and chosen -plain attact can be effectively resisted, it is highly-safe.

Claims (8)

1. a kind of new image encryption method, which comprises the steps of:
The first step calculates the pixel of image and the average value with pixel first, as key a part and by safety dissipate Column algorithm calculates the initial value of chaos system;
Second step, shuffle operation: the initial value and auxiliary function iteration coupled map lattices obtained by the first step will generate A chaos sequence be converted to two-dimensional pixel matrix, then by the matrix carry out piecemeal operation, will be in each block of pixels Pixel is diffused into the picture element matrix of storage scramble image, after being iterated, is completed the operation of entire image, is generated scramble figure Picture;
Third step, diffusion: taking the coupled map lattices in second step to generate other three groups of chaos sequences, after carrying out data processing, Xor operation is carried out with the image pixel stream after scramble, obtained processing result is the image pixel value after spreading, and is realized Change to pixel value size.
2. the new image encryption method of one kind according to claim 1, which is characterized in that used in second step and third step Coupled map lattices be typical CML, dynamics formula are as follows:
Wherein, ε is coupling parameter, and n is time index, and j is space index, and L is the quantity of grid;Mapping function f (x) is Logistic mapping is as follows:
F (x)=x=μ x (1-x), x ∈ (0,1), μ ∈ [3.57,4] (4).
3. the new image encryption method of one kind according to claim 1 or 2, which is characterized in that the scramble behaviour in second step As: firstly the need of by one-dimensional chaos sequence be converted to the equal-sized two-dimensional pixel matrix of image, then to matrix according to Suitable size carries out piecemeal processing, if cannot be uniformly transformed if piecemeal to matrix addition pixel 0;By first block of pixels Interior pixel is diffused into the matrix for storing scramble image, and then each block of pixels of loop iteration, finally upsets completely The location of pixels of original image.
4. the new image encryption method of one kind according to claim 1 or 2, which is characterized in that the diffusion step in third step It is rapid to be specifically, obtain three chaos sequence streams first, after two sequence flows are carried out xor operation modulus, then with third sequence Stream and scramble pixel stream carry out xor operation, change the size of scramble pixel value, obtained diffusion data is final Ciphertext pixel.
5. the new image encryption method of one kind according to claim 3, which is characterized in that the diffusing step tool in third step Body is, obtains three chaos sequence streams first, after two sequence flows are carried out xor operation modulus, then with third sequence flows with And scramble pixel stream carries out xor operation, changes the size of scramble pixel value, obtained diffusion data is final ciphertext Pixel.
6. the new image encryption method of one kind described according to claim 1 or 2 or 5, which is characterized in that used in the first step Secure hash algorithm is SHA-512, obtains the initial value for chaotic maps, steps are as follows
H=SHA3-512 (sum) (1)
In formula, d1、d2、d3And d4It is to be extracted from cryptographic Hash h, wherein each diIndicate a byte.
7. the new image encryption method of one kind according to claim 3, which is characterized in that the safety used in the first step dissipates Column algorithm is SHA-512, obtains the initial value for chaotic maps, steps are as follows
H=SHA3-512 (sum) (1)
In formula, d1、d2、d3And d4It is to be extracted from cryptographic Hash h, wherein each diIndicate a byte.
8. the new image encryption method of one kind according to claim 4, which is characterized in that the safety used in the first step dissipates Column algorithm is SHA-512, obtains the initial value for chaotic maps, steps are as follows
H=SHA3-512 (sum) (1)
In formula, d1、d2、d3And d4It is to be extracted from cryptographic Hash h, wherein each diIndicate a byte.
CN201811457278.6A 2018-11-30 2018-11-30 New image encryption method Expired - Fee Related CN109660696B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811457278.6A CN109660696B (en) 2018-11-30 2018-11-30 New image encryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811457278.6A CN109660696B (en) 2018-11-30 2018-11-30 New image encryption method

Publications (2)

Publication Number Publication Date
CN109660696A true CN109660696A (en) 2019-04-19
CN109660696B CN109660696B (en) 2020-07-14

Family

ID=66111157

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811457278.6A Expired - Fee Related CN109660696B (en) 2018-11-30 2018-11-30 New image encryption method

Country Status (1)

Country Link
CN (1) CN109660696B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111327900A (en) * 2020-01-21 2020-06-23 河南大学 Color image encryption method based on compressed sensing and deformation coupling mapping grid
CN111444522A (en) * 2020-03-19 2020-07-24 南昌大学 Random blocking chaotic image encryption method
CN112330521A (en) * 2020-10-21 2021-02-05 南京航空航天大学 Image encryption method
CN112751981A (en) * 2021-02-20 2021-05-04 新疆医科大学第一附属医院 Batch transmission encryption method for sliced digital images
CN112887507A (en) * 2021-03-04 2021-06-01 大连海事大学 Image encryption method for spatiotemporal chaos in multi-coupling mapping lattice with multiple dynamic coupling coefficients
CN113645367A (en) * 2021-07-14 2021-11-12 河南大学 Batch image combined encryption method and device
CN114143413A (en) * 2021-11-26 2022-03-04 佛山芯珠微电子有限公司 Image data PUF (physical unclonable function) security encryption system and encryption method
CN114615392A (en) * 2022-03-18 2022-06-10 东北大学 Image encryption method based on bit linkage
CN115174036A (en) * 2022-09-06 2022-10-11 华信咨询设计研究院有限公司 Medical insurance data security transmission system and method based on data processing
CN115242557A (en) * 2022-09-22 2022-10-25 江苏广海检验检测有限公司 Safe transmission method and system for environmental protection monitoring data

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110311042A1 (en) * 2008-10-23 2011-12-22 University Of Ulster Encryption method
CN105488426A (en) * 2015-11-30 2016-04-13 西安闻泰电子科技有限公司 Mobile platform image encryption method
CN107133994A (en) * 2017-05-05 2017-09-05 大连理工大学 A kind of new image encryption method
CN108537716A (en) * 2018-01-24 2018-09-14 重庆邮电大学 A kind of color image encryption embedding grammar based on discrete domain

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110311042A1 (en) * 2008-10-23 2011-12-22 University Of Ulster Encryption method
CN105488426A (en) * 2015-11-30 2016-04-13 西安闻泰电子科技有限公司 Mobile platform image encryption method
CN107133994A (en) * 2017-05-05 2017-09-05 大连理工大学 A kind of new image encryption method
CN108537716A (en) * 2018-01-24 2018-09-14 重庆邮电大学 A kind of color image encryption embedding grammar based on discrete domain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
刘清文: "基于混沌的图像加密算法的研究", 《大连理工大学硕士学位论文》 *

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111327900B (en) * 2020-01-21 2022-03-01 河南大学 Color image encryption method based on compressed sensing and deformation coupling mapping grid
CN111327900A (en) * 2020-01-21 2020-06-23 河南大学 Color image encryption method based on compressed sensing and deformation coupling mapping grid
CN111444522A (en) * 2020-03-19 2020-07-24 南昌大学 Random blocking chaotic image encryption method
CN111444522B (en) * 2020-03-19 2024-02-27 南昌大学 Random blocking chaotic image encryption method
CN112330521A (en) * 2020-10-21 2021-02-05 南京航空航天大学 Image encryption method
CN112751981B (en) * 2021-02-20 2022-09-23 新疆医科大学第一附属医院 Batch transmission encryption method for sliced digital images
CN112751981A (en) * 2021-02-20 2021-05-04 新疆医科大学第一附属医院 Batch transmission encryption method for sliced digital images
CN112887507A (en) * 2021-03-04 2021-06-01 大连海事大学 Image encryption method for spatiotemporal chaos in multi-coupling mapping lattice with multiple dynamic coupling coefficients
CN112887507B (en) * 2021-03-04 2022-09-27 大连海事大学 Image encryption method for spatiotemporal chaos in multi-coupling mapping lattice with multiple dynamic coupling coefficients
CN113645367B (en) * 2021-07-14 2022-04-29 河南大学 Batch image combined encryption method and device
CN113645367A (en) * 2021-07-14 2021-11-12 河南大学 Batch image combined encryption method and device
CN114143413A (en) * 2021-11-26 2022-03-04 佛山芯珠微电子有限公司 Image data PUF (physical unclonable function) security encryption system and encryption method
CN114143413B (en) * 2021-11-26 2023-11-03 佛山芯珠微电子有限公司 Image data PUF (physical unclonable function) secure encryption system and encryption method
CN114615392A (en) * 2022-03-18 2022-06-10 东北大学 Image encryption method based on bit linkage
CN115174036A (en) * 2022-09-06 2022-10-11 华信咨询设计研究院有限公司 Medical insurance data security transmission system and method based on data processing
CN115242557A (en) * 2022-09-22 2022-10-25 江苏广海检验检测有限公司 Safe transmission method and system for environmental protection monitoring data
CN115242557B (en) * 2022-09-22 2023-01-06 江苏广海检验检测有限公司 Safe transmission method and system for environmental protection monitoring data

Also Published As

Publication number Publication date
CN109660696B (en) 2020-07-14

Similar Documents

Publication Publication Date Title
CN109660696A (en) A kind of new image encryption method
CN108898025B (en) Chaotic image encryption method based on double scrambling and DNA coding
Zhu et al. A chaos-based symmetric image encryption scheme using a bit-level permutation
Ye et al. An efficient chaotic image encryption algorithm based on a generalized Arnold map
Yang et al. A fast image encryption and authentication scheme based on chaotic maps
Ye et al. An image encryption scheme based on time-delay and hyperchaotic system
Chen et al. Cryptanalysis and improvement in an image encryption scheme using combination of the 1D chaotic map
CN108122188B (en) Image encryption method
Fu-Yan et al. Image encryption using high-dimension chaotic system
Soleymani et al. A novel public key image encryption based on elliptic curves over prime group field
CN106709854A (en) Cat mapping and chaos based image information fusion and encryption method
CN112134688A (en) Asymmetric image encryption method based on quantum chaotic mapping and SHA-3
CN112311524A (en) Image encryption method based on new chaotic mapping and compressed sensing
Hussain et al. A novel algorithm for thermal image encryption
Ye A novel image encryption scheme based on generalized multi-sawtooth maps
Ahadpour et al. A chaos-based image encryption scheme using chaotic coupled map lattices
Singh et al. Improvement of image transmission using chaotic system and elliptic curve cryptography
Zarei Zefreh et al. LSIE: a fast and secure Latin square-based image encryption scheme
Dixit et al. Image encryption using permutation and rotational XOR technique
Chapaneri et al. Chaos based image encryption using latin rectangle scrambling
CN107133994B (en) Image encryption method
CN109712204A (en) A kind of image encryption method based on FCM cluster
Nayak et al. An improved image encryption technique using diffusion method associated with hill cipher and chaotic logistic map
Soleymani et al. A binary grouping approach for image encryption based on elliptic curves over prime group field
CN117118591B (en) Chaotic cryptographic system based on fractal sequencing vector S box

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200714

Termination date: 20211130

CF01 Termination of patent right due to non-payment of annual fee