CN109977686A - A kind of image encryption method and image processing equipment based on Composite Chaotic System - Google Patents
A kind of image encryption method and image processing equipment based on Composite Chaotic System Download PDFInfo
- Publication number
- CN109977686A CN109977686A CN201910257477.0A CN201910257477A CN109977686A CN 109977686 A CN109977686 A CN 109977686A CN 201910257477 A CN201910257477 A CN 201910257477A CN 109977686 A CN109977686 A CN 109977686A
- Authority
- CN
- China
- Prior art keywords
- image
- chaotic system
- block
- composite chaotic
- marking area
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/50—Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Image Processing (AREA)
- Editing Of Facsimile Originals (AREA)
Abstract
The present invention is suitable for image encryption field, provides a kind of image encryption method and image processing equipment based on Composite Chaotic System.The described method includes: Sine mapping, Tent mapping and Logistic mapping are mapped as seed, chaos range is extended using cascade operation and nonlinear combination, generates Composite Chaotic System;Chaos sequence is generated using Composite Chaotic System to be pre-encrypted to plaintext image, generates pre-encrypt image;Reference picture is obtained, pre-encrypt image and reference picture are combined, visually significant ciphertext image is generated using wavelet transform DWT algorithm.Method of the invention has broader chaos range and more complicated chaotic behavior, improves encryption performance;And due to generating visually significant ciphertext image, the probability attacked is reduced, chosen -plain attact and exhaustive attack can be resisted, there is preferable encryption performance.
Description
Technical field
The invention belongs to image encryption field more particularly to a kind of image encryption methods and figure based on Composite Chaotic System
As processing equipment.
Background technique
Image encryption technology based on chaos is added using the characteristic design of the basic characteristics and digital picture of chaos sequence
Close algorithm, to improve the safety of encryption and a kind of technology of operation efficiency.Due to including vital strategic secrets and quick in digital picture
Feel information, such as military image, medical image, is required to reliable, quick and high robustness Encryption Algorithm to ensure to be transmitted across
Safety and validity in journey.Chaos is not need to add any enchancement factor similar random behavior occur, i.e.,
There are intrinsic stochasticities, and have extremely sensitive dependence to initial value.
Application publication number is CN103971317A, a kind of entitled " image encryption based on fractional order chaotic maps
The Chinese patent application of method " discloses a kind of image encryption method based on fractional order chaotic maps, the mathematical modulo of this method
Type is established on fractional order discrete Logistic mapping basis, is set using fractional order scattered date signal to image information
Disorderly to achieve the effect that image encryption.But program chaos range is narrow, chaotic behavior is bad.And such as the Chinese patent Shen
Shown in Figure of description 3 please, only plaintext image is encrypted, the ciphertext graph of formation seems the figure with pattern
A possibility that picture, this ciphertext image is easily found by attacker, attacked, is higher.
Summary of the invention
The purpose of the present invention is to provide a kind of image encryption methods based on Composite Chaotic System, computer-readable storage
Medium and image processing equipment, it is intended to the chaos range for solving the image encryption method based on fractional order chaotic maps is narrow,
Chaotic behavior is bad, and the ciphertext graph of formation seems the image with pattern, is easily found by attacker, and that is attacked can
It can the higher problem of property.
In a first aspect, the present invention provides a kind of image encryption methods based on Composite Chaotic System, which comprises
Sine mapping, Tent mapping and Logistic mapping are mapped as seed, utilize cascade operation and non-linear group
Extension chaos range is closed, Composite Chaotic System is generated;
Chaos sequence is generated using Composite Chaotic System to be pre-encrypted to plaintext image, generates pre-encrypt image;
Reference picture is obtained, pre-encrypt image and reference picture are combined, is generated and is regarded using wavelet transform DWT algorithm
Significant ciphertext image in feel.
Second aspect, the present invention provides a kind of computer readable storage medium, the computer readable storage medium is deposited
Computer program is contained, such as the above-mentioned image based on Composite Chaotic System is realized when the computer program is executed by processor
The step of encryption method.
The third aspect, the present invention provides a kind of image processing equipments, comprising:
One or more processors;
Memory;And
One or more computer programs, the processor and the memory are connected by bus, wherein one
Or multiple computer programs are stored in the memory, and are configured to be executed by one or more of processors,
The processor realizes the step such as the above-mentioned image encryption method based on Composite Chaotic System when executing the computer program
Suddenly.
In the present invention, Sine mapping, Tent mapping and Logistic mapping are mapped as seed, utilizes cascade operation
Chaos range is extended with nonlinear combination, generates Composite Chaotic System;Chaos sequence is generated using Composite Chaotic System come to bright
Texts and pictures picture is pre-encrypted, and generates pre-encrypt image;And it is generated using wavelet transform DWT algorithm visually significant close
Texts and pictures picture.Therefore there is broader chaos range and more complicated chaotic behavior, improve encryption performance;And due to generating vision
Upper significant ciphertext image, therefore reduce the probability attacked, can resist chosen -plain attact and exhaustive attack, have compared with
Good encryption performance.In addition, due to utilizing wavelet transform DWT algorithm, there is an advantage in that: (1) guarantee
Watermark will not be eliminated under JPEG2000 lossy compression;(2) in order to improve the robustness of watermark, since human visual system is to figure
As the variation of edge and texture part is not very sensitive, but very sensitive to the variation in image smoothing region.Simultaneously as from
Scattered wavelet transformation edge and texture part can be limited in well its details filial generation (in such as HL, LH, HH, detail subbands
What coefficient often indicated is the marginal portion of image), therefore embed a watermark into and can wherein obtain good visual effect;(3)
It can be directly embedded into watermark in the compressed domain;(4) wavelet transform is by choosing suitable filter, can greatly reduce or
The correlation between extracted different characteristic is removed, and can be fast implemented.
Detailed description of the invention
Fig. 1 is the flow chart for the image encryption method based on Composite Chaotic System that the embodiment of the present invention one provides.
Fig. 2 is the structure chart of Composite Chaotic System in the embodiment of the present invention one.
Fig. 3 is the LE index and bifurcation graphs of SL-T Composite Chaotic System.
Fig. 4 is different types of DCT coefficient schematic diagram in the DCT block of 8 × 8 sizes.
Fig. 5 is the structural block diagram of resume image.
Fig. 6 is the structural block diagram of wavelet transform.
Fig. 7 is ciphering process schematic diagram.
Fig. 8 is the specific block diagram for the image processing equipment that the embodiment of the present invention three provides.
Specific embodiment
In order to which the purpose of the present invention, technical solution and beneficial effect is more clearly understood, below in conjunction with attached drawing and implementation
Example, the present invention will be described in further detail.It should be appreciated that specific embodiment described herein is only used to explain this hair
It is bright, it is not intended to limit the present invention.
In order to illustrate technical solutions according to the invention, the following is a description of specific embodiments.
Embodiment one:
Referring to Fig. 1, the image encryption method based on Composite Chaotic System that the embodiment of the present invention one provides includes following
Step:
S101, Sine mapping, Tent mapping and Logistic mapping are mapped as seed, utilizes cascade operation and non-thread
Property combination extension chaos range, generate Composite Chaotic System.
In the embodiment of the present invention one, the nonlinear combination specifically includes addition and modular arithmetic.
Composite Chaotic System structure chart is as shown in Figure 2.The defined formula of Composite Chaotic System are as follows:
xn+1=F (G (xn)+H(xn))mod1 (1)
Wherein, F (x), G (x) and H (x) are three seed mappings.In the embodiment of the present invention one, Sine is selected to map,
Tent mapping and Logistic mapping are mapped as seed, xnIt is iterative value, xn+1It is the output of Composite Chaotic System, mod operation
Be in order to ensure export-restriction be [0,1].Composite Chaotic System enhances the complexity of structure, can be more random, is conducive to grade
Connection combination and nonlinear operation.
Composite Chaotic System passes through two operations simultaneously and interacts to three seed mappings, can generate multiple new mix
Ignorant mapping.The Sine used mapping, Tent mapping and Logistic mapping are indicated with S, T and L respectively, are generated since seed maps
Composite Chaotic System there are many, the chaos range and chaotic behavior of whole Composite Chaotic Systems are verified one by one, obtained
The Composite Chaotic System widest in area to chaos is LS-T Composite Chaotic System.The LE value and bifurcation graphs of LS-T Composite Chaotic System
As shown in figure 3, it can be seen from the figure that u ∈ (0.08,0.23), u ∈ (0.33,0.49) and u ∈ (0.51,1) range
Interior, the LE value of LS-T system is positive, and LS-T Composite Chaotic System has wider chaos range and better chaotic behavior.
The defined formula of LS-T Composite Chaotic System are as follows:
xn+1=4usin (π xn)((1-usin(πxn))+(1-u)sin(πxn))mod1 (2)
LS-T Composite Chaotic System has preferable chaotic behavior and wider chaos range, and is preferably applied to image
In Encryption Algorithm.
S102, chaos sequence is generated using Composite Chaotic System to be pre-encrypted to plaintext image, generate pre-encrypt figure
Picture.
In the embodiment of the present invention one, S102 can specifically include following steps:
S1021, the marking area in plaintext image is extracted using selective encryption algorithm;
S1022, the marking area of plaintext image is pre-encrypted using Composite Chaotic System generation chaos sequence, it is raw
At pre-encrypt image.
The S1021 can specifically include following steps:
S10211, the marking area for detecting plaintext image.
It can specifically include following steps:
Color characteristic and brightness are extracted, that is, calculates the difference between each block and other all blocks, directly
Take the corresponding brightness value or color feature value C of two blocks;
Texture feature extraction asks the distance between texture, i.e. diversity factor T using norm.
It is the DCT (Discrete Cosine Transform, discrete cosine transform) of 8 × 8 sizes as shown in Figure 4
Different types of DCT coefficient in block, the DCT coefficient in a block includes DC coefficient and AC coefficient, and black square is DC
Coefficient.In DCT coefficient, DC coefficient reflects the average value of each 8 × 8 block of pixels.
Assuming that the red of DC coefficient, green, blue three color components are respectively r, g, b, then the calculating of brightness can
It is calculated using formula (3):
L=(r+g+b)/3 (3)
New red component R, new green component G, new blue component B and new yellow color component Y are generated by r, g, b,
Shown in calculation formula such as formula (4)-(7):
R=r- (g+b)/2 (4)
G=g- (r+b)/2 (5)
B=b- (r+g)/2 (6)
Y=(r+g)/2- | r-b |/2-b (7)
According to obtained new red component R, new green component G, new blue component B and new yellow color component Y,
The red green confrontation and champac confrontation component obtained using the double countermeasure systems of color is two kinds of required color characteristics:
Crg=R-G (8)
Cby=B-Y (9)
The texture information of image block is indicated by AC coefficient.The all the points of each ingredient of brightness are distinguished into phase
Add, so that the overall coefficient value of three ingredients is obtained, the as textural characteristics T of each DCT block:
T={ tLF,tMF,tHF} (10)
Wherein, tLF、tMFAnd tHFRespectively indicate the summation of all the points of low frequency, intermediate frequency and high frequency various pieces.
S10212, Gauss algorithm of the selection based on the position coordinates Euclidean distance between block of pixels are come the power of definition block difference
Weight coefficient obtains marking area figure S in conjunction with brightness, color characteristic and textural characteristics difference matrixk(k=1,2,3,4),
And use the fusion rule combination marking area figure S to be normalized to basisk(k=1,2,3,4) it obtains plaintext image and is based on pressure
The final notable figure S in contracting domain.
Shown in the formula such as formula (11) for calculating Euclidean distance, the position coordinates Euclidean distance d between block i and block jij:
Shown in the formula such as formula (12) for calculating weight coefficient, based on the weight coefficient of Euclidean distance between block i and block j
ωij:
Wherein, σ is the parameter of Gauss model, and σ=20 can be set.
Shown in the formula such as formula (13) for calculating characteristic remarkable picture, k-th of characteristic remarkable value of block i
Wherein, k ∈ { I, Crg,Cby,T};For the feature difference between the DCT block i and block j of each feature.
According to formula (11), (12) and (13), the marking area figure S of brightness, color and textural characteristics is obtainedk(k=1,2,
3,4)。
Use the fusion rule combination marking area figure S to be normalized to basisk(k=1,2,3,4) plaintext image is obtained
Final notable figure S based on compression domain:
S=∑ γ N (Sk)+βΠN(Sk) (14)
Wherein, N is normalization operation;γ and β is the weight coefficient of the corresponding part in formula respectively, is implemented in the present invention
γ=β=0.2 is set in example one.
The S1022 can specifically include following steps:
S10221, encryption key k is obtainede, for the marking area of the plaintext image of M × N size, initialization control
Parameter f0, h0, x0And u.
S10222, since l=1 to L, execute circulation: using selection Composite Chaotic System generate chaos sequence X, hold
Line replacement operation and arrangement operation, the pixel of the marking area of plaintext image is rearranged in the position in space, so that
The marking area of plaintext image becomes meaningless confusing image, has preferable robustness, generates pre-encrypt image and decryption
Password.
Encryption key keBy f0, h0, x0It is formed with u, f0, h0And x0It is fn, hnAnd xnInitial value.In addition, replacement process and
Alignment processes are repeated four times to improve the diffusion of pre-encrypt image and aliasing characteristics.Therefore, initial value f0And h0According to formula (15)
It updates L=4 times:
Wherein, p is the random number that range is [0,1], c0Indicate initial value, x0It is the initial value of chaos sequence.
Resume image includes two important steps: executing replacement operator and arrangement operation, as shown in Figure 5.By scheming
As can be seen that the control parameter of resume image is more, it can be ensured that the key sensibility of encrypted image can be resisted a variety of
Attack, such as exhaustive attack and chosen -plain attact.
S103, reference picture is obtained, pre-encrypt image and reference picture is combined, wavelet transform is utilized
(Discrete Wavelet Transform, DWT) algorithm generates visually significant ciphertext image.
Since pre-encrypt image is the image with texture or obvious decorative pattern, and the final goal of the embodiment of the present invention one
It is to generate visually significant ciphertext image, it is therefore desirable to convert by image of the digital watermarking algorithm to pre-encrypt
It arrives.There are many digital watermarking algorithms, such as spatial domain watermark algorithm, frequency domain water mark algorithm.In the embodiment of the present invention one, mainly adopt
With the Algorithms of Discrete Wavelet Transform in frequency domain water mark algorithm.Wavelet transform by flexible shift operations to signal (function) by
Step carries out multi-scale refinement, is finally reached the subdivision of high frequency treatment frequency, can adapt to the requirement of time frequency signal analysis automatically, so as to poly-
Coke arrives any details of signal.
In the embodiment of the present invention one, S103 can specifically include following steps:
Reference picture is obtained, the reference picture is visually significant image;
Utilize the content conversion (Discrete-wavelet-transform-based based on wavelet transform
Content Transform, DWTCT) pre-encrypt image is converted to essentially identical with the size and pattern of reference picture
Visually significant ciphertext image.Ciphertext image is possible to have point fuzziness compared to reference picture, but can be by adjusting
Wavelet filter reduces fog-level, so that ciphertext image and reference picture seem just the same.
The structural block diagram of wavelet transform is as shown in Figure 6.
DWTCT algorithm, which is converted to pre-encrypt image P to have, is similar to the size of reference image R and visually having for pattern
The ciphertext image of meaning, i.e., visual ciphertext image (Visually Meaningful Encrypted Image, VMEI).
Using different reference pictures, the image encryption method based on Composite Chaotic System that the embodiment of the present invention one provides generates complete
Different VMEI.This DWTCT definition in equation (16).Size identical as reference picture ciphertext image E=T (P, R,
Kt)(16)
Wherein T indicates DWTCT;KtIt is the parameter set of DWTCT, it defines the wavelet filter collection of wavelet transform;R
It is the reference picture and ciphertext image with identical size with E.
In conclusion under the premise of the size of the size of the reference picture of selection and plaintext image is consistent, discrete wavelet
Transformation can generate preferable watermark effect to pre-encrypt image, and the ciphertext graph of generation seem visually meaningful figure
Picture, i.e., it is no different from normal image, achieve the purpose that protect the important information in image, ciphering process schematic diagram such as Fig. 7
It is shown.Wherein Fig. 7 (a) is plaintext image, and Fig. 7 (b) is specific image, and Fig. 7 (c) is pre-encrypt image, and Fig. 7 (d) is ciphertext graph
Picture.
Embodiment two:
Second embodiment of the present invention provides a kind of computer readable storage medium, the computer-readable recording medium storage
There is computer program, is realized when the computer program is executed by processor as what the embodiment of the present invention one provided is mixed based on compound
The step of image encryption method of ignorant system.
Embodiment three:
Fig. 8 shows the specific block diagram of the image processing equipment of the offer of the embodiment of the present invention three, a kind of image procossing
Equipment 100 includes: one or more processors 101, memory 102 and one or more computer programs, wherein the place
Reason device 101 is connected with the memory 102 by bus, and one or more of computer programs are stored in the memory
It in 102, and is configured to be executed by one or more of processors 101, the processor 101 executes the computer journey
The step of image encryption method based on Composite Chaotic System such as the offer of the embodiment of the present invention one is realized when sequence.
In the present invention, Sine mapping, Tent mapping and Logistic mapping are mapped as seed, utilizes cascade operation
Chaos range is extended with nonlinear combination, generates Composite Chaotic System;Chaos sequence is generated using Composite Chaotic System come to bright
Texts and pictures picture is pre-encrypted, and generates pre-encrypt image;And it is generated using wavelet transform DWT algorithm visually significant close
Texts and pictures picture.Therefore there is broader chaos range and more complicated chaotic behavior, improve encryption performance;And due to generating vision
Upper significant ciphertext image, therefore reduce the probability attacked, can resist chosen -plain attact and exhaustive attack, have compared with
Good encryption performance.In addition, due to utilizing wavelet transform DWT algorithm, there is an advantage in that: (1) guarantee
Watermark will not be eliminated under JPEG2000 lossy compression;(2) in order to improve the robustness of watermark, since human visual system is to figure
As the variation of edge and texture part is not very sensitive, but very sensitive to the variation in image smoothing region.Simultaneously as from
Scattered wavelet transformation edge and texture part can be limited in well its details filial generation (such as low-and high-frequency subband (High-Lower,
HL), low high-frequency sub-band (Lower-High, LH), in high-frequency sub-band (High-High, HH), the coefficient of detail subbands often indicates
Be image marginal portion), therefore embed a watermark into and can wherein obtain good visual effect;It (3) can be in the compressed domain
It is directly embedded into watermark;(4) wavelet transform can be greatly reduced or removed extracted by choosing suitable filter
Correlation between different characteristic, and can fast implement.
Those of ordinary skill in the art will appreciate that all or part of the steps in the various methods of above-described embodiment is can
It is completed with instructing relevant hardware by program, which can be stored in a computer readable storage medium, storage
Medium may include: read-only memory (ROM, Read Only Memory), random access memory (RAM, Random
Access Memory), disk or CD etc..
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention
Made any modifications, equivalent replacements, and improvements etc., should all be included in the protection scope of the present invention within mind and principle.
Claims (10)
1. a kind of image encryption method based on Composite Chaotic System, which is characterized in that the described method includes:
Sine mapping, Tent mapping and Logistic mapping are mapped as seed, expanded using cascade operation and nonlinear combination
Chaos range is opened up, Composite Chaotic System is generated;
Chaos sequence is generated using Composite Chaotic System to be pre-encrypted to plaintext image, generates pre-encrypt image;
Reference picture is obtained, pre-encrypt image and reference picture are combined, is generated visually using wavelet transform DWT algorithm
Significant ciphertext image.
2. the method as described in claim 1, which is characterized in that the nonlinear combination specifically includes addition and modular arithmetic.
3. the method as described in claim 1, which is characterized in that the defined formula of the Composite Chaotic System are as follows: xn+1=F (G
(xn)+H(xn)) mod1, wherein F (x), G (x) and H (x) are the mappings of three seeds, respectively Sine mapping, Tent mapping and
Logistic mapping, xnIt is iterative value, xn+1It is the output of Composite Chaotic System.
4. method as claimed in claim 3, which is characterized in that indicate that the Sine used mapping, Tent are reflected with S, T and L respectively
It penetrates and is mapped with Logistic, the Composite Chaotic System is LS-T Composite Chaotic System, and the definition of LS-T Composite Chaotic System is public
Formula are as follows: xn+1=4usin (π xn)((1-usin(πxn))+(1-u)sin(πxn))mod1。
5. the method as described in claim 1, which is characterized in that described to generate chaos sequence using Composite Chaotic System come to bright
Texts and pictures picture is pre-encrypted, and is generated pre-encrypt image and is specifically included:
The marking area in plaintext image is extracted using selective encryption algorithm;
Chaos sequence is generated using Composite Chaotic System to be pre-encrypted to the marking area of plaintext image, generates pre-encrypt figure
Picture.
6. method as claimed in claim 5, which is characterized in that described to be extracted in plaintext image using selective encryption algorithm
Marking area specifically includes:
Detect the marking area of plaintext image;
Select the Gauss algorithm based on the position coordinates Euclidean distance between block of pixels come the weight coefficient of definition block difference, in conjunction with
Brightness, color characteristic and textural characteristics difference matrix obtain marking area figure Sk(k=1,2,3,4), and use is with normalizing
Turn to the fusion rule combination marking area figure S on basisk(k=1,2,3,4) plaintext image is obtained based on the final of compression domain
Notable figure S;
It is described to generate chaos sequence using Composite Chaotic System to be pre-encrypted to the marking area of plaintext image, generate pre-add
Close image specifically includes:
Obtain encryption key ke, for the marking area of the plaintext image of M × N size, initialize control parameter f0, h0, x0
And u;
To L since l=1, execute circulation: using selection Composite Chaotic System generate chaos sequence X, execute replacement operator and
Arrangement operation, the pixel of the marking area of plaintext image is rearranged in the position in space, generate pre-encrypt image and
Clear crytpographic key.
7. method as claimed in claim 6, which is characterized in that the marking area of the detection plaintext image specifically includes following
Step:
Color characteristic and brightness are extracted, that is, calculates the difference between each block and other all blocks, directly takes two
The corresponding brightness value or color feature value C of a block;
Texture feature extraction asks the distance between texture, i.e. diversity factor T using norm;
The extraction color characteristic specifically:
Assuming that the red of DC coefficient, green, blue three color components are respectively r, g, b, then the calculating of brightness utilizes public affairs
Formula l=(r+g+b)/3 is calculated;
New red component R, new green component G, new blue component B and new yellow color component Y are generated by r, g, b, calculated
Formula is as follows:
R=r- (g+b)/2;G=g- (r+b)/2;B=b- (r+g)/2;Y=(r+g)/2- | r-b |/2-b;
According to obtained new red component R, new green component G, new blue component B and new yellow color component Y, use
The red green confrontation and champac confrontation component that the double countermeasure systems of color obtain are two kinds of required color characteristics: Crg=R-G;Cby
=B-Y;
The texture feature extraction specifically:
The texture information of image block is indicated by AC coefficient;The all the points of each ingredient of brightness are separately summed, from
And the overall coefficient value of three ingredients is obtained, the as textural characteristics T of each DCT block, T={ tLF,tMF,tHF};Wherein, tLF、
tMFAnd tHFRespectively indicate the summation of all the points of low frequency, intermediate frequency and high frequency various pieces;
The Gauss algorithm of the selection based on the position coordinates Euclidean distance between block of pixels come the weight coefficient of definition block difference,
In conjunction with brightness, color characteristic and textural characteristics difference matrix, marking area figure S is obtainedk(k=1,2,3,4), and use with
It is normalized to the fusion rule combination marking area figure S on basisk(k=1,2,3,4) plaintext image is obtained based on compression domain most
Whole notable figure S specifically:
Calculate the formula of Euclidean distance such asIt is shown, the position coordinates Euclidean between block i and block j
Distance dij;
Calculate the formula of weight coefficient such asIt is shown, based on the weight coefficient of Euclidean distance between block i and block j
ωij;Wherein, σ is the parameter of Gauss model;
Calculate the formula of characteristic remarkable picture such asIt is shown, k-th of characteristic remarkable value of block iWherein, k ∈ I,
Crg,Cby,T};For the feature difference between the DCT block i and block j of each feature, it is special finally to obtain brightness, color and texture
The marking area figure S of signk(k=1,2,3,4);
Use the fusion rule combination marking area figure S to be normalized to basisk(k=1,2,3,4) it obtains plaintext image and is based on pressure
Final notable figure S, the S=∑ γ N (S in contracting domaink)+βΠN(Sk);Wherein, N is normalization operation;γ and β is in formula respectively
Corresponding part weight coefficient;
The encryption key keBy f0, h0, x0It is formed with u, f0, h0And x0It is fn, hnAnd xnInitial value;It replacement process and arranged
Journey is repeated four times, initial value f0And h0According to formulaIt updates L=4 times, wherein p is that range is
The random number of [0,1], c0Indicate initial value, x0It is the initial value of chaos sequence.
8. method as described in any one of claim 1 to 7, which is characterized in that the acquisition reference picture, by pre-encrypt image
It is combined with reference picture, generates visually significant ciphertext image using wavelet transform DWT algorithm and specifically include:
Reference picture is obtained, the reference picture is visually significant image;
Pre-encrypt image is converted to the size and figure with reference picture using the content conversion based on wavelet transform
The essentially identical visually significant ciphertext image of case.
9. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists
In the computer program is realized as claimed in any one of claims 1 to 8 based on Composite Chaotic System when being executed by processor
Image encryption method the step of.
10. a kind of image processing equipment, comprising:
One or more processors;
Memory;And
One or more computer programs, the processor and the memory are connected by bus, wherein one or more
A computer program is stored in the memory, and is configured to be executed by one or more of processors, special
Sign is that the processor is realized as claimed in any one of claims 1 to 8 based on compound mixed when executing the computer program
The step of image encryption method of ignorant system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910257477.0A CN109977686B (en) | 2019-04-01 | 2019-04-01 | Image encryption method and image processing equipment based on composite chaotic system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910257477.0A CN109977686B (en) | 2019-04-01 | 2019-04-01 | Image encryption method and image processing equipment based on composite chaotic system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109977686A true CN109977686A (en) | 2019-07-05 |
CN109977686B CN109977686B (en) | 2023-03-31 |
Family
ID=67082191
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910257477.0A Active CN109977686B (en) | 2019-04-01 | 2019-04-01 | Image encryption method and image processing equipment based on composite chaotic system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109977686B (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110414250A (en) * | 2019-07-29 | 2019-11-05 | 广东工业大学 | Image encryption method and device based on discrete dispersion transformation and chaotic function |
CN110677236A (en) * | 2019-11-01 | 2020-01-10 | 辽宁工程技术大学 | OFDM encryption method based on composite chaotic system and XOR operation |
CN111093098A (en) * | 2019-12-30 | 2020-05-01 | 北京电子科技学院 | Logistic mapping-based chaotic encryption method |
CN112788195A (en) * | 2019-11-11 | 2021-05-11 | 阿里巴巴集团控股有限公司 | Image processing method, device and equipment |
CN112800444A (en) * | 2021-01-19 | 2021-05-14 | 桂林电子科技大学 | Color image encryption method based on two-dimensional chaotic mapping |
CN114142991A (en) * | 2021-12-03 | 2022-03-04 | 山西大学 | Linear regular domain voice encryption system based on cascade chaotic modulation |
CN115378574A (en) * | 2022-08-09 | 2022-11-22 | 徐州恒佳电子科技有限公司 | Lightweight dynamic image data encryption method and system |
CN117174233A (en) * | 2023-11-02 | 2023-12-05 | 山东大数据医疗科技有限公司 | Management platform based on health big data |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101604439A (en) * | 2008-06-13 | 2009-12-16 | 西北工业大学 | A kind of color image encrypting method based on multi-chaos system |
CN104766264A (en) * | 2015-01-22 | 2015-07-08 | 西北工业大学 | Partitioning double-layer self-adaptation diffusion image encryption method |
CN105956992A (en) * | 2016-05-23 | 2016-09-21 | 温文媖 | Significance area protection method based on encryption image with visual meaning |
-
2019
- 2019-04-01 CN CN201910257477.0A patent/CN109977686B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101604439A (en) * | 2008-06-13 | 2009-12-16 | 西北工业大学 | A kind of color image encrypting method based on multi-chaos system |
CN104766264A (en) * | 2015-01-22 | 2015-07-08 | 西北工业大学 | Partitioning double-layer self-adaptation diffusion image encryption method |
CN105956992A (en) * | 2016-05-23 | 2016-09-21 | 温文媖 | Significance area protection method based on encryption image with visual meaning |
Non-Patent Citations (6)
Title |
---|
LAN RUSHI: "" Integrated chaotic systems for image encryption"", 《SIGNAL PROCESSING》 * |
SUN XIYAN: "A new image block encryption method based on chaotic map and DNA encoding"", 《2018 7TH INTERNATIONAL CONFERENCE ON DIGITAL HOME》 * |
孙力;黄正谦;梁立;: "基于复合混沌映射与连续扩散的图像加密算法" * |
闫兵等: "基于交叉混沌映射的小波域图像加密算法", 《计算机应用研究》 * |
马凌;侯小毛;张福泉;龚芝;: "基于复合混沌系统与人工神经网络学习的图像加密算法" * |
黄晓生;顾景文;: "基于复合混沌序列与小波变换的图像加密算法" * |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110414250B (en) * | 2019-07-29 | 2021-05-11 | 广东工业大学 | Image encryption method and device based on discrete fractional transformation and chaotic function |
CN110414250A (en) * | 2019-07-29 | 2019-11-05 | 广东工业大学 | Image encryption method and device based on discrete dispersion transformation and chaotic function |
CN110677236A (en) * | 2019-11-01 | 2020-01-10 | 辽宁工程技术大学 | OFDM encryption method based on composite chaotic system and XOR operation |
CN110677236B (en) * | 2019-11-01 | 2022-10-21 | 辽宁工程技术大学 | OFDM encryption method based on composite chaotic system and XOR operation |
CN112788195B (en) * | 2019-11-11 | 2023-08-29 | 阿里巴巴集团控股有限公司 | Image processing method, device and equipment |
CN112788195A (en) * | 2019-11-11 | 2021-05-11 | 阿里巴巴集团控股有限公司 | Image processing method, device and equipment |
CN111093098A (en) * | 2019-12-30 | 2020-05-01 | 北京电子科技学院 | Logistic mapping-based chaotic encryption method |
CN112800444A (en) * | 2021-01-19 | 2021-05-14 | 桂林电子科技大学 | Color image encryption method based on two-dimensional chaotic mapping |
CN114142991A (en) * | 2021-12-03 | 2022-03-04 | 山西大学 | Linear regular domain voice encryption system based on cascade chaotic modulation |
CN115378574A (en) * | 2022-08-09 | 2022-11-22 | 徐州恒佳电子科技有限公司 | Lightweight dynamic image data encryption method and system |
CN115378574B (en) * | 2022-08-09 | 2023-12-19 | 徐州恒佳电子科技有限公司 | Lightweight dynamic image data encryption method and system |
CN117174233A (en) * | 2023-11-02 | 2023-12-05 | 山东大数据医疗科技有限公司 | Management platform based on health big data |
CN117174233B (en) * | 2023-11-02 | 2024-02-09 | 山东大数据医疗科技有限公司 | Management platform based on health big data |
Also Published As
Publication number | Publication date |
---|---|
CN109977686B (en) | 2023-03-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109977686A (en) | A kind of image encryption method and image processing equipment based on Composite Chaotic System | |
Fares et al. | A robust blind color image watermarking based on Fourier transform domain | |
Anand et al. | Watermarking techniques for medical data authentication: a survey | |
Gul et al. | A novel hash function based fragile watermarking method for image integrity | |
Ahmadi et al. | An intelligent and blind dual color image watermarking for authentication and copyright protection | |
Mahto et al. | A survey of color image watermarking: State-of-the-art and research directions | |
Patvardhan et al. | Effective color image watermarking scheme using YCbCr color space and QR code | |
Pandey et al. | Iris based secure NROI multiple eye image watermarking for teleophthalmology | |
Tedmori et al. | Image cryptographic algorithm based on the Haar wavelet transform | |
Kumar et al. | DWT based color image watermarking using maximum entropy | |
Niu et al. | A novel color image watermarking scheme in nonsampled contourlet-domain | |
Inamdar et al. | Dual watermarking technique with multiple biometric watermarks | |
Giri et al. | DWT based color image watermarking: a review | |
Roy et al. | A perception based color image adaptive watermarking scheme in YCbCr space | |
Cao et al. | Robust and reversible color image watermarking based on DFT in the spatial domain | |
Liu et al. | Robust blind image watermarking based on chaotic mixtures | |
Roy et al. | An HVS inspired robust non-blind watermarking scheme in YCbCr color space | |
Zhang et al. | A spatial domain‐based color image blind watermarking scheme integrating multilevel discrete Hartley transform | |
Lakrissi et al. | Novel dynamic color image watermarking based on DWT-SVD and the human visual system | |
Zhang et al. | Robust image watermarking algorithm based on QWT and QSVD using 2D Chebyshev-Logistic map | |
Kishore et al. | Medical image watermarking: run through review | |
Kukreja et al. | Copyright protection scheme for color images using extended visual cryptography | |
Tiwari et al. | Image watermarking techniques based on Schur decomposition and various image invariant moments: a review | |
Valandar et al. | High secure digital image steganography based on 3D chaotic map | |
Hajjaji et al. | Combining DWT/KLT for secure transfer of color images |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |