CN109977686A - A kind of image encryption method and image processing equipment based on Composite Chaotic System - Google Patents

A kind of image encryption method and image processing equipment based on Composite Chaotic System Download PDF

Info

Publication number
CN109977686A
CN109977686A CN201910257477.0A CN201910257477A CN109977686A CN 109977686 A CN109977686 A CN 109977686A CN 201910257477 A CN201910257477 A CN 201910257477A CN 109977686 A CN109977686 A CN 109977686A
Authority
CN
China
Prior art keywords
image
chaotic system
block
composite chaotic
marking area
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910257477.0A
Other languages
Chinese (zh)
Other versions
CN109977686B (en
Inventor
孙希延
刘冬梅
纪元法
蓝如师
罗笑南
严素清
付文涛
李有明
赵松克
符强
王守华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guilin University of Electronic Technology
Original Assignee
Guilin University of Electronic Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guilin University of Electronic Technology filed Critical Guilin University of Electronic Technology
Priority to CN201910257477.0A priority Critical patent/CN109977686B/en
Publication of CN109977686A publication Critical patent/CN109977686A/en
Application granted granted Critical
Publication of CN109977686B publication Critical patent/CN109977686B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Image Processing (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

The present invention is suitable for image encryption field, provides a kind of image encryption method and image processing equipment based on Composite Chaotic System.The described method includes: Sine mapping, Tent mapping and Logistic mapping are mapped as seed, chaos range is extended using cascade operation and nonlinear combination, generates Composite Chaotic System;Chaos sequence is generated using Composite Chaotic System to be pre-encrypted to plaintext image, generates pre-encrypt image;Reference picture is obtained, pre-encrypt image and reference picture are combined, visually significant ciphertext image is generated using wavelet transform DWT algorithm.Method of the invention has broader chaos range and more complicated chaotic behavior, improves encryption performance;And due to generating visually significant ciphertext image, the probability attacked is reduced, chosen -plain attact and exhaustive attack can be resisted, there is preferable encryption performance.

Description

A kind of image encryption method and image processing equipment based on Composite Chaotic System
Technical field
The invention belongs to image encryption field more particularly to a kind of image encryption methods and figure based on Composite Chaotic System As processing equipment.
Background technique
Image encryption technology based on chaos is added using the characteristic design of the basic characteristics and digital picture of chaos sequence Close algorithm, to improve the safety of encryption and a kind of technology of operation efficiency.Due to including vital strategic secrets and quick in digital picture Feel information, such as military image, medical image, is required to reliable, quick and high robustness Encryption Algorithm to ensure to be transmitted across Safety and validity in journey.Chaos is not need to add any enchancement factor similar random behavior occur, i.e., There are intrinsic stochasticities, and have extremely sensitive dependence to initial value.
Application publication number is CN103971317A, a kind of entitled " image encryption based on fractional order chaotic maps The Chinese patent application of method " discloses a kind of image encryption method based on fractional order chaotic maps, the mathematical modulo of this method Type is established on fractional order discrete Logistic mapping basis, is set using fractional order scattered date signal to image information Disorderly to achieve the effect that image encryption.But program chaos range is narrow, chaotic behavior is bad.And such as the Chinese patent Shen Shown in Figure of description 3 please, only plaintext image is encrypted, the ciphertext graph of formation seems the figure with pattern A possibility that picture, this ciphertext image is easily found by attacker, attacked, is higher.
Summary of the invention
The purpose of the present invention is to provide a kind of image encryption methods based on Composite Chaotic System, computer-readable storage Medium and image processing equipment, it is intended to the chaos range for solving the image encryption method based on fractional order chaotic maps is narrow, Chaotic behavior is bad, and the ciphertext graph of formation seems the image with pattern, is easily found by attacker, and that is attacked can It can the higher problem of property.
In a first aspect, the present invention provides a kind of image encryption methods based on Composite Chaotic System, which comprises
Sine mapping, Tent mapping and Logistic mapping are mapped as seed, utilize cascade operation and non-linear group Extension chaos range is closed, Composite Chaotic System is generated;
Chaos sequence is generated using Composite Chaotic System to be pre-encrypted to plaintext image, generates pre-encrypt image;
Reference picture is obtained, pre-encrypt image and reference picture are combined, is generated and is regarded using wavelet transform DWT algorithm Significant ciphertext image in feel.
Second aspect, the present invention provides a kind of computer readable storage medium, the computer readable storage medium is deposited Computer program is contained, such as the above-mentioned image based on Composite Chaotic System is realized when the computer program is executed by processor The step of encryption method.
The third aspect, the present invention provides a kind of image processing equipments, comprising:
One or more processors;
Memory;And
One or more computer programs, the processor and the memory are connected by bus, wherein one Or multiple computer programs are stored in the memory, and are configured to be executed by one or more of processors, The processor realizes the step such as the above-mentioned image encryption method based on Composite Chaotic System when executing the computer program Suddenly.
In the present invention, Sine mapping, Tent mapping and Logistic mapping are mapped as seed, utilizes cascade operation Chaos range is extended with nonlinear combination, generates Composite Chaotic System;Chaos sequence is generated using Composite Chaotic System come to bright Texts and pictures picture is pre-encrypted, and generates pre-encrypt image;And it is generated using wavelet transform DWT algorithm visually significant close Texts and pictures picture.Therefore there is broader chaos range and more complicated chaotic behavior, improve encryption performance;And due to generating vision Upper significant ciphertext image, therefore reduce the probability attacked, can resist chosen -plain attact and exhaustive attack, have compared with Good encryption performance.In addition, due to utilizing wavelet transform DWT algorithm, there is an advantage in that: (1) guarantee Watermark will not be eliminated under JPEG2000 lossy compression;(2) in order to improve the robustness of watermark, since human visual system is to figure As the variation of edge and texture part is not very sensitive, but very sensitive to the variation in image smoothing region.Simultaneously as from Scattered wavelet transformation edge and texture part can be limited in well its details filial generation (in such as HL, LH, HH, detail subbands What coefficient often indicated is the marginal portion of image), therefore embed a watermark into and can wherein obtain good visual effect;(3) It can be directly embedded into watermark in the compressed domain;(4) wavelet transform is by choosing suitable filter, can greatly reduce or The correlation between extracted different characteristic is removed, and can be fast implemented.
Detailed description of the invention
Fig. 1 is the flow chart for the image encryption method based on Composite Chaotic System that the embodiment of the present invention one provides.
Fig. 2 is the structure chart of Composite Chaotic System in the embodiment of the present invention one.
Fig. 3 is the LE index and bifurcation graphs of SL-T Composite Chaotic System.
Fig. 4 is different types of DCT coefficient schematic diagram in the DCT block of 8 × 8 sizes.
Fig. 5 is the structural block diagram of resume image.
Fig. 6 is the structural block diagram of wavelet transform.
Fig. 7 is ciphering process schematic diagram.
Fig. 8 is the specific block diagram for the image processing equipment that the embodiment of the present invention three provides.
Specific embodiment
In order to which the purpose of the present invention, technical solution and beneficial effect is more clearly understood, below in conjunction with attached drawing and implementation Example, the present invention will be described in further detail.It should be appreciated that specific embodiment described herein is only used to explain this hair It is bright, it is not intended to limit the present invention.
In order to illustrate technical solutions according to the invention, the following is a description of specific embodiments.
Embodiment one:
Referring to Fig. 1, the image encryption method based on Composite Chaotic System that the embodiment of the present invention one provides includes following Step:
S101, Sine mapping, Tent mapping and Logistic mapping are mapped as seed, utilizes cascade operation and non-thread Property combination extension chaos range, generate Composite Chaotic System.
In the embodiment of the present invention one, the nonlinear combination specifically includes addition and modular arithmetic.
Composite Chaotic System structure chart is as shown in Figure 2.The defined formula of Composite Chaotic System are as follows:
xn+1=F (G (xn)+H(xn))mod1 (1)
Wherein, F (x), G (x) and H (x) are three seed mappings.In the embodiment of the present invention one, Sine is selected to map, Tent mapping and Logistic mapping are mapped as seed, xnIt is iterative value, xn+1It is the output of Composite Chaotic System, mod operation Be in order to ensure export-restriction be [0,1].Composite Chaotic System enhances the complexity of structure, can be more random, is conducive to grade Connection combination and nonlinear operation.
Composite Chaotic System passes through two operations simultaneously and interacts to three seed mappings, can generate multiple new mix Ignorant mapping.The Sine used mapping, Tent mapping and Logistic mapping are indicated with S, T and L respectively, are generated since seed maps Composite Chaotic System there are many, the chaos range and chaotic behavior of whole Composite Chaotic Systems are verified one by one, obtained The Composite Chaotic System widest in area to chaos is LS-T Composite Chaotic System.The LE value and bifurcation graphs of LS-T Composite Chaotic System As shown in figure 3, it can be seen from the figure that u ∈ (0.08,0.23), u ∈ (0.33,0.49) and u ∈ (0.51,1) range Interior, the LE value of LS-T system is positive, and LS-T Composite Chaotic System has wider chaos range and better chaotic behavior.
The defined formula of LS-T Composite Chaotic System are as follows:
xn+1=4usin (π xn)((1-usin(πxn))+(1-u)sin(πxn))mod1 (2)
LS-T Composite Chaotic System has preferable chaotic behavior and wider chaos range, and is preferably applied to image In Encryption Algorithm.
S102, chaos sequence is generated using Composite Chaotic System to be pre-encrypted to plaintext image, generate pre-encrypt figure Picture.
In the embodiment of the present invention one, S102 can specifically include following steps:
S1021, the marking area in plaintext image is extracted using selective encryption algorithm;
S1022, the marking area of plaintext image is pre-encrypted using Composite Chaotic System generation chaos sequence, it is raw At pre-encrypt image.
The S1021 can specifically include following steps:
S10211, the marking area for detecting plaintext image.
It can specifically include following steps:
Color characteristic and brightness are extracted, that is, calculates the difference between each block and other all blocks, directly Take the corresponding brightness value or color feature value C of two blocks;
Texture feature extraction asks the distance between texture, i.e. diversity factor T using norm.
It is the DCT (Discrete Cosine Transform, discrete cosine transform) of 8 × 8 sizes as shown in Figure 4 Different types of DCT coefficient in block, the DCT coefficient in a block includes DC coefficient and AC coefficient, and black square is DC Coefficient.In DCT coefficient, DC coefficient reflects the average value of each 8 × 8 block of pixels.
Assuming that the red of DC coefficient, green, blue three color components are respectively r, g, b, then the calculating of brightness can It is calculated using formula (3):
L=(r+g+b)/3 (3)
New red component R, new green component G, new blue component B and new yellow color component Y are generated by r, g, b, Shown in calculation formula such as formula (4)-(7):
R=r- (g+b)/2 (4)
G=g- (r+b)/2 (5)
B=b- (r+g)/2 (6)
Y=(r+g)/2- | r-b |/2-b (7)
According to obtained new red component R, new green component G, new blue component B and new yellow color component Y, The red green confrontation and champac confrontation component obtained using the double countermeasure systems of color is two kinds of required color characteristics:
Crg=R-G (8)
Cby=B-Y (9)
The texture information of image block is indicated by AC coefficient.The all the points of each ingredient of brightness are distinguished into phase Add, so that the overall coefficient value of three ingredients is obtained, the as textural characteristics T of each DCT block:
T={ tLF,tMF,tHF} (10)
Wherein, tLF、tMFAnd tHFRespectively indicate the summation of all the points of low frequency, intermediate frequency and high frequency various pieces.
S10212, Gauss algorithm of the selection based on the position coordinates Euclidean distance between block of pixels are come the power of definition block difference Weight coefficient obtains marking area figure S in conjunction with brightness, color characteristic and textural characteristics difference matrixk(k=1,2,3,4), And use the fusion rule combination marking area figure S to be normalized to basisk(k=1,2,3,4) it obtains plaintext image and is based on pressure The final notable figure S in contracting domain.
Shown in the formula such as formula (11) for calculating Euclidean distance, the position coordinates Euclidean distance d between block i and block jij:
Shown in the formula such as formula (12) for calculating weight coefficient, based on the weight coefficient of Euclidean distance between block i and block j ωij:
Wherein, σ is the parameter of Gauss model, and σ=20 can be set.
Shown in the formula such as formula (13) for calculating characteristic remarkable picture, k-th of characteristic remarkable value of block i
Wherein, k ∈ { I, Crg,Cby,T};For the feature difference between the DCT block i and block j of each feature.
According to formula (11), (12) and (13), the marking area figure S of brightness, color and textural characteristics is obtainedk(k=1,2, 3,4)。
Use the fusion rule combination marking area figure S to be normalized to basisk(k=1,2,3,4) plaintext image is obtained Final notable figure S based on compression domain:
S=∑ γ N (Sk)+βΠN(Sk) (14)
Wherein, N is normalization operation;γ and β is the weight coefficient of the corresponding part in formula respectively, is implemented in the present invention γ=β=0.2 is set in example one.
The S1022 can specifically include following steps:
S10221, encryption key k is obtainede, for the marking area of the plaintext image of M × N size, initialization control Parameter f0, h0, x0And u.
S10222, since l=1 to L, execute circulation: using selection Composite Chaotic System generate chaos sequence X, hold Line replacement operation and arrangement operation, the pixel of the marking area of plaintext image is rearranged in the position in space, so that The marking area of plaintext image becomes meaningless confusing image, has preferable robustness, generates pre-encrypt image and decryption Password.
Encryption key keBy f0, h0, x0It is formed with u, f0, h0And x0It is fn, hnAnd xnInitial value.In addition, replacement process and Alignment processes are repeated four times to improve the diffusion of pre-encrypt image and aliasing characteristics.Therefore, initial value f0And h0According to formula (15) It updates L=4 times:
Wherein, p is the random number that range is [0,1], c0Indicate initial value, x0It is the initial value of chaos sequence.
Resume image includes two important steps: executing replacement operator and arrangement operation, as shown in Figure 5.By scheming As can be seen that the control parameter of resume image is more, it can be ensured that the key sensibility of encrypted image can be resisted a variety of Attack, such as exhaustive attack and chosen -plain attact.
S103, reference picture is obtained, pre-encrypt image and reference picture is combined, wavelet transform is utilized (Discrete Wavelet Transform, DWT) algorithm generates visually significant ciphertext image.
Since pre-encrypt image is the image with texture or obvious decorative pattern, and the final goal of the embodiment of the present invention one It is to generate visually significant ciphertext image, it is therefore desirable to convert by image of the digital watermarking algorithm to pre-encrypt It arrives.There are many digital watermarking algorithms, such as spatial domain watermark algorithm, frequency domain water mark algorithm.In the embodiment of the present invention one, mainly adopt With the Algorithms of Discrete Wavelet Transform in frequency domain water mark algorithm.Wavelet transform by flexible shift operations to signal (function) by Step carries out multi-scale refinement, is finally reached the subdivision of high frequency treatment frequency, can adapt to the requirement of time frequency signal analysis automatically, so as to poly- Coke arrives any details of signal.
In the embodiment of the present invention one, S103 can specifically include following steps:
Reference picture is obtained, the reference picture is visually significant image;
Utilize the content conversion (Discrete-wavelet-transform-based based on wavelet transform Content Transform, DWTCT) pre-encrypt image is converted to essentially identical with the size and pattern of reference picture Visually significant ciphertext image.Ciphertext image is possible to have point fuzziness compared to reference picture, but can be by adjusting Wavelet filter reduces fog-level, so that ciphertext image and reference picture seem just the same.
The structural block diagram of wavelet transform is as shown in Figure 6.
DWTCT algorithm, which is converted to pre-encrypt image P to have, is similar to the size of reference image R and visually having for pattern The ciphertext image of meaning, i.e., visual ciphertext image (Visually Meaningful Encrypted Image, VMEI). Using different reference pictures, the image encryption method based on Composite Chaotic System that the embodiment of the present invention one provides generates complete Different VMEI.This DWTCT definition in equation (16).Size identical as reference picture ciphertext image E=T (P, R, Kt)(16)
Wherein T indicates DWTCT;KtIt is the parameter set of DWTCT, it defines the wavelet filter collection of wavelet transform;R It is the reference picture and ciphertext image with identical size with E.
In conclusion under the premise of the size of the size of the reference picture of selection and plaintext image is consistent, discrete wavelet Transformation can generate preferable watermark effect to pre-encrypt image, and the ciphertext graph of generation seem visually meaningful figure Picture, i.e., it is no different from normal image, achieve the purpose that protect the important information in image, ciphering process schematic diagram such as Fig. 7 It is shown.Wherein Fig. 7 (a) is plaintext image, and Fig. 7 (b) is specific image, and Fig. 7 (c) is pre-encrypt image, and Fig. 7 (d) is ciphertext graph Picture.
Embodiment two:
Second embodiment of the present invention provides a kind of computer readable storage medium, the computer-readable recording medium storage There is computer program, is realized when the computer program is executed by processor as what the embodiment of the present invention one provided is mixed based on compound The step of image encryption method of ignorant system.
Embodiment three:
Fig. 8 shows the specific block diagram of the image processing equipment of the offer of the embodiment of the present invention three, a kind of image procossing Equipment 100 includes: one or more processors 101, memory 102 and one or more computer programs, wherein the place Reason device 101 is connected with the memory 102 by bus, and one or more of computer programs are stored in the memory It in 102, and is configured to be executed by one or more of processors 101, the processor 101 executes the computer journey The step of image encryption method based on Composite Chaotic System such as the offer of the embodiment of the present invention one is realized when sequence.
In the present invention, Sine mapping, Tent mapping and Logistic mapping are mapped as seed, utilizes cascade operation Chaos range is extended with nonlinear combination, generates Composite Chaotic System;Chaos sequence is generated using Composite Chaotic System come to bright Texts and pictures picture is pre-encrypted, and generates pre-encrypt image;And it is generated using wavelet transform DWT algorithm visually significant close Texts and pictures picture.Therefore there is broader chaos range and more complicated chaotic behavior, improve encryption performance;And due to generating vision Upper significant ciphertext image, therefore reduce the probability attacked, can resist chosen -plain attact and exhaustive attack, have compared with Good encryption performance.In addition, due to utilizing wavelet transform DWT algorithm, there is an advantage in that: (1) guarantee Watermark will not be eliminated under JPEG2000 lossy compression;(2) in order to improve the robustness of watermark, since human visual system is to figure As the variation of edge and texture part is not very sensitive, but very sensitive to the variation in image smoothing region.Simultaneously as from Scattered wavelet transformation edge and texture part can be limited in well its details filial generation (such as low-and high-frequency subband (High-Lower, HL), low high-frequency sub-band (Lower-High, LH), in high-frequency sub-band (High-High, HH), the coefficient of detail subbands often indicates Be image marginal portion), therefore embed a watermark into and can wherein obtain good visual effect;It (3) can be in the compressed domain It is directly embedded into watermark;(4) wavelet transform can be greatly reduced or removed extracted by choosing suitable filter Correlation between different characteristic, and can fast implement.
Those of ordinary skill in the art will appreciate that all or part of the steps in the various methods of above-described embodiment is can It is completed with instructing relevant hardware by program, which can be stored in a computer readable storage medium, storage Medium may include: read-only memory (ROM, Read Only Memory), random access memory (RAM, Random Access Memory), disk or CD etc..
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention Made any modifications, equivalent replacements, and improvements etc., should all be included in the protection scope of the present invention within mind and principle.

Claims (10)

1. a kind of image encryption method based on Composite Chaotic System, which is characterized in that the described method includes:
Sine mapping, Tent mapping and Logistic mapping are mapped as seed, expanded using cascade operation and nonlinear combination Chaos range is opened up, Composite Chaotic System is generated;
Chaos sequence is generated using Composite Chaotic System to be pre-encrypted to plaintext image, generates pre-encrypt image;
Reference picture is obtained, pre-encrypt image and reference picture are combined, is generated visually using wavelet transform DWT algorithm Significant ciphertext image.
2. the method as described in claim 1, which is characterized in that the nonlinear combination specifically includes addition and modular arithmetic.
3. the method as described in claim 1, which is characterized in that the defined formula of the Composite Chaotic System are as follows: xn+1=F (G (xn)+H(xn)) mod1, wherein F (x), G (x) and H (x) are the mappings of three seeds, respectively Sine mapping, Tent mapping and Logistic mapping, xnIt is iterative value, xn+1It is the output of Composite Chaotic System.
4. method as claimed in claim 3, which is characterized in that indicate that the Sine used mapping, Tent are reflected with S, T and L respectively It penetrates and is mapped with Logistic, the Composite Chaotic System is LS-T Composite Chaotic System, and the definition of LS-T Composite Chaotic System is public Formula are as follows: xn+1=4usin (π xn)((1-usin(πxn))+(1-u)sin(πxn))mod1。
5. the method as described in claim 1, which is characterized in that described to generate chaos sequence using Composite Chaotic System come to bright Texts and pictures picture is pre-encrypted, and is generated pre-encrypt image and is specifically included:
The marking area in plaintext image is extracted using selective encryption algorithm;
Chaos sequence is generated using Composite Chaotic System to be pre-encrypted to the marking area of plaintext image, generates pre-encrypt figure Picture.
6. method as claimed in claim 5, which is characterized in that described to be extracted in plaintext image using selective encryption algorithm Marking area specifically includes:
Detect the marking area of plaintext image;
Select the Gauss algorithm based on the position coordinates Euclidean distance between block of pixels come the weight coefficient of definition block difference, in conjunction with Brightness, color characteristic and textural characteristics difference matrix obtain marking area figure Sk(k=1,2,3,4), and use is with normalizing Turn to the fusion rule combination marking area figure S on basisk(k=1,2,3,4) plaintext image is obtained based on the final of compression domain Notable figure S;
It is described to generate chaos sequence using Composite Chaotic System to be pre-encrypted to the marking area of plaintext image, generate pre-add Close image specifically includes:
Obtain encryption key ke, for the marking area of the plaintext image of M × N size, initialize control parameter f0, h0, x0 And u;
To L since l=1, execute circulation: using selection Composite Chaotic System generate chaos sequence X, execute replacement operator and Arrangement operation, the pixel of the marking area of plaintext image is rearranged in the position in space, generate pre-encrypt image and Clear crytpographic key.
7. method as claimed in claim 6, which is characterized in that the marking area of the detection plaintext image specifically includes following Step:
Color characteristic and brightness are extracted, that is, calculates the difference between each block and other all blocks, directly takes two The corresponding brightness value or color feature value C of a block;
Texture feature extraction asks the distance between texture, i.e. diversity factor T using norm;
The extraction color characteristic specifically:
Assuming that the red of DC coefficient, green, blue three color components are respectively r, g, b, then the calculating of brightness utilizes public affairs Formula l=(r+g+b)/3 is calculated;
New red component R, new green component G, new blue component B and new yellow color component Y are generated by r, g, b, calculated Formula is as follows:
R=r- (g+b)/2;G=g- (r+b)/2;B=b- (r+g)/2;Y=(r+g)/2- | r-b |/2-b;
According to obtained new red component R, new green component G, new blue component B and new yellow color component Y, use The red green confrontation and champac confrontation component that the double countermeasure systems of color obtain are two kinds of required color characteristics: Crg=R-G;Cby =B-Y;
The texture feature extraction specifically:
The texture information of image block is indicated by AC coefficient;The all the points of each ingredient of brightness are separately summed, from And the overall coefficient value of three ingredients is obtained, the as textural characteristics T of each DCT block, T={ tLF,tMF,tHF};Wherein, tLF、 tMFAnd tHFRespectively indicate the summation of all the points of low frequency, intermediate frequency and high frequency various pieces;
The Gauss algorithm of the selection based on the position coordinates Euclidean distance between block of pixels come the weight coefficient of definition block difference, In conjunction with brightness, color characteristic and textural characteristics difference matrix, marking area figure S is obtainedk(k=1,2,3,4), and use with It is normalized to the fusion rule combination marking area figure S on basisk(k=1,2,3,4) plaintext image is obtained based on compression domain most Whole notable figure S specifically:
Calculate the formula of Euclidean distance such asIt is shown, the position coordinates Euclidean between block i and block j Distance dij
Calculate the formula of weight coefficient such asIt is shown, based on the weight coefficient of Euclidean distance between block i and block j ωij;Wherein, σ is the parameter of Gauss model;
Calculate the formula of characteristic remarkable picture such asIt is shown, k-th of characteristic remarkable value of block iWherein, k ∈ I, Crg,Cby,T};For the feature difference between the DCT block i and block j of each feature, it is special finally to obtain brightness, color and texture The marking area figure S of signk(k=1,2,3,4);
Use the fusion rule combination marking area figure S to be normalized to basisk(k=1,2,3,4) it obtains plaintext image and is based on pressure Final notable figure S, the S=∑ γ N (S in contracting domaink)+βΠN(Sk);Wherein, N is normalization operation;γ and β is in formula respectively Corresponding part weight coefficient;
The encryption key keBy f0, h0, x0It is formed with u, f0, h0And x0It is fn, hnAnd xnInitial value;It replacement process and arranged Journey is repeated four times, initial value f0And h0According to formulaIt updates L=4 times, wherein p is that range is The random number of [0,1], c0Indicate initial value, x0It is the initial value of chaos sequence.
8. method as described in any one of claim 1 to 7, which is characterized in that the acquisition reference picture, by pre-encrypt image It is combined with reference picture, generates visually significant ciphertext image using wavelet transform DWT algorithm and specifically include:
Reference picture is obtained, the reference picture is visually significant image;
Pre-encrypt image is converted to the size and figure with reference picture using the content conversion based on wavelet transform The essentially identical visually significant ciphertext image of case.
9. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists In the computer program is realized as claimed in any one of claims 1 to 8 based on Composite Chaotic System when being executed by processor Image encryption method the step of.
10. a kind of image processing equipment, comprising:
One or more processors;
Memory;And
One or more computer programs, the processor and the memory are connected by bus, wherein one or more A computer program is stored in the memory, and is configured to be executed by one or more of processors, special Sign is that the processor is realized as claimed in any one of claims 1 to 8 based on compound mixed when executing the computer program The step of image encryption method of ignorant system.
CN201910257477.0A 2019-04-01 2019-04-01 Image encryption method and image processing equipment based on composite chaotic system Active CN109977686B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910257477.0A CN109977686B (en) 2019-04-01 2019-04-01 Image encryption method and image processing equipment based on composite chaotic system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910257477.0A CN109977686B (en) 2019-04-01 2019-04-01 Image encryption method and image processing equipment based on composite chaotic system

Publications (2)

Publication Number Publication Date
CN109977686A true CN109977686A (en) 2019-07-05
CN109977686B CN109977686B (en) 2023-03-31

Family

ID=67082191

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910257477.0A Active CN109977686B (en) 2019-04-01 2019-04-01 Image encryption method and image processing equipment based on composite chaotic system

Country Status (1)

Country Link
CN (1) CN109977686B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110414250A (en) * 2019-07-29 2019-11-05 广东工业大学 Image encryption method and device based on discrete dispersion transformation and chaotic function
CN110677236A (en) * 2019-11-01 2020-01-10 辽宁工程技术大学 OFDM encryption method based on composite chaotic system and XOR operation
CN111093098A (en) * 2019-12-30 2020-05-01 北京电子科技学院 Logistic mapping-based chaotic encryption method
CN112788195A (en) * 2019-11-11 2021-05-11 阿里巴巴集团控股有限公司 Image processing method, device and equipment
CN112800444A (en) * 2021-01-19 2021-05-14 桂林电子科技大学 Color image encryption method based on two-dimensional chaotic mapping
CN114142991A (en) * 2021-12-03 2022-03-04 山西大学 Linear regular domain voice encryption system based on cascade chaotic modulation
CN115378574A (en) * 2022-08-09 2022-11-22 徐州恒佳电子科技有限公司 Lightweight dynamic image data encryption method and system
CN117174233A (en) * 2023-11-02 2023-12-05 山东大数据医疗科技有限公司 Management platform based on health big data

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101604439A (en) * 2008-06-13 2009-12-16 西北工业大学 A kind of color image encrypting method based on multi-chaos system
CN104766264A (en) * 2015-01-22 2015-07-08 西北工业大学 Partitioning double-layer self-adaptation diffusion image encryption method
CN105956992A (en) * 2016-05-23 2016-09-21 温文媖 Significance area protection method based on encryption image with visual meaning

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101604439A (en) * 2008-06-13 2009-12-16 西北工业大学 A kind of color image encrypting method based on multi-chaos system
CN104766264A (en) * 2015-01-22 2015-07-08 西北工业大学 Partitioning double-layer self-adaptation diffusion image encryption method
CN105956992A (en) * 2016-05-23 2016-09-21 温文媖 Significance area protection method based on encryption image with visual meaning

Non-Patent Citations (6)

* Cited by examiner, † Cited by third party
Title
LAN RUSHI: "" Integrated chaotic systems for image encryption"", 《SIGNAL PROCESSING》 *
SUN XIYAN: "A new image block encryption method based on chaotic map and DNA encoding"", 《2018 7TH INTERNATIONAL CONFERENCE ON DIGITAL HOME》 *
孙力;黄正谦;梁立;: "基于复合混沌映射与连续扩散的图像加密算法" *
闫兵等: "基于交叉混沌映射的小波域图像加密算法", 《计算机应用研究》 *
马凌;侯小毛;张福泉;龚芝;: "基于复合混沌系统与人工神经网络学习的图像加密算法" *
黄晓生;顾景文;: "基于复合混沌序列与小波变换的图像加密算法" *

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110414250B (en) * 2019-07-29 2021-05-11 广东工业大学 Image encryption method and device based on discrete fractional transformation and chaotic function
CN110414250A (en) * 2019-07-29 2019-11-05 广东工业大学 Image encryption method and device based on discrete dispersion transformation and chaotic function
CN110677236A (en) * 2019-11-01 2020-01-10 辽宁工程技术大学 OFDM encryption method based on composite chaotic system and XOR operation
CN110677236B (en) * 2019-11-01 2022-10-21 辽宁工程技术大学 OFDM encryption method based on composite chaotic system and XOR operation
CN112788195B (en) * 2019-11-11 2023-08-29 阿里巴巴集团控股有限公司 Image processing method, device and equipment
CN112788195A (en) * 2019-11-11 2021-05-11 阿里巴巴集团控股有限公司 Image processing method, device and equipment
CN111093098A (en) * 2019-12-30 2020-05-01 北京电子科技学院 Logistic mapping-based chaotic encryption method
CN112800444A (en) * 2021-01-19 2021-05-14 桂林电子科技大学 Color image encryption method based on two-dimensional chaotic mapping
CN114142991A (en) * 2021-12-03 2022-03-04 山西大学 Linear regular domain voice encryption system based on cascade chaotic modulation
CN115378574A (en) * 2022-08-09 2022-11-22 徐州恒佳电子科技有限公司 Lightweight dynamic image data encryption method and system
CN115378574B (en) * 2022-08-09 2023-12-19 徐州恒佳电子科技有限公司 Lightweight dynamic image data encryption method and system
CN117174233A (en) * 2023-11-02 2023-12-05 山东大数据医疗科技有限公司 Management platform based on health big data
CN117174233B (en) * 2023-11-02 2024-02-09 山东大数据医疗科技有限公司 Management platform based on health big data

Also Published As

Publication number Publication date
CN109977686B (en) 2023-03-31

Similar Documents

Publication Publication Date Title
CN109977686A (en) A kind of image encryption method and image processing equipment based on Composite Chaotic System
Fares et al. A robust blind color image watermarking based on Fourier transform domain
Anand et al. Watermarking techniques for medical data authentication: a survey
Gul et al. A novel hash function based fragile watermarking method for image integrity
Ahmadi et al. An intelligent and blind dual color image watermarking for authentication and copyright protection
Mahto et al. A survey of color image watermarking: State-of-the-art and research directions
Patvardhan et al. Effective color image watermarking scheme using YCbCr color space and QR code
Pandey et al. Iris based secure NROI multiple eye image watermarking for teleophthalmology
Tedmori et al. Image cryptographic algorithm based on the Haar wavelet transform
Kumar et al. DWT based color image watermarking using maximum entropy
Niu et al. A novel color image watermarking scheme in nonsampled contourlet-domain
Inamdar et al. Dual watermarking technique with multiple biometric watermarks
Giri et al. DWT based color image watermarking: a review
Roy et al. A perception based color image adaptive watermarking scheme in YCbCr space
Cao et al. Robust and reversible color image watermarking based on DFT in the spatial domain
Liu et al. Robust blind image watermarking based on chaotic mixtures
Roy et al. An HVS inspired robust non-blind watermarking scheme in YCbCr color space
Zhang et al. A spatial domain‐based color image blind watermarking scheme integrating multilevel discrete Hartley transform
Lakrissi et al. Novel dynamic color image watermarking based on DWT-SVD and the human visual system
Zhang et al. Robust image watermarking algorithm based on QWT and QSVD using 2D Chebyshev-Logistic map
Kishore et al. Medical image watermarking: run through review
Kukreja et al. Copyright protection scheme for color images using extended visual cryptography
Tiwari et al. Image watermarking techniques based on Schur decomposition and various image invariant moments: a review
Valandar et al. High secure digital image steganography based on 3D chaotic map
Hajjaji et al. Combining DWT/KLT for secure transfer of color images

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant