CN110929279A - Image encryption method based on multi-scroll chaotic system - Google Patents

Image encryption method based on multi-scroll chaotic system Download PDF

Info

Publication number
CN110929279A
CN110929279A CN201911159803.0A CN201911159803A CN110929279A CN 110929279 A CN110929279 A CN 110929279A CN 201911159803 A CN201911159803 A CN 201911159803A CN 110929279 A CN110929279 A CN 110929279A
Authority
CN
China
Prior art keywords
scroll
chaotic system
value
diffusion
pixel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911159803.0A
Other languages
Chinese (zh)
Inventor
王兴元
叶晓林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dalian Maritime University
Original Assignee
Dalian Maritime University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dalian Maritime University filed Critical Dalian Maritime University
Priority to CN201911159803.0A priority Critical patent/CN110929279A/en
Publication of CN110929279A publication Critical patent/CN110929279A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N7/00Computing arrangements based on specific mathematical models
    • G06N7/08Computing arrangements based on specific mathematical models using chaos models or non-linear system models

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Nonlinear Science (AREA)
  • Algebra (AREA)
  • Artificial Intelligence (AREA)
  • Computational Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Evolutionary Computation (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Pure & Applied Mathematics (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Image Processing (AREA)

Abstract

The invention provides an image encryption method based on a multi-scroll chaotic system. The method comprises the following steps: s1, constructing a multi-scroll chaotic system based on a Chua' S system; s2, setting the chaos key parameter to generate a new multi-scroll chaos system; s3, scrambling pixel points of the plaintext by combining an Arnold mapping method; s4, designing a random diffusion method based on the new multi-scroll chaotic system. The technical scheme of the invention solves the problems that the chaotic system for image encryption in the prior art is too simple in structure, low in complexity, and low in ciphertext anti-deciphering capability caused by poor contact with an encryption algorithm. The image encryption method provided by the invention has better security and stronger anti-decoding capability.

Description

Image encryption method based on multi-scroll chaotic system
Technical Field
The invention relates to the technical field of confidential communication, information security and computer image encryption, in particular to an image encryption method based on a multi-scroll chaotic system.
Background
In recent years, the research of chaos theory has been one of the hot problems in the field of nonlinear science. The chaotic system has extremely high sensitivity and good pseudo-randomness, so the chaotic system is widely applied to the field of cryptography. The chaotic key generation mechanism is different from other traditional cryptosystems, so that the chaotic key generation method has great advantages in the aspect of real-time encryption. Especially in image processing, a large amount of data is required, and there is a strong correlation between adjacent data. This results in a low efficiency of encrypting image information in conventional cryptography, and even fails to meet the need for real-time encryption. Compared with the traditional encryption method, the encryption algorithm based on the chaotic system has unique advantages in the aspect of processing big data information. However, because the number of chaotic systems discovered so far is small, a few models can be used for chaotic image encryption, so that the difficulty and the day for breaking the ciphertext are reduced. In the design of the chaotic image encryption algorithm, the chaotic system is often only used for generating chaotic interference parameters, and can be combined with other algorithm designs relatively less, so that the chaotic system is really a rare design scheme which takes the chaotic system as a main design scheme.
The multi-scroll chaotic system is a dynamic chaotic system, and related control parameters can be calculated through analyzing a balance point of a static chaotic system so as to design the multi-scroll chaotic system into the dynamic chaotic system. The controller generally selects a triangular generator or a symbol function generator, and the quantity of the chaotic attractors generated by the system can be controlled by adjusting the parameters of the generator. If the system is dynamic, it means that there are more possibilities for changes. From the perspective of the decryption resistance of the encryption algorithm, the dynamic characteristics of the multi-scroll system are well consistent with the core idea. The image encryption algorithm is designed based on the multi-scroll dynamic system and combined with other algorithms, so that the safety and the anti-decoding capability of the algorithm can be effectively improved. The method has important significance for research in related fields such as secret communication, computer image encryption and the like.
When we apply the selection system to the encryption algorithm, the best choice is a truly random sequence. Because a truly random sequence is essentially a completely random sequence, the effects of encryption must also be optimal. However, since completely random sequences are difficult to decrypt, they are often used for one-way encryption. The chaotic sequence has good pseudo-randomness, and after the chaotic key is set, the obtained value of the chaotic sequence is uniquely determined. Therefore, in recent years, chaotic encryption has once been one of the subjects of intense research in the fields of information security, image encryption, and the like. However, since the number of chaotic system models is limited, the conventional system is also a low-dimensional static system and is not well integrated into the design of an algorithm.
Disclosure of Invention
In light of the above-mentioned technical problems, an image encryption method based on a multi-scroll chaotic system is provided. The invention constructs a multi-scroll chaotic system, effectively combines the number of horizontal and vertical scrolls of the system with the control parameters in the Arnold cat mapping, designs an image encryption method with a dynamic effect, has high safety performance, and makes theoretical guidance and experimental verification for the fields of information safety, secret communication, computer image encryption and the like.
The technical means adopted by the invention are as follows:
an image encryption method based on a multi-scroll chaotic system comprises the following steps:
s1, constructing a multi-scroll chaotic system based on a Chua' S system;
s2, setting the chaos key parameter to generate a new multi-scroll chaos system;
s3, scrambling pixel points of the plaintext by combining an Arnold mapping method;
s4, designing a random diffusion method based on the new multi-scroll chaotic system.
Further, the multi-scroll chaotic system configured in step S1 has a mathematical expression as follows:
Figure BDA0002285756320000021
wherein a and b respectively represent parameters of the multi-scroll chaotic system, and x, y and z respectively represent state variables of the multi-scroll chaotic system; h (x) is a non-linear controller that controls the number of attractors that the system generates in the horizontal direction, which if an even number of attractors are generated can be defined as:
Figure BDA0002285756320000022
wherein m, k and i are variables, the value range of i is [0, N ], and the final scroll number of the chaotic attractor is determined; similarly, if an odd number of attractors are generated, it can be defined as:
Figure BDA0002285756320000031
where sgn (x) is a sign function, which can be expressed as:
Figure BDA0002285756320000032
h (y) in the above formula (1) also represents a nonlinear controller, and the number of attractors generated by the control system in the vertical direction can be defined as:
Figure BDA0002285756320000033
a, y in the above formulaiI is variable, i takes the value min [ M ]1,M2]。
Further, the Arnold mapping method in step S3 specifically includes:
Figure BDA0002285756320000034
wherein x isn、ynRespectively represent the original values, xn+1、yn+1And respectively representing pixel point values after Arnold transformation, p and q respectively representing Arnold parameters, and further achieving the purpose of setting the quantity relation between adjacent pixel points by controlling the values of p and q.
Further, the random diffusion method designed in step S4 specifically includes:
Figure BDA0002285756320000035
wherein, p (n) is a pixel value of a plaintext, x (n) is a value of a discrete memristor chaotic system, and CC (n +1) is a pixel value after an exclusive-or diffusion algorithm;
introducing a disturbance parameter c1,c2,c3And c4If the pixel is subjected to the second diffusion, the following is provided:
Figure BDA0002285756320000041
in the above formula, k1,k2By a parameter c1,c2c3,c4The second diffusion CCC (n +2) depends on the pixel values of two adjacent pixels, the pixel value of the first diffusion cc (n) and the value of the chaotic sequence;
performing exclusive-or diffusion on the second diffused pixels can obtain:
Figure BDA0002285756320000042
in the above formula, CCC (n) is the pixel point value of the second diffusion, k1,k2By a parameter c1,c2c3,c4The value of (c), the value generated by the chaotic sequence, and the third and fourth pixel point values of ccc (n), wherein CCCC (n +1) is the final pixel point value after all encryption algorithms.
Further, the step S4 includes a step of constructing a decryption method based on the image encryption method of the multi-scroll chaotic system, which is specifically as follows:
Figure BDA0002285756320000043
wherein, C (n) is the pixel point value of the encrypted image, and A (n) is the pixel point value obtained after the exclusive or operation;
Figure BDA0002285756320000051
wherein AA (n) is a pixel point value obtained after an anti-random diffusion algorithm, and A (n) is a pixel point value after first reverse XOR diffusion;
through the reverse scrambling algorithm, the following can be obtained:
Figure BDA0002285756320000052
wherein aaaa (n) is the plaintext pixel point value obtained after all decryption algorithms.
Compared with the prior art, the invention has the following advantages:
1. the invention constructs a multi-scroll chaotic system, effectively combines the number of horizontal and vertical scrolls of the system with control parameters in an Arnold cat map, and designs an image encryption algorithm with a dynamic effect.
2. The invention provides an image encryption method based on a multi-scroll chaotic system, wherein the system equation and the scrambling parameter of an image depend on the chaotic key setting of an encryptor, and a new diffusion algorithm based on adjacent pixel points is designed according to the constructed multi-scroll system.
3. Through theoretical analysis and experimental verification, the image encryption algorithm designed by the invention has high safety performance, and theoretical guidance and experimental verification are made for the fields of information safety, secret communication, computer image encryption and the like.
Based on the reasons, the invention can be widely popularized in the fields of secret communication, information security, computer image encryption and the like.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a flow chart of the method of the present invention.
Fig. 2 is a schematic diagram of the chaotic key generation of the present invention.
FIG. 3 is a phase diagram of an attractor generated by the multi-scroll system in an x-y plane after setting a key.
Fig. 4 is an encryption diagram and a decryption diagram of an image according to an embodiment of the present invention.
Fig. 5 is a schematic diagram of a histogram test result according to an embodiment of the present invention.
Fig. 6 is a schematic diagram of a robustness test provided by an embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The invention provides an image encryption method based on a multi-scroll chaotic system, which comprises the following steps:
s1, constructing a multi-scroll chaotic system based on a Chua' S system;
in specific implementation, the mathematical expression of the constructed multi-scroll chaotic system is as follows:
Figure BDA0002285756320000071
wherein a and b respectively represent parameters of the multi-scroll chaotic system, and x, y and z respectively represent state variables of the multi-scroll chaotic system; h (x) is a non-linear controller that controls the number of attractors that the system generates in the horizontal direction, which if an even number of attractors are generated can be defined as:
Figure BDA0002285756320000072
wherein m, k and i are variables, the value range of i is [0, N ], and the final scroll number of the chaotic attractor is determined; similarly, if an odd number of attractors are generated, it can be defined as:
Figure BDA0002285756320000073
where sgn (x) is a sign function, which can be expressed as:
Figure BDA0002285756320000074
h (y) in the above formula (1) also represents a nonlinear controller, and the number of attractors generated by the control system in the vertical direction can be defined as:
Figure BDA0002285756320000075
a, y in the above formulaiI is variable, i takes the value min [ M ]1,M2]。
S2, setting the chaos key parameter to generate a new multi-scroll chaos system;
in one embodiment, as shown in FIG. 2, a key having a length greater than 250 bits is used, wherein the parameter K is1A, b, p, q occupy a 250-bit long lock. The parameters a and b are system parameters of the multi-scroll chaotic systemp and q are the vortex number of the multi-vortex chaotic system and parameters of Arnold transformation. Where a ranges from (8,12), b ranges from (14,22), p and q are positive integers (suggesting a ranges from [2,15 ]]B is in the range of [2,15]) Larger scroll values will cause the system to generate chaotic sequences slowly. Then K1Is divided into11,K12,K13,K14,K15) Each 50 bits long. Setting the key parameters a to 10, b to 16, p to 7, and q to 8, can produce a 7-8 cross-scroll chaotic system, whose phase diagram in the x-y plane is shown in fig. 3.
S3, scrambling pixel points of the plaintext by combining an Arnold mapping method;
in specific implementation, the Arnold mapping method in step S3 specifically includes:
Figure BDA0002285756320000081
wherein x isn、ynRespectively represent the original values, xn+1、yn+1And respectively representing pixel point values after Arnold transformation, p and q respectively representing Arnold parameters, and further achieving the purpose of setting the quantity relation between adjacent pixel points by controlling the values of p and q. And designing an image encryption method by combining the constructed multi-scroll chaotic system, wherein the defined parameters p and q are the number of transverse and longitudinal scrolls of the multi-scroll system respectively and are control parameters of Arnold mapping at the same time. And further, nested encryption of a system and an encryption algorithm is achieved, the method can also be called as an image encryption method based on a dynamic chaotic system, and the anti-decoding capacity of the encryption algorithm is greatly improved.
S4, designing a random diffusion method based on the new multi-scroll chaotic system.
In specific implementation, the random diffusion method designed in step S4 specifically includes:
Figure BDA0002285756320000082
wherein, p (n) is a pixel value of a plaintext, x (n) is a value of a discrete memristor chaotic system, and CC (n +1) is a pixel value after an exclusive-or diffusion algorithm;
in order to further improve the safety performance of the algorithm, the pixels are subjected to secondary diffusion, and meanwhile, in order to increase the complexity of pixel point decoding, a disturbance parameter c is introduced1,c2,c3And c4Then, there are:
Figure BDA0002285756320000083
in the above formula, k1,k2By a parameter c1,c2c3,c4The second diffusion CCC (n +2) depends on the pixel values of two adjacent pixels, the pixel value of the first diffusion cc (n) and the value of the chaotic sequence;
performing exclusive-or diffusion on the second diffused pixels can obtain:
Figure BDA0002285756320000091
in the above formula, CCC (n) is the pixel point value of the second diffusion, k1,k2By a parameter c1,c2c3,c4The value of (c), the value generated by the chaotic sequence, and the third and fourth pixel point values of ccc (n), wherein CCCC (n +1) is the final pixel point value after all encryption algorithms.
As shown in formula (7), each pixel point value of the proposed random diffusion algorithm depends on the values of the first two pixels and the value generated by the dynamic multi-scroll chaotic system sequence. Compared with other diffusion methods in which each pixel value only depends on the previous pixel value, the diffusion method provided by the invention has more complex structural characteristics and better encryption effect. Then, the pixel points are scrambled, and the correlation between adjacent pixel points is greatly reduced. And finally, carrying out exclusive OR operation on the pixel point value and the value generated by the multi-scroll chaotic sequence. After three diffusion operations, the encryption effect of the pixel is obviously enhanced.
In specific implementation, the step S4 further includes a step of constructing a decryption method based on an image encryption method of the multi-scroll chaotic system, which is specifically as follows:
Figure BDA0002285756320000092
wherein, C (n) is the pixel point value of the encrypted image, and A (n) is the pixel point value obtained after the exclusive or operation;
Figure BDA0002285756320000093
wherein AA (n) is a pixel point value obtained after an anti-random diffusion algorithm, and A (n) is a pixel point value after first reverse XOR diffusion;
through the reverse scrambling algorithm, the following can be obtained:
Figure BDA0002285756320000101
wherein aaaa (n) is the plaintext pixel point value obtained after all decryption algorithms.
Fig. 4 shows an encryption and decryption diagram of an image encrypted by the encryption method of the present invention. Wherein (a) in FIG. 4 is a Lena diagram; (b) is a Lena encryption map; (c) a Lena decryption graph; (d) is a Barb diagram; (e) a Barb encryption chart; (f) is a Barb decryption graph.
As shown in fig. 5, which is a histogram test result of the encryption method of the present invention, (a) in fig. 5 is plaintext Lena; (b) is a ciphertext Lena graph; (c) to decrypt Lena; (d) is plaintext Barb; (e) is a ciphertext Lena graph; (f) indicating decrypted Lena.
As shown in fig. 6, (a) in fig. 6 represents a 5% salt-pepper attack for the robustness test of the encryption method of the present invention implemented; (b) a Lena decryption graph representing a salt-and-pepper attack; (c) represents 17.145% of the cutting attack; (d) lena decryption graph representing a clipping attack.
In order to further compare and analyze the security performance of the encryption method provided by the invention, the average change intensity (UACI) of the encryption method and the change rate (NPCR) of the pixel point are tested. The values for NPCR and UACI are closer to the ideal values (0.9961 and 0.3346), indicating better safety of the process. As shown in table 1, compared to five encrypted pictures in other methods, the values of NPCR and UACI of the proposed encryption method are closer to the ideal values, i.e. the encryption method based on the multi-wrap system of the present invention has better security and stronger anti-hacking capability.
TABLE 1 comparative analysis of UACI and NPCR
Figure BDA0002285756320000102
The information entropy is often used as a quantitative indicator of the information content of an image, and the ideal information entropy is 8 for a 256-gray-value image. The closer the information entropy value is to 8, the lower the possibility of image display information is, the closer the pixel point is to random, and the better the encryption effect is. As shown in table 2, the information entropy of the five plaintext images is relatively low, but after the five plaintext images are encrypted by the method provided by the invention, the information entropy is close to an ideal value.
TABLE 2 entropy of information
Figure BDA0002285756320000111
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (5)

1. An image encryption method based on a multi-scroll chaotic system is characterized by comprising the following steps:
s1, constructing a multi-scroll chaotic system based on a Chua' S system;
s2, setting the chaos key parameter to generate a new multi-scroll chaos system;
s3, scrambling pixel points of the plaintext by combining an Arnold mapping method;
s4, designing a random diffusion method based on the new multi-scroll chaotic system.
2. The multi-scroll chaotic system-based image encryption method according to claim 1, wherein the mathematical expression of the multi-scroll chaotic system configured in step S1 is as follows:
Figure FDA0002285756310000011
wherein a and b respectively represent parameters of the multi-scroll chaotic system, and x, y and z respectively represent state variables of the multi-scroll chaotic system; h (x) is a non-linear controller that controls the number of attractors that the system generates in the horizontal direction, which if an even number of attractors are generated can be defined as:
Figure FDA0002285756310000012
wherein m, k and i are variables, the value range of i is [0, N ], and the final scroll number of the chaotic attractor is determined; similarly, if an odd number of attractors are generated, it can be defined as:
Figure FDA0002285756310000013
where sgn (x) is a sign function, which can be expressed as:
Figure FDA0002285756310000014
h (y) in the above formula (1) also represents a nonlinear controller, and the number of attractors generated by the control system in the vertical direction can be defined as:
Figure FDA0002285756310000015
a, y in the above formulaiI is variable, i takes the value min [ M ]1,M2]。
3. The image encryption method based on the multi-scroll chaotic system according to claim 1, wherein the Arnold mapping method in the step S3 specifically comprises:
Figure FDA0002285756310000021
wherein x isn、ynRespectively represent the original values, xn+1、yn+1And respectively representing pixel point values after Arnold transformation, p and q respectively representing Arnold parameters, and further achieving the purpose of setting the quantity relation between adjacent pixel points by controlling the values of p and q.
4. The image encryption method based on the multi-scroll chaotic system according to claim 1, wherein the random diffusion method designed in the step S4 is specifically:
Figure FDA0002285756310000022
wherein, p (n) is a pixel value of a plaintext, x (n) is a value of a discrete memristor chaotic system, and CC (n +1) is a pixel value after an exclusive-or diffusion algorithm;
introducing a disturbance parameter c1,c2,c3And c4If the pixel is subjected to the second diffusion, the following is provided:
Figure FDA0002285756310000023
in the above formula, k1,k2By a parameter c1,c2c3,c4The second diffusion CCC (n +2) depends on the pixel values of two adjacent pixels, the pixel value of the first diffusion cc (n) and the value of the chaotic sequence;
performing exclusive-or diffusion on the second diffused pixels can obtain:
Figure FDA0002285756310000031
in the above formula, CCC (n) is the pixel point value of the second diffusion, k1,k2By a parameter c1,c2c3,c4The value of (c), the value generated by the chaotic sequence, and the third and fourth pixel point values of ccc (n), wherein CCCC (n +1) is the final pixel point value after all encryption algorithms.
5. The image encryption method based on the multi-scroll chaotic system according to claim 1, wherein the step S4 further comprises a step of constructing a decryption method based on the image encryption method of the multi-scroll chaotic system, which is specifically as follows:
Figure FDA0002285756310000032
wherein, C (n) is the pixel point value of the encrypted image, and A (n) is the pixel point value obtained after the exclusive or operation;
Figure FDA0002285756310000033
wherein AA (n) is a pixel point value obtained after an anti-random diffusion algorithm, and A (n) is a pixel point value after first reverse XOR diffusion;
through the reverse scrambling algorithm, the following can be obtained:
Figure FDA0002285756310000034
wherein aaaa (n) is the plaintext pixel point value obtained after all decryption algorithms.
CN201911159803.0A 2019-11-22 2019-11-22 Image encryption method based on multi-scroll chaotic system Pending CN110929279A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911159803.0A CN110929279A (en) 2019-11-22 2019-11-22 Image encryption method based on multi-scroll chaotic system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911159803.0A CN110929279A (en) 2019-11-22 2019-11-22 Image encryption method based on multi-scroll chaotic system

Publications (1)

Publication Number Publication Date
CN110929279A true CN110929279A (en) 2020-03-27

Family

ID=69851858

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911159803.0A Pending CN110929279A (en) 2019-11-22 2019-11-22 Image encryption method based on multi-scroll chaotic system

Country Status (1)

Country Link
CN (1) CN110929279A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112260819A (en) * 2020-10-20 2021-01-22 哈尔滨工程大学 Novel ultra-wide range memristive chaotic system and multi-image deformed image encryption method
CN113726975A (en) * 2021-08-11 2021-11-30 国网河北省电力有限公司保定供电分公司 Image encryption method, device, medium and electronic equipment based on chaotic system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5479513A (en) * 1994-11-18 1995-12-26 Martin Marietta Energy Systems, Inc. Fast and secure encryption-decryption method based on chaotic dynamics
CN108133445A (en) * 2016-12-01 2018-06-08 钦州市晶通科技有限公司 A kind of image encryption method for spreading mapping scramble and being combined with chaos system
CN109889686A (en) * 2019-01-28 2019-06-14 郑州轻工业学院 Based on H fractal structure and dynamically from the image encryption method of invertible matrix

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5479513A (en) * 1994-11-18 1995-12-26 Martin Marietta Energy Systems, Inc. Fast and secure encryption-decryption method based on chaotic dynamics
CN108133445A (en) * 2016-12-01 2018-06-08 钦州市晶通科技有限公司 A kind of image encryption method for spreading mapping scramble and being combined with chaos system
CN109889686A (en) * 2019-01-28 2019-06-14 郑州轻工业学院 Based on H fractal structure and dynamically from the image encryption method of invertible matrix

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
胡春杰;陈晓;郭银;: "基于多混沌映射的光学图像加密算法" *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112260819A (en) * 2020-10-20 2021-01-22 哈尔滨工程大学 Novel ultra-wide range memristive chaotic system and multi-image deformed image encryption method
CN112260819B (en) * 2020-10-20 2022-08-02 哈尔滨工程大学 Multi-image deformation image encryption method adopting memristor chaotic system
CN113726975A (en) * 2021-08-11 2021-11-30 国网河北省电力有限公司保定供电分公司 Image encryption method, device, medium and electronic equipment based on chaotic system
CN113726975B (en) * 2021-08-11 2024-02-09 国网河北省电力有限公司保定供电分公司 Image encryption method and device based on chaotic system, medium and electronic equipment

Similar Documents

Publication Publication Date Title
Shahna et al. A novel image encryption scheme using both pixel level and bit level permutation with chaotic map
CN108898025B (en) Chaotic image encryption method based on double scrambling and DNA coding
Hua et al. Image encryption using Josephus problem and filtering diffusion
Wang et al. Chaotic encryption algorithm based on alternant of stream cipher and block cipher
Chen et al. A symmetric image encryption scheme based on 3D chaotic cat maps
Han et al. Fingerprint images encryption via multi-scroll chaotic attractors
CN105847629A (en) Reversible information hiding method for encrypted image
Hossain et al. A new approach of image encryption using 3D chaotic map to enhance security of multimedia component
Rathod et al. Design and implementation of image encryption algorithm by using block based symmetric transformation algorithm (hyper image encryption algorithm)
Zhang et al. Efficient image encryption scheme with synchronous substitution and diffusion based on double S-boxes
Meng et al. An Improved Image Encryption Algorithm Based on Chaotic Mapping and Discrete Wavelet Transform Domain.
CN111130748A (en) Quantum chaotic parallel image encryption method
CN112311524A (en) Image encryption method based on new chaotic mapping and compressed sensing
Azza et al. Multi-secret image sharing based on elementary cellular automata with steganography
Wu et al. Security analysis and improvement on an image encryption algorithm using Chebyshev generator
CN110929279A (en) Image encryption method based on multi-scroll chaotic system
CN114389788B (en) Image encryption algorithm with mixed chaos and block scrambling
CN113612596A (en) Image self-decryption method based on hyperchaotic system
Ye A novel image encryption scheme based on generalized multi-sawtooth maps
Patro et al. Novel data encryption scheme using DNA computing
CN116886270B (en) Three-band encryption method based on national encryption algorithm and double-chaotic system
Sharma et al. Cryptanalysis of image encryption algorithm based on pixel shuffling and chaotic S-box transformation
Babu et al. Higher dimensional chaos for Audio encryption
Chen et al. A novel digital color image encryption algorithm based on a new 4-D hyper-chaotic system and an improved S-box
Guo et al. A chaos-based pseudorandom permutation and bilateral diffusion scheme for image encryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
AD01 Patent right deemed abandoned

Effective date of abandoning: 20240126

AD01 Patent right deemed abandoned