CN110929279A - Image encryption method based on multi-scroll chaotic system - Google Patents
Image encryption method based on multi-scroll chaotic system Download PDFInfo
- Publication number
- CN110929279A CN110929279A CN201911159803.0A CN201911159803A CN110929279A CN 110929279 A CN110929279 A CN 110929279A CN 201911159803 A CN201911159803 A CN 201911159803A CN 110929279 A CN110929279 A CN 110929279A
- Authority
- CN
- China
- Prior art keywords
- scroll
- chaotic system
- value
- diffusion
- pixel
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000000739 chaotic effect Effects 0.000 title claims abstract description 81
- 238000000034 method Methods 0.000 title claims abstract description 50
- 238000009792 diffusion process Methods 0.000 claims abstract description 36
- 238000013507 mapping Methods 0.000 claims abstract description 9
- 230000009466 transformation Effects 0.000 claims description 4
- 238000013461 design Methods 0.000 description 8
- 238000010586 diagram Methods 0.000 description 8
- 230000000694 effects Effects 0.000 description 6
- 238000004891 communication Methods 0.000 description 5
- 238000012360 testing method Methods 0.000 description 4
- 230000008569 process Effects 0.000 description 3
- 238000011160 research Methods 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 241000282326 Felis catus Species 0.000 description 2
- 239000006002 Pepper Substances 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000010587 phase diagram Methods 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 238000005291 chaos (dynamical) Methods 0.000 description 1
- 238000010835 comparative analysis Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N7/00—Computing arrangements based on specific mathematical models
- G06N7/08—Computing arrangements based on specific mathematical models using chaos models or non-linear system models
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Data Mining & Analysis (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Nonlinear Science (AREA)
- Algebra (AREA)
- Artificial Intelligence (AREA)
- Computational Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Evolutionary Computation (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Pure & Applied Mathematics (AREA)
- Computing Systems (AREA)
- Mathematical Physics (AREA)
- Image Processing (AREA)
Abstract
The invention provides an image encryption method based on a multi-scroll chaotic system. The method comprises the following steps: s1, constructing a multi-scroll chaotic system based on a Chua' S system; s2, setting the chaos key parameter to generate a new multi-scroll chaos system; s3, scrambling pixel points of the plaintext by combining an Arnold mapping method; s4, designing a random diffusion method based on the new multi-scroll chaotic system. The technical scheme of the invention solves the problems that the chaotic system for image encryption in the prior art is too simple in structure, low in complexity, and low in ciphertext anti-deciphering capability caused by poor contact with an encryption algorithm. The image encryption method provided by the invention has better security and stronger anti-decoding capability.
Description
Technical Field
The invention relates to the technical field of confidential communication, information security and computer image encryption, in particular to an image encryption method based on a multi-scroll chaotic system.
Background
In recent years, the research of chaos theory has been one of the hot problems in the field of nonlinear science. The chaotic system has extremely high sensitivity and good pseudo-randomness, so the chaotic system is widely applied to the field of cryptography. The chaotic key generation mechanism is different from other traditional cryptosystems, so that the chaotic key generation method has great advantages in the aspect of real-time encryption. Especially in image processing, a large amount of data is required, and there is a strong correlation between adjacent data. This results in a low efficiency of encrypting image information in conventional cryptography, and even fails to meet the need for real-time encryption. Compared with the traditional encryption method, the encryption algorithm based on the chaotic system has unique advantages in the aspect of processing big data information. However, because the number of chaotic systems discovered so far is small, a few models can be used for chaotic image encryption, so that the difficulty and the day for breaking the ciphertext are reduced. In the design of the chaotic image encryption algorithm, the chaotic system is often only used for generating chaotic interference parameters, and can be combined with other algorithm designs relatively less, so that the chaotic system is really a rare design scheme which takes the chaotic system as a main design scheme.
The multi-scroll chaotic system is a dynamic chaotic system, and related control parameters can be calculated through analyzing a balance point of a static chaotic system so as to design the multi-scroll chaotic system into the dynamic chaotic system. The controller generally selects a triangular generator or a symbol function generator, and the quantity of the chaotic attractors generated by the system can be controlled by adjusting the parameters of the generator. If the system is dynamic, it means that there are more possibilities for changes. From the perspective of the decryption resistance of the encryption algorithm, the dynamic characteristics of the multi-scroll system are well consistent with the core idea. The image encryption algorithm is designed based on the multi-scroll dynamic system and combined with other algorithms, so that the safety and the anti-decoding capability of the algorithm can be effectively improved. The method has important significance for research in related fields such as secret communication, computer image encryption and the like.
When we apply the selection system to the encryption algorithm, the best choice is a truly random sequence. Because a truly random sequence is essentially a completely random sequence, the effects of encryption must also be optimal. However, since completely random sequences are difficult to decrypt, they are often used for one-way encryption. The chaotic sequence has good pseudo-randomness, and after the chaotic key is set, the obtained value of the chaotic sequence is uniquely determined. Therefore, in recent years, chaotic encryption has once been one of the subjects of intense research in the fields of information security, image encryption, and the like. However, since the number of chaotic system models is limited, the conventional system is also a low-dimensional static system and is not well integrated into the design of an algorithm.
Disclosure of Invention
In light of the above-mentioned technical problems, an image encryption method based on a multi-scroll chaotic system is provided. The invention constructs a multi-scroll chaotic system, effectively combines the number of horizontal and vertical scrolls of the system with the control parameters in the Arnold cat mapping, designs an image encryption method with a dynamic effect, has high safety performance, and makes theoretical guidance and experimental verification for the fields of information safety, secret communication, computer image encryption and the like.
The technical means adopted by the invention are as follows:
an image encryption method based on a multi-scroll chaotic system comprises the following steps:
s1, constructing a multi-scroll chaotic system based on a Chua' S system;
s2, setting the chaos key parameter to generate a new multi-scroll chaos system;
s3, scrambling pixel points of the plaintext by combining an Arnold mapping method;
s4, designing a random diffusion method based on the new multi-scroll chaotic system.
Further, the multi-scroll chaotic system configured in step S1 has a mathematical expression as follows:
wherein a and b respectively represent parameters of the multi-scroll chaotic system, and x, y and z respectively represent state variables of the multi-scroll chaotic system; h (x) is a non-linear controller that controls the number of attractors that the system generates in the horizontal direction, which if an even number of attractors are generated can be defined as:
wherein m, k and i are variables, the value range of i is [0, N ], and the final scroll number of the chaotic attractor is determined; similarly, if an odd number of attractors are generated, it can be defined as:
where sgn (x) is a sign function, which can be expressed as:
h (y) in the above formula (1) also represents a nonlinear controller, and the number of attractors generated by the control system in the vertical direction can be defined as:
a, y in the above formulaiI is variable, i takes the value min [ M ]1,M2]。
Further, the Arnold mapping method in step S3 specifically includes:
wherein x isn、ynRespectively represent the original values, xn+1、yn+1And respectively representing pixel point values after Arnold transformation, p and q respectively representing Arnold parameters, and further achieving the purpose of setting the quantity relation between adjacent pixel points by controlling the values of p and q.
Further, the random diffusion method designed in step S4 specifically includes:
wherein, p (n) is a pixel value of a plaintext, x (n) is a value of a discrete memristor chaotic system, and CC (n +1) is a pixel value after an exclusive-or diffusion algorithm;
introducing a disturbance parameter c1,c2,c3And c4If the pixel is subjected to the second diffusion, the following is provided:
in the above formula, k1,k2By a parameter c1,c2c3,c4The second diffusion CCC (n +2) depends on the pixel values of two adjacent pixels, the pixel value of the first diffusion cc (n) and the value of the chaotic sequence;
performing exclusive-or diffusion on the second diffused pixels can obtain:
in the above formula, CCC (n) is the pixel point value of the second diffusion, k1,k2By a parameter c1,c2c3,c4The value of (c), the value generated by the chaotic sequence, and the third and fourth pixel point values of ccc (n), wherein CCCC (n +1) is the final pixel point value after all encryption algorithms.
Further, the step S4 includes a step of constructing a decryption method based on the image encryption method of the multi-scroll chaotic system, which is specifically as follows:
wherein, C (n) is the pixel point value of the encrypted image, and A (n) is the pixel point value obtained after the exclusive or operation;
wherein AA (n) is a pixel point value obtained after an anti-random diffusion algorithm, and A (n) is a pixel point value after first reverse XOR diffusion;
through the reverse scrambling algorithm, the following can be obtained:
wherein aaaa (n) is the plaintext pixel point value obtained after all decryption algorithms.
Compared with the prior art, the invention has the following advantages:
1. the invention constructs a multi-scroll chaotic system, effectively combines the number of horizontal and vertical scrolls of the system with control parameters in an Arnold cat map, and designs an image encryption algorithm with a dynamic effect.
2. The invention provides an image encryption method based on a multi-scroll chaotic system, wherein the system equation and the scrambling parameter of an image depend on the chaotic key setting of an encryptor, and a new diffusion algorithm based on adjacent pixel points is designed according to the constructed multi-scroll system.
3. Through theoretical analysis and experimental verification, the image encryption algorithm designed by the invention has high safety performance, and theoretical guidance and experimental verification are made for the fields of information safety, secret communication, computer image encryption and the like.
Based on the reasons, the invention can be widely popularized in the fields of secret communication, information security, computer image encryption and the like.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a flow chart of the method of the present invention.
Fig. 2 is a schematic diagram of the chaotic key generation of the present invention.
FIG. 3 is a phase diagram of an attractor generated by the multi-scroll system in an x-y plane after setting a key.
Fig. 4 is an encryption diagram and a decryption diagram of an image according to an embodiment of the present invention.
Fig. 5 is a schematic diagram of a histogram test result according to an embodiment of the present invention.
Fig. 6 is a schematic diagram of a robustness test provided by an embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The invention provides an image encryption method based on a multi-scroll chaotic system, which comprises the following steps:
s1, constructing a multi-scroll chaotic system based on a Chua' S system;
in specific implementation, the mathematical expression of the constructed multi-scroll chaotic system is as follows:
wherein a and b respectively represent parameters of the multi-scroll chaotic system, and x, y and z respectively represent state variables of the multi-scroll chaotic system; h (x) is a non-linear controller that controls the number of attractors that the system generates in the horizontal direction, which if an even number of attractors are generated can be defined as:
wherein m, k and i are variables, the value range of i is [0, N ], and the final scroll number of the chaotic attractor is determined; similarly, if an odd number of attractors are generated, it can be defined as:
where sgn (x) is a sign function, which can be expressed as:
h (y) in the above formula (1) also represents a nonlinear controller, and the number of attractors generated by the control system in the vertical direction can be defined as:
a, y in the above formulaiI is variable, i takes the value min [ M ]1,M2]。
S2, setting the chaos key parameter to generate a new multi-scroll chaos system;
in one embodiment, as shown in FIG. 2, a key having a length greater than 250 bits is used, wherein the parameter K is1A, b, p, q occupy a 250-bit long lock. The parameters a and b are system parameters of the multi-scroll chaotic systemp and q are the vortex number of the multi-vortex chaotic system and parameters of Arnold transformation. Where a ranges from (8,12), b ranges from (14,22), p and q are positive integers (suggesting a ranges from [2,15 ]]B is in the range of [2,15]) Larger scroll values will cause the system to generate chaotic sequences slowly. Then K1Is divided into11,K12,K13,K14,K15) Each 50 bits long. Setting the key parameters a to 10, b to 16, p to 7, and q to 8, can produce a 7-8 cross-scroll chaotic system, whose phase diagram in the x-y plane is shown in fig. 3.
S3, scrambling pixel points of the plaintext by combining an Arnold mapping method;
in specific implementation, the Arnold mapping method in step S3 specifically includes:
wherein x isn、ynRespectively represent the original values, xn+1、yn+1And respectively representing pixel point values after Arnold transformation, p and q respectively representing Arnold parameters, and further achieving the purpose of setting the quantity relation between adjacent pixel points by controlling the values of p and q. And designing an image encryption method by combining the constructed multi-scroll chaotic system, wherein the defined parameters p and q are the number of transverse and longitudinal scrolls of the multi-scroll system respectively and are control parameters of Arnold mapping at the same time. And further, nested encryption of a system and an encryption algorithm is achieved, the method can also be called as an image encryption method based on a dynamic chaotic system, and the anti-decoding capacity of the encryption algorithm is greatly improved.
S4, designing a random diffusion method based on the new multi-scroll chaotic system.
In specific implementation, the random diffusion method designed in step S4 specifically includes:
wherein, p (n) is a pixel value of a plaintext, x (n) is a value of a discrete memristor chaotic system, and CC (n +1) is a pixel value after an exclusive-or diffusion algorithm;
in order to further improve the safety performance of the algorithm, the pixels are subjected to secondary diffusion, and meanwhile, in order to increase the complexity of pixel point decoding, a disturbance parameter c is introduced1,c2,c3And c4Then, there are:
in the above formula, k1,k2By a parameter c1,c2c3,c4The second diffusion CCC (n +2) depends on the pixel values of two adjacent pixels, the pixel value of the first diffusion cc (n) and the value of the chaotic sequence;
performing exclusive-or diffusion on the second diffused pixels can obtain:
in the above formula, CCC (n) is the pixel point value of the second diffusion, k1,k2By a parameter c1,c2c3,c4The value of (c), the value generated by the chaotic sequence, and the third and fourth pixel point values of ccc (n), wherein CCCC (n +1) is the final pixel point value after all encryption algorithms.
As shown in formula (7), each pixel point value of the proposed random diffusion algorithm depends on the values of the first two pixels and the value generated by the dynamic multi-scroll chaotic system sequence. Compared with other diffusion methods in which each pixel value only depends on the previous pixel value, the diffusion method provided by the invention has more complex structural characteristics and better encryption effect. Then, the pixel points are scrambled, and the correlation between adjacent pixel points is greatly reduced. And finally, carrying out exclusive OR operation on the pixel point value and the value generated by the multi-scroll chaotic sequence. After three diffusion operations, the encryption effect of the pixel is obviously enhanced.
In specific implementation, the step S4 further includes a step of constructing a decryption method based on an image encryption method of the multi-scroll chaotic system, which is specifically as follows:
wherein, C (n) is the pixel point value of the encrypted image, and A (n) is the pixel point value obtained after the exclusive or operation;
wherein AA (n) is a pixel point value obtained after an anti-random diffusion algorithm, and A (n) is a pixel point value after first reverse XOR diffusion;
through the reverse scrambling algorithm, the following can be obtained:
wherein aaaa (n) is the plaintext pixel point value obtained after all decryption algorithms.
Fig. 4 shows an encryption and decryption diagram of an image encrypted by the encryption method of the present invention. Wherein (a) in FIG. 4 is a Lena diagram; (b) is a Lena encryption map; (c) a Lena decryption graph; (d) is a Barb diagram; (e) a Barb encryption chart; (f) is a Barb decryption graph.
As shown in fig. 5, which is a histogram test result of the encryption method of the present invention, (a) in fig. 5 is plaintext Lena; (b) is a ciphertext Lena graph; (c) to decrypt Lena; (d) is plaintext Barb; (e) is a ciphertext Lena graph; (f) indicating decrypted Lena.
As shown in fig. 6, (a) in fig. 6 represents a 5% salt-pepper attack for the robustness test of the encryption method of the present invention implemented; (b) a Lena decryption graph representing a salt-and-pepper attack; (c) represents 17.145% of the cutting attack; (d) lena decryption graph representing a clipping attack.
In order to further compare and analyze the security performance of the encryption method provided by the invention, the average change intensity (UACI) of the encryption method and the change rate (NPCR) of the pixel point are tested. The values for NPCR and UACI are closer to the ideal values (0.9961 and 0.3346), indicating better safety of the process. As shown in table 1, compared to five encrypted pictures in other methods, the values of NPCR and UACI of the proposed encryption method are closer to the ideal values, i.e. the encryption method based on the multi-wrap system of the present invention has better security and stronger anti-hacking capability.
TABLE 1 comparative analysis of UACI and NPCR
The information entropy is often used as a quantitative indicator of the information content of an image, and the ideal information entropy is 8 for a 256-gray-value image. The closer the information entropy value is to 8, the lower the possibility of image display information is, the closer the pixel point is to random, and the better the encryption effect is. As shown in table 2, the information entropy of the five plaintext images is relatively low, but after the five plaintext images are encrypted by the method provided by the invention, the information entropy is close to an ideal value.
TABLE 2 entropy of information
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.
Claims (5)
1. An image encryption method based on a multi-scroll chaotic system is characterized by comprising the following steps:
s1, constructing a multi-scroll chaotic system based on a Chua' S system;
s2, setting the chaos key parameter to generate a new multi-scroll chaos system;
s3, scrambling pixel points of the plaintext by combining an Arnold mapping method;
s4, designing a random diffusion method based on the new multi-scroll chaotic system.
2. The multi-scroll chaotic system-based image encryption method according to claim 1, wherein the mathematical expression of the multi-scroll chaotic system configured in step S1 is as follows:
wherein a and b respectively represent parameters of the multi-scroll chaotic system, and x, y and z respectively represent state variables of the multi-scroll chaotic system; h (x) is a non-linear controller that controls the number of attractors that the system generates in the horizontal direction, which if an even number of attractors are generated can be defined as:
wherein m, k and i are variables, the value range of i is [0, N ], and the final scroll number of the chaotic attractor is determined; similarly, if an odd number of attractors are generated, it can be defined as:
where sgn (x) is a sign function, which can be expressed as:
h (y) in the above formula (1) also represents a nonlinear controller, and the number of attractors generated by the control system in the vertical direction can be defined as:
a, y in the above formulaiI is variable, i takes the value min [ M ]1,M2]。
3. The image encryption method based on the multi-scroll chaotic system according to claim 1, wherein the Arnold mapping method in the step S3 specifically comprises:
wherein x isn、ynRespectively represent the original values, xn+1、yn+1And respectively representing pixel point values after Arnold transformation, p and q respectively representing Arnold parameters, and further achieving the purpose of setting the quantity relation between adjacent pixel points by controlling the values of p and q.
4. The image encryption method based on the multi-scroll chaotic system according to claim 1, wherein the random diffusion method designed in the step S4 is specifically:
wherein, p (n) is a pixel value of a plaintext, x (n) is a value of a discrete memristor chaotic system, and CC (n +1) is a pixel value after an exclusive-or diffusion algorithm;
introducing a disturbance parameter c1,c2,c3And c4If the pixel is subjected to the second diffusion, the following is provided:
in the above formula, k1,k2By a parameter c1,c2c3,c4The second diffusion CCC (n +2) depends on the pixel values of two adjacent pixels, the pixel value of the first diffusion cc (n) and the value of the chaotic sequence;
performing exclusive-or diffusion on the second diffused pixels can obtain:
in the above formula, CCC (n) is the pixel point value of the second diffusion, k1,k2By a parameter c1,c2c3,c4The value of (c), the value generated by the chaotic sequence, and the third and fourth pixel point values of ccc (n), wherein CCCC (n +1) is the final pixel point value after all encryption algorithms.
5. The image encryption method based on the multi-scroll chaotic system according to claim 1, wherein the step S4 further comprises a step of constructing a decryption method based on the image encryption method of the multi-scroll chaotic system, which is specifically as follows:
wherein, C (n) is the pixel point value of the encrypted image, and A (n) is the pixel point value obtained after the exclusive or operation;
wherein AA (n) is a pixel point value obtained after an anti-random diffusion algorithm, and A (n) is a pixel point value after first reverse XOR diffusion;
through the reverse scrambling algorithm, the following can be obtained:
wherein aaaa (n) is the plaintext pixel point value obtained after all decryption algorithms.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911159803.0A CN110929279A (en) | 2019-11-22 | 2019-11-22 | Image encryption method based on multi-scroll chaotic system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911159803.0A CN110929279A (en) | 2019-11-22 | 2019-11-22 | Image encryption method based on multi-scroll chaotic system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110929279A true CN110929279A (en) | 2020-03-27 |
Family
ID=69851858
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911159803.0A Pending CN110929279A (en) | 2019-11-22 | 2019-11-22 | Image encryption method based on multi-scroll chaotic system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110929279A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112260819A (en) * | 2020-10-20 | 2021-01-22 | 哈尔滨工程大学 | Novel ultra-wide range memristive chaotic system and multi-image deformed image encryption method |
CN113726975A (en) * | 2021-08-11 | 2021-11-30 | 国网河北省电力有限公司保定供电分公司 | Image encryption method, device, medium and electronic equipment based on chaotic system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5479513A (en) * | 1994-11-18 | 1995-12-26 | Martin Marietta Energy Systems, Inc. | Fast and secure encryption-decryption method based on chaotic dynamics |
CN108133445A (en) * | 2016-12-01 | 2018-06-08 | 钦州市晶通科技有限公司 | A kind of image encryption method for spreading mapping scramble and being combined with chaos system |
CN109889686A (en) * | 2019-01-28 | 2019-06-14 | 郑州轻工业学院 | Based on H fractal structure and dynamically from the image encryption method of invertible matrix |
-
2019
- 2019-11-22 CN CN201911159803.0A patent/CN110929279A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5479513A (en) * | 1994-11-18 | 1995-12-26 | Martin Marietta Energy Systems, Inc. | Fast and secure encryption-decryption method based on chaotic dynamics |
CN108133445A (en) * | 2016-12-01 | 2018-06-08 | 钦州市晶通科技有限公司 | A kind of image encryption method for spreading mapping scramble and being combined with chaos system |
CN109889686A (en) * | 2019-01-28 | 2019-06-14 | 郑州轻工业学院 | Based on H fractal structure and dynamically from the image encryption method of invertible matrix |
Non-Patent Citations (1)
Title |
---|
胡春杰;陈晓;郭银;: "基于多混沌映射的光学图像加密算法" * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112260819A (en) * | 2020-10-20 | 2021-01-22 | 哈尔滨工程大学 | Novel ultra-wide range memristive chaotic system and multi-image deformed image encryption method |
CN112260819B (en) * | 2020-10-20 | 2022-08-02 | 哈尔滨工程大学 | Multi-image deformation image encryption method adopting memristor chaotic system |
CN113726975A (en) * | 2021-08-11 | 2021-11-30 | 国网河北省电力有限公司保定供电分公司 | Image encryption method, device, medium and electronic equipment based on chaotic system |
CN113726975B (en) * | 2021-08-11 | 2024-02-09 | 国网河北省电力有限公司保定供电分公司 | Image encryption method and device based on chaotic system, medium and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Shahna et al. | A novel image encryption scheme using both pixel level and bit level permutation with chaotic map | |
CN108898025B (en) | Chaotic image encryption method based on double scrambling and DNA coding | |
Hua et al. | Image encryption using Josephus problem and filtering diffusion | |
Wang et al. | Chaotic encryption algorithm based on alternant of stream cipher and block cipher | |
Chen et al. | A symmetric image encryption scheme based on 3D chaotic cat maps | |
Han et al. | Fingerprint images encryption via multi-scroll chaotic attractors | |
CN105847629A (en) | Reversible information hiding method for encrypted image | |
Hossain et al. | A new approach of image encryption using 3D chaotic map to enhance security of multimedia component | |
Rathod et al. | Design and implementation of image encryption algorithm by using block based symmetric transformation algorithm (hyper image encryption algorithm) | |
Zhang et al. | Efficient image encryption scheme with synchronous substitution and diffusion based on double S-boxes | |
Meng et al. | An Improved Image Encryption Algorithm Based on Chaotic Mapping and Discrete Wavelet Transform Domain. | |
CN111130748A (en) | Quantum chaotic parallel image encryption method | |
CN112311524A (en) | Image encryption method based on new chaotic mapping and compressed sensing | |
Azza et al. | Multi-secret image sharing based on elementary cellular automata with steganography | |
Wu et al. | Security analysis and improvement on an image encryption algorithm using Chebyshev generator | |
CN110929279A (en) | Image encryption method based on multi-scroll chaotic system | |
CN114389788B (en) | Image encryption algorithm with mixed chaos and block scrambling | |
CN113612596A (en) | Image self-decryption method based on hyperchaotic system | |
Ye | A novel image encryption scheme based on generalized multi-sawtooth maps | |
Patro et al. | Novel data encryption scheme using DNA computing | |
CN116886270B (en) | Three-band encryption method based on national encryption algorithm and double-chaotic system | |
Sharma et al. | Cryptanalysis of image encryption algorithm based on pixel shuffling and chaotic S-box transformation | |
Babu et al. | Higher dimensional chaos for Audio encryption | |
Chen et al. | A novel digital color image encryption algorithm based on a new 4-D hyper-chaotic system and an improved S-box | |
Guo et al. | A chaos-based pseudorandom permutation and bilateral diffusion scheme for image encryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
AD01 | Patent right deemed abandoned |
Effective date of abandoning: 20240126 |
|
AD01 | Patent right deemed abandoned |