CN111865553B - Multi-audio encryption method based on chaos and Zigzag transform - Google Patents

Multi-audio encryption method based on chaos and Zigzag transform Download PDF

Info

Publication number
CN111865553B
CN111865553B CN202010502514.2A CN202010502514A CN111865553B CN 111865553 B CN111865553 B CN 111865553B CN 202010502514 A CN202010502514 A CN 202010502514A CN 111865553 B CN111865553 B CN 111865553B
Authority
CN
China
Prior art keywords
audio
phoneme
encryption
matrix
chaos
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010502514.2A
Other languages
Chinese (zh)
Other versions
CN111865553A (en
Inventor
张晓强
李泳锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China University of Mining and Technology CUMT
Original Assignee
China University of Mining and Technology CUMT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China University of Mining and Technology CUMT filed Critical China University of Mining and Technology CUMT
Priority to CN202010502514.2A priority Critical patent/CN111865553B/en
Publication of CN111865553A publication Critical patent/CN111865553A/en
Application granted granted Critical
Publication of CN111865553B publication Critical patent/CN111865553B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Transmission Systems Not Characterized By The Medium Used For Transmission (AREA)

Abstract

一种基于混沌和Zigzag变换的多音频加密方法,属于信息加密领域。目前,在网络上传递多媒体信息的活动日益频繁,而音频作为多媒体信息的重要组成部分,如何保护音频内容的安全性成为研究人员重要的研究方向之一。本发明提出一种基于混沌和Zigzag变换的多音频加密方法。首先,利用混沌序列产生的随机全排列,对多个音频文件的连接顺序进行置乱;其次,利用Zigzag变换,实现音素在多音频文件间的置乱;最后,利用混沌序列,对音素矩阵进行异或运算,得到最终加密音频集。实验表明:该方法可实现多个音频文件的同步加密,加密效果良好,安全性高且高效。

Figure 202010502514

A multi-audio encryption method based on chaos and Zigzag transform belongs to the field of information encryption. At present, the activities of transmitting multimedia information on the network are becoming more and more frequent, and audio is an important part of multimedia information. How to protect the security of audio content has become one of the important research directions of researchers. The invention proposes a multi-audio encryption method based on chaos and Zigzag transform. First, use the random full arrangement generated by the chaotic sequence to scramble the connection sequence of multiple audio files; secondly, use Zigzag transform to scrambling phonemes between multiple audio files; finally, use the chaotic sequence to scrambling the phoneme matrix XOR operation to get the final encrypted audio set. Experiments show that this method can realize simultaneous encryption of multiple audio files, with good encryption effect, high security and high efficiency.

Figure 202010502514

Description

基于混沌和Zigzag变换的多音频加密方法Multi-audio encryption method based on chaos and Zigzag transform

技术领域technical field

本文涉及了一种音频加密方法,主要面对多个音频文件进行加密。This paper involves an audio encryption method, which mainly faces encryption of multiple audio files.

背景技术Background technique

近年来,快速更新的移动通讯设备和多媒体技术让多媒体数据本身的安全问题颇受关注。音频作为多媒体音频的重要组成部分,它有着不同于文本和图像信息的特征。因为它的信号之间有较大的冗余和较强的相关性,所以对于音频的保护要采取的方法跟图像、文本有所不同。其中音频加密是利用数字音频的矩阵特征,在音频的空间域,按照某种变换规则,改变音素的位置或者音素值,将原始音频的信息变得“杂乱无章”。多音频加密作为一种新的多媒体安全技术,具有高效、保密性强的特征,逐渐引起研究人员的关注。In recent years, the rapidly updated mobile communication equipment and multimedia technology have attracted much attention to the security of multimedia data itself. As an important part of multimedia audio, audio has different characteristics from text and image information. Because of the large redundancy and strong correlation between its signals, the method to be taken for audio protection is different from that of images and texts. Among them, audio encryption is to use the matrix feature of digital audio, in the spatial domain of audio, according to a certain transformation rule, change the position or phoneme value of the phoneme, and make the information of the original audio "chaotic". As a new multimedia security technology, multi-audio encryption has the characteristics of high efficiency and strong confidentiality, and gradually attracts the attention of researchers.

音频加密技术主要包括音素置乱和音素扩散两种手段。其中音素置乱的目的改变音素的位置;音素扩散的目的是改变音素的值。为提高音频音频加密的安全性和效率,保证音频的安全高效传输,利用混沌理论和Zigzag变换理论,设计了一种基于混沌和Zigzag变换的多音频加密方法。该方法利用了多音频数据的特征,Zigzag变换的速度快、加密效果好以及混沌良好的随机性和复杂性的特点,有效地保护了多音频文件网络传输和存储的安全性。Audio encryption technology mainly includes two means of phoneme scrambling and phoneme diffusion. The purpose of phoneme scrambling is to change the position of the phoneme; the purpose of phoneme diffusion is to change the value of the phoneme. In order to improve the security and efficiency of audio encryption and ensure the safe and efficient transmission of audio, a multi-audio encryption method based on chaos and Zigzag transform is designed by using chaos theory and Zigzag transform theory. The method utilizes the characteristics of multi-audio data, Zigzag transform has fast speed, good encryption effect and good randomness and complexity of chaos, and effectively protects the security of multi-audio file network transmission and storage.

发明内容SUMMARY OF THE INVENTION

本发明的目的:针对现有单音频加密方法安全性弱的问题,提出一种基于混沌和Zigzag变换的多音频加密方法。The purpose of the present invention is to propose a multi-audio encryption method based on chaos and Zigzag transform for the problem of weak security of the existing single-audio encryption method.

本发明的技术方案:为实现上述发明目的,采用的方案是基于混沌和Zigzag变换的多音频加密方法。Technical scheme of the present invention: in order to achieve the above purpose of the invention, the adopted scheme is a multi-audio encryption method based on chaos and Zigzag transform.

基于混沌和Zigzag变换的多音频加密方法,其特征在于,加密过程包括如下步骤:The multi-audio encryption method based on chaos and Zigzag transform is characterized in that, the encryption process comprises the following steps:

步骤1:音素整数化:令k个交互音频文件为A 1, A 2, …, A k ,其大小为m×1,m是音素数目,1指音频文件为单声道;A j 中元素范围为[-1, 1],将所有元素加1,使其范围变为[0, 2],再乘上指定系数d,使得每个音素值均可用n个二进制位来表示,即Step 1: Integerization of phonemes: let k interactive audio files be A 1 , A 2 , …, A k , the size of which is m × 1, where m is the number of phonemes, and 1 means that the audio file is mono; the elements in A j The range is [-1, 1], add 1 to all elements to make the range [0, 2], and multiply by the specified coefficient d , so that each phoneme value can be represented by n binary bits, that is

b i j =(a i j +1)×di=1, 2, …, mj=1, 2, …, k, (1) b i j =( a i j +1)× d , i =1, 2, …, m ; j =1, 2, …, k , (1)

其中,a i j A j B j ={b i j }为音素整数矩阵;可得km×1的音素整数矩阵B 1, B 2, …,B k Among them, a i j A j , B j ={ b i j } is a phoneme integer matrix; k number of m × 1 phoneme integer matrices B 1 , B 2 , …, B k can be obtained;

步骤2:混沌序列产生:随机选取初始值x 0∈(0, 1)和控制参数p 1∈(0, 0.5),迭代公式(2)所示的分段线性混沌映射(Piecewise Linear Chaotic Map,PWLCM)k次,可产生一个混沌序列X 1={x i 1};Step 2: Chaos sequence generation: randomly select the initial value x 0 ∈ (0, 1) and the control parameter p 1 ∈ (0, 0.5), and iterate the Piecewise Linear Chaotic Map (Piecewise Linear Chaotic Map, PWLCM) k times, can generate a chaotic sequence X 1 ={ x i 1 };

Figure 887060DEST_PATH_IMAGE001
, (2)
Figure 887060DEST_PATH_IMAGE001
, (2)

随机选取初始值y 0∈(0, 1)和控制参数p 2∈(0, 0.5),迭代公式(2)k×m×n次,可产生一个混沌序列Y 1={y i 1};Randomly select the initial value y 0 ∈(0, 1) and the control parameter p 2 ∈(0, 0.5), and iterate formula (2) k × m × n times to generate a chaotic sequence Y 1 ={ y i 1 };

步骤3:混沌序列整数化:计算,Step 3: Chaotic Sequence Integerization: Computation,

y i 2=mod(floor(y i 1×1016), 2 n ), (3) y i 2 = mod ( floor ( y i 1 ×10 16 ), 2 n ), (3)

其中,mod( )和floor( )分别为取模和取整函数,y i 1Y 1Y 2={y i 2};Among them, mod ( ) and floor ( ) are modulo and integer functions respectively, y i 1Y 1 , Y 2 ={ y i 2 };

步骤4:文件级置乱:利用X 1产生序列1, 2, …, k的一个全排列P;按照P的顺序,将B 1, B 2, …, B k重塑成一个m×k的整数矩阵CStep 4: File-level scrambling: use X 1 to generate a full permutation P of the sequence 1, 2, …, k ; in the order of P , reshape B 1 , B 2 , …, B k into an m × k integer matrix C ;

步骤5:音素级置乱:利用二维Zigzag变换,将C转换成一个长度为mk的音频向量VStep 5: phoneme-level scrambling: utilize two-dimensional Zigzag transformation to convert C into an audio vector V with a length of mk ;

步骤6:音频分割:以m个音素为单位,将V等分成k个音频向量D 1, D 2, …, D k Step 6: Audio segmentation: with m phonemes as the unit, divide V into k audio vectors D 1 , D 2 , ..., D k equally;

步骤7:音素扩散:计算:Step 7: Phoneme Diffusion: Calculate:

E 1=D 1Y 2E i =D i Y 2E i-1i=2, 3, …, k, (4) E 1 = D 1Y 2 , E i = D i Y 2E i -1 , i =2, 3, …, k , (4)

其中,⊕表示异或运算;可得扩散结果为E 1, E 2, …, E k Among them, ⊕ represents the exclusive OR operation; the diffusion results can be obtained as E 1 , E 2 , …, E k ;

步骤8:音素小数化:对E 1, E 2, …, E k 中的各元素除以d,再减1,使其范围变为[-1, 1],即Step 8: Phoneme decimalization: Divide each element in E 1 , E 2 , …, E k by d , and then subtract 1 to make its range become [-1, 1], that is

f i j = e i j /d-1,i=1, 2, …, mj=1, 2, …, k, (5) f i j = e i j / d -1, i = 1, 2, …, m ; j = 1, 2, …, k , (5)

其中,e i j E j F j ={f i j }为音素矩阵;可得k个加密音频F 1, F 2, …, F k Among them, e i j E j , F j ={ f i j } is a phoneme matrix; k encrypted audio frequencies F 1 , F 2 , …, F k can be obtained.

进一步地,所述步骤5中,Zigzag变换:Zigzag变换是一种常见的置乱方法,通过对矩阵中元素从左上角开始按照“之”字形扫描取数,以此来达到对数据进行置换的目的。然后,将扫描的元素依次存储到一维数组中,再按照一定方式转换为二维矩阵。其特点是实现简单,时间复杂度低。Further, in described step 5, Zigzag transformation: Zigzag transformation is a kind of common scrambling method, by starting from the upper left corner of the matrix to scan the number according to the "zigzag" shape, so as to achieve the replacement of data. Purpose. Then, the scanned elements are stored in a one-dimensional array in turn, and then converted into a two-dimensional matrix in a certain way. It is characterized by simple implementation and low time complexity.

有益效果:本发明针对单音频加密方法安全性差的问题,提出一种基于混沌和Zigzag变换的多音频加密方法。主要贡献有:(1)实现了多音频文件的同步加密;(2)利用混沌序列实现文件级置乱;(3)利用二维Zigzag变换实现对音素矩阵的置乱;(4)利用混沌序列和异或运算实现对音素的扩散;(5)该方法利用了混沌的随机性和复杂性以及Zigzag变换的简单高效,提高了音频的加密效果和加密效率。因此,提出的多音频加密方法具有高效、安全和加密效果良好的特征,可有效地保护多个音频文件网络传输和存储的安全性。Beneficial effects: Aiming at the problem of poor security of the single-audio encryption method, the present invention proposes a multi-audio encryption method based on chaos and Zigzag transform. The main contributions are: (1) synchronous encryption of multiple audio files; (2) file-level scrambling using chaotic sequences; (3) scrambling of phoneme matrices using two-dimensional Zigzag transform; (4) using chaotic sequences And XOR operation realizes the diffusion of phonemes; (5) This method utilizes the randomness and complexity of chaos and the simplicity and efficiency of Zigzag transform, which improves the encryption effect and encryption efficiency of audio. Therefore, the proposed multi-audio encryption method has the characteristics of high efficiency, security and good encryption effect, and can effectively protect the security of network transmission and storage of multiple audio files.

附图说明Description of drawings

图1:基于混沌和Zigzag变换的多音频加密方法的加密流程图;Figure 1: Encryption flow chart of multi-audio encryption method based on chaos and Zigzag transform;

图2:原始音频的时域波形图;Figure 2: Time-domain waveform diagram of the original audio;

图3:加密音频的时域波形图。Figure 3: Time-domain waveform diagram of encrypted audio.

具体实施方式Detailed ways

下面结合具体附图和实例对本发明的实施过程进一步详细说明。The implementation process of the present invention will be further described in detail below with reference to the specific drawings and examples.

图1是本方法的加密流程图。Fig. 1 is the encryption flow chart of this method.

采用的编程软件为Matlab R2016b,选取5个大小为73113×1的音频文件作为原始音频。采用本方法,对原始图像加密的详细过程描述如下。 The programming software used is Matlab R2016b, and five audio files with a size of 73113×1 are selected as the original audio. Using this method, the detailed process of encrypting the original image is described as follows.

步骤1:音素整数化:具体操作是将音素全部加1,然后乘以10000,使其范围变为[0, 20000]。Step 1: Phoneme integerization: The specific operation is to add 1 to all the phonemes, and then multiply by 10000, so that the range becomes [0, 20000].

步骤2:混沌序列产生:令5个原始音频为y 1, y 2, …, y 5;选取PWLCM的初始值y 0 1=0.78和参数p 1=0.44,迭代该映射73113×5次,可获得一个混沌序列Y 1={y i 1}365565;类似地,利用PWLCM的初始值x 0 1=0.32和参数p 2=0.44,迭代该映射5次,可得另外一个混沌序列X 1={x i 1}5;对X 1进行排序,得到索引值。Step 2: chaotic sequence generation: let 5 original audios be y 1 , y 2 , …, y 5 ; select the initial value y 0 1 =0.78 and parameter p 1 =0.44 of PWLCM, and iterate the map 73113×5 times, which can be Obtain a chaotic sequence Y 1 ={ y i 1 } 365565 ; similarly, using the initial value of PWLCM x 0 1 =0.32 and parameter p 2 =0.44, and iterating the map 5 times, another chaotic sequence X 1 ={ x i 1 } 5 ; sort X 1 to get the index value.

步骤3:混沌序列整数化:Step 3: Integerize the chaotic sequence:

y i 2=mod(floor(y i 1×1016), 28), y i 2 = mod ( floor ( y i 1 ×10 16 ), 2 8 ),

其中,mod( )和floor( )分别为取模和取整函数,y i 1Y 1Y 2={y i 2}为Y 1的整数化结果。Among them, mod ( ) and floor ( ) are modulo and integer functions respectively, y i 1Y 1 , Y 2 ={ y i 2 } is the integer result of Y 1 .

步骤4:进行文件级置乱:利用X 1产生序列1, 2 …, 5的一个全排列P;按照P的顺序,将B 1, B 2,…, B 5重塑成一个73113×5的整数矩阵CStep 4: Perform file-level scrambling: use X 1 to generate a full permutation P of the sequence 1, 2 ..., 5; according to the order of P , reshape B 1 , B 2 , ..., B 5 into a 73113 × 5 Integer matrix C.

步骤5:音素级置乱:利用二维Zigzag变换,将C转换成一个长度为73113×5的音频向量VStep 5: Phoneme-level scrambling: Convert C into an audio vector V of length 73113 × 5 using a two-dimensional Zigzag transform.

步骤6:音频分割:以73113个音素为单位,将V分割成5个音频向量D 1, D 2,…, D 5Step 6: Audio segmentation: With 73113 phonemes as the unit, V is divided into 5 audio vectors D 1 , D 2 ,..., D 5 .

步骤7:进行音素扩散:计算,Step 7: Do Phoneme Diffusion: Computation,

E 1=D 1Y 2E i =D i Y 2E i-1i=2, 3, …, 5 E 1 = D 1Y 2 , E i = D i Y 2E i -1 , i =2, 3, …, 5 ,

其中,⊕表示异或运算,可得扩散结果为E 1, E 2,…, E 5Among them, ⊕ represents the exclusive OR operation, and the diffusion results can be obtained as E 1 , E 2 ,…, E 5 .

步骤8:音素小数化:对每个音素除以10000,再减1,使其范围变为[-1, 1],可得5个加密音频;它们的时域波形图,如图3所示。Step 8: Phoneme decimalization: Divide each phoneme by 10000, and then subtract 1 to make the range become [-1, 1] to get 5 encrypted audios; their time domain waveforms are shown in Figure 3 .

在解密过程中,利用相同的混沌序列、混沌矩阵和对应的解密方法作用于加密音频,可得解密音频时域波形图同图2所示。解密过程是加密的逆过程。In the decryption process, the same chaotic sequence, chaotic matrix and corresponding decryption method are used to act on the encrypted audio, and the time-domain waveform of the decrypted audio can be obtained as shown in Figure 2. The decryption process is the reverse process of encryption.

Claims (1)

1. The multi-audio encryption method based on chaos and Zigzag transformation is characterized in that the encryption process comprises the following steps:
step 1: and (3) phoneme integer quantization: order tokAn interactive audio file isA 1, A 2, …, A k Of a size ofm×1,mIs the number of phonemes, 1 means that the audio file is mono;A j middle elementIn the range of [ -1, 1]Adding 1 to all elements to make their range become [0, 2 ]]Then multiply by a specified coefficientdMaking each phoneme value availablenIs represented by a binary bit, i.e.
b i j =(a i j +1)×di=1, 2, …, mj=1, 2, …, k, (1)
Wherein,a i j A j B j ={b i j the phoneme integer matrix is used as the phoneme integer matrix; can obtain the productkAnmA phoneme integer matrix of x 1B 1, B 2, …, B k
Step 2: and (3) chaotic sequence generation: randomly selecting an initial valuey 0E (0, 1) and control parameterp 1E.g. (0, 0.5), Piecewise Linear chaos mapping (PWLCM) shown in iterative formula (2)m×kThen, a chaotic sequence can be generatedY 1={y i 1};
Figure 640698DEST_PATH_IMAGE001
, (2)
Randomly selecting an initial valuex 0E (0, 1) and control parameterp 2E (0, 0.5), iterative formula (2)kThen, a chaotic sequence can be generatedX 1={x i 1};
And step 3: and (3) integer transformation of the chaotic sequence: the calculation is carried out according to the calculation,
y i 2=mod(floor(y i 1×1016), 2 n ), (3)
wherein,mod() Andfloor() Respectively a modulo and an integer function,y i 1Y 1Y 2={y i 2};
and 4, step 4: file level scrambling: by usingX 1The sequence of sequences 1, 2, …,ka full array ofP(ii) a According toPIn the order of (1) toB 1,B 2, …, B kIs reshaped into onem×kIs a matrix of integersC
And 5: phoneme level scrambling: using a two-dimensional Zigzag transform, willCConverted into a length ofmkAudio vector ofV
Step 6: audio frequency segmentation: to be provided withmTaking individual phoneme as unit, willVAre equally divided intokAn audio vectorD 1, D 2, …, D k
And 7: phoneme diffusion: and (3) calculating:
E 1=D 1Y 2E i =D i Y 2E i-1i=2, 3, …, k, (4)
wherein ≧ represents an exclusive or operation; the diffusion result can be obtained asE 1, E 2, …, E k
And 8: phonemic decimal transformation: to pairE 1, E 2, …, E k Each element in (1) divided bydThen decrease 1 to make its range to [ -1, 1 [)]I.e. by
f i j = e i j /d-1,i=1, 2, …, mj=1, 2, …, k, (5)
Wherein,e i j E j F j ={f i j the phoneme matrix is used as the phoneme matrix; can obtain the productkPersonal encrypted audioF 1, F 2, …, F k
CN202010502514.2A 2020-06-05 2020-06-05 Multi-audio encryption method based on chaos and Zigzag transform Active CN111865553B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010502514.2A CN111865553B (en) 2020-06-05 2020-06-05 Multi-audio encryption method based on chaos and Zigzag transform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010502514.2A CN111865553B (en) 2020-06-05 2020-06-05 Multi-audio encryption method based on chaos and Zigzag transform

Publications (2)

Publication Number Publication Date
CN111865553A CN111865553A (en) 2020-10-30
CN111865553B true CN111865553B (en) 2021-10-15

Family

ID=72984976

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010502514.2A Active CN111865553B (en) 2020-06-05 2020-06-05 Multi-audio encryption method based on chaos and Zigzag transform

Country Status (1)

Country Link
CN (1) CN111865553B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114239037B (en) * 2021-12-27 2024-06-04 中国矿业大学 Multi-image encryption method based on sand road rule
CN114598444B (en) * 2022-03-03 2024-11-29 中国矿业大学 Audio encryption method based on SM4 and dynamic S box
CN114999504B (en) * 2022-05-12 2024-11-26 中国矿业大学 Audio scrambling method based on windmill transform
CN117040940B (en) * 2023-10-10 2023-12-19 成都运荔枝科技有限公司 A device data encryption method based on the Internet of Things

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111080506A (en) * 2020-01-06 2020-04-28 中国矿业大学 Multi-image encryption method based on bit plane and chaos

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4964162A (en) * 1985-09-09 1990-10-16 Trw Inc. Secure television signal encoding and decoding system
US7215776B1 (en) * 1999-11-09 2007-05-08 University Of New Hampshire Method and apparatus for the compression and decompression of audio files using a chaotic system
US20070055861A1 (en) * 2005-08-24 2007-03-08 Wen-Wei Lin System and method for hyper-chaos secure communication
CN104618091B (en) * 2015-02-16 2017-08-15 哈尔滨理工大学 Double chaos system dynamic key and the united Streaming Media secret communication methods of RSA
CN106600518B (en) * 2016-11-23 2019-06-21 河南大学 Image encryption and decryption method for visual security and data security based on compressed sensing
CN111031193B (en) * 2020-01-06 2021-08-06 中国矿业大学 Image Encryption Method Based on Stereo Composite Scrambling Model and Chaos
CN111147688B (en) * 2020-01-06 2021-08-06 中国矿业大学 Color Image Encryption Method Based on Stereo Scrambling Model and Chaos

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111080506A (en) * 2020-01-06 2020-04-28 中国矿业大学 Multi-image encryption method based on bit plane and chaos

Also Published As

Publication number Publication date
CN111865553A (en) 2020-10-30

Similar Documents

Publication Publication Date Title
CN111865553B (en) Multi-audio encryption method based on chaos and Zigzag transform
CN112422266B (en) Hyperchaotic encryption method based on Joseph traversal and bit plane reconstruction
CN111031193B (en) Image Encryption Method Based on Stereo Composite Scrambling Model and Chaos
CN107659751B (en) Multi-image encryption method based on DNA coding and chaos
CN107659752B (en) Multi-image encryption method based on DNA coding and chaos
CN112202984B (en) Ciphertext domain reversible information hiding method based on error correction redundancy
CN111682931B (en) Chaos-based multi-audio high-dimensional encryption method
CN109150492B (en) Multi-image encryption method based on three-dimensional scrambling model and chaos
CN112202545B (en) Image encryption method based on Y-shaped filling curve and variable step size Joseph traversal
CN110602346B (en) A Lossless Color Image Encryption Method Based on Hyperchaotic System
CN113114870B (en) Multi-image encryption method based on three-dimensional Zigzag model
CN111080506A (en) Multi-image encryption method based on bit plane and chaos
CN106599703A (en) Mixed primitive and chaos-based multi-image encryption method
CN111682932B (en) Single-round image encryption method based on mixed chaotic mapping
CN113099069A (en) Multi-image encryption method based on three-dimensional spiral model
CN108718232B (en) Image encryption method based on AES and chaos
CN112073171B (en) Multi-audio encryption method based on chaos and DNA coding
CN114598444A (en) Audio encryption method based on SM4 and dynamic S box
CN111147688B (en) Color Image Encryption Method Based on Stereo Scrambling Model and Chaos
CN113098676A (en) Vector map two-position random scrambling encryption method based on four-dimensional chaos
CN114882893B (en) Audio encryption method based on DNA convolution
CN114362918B (en) Image encryption method based on central law and three-dimensional bit plane
CN111682930B (en) A Chaos-Based Bit-Level Audio Encryption Method
Chen et al. A parallel double scrambling encryption scheme for MQIR image based on random combination
CN109274856B (en) Asymmetric Image Encryption Method Based on ECC and Chaos

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant