CN112153238B - Image encryption method based on Tent mapping and composite chaotic mapping - Google Patents
Image encryption method based on Tent mapping and composite chaotic mapping Download PDFInfo
- Publication number
- CN112153238B CN112153238B CN202011038591.3A CN202011038591A CN112153238B CN 112153238 B CN112153238 B CN 112153238B CN 202011038591 A CN202011038591 A CN 202011038591A CN 112153238 B CN112153238 B CN 112153238B
- Authority
- CN
- China
- Prior art keywords
- mapping
- matrix
- chaotic
- tent
- composite
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32267—Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
- H04N1/32272—Encryption or ciphering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/001—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Multimedia (AREA)
- Image Processing (AREA)
Abstract
The invention provides an image encryption method based on Tent mapping and composite chaotic mapping, which belongs to the technical field of image encryption and comprises the following steps: step S10, acquiring an original image with the size of M multiplied by N, and creating a matrix I with the size of M multiplied by N; storing the matrix information of the original image into a matrix I; step S20, generating 6 initial keys based on the matrix information stored in the matrix I; step S30, obtaining 3 chaotic sequences of Tent mapping and composite chaotic mapping based on the initial key; and step S40, performing two rounds of scrambling diffusion operation on the original image based on the chaotic sequence to obtain an encrypted image. The invention has the advantages that: the security of image encryption is greatly improved, and the execution cost is reduced.
Description
Technical Field
The invention relates to the technical field of image encryption, in particular to an image encryption method based on Tent mapping and composite chaotic mapping.
Background
With the rapid development of multimedia technology and the internet, more and more images are transmitted, shared, and stored on the internet. The information security of images is a serious problem in the digital world, and although some traditional encryption algorithms have higher security and mature authentication capability, such as the DES algorithm and the RSA algorithm, the traditional encryption algorithms are not suitable for the field of image encryption due to the particularity of image data. The image is usually described by two kinds of information, namely pixel position and pixel value, in a spatial domain, so that an image encryption algorithm is mainly designed around scrambling and diffusion, and a chaotic system has the advantages of no periodicity, unpredictability, pseudo-randomness, initial value sensitivity and the like, so that the image encryption algorithm is very suitable for the field of image encryption.
Due to the defect of uneven mapping distribution of the one-dimensional chaotic mapping, the encryption effect of an image encryption algorithm based on the one-dimensional chaotic mapping is poor, and the problem of small key space exists, so that the algorithm cannot resist violent attack; although the high-dimensional chaotic mapping has complex chaotic behaviors and is difficult to predict, the algorithm has high execution cost and high requirement on the computing power of a computer. Meanwhile, a good image encryption method also needs to have the capability of resisting plaintext attack.
Therefore, how to provide an image encryption method based on Tent mapping and composite chaotic mapping to improve the security of image encryption and reduce the execution cost becomes a problem to be solved urgently.
Disclosure of Invention
The technical problem to be solved by the invention is to provide an image encryption method based on Tent mapping and composite chaotic mapping, so that the security of image encryption is improved, and the execution cost is reduced.
The invention is realized by the following steps: an image encryption method based on Tent mapping and composite chaotic mapping comprises the following steps:
step S10, acquiring an original image with the size of M multiplied by N, and creating a matrix I with the size of M multiplied by N; storing the matrix information of the original image into a matrix I;
step S20, generating 6 initial keys based on the matrix information stored in the matrix I;
step S30, obtaining 3 chaotic sequences of Tent mapping and composite chaotic mapping based on the initial key;
and step S40, performing two rounds of scrambling diffusion operation on the original image based on the chaotic sequence to obtain an encrypted image.
Further, in step S10, the matrix information includes pixel positions and pixel values.
Further, the step S20 specifically includes:
step S21, creating a one-dimensional matrix X with the size of 1 multiplied by 4, randomly generating 3 random numbers with the value range of 0 to 1 and storing the random numbers in the first 3 columns of the one-dimensional matrix X; the sum of all pixel values in the matrix information is obtained and stored in the 4 th column of a one-dimensional matrix X;
step S22, calculating a composite chaotic mapping coefficient e based on the one-dimensional matrix X1、e2、e3And e4:
Step S23, calculating initial keys x (1), y (1) and a based on each composite chaotic mapping coefficient1、μ1U and z (1):
x(1)=e1;
y(1)=e2;
a1=2+e3;
μ1=0.99+e4;
u=1.999999+e4;
z(1)=0.000001+e4。
further, the step S30 is specifically:
obtaining Tent mapping and chaos sequence s of composite chaos mapping based on each initial key1、s2And s3And mapping 3 of the chaotic sequences to a pseudo random sequence R ranging from 0 to 255n:
Rn=mod(ceil(sn×10∧3),256),n={1,2,3}。
Further, in step S30, the mathematical model of the Tent map is:
wherein u represents a control parameter and has a value range of [0, 2 ]];znIs an iterative variable mapped by Tent, and has an initial value of z1When the value range of (0, 1) is obtained, Tent mapping enters the chaotic region.
Further, in the step S30, the composite chaotic map is a map generated by using Sine map and Chebyshev map as seed maps and using perturbation bifurcation parameters, and a mathematical model of the composite chaotic map is as follows:
wherein the value range of mu is (0, 1)];xnThe output chaotic sequence is represented, and the value range is (0, 1); initial key a1When the absolute value of the chaotic mapping is not less than 2, the compound chaotic mapping enters a chaotic region to generate an infinite-length non-periodic chaotic real value sequence under the infinite precision condition; y isnHas a value range of [ -1, 1](ii) a c represents a weighting parameter, and the value is 0.1; n represents the number of iterations; mu.s1An iteration initial value representing the control parameter mu; a is1Representing an iterative initial value of the control parameter a; x is the number ofn+1、yn+1An iterative variable representing a composite chaotic map; mu.sn+1、an+1An iteration variable representing a control parameter.
Further, the step S40 specifically includes:
step S41, performing first round scrambling on the matrix I by using a circshift function to obtain an image I1;
Step S42, pseudo-random sequence R generated by using composite chaotic mapping2For the image I1Performing a first round of diffusion to obtain a matrix C:
wherein i represents position information of the matrix; c (i) represents the ith number in the matrix C; c (i +1) represents the i +1 th number in the matrix C;
step S43, pseudo-random sequence R generated by Tent mapping3Carrying out bit XOR operation on the matrix C to obtain a matrix CC generated by a second diffusion disorder;
step S44, pseudo-random sequence R generated by using composite chaotic mapping1And shuffling and scrambling the matrix CC to obtain an encrypted image CCC generated by the second round of scrambling.
The invention has the advantages that:
1. by adopting Sine mapping and Chebyshev mapping as seed mapping and generating the composite chaotic mapping by using the disturbance bifurcation parameters, the complexity of the composite chaotic mapping is improved, the key space is effectively enlarged, and the security of image encryption is greatly improved.
2. The two one-dimensional chaotic maps form a new composite chaotic map, so that the execution cost of an image encryption algorithm is greatly reduced, and the dependence on the computing power of a computer is reduced.
3. The pixel value in the plaintext matrix information is used as the generation basis of the initial key, so that the capability of resisting plaintext attack of the image encryption algorithm is greatly improved.
Drawings
The invention will be further described with reference to the following examples with reference to the accompanying drawings.
FIG. 1 is a flow chart of an image encryption method based on Tent mapping and composite chaotic mapping according to the present invention.
FIG. 2 is a flow chart of an image encryption method based on Tent mapping and composite chaotic mapping according to the present invention.
FIG. 3 is a schematic diagram of the raw image pre-processing of the present invention.
Fig. 4 is a schematic diagram of a second round of scrambling according to the present invention.
Fig. 5 is a test image of the present invention.
FIG. 6 is a graph of the encryption effect of the test image of the present invention.
Detailed Description
Referring to fig. 1 to 6, one of the preferred embodiments of an image encryption method based on Tent mapping and composite chaotic mapping according to the present invention includes the following steps:
step S10, acquiring an original image with the size of M multiplied by N, and creating a matrix I with the size of M multiplied by N; storing the matrix information of the original image into a matrix I;
step S20, generating 6 initial keys based on the matrix information stored in the matrix I;
step S30, obtaining 3 chaotic sequences of Tent mapping and composite chaotic mapping based on the initial key; removing the first 1000 random numbers of each chaotic sequence to ensure the randomness of the chaotic sequences;
and step S40, performing two rounds of scrambling diffusion operation on the original image based on the chaotic sequence to obtain an encrypted image.
In step S10, the matrix information includes pixel positions and pixel values.
The step S20 specifically includes:
step S21, creating a one-dimensional matrix X with the size of 1 multiplied by 4, randomly generating 3 random numbers with the value range of 0 to 1 and storing the random numbers in the first 3 columns of the one-dimensional matrix X; the sum of all pixel values in the matrix information is obtained and stored in the 4 th column of a one-dimensional matrix X;
step S22, calculating a composite chaotic mapping coefficient e based on the one-dimensional matrix X1、e2、e3And e4:
Step S23, calculating initial keys x (1), y (1) and a based on each composite chaotic mapping coefficient1、μ1U and z (1):
x(1)=e1;
y(1)=e2;
a1=2+e3;
μ1=0.99+e4;
u=1.999999+e4;
z(1)=0.000001+e4;
wherein 2, 0.99, 1.999999, 0.000001 are preset initial values.
The step S30 specifically includes:
tent mapping and composite chaotic mapping are obtained based on each initial keyOf the chaotic sequence s1、s2And s3And mapping 3 of the chaotic sequences to a pseudo random sequence R ranging from 0 to 255n:
Rn=mod(ceil(sn×10∧3),256),n={1,2,3};
The pseudo-random sequence RnIncluding a pseudo-random sequence R generated using a composite chaotic map1Pseudo-random sequence R generated by using composite chaotic mapping2And a pseudo-random sequence R generated by Tent mapping3。
In step S30, the mathematical model of Tent mapping is:
wherein u represents a control parameter and has a value range of [0, 2 ]];znAn iteration variable mapped for Tent, and an initial value z1When the value range of (0, 1) is obtained, Tent mapping enters the chaotic region.
In the step S30, the composite chaotic map is a map generated by using Sine map and Chebyshev map as seed maps and using perturbation bifurcation parameters, and a mathematical model of the composite chaotic map is as follows:
wherein the value range of mu is (0, 1)];xnThe output chaotic sequence is represented, and the value range is (0, 1); initial key a1When the absolute value of the chaotic mapping is not less than 2, the compound chaotic mapping enters a chaotic region to generate an infinite-length non-periodic chaotic real value sequence under the infinite precision condition; y isnHas a value range of [ -1, 1](ii) a c represents a weighting parameter, and the value is 0.1; n represents the number of iterations; mu.s1An iteration initial value representing the control parameter mu; a is1Representing an iterative initial value of the control parameter a; x is the number ofn+1、yn+1An iterative variable representing a composite chaotic map; mu.sn+1、an+1An iteration variable representing a control parameter.
The step S40 specifically includes:
step S41, performing a first round of scrambling on the matrix I by using a circshift function to obtain an image I1;
Step S42, pseudo-random sequence R generated by using composite chaotic mapping2For the image I1Performing a first round of diffusion to obtain a matrix C:
wherein i represents position information of the matrix; c (i) represents the ith number in the matrix C; c (i +1) represents the i +1 th number in the matrix C;
step S43, pseudo-random sequence R generated by Tent mapping3Carrying out bit XOR operation on the matrix C to obtain a matrix CC generated by second diffusion disorder;
step S44, pseudo-random sequence R generated by using composite chaotic mapping1And shuffling and scrambling the matrix CC to obtain an encrypted image CCC generated by the second round of scrambling.
The decryption process of the encrypted image CCC is the inverse process of the image encryption algorithm, and the initial key and the chaotic sequence for decryption and encryption are the same.
The invention relates to a second preferred embodiment of an image encryption method based on Tent mapping and composite chaotic mapping, which comprises the following steps:
step S10, acquiring a test image (as shown in fig. 3) with a size of 512 × 512, and creating a matrix I with a size of 512 × 512; storing the matrix information of the original image into a matrix I; the matrix information comprises pixel positions and pixel values;
step S20, generating 6 initial keys based on the matrix information stored in the matrix I;
step S30, respectively iterating Tent mapping and composite chaotic mapping (1000+512 multiplied by 512) times based on the initial key to generate 3 chaotic sequences and removing the first 1000 random numbers of each chaotic sequence;
step S40, performing two rounds of scrambling and diffusing operations on the original image based on the chaotic sequence to obtain an encrypted test image (as shown in fig. 4).
The step S20 specifically includes:
step S21, creating a one-dimensional matrix X with the size of 1 × 4, randomly generating 3 random numbers with the value range of 0 to 1, and storing the random numbers in the first 3 rows of the one-dimensional matrix X; the sum of all pixel values in the matrix information is obtained and stored in the 4 th column of the one-dimensional matrix X;
step S22, calculating a composite chaotic mapping coefficient e based on the one-dimensional matrix X1、e2、e3And e4:
Step S23, calculating initial secret keys x (1), y (1), a based on each composite chaotic mapping coefficient1、μ1U and z (1):
x(1)=e1;
y(1)=e2;
a1=2+e3;
μ1=0.99+e4;
u=1.999999+e4;
z(1)=0.000001+e4;
wherein 2, 0.99, 1.999999, 0.000001 are preset initial values.
The step S40 specifically includes:
step S41, a first round of scrambling is carried out on the matrix I by using a circshift function, namely, the matrix I is regarded as a one-dimensional matrix, and cyclic displacement operation is respectively carried out on each row and each column of the matrix I, so that an image I is obtained1;
Step S42, pseudo-random sequence R generated by using composite chaotic mapping2For the image I1Performing a first round of diffusion, i.e. said image I1Conversion into one-dimensional linesVector, image I1And a pseudorandom sequence R2For equal-sized matrices, take out I respectively1And R2After the value of the first position is added, mod operation is performed on 256, and xor operation is performed on the calculation result of mod operation and the previous calculation result, and so on, so as to obtain a matrix C:
wherein i represents position information of the matrix; c (i) represents the ith number in the matrix C; c (i +1) represents the i +1 th number in the matrix C;
step S43, pseudo-random sequence R generated by Tent mapping3Performing a bit XOR operation on the matrix C, namely the matrices C and R3Converting the binary data into a matrix with the size of 512 multiplied by 512, traversing the two matrices simultaneously, respectively taking out the values at the same positions of the two matrices, converting the values into binary numbers represented in a character string form, then performing binary exclusive-or operation, converting the result into decimal, and so on to obtain a matrix CC generated by second diffusion disorder;
step S44, pseudo-random sequence R generated by using composite chaotic mapping1Shuffling said matrix CC, i.e. of matrix R1Performing sort operation to convert the matrix R1Sorting the values in ascending order, and sorting the matrix R1The position change data of the second round is stored in a new position matrix, and the matrix CC is scrambled according to the position matrix, so that an encrypted test image generated by the second round of scrambling is obtained.
In summary, the invention has the advantages that:
1. by adopting Sine mapping and Chebyshev mapping as seed mapping and generating the composite chaotic mapping by using the disturbance bifurcation parameters, the complexity of the composite chaotic mapping is improved, the key space is effectively enlarged, and the security of image encryption is greatly improved.
2. The two one-dimensional chaotic maps form a new composite chaotic map, so that the execution cost of an image encryption algorithm is greatly reduced, and the dependence on the computing power of a computer is reduced.
3. The pixel value in the plaintext matrix information is used as the generation basis of the initial key, so that the capability of resisting plaintext attack of the image encryption algorithm is greatly improved.
Although specific embodiments of the invention have been described above, it will be understood by those skilled in the art that the specific embodiments described are illustrative only and are not limiting upon the scope of the invention, and that equivalent modifications and variations can be made by those skilled in the art without departing from the spirit of the invention, which is to be limited only by the appended claims.
Claims (6)
1. An image encryption method based on Tent mapping and composite chaotic mapping is characterized in that: the method comprises the following steps:
step S10, acquiring an original image with the size of M multiplied by N, and creating a matrix I with the size of M multiplied by N; storing the matrix information of the original image into a matrix I;
step S20, generating 6 initial keys based on the matrix information stored in the matrix I;
step S30, obtaining 3 chaotic sequences of Tent mapping and composite chaotic mapping based on the initial key;
s40, performing two rounds of scrambling and diffusion operations on the original image based on the chaotic sequence to obtain an encrypted image;
the step S20 specifically includes:
step S21, creating a one-dimensional matrix X with the size of 1 × 4, randomly generating 3 random numbers with the value range of 0 to 1, and storing the random numbers in the first 3 rows of the one-dimensional matrix X; the sum of all pixel values in the matrix information is obtained and stored in the 4 th column of a one-dimensional matrix X;
step S22, calculating a composite chaotic mapping coefficient e based on the one-dimensional matrix X1、e2、e3And e4:
Step S23, calculating initial secret keys x (1), y (1), a based on each composite chaotic mapping coefficient1、μ1U and z (1):
x(1)=e1;
y(1)=e2;
a1=2+e3;
μ1=0.99+e4;
u=1.999999+e4;
z(1)=0.000001+e4。
2. the image encryption method based on Tent mapping and composite chaotic mapping as claimed in claim 1, wherein: in step S10, the matrix information includes pixel positions and pixel values.
3. The image encryption method based on Tent mapping and composite chaotic mapping as claimed in claim 1, wherein: the step S30 specifically includes:
obtaining Tent mapping and chaotic sequence s of composite chaotic mapping based on each initial key1、s2And s3And mapping 3 of the chaotic sequences to pseudo random sequences R ranging from 0 to 255n:
Rn=mod(ceil(sn×10^3),256),n={1,2,3}。
4. The image encryption method based on Tent mapping and composite chaotic mapping as claimed in claim 1, wherein: in step S30, the mathematical model of the Tent map is:
wherein u represents a control parameter and has a value range of [0, 2 ]];znAn iteration variable mapped for Tent, and an initial value z1When the value range of (0, 1) is obtained, Tent mapping enters the chaotic region.
5. The image encryption method based on Tent mapping and composite chaotic mapping as claimed in claim 1, wherein: in step S30, the composite chaotic map is a map generated by using Sine map and Chebyshev map as seed maps and using perturbation bifurcation parameters, and the mathematical model of the composite chaotic map is as follows:
wherein the value range of mu is (0, 1)];xnThe output chaotic sequence is represented, and the value range is (0, 1); initial key a1When the absolute value of the chaotic mapping is not less than 2, the compound chaotic mapping enters a chaotic region to generate an infinite-length non-periodic chaotic real value sequence under the infinite precision condition; y isnHas a value range of [ -1, 1](ii) a c represents a weighting parameter, and the value is 0.1; n represents the number of iterations; mu.s1An iteration initial value representing the control parameter mu; a is1Representing an iteration initial value of the control parameter a; x is the number ofn+1、yn+1An iterative variable representing a composite chaotic map; mu.sn+1、an+1An iteration variable representing a control parameter.
6. The image encryption method based on Tent mapping and composite chaotic mapping as claimed in claim 3, wherein: the step S40 specifically includes:
step S41, performing first round scrambling on the matrix I by using a circshift function to obtain an image I1;
Step S42, pseudo-random sequence R generated by using composite chaotic mapping2For the image I1Performing a first round of diffusion to obtain a matrix C:
wherein i represents position information of the matrix; c (i) represents the ith number in the matrix C; c (i +1) represents the i +1 th number in the matrix C;
step S43, pseudo-random sequence R generated by Tent mapping3Carrying out bit XOR operation on the matrix C to obtain a matrix CC generated by the second round of diffusion;
step S44, pseudo-random sequence R generated by using composite chaotic mapping1And shuffling and scrambling the matrix CC to obtain an encrypted image CCC generated by the second round of scrambling.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011038591.3A CN112153238B (en) | 2020-09-28 | 2020-09-28 | Image encryption method based on Tent mapping and composite chaotic mapping |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011038591.3A CN112153238B (en) | 2020-09-28 | 2020-09-28 | Image encryption method based on Tent mapping and composite chaotic mapping |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112153238A CN112153238A (en) | 2020-12-29 |
CN112153238B true CN112153238B (en) | 2022-07-15 |
Family
ID=73894888
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011038591.3A Active CN112153238B (en) | 2020-09-28 | 2020-09-28 | Image encryption method based on Tent mapping and composite chaotic mapping |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112153238B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113194213B (en) * | 2021-04-08 | 2022-05-20 | 安徽大学 | PNG image information hiding and recovering method based on secret sharing and chaotic mapping |
CN113190867B (en) * | 2021-05-26 | 2024-02-06 | 中国工商银行股份有限公司 | Key generation method, key generation device, electronic device, and storage medium |
CN115250171A (en) * | 2021-12-30 | 2022-10-28 | 刘芳 | Dynamic encryption method for local area network information security based on composite chaotic mapping |
CN115277977B (en) * | 2022-07-25 | 2023-11-10 | 重庆邮电大学 | Hybrid chaotic image encryption method based on FPGA (field programmable Gate array) configurable floating point precision |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103530571A (en) * | 2013-09-25 | 2014-01-22 | 上海理工大学 | Image encryption method based on sine mapping and Logistic chaos sequence |
CN108133446A (en) * | 2016-12-01 | 2018-06-08 | 钦州市晶通科技有限公司 | A kind of composite chaotic Second-scrambling resume image |
CN108235029A (en) * | 2018-01-05 | 2018-06-29 | 广西师范大学 | A kind of compression of images encryption method based on compressed sensing and cai's circuit |
CN108322622A (en) * | 2018-02-23 | 2018-07-24 | 哈尔滨理工大学 | A kind of color digital image encryption method based on 2D-VMD and octuple hyperchaotic system |
CN108366181A (en) * | 2018-01-23 | 2018-08-03 | 西南财经大学 | A kind of image encryption method based on hyperchaotic system and multistage scramble |
CN110430036A (en) * | 2019-07-05 | 2019-11-08 | 云南大学 | A kind of RGB color image encryption method based on poor chaotic maps |
CN111050020A (en) * | 2019-11-12 | 2020-04-21 | 河南大学 | Color image compression encryption method based on compressed sensing and double random encryption mechanisms |
CN111683191A (en) * | 2020-06-08 | 2020-09-18 | 兰州理工大学 | Chaotic image encryption method capable of realizing rapid simultaneous scrambling and diffusion of rows and columns |
-
2020
- 2020-09-28 CN CN202011038591.3A patent/CN112153238B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103530571A (en) * | 2013-09-25 | 2014-01-22 | 上海理工大学 | Image encryption method based on sine mapping and Logistic chaos sequence |
CN108133446A (en) * | 2016-12-01 | 2018-06-08 | 钦州市晶通科技有限公司 | A kind of composite chaotic Second-scrambling resume image |
CN108235029A (en) * | 2018-01-05 | 2018-06-29 | 广西师范大学 | A kind of compression of images encryption method based on compressed sensing and cai's circuit |
CN108366181A (en) * | 2018-01-23 | 2018-08-03 | 西南财经大学 | A kind of image encryption method based on hyperchaotic system and multistage scramble |
CN108322622A (en) * | 2018-02-23 | 2018-07-24 | 哈尔滨理工大学 | A kind of color digital image encryption method based on 2D-VMD and octuple hyperchaotic system |
CN110430036A (en) * | 2019-07-05 | 2019-11-08 | 云南大学 | A kind of RGB color image encryption method based on poor chaotic maps |
CN111050020A (en) * | 2019-11-12 | 2020-04-21 | 河南大学 | Color image compression encryption method based on compressed sensing and double random encryption mechanisms |
CN111683191A (en) * | 2020-06-08 | 2020-09-18 | 兰州理工大学 | Chaotic image encryption method capable of realizing rapid simultaneous scrambling and diffusion of rows and columns |
Non-Patent Citations (3)
Title |
---|
2D Chebyshev- Sine Map for Image Encryption;Yanru Zhong et al.;《2018 7th International Conference on Digital Home (ICDH)》;20181201;第1-8页 * |
Construction of a new 2D Chebyshev-Sine map and its application to color image encryption;Hongjun Liu et al;《Multimedia Tools and Applications》;20181211;第78卷;第15997-16010页 * |
基于2D Chebyshev-Sine映射的图像加密算法;钟艳如等;《浙江大学学报(理学版)》;20190331;第46卷(第2期);第131-141、160页 * |
Also Published As
Publication number | Publication date |
---|---|
CN112153238A (en) | 2020-12-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112153238B (en) | Image encryption method based on Tent mapping and composite chaotic mapping | |
Man et al. | Double image encryption algorithm based on neural network and chaos | |
Xian et al. | Double parameters fractal sorting matrix and its application in image encryption | |
CN110086601B (en) | Joseph traversal and hyperchaotic system image encryption method based on pixel value association | |
Ge et al. | A novel chaos-based symmetric image encryption using bit-pair level process | |
Mozaffari | Parallel image encryption with bitplane decomposition and genetic algorithm | |
Kumar et al. | IEHC: An efficient image encryption technique using hybrid chaotic map | |
CN112202545B (en) | Image encryption method based on Y-type filling curve and variable-step Joseph traversal | |
CN112769545B (en) | Image encryption method based on adjacent pixel Joseph transformation and Mealy state machine | |
Wen et al. | Triple-image bit-level encryption algorithm based on double cross 2D hyperchaotic map | |
Cun et al. | A new chaotic image encryption algorithm based on dynamic DNA coding and RNA computing | |
CN113691362B (en) | Bit plane image compression encryption method based on hyperchaotic system and DNA coding | |
CN113938691B (en) | Reversible information hiding method for encrypted image | |
Zhou et al. | Novel multiple-image encryption algorithm based on a two-dimensional hyperchaotic modular model | |
CN110086600A (en) | A kind of image encryption method based on hyperchaotic system and variable step Joseph's problem | |
Bahi et al. | Evaluating quality of chaotic pseudo-random generators: Application to information hiding | |
Song et al. | Multi-image reorganization encryption based on SLF cascade chaos and bit scrambling | |
CN110225222B (en) | Image encryption method based on 3D orthogonal Latin square and chaotic system | |
Shakir et al. | A new four-dimensional hyper-chaotic system for image encryption | |
CN108833733A (en) | A kind of decryption method of the resume image based on chaos S box | |
CN117579756B (en) | Image encryption method based on block selection Zigzag scrambling and rotary coding of wheel disc | |
CN114529440A (en) | Color image encryption method based on four-dimensional memristor hyperchaotic system | |
CN114374775A (en) | Image encryption method based on Julia set and DNA coding | |
CN111737712B (en) | Color image encryption method based on three-dimensional dynamic integer tent mapping | |
Rehman et al. | Robust encryption framework for IoT devices based on bit-plane extraction, chaotic sine models, and quantum operations |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |