CN112153238B - Image encryption method based on Tent mapping and composite chaotic mapping - Google Patents

Image encryption method based on Tent mapping and composite chaotic mapping Download PDF

Info

Publication number
CN112153238B
CN112153238B CN202011038591.3A CN202011038591A CN112153238B CN 112153238 B CN112153238 B CN 112153238B CN 202011038591 A CN202011038591 A CN 202011038591A CN 112153238 B CN112153238 B CN 112153238B
Authority
CN
China
Prior art keywords
mapping
matrix
chaotic
tent
composite
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011038591.3A
Other languages
Chinese (zh)
Other versions
CN112153238A (en
Inventor
唐加能
汤盈慧
陈锦源
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huaqiao University
Original Assignee
Huaqiao University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huaqiao University filed Critical Huaqiao University
Priority to CN202011038591.3A priority Critical patent/CN112153238B/en
Publication of CN112153238A publication Critical patent/CN112153238A/en
Application granted granted Critical
Publication of CN112153238B publication Critical patent/CN112153238B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Image Processing (AREA)

Abstract

The invention provides an image encryption method based on Tent mapping and composite chaotic mapping, which belongs to the technical field of image encryption and comprises the following steps: step S10, acquiring an original image with the size of M multiplied by N, and creating a matrix I with the size of M multiplied by N; storing the matrix information of the original image into a matrix I; step S20, generating 6 initial keys based on the matrix information stored in the matrix I; step S30, obtaining 3 chaotic sequences of Tent mapping and composite chaotic mapping based on the initial key; and step S40, performing two rounds of scrambling diffusion operation on the original image based on the chaotic sequence to obtain an encrypted image. The invention has the advantages that: the security of image encryption is greatly improved, and the execution cost is reduced.

Description

Image encryption method based on Tent mapping and composite chaotic mapping
Technical Field
The invention relates to the technical field of image encryption, in particular to an image encryption method based on Tent mapping and composite chaotic mapping.
Background
With the rapid development of multimedia technology and the internet, more and more images are transmitted, shared, and stored on the internet. The information security of images is a serious problem in the digital world, and although some traditional encryption algorithms have higher security and mature authentication capability, such as the DES algorithm and the RSA algorithm, the traditional encryption algorithms are not suitable for the field of image encryption due to the particularity of image data. The image is usually described by two kinds of information, namely pixel position and pixel value, in a spatial domain, so that an image encryption algorithm is mainly designed around scrambling and diffusion, and a chaotic system has the advantages of no periodicity, unpredictability, pseudo-randomness, initial value sensitivity and the like, so that the image encryption algorithm is very suitable for the field of image encryption.
Due to the defect of uneven mapping distribution of the one-dimensional chaotic mapping, the encryption effect of an image encryption algorithm based on the one-dimensional chaotic mapping is poor, and the problem of small key space exists, so that the algorithm cannot resist violent attack; although the high-dimensional chaotic mapping has complex chaotic behaviors and is difficult to predict, the algorithm has high execution cost and high requirement on the computing power of a computer. Meanwhile, a good image encryption method also needs to have the capability of resisting plaintext attack.
Therefore, how to provide an image encryption method based on Tent mapping and composite chaotic mapping to improve the security of image encryption and reduce the execution cost becomes a problem to be solved urgently.
Disclosure of Invention
The technical problem to be solved by the invention is to provide an image encryption method based on Tent mapping and composite chaotic mapping, so that the security of image encryption is improved, and the execution cost is reduced.
The invention is realized by the following steps: an image encryption method based on Tent mapping and composite chaotic mapping comprises the following steps:
step S10, acquiring an original image with the size of M multiplied by N, and creating a matrix I with the size of M multiplied by N; storing the matrix information of the original image into a matrix I;
step S20, generating 6 initial keys based on the matrix information stored in the matrix I;
step S30, obtaining 3 chaotic sequences of Tent mapping and composite chaotic mapping based on the initial key;
and step S40, performing two rounds of scrambling diffusion operation on the original image based on the chaotic sequence to obtain an encrypted image.
Further, in step S10, the matrix information includes pixel positions and pixel values.
Further, the step S20 specifically includes:
step S21, creating a one-dimensional matrix X with the size of 1 multiplied by 4, randomly generating 3 random numbers with the value range of 0 to 1 and storing the random numbers in the first 3 columns of the one-dimensional matrix X; the sum of all pixel values in the matrix information is obtained and stored in the 4 th column of a one-dimensional matrix X;
step S22, calculating a composite chaotic mapping coefficient e based on the one-dimensional matrix X1、e2、e3And e4
Figure GDA0003669203730000021
Step S23, calculating initial keys x (1), y (1) and a based on each composite chaotic mapping coefficient1、μ1U and z (1):
x(1)=e1
y(1)=e2
a1=2+e3
μ1=0.99+e4
u=1.999999+e4
z(1)=0.000001+e4
further, the step S30 is specifically:
obtaining Tent mapping and chaos sequence s of composite chaos mapping based on each initial key1、s2And s3And mapping 3 of the chaotic sequences to a pseudo random sequence R ranging from 0 to 255n
Rn=mod(ceil(sn×10∧3),256),n={1,2,3}。
Further, in step S30, the mathematical model of the Tent map is:
Figure GDA0003669203730000031
wherein u represents a control parameter and has a value range of [0, 2 ]];znIs an iterative variable mapped by Tent, and has an initial value of z1When the value range of (0, 1) is obtained, Tent mapping enters the chaotic region.
Further, in the step S30, the composite chaotic map is a map generated by using Sine map and Chebyshev map as seed maps and using perturbation bifurcation parameters, and a mathematical model of the composite chaotic map is as follows:
Figure GDA0003669203730000032
wherein the value range of mu is (0, 1)];xnThe output chaotic sequence is represented, and the value range is (0, 1); initial key a1When the absolute value of the chaotic mapping is not less than 2, the compound chaotic mapping enters a chaotic region to generate an infinite-length non-periodic chaotic real value sequence under the infinite precision condition; y isnHas a value range of [ -1, 1](ii) a c represents a weighting parameter, and the value is 0.1; n represents the number of iterations; mu.s1An iteration initial value representing the control parameter mu; a is1Representing an iterative initial value of the control parameter a; x is the number ofn+1、yn+1An iterative variable representing a composite chaotic map; mu.sn+1、an+1An iteration variable representing a control parameter.
Further, the step S40 specifically includes:
step S41, performing first round scrambling on the matrix I by using a circshift function to obtain an image I1
Step S42, pseudo-random sequence R generated by using composite chaotic mapping2For the image I1Performing a first round of diffusion to obtain a matrix C:
Figure GDA0003669203730000033
wherein i represents position information of the matrix; c (i) represents the ith number in the matrix C; c (i +1) represents the i +1 th number in the matrix C;
step S43, pseudo-random sequence R generated by Tent mapping3Carrying out bit XOR operation on the matrix C to obtain a matrix CC generated by a second diffusion disorder;
step S44, pseudo-random sequence R generated by using composite chaotic mapping1And shuffling and scrambling the matrix CC to obtain an encrypted image CCC generated by the second round of scrambling.
The invention has the advantages that:
1. by adopting Sine mapping and Chebyshev mapping as seed mapping and generating the composite chaotic mapping by using the disturbance bifurcation parameters, the complexity of the composite chaotic mapping is improved, the key space is effectively enlarged, and the security of image encryption is greatly improved.
2. The two one-dimensional chaotic maps form a new composite chaotic map, so that the execution cost of an image encryption algorithm is greatly reduced, and the dependence on the computing power of a computer is reduced.
3. The pixel value in the plaintext matrix information is used as the generation basis of the initial key, so that the capability of resisting plaintext attack of the image encryption algorithm is greatly improved.
Drawings
The invention will be further described with reference to the following examples with reference to the accompanying drawings.
FIG. 1 is a flow chart of an image encryption method based on Tent mapping and composite chaotic mapping according to the present invention.
FIG. 2 is a flow chart of an image encryption method based on Tent mapping and composite chaotic mapping according to the present invention.
FIG. 3 is a schematic diagram of the raw image pre-processing of the present invention.
Fig. 4 is a schematic diagram of a second round of scrambling according to the present invention.
Fig. 5 is a test image of the present invention.
FIG. 6 is a graph of the encryption effect of the test image of the present invention.
Detailed Description
Referring to fig. 1 to 6, one of the preferred embodiments of an image encryption method based on Tent mapping and composite chaotic mapping according to the present invention includes the following steps:
step S10, acquiring an original image with the size of M multiplied by N, and creating a matrix I with the size of M multiplied by N; storing the matrix information of the original image into a matrix I;
step S20, generating 6 initial keys based on the matrix information stored in the matrix I;
step S30, obtaining 3 chaotic sequences of Tent mapping and composite chaotic mapping based on the initial key; removing the first 1000 random numbers of each chaotic sequence to ensure the randomness of the chaotic sequences;
and step S40, performing two rounds of scrambling diffusion operation on the original image based on the chaotic sequence to obtain an encrypted image.
In step S10, the matrix information includes pixel positions and pixel values.
The step S20 specifically includes:
step S21, creating a one-dimensional matrix X with the size of 1 multiplied by 4, randomly generating 3 random numbers with the value range of 0 to 1 and storing the random numbers in the first 3 columns of the one-dimensional matrix X; the sum of all pixel values in the matrix information is obtained and stored in the 4 th column of a one-dimensional matrix X;
step S22, calculating a composite chaotic mapping coefficient e based on the one-dimensional matrix X1、e2、e3And e4
Figure GDA0003669203730000051
Step S23, calculating initial keys x (1), y (1) and a based on each composite chaotic mapping coefficient1、μ1U and z (1):
x(1)=e1
y(1)=e2
a1=2+e3
μ1=0.99+e4
u=1.999999+e4
z(1)=0.000001+e4
wherein 2, 0.99, 1.999999, 0.000001 are preset initial values.
The step S30 specifically includes:
tent mapping and composite chaotic mapping are obtained based on each initial keyOf the chaotic sequence s1、s2And s3And mapping 3 of the chaotic sequences to a pseudo random sequence R ranging from 0 to 255n
Rn=mod(ceil(sn×10∧3),256),n={1,2,3};
The pseudo-random sequence RnIncluding a pseudo-random sequence R generated using a composite chaotic map1Pseudo-random sequence R generated by using composite chaotic mapping2And a pseudo-random sequence R generated by Tent mapping3
In step S30, the mathematical model of Tent mapping is:
Figure GDA0003669203730000061
wherein u represents a control parameter and has a value range of [0, 2 ]];znAn iteration variable mapped for Tent, and an initial value z1When the value range of (0, 1) is obtained, Tent mapping enters the chaotic region.
In the step S30, the composite chaotic map is a map generated by using Sine map and Chebyshev map as seed maps and using perturbation bifurcation parameters, and a mathematical model of the composite chaotic map is as follows:
Figure GDA0003669203730000062
wherein the value range of mu is (0, 1)];xnThe output chaotic sequence is represented, and the value range is (0, 1); initial key a1When the absolute value of the chaotic mapping is not less than 2, the compound chaotic mapping enters a chaotic region to generate an infinite-length non-periodic chaotic real value sequence under the infinite precision condition; y isnHas a value range of [ -1, 1](ii) a c represents a weighting parameter, and the value is 0.1; n represents the number of iterations; mu.s1An iteration initial value representing the control parameter mu; a is1Representing an iterative initial value of the control parameter a; x is the number ofn+1、yn+1An iterative variable representing a composite chaotic map; mu.sn+1、an+1An iteration variable representing a control parameter.
The step S40 specifically includes:
step S41, performing a first round of scrambling on the matrix I by using a circshift function to obtain an image I1
Step S42, pseudo-random sequence R generated by using composite chaotic mapping2For the image I1Performing a first round of diffusion to obtain a matrix C:
Figure GDA0003669203730000063
wherein i represents position information of the matrix; c (i) represents the ith number in the matrix C; c (i +1) represents the i +1 th number in the matrix C;
step S43, pseudo-random sequence R generated by Tent mapping3Carrying out bit XOR operation on the matrix C to obtain a matrix CC generated by second diffusion disorder;
step S44, pseudo-random sequence R generated by using composite chaotic mapping1And shuffling and scrambling the matrix CC to obtain an encrypted image CCC generated by the second round of scrambling.
The decryption process of the encrypted image CCC is the inverse process of the image encryption algorithm, and the initial key and the chaotic sequence for decryption and encryption are the same.
The invention relates to a second preferred embodiment of an image encryption method based on Tent mapping and composite chaotic mapping, which comprises the following steps:
step S10, acquiring a test image (as shown in fig. 3) with a size of 512 × 512, and creating a matrix I with a size of 512 × 512; storing the matrix information of the original image into a matrix I; the matrix information comprises pixel positions and pixel values;
step S20, generating 6 initial keys based on the matrix information stored in the matrix I;
step S30, respectively iterating Tent mapping and composite chaotic mapping (1000+512 multiplied by 512) times based on the initial key to generate 3 chaotic sequences and removing the first 1000 random numbers of each chaotic sequence;
step S40, performing two rounds of scrambling and diffusing operations on the original image based on the chaotic sequence to obtain an encrypted test image (as shown in fig. 4).
The step S20 specifically includes:
step S21, creating a one-dimensional matrix X with the size of 1 × 4, randomly generating 3 random numbers with the value range of 0 to 1, and storing the random numbers in the first 3 rows of the one-dimensional matrix X; the sum of all pixel values in the matrix information is obtained and stored in the 4 th column of the one-dimensional matrix X;
step S22, calculating a composite chaotic mapping coefficient e based on the one-dimensional matrix X1、e2、e3And e4
Figure GDA0003669203730000071
Step S23, calculating initial secret keys x (1), y (1), a based on each composite chaotic mapping coefficient1、μ1U and z (1):
x(1)=e1
y(1)=e2
a1=2+e3
μ1=0.99+e4
u=1.999999+e4
z(1)=0.000001+e4
wherein 2, 0.99, 1.999999, 0.000001 are preset initial values.
The step S40 specifically includes:
step S41, a first round of scrambling is carried out on the matrix I by using a circshift function, namely, the matrix I is regarded as a one-dimensional matrix, and cyclic displacement operation is respectively carried out on each row and each column of the matrix I, so that an image I is obtained1
Step S42, pseudo-random sequence R generated by using composite chaotic mapping2For the image I1Performing a first round of diffusion, i.e. said image I1Conversion into one-dimensional linesVector, image I1And a pseudorandom sequence R2For equal-sized matrices, take out I respectively1And R2After the value of the first position is added, mod operation is performed on 256, and xor operation is performed on the calculation result of mod operation and the previous calculation result, and so on, so as to obtain a matrix C:
Figure GDA0003669203730000081
wherein i represents position information of the matrix; c (i) represents the ith number in the matrix C; c (i +1) represents the i +1 th number in the matrix C;
step S43, pseudo-random sequence R generated by Tent mapping3Performing a bit XOR operation on the matrix C, namely the matrices C and R3Converting the binary data into a matrix with the size of 512 multiplied by 512, traversing the two matrices simultaneously, respectively taking out the values at the same positions of the two matrices, converting the values into binary numbers represented in a character string form, then performing binary exclusive-or operation, converting the result into decimal, and so on to obtain a matrix CC generated by second diffusion disorder;
step S44, pseudo-random sequence R generated by using composite chaotic mapping1Shuffling said matrix CC, i.e. of matrix R1Performing sort operation to convert the matrix R1Sorting the values in ascending order, and sorting the matrix R1The position change data of the second round is stored in a new position matrix, and the matrix CC is scrambled according to the position matrix, so that an encrypted test image generated by the second round of scrambling is obtained.
In summary, the invention has the advantages that:
1. by adopting Sine mapping and Chebyshev mapping as seed mapping and generating the composite chaotic mapping by using the disturbance bifurcation parameters, the complexity of the composite chaotic mapping is improved, the key space is effectively enlarged, and the security of image encryption is greatly improved.
2. The two one-dimensional chaotic maps form a new composite chaotic map, so that the execution cost of an image encryption algorithm is greatly reduced, and the dependence on the computing power of a computer is reduced.
3. The pixel value in the plaintext matrix information is used as the generation basis of the initial key, so that the capability of resisting plaintext attack of the image encryption algorithm is greatly improved.
Although specific embodiments of the invention have been described above, it will be understood by those skilled in the art that the specific embodiments described are illustrative only and are not limiting upon the scope of the invention, and that equivalent modifications and variations can be made by those skilled in the art without departing from the spirit of the invention, which is to be limited only by the appended claims.

Claims (6)

1. An image encryption method based on Tent mapping and composite chaotic mapping is characterized in that: the method comprises the following steps:
step S10, acquiring an original image with the size of M multiplied by N, and creating a matrix I with the size of M multiplied by N; storing the matrix information of the original image into a matrix I;
step S20, generating 6 initial keys based on the matrix information stored in the matrix I;
step S30, obtaining 3 chaotic sequences of Tent mapping and composite chaotic mapping based on the initial key;
s40, performing two rounds of scrambling and diffusion operations on the original image based on the chaotic sequence to obtain an encrypted image;
the step S20 specifically includes:
step S21, creating a one-dimensional matrix X with the size of 1 × 4, randomly generating 3 random numbers with the value range of 0 to 1, and storing the random numbers in the first 3 rows of the one-dimensional matrix X; the sum of all pixel values in the matrix information is obtained and stored in the 4 th column of a one-dimensional matrix X;
step S22, calculating a composite chaotic mapping coefficient e based on the one-dimensional matrix X1、e2、e3And e4
Figure FDA0003669203720000011
Step S23, calculating initial secret keys x (1), y (1), a based on each composite chaotic mapping coefficient1、μ1U and z (1):
x(1)=e1
y(1)=e2
a1=2+e3
μ1=0.99+e4
u=1.999999+e4
z(1)=0.000001+e4
2. the image encryption method based on Tent mapping and composite chaotic mapping as claimed in claim 1, wherein: in step S10, the matrix information includes pixel positions and pixel values.
3. The image encryption method based on Tent mapping and composite chaotic mapping as claimed in claim 1, wherein: the step S30 specifically includes:
obtaining Tent mapping and chaotic sequence s of composite chaotic mapping based on each initial key1、s2And s3And mapping 3 of the chaotic sequences to pseudo random sequences R ranging from 0 to 255n
Rn=mod(ceil(sn×10^3),256),n={1,2,3}。
4. The image encryption method based on Tent mapping and composite chaotic mapping as claimed in claim 1, wherein: in step S30, the mathematical model of the Tent map is:
Figure FDA0003669203720000021
wherein u represents a control parameter and has a value range of [0, 2 ]];znAn iteration variable mapped for Tent, and an initial value z1When the value range of (0, 1) is obtained, Tent mapping enters the chaotic region.
5. The image encryption method based on Tent mapping and composite chaotic mapping as claimed in claim 1, wherein: in step S30, the composite chaotic map is a map generated by using Sine map and Chebyshev map as seed maps and using perturbation bifurcation parameters, and the mathematical model of the composite chaotic map is as follows:
Figure FDA0003669203720000022
wherein the value range of mu is (0, 1)];xnThe output chaotic sequence is represented, and the value range is (0, 1); initial key a1When the absolute value of the chaotic mapping is not less than 2, the compound chaotic mapping enters a chaotic region to generate an infinite-length non-periodic chaotic real value sequence under the infinite precision condition; y isnHas a value range of [ -1, 1](ii) a c represents a weighting parameter, and the value is 0.1; n represents the number of iterations; mu.s1An iteration initial value representing the control parameter mu; a is1Representing an iteration initial value of the control parameter a; x is the number ofn+1、yn+1An iterative variable representing a composite chaotic map; mu.sn+1、an+1An iteration variable representing a control parameter.
6. The image encryption method based on Tent mapping and composite chaotic mapping as claimed in claim 3, wherein: the step S40 specifically includes:
step S41, performing first round scrambling on the matrix I by using a circshift function to obtain an image I1
Step S42, pseudo-random sequence R generated by using composite chaotic mapping2For the image I1Performing a first round of diffusion to obtain a matrix C:
Figure FDA0003669203720000031
wherein i represents position information of the matrix; c (i) represents the ith number in the matrix C; c (i +1) represents the i +1 th number in the matrix C;
step S43, pseudo-random sequence R generated by Tent mapping3Carrying out bit XOR operation on the matrix C to obtain a matrix CC generated by the second round of diffusion;
step S44, pseudo-random sequence R generated by using composite chaotic mapping1And shuffling and scrambling the matrix CC to obtain an encrypted image CCC generated by the second round of scrambling.
CN202011038591.3A 2020-09-28 2020-09-28 Image encryption method based on Tent mapping and composite chaotic mapping Active CN112153238B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011038591.3A CN112153238B (en) 2020-09-28 2020-09-28 Image encryption method based on Tent mapping and composite chaotic mapping

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011038591.3A CN112153238B (en) 2020-09-28 2020-09-28 Image encryption method based on Tent mapping and composite chaotic mapping

Publications (2)

Publication Number Publication Date
CN112153238A CN112153238A (en) 2020-12-29
CN112153238B true CN112153238B (en) 2022-07-15

Family

ID=73894888

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011038591.3A Active CN112153238B (en) 2020-09-28 2020-09-28 Image encryption method based on Tent mapping and composite chaotic mapping

Country Status (1)

Country Link
CN (1) CN112153238B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113194213B (en) * 2021-04-08 2022-05-20 安徽大学 PNG image information hiding and recovering method based on secret sharing and chaotic mapping
CN113190867B (en) * 2021-05-26 2024-02-06 中国工商银行股份有限公司 Key generation method, key generation device, electronic device, and storage medium
CN115277977B (en) * 2022-07-25 2023-11-10 重庆邮电大学 Hybrid chaotic image encryption method based on FPGA (field programmable Gate array) configurable floating point precision

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103530571A (en) * 2013-09-25 2014-01-22 上海理工大学 Image encryption method based on sine mapping and Logistic chaos sequence
CN108133446A (en) * 2016-12-01 2018-06-08 钦州市晶通科技有限公司 A kind of composite chaotic Second-scrambling resume image
CN108235029A (en) * 2018-01-05 2018-06-29 广西师范大学 A kind of compression of images encryption method based on compressed sensing and cai's circuit
CN108322622A (en) * 2018-02-23 2018-07-24 哈尔滨理工大学 A kind of color digital image encryption method based on 2D-VMD and octuple hyperchaotic system
CN108366181A (en) * 2018-01-23 2018-08-03 西南财经大学 A kind of image encryption method based on hyperchaotic system and multistage scramble
CN110430036A (en) * 2019-07-05 2019-11-08 云南大学 A kind of RGB color image encryption method based on poor chaotic maps
CN111050020A (en) * 2019-11-12 2020-04-21 河南大学 Color image compression encryption method based on compressed sensing and double random encryption mechanisms
CN111683191A (en) * 2020-06-08 2020-09-18 兰州理工大学 Chaotic image encryption method capable of realizing rapid simultaneous scrambling and diffusion of rows and columns

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103530571A (en) * 2013-09-25 2014-01-22 上海理工大学 Image encryption method based on sine mapping and Logistic chaos sequence
CN108133446A (en) * 2016-12-01 2018-06-08 钦州市晶通科技有限公司 A kind of composite chaotic Second-scrambling resume image
CN108235029A (en) * 2018-01-05 2018-06-29 广西师范大学 A kind of compression of images encryption method based on compressed sensing and cai's circuit
CN108366181A (en) * 2018-01-23 2018-08-03 西南财经大学 A kind of image encryption method based on hyperchaotic system and multistage scramble
CN108322622A (en) * 2018-02-23 2018-07-24 哈尔滨理工大学 A kind of color digital image encryption method based on 2D-VMD and octuple hyperchaotic system
CN110430036A (en) * 2019-07-05 2019-11-08 云南大学 A kind of RGB color image encryption method based on poor chaotic maps
CN111050020A (en) * 2019-11-12 2020-04-21 河南大学 Color image compression encryption method based on compressed sensing and double random encryption mechanisms
CN111683191A (en) * 2020-06-08 2020-09-18 兰州理工大学 Chaotic image encryption method capable of realizing rapid simultaneous scrambling and diffusion of rows and columns

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
2D Chebyshev- Sine Map for Image Encryption;Yanru Zhong et al.;《2018 7th International Conference on Digital Home (ICDH)》;20181201;第1-8页 *
Construction of a new 2D Chebyshev-Sine map and its application to color image encryption;Hongjun Liu et al;《Multimedia Tools and Applications》;20181211;第78卷;第15997-16010页 *
基于2D Chebyshev-Sine映射的图像加密算法;钟艳如等;《浙江大学学报(理学版)》;20190331;第46卷(第2期);第131-141、160页 *

Also Published As

Publication number Publication date
CN112153238A (en) 2020-12-29

Similar Documents

Publication Publication Date Title
Man et al. Double image encryption algorithm based on neural network and chaos
Xian et al. Double parameters fractal sorting matrix and its application in image encryption
CN110086601B (en) Joseph traversal and hyperchaotic system image encryption method based on pixel value association
CN112153238B (en) Image encryption method based on Tent mapping and composite chaotic mapping
Ge et al. A novel chaos-based symmetric image encryption using bit-pair level process
Mozaffari Parallel image encryption with bitplane decomposition and genetic algorithm
Kumar et al. IEHC: An efficient image encryption technique using hybrid chaotic map
CN109660696B (en) New image encryption method
CN110086600B (en) Image encryption method based on hyperchaotic system and variable step length Joseph problem
CN112202545B (en) Image encryption method based on Y-type filling curve and variable-step Joseph traversal
CN113691362B (en) Bit plane image compression encryption method based on hyperchaotic system and DNA coding
CN113938691B (en) Reversible information hiding method for encrypted image
CN109361830B (en) Image encryption method based on plaintext
Bahi et al. Evaluating quality of chaotic pseudo-random generators: Application to information hiding
Cun et al. A new chaotic image encryption algorithm based on dynamic DNA coding and RNA computing
Wen et al. Triple-image bit-level encryption algorithm based on double cross 2D hyperchaotic map
CN110225222B (en) Image encryption method based on 3D orthogonal Latin square and chaotic system
Zhou et al. Novel multiple-image encryption algorithm based on a two-dimensional hyperchaotic modular model
CN108833733A (en) A kind of decryption method of the resume image based on chaos S box
CN115580687A (en) Multi-image encryption method based on variable parameter hyperchaotic system and S-shaped diffusion
Song et al. Multi-image reorganization encryption based on SLF cascade chaos and bit scrambling
CN112769545B (en) Image encryption method based on adjacent pixel Joseph transformation and Mealy state machine
Shakir et al. A new four-dimensional hyper-chaotic system for image encryption
CN114374775A (en) Image encryption method based on Julia set and DNA coding
CN111737712B (en) Color image encryption method based on three-dimensional dynamic integer tent mapping

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant