CN112511899A - Video image encryption method based on cascade chaos technology - Google Patents

Video image encryption method based on cascade chaos technology Download PDF

Info

Publication number
CN112511899A
CN112511899A CN202011130858.1A CN202011130858A CN112511899A CN 112511899 A CN112511899 A CN 112511899A CN 202011130858 A CN202011130858 A CN 202011130858A CN 112511899 A CN112511899 A CN 112511899A
Authority
CN
China
Prior art keywords
sequence
image
encryption
mapping
chaotic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011130858.1A
Other languages
Chinese (zh)
Other versions
CN112511899B (en
Inventor
袁方
金元
李玉霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong University of Science and Technology
Original Assignee
Shandong University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong University of Science and Technology filed Critical Shandong University of Science and Technology
Priority to CN202011130858.1A priority Critical patent/CN112511899B/en
Publication of CN112511899A publication Critical patent/CN112511899A/en
Application granted granted Critical
Publication of CN112511899B publication Critical patent/CN112511899B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4408Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4405Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The invention relates to a video image encryption method based on a cascading chaos technology. The method comprises an encryption process and a decryption process for constructing the key space, and comprises the following steps: firstly, constructing a cascade chaotic mapping, and generating a key space required by encryption and decryption by using the mapping; then, the existing video file in the computer disk is directly read, or a camera is called to collect a video image, an image sequence of each frame is obtained, the original image of each frame is compressed to obtain data information of the image, the image is encrypted and decrypted, a color image and R, G, B components before and after encryption and decryption are obtained, and finally the video data stream before and after encryption and decryption can be obtained. The method has better practicability for video image encryption, and improves the low sensitivity of the system to the initial value caused by the small Lyapunov exponent of the existing chaotic encryption method; the chaos mapping interval is small, which causes the problems of small key space, low sequence security and the like.

Description

Video image encryption method based on cascade chaos technology
Technical Field
The invention belongs to the technical field of file encryption, and relates to a video image encryption method based on a cascading chaotic technology, which is used for solving the problem of low security of the traditional chaotic encryption method.
Background
With the development of internet technology, digital images, videos and audios are applied more and more widely, information carried by the images, the audios and the videos covers the aspects of life, and the information is from national defense science and technology to clothes and eating houses, so that the corresponding requirements on information safety are more and more urgent. However, the traditional encryption algorithm has low security, low efficiency and easy cracking, and cannot meet the increasing requirements of information security. The new encryption algorithm should meet the requirements of high safety, strong anti-cracking capability and the like. In recent years, research on chaos has been applied in many fields, and is also used in the field of encryption. The main reason is that the chaotic signal has unpredictability and aperiodic characteristics, and the confusion and diffusion of encrypted data are increased. In order to decrypt the chaos-based encrypted data, it is necessary to know the chaotic system used in the encryption, all parameters and their order of use, and initial values of the chaotic system. If any error occurs, it will not be possible to decrypt the encrypted data. Due to the characteristics of good pseudo-randomness, sensitivity to initial conditions and the like, the research of chaos becomes more popular in the field of encryption.
Most encryption systems based on chaotic mapping use single chaotic mapping, and although the encryption systems are simple in operation and easy to implement, the defects are obvious: the Lyapunov index is small, so that the system is not high in sensitivity to an initial value; the chaotic mapping interval is small, so that the key space is small and the sequence security is reduced. Therefore, on the basis of the theory of the proposed cascade chaotic system (please refer to the literature: Wang Yuan, Chi and dynamics characteristics research [ J ]. Physics, 2013,62 (2); Yuan F, Deng Y, Li Y X, et al.A. mapping method for constructing a new cascade chaotic system with beta random channels [ J ]. Chaos,2019,29(5):053120.), the traditional Logistic mapping is combined with the improved one-dimensional square mapping to construct a new cascade mapping, the improvement of the dynamics performance of the cascade is researched through the dynamics analysis of the cascade chaotic system before and after the cascade, and a new video image encryption algorithm is designed according to the cascade chaotic mapping, so that the key space and the pseudo-random property are increased, the difficulty of decoding encrypted images is enhanced, and the security of image signals is improved.
Therefore, it is necessary to provide a technical solution to solve the technical problems of the prior art.
Disclosure of Invention
The invention aims to provide an image encryption method based on a cascading chaotic mapping technology aiming at the defects of the conventional chaotic encryption method, so as to solve the problem that the traditional chaotic encryption method has low Lyapunov exponent and causes the system to have low sensitivity to an initial value; the chaos mapping interval is small, which causes the problems of small key space, reduced sequence security and the like.
The general technical idea for realizing the purpose of the invention is as follows: the invention is divided into a process of constructing a key space, an encryption process and a decryption process. Firstly, a cascade chaotic mapping is constructed, and the mapping is used for generating a key space required by encryption and decryption. Then, the image file in the computer is input into matlab to obtain the data information of the image file, and the time domain graph and the frequency domain graph of the image file before and after encryption and decryption are obtained through encryption and decryption.
In order to solve the technical problems in the prior art, the technical scheme of the invention is as follows:
step S1, constructing a key space by utilizing the cascading chaotic mapping;
step S2, directly reading the existing video file in the computer disk, or calling a camera to collect the video image, obtaining the image sequence of each frame, compressing the original image to obtain the image with the size of M multiplied by M, and recording as the plaintext sequence YM×M. The encryption of the video image needs to decompose the image according to the channels, obtain R, G, B components of three channels, which are respectively recorded as RYM×M、GYM×M、BYM×M
Step S3, the encryption flow is completed by operations such as scrambling and diffusing the video image component sequence acquired in the step S2;
and step S4, performing operations such as inverse diffusion scrambling recovery on the ciphertext component generated in step S3, and completing the decryption process.
The step S1 further includes the steps of:
step S11, the one-dimensional square mapping is:
Figure BDA0002735124880000021
in the formula: a and b are control parameters, a belongs to [5, + ∞],b∈[-1,1];x∈[-1,1]. The logistic chaotic map is: x is the number ofn+1=uxn(1-xn) In the formula: control parameter [ mu ] E [0,4 ]],x∈[0,1]. In order to enable Logistic mapping and one-dimensional square mapping to be cascaded, namely the value ranges of two chaotic mappings are the same, the one-dimensional square mapping is improved, and the improved one-dimensional square chaotic is as follows:
Figure BDA0002735124880000031
in the formula: a and b are control parameters, a belongs to [5, + ∞],b∈[-1,1];x∈[0,1]. Cascading the logistic chaotic mapping with the improved one-dimensional square mapping to generate a cascading chaos which is recorded as an L-S cascading mapping, wherein a chaos equation is as follows:
Figure BDA0002735124880000032
wherein a, b and mu are control parameters, and a is 10, b is 0.9, mu is 4, and the initial value x is0Setting the number to be 0.66, and circularly iterating for 1 hundred million times to obtain 1 hundred million random numbers x (i);
step S12, obtaining 1 hundred million random numbers y (i) by circularly iterating 1 hundred million times, where the modified chebyshev polynomial y (i +1) ═ l (cos (key × arccos (y (i))) |, where the parameter key is 5 and the initial value y (0) is 0.25;
step S13, comparing x (i) in step S11 with y (i) in step S12, and when x (i) ≧ y (i), saving the value of x (i) in the array S, thereby generating the chaotic sequence { S (i) } 1,2 … M1};
In step S14, the sequence is sorted in ascending order by using the sort function sort, and the key sequence { z (i) } 1,2 … M is obtained1And using the sequence { i (i) }, i ═ 1,2 … M1Recording the positions of all elements in the original chaotic sequence S (i), wherein the calculation formula is as follows:Z(i)=S[I(i)];
the step S3 further includes the steps of:
step S31 scrambles the images by changing the image sequence components according to the generation rule of the key sequence { z (i) } 1,2 … M in step S1, where the scramble sequence is denoted by RY1 M×M、GY1 M×M、BY1 M×M. If RY (i, j), RY1(i, j) are each RYM×M、RY1 M×MThe element values of i row and j column in the sequence, namely M (i-1) + j element in the respective sequence, satisfy: RY1(i, j) ═ RY (M, n), if k ═ M (i-1) + j, then M ═ floor [ i (k)/M]+1,n=mod[I(k)/M]Floor and mod are respectively rounding and remainder functions;
step S32, dividing the key sequence { z (i) ═ 1,2 … 3M } in step S14 into key blocks C1,C2,C3(ii) a Wherein C isi(i is more than or equal to 1 and less than or equal to 3) is a matrix of M multiplied by M;
step S33, respectively recording the encryption blocks of the channels after diffusion multiplication as RY11、GY11、BY11. The calculation formula is as follows:
Figure BDA0002735124880000041
step S34 and step S33 complete the encryption of R, G, B three channels, and the final encrypted color image can be obtained by integrating the encrypted images of the three channels, and the calculation formula is: y ═ cat [3, RY11,GY11,BY11]In the formula: cat is a combining function that combines the gray images into a color image. The same operation is carried out on each acquired frame image, namely the encryption of the video data stream is finished, and the encryption is finished;
the step S4 further includes the steps of:
step S41, decomposing each frame image after encryption in step S34 according to R, G, B three channels to obtain the encryption block of each channel, RY11、GY11、BY11Then diffusion recovery and measurement are carried out on the obtained productThe calculation formula is as follows:
Figure BDA0002735124880000042
step S42, sorting the sequence i (i) in step S14 in ascending order by using a sorting function, and sorting the sequence i (i) by using { ii (i) } 1,2 … M1Recording the initial positions of the elements in the original sequencing sequence I (i), recovering the image sequence of each channel after scrambling through II (i), if RY (i, j), RY1(i, j) are each RYM×M、RY1 M×MThe element values of i row and j column in the sequence, namely M (i-1) + j element in the respective sequence, satisfy: RY (i, j) ═ RY1(M, n) if k is M (i-1) + j, then M is floor [ ii (k)/M]+1,n=mod[II(k)/M]Where floor and mod are the rounding and remainder functions, respectively.
Step S43, converting R, G, B three-channel component RYM×M、GYM×M、BYM×MAnd combining to obtain a final image, decrypting each frame of encrypted image according to the same operation to obtain a final decrypted video data stream, and completing decryption.
Compared with the prior art, the invention has the following beneficial effects:
the invention adopts a cascading chaos technology to finish encryption and decryption of video files in a computer or video data streams directly collected from a camera. Compared with the existing encryption method based on the single chaos technology, the method generates the key required by encryption and decryption by cascading chaos, increases the key space and pseudo-randomness, enhances the difficulty of decryption and encryption, and improves the security of the video image.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below.
FIG. 1 is a flow diagram of the system of the present invention;
fig. 2 is a bifurcation diagram of the L-S cascaded chaotic system, where a is 10, b is 0.9, and variable x is unchanged with u;
in fig. 3, the L-S cascaded chaotic system takes a-10, b-0.9 Lyapunov exponential spectrum with variable x unchanged with u.
Detailed Description
The invention will be further described with reference to the accompanying drawings.
As shown in fig. 1, a camera is called to capture a video image or a video file is directly read from a computer disk, then an image sequence of each frame is obtained, an original image is encrypted through operations such as decomposition, scrambling and diffusion to obtain a final ciphertext video image, and the final ciphertext video image can be decrypted through reverse transformation.
As shown in fig. 2 and fig. 3, when a is 10 and b is 0.9, a bifurcation diagram and a Lyapunov exponential spectrum of the L-S cascaded chaotic system;
the main dynamic characteristics of the system can be analyzed through a Lyapunov index and a bifurcation diagram, the positive Lyapunov index shows that a moving track is locally unstable, the separation speed on an adjacent track is high, but the whole system is stable, and a chaotic attractor can be formed by repeated movement. A negative Lyapunov exponent indicates that the phase volume is contracted and the orbit is locally stable, insensitive to initial conditions, corresponding to a periodic orbital motion. When a is fixed to 10 and b is fixed to 0.9, a bifurcation diagram of the variable x with constant u (fig. 2) and an exponential spectrum of the Lyapunov index with u (fig. 3) are obtained.
According to the Lyapunov index spectrogram and the system bifurcation diagram, the system is in a period 1 within u epsilon (0, 1.2); within u ∈ (1.2,1.38), cycle 2; as u increases, a doubling period occurs; the chaos phenomenon appears when u belongs to (1.44,2.79), and the period is 1 in u belongs to (2.79, 3.4); within u e (3.4,3.62), cycle 2; as u increases, a doubling period occurs; and when u belongs to (3.69,4), a chaos phenomenon occurs, and the Lyapunov exponent takes the maximum value when u is 4, and the chaotic system is in full mapping.
The above description of the embodiments is only intended to facilitate the understanding of the method of the invention and its core idea. It should be noted that, for those skilled in the art, it is possible to make various improvements and modifications to the present invention without departing from the principle of the present invention, and those improvements and modifications also fall within the scope of the claims of the present invention.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (1)

1. A video image encryption method based on a cascading chaos technology comprises the following steps: characterized in that the method comprises:
step S1, constructing a key space by utilizing the cascading chaotic mapping;
step S2, directly reading the existing video file in the computer disk, or calling a camera to collect the video image, obtaining the image sequence of each frame, compressing the original image to obtain the image with the size of M multiplied by M, and recording as the plaintext sequence YM×M(ii) a The encryption of the video image needs to decompose the image according to the channels, obtain R, G, B components of three channels, which are respectively recorded as RYM×M、GYM ×M、BYM×M
Step S3, the encryption flow is completed by operations such as scrambling and diffusing the video image component sequence acquired in the step S2;
step S4, performing operations such as inverse diffusion scrambling recovery on the ciphertext component generated in step S3 to complete the decryption process;
the step S1 further includes the steps of:
step S11, the one-dimensional square mapping is:
Figure FDA0002735124870000011
in the formula: a and b are control parameters, a belongs to [5, + ∞],b∈[-1,1];x∈[-1,1](ii) a The logistic chaotic map is: x is the number ofn+1=uxn(1-xn) In the formula: control parameter [ mu ] E [0,4 ]],x∈[0,1](ii) a To enable Logistic mapping and one-dimensional squaring mappingThe cascade is established, namely the value ranges of the two chaotic mappings are the same, the one-dimensional square mapping is improved, and the improved one-dimensional square chaotic is as follows:
Figure FDA0002735124870000012
in the formula: a and b are control parameters, a belongs to [5, + ∞],b∈[-1,1];x∈[0,1](ii) a Cascading the logistic chaotic mapping with the improved one-dimensional square mapping to generate a cascading chaos which is recorded as an L-S cascading mapping, wherein a chaos equation is as follows:
Figure FDA0002735124870000021
wherein a, b and mu are control parameters, and a is 10, b is 0.9, mu is 4, and the initial value x is0Setting the number to be 0.66, and circularly iterating for 1 hundred million times to obtain 1 hundred million random numbers x (i);
step S12, obtaining 1 hundred million random numbers y (i) by circularly iterating 1 hundred million times, where the modified chebyshev polynomial y (i +1) ═ l (cos (key × arccos (y (i))) |, where the parameter key is 5 and the initial value y (0) is 0.25;
step S13, comparing x (i) in step S11 with y (i) in step S12, and when x (i) ≧ y (i), saving the value of x (i) in the array S, thereby generating the chaotic sequence { S (i) } 1,2 … M1};
In step S14, the sequence is sorted in ascending order by using the sort function sort, and the key sequence { z (i) } 1,2 … M is obtained1And using the sequence { i (i) }, i ═ 1,2 … M1Recording the positions of all elements in the original chaotic sequence S (i), wherein the calculation formula is as follows: z (i) ═ S [ I (i)];
The step S3 further includes the steps of:
step S31 scrambles the images by changing the image sequence components according to the generation rule of the key sequence { z (i) } 1,2 … M in step S1, where the scramble sequence is denoted by RY1 M×M、GY1 M×M、BY1 M×M(ii) a If RY (i, j), RY1(i, j) are each RYM ×M、RY1 M×MThe element values of i row and j column in the sequence, namely M (i-1) + j element in the respective sequence, satisfy: RY1(i, j) ═ RY (M, n), if k ═ M (M), (n)i-1) + j, then M ═ floor [ I (k)/M]+1,n=mod[I(k)/M]Floor and mod are respectively rounding and remainder functions;
step S32, dividing the key sequence { z (i) ═ 1,2 … 3M } in step S14 into key blocks C1,C2,C3(ii) a Wherein C isi(i is more than or equal to 1 and less than or equal to 3) is a matrix of M multiplied by M;
step S33, respectively recording the encryption blocks of the channels after diffusion multiplication as RY11、GY11、BY11(ii) a The calculation formula is as follows:
Figure FDA0002735124870000031
step S34 and step S33 complete the encryption of R, G, B three channels, and the final encrypted color image can be obtained by integrating the encrypted images of the three channels, and the calculation formula is: y ═ cat [3, RY11,GY11,BY11]In the formula: cat is a combination function, and can combine the gray images into a color image; the same operation is carried out on each acquired frame image, namely the encryption of the video data stream is finished, and the encryption is finished;
the step S4 further includes the steps of:
step S41, decomposing each frame image after encryption in step S34 according to R, G, B three channels to obtain the encryption block of each channel, RY11、GY11、BY11And then carrying out diffusion recovery on the obtained product, wherein the calculation formula is as follows:
Figure FDA0002735124870000032
step S42, sorting the sequence i (i) in step S14 in ascending order by using a sorting function, and sorting the sequence i (i) by using { ii (i) } 1,2 … M1Recording the initial positions of the elements in the original sequencing sequence I (i), recovering the image sequence of each channel after scrambling through II (i), if RY (i, j), RY1(i, j) are each RYM×M、RY1 M×MIn i rows and j columnsThe element values, i.e., the M (i-1) + j elements in the respective sequences, satisfy: RY (i, j) ═ RY1(M, n) if k is M (i-1) + j, then M is floor [ ii (k)/M]+1,n=mod[II(k)/M]Floor and mod are respectively rounding and remainder functions;
step S43, converting R, G, B three-channel component RYM×M、GYM×M、BYM×MAnd combining to obtain a final image, decrypting each frame of encrypted image according to the same operation to obtain a final decrypted video data stream, and completing decryption.
CN202011130858.1A 2020-10-21 2020-10-21 Video image encryption method based on cascading chaos technology Active CN112511899B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011130858.1A CN112511899B (en) 2020-10-21 2020-10-21 Video image encryption method based on cascading chaos technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011130858.1A CN112511899B (en) 2020-10-21 2020-10-21 Video image encryption method based on cascading chaos technology

Publications (2)

Publication Number Publication Date
CN112511899A true CN112511899A (en) 2021-03-16
CN112511899B CN112511899B (en) 2022-05-24

Family

ID=74954223

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011130858.1A Active CN112511899B (en) 2020-10-21 2020-10-21 Video image encryption method based on cascading chaos technology

Country Status (1)

Country Link
CN (1) CN112511899B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114142991A (en) * 2021-12-03 2022-03-04 山西大学 Linear regular domain voice encryption system based on cascade chaotic modulation
CN115883056A (en) * 2023-03-02 2023-03-31 山东科技大学 Anti-spoofing attack image encryption and decryption method based on chaotic system sampling synchronous communication

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080063185A1 (en) * 2006-01-31 2008-03-13 Tansu Alpcan Symmetric cryptosystem using cascaded chaotic maps
CN104050623A (en) * 2014-06-06 2014-09-17 西安理工大学 Asymmetric double-image encryption and decryption method based on chaos and cascade DFrRT
CN106296560A (en) * 2016-07-29 2017-01-04 广东工业大学 A kind of multicolor image encryption algorithm of complex cascade chaos
CN108133446A (en) * 2016-12-01 2018-06-08 钦州市晶通科技有限公司 A kind of composite chaotic Second-scrambling resume image
CN108696666A (en) * 2018-05-16 2018-10-23 河南大学 Color image encrypting method based on Latin square scramble
CN110889877A (en) * 2019-11-26 2020-03-17 齐齐哈尔大学 Image encryption method based on L-F cascade chaos and 3D bit scrambling
CN111263198A (en) * 2020-02-16 2020-06-09 袁芳 Pirate tracking method of video resources

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080063185A1 (en) * 2006-01-31 2008-03-13 Tansu Alpcan Symmetric cryptosystem using cascaded chaotic maps
CN104050623A (en) * 2014-06-06 2014-09-17 西安理工大学 Asymmetric double-image encryption and decryption method based on chaos and cascade DFrRT
CN106296560A (en) * 2016-07-29 2017-01-04 广东工业大学 A kind of multicolor image encryption algorithm of complex cascade chaos
CN108133446A (en) * 2016-12-01 2018-06-08 钦州市晶通科技有限公司 A kind of composite chaotic Second-scrambling resume image
CN108696666A (en) * 2018-05-16 2018-10-23 河南大学 Color image encrypting method based on Latin square scramble
CN110889877A (en) * 2019-11-26 2020-03-17 齐齐哈尔大学 Image encryption method based on L-F cascade chaos and 3D bit scrambling
CN111263198A (en) * 2020-02-16 2020-06-09 袁芳 Pirate tracking method of video resources

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
金元; 袁方; 李玉霞: "基于级联混沌映射的音频加密方法", 《中国科技论文》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114142991A (en) * 2021-12-03 2022-03-04 山西大学 Linear regular domain voice encryption system based on cascade chaotic modulation
CN115883056A (en) * 2023-03-02 2023-03-31 山东科技大学 Anti-spoofing attack image encryption and decryption method based on chaotic system sampling synchronous communication

Also Published As

Publication number Publication date
CN112511899B (en) 2022-05-24

Similar Documents

Publication Publication Date Title
Wen et al. Colour light field image encryption based on DNA sequences and chaotic systems
Chai et al. An efficient chaos-based image compression and encryption scheme using block compressive sensing and elementary cellular automata
CN112511899B (en) Video image encryption method based on cascading chaos technology
Yan et al. Reversible image secret sharing
CN112637441B (en) Color image compression encryption method based on compressed sensing
CN109660696B (en) New image encryption method
Singh et al. Level by level image compression-encryption algorithm based on quantum chaos map
CN104008520A (en) Color image encryption method based on SHA-384 function, spatiotemporal chaotic system, quantum chaotic system and neural network
CN112906043B (en) Image encryption method based on chaotic mapping and chaotic S-box substitution
CN110086600B (en) Image encryption method based on hyperchaotic system and variable step length Joseph problem
Kordov et al. Least significant bit steganography using Hitzl-Zele chaotic map
Wu et al. A dna computation-based image encryption scheme for cloud cctv systems
Song et al. Multi-image reorganization encryption based on SLF cascade chaos and bit scrambling
Gao et al. An image encryption algorithm based on the improved sine-tent map
Mehdi et al. Image encryption algorithm based on a novel six-dimensional hyper-chaotic system
CN112152775A (en) Image encryption method based on two-dimensional Henon-Chebyshev chaotic mapping and gene operation
CN113746997A (en) Image compression encryption method based on compressed sensing and fractional order chaos
CN113407955A (en) Image encryption method, medium, equipment and terminal based on four-dimensional hyper-chaotic system
Shakir et al. A new four-dimensional hyper-chaotic system for image encryption
Du et al. Multiple face images encryption based on a new non-adjacent dynamic coupled mapping lattice
CN115001654A (en) Chaos-based thread pool and GPU combined optimization batch image encryption method
Chang et al. A novel chaotic image encryption algorithm based on propositional logic coding
CN113965312B (en) Space encryption method based on three-dimensional CAP constellation
Song et al. A secure and efficient fingerprint images encryption scheme
CN113779611A (en) Vector geographic data encryption method and decryption method based on three-dimensional Arnold transformation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant