CN112511899B - Video image encryption method based on cascading chaos technology - Google Patents
Video image encryption method based on cascading chaos technology Download PDFInfo
- Publication number
- CN112511899B CN112511899B CN202011130858.1A CN202011130858A CN112511899B CN 112511899 B CN112511899 B CN 112511899B CN 202011130858 A CN202011130858 A CN 202011130858A CN 112511899 B CN112511899 B CN 112511899B
- Authority
- CN
- China
- Prior art keywords
- sequence
- image
- encryption
- mapping
- chaotic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 24
- 238000005516 engineering process Methods 0.000 title claims abstract description 10
- 230000000739 chaotic effect Effects 0.000 claims abstract description 37
- 238000013507 mapping Methods 0.000 claims abstract description 34
- 230000008569 process Effects 0.000 claims abstract description 7
- 238000004364 calculation method Methods 0.000 claims description 8
- 238000009792 diffusion process Methods 0.000 claims description 8
- 241000282326 Felis catus Species 0.000 claims description 4
- 230000001174 ascending effect Effects 0.000 claims description 4
- 238000011084 recovery Methods 0.000 claims description 4
- 239000011159 matrix material Substances 0.000 claims description 2
- 238000012163 sequencing technique Methods 0.000 claims description 2
- 230000035945 sensitivity Effects 0.000 abstract description 4
- 238000010586 diagram Methods 0.000 description 6
- 230000006872 improvement Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000011160 research Methods 0.000 description 3
- 238000001228 spectrum Methods 0.000 description 3
- 238000005336 cracking Methods 0.000 description 2
- 230000007547 defect Effects 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000000354 decomposition reaction Methods 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
- H04N21/4408—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/001—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
- H04N21/4405—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Multimedia (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
The invention relates to a video image encryption method based on a cascading chaos technology. The method comprises an encryption process and a decryption process for constructing the key space, and comprises the following steps: firstly, constructing a cascade chaotic mapping, and generating a key space required by encryption and decryption by using the mapping; then, the existing video file in the computer disk is directly read, or a camera is called to collect a video image, an image sequence of each frame is obtained, the original image of each frame is compressed to obtain data information of the image, the image is encrypted and decrypted, a color image and R, G, B components before and after encryption and decryption are obtained, and finally the video data stream before and after encryption and decryption can be obtained. The method has better practicability for video image encryption, and improves the low sensitivity of the system to the initial value caused by the small Lyapunov exponent of the existing chaotic encryption method; the chaos mapping interval is small, which causes the problems of small key space, low sequence security and the like.
Description
Technical Field
The invention belongs to the technical field of file encryption, and relates to a video image encryption method based on a cascading chaotic technology, which is used for solving the problem of low security of the traditional chaotic encryption method.
Background
With the development of internet technology, digital images, videos and audios are applied more and more widely, information carried by the images, the audios and the videos covers the aspects of life, and the information is from national defense science and technology to clothes and eating houses, so that the corresponding requirements on information safety are more and more urgent. However, the traditional encryption algorithm has low security, low efficiency and easy cracking, and cannot meet the increasing requirements of information security. The new encryption algorithm should meet the requirements of high safety, strong anti-cracking capability and the like. In recent years, research on chaos has been applied in many fields, and is also used in the field of encryption. The main reason is that the chaotic signal has unpredictability and aperiodic characteristics, and the confusion and diffusion of encrypted data are increased. In order to decrypt the chaos-based encrypted data, it is necessary to know the chaotic system used in the encryption, all parameters and their order of use, and initial values of the chaotic system. If any error occurs, it will not be possible to decrypt the encrypted data. Due to the characteristics of good pseudo-randomness, sensitivity to initial conditions and the like, the research of chaos becomes more popular in the field of encryption.
Most encryption systems based on chaotic mapping use single chaotic mapping, and although the encryption systems are simple to operate and easy to implement, the defects are obvious: the Lyapunov index is small, so that the system has low sensitivity to an initial value; the chaotic mapping interval is small, so that the key space is small and the sequence security is reduced. Therefore, on the basis of the theory of the proposed cascade chaotic system (please refer to the literature: Wang Yuan, Chi and dynamics characteristics research [ J ]. Physics, 2013,62 (2); Yuan F, Deng Y, Li Y X, et al.A. mapping method for constructing a new cascade chaotic system with beta random channels [ J ]. Chaos,2019,29(5):053120.), the traditional Logistic mapping is combined with the improved one-dimensional square mapping to construct a new cascade mapping, the improvement of the dynamics performance of the cascade is researched through the dynamics analysis of the cascade chaotic system before and after the cascade, and a new video image encryption algorithm is designed according to the cascade chaotic mapping, so that the key space and the pseudo-random property are increased, the difficulty of decoding encrypted images is enhanced, and the security of image signals is improved.
Therefore, it is necessary to provide a technical solution to solve the technical problems of the prior art.
Disclosure of Invention
The invention aims to provide an image encryption method based on a cascading chaotic mapping technology aiming at the defects of the conventional chaotic encryption method, so as to solve the problem that the traditional chaotic encryption method has low Lyapunov exponent and causes the system to have low sensitivity to an initial value; the chaotic mapping interval is small, so that the problems of small key space, low sequence safety and the like are caused.
The general technical idea for realizing the purpose of the invention is as follows: the invention is divided into a process of constructing a key space, an encryption process and a decryption process. Firstly, a cascade chaotic mapping is constructed, and a key space required by encryption and decryption is generated by using the mapping. Then, the image file in the computer is input into matlab to obtain the data information of the image file, and the time domain graph and the frequency domain graph of the image file before and after encryption and decryption are obtained through encryption and decryption.
In order to solve the technical problems in the prior art, the technical scheme of the invention is as follows:
step S1, constructing a key space by utilizing the cascading chaotic mapping;
step S2, directly reading the existing video file in the computer disk, or calling a camera to collect the video image, obtaining the image sequence of each frame, compressing the original image to obtain the image with the size of M multiplied by M, and recording as the plaintext sequence Y M×M. The encryption of the video image needs to decompose the image according to the channels, obtain R, G, B components of three channels, which are respectively recorded as RYM×M、GYM×M、BYM×M;
Step S3, the encryption flow is completed by operations such as scrambling and diffusing the video image component sequence acquired in the step S2;
and step S4, performing operations such as inverse diffusion scrambling recovery on the ciphertext component generated in step S3, and completing the decryption process.
The step S1 further includes the steps of:
step S11, the one-dimensional square mapping is:in the formula: a and b are control parameters, a belongs to [5, + ∞],b∈[-1,1];x∈[-1,1]. The logistic chaotic map is: x is the number ofn+1=uxn(1-xn) In the formula: control parameter u ∈ [0,4 ]],x∈[0,1]. In order to enable Logistic mapping and one-dimensional square mapping to be cascaded, namely the value ranges of two chaotic mappings are the same, the one-dimensional square mapping is improved, and the improved one-dimensional square chaotic is as follows:in the formula: a and b are control parameters, a belongs to [5, + ∞],b∈[-1,1];x∈[0,1]. Cascading the logistic chaotic mapping with the improved one-dimensional square mapping to generate a cascading chaos which is recorded as an L-S cascading mapping, wherein a chaos equation is as follows:wherein a, b and u are control parameters, a is 10, b is 0.9, u is 4, and the initial value x is0Setting the number to be 0.66, and circularly iterating for 1 hundred million times to obtain 1 hundred million random numbers x (i);
step S12, obtaining 1 hundred million random numbers y (i) by circularly iterating 1 hundred million times, where the modified chebyshev polynomial y (i +1) ═ l (cos (key × arccos (y (i))) |, where the parameter key is 5 and the initial value y (0) is 0.25;
Step S13, comparing x (i) in step S11 with y (i) in step S12, when x (i) is not less than y (i), saving the value of x (i) in the array S, thereby generating the chaos sequence { S (i) } 1,2 … M1};
In step S14, the sequence is sorted in ascending order by using the sort function sort, and the key sequence { z (i) } 1,2 … M is obtained1And using the sequence { i (i) }, i ═ 1,2 … M1Recording the positions of all elements in the original chaotic sequence S (i), wherein the calculation formula is as follows: z (i) ═ S [ I (i)];
The step S3 further includes the steps of:
step S31 scrambles the images by changing the image sequence components according to the generation rule of the key sequence { z (i) } 1,2 … M } in step S1, where the scramble sequences are denoted by RY1 M×M、GY1 M×M、BY1 M×M. RY (i, j), RY1(i, j) are each RYM×M、RY1 M×MThe element values of i row and j column in the sequence, namely M (i-1) + j element in the respective sequence, satisfy: RY1(i, j) ═ RY (M, n), if k ═ M (i-1) + j, then M ═ floor [ i (k)/M]+1,n=mod[I(k)/M]Floor and mod are respectively rounding and remainder functions;
step S32, the key in step S14The sequence { z (i), i ═ 1,2 … 3M } is divided into key blocks C1,C2,C3(ii) a Wherein C isi(i is more than or equal to 1 and less than or equal to 3) is a matrix of M multiplied by M;
step S33, respectively recording the encryption blocks of the channels after diffusion multiplication as RY11、GY11、BY11。
The calculation formula is as follows:
step S34 and step S33 complete the encryption of R, G, B three channels, and the final encrypted color image can be obtained by integrating the encrypted images of the three channels, and the calculation formula is: y ═ cat [3, RY 11,GY11,BY11]In the formula: cat is a combining function that combines the grayscale images into a color image. The same operation is carried out on each acquired frame image, namely the encryption of the video data stream is finished, and the encryption is finished;
the step S4 further includes the steps of:
step S41, decomposing each frame image after encryption in step S34 according to R, G, B three channels to obtain the encryption block of each channel, which is RY respectively11、GY11、BY11And then carrying out diffusion recovery on the obtained product, wherein the calculation formula is as follows:
step S42, sorting the sequence i (i) in step S14 in ascending order by using a sorting function, and sorting the sequence i (i) by using { ii (i) } 1,2 … M1Recording the initial positions of the elements in the original sequencing sequence I (i), recovering the image sequence of each channel after scrambling through II (i), if RY (i, j), RY1(i, j) are each RYM×M、RY1 M×MThe element values of i row and j column in the sequence, namely M (i-1) + j element in the respective sequence, satisfy: RY (i, j) ═ RY1(M, n) if k is M (i-1) + j, then M is floor [ ii (k)/M]+1,n=mod[II(k)/M]Where floor and mod are the rounding and remainder functions, respectively.
Step S43, converting R, G, B three-channel component RYM×M、GYM×M、BYM×MAnd combining to obtain a final image, decrypting each frame of encrypted image according to the same operation to obtain a final decrypted video data stream, and completing decryption.
Compared with the prior art, the invention has the following beneficial effects:
the invention adopts a cascading chaos technology to finish encryption and decryption of video files in a computer or video data streams directly collected from a camera. Compared with the existing encryption method based on the single chaos technology, the method generates the key required by encryption and decryption by cascading chaos, increases the key space and pseudo-randomness, enhances the difficulty of decryption and encryption, and improves the security of the video image.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below.
FIG. 1 is a flow diagram of the system of the present invention;
fig. 2 is a bifurcation diagram of the L-S cascaded chaotic system, where a is 10, b is 0.9, and variable x is unchanged with u;
in fig. 3, the L-S cascaded chaotic system takes a-10, b-0.9 Lyapunov exponential spectrum with variable x unchanged with u.
Detailed Description
The invention is further described below with reference to the accompanying drawings.
As shown in fig. 1, a camera is called to capture a video image or a video file is directly read from a computer disk, then an image sequence of each frame is obtained, an original image is encrypted through operations such as decomposition, scrambling and diffusion to obtain a final ciphertext video image, and the final ciphertext video image can be decrypted through reverse transformation.
As shown in fig. 2 and fig. 3, when a is 10 and b is 0.9, a bifurcation diagram and a Lyapunov exponential spectrum of the L-S cascade chaotic system;
the main dynamic characteristics of the system can be analyzed through a Lyapunov index and a bifurcation diagram, the positive Lyapunov index shows that a moving track is locally unstable, the separation speed on an adjacent track is high, but the whole system is stable, and a chaotic attractor can be formed by repeated movement. A negative Lyapunov exponent indicates that the phase volume contracts and the orbit is locally stable, insensitive to initial conditions, corresponding to a periodic orbital motion. When a is fixed to 10 and b is fixed to 0.9, a bifurcation diagram of the variable x with constant u (fig. 2) and an exponential spectrum of the Lyapunov index with u (fig. 3) are obtained.
According to the Lyapunov index spectrogram and the system bifurcation diagram, the system is in u epsilon (0,1.2) and has a period of 1; within u e (1.2,1.38), being period 2; as u increases, a doubling period occurs; the chaos phenomenon appears when u belongs to (1.44,2.79), and the period is 1 in u belongs to (2.79, 3.4); within u e (3.4,3.62), cycle 2; as u increases, a doubling period occurs; and when u belongs to (3.69,4), a chaos phenomenon occurs, and the Lyapunov exponent takes the maximum value when u is 4, and the chaotic system is in full mapping.
The above description of the embodiments is only intended to facilitate the understanding of the method of the invention and its core idea. It should be noted that, for those skilled in the art, it is possible to make various improvements and modifications to the present invention without departing from the principle of the present invention, and those improvements and modifications also fall within the scope of the claims of the present invention.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
Claims (1)
1. A video image encryption method based on a cascading chaos technology comprises the following steps: characterized in that the method comprises:
step S1, constructing a key space by utilizing the cascading chaotic mapping;
step S2, directly reading the existing video file in the computer disk, or calling a camera to collect the video image, obtaining the image sequence of each frame, compressing the original image to obtain the image with the size of M multiplied by M, and recording as the plaintext sequence YM×M(ii) a The encryption of the video image needs to decompose the image according to the channels, obtain R, G, B components of three channels, which are respectively recorded as RYM×M、GYM ×M、BYM×M;
Step S3, the encryption flow is completed by operations such as scrambling and diffusing the video image component sequence acquired in the step S2;
Step S4, performing operations such as inverse diffusion scrambling recovery on the ciphertext component generated in step S3 to complete the decryption process;
the step S1 further includes the steps of:
step S11, the one-dimensional square mapping is:in the formula: a and b are control parameters, a belongs to [5, + ∞],b∈[-1,1];x∈[-1,1](ii) a The logistic chaotic map is: x is the number ofn+1=uxn(1-xn) In the formula: control parameter u ∈ [0,4 ]],x∈[0,1](ii) a In order to enable Logistic mapping and one-dimensional square mapping to be cascaded, namely the value ranges of two chaotic mappings are the same, the one-dimensional square mapping is improved, and the improved one-dimensional square chaotic is as follows:in the formula: a and b are control parameters, a belongs to [5, + ∞],b∈[-1,1];x∈[0,1](ii) a Cascading the logistic chaotic mapping with the improved one-dimensional square mapping to generate a cascading chaos which is recorded as an L-S cascading mapping, wherein a chaos equation is as follows:wherein a, b and u are control parameters, a is 10, b is 0.9, u is 4, and the initial value x is0Set to 0.66, loop iteration 1 hundred millionObtaining 1 hundred million random numbers x (i);
step S12, obtaining 1 hundred million random numbers y (i) by circularly iterating 1 hundred million times, where the modified chebyshev polynomial y (i +1) ═ l (cos (key × arccos (y (i))) |, where the parameter key is 5 and the initial value y (0) is 0.25;
step S13, comparing x (i) in step S11 with y (i) in step S12, and when x (i) ≧ y (i), saving the value of x (i) in the array S, thereby generating the chaotic sequence { S (i) } 1,2 … M 1};
In step S14, the sequence is sorted in ascending order by the sorting function sort to obtain the key sequence { z (i) } 1,2 … M1And in the sequence { i (i) }, i ═ 1,2 … M1Recording the positions of all elements in the original chaotic sequence S (i), wherein the calculation formula is as follows: z (i) ═ S [ I (i)];
The step S3 further includes the steps of:
step S31 scrambles the images by changing the image sequence components according to the generation rule of the key sequence { z (i) } 1,2 … M } in step S1, where the scramble sequences are denoted by RY1 M×M、GY1 M×M、BY1 M×M(ii) a If RY (i, j), RY1(i, j) are each RYM ×M、RY1 M×MThe element values of i row and j column in the sequence, namely M (i-1) + j element in the respective sequence, satisfy: RY1(i, j) ═ RY (M, n), if k ═ M (i-1) + j, then M ═ floor [ i (k)/M]+1,n=mod[I(k)/M]Floor and mod are respectively rounding and remainder functions;
step S32, dividing the key sequence { z (i) ═ 1,2 … 3M } in step S14 into key blocks C1,C2,C3(ii) a Wherein C isi(i is more than or equal to 1 and less than or equal to 3) is a matrix of M multiplied by M;
step S33, respectively recording the encryption blocks of the channels after diffusion multiplication as RY11、GY11、BY11(ii) a The calculation formula is as follows:
step S34, stepS33, completing the encryption of R, G, B three channels, and integrating the encrypted images of the three channels to obtain a final encrypted color image, wherein the calculation formula is as follows: y ═ cat [3, RY 11,GY11,BY11]In the formula: cat is a combination function, and can combine the gray images into a color image; the same operation is carried out on each acquired frame image, namely the encryption of the video data stream is finished, and the encryption is finished;
the step S4 further includes the steps of:
step S41, decomposing each frame image after encryption in step S34 according to R, G, B three channels to obtain the encryption block of each channel, which is RY respectively11、GY11、BY11And then carrying out diffusion recovery on the obtained product, wherein the calculation formula is as follows:
step S42, sorting the sequence i (i) in step S14 in ascending order by using a sorting function, and sorting the sequence i (i) by using { ii (i) } 1,2 … M1Recording the initial positions of the elements in the original sequencing sequence I (i), recovering the image sequence of each channel after scrambling through II (i), if RY (i, j), RY1(i, j) are each RYM×M、RY1 M×MThe element values of i row and j column in the sequence, namely M (i-1) + j element in the respective sequence, satisfy: RY (i, j) ═ RY1(M, n) if k is M (i-1) + j, then M is floor [ ii (k)/M]+1,n=mod[II(k)/M]Floor and mod are respectively rounding and remainder functions;
step S43, converting R, G, B three-channel component RYM×M、GYM×M、BYM×MAnd combining to obtain a final image, decrypting each frame of encrypted image according to the same operation to obtain a final decrypted video data stream, and completing decryption.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011130858.1A CN112511899B (en) | 2020-10-21 | 2020-10-21 | Video image encryption method based on cascading chaos technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011130858.1A CN112511899B (en) | 2020-10-21 | 2020-10-21 | Video image encryption method based on cascading chaos technology |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112511899A CN112511899A (en) | 2021-03-16 |
CN112511899B true CN112511899B (en) | 2022-05-24 |
Family
ID=74954223
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011130858.1A Active CN112511899B (en) | 2020-10-21 | 2020-10-21 | Video image encryption method based on cascading chaos technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112511899B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114142991A (en) * | 2021-12-03 | 2022-03-04 | 山西大学 | Linear regular domain voice encryption system based on cascade chaotic modulation |
CN115883056B (en) * | 2023-03-02 | 2023-05-12 | 山东科技大学 | Anti-spoofing attack image encryption and decryption method based on chaotic system sampling synchronous communication |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104050623A (en) * | 2014-06-06 | 2014-09-17 | 西安理工大学 | Asymmetric double-image encryption and decryption method based on chaos and cascade DFrRT |
CN106296560A (en) * | 2016-07-29 | 2017-01-04 | 广东工业大学 | A kind of multicolor image encryption algorithm of complex cascade chaos |
CN108133446A (en) * | 2016-12-01 | 2018-06-08 | 钦州市晶通科技有限公司 | A kind of composite chaotic Second-scrambling resume image |
CN108696666A (en) * | 2018-05-16 | 2018-10-23 | 河南大学 | Color image encrypting method based on Latin square scramble |
CN110889877A (en) * | 2019-11-26 | 2020-03-17 | 齐齐哈尔大学 | Image encryption method based on L-F cascade chaos and 3D bit scrambling |
CN111263198A (en) * | 2020-02-16 | 2020-06-09 | 袁芳 | Pirate tracking method of video resources |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7912212B2 (en) * | 2006-01-31 | 2011-03-22 | The Board Of Trustees Of The University Of Illinois | Symmetric cryptosystem using cascaded chaotic maps |
-
2020
- 2020-10-21 CN CN202011130858.1A patent/CN112511899B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104050623A (en) * | 2014-06-06 | 2014-09-17 | 西安理工大学 | Asymmetric double-image encryption and decryption method based on chaos and cascade DFrRT |
CN106296560A (en) * | 2016-07-29 | 2017-01-04 | 广东工业大学 | A kind of multicolor image encryption algorithm of complex cascade chaos |
CN108133446A (en) * | 2016-12-01 | 2018-06-08 | 钦州市晶通科技有限公司 | A kind of composite chaotic Second-scrambling resume image |
CN108696666A (en) * | 2018-05-16 | 2018-10-23 | 河南大学 | Color image encrypting method based on Latin square scramble |
CN110889877A (en) * | 2019-11-26 | 2020-03-17 | 齐齐哈尔大学 | Image encryption method based on L-F cascade chaos and 3D bit scrambling |
CN111263198A (en) * | 2020-02-16 | 2020-06-09 | 袁芳 | Pirate tracking method of video resources |
Non-Patent Citations (1)
Title |
---|
基于级联混沌映射的音频加密方法;金元; 袁方; 李玉霞;《中国科技论文》;20200929;第15卷(第11期);1247-1276 * |
Also Published As
Publication number | Publication date |
---|---|
CN112511899A (en) | 2021-03-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chai et al. | An efficient approach for encrypting double color images into a visually meaningful cipher image using 2D compressive sensing | |
Chai et al. | An efficient chaos-based image compression and encryption scheme using block compressive sensing and elementary cellular automata | |
Wen et al. | Colour light field image encryption based on DNA sequences and chaotic systems | |
CN112511899B (en) | Video image encryption method based on cascading chaos technology | |
Yan et al. | Reversible image secret sharing | |
Yan et al. | Chaotic image encryption algorithm based on arithmetic sequence scrambling model and DNA encoding operation | |
CN109660696B (en) | New image encryption method | |
Singh et al. | Level by level image compression-encryption algorithm based on quantum chaos map | |
Wong | Image encryption using chaotic maps | |
CN112906043B (en) | Image encryption method based on chaotic mapping and chaotic S-box substitution | |
Wu et al. | A dna computation-based image encryption scheme for cloud cctv systems | |
Song et al. | Multi-image reorganization encryption based on SLF cascade chaos and bit scrambling | |
Chai et al. | Exploiting preprocessing-permutation–diffusion strategy for secure image cipher based on 3D Latin cube and memristive hyperchaotic system | |
Gao et al. | An image encryption algorithm based on the improved sine-tent map | |
CN112152775A (en) | Image encryption method based on two-dimensional Henon-Chebyshev chaotic mapping and gene operation | |
Mehdi et al. | Image encryption algorithm based on a novel six-dimensional hyper-chaotic system | |
CN113407955A (en) | Image encryption method, medium, equipment and terminal based on four-dimensional hyper-chaotic system | |
Shakir et al. | A new four-dimensional hyper-chaotic system for image encryption | |
Du et al. | Multiple face images encryption based on a new non-adjacent dynamic coupled mapping lattice | |
Lin et al. | A 2D chaos-based visual encryption scheme for clinical EEG signals | |
CN115001654A (en) | Chaos-based thread pool and GPU combined optimization batch image encryption method | |
Roohbakhsh et al. | Color image encryption using hyper chaos Chen | |
Balaji et al. | VLSI Implementation of Optimized 2D SIMM Chaotic Map for Image Encryption. | |
Chang et al. | A novel chaotic image encryption algorithm based on propositional logic coding | |
CN113965312B (en) | Space encryption method based on three-dimensional CAP constellation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |