CN112511899B - Video image encryption method based on cascading chaos technology - Google Patents

Video image encryption method based on cascading chaos technology Download PDF

Info

Publication number
CN112511899B
CN112511899B CN202011130858.1A CN202011130858A CN112511899B CN 112511899 B CN112511899 B CN 112511899B CN 202011130858 A CN202011130858 A CN 202011130858A CN 112511899 B CN112511899 B CN 112511899B
Authority
CN
China
Prior art keywords
sequence
image
encryption
mapping
chaotic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011130858.1A
Other languages
Chinese (zh)
Other versions
CN112511899A (en
Inventor
袁方
金元
李玉霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong University of Science and Technology
Original Assignee
Shandong University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong University of Science and Technology filed Critical Shandong University of Science and Technology
Priority to CN202011130858.1A priority Critical patent/CN112511899B/en
Publication of CN112511899A publication Critical patent/CN112511899A/en
Application granted granted Critical
Publication of CN112511899B publication Critical patent/CN112511899B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4408Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4405Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The invention relates to a video image encryption method based on a cascading chaos technology. The method comprises an encryption process and a decryption process for constructing the key space, and comprises the following steps: firstly, constructing a cascade chaotic mapping, and generating a key space required by encryption and decryption by using the mapping; then, the existing video file in the computer disk is directly read, or a camera is called to collect a video image, an image sequence of each frame is obtained, the original image of each frame is compressed to obtain data information of the image, the image is encrypted and decrypted, a color image and R, G, B components before and after encryption and decryption are obtained, and finally the video data stream before and after encryption and decryption can be obtained. The method has better practicability for video image encryption, and improves the low sensitivity of the system to the initial value caused by the small Lyapunov exponent of the existing chaotic encryption method; the chaos mapping interval is small, which causes the problems of small key space, low sequence security and the like.

Description

Video image encryption method based on cascading chaos technology
Technical Field
The invention belongs to the technical field of file encryption, and relates to a video image encryption method based on a cascading chaotic technology, which is used for solving the problem of low security of the traditional chaotic encryption method.
Background
With the development of internet technology, digital images, videos and audios are applied more and more widely, information carried by the images, the audios and the videos covers the aspects of life, and the information is from national defense science and technology to clothes and eating houses, so that the corresponding requirements on information safety are more and more urgent. However, the traditional encryption algorithm has low security, low efficiency and easy cracking, and cannot meet the increasing requirements of information security. The new encryption algorithm should meet the requirements of high safety, strong anti-cracking capability and the like. In recent years, research on chaos has been applied in many fields, and is also used in the field of encryption. The main reason is that the chaotic signal has unpredictability and aperiodic characteristics, and the confusion and diffusion of encrypted data are increased. In order to decrypt the chaos-based encrypted data, it is necessary to know the chaotic system used in the encryption, all parameters and their order of use, and initial values of the chaotic system. If any error occurs, it will not be possible to decrypt the encrypted data. Due to the characteristics of good pseudo-randomness, sensitivity to initial conditions and the like, the research of chaos becomes more popular in the field of encryption.
Most encryption systems based on chaotic mapping use single chaotic mapping, and although the encryption systems are simple to operate and easy to implement, the defects are obvious: the Lyapunov index is small, so that the system has low sensitivity to an initial value; the chaotic mapping interval is small, so that the key space is small and the sequence security is reduced. Therefore, on the basis of the theory of the proposed cascade chaotic system (please refer to the literature: Wang Yuan, Chi and dynamics characteristics research [ J ]. Physics, 2013,62 (2); Yuan F, Deng Y, Li Y X, et al.A. mapping method for constructing a new cascade chaotic system with beta random channels [ J ]. Chaos,2019,29(5):053120.), the traditional Logistic mapping is combined with the improved one-dimensional square mapping to construct a new cascade mapping, the improvement of the dynamics performance of the cascade is researched through the dynamics analysis of the cascade chaotic system before and after the cascade, and a new video image encryption algorithm is designed according to the cascade chaotic mapping, so that the key space and the pseudo-random property are increased, the difficulty of decoding encrypted images is enhanced, and the security of image signals is improved.
Therefore, it is necessary to provide a technical solution to solve the technical problems of the prior art.
Disclosure of Invention
The invention aims to provide an image encryption method based on a cascading chaotic mapping technology aiming at the defects of the conventional chaotic encryption method, so as to solve the problem that the traditional chaotic encryption method has low Lyapunov exponent and causes the system to have low sensitivity to an initial value; the chaotic mapping interval is small, so that the problems of small key space, low sequence safety and the like are caused.
The general technical idea for realizing the purpose of the invention is as follows: the invention is divided into a process of constructing a key space, an encryption process and a decryption process. Firstly, a cascade chaotic mapping is constructed, and a key space required by encryption and decryption is generated by using the mapping. Then, the image file in the computer is input into matlab to obtain the data information of the image file, and the time domain graph and the frequency domain graph of the image file before and after encryption and decryption are obtained through encryption and decryption.
In order to solve the technical problems in the prior art, the technical scheme of the invention is as follows:
step S1, constructing a key space by utilizing the cascading chaotic mapping;
step S2, directly reading the existing video file in the computer disk, or calling a camera to collect the video image, obtaining the image sequence of each frame, compressing the original image to obtain the image with the size of M multiplied by M, and recording as the plaintext sequence Y M×M. The encryption of the video image needs to decompose the image according to the channels, obtain R, G, B components of three channels, which are respectively recorded as RYM×M、GYM×M、BYM×M
Step S3, the encryption flow is completed by operations such as scrambling and diffusing the video image component sequence acquired in the step S2;
and step S4, performing operations such as inverse diffusion scrambling recovery on the ciphertext component generated in step S3, and completing the decryption process.
The step S1 further includes the steps of:
step S11, the one-dimensional square mapping is:
Figure GDA0003537455560000021
in the formula: a and b are control parameters, a belongs to [5, + ∞],b∈[-1,1];x∈[-1,1]. The logistic chaotic map is: x is the number ofn+1=uxn(1-xn) In the formula: control parameter u ∈ [0,4 ]],x∈[0,1]. In order to enable Logistic mapping and one-dimensional square mapping to be cascaded, namely the value ranges of two chaotic mappings are the same, the one-dimensional square mapping is improved, and the improved one-dimensional square chaotic is as follows:
Figure GDA0003537455560000031
in the formula: a and b are control parameters, a belongs to [5, + ∞],b∈[-1,1];x∈[0,1]. Cascading the logistic chaotic mapping with the improved one-dimensional square mapping to generate a cascading chaos which is recorded as an L-S cascading mapping, wherein a chaos equation is as follows:
Figure GDA0003537455560000032
wherein a, b and u are control parameters, a is 10, b is 0.9, u is 4, and the initial value x is0Setting the number to be 0.66, and circularly iterating for 1 hundred million times to obtain 1 hundred million random numbers x (i);
step S12, obtaining 1 hundred million random numbers y (i) by circularly iterating 1 hundred million times, where the modified chebyshev polynomial y (i +1) ═ l (cos (key × arccos (y (i))) |, where the parameter key is 5 and the initial value y (0) is 0.25;
Step S13, comparing x (i) in step S11 with y (i) in step S12, when x (i) is not less than y (i), saving the value of x (i) in the array S, thereby generating the chaos sequence { S (i) } 1,2 … M1};
In step S14, the sequence is sorted in ascending order by using the sort function sort, and the key sequence { z (i) } 1,2 … M is obtained1And using the sequence { i (i) }, i ═ 1,2 … M1Recording the positions of all elements in the original chaotic sequence S (i), wherein the calculation formula is as follows: z (i) ═ S [ I (i)];
The step S3 further includes the steps of:
step S31 scrambles the images by changing the image sequence components according to the generation rule of the key sequence { z (i) } 1,2 … M } in step S1, where the scramble sequences are denoted by RY1 M×M、GY1 M×M、BY1 M×M. RY (i, j), RY1(i, j) are each RYM×M、RY1 M×MThe element values of i row and j column in the sequence, namely M (i-1) + j element in the respective sequence, satisfy: RY1(i, j) ═ RY (M, n), if k ═ M (i-1) + j, then M ═ floor [ i (k)/M]+1,n=mod[I(k)/M]Floor and mod are respectively rounding and remainder functions;
step S32, the key in step S14The sequence { z (i), i ═ 1,2 … 3M } is divided into key blocks C1,C2,C3(ii) a Wherein C isi(i is more than or equal to 1 and less than or equal to 3) is a matrix of M multiplied by M;
step S33, respectively recording the encryption blocks of the channels after diffusion multiplication as RY11、GY11、BY11
The calculation formula is as follows:
Figure GDA0003537455560000041
step S34 and step S33 complete the encryption of R, G, B three channels, and the final encrypted color image can be obtained by integrating the encrypted images of the three channels, and the calculation formula is: y ═ cat [3, RY 11,GY11,BY11]In the formula: cat is a combining function that combines the grayscale images into a color image. The same operation is carried out on each acquired frame image, namely the encryption of the video data stream is finished, and the encryption is finished;
the step S4 further includes the steps of:
step S41, decomposing each frame image after encryption in step S34 according to R, G, B three channels to obtain the encryption block of each channel, which is RY respectively11、GY11、BY11And then carrying out diffusion recovery on the obtained product, wherein the calculation formula is as follows:
Figure GDA0003537455560000042
step S42, sorting the sequence i (i) in step S14 in ascending order by using a sorting function, and sorting the sequence i (i) by using { ii (i) } 1,2 … M1Recording the initial positions of the elements in the original sequencing sequence I (i), recovering the image sequence of each channel after scrambling through II (i), if RY (i, j), RY1(i, j) are each RYM×M、RY1 M×MThe element values of i row and j column in the sequence, namely M (i-1) + j element in the respective sequence, satisfy: RY (i, j) ═ RY1(M, n) if k is M (i-1) + j, then M is floor [ ii (k)/M]+1,n=mod[II(k)/M]Where floor and mod are the rounding and remainder functions, respectively.
Step S43, converting R, G, B three-channel component RYM×M、GYM×M、BYM×MAnd combining to obtain a final image, decrypting each frame of encrypted image according to the same operation to obtain a final decrypted video data stream, and completing decryption.
Compared with the prior art, the invention has the following beneficial effects:
the invention adopts a cascading chaos technology to finish encryption and decryption of video files in a computer or video data streams directly collected from a camera. Compared with the existing encryption method based on the single chaos technology, the method generates the key required by encryption and decryption by cascading chaos, increases the key space and pseudo-randomness, enhances the difficulty of decryption and encryption, and improves the security of the video image.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below.
FIG. 1 is a flow diagram of the system of the present invention;
fig. 2 is a bifurcation diagram of the L-S cascaded chaotic system, where a is 10, b is 0.9, and variable x is unchanged with u;
in fig. 3, the L-S cascaded chaotic system takes a-10, b-0.9 Lyapunov exponential spectrum with variable x unchanged with u.
Detailed Description
The invention is further described below with reference to the accompanying drawings.
As shown in fig. 1, a camera is called to capture a video image or a video file is directly read from a computer disk, then an image sequence of each frame is obtained, an original image is encrypted through operations such as decomposition, scrambling and diffusion to obtain a final ciphertext video image, and the final ciphertext video image can be decrypted through reverse transformation.
As shown in fig. 2 and fig. 3, when a is 10 and b is 0.9, a bifurcation diagram and a Lyapunov exponential spectrum of the L-S cascade chaotic system;
the main dynamic characteristics of the system can be analyzed through a Lyapunov index and a bifurcation diagram, the positive Lyapunov index shows that a moving track is locally unstable, the separation speed on an adjacent track is high, but the whole system is stable, and a chaotic attractor can be formed by repeated movement. A negative Lyapunov exponent indicates that the phase volume contracts and the orbit is locally stable, insensitive to initial conditions, corresponding to a periodic orbital motion. When a is fixed to 10 and b is fixed to 0.9, a bifurcation diagram of the variable x with constant u (fig. 2) and an exponential spectrum of the Lyapunov index with u (fig. 3) are obtained.
According to the Lyapunov index spectrogram and the system bifurcation diagram, the system is in u epsilon (0,1.2) and has a period of 1; within u e (1.2,1.38), being period 2; as u increases, a doubling period occurs; the chaos phenomenon appears when u belongs to (1.44,2.79), and the period is 1 in u belongs to (2.79, 3.4); within u e (3.4,3.62), cycle 2; as u increases, a doubling period occurs; and when u belongs to (3.69,4), a chaos phenomenon occurs, and the Lyapunov exponent takes the maximum value when u is 4, and the chaotic system is in full mapping.
The above description of the embodiments is only intended to facilitate the understanding of the method of the invention and its core idea. It should be noted that, for those skilled in the art, it is possible to make various improvements and modifications to the present invention without departing from the principle of the present invention, and those improvements and modifications also fall within the scope of the claims of the present invention.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (1)

1. A video image encryption method based on a cascading chaos technology comprises the following steps: characterized in that the method comprises:
step S1, constructing a key space by utilizing the cascading chaotic mapping;
step S2, directly reading the existing video file in the computer disk, or calling a camera to collect the video image, obtaining the image sequence of each frame, compressing the original image to obtain the image with the size of M multiplied by M, and recording as the plaintext sequence YM×M(ii) a The encryption of the video image needs to decompose the image according to the channels, obtain R, G, B components of three channels, which are respectively recorded as RYM×M、GYM ×M、BYM×M
Step S3, the encryption flow is completed by operations such as scrambling and diffusing the video image component sequence acquired in the step S2;
Step S4, performing operations such as inverse diffusion scrambling recovery on the ciphertext component generated in step S3 to complete the decryption process;
the step S1 further includes the steps of:
step S11, the one-dimensional square mapping is:
Figure FDA0003537455550000011
in the formula: a and b are control parameters, a belongs to [5, + ∞],b∈[-1,1];x∈[-1,1](ii) a The logistic chaotic map is: x is the number ofn+1=uxn(1-xn) In the formula: control parameter u ∈ [0,4 ]],x∈[0,1](ii) a In order to enable Logistic mapping and one-dimensional square mapping to be cascaded, namely the value ranges of two chaotic mappings are the same, the one-dimensional square mapping is improved, and the improved one-dimensional square chaotic is as follows:
Figure FDA0003537455550000012
in the formula: a and b are control parameters, a belongs to [5, + ∞],b∈[-1,1];x∈[0,1](ii) a Cascading the logistic chaotic mapping with the improved one-dimensional square mapping to generate a cascading chaos which is recorded as an L-S cascading mapping, wherein a chaos equation is as follows:
Figure FDA0003537455550000021
wherein a, b and u are control parameters, a is 10, b is 0.9, u is 4, and the initial value x is0Set to 0.66, loop iteration 1 hundred millionObtaining 1 hundred million random numbers x (i);
step S12, obtaining 1 hundred million random numbers y (i) by circularly iterating 1 hundred million times, where the modified chebyshev polynomial y (i +1) ═ l (cos (key × arccos (y (i))) |, where the parameter key is 5 and the initial value y (0) is 0.25;
step S13, comparing x (i) in step S11 with y (i) in step S12, and when x (i) ≧ y (i), saving the value of x (i) in the array S, thereby generating the chaotic sequence { S (i) } 1,2 … M 1};
In step S14, the sequence is sorted in ascending order by the sorting function sort to obtain the key sequence { z (i) } 1,2 … M1And in the sequence { i (i) }, i ═ 1,2 … M1Recording the positions of all elements in the original chaotic sequence S (i), wherein the calculation formula is as follows: z (i) ═ S [ I (i)];
The step S3 further includes the steps of:
step S31 scrambles the images by changing the image sequence components according to the generation rule of the key sequence { z (i) } 1,2 … M } in step S1, where the scramble sequences are denoted by RY1 M×M、GY1 M×M、BY1 M×M(ii) a If RY (i, j), RY1(i, j) are each RYM ×M、RY1 M×MThe element values of i row and j column in the sequence, namely M (i-1) + j element in the respective sequence, satisfy: RY1(i, j) ═ RY (M, n), if k ═ M (i-1) + j, then M ═ floor [ i (k)/M]+1,n=mod[I(k)/M]Floor and mod are respectively rounding and remainder functions;
step S32, dividing the key sequence { z (i) ═ 1,2 … 3M } in step S14 into key blocks C1,C2,C3(ii) a Wherein C isi(i is more than or equal to 1 and less than or equal to 3) is a matrix of M multiplied by M;
step S33, respectively recording the encryption blocks of the channels after diffusion multiplication as RY11、GY11、BY11(ii) a The calculation formula is as follows:
Figure FDA0003537455550000031
step S34, stepS33, completing the encryption of R, G, B three channels, and integrating the encrypted images of the three channels to obtain a final encrypted color image, wherein the calculation formula is as follows: y ═ cat [3, RY 11,GY11,BY11]In the formula: cat is a combination function, and can combine the gray images into a color image; the same operation is carried out on each acquired frame image, namely the encryption of the video data stream is finished, and the encryption is finished;
the step S4 further includes the steps of:
step S41, decomposing each frame image after encryption in step S34 according to R, G, B three channels to obtain the encryption block of each channel, which is RY respectively11、GY11、BY11And then carrying out diffusion recovery on the obtained product, wherein the calculation formula is as follows:
Figure FDA0003537455550000032
step S42, sorting the sequence i (i) in step S14 in ascending order by using a sorting function, and sorting the sequence i (i) by using { ii (i) } 1,2 … M1Recording the initial positions of the elements in the original sequencing sequence I (i), recovering the image sequence of each channel after scrambling through II (i), if RY (i, j), RY1(i, j) are each RYM×M、RY1 M×MThe element values of i row and j column in the sequence, namely M (i-1) + j element in the respective sequence, satisfy: RY (i, j) ═ RY1(M, n) if k is M (i-1) + j, then M is floor [ ii (k)/M]+1,n=mod[II(k)/M]Floor and mod are respectively rounding and remainder functions;
step S43, converting R, G, B three-channel component RYM×M、GYM×M、BYM×MAnd combining to obtain a final image, decrypting each frame of encrypted image according to the same operation to obtain a final decrypted video data stream, and completing decryption.
CN202011130858.1A 2020-10-21 2020-10-21 Video image encryption method based on cascading chaos technology Active CN112511899B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011130858.1A CN112511899B (en) 2020-10-21 2020-10-21 Video image encryption method based on cascading chaos technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011130858.1A CN112511899B (en) 2020-10-21 2020-10-21 Video image encryption method based on cascading chaos technology

Publications (2)

Publication Number Publication Date
CN112511899A CN112511899A (en) 2021-03-16
CN112511899B true CN112511899B (en) 2022-05-24

Family

ID=74954223

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011130858.1A Active CN112511899B (en) 2020-10-21 2020-10-21 Video image encryption method based on cascading chaos technology

Country Status (1)

Country Link
CN (1) CN112511899B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114142991A (en) * 2021-12-03 2022-03-04 山西大学 Linear regular domain voice encryption system based on cascade chaotic modulation
CN115883056B (en) * 2023-03-02 2023-05-12 山东科技大学 Anti-spoofing attack image encryption and decryption method based on chaotic system sampling synchronous communication

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104050623A (en) * 2014-06-06 2014-09-17 西安理工大学 Asymmetric double-image encryption and decryption method based on chaos and cascade DFrRT
CN106296560A (en) * 2016-07-29 2017-01-04 广东工业大学 A kind of multicolor image encryption algorithm of complex cascade chaos
CN108133446A (en) * 2016-12-01 2018-06-08 钦州市晶通科技有限公司 A kind of composite chaotic Second-scrambling resume image
CN108696666A (en) * 2018-05-16 2018-10-23 河南大学 Color image encrypting method based on Latin square scramble
CN110889877A (en) * 2019-11-26 2020-03-17 齐齐哈尔大学 Image encryption method based on L-F cascade chaos and 3D bit scrambling
CN111263198A (en) * 2020-02-16 2020-06-09 袁芳 Pirate tracking method of video resources

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7912212B2 (en) * 2006-01-31 2011-03-22 The Board Of Trustees Of The University Of Illinois Symmetric cryptosystem using cascaded chaotic maps

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104050623A (en) * 2014-06-06 2014-09-17 西安理工大学 Asymmetric double-image encryption and decryption method based on chaos and cascade DFrRT
CN106296560A (en) * 2016-07-29 2017-01-04 广东工业大学 A kind of multicolor image encryption algorithm of complex cascade chaos
CN108133446A (en) * 2016-12-01 2018-06-08 钦州市晶通科技有限公司 A kind of composite chaotic Second-scrambling resume image
CN108696666A (en) * 2018-05-16 2018-10-23 河南大学 Color image encrypting method based on Latin square scramble
CN110889877A (en) * 2019-11-26 2020-03-17 齐齐哈尔大学 Image encryption method based on L-F cascade chaos and 3D bit scrambling
CN111263198A (en) * 2020-02-16 2020-06-09 袁芳 Pirate tracking method of video resources

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于级联混沌映射的音频加密方法;金元; 袁方; 李玉霞;《中国科技论文》;20200929;第15卷(第11期);1247-1276 *

Also Published As

Publication number Publication date
CN112511899A (en) 2021-03-16

Similar Documents

Publication Publication Date Title
Chai et al. An efficient approach for encrypting double color images into a visually meaningful cipher image using 2D compressive sensing
Chai et al. An efficient chaos-based image compression and encryption scheme using block compressive sensing and elementary cellular automata
Wen et al. Colour light field image encryption based on DNA sequences and chaotic systems
CN112511899B (en) Video image encryption method based on cascading chaos technology
Yan et al. Reversible image secret sharing
Yan et al. Chaotic image encryption algorithm based on arithmetic sequence scrambling model and DNA encoding operation
CN109660696B (en) New image encryption method
Singh et al. Level by level image compression-encryption algorithm based on quantum chaos map
Wong Image encryption using chaotic maps
CN112906043B (en) Image encryption method based on chaotic mapping and chaotic S-box substitution
Wu et al. A dna computation-based image encryption scheme for cloud cctv systems
Song et al. Multi-image reorganization encryption based on SLF cascade chaos and bit scrambling
Chai et al. Exploiting preprocessing-permutation–diffusion strategy for secure image cipher based on 3D Latin cube and memristive hyperchaotic system
Gao et al. An image encryption algorithm based on the improved sine-tent map
CN112152775A (en) Image encryption method based on two-dimensional Henon-Chebyshev chaotic mapping and gene operation
Mehdi et al. Image encryption algorithm based on a novel six-dimensional hyper-chaotic system
CN113407955A (en) Image encryption method, medium, equipment and terminal based on four-dimensional hyper-chaotic system
Shakir et al. A new four-dimensional hyper-chaotic system for image encryption
Du et al. Multiple face images encryption based on a new non-adjacent dynamic coupled mapping lattice
Lin et al. A 2D chaos-based visual encryption scheme for clinical EEG signals
CN115001654A (en) Chaos-based thread pool and GPU combined optimization batch image encryption method
Roohbakhsh et al. Color image encryption using hyper chaos Chen
Balaji et al. VLSI Implementation of Optimized 2D SIMM Chaotic Map for Image Encryption.
Chang et al. A novel chaotic image encryption algorithm based on propositional logic coding
CN113965312B (en) Space encryption method based on three-dimensional CAP constellation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant