CN113612899A - Image encryption method based on RNA and pixel depth - Google Patents

Image encryption method based on RNA and pixel depth Download PDF

Info

Publication number
CN113612899A
CN113612899A CN202110843783.XA CN202110843783A CN113612899A CN 113612899 A CN113612899 A CN 113612899A CN 202110843783 A CN202110843783 A CN 202110843783A CN 113612899 A CN113612899 A CN 113612899A
Authority
CN
China
Prior art keywords
rna
image
dimensional
pair
chaotic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202110843783.XA
Other languages
Chinese (zh)
Inventor
张晓强
闫轩岗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China University of Mining and Technology CUMT
Original Assignee
China University of Mining and Technology CUMT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China University of Mining and Technology CUMT filed Critical China University of Mining and Technology CUMT
Priority to CN202110843783.XA priority Critical patent/CN113612899A/en
Publication of CN113612899A publication Critical patent/CN113612899A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Abstract

An image encryption method based on RNA and pixel depth belongs to the field of information encryption. The current network transmission safety problem is increasingly severe, and in order to protect network interactive image content, the invention provides an image encryption method based on RNA and pixel depth. Firstly, layering a plaintext image and then carrying out RNA (ribonucleic acid) coding; secondly, scrambling the layered RNA image by using the chaotic sequence, and performing three-dimensional adaptive Arnold transformation and RNA decoding on the scrambling result to obtain a scrambled image; thirdly, RNA encoding is carried out on the scrambled image; secondly, diffusing the selected RNA chaotic matrix and the scrambled RNA image by using an RNA operator; and finally, carrying out RNA decoding on the diffusion result to obtain a final ciphertext image. The experimental results show that: the method has the advantages of wide application range, good encryption effect and high safety, and can ensure safe and reliable transmission of the image under a network platform.

Description

Image encryption method based on RNA and pixel depth
Technical Field
The method relates to an information encryption technology, in particular to an image encryption method.
Background
With the development of network technology, the communication mode is changed greatly, a large number of digital images are transmitted through a network, but the openness of a network system and a network protocol have defects, so that image information leakage events occur frequently; based on this, researchers have proposed various image encryption methods, and these methods have the problems of weak encryption security or low efficiency; in combination with technologies such as an RNA theory, two-dimensional Improved Logistic-Adjusted-Sine Map (ILASM) chaos, pixel depth, four-dimensional Chen hyperchaos and the like, the image encryption method based on the RNA and the pixel depth is designed for improving the safety and the efficiency of the image encryption method and ensuring the safe and efficient transmission of image contents; the method utilizes the good randomness and complexity of the chaotic system, and can effectively protect the network transmission and storage safety of the interactive image.
Disclosure of Invention
The purpose of the invention is as follows: the image encryption method based on the RNA and the pixel depth is provided aiming at the problems that most of current image encryption algorithms are not universal, cannot be applied to images with different pixel depths, cannot achieve one-image one-key and one-time one-key, and is low in safety performance.
The technical scheme of the invention is as follows: in order to realize the purpose, the technical scheme adopted is an image encryption method based on RNA and pixel depth.
The encryption steps are as follows:
step 1: and (3) key generation: let the plaintext image beI m n×Pixel depth ofdRandom selection ofx ' 0, y ' 0, z ' 0, u ' 0, v ' 0, w ' 0,μ ', e', t 'As the user key input, the initial values of the two-dimensional ILASM and the four-dimensional Chen hyperchaotic are calculated by using the key generatorx 0, y 0, z 0, u 0, v 0, w 0And control parametersμ, eAnd the number of iterations of the three-dimensional adaptive Arnold transformtAnd control parametersq 1, q 2
Step 2: chaotic sequence and matrix generation: according to the initial valuex 0, y 0And control parametersμGenerating 2 two-dimensional ILASM chaotic sequencesX m n d/××2AndY m n d/××2(ii) a According to the initial valuez 0, u 0, v 0, w 0And control parameterseGenerating 4 four-dimensional Chen hyperchaotic matrixesZ m n×, U m n×, V m n×AndW m n×
and step 3: generation of coding rules: the 8 kinds of coding and decoding of RNA are shown in figure 1 according to the initial value of chaosx 0, y 0, z 0, u 0, v 0, w 0And pixel depthdPerform certain operation generationr 1, r 2, r 3, r 4, r 5, r 6Six encoding and decoding rules;
and 4, step 4: three-dimensional RNA cube generation: using RNA coding rulesr 1To pairI m n×Coding RNA to obtainI 3DThickness pair according to one RNA codeI 3DLayering to obtain RNA layered imageI j Rj=1, 2, …, d2); using chaotic sequencesXTo pairI j Rj=1, 2, …, d/2) interlayer scrambling is performedd2 pieces of size ofm×nOf (2) planeI j 1 j=1, 2, …, d2); each plane isI j 1Converted into corresponding one-dimensional vectorsV j 1And connected end to obtain a large one-dimensional vectorV 1Using chaotic sequencesYTo pairV 1Carry out integral scrambling to obtainV 2(ii) a Will be provided withV 2Is converted intol×l×lThree-dimensional RNA cube ofI 3DC
And 5: self-adaptive stereo scrambling: to pairI 3DCScrambled RNA cuboids by three-dimensional adaptive Arnold transformationI 3DAWill be three-dimensionalI 3DAConversion to one-dimensional RNA sequencesV 3After deleting redundant zero codes, utilizer 2To pairV 3Performing RNA decoding and converting into sizem×nTwo-dimensional scrambling ofImage of a personI 2
Step 6: defining the RNA operation rule: defining the operation rules of RNA addition (+), subtraction (-), XOR (and ^) and XNOR (☉):
Figure 890667DEST_PATH_IMAGE001
and 7: operator selection: respectively selectI 2Middle 4 vertices according to the coding ruler 3RNA coding is carried out on the upper six bits of the pixel value, and the operator +, -, (ii) or ☉ is selected according to the distribution condition of the coding result in the amino acid sequence generation table;
and 8: selecting a chaotic matrix: according todThe calculation result of/8 determines the selection rule and selects the chaos matrixZ, U, V, WA plurality of matrixes in (1) participate in the operation;
and step 9: selective diffusion: will scramble the imageI 2Becomes an image every 8 bitsI i 2i=1, 2, …, d/8) use ofr 4To pairI i 2i=1, 2, …, d/8) coding of RNAI i 3i=1, 2, …, d8); by usingr 5To pairZ, U, VAndWcoding RNAZ 1, U 1, V 1AndW 1then, according to the operator selected in step 7, the operator and the image are subjected to diffusion operation to obtain a layered encrypted imageI 1 e, I 2 e, I 3 eAndI 4 ewill beI 1 e, I 2 e, I 3 eAndI 4 ecombining to obtain encrypted RNA imageI e(ii) a Finally, user 6To pairI ePerforming RNA decoding to obtain ciphertext imageI c
Further, in step 1, the two-dimensional ILASM means
Figure 662314DEST_PATH_IMAGE002
, (1)
Wherein the control parameterμ∈[0, 1]Value of statex i , y i ∈[0, 0.2]。
Further, in the step 1, the four-dimensional Chen hyperchaotic index
Figure 304298DEST_PATH_IMAGE003
, (2)
Wherein the parameter is controlleda=35,b=3,c=12,d=7 ande∈[0.085, 0.798]when the system is in a hyperchaotic state.
Further, in step 1, in order to generate the key, the plaintext image is calculated by using SHA-256 respectivelyI m n×256 bit hash value corresponding to current system timeH 1=j 1, j 2, …, j 256AndH 2=k 1, k 2, …, k 256will beH 1AndH 2respectively taking the first 128 bits and sequentially connecting the first 128 bits into a Hash code with the length of 256 bitsH=j 1, j 2, …, j 128, k 1, k 2, …,k 128And will beHDividing into blocks according to every 8 bitsH=h 1, h 2, …, h 32
Further, in the step 1, initial values of the two-dimensional ILASM and the four-dimensional Chen hyperchaotic are calculatedx 0, y 0, z 0, u 0, v 0, w 0And control parametersμ, eAnd the number of iterations of the three-dimensional adaptive Arnold transformtAnd control parametersq 1, q 2
Figure 186803DEST_PATH_IMAGE004
, (3)
Figure 476970DEST_PATH_IMAGE005
, (4)
Figure 419519DEST_PATH_IMAGE006
, (5)
Wherein the content of the first and second substances,mod(.) represents a modular operation,floor(.) represents a rounded-down function,bin2dec(.) indicates a binary converted decimal function, an exclusive or operation.
Further, in the step 2, according to the initial valuex 0, y 0And control parametersμIteration two-dimensional ILASM chaos 1000+m×n×d/Discarding the first 1000 iteration values to generate 2 chaotic sequencesX m n d/××2AndY m n d/××2(ii) a According to the initial valuez 0, u 0, v 0, w 0And control parameterseIteration four-dimensional Chen hyperchaotic 1000+m×nAnd discarding the first 1000 iteration values to generate 4 chaotic matrixesZ m n×, U m n×, V m n×AndW m n×
further, the six coding and decoding rules in step 3 refer to:
r 1=mod(d+floor(x 0×1014), 8)+1, (6)
r 2=mod(d+floor(y 0×1014), 8)+1, (7)
r 3=mod(d+floor(z 0×1014), 8)+1, (8)
r 4=mod(d+floor(u 0×1014), 8)+1, (9)
r 5=mod(d+floor(v 0×1014), 8)+1, (10)
r 6=mod(d+floor(w 0×1014), 8)+1 (11)。
further, in the step 4, a layer random finger is arranged: use ofsort(.) pairs of functionsXSequencing to obtain new sequenceX 'And a sequence of index valuesP 1
[X ', P 1]=sort(X(j)), j=1, 2, …, d/2, (12)
Using index valuesP 1To pairI 3DIs scrambled to obtainI j 1
I j 1=I P1(j) R, j=1, 2, …, d/2 (13)。
Further, in the step 4, the overall random finger is placed: use ofsort(.) pairs of functionsYSequencing to obtain new sequenceY 'And a sequence of index valuesP 2
[Y ', P 2]=sort(Y(k)),k=1, 2, …, m×n×d/2, (14)
The scrambled plane of each layerI j 1Converted into corresponding one-dimensional vectorsV j 1And are connected end to form a largeIs a one-dimensional vector ofV 1
V 1=V 1 1 V 2 1V j 1, (15)
Reusing index valuesP 2To pairV 1Scrambling to obtainV 2
V 2(k)=V 1(P 2(k)),k=1, 2, …, m×n×d/2, (16)
Will be provided withV 2Is converted intol×l×lThree-dimensional RNA cube ofI 3DCIf the third power can not be fully opened, zero padding is carried out at the tail until the length of the third power is matched:
Figure 44404DEST_PATH_IMAGE007
, (17)
wherein the content of the first and second substances,ceil (.) represents an rounding-up function.
Further, in the step 5, the three-dimensional adaptive Arnold transformation means:
Figure 465021DEST_PATH_IMAGE008
(18)。
further, in the step 8, the selection rule is: if it isdAnd 8=1, selecting the first chaotic matrixZParticipating in operation; if it isd8=2, then the first two chaotic matrixes are selectedZAndUparticipating in operation; if it isd8=3, then the first three chaotic matrices are selectedZ, UAndVparticipating in operation; if it isd8=4, then all four chaotic matrices are selectedZ, U, VAndWparticipating in operation; .
Further, in step 9, the diffusion operation means:
Figure 875274DEST_PATH_IMAGE009
, (19)
whereinoperator1,operator2,operator3 andoperator4 represents one of the four operators, +, -, and ☉.
In the decryption process, the same chaotic sequence and a corresponding RNA coding mode are utilized to process the ciphertext image, the original image can be recovered, and the decryption process is the reverse process of encryption.
Has the advantages that: aiming at the problems that the current partial image encryption algorithm has no universality, cannot be applied to images with different pixel depths, cannot realize one-image one-cipher and one-time one-cipher, has low safety performance and the like, the image encryption method based on RNA and pixel depths is provided; the main contributions are: (1) in order to change the pixel position, a scrambling method suitable for different pixel depth images is constructed by combining an RNA encryption theory and a chaos theory; (2) in order to change the pixel value, a diffusion method suitable for different pixel depth images is designed by combining an RNA encryption theory, a chaos theory and a pixel depth correlation theory; (3) the method utilizes good randomness and complexity of a two-dimensional ILASM chaotic system and a four-dimensional Chen hyperchaotic system, and improves the encryption effect; therefore, the method has the characteristics of high efficiency, safety and good encryption effect, and can effectively protect the safety of network transmission and storage of the interactive images.
Drawings
FIG. 1: 8 coding/decoding rules for RNA sequences;
FIG. 2: RNA operation rules;
FIG. 3: amino acid type and operator correspondence table;
FIG. 4: amino acid codon table;
FIG. 5: a flow chart of an image encryption method based on RNA and pixel depth;
FIG. 6: a plaintext image;
FIG. 7: and (4) ciphertext images.
Detailed Description
The following detailed description of the embodiments of the present invention is provided in connection with the accompanying drawings and examples.
Fig. 5 is an encryption flow diagram of the present method.
The programming software adopted is Matlab R2016a, and 8BPP (bit Per Pixel) Lena gray scale images with the size of 512 x 512 shown in FIG. 6 are selected as experimental objects.
Step 1: respectively calculating hash values of a plaintext image and the current system time by using SHA-256H 1AndH 2(ii) a Will be provided withH 1AndH 2respectively taking the first 128 bits and integrating into 1 Hash code with the length of 256 bitsH=9390454675d1f5e55b046d30f05
a8ea1532c6b269a303ac19d3d0a906bb5e 250; and combined with selectedx ' 0=0.9865, y ' 0=1.4335, z ' 0=1.4977, u ' 0=0.5501, v ' 0=2.5159, w ' 0=1.3714, μ =1.6686, e '=0.2759, t '=2.5568 calculating initial values of two-dimensional ILASM and four-dimensional Chen hyperchaotic according to equations (3) - (5)x 0, y 0, z 0, u 0, v 0, w 0And control parametersμ, eAnd the number of iterations of the three-dimensional adaptive Arnold transformtAnd control parametersq 1, q 2
Step 2: according to the initial valuex 0, y 0And control parametersμIterating the two-dimensional ILASM chaos for 1000+512 multiplied by 4 times, discarding the first 1000 iteration values, and generating 2 chaos sequencesX, Y(ii) a According to the initial valuez 0, u 0, v 0, w 0And control parameterseIterating the four-dimensional Chen hyperchaotic 1000+512 × 512 times, discarding the first 1000 iteration values, and generating 4 chaos matrixesZ, U, V, W
And step 3: generation of coding rules: according to the initial value of chaosx 0, y 0, z 0, u 0, v 0, w 0And pixel depthd=8 generated by performing a predetermined operationr 1, r 2, r 3, r 4, r 5, r 6Six coding and decoding rules.
And 4, step 4: three-dimensional RNA cube generation: using coding rulesr 1To pairIRNA coding is carried out to obtain a three-dimensional RNA coding matrix with the size of 512 multiplied by 4I 3D(ii) a Making each layer one layer thick, using chaotic sequencesXTo pairI 3DThe interlamination can be carried out to obtain 4 planes with the size of 512 multiplied by 512I j 1j=1, 2, …, 4); each plane isI j 1Converted into corresponding one-dimensional vectorsV j 1And connected end to obtain a large one-dimensional vectorV 1Using chaotic sequencesYTo pairV 1Scrambling to obtainV 2(ii) a After zero padding, willV 2Conversion into three-dimensional RNA cubes of size 102X 102I 3DC
And 5: self-adaptive stereo scrambling: to pairI 3DCScrambled RNA cuboids by three-dimensional adaptive Arnold transformationI 3DAWill be three-dimensionalI 3DAConversion to one-dimensional RNA sequencesV 3After deleting redundant zero codes, utilizer 2To pairV 3Decoding RNA and converting into two-dimensional scrambled image with size of 512 x 512I 2
Step 6: defining the RNA operation rule: rules for RNA addition, subtraction, XOR and XNOR operations are defined.
And 7: operator selection: respectively selectI 2Middle 4 vertexes and rules the upper six bits of the pixel valuesr 3According to the distribution of the coding result in the amino acid sequence generation table, the corresponding operator is selected.
And 8: selecting a chaotic matrix: according tod/8=1, the first chaotic matrix is selectedZAnd (6) participating in operation.
And step 9: selective diffusion: will be provided withI 2Change of every 8 bitsImagingI i 2 i= 1) usingr 4Coding it with RNAI i 3(ii) a By usingr 5The chaos matrix participating in the operation is subjected to RNA coding to obtainZ 1Then, according to the operator selected in step 7, the operator and the image are subjected to corresponding diffusion operation to obtain a layered encrypted imageI 1 eI.e. encrypting RNA imagesI e(ii) a Finally, user 6To pairI eThe RNA decoding is performed to obtain a ciphertext image as shown in FIG. 7I c
According to the decryption process, the same key, the same index and the same chaos are used to decrypt the ciphertext image to obtain a decryption result, which is as shown in fig. 6.

Claims (3)

1. The image encryption method based on the RNA and the pixel depth is characterized by comprising the following steps:
step 1: and (3) key generation: let the plaintext image beI m n×Pixel depth ofdRandom selection ofx ' 0, y ' 0, z ' 0, u ' 0, v ' 0, w ' 0,μ ', e', t 'As user key input, using SHA-256, plaintext image is calculated respectivelyI m n×And current system timeSCorresponding 256 bit hash valueH 1=j 1, j 2, …, j 256AndH 2=k 1, k 2, …, k 256will beH 1AndH 2respectively taking the first 128 bits and sequentially connecting the first 128 bits into a Hash code with the length of 256 bitsH=j 1, j 2, …, j 128, k 1, k 2, …, k 128And will beHDividing into blocks according to every 8 bitsH=h 1, h 2, …, h 32(ii) a Calculating initial values of Improved two-dimensional Logistic-Adjusted Sine Map (ILASM) shown in formula (1) and four-dimensional Chen hyperchaotic shown in formula (2) by using key generators shown in formulas (3) to (5)x 0, y 0, z 0, u 0, v 0, w 0And control parametersμ, eAnd the number of iterations of the three-dimensional adaptive Arnold transform as shown in equation (6)tAnd control parametersq 1, q 2
Figure 652317DEST_PATH_IMAGE001
, (1)
Wherein the control parameterμ∈[0, 1]Value of statex i , y i ∈[0, 0.2];
Figure 327012DEST_PATH_IMAGE002
, (2)
Wherein the parameter is controlleda=35,b=3,c=12,d=7 ande∈[0.085, 0.798]when the system is in a hyperchaotic state;
Figure 850397DEST_PATH_IMAGE003
, (3)
Figure 467192DEST_PATH_IMAGE004
, (4)
Figure 708818DEST_PATH_IMAGE005
, (5)
Figure 921624DEST_PATH_IMAGE006
, (6)
wherein the content of the first and second substances,mod (.) represents a modular operation,floor(.) represents a rounded-down function,bin2dec(.) indicates a binary converted decimal function, an indicates an exclusive-or operation;
step 2: chaotic sequence and matrix generation: according to the initial valuex 0, y 0And control parametersμIteration two-dimensional ILASM chaos 1000+m×n×d/2Abandoning the first 1000 iteration values to generate 2 chaotic sequencesX m n d/××2AndY m n d/××2(ii) a According to the initial valuez 0, u 0, v 0, w 0And control parameterseIteration four-dimensional Chen hyperchaotic 1000+m×nAnd discarding the first 1000 iteration values to generate 4 chaotic matrixesZ m n×, U m n×, V m n×AndW m n×
and step 3: generation of coding rules: according to the initial value of chaosx 0, y 0, z 0, u 0, v 0, w 0And pixel depthdThe rules for generating the RNA codec using equations (7) - (12) are:
r 1=mod(d+floor(x 0×1014), 8)+1, (7)
r 2=mod(d+floor(y 0×1014), 8)+1, (8)
r 3=mod(d+floor(z 0×1014), 8)+1, (9)
r 4=mod(d+floor(u 0×1014), 8)+1, (10)
r 5=mod(d+floor(v 0×1014), 8)+1, (11)
r 6=mod(d+floor(w 0×1014), 8)+1; (12)
and 4, step 4: three-dimensional RNA cube generation: using RNA coding rulesr 1To pairI m n×Coding RNA to obtainI 3DThickness pair according to one RNA codeI 3DLayering to obtain RNA layered imageI j Rj=1, 2, …, d2); using chaotic sequencesXTo pairI j Rj=1, 2, …, d/2) performing interlayer scrambling to obtaind2 pieces of size ofm×nOf (2) planeI j 1j=1, 2, …, d2); each plane isI j 1Converted into corresponding one-dimensional vectorsV j 1And connected end to obtain a large one-dimensional vectorV 1Using chaosYTo pairV 1Carry out integral scrambling to obtainV 2(ii) a Will be provided withV 2Is converted intol×l×lThree-dimensional RNA cube ofI 3DCIf the third power can not be fully opened, zero codes are filled at the tail to the length which accords with the full third power;
Figure 752046DEST_PATH_IMAGE007
, (13)
wherein the content of the first and second substances,ceil (.) represents an rounding-up function;
and 5: adaptive stereo scrambling: to pairI 3DCThe three-dimensional adaptive Arnold transformation shown in the formula (6) is performed to obtain the scrambled RNA cubeI 3DAWill be three-dimensionalI 3DAConversion to one-dimensional RNA sequencesV 3After deleting redundant zero codes, utilizer 2To pairV 3Performing RNA decoding and converting into the size ofm×nTwo-dimensional scrambled image ofI 2
Step 6: defining the RNA operation rule: the rules for addition (+), subtraction (-), exclusive or (≧) and exclusive or (☉) of RNA are defined as follows:
Figure 87212DEST_PATH_IMAGE008
and 7: operator selection: respectively selectI 2Middle 4 vertexes and using coding rulesr 3RNA coding is carried out on the upper six bits of the pixel value, and the operator +, -, (ii) or ☉ is selected according to the distribution condition of the coding result in the amino acid sequence generation table;
Figure 753817DEST_PATH_IMAGE009
and 8: selecting a chaotic matrix: according todThe calculation result of/8 determines the selection rule and selects the chaos matrixZ, U, VAndWparticipating in operation, and selecting the rule as follows: if it isdAnd 8=1, selecting the first chaotic matrixZParticipating in operation; if it isd8=2, then the first two chaotic matrixes are selectedZAndUparticipating in operation; if it isd8=3, then the first three chaotic matrices are selectedZ, UAndVparticipating in operation; if it isd8=4, then all four chaotic matrices are selectedZ, U, VAndWparticipating in operation;
and step 9: selective diffusion: will scramble the imageI 2Becomes an image every 8 bitsI i 2i=1, 2, …, d/8) use ofr 4To pairI i 2i=1, 2, …, d/8) coding of RNAI i 3i=1, 2, …, d8); by usingr 5To pairZUVAndWcoding RNAZ 1U 1V 1AndW 1then, according to the operator selected in step 7, the two are subjected to diffusion operation as shown in formula (14) to obtain a layered encrypted imageI 1 e, I 2 e, I 3 eAndI 4 ewill beI 1 e, I 2 e, I 3 eAndI 4 ecombining to obtain encrypted RNA imageI e(ii) a Finally, user 6To pairI ePerforming RNA decoding to obtain ciphertext imageI c
Figure 832631DEST_PATH_IMAGE010
, (14)
Whereinoperator1,operator2,operator3 andoperator4 represents one of the four operators, +, -, and ☉.
2. The method of claim 1, wherein: in the step 4, a disorder finger is arranged between layers: use ofsort(.) pairs of functionsXSequencing to obtain new sequenceX 'And a sequence of index valuesP 1
[X ', P 1]=sort(X(j)), j=1, 2, …, d/2, (15)
Using index valuesP 1To pairI 3DIs scrambled to obtainI j 1
I j 1=I P1(j) Rj=1, 2, …, d/2 (16)。
3. The method of claim 1, wherein: in the step 4, overall random finger placement: use ofsort(.) pairs of functionsYSequencing to obtain new sequenceY 'And a sequence of index valuesP 2
[Y ', P 2]=sort(Y(k)),k=1, 2, …, m×n×d/2, (17)
The scrambled plane of each layerI j 1Converted into corresponding one-dimensional vectorsV j 1And are connected end to obtain a large one-dimensional vectorV 1
V 1=V 1 1 V 2 1V j 1, (18)
Reusing index valuesP 2To pairV 1Scrambling to obtainV 2
V 2(k)=V 1(P 2(k)),k=1, 2, …, m×n×d/2 (19)。
CN202110843783.XA 2021-07-26 2021-07-26 Image encryption method based on RNA and pixel depth Withdrawn CN113612899A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110843783.XA CN113612899A (en) 2021-07-26 2021-07-26 Image encryption method based on RNA and pixel depth

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110843783.XA CN113612899A (en) 2021-07-26 2021-07-26 Image encryption method based on RNA and pixel depth

Publications (1)

Publication Number Publication Date
CN113612899A true CN113612899A (en) 2021-11-05

Family

ID=78305362

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110843783.XA Withdrawn CN113612899A (en) 2021-07-26 2021-07-26 Image encryption method based on RNA and pixel depth

Country Status (1)

Country Link
CN (1) CN113612899A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115134475A (en) * 2022-08-31 2022-09-30 智联信通科技股份有限公司 Weighing apparatus weight discrimination intelligent management system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2001296953A1 (en) * 2000-09-28 2002-04-08 New England Medical Center Hospitals, Inc. Assays for identifying receptors having alterations in signaling
US20110059861A1 (en) * 2009-09-08 2011-03-10 Nodality, Inc. Analysis of cell networks
WO2012159020A1 (en) * 2011-05-18 2012-11-22 Philadelphia Health & Education Corporation Methods of diagnosing neuropathic pain
CN104053074A (en) * 2014-06-18 2014-09-17 河海大学 Video watermarking method based on depth image and Otsu segmentation
WO2016120440A1 (en) * 2015-01-29 2016-08-04 Ventana Medical Systems, Inc. Dot detection, color classification of dots and counting of color classified dots
CN109618073A (en) * 2018-12-05 2019-04-12 重庆邮电大学 A kind of more figure encryption methods based on Hyperchaotic Chen System
US20200118026A1 (en) * 2015-08-03 2020-04-16 Nxgen Partners Ip, Llc Quantum mechanical framework for interaction of oam with matter and applications in solid states, biosciences and quantum computing
CN111031193A (en) * 2020-01-06 2020-04-17 中国矿业大学 Image encryption method based on three-dimensional composite scrambling model and chaos

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2001296953A1 (en) * 2000-09-28 2002-04-08 New England Medical Center Hospitals, Inc. Assays for identifying receptors having alterations in signaling
US20110059861A1 (en) * 2009-09-08 2011-03-10 Nodality, Inc. Analysis of cell networks
WO2012159020A1 (en) * 2011-05-18 2012-11-22 Philadelphia Health & Education Corporation Methods of diagnosing neuropathic pain
CN104053074A (en) * 2014-06-18 2014-09-17 河海大学 Video watermarking method based on depth image and Otsu segmentation
WO2016120440A1 (en) * 2015-01-29 2016-08-04 Ventana Medical Systems, Inc. Dot detection, color classification of dots and counting of color classified dots
US20200118026A1 (en) * 2015-08-03 2020-04-16 Nxgen Partners Ip, Llc Quantum mechanical framework for interaction of oam with matter and applications in solid states, biosciences and quantum computing
CN109618073A (en) * 2018-12-05 2019-04-12 重庆邮电大学 A kind of more figure encryption methods based on Hyperchaotic Chen System
CN111031193A (en) * 2020-01-06 2020-04-17 中国矿业大学 Image encryption method based on three-dimensional composite scrambling model and chaos

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
B. AKABAYOV等: "RNA labeling and immobilization for nano-displacement measurement: probing three-dimensional RNA structure", 《IEEE TRANSACTIONS ON NANOBIOSCIENCE 》 *
XIAOQIANG ZHANG等: "Adaptive Chaotic Image Encryption Algorithm Based on RNA and Pixel Depth", 《ELECTRONICS》 *
ZHANG, DUZHONG等: "Hyper-Chaotic Color Image Encryption Based on Transformed Zigzag Diffusion and RNA Operation", 《ENTROPY》 *
朱贵良等: "基于多级多层置乱的数字图像加密新算法研究", 《信息安全与技术》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115134475A (en) * 2022-08-31 2022-09-30 智联信通科技股份有限公司 Weighing apparatus weight discrimination intelligent management system
CN115134475B (en) * 2022-08-31 2022-11-08 智联信通科技股份有限公司 Weighing apparatus weight discrimination intelligent management system

Similar Documents

Publication Publication Date Title
CN109241755B (en) Image encryption method based on three-dimensional scrambling model and chaos
Lin et al. An image encryption scheme based on Lorenz hyperchaotic system and RSA algorithm
CN111031193B (en) Image encryption method based on three-dimensional composite scrambling model and chaos
CN113297606B (en) Color quantum image encryption and decryption method based on multiple chaos and DNA operation
CN109150492B (en) Multi-image encryption method based on three-dimensional scrambling model and chaos
CN106023051B (en) DNA image encryption method and system based on cloud model and hyperchaotic system
CN116150795B (en) Homomorphic encryption-based data processing method, system and related equipment
Kumar et al. Image cryptography with matrix array symmetric key using chaos based approach
CN113612899A (en) Image encryption method based on RNA and pixel depth
CN113468562B (en) Image block encryption and decryption method based on fusion of hyperchaotic system and neural network mechanism
Zheng et al. An ACP-based approach to color image encryption using DNA sequence operation and hyper-chaotic system
CN111682932B (en) Single-round image encryption method based on mixed chaotic mapping
CN113612596A (en) Image self-decryption method based on hyperchaotic system
CN113691362A (en) Bit plane image compression encryption algorithm based on hyperchaotic system and DNA coding
CN113099069B (en) Multi-image encryption method based on three-dimensional spiral model
Allawi et al. Color image encryption using LFSR, DNA, and 3D chaotic maps
CN107507254A (en) Compression of images encryption method based on arithmetic coding
Alhassan et al. Enhancing image security during transmission using residue number system and k-shuffle
CN113114870B (en) Multi-image encryption method based on three-dimensional Zigzag model
CN116033086B (en) Reversible neural network-based image hiding method
Li et al. Image encryption system based on chaotic system and dna computing
Yuanshi et al. An algorithm for JPEG compressing with chaotic encrypting
CN114362918A (en) Image encryption method based on central rule and three-dimensional bit plane
Salunke et al. An implicit approach for visual data: compression encryption via singular value decomposition, multiple chaos and beta function
CN114422127A (en) Quantum key distribution system, method, storage device and intelligent terminal integrating image encryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20211105

WW01 Invention patent application withdrawn after publication