CN114915695A - Bit-level image encryption method based on 2D-Chebyshev chaotic mapping - Google Patents

Bit-level image encryption method based on 2D-Chebyshev chaotic mapping Download PDF

Info

Publication number
CN114915695A
CN114915695A CN202210449514.XA CN202210449514A CN114915695A CN 114915695 A CN114915695 A CN 114915695A CN 202210449514 A CN202210449514 A CN 202210449514A CN 114915695 A CN114915695 A CN 114915695A
Authority
CN
China
Prior art keywords
chaotic
sequence
chebyshev
matrix
image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210449514.XA
Other languages
Chinese (zh)
Other versions
CN114915695B (en
Inventor
周衍庆
葛斌
李涵
葛国庆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui University of Science and Technology
Original Assignee
Anhui University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui University of Science and Technology filed Critical Anhui University of Science and Technology
Priority to CN202210449514.XA priority Critical patent/CN114915695B/en
Publication of CN114915695A publication Critical patent/CN114915695A/en
Application granted granted Critical
Publication of CN114915695B publication Critical patent/CN114915695B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering

Abstract

The invention provides a bit-level image encryption method based on 2D-Chebyshev chaotic mapping, which comprises the steps of firstly coupling 1D-Chebyshev mapping and Fuch mapping, and then expanding one dimension to two dimensions to generate output to obtain the 2D-Chebyshev chaotic mapping. The complexity of the chaotic system is improved, the randomness of a key sequence is enhanced, the parameter range is greatly expanded, and the safety of the encryption system is effectively improved. By introducing a plurality of control parameters and expansion dimensions, the number of keys of the chaotic system is increased, and the key space is enlarged, so that the method can resist violent attack. By improving the binary conversion rule, the problem of digit limitation is solved, and the randomness during scrambling is improved. The chaos sequence is XOR with the adjacent pixels, the tiny change of the pixels is diffused to the whole image, and the capability of the encryption method for resisting differential attack is effectively improved.

Description

Bit-level image encryption method based on 2D-Chebyshev chaotic mapping
Technical Field
The invention belongs to the technical field of digital image encryption algorithms, and particularly relates to a bit-level image encryption method based on 2D-Chebyshev chaotic mapping.
Background
With the rapid development of digital technology and the popularization of the internet, more and more multimedia data are widely spread in the internet. However, due to the accessibility and the sharing of the network, a great deal of important information is revealed when multimedia data is transmitted. Among a plurality of multimedia information, a digital image containing a large amount of visual information is an important tool for transmitting multimedia data, so that a research hotspot is formed by designing an efficient image encryption method to ensure the safety of image information aiming at the special properties of high redundancy rate, large data volume, strong correlation of adjacent pixels and the like of the digital image. The chaotic system is widely applied to the field of image encryption because of the characteristics of initial value sensitivity, unpredictability, pseudo-randomness and the like.
The image encryption method based on the one-dimensional chaotic system is simple in chaotic behavior and can be cracked through brute force attack. Although the high-dimensional chaotic system has complex chaotic behaviors and chaotic tracks of the chaotic system are difficult to predict, the high-dimensional system has high calculation cost and high energy consumption. The chaotic image encryption method with high security also needs to have good capability of resisting typical attacks such as statistical attack, differential attack and the like.
Disclosure of Invention
Based on the problems, the invention provides a bit-level image encryption method based on 2D-Chebyshev chaotic mapping, which comprises the following steps:
step 1: acquiring an image to be encrypted, calculating by using an SHA-256 function to obtain an encryption key, and then taking the key as an initial value of a chaotic sequence;
step 2: substituting the initial value and the given control parameter into a 2D-Chebyshev chaotic map to obtain a chaotic sequence X 1 And Y 1 The 2D-Chebyshev chaotic map couples the 1D-Chebyshev map and the Fuch map, and then one dimension is expanded into two dimensions to generate output;
and step 3: converting the pixel value of the image to be encrypted into a twelve-bit binary pixel sequence according to a bitwise system conversion method, and then converting the pixel value into a decimal number to obtain an encryption matrix F;
and 4, step 4: using the chaotic sequence X 1 Integrally scrambling the matrix F to obtain an encryption matrix E;
and 5: converting each decimal value of the matrix E into a binary pixel sequence, and then converting the decimal value into a decimal number according to the bit-wise binary conversion method to obtain an encryption matrix R;
step 6: for the chaotic sequence X 1 And Y 1 Performing mod remainder to obtain chaotic sequences x 'and y';
and 7: and scanning the encryption matrix R into a one-dimensional matrix U according to the Zig-Zag sequence, then obtaining a one-dimensional matrix V through XOR operation, and reconstructing the matrix V into a two-dimensional matrix to obtain an encrypted image.
Further, the step 1 specifically comprises:
obtaining an image to be encrypted with the size of M multiplied by N, wherein M and N are positive integers, mapping the image to be encrypted by an SHA-256 hash function to generate an external secret key with 256 bits, representing the external secret key as an array H consisting of 64 2-bit hexadecimal numbers, and converting elements in the H into decimal numbers, namely d 1 ,d 2 ,…,d 64 It is divided into 8 groups, each group containing 8 values, i.e. h 1 ,h 2 ,…,h 8 Respectively carrying out XOR on the numerical values of the 1 st group, the 3 rd group, the 5 th group and the 7 th group to obtain a middle array h containing 8 numerical values 0 I.e. h 0 =h 1 ⊕h 3 ⊕h 5 ⊕h 7 Then h is added 0 Adding the sum of the rest 4 number groups as the initial value x of the chaotic system 0 Respectively carrying out XOR on the values of the 2 nd group, the 4 th group, the 6 th group and the 8 th group to obtain a middle array h containing 8 values 0 ', i.e. h 0 '=h 2 ⊕h 4 ⊕h 6 ⊕h 8 Then h is added 0 ' adding the result of summing the remaining 4 number groups as the initial value y of the chaotic system 0 The iterative initial value x of 2D-Chebyshev is calculated according to the following formula 0 ,y 0
Figure BDA0003616713920000021
Further, the step 2 specifically includes:
the mathematical model of the 2D-Chebyshev chaotic mapping is specifically as follows:
Figure BDA0003616713920000022
wherein a and k are control parameters, and k belongs to [0.2,100], when a is 8.98, the 2D-Chebyshev has chaotic behavior;
in the step 2, the initial value is substituted into a chaos mapping 2D-Chebyshev to obtain a chaos sequence X 1 And Y 1 The method specifically comprises the following steps: iterating an initial value x based on given parameters a and k of the chaotic map 0 And y 0 Iterating the 2D-Chebyshev chaotic mapping M multiplied by N +1000 times to obtain chaotic sequences X and y, then abandoning the first 1000 items of the sequences X and y, and modifying the chaotic sequences into chaotic sequences X with length of M multiplied by N 1 And Y 1
Further, the step 3 specifically includes:
carrying out binary conversion on each pixel value of an image I to be encrypted with the size of M multiplied by N according to bits: each digit of the decimal pixel value is converted into a four-digit binary number respectively, and after the four-digit binary numbers are combined into a twelve-digit binary number, the binary number is directly converted into a decimal number, and a matrix F is obtained.
Further, the step 5 specifically includes:
and converting each decimal value of the encryption matrix E into a twelve-bit binary sequence, converting each sequence from left to right, converting each four bits into a decimal number, and merging the decimal number into a new decimal number to obtain the encryption matrix R.
Further, the step 6 specifically includes:
the chaotic sequence X is divided according to the following formula 1 And Y 1 Respectively mapping to integers in the range of 0-255 to obtain chaotic sequences x 'and y':
Figure BDA0003616713920000023
further, the step 7 specifically includes:
scanning the encryption matrix R into a one-dimensional matrix U according to the sequence of the Zig-Zag, then carrying out XOR operation with chaotic sequences x 'and y' and adjacent pixels, and storing the result in a one-dimensional matrix V:
Figure BDA0003616713920000024
and reconstructing the one-dimensional matrix V into a two-dimensional matrix to obtain an encrypted image.
The invention has the beneficial effects that:
the invention provides a bit-level image encryption method based on 2D-Chebyshev chaotic mapping, which comprises the steps of firstly coupling 1D-Chebyshev mapping and Fuch mapping, and then expanding one dimension to two dimensions to generate output to obtain the 2D-Chebyshev chaotic mapping. Compared with a one-dimensional chaotic system, the 2D-Chebyshev chaotic mapping effectively improves the complexity of the chaotic system, enhances the randomness of a key sequence, greatly expands the parameter range of the chaotic system and effectively improves the safety of an encryption system. By introducing a plurality of control parameters and expansion dimensions, the number of keys of the chaotic system is increased, and the key space is enlarged, so that the algorithm can better resist violent attack. The small change of the pixels is expanded to the whole image through the XOR of the adjacent pixels, and the capability of the encryption system for resisting differential attack is effectively improved.
The above description is an overview of the technical solutions of the present invention, and in order to make the technical means, implementation procedures, objects, and advantages of the present invention more clear, the following description is given by way of example to illustrate specific embodiments of the present invention.
Drawings
FIG. 1 is a schematic flow diagram of a bit-level image encryption method based on 2D-Chebyshev chaotic mapping in the present invention.
Fig. 2 is a schematic flow chart of decrypting a ciphertext image in the present invention.
FIG. 3 is a plaintext diagram, a ciphertext diagram, and a ciphertext decryption diagram of an experimental image in accordance with the present invention; (a) the text is a plaintext image of an experimental image, (b) is a ciphertext image of the experimental image, and (c) is a ciphertext decryption image of the experimental image.
FIG. 4 is a pixel histogram of a ciphertext graph of an experimental image of the present invention.
FIG. 5 is a schematic diagram showing the correlation between ciphertext graphs of an experimental image in different directions; (a) the graph is a schematic diagram of the horizontal direction correlation of the ciphertext image of the experimental image, (b) is a schematic diagram of the vertical direction correlation of the ciphertext image of the experimental image, and (c) is a schematic diagram of the diagonal direction correlation of the ciphertext image of the experimental image.
Detailed Description
The invention is further described with reference to the following figures and specific examples. The invention aims to solve the problems of low sequence randomness, small key space and median limitation in the traditional bit encryption method generated by the traditional chaotic mapping. Firstly, coupling is carried out by utilizing a 1D-Chebyshev mapping and a Fuch mapping, and then one dimension is expanded into two dimensions to generate output, so that a 2D-Chebyshev chaotic mapping is obtained. The complexity of the chaotic system is improved, the randomness of a key sequence is enhanced, the parameter range is greatly expanded, and the safety of the encryption system is effectively improved. By introducing a plurality of control parameters and expansion dimensions, the number of keys of the chaotic system is increased, and the key space is enlarged, so that the method can resist violent attack. By improving the binary conversion rule, the problem of digit limitation is solved, and the randomness during scrambling is improved. The chaos sequence is XOR with the adjacent pixels, the tiny change of the pixels is diffused to the whole image, and the capability of the encryption method for resisting differential attack is effectively improved.
As shown in fig. 1, a bit-level image encryption method based on 2D-Chebyshev chaotic mapping, during encryption, transmits key information through a secret channel, transmits a ciphertext image through a public channel, and sets a pixel size of the plaintext image as mxn, includes:
step 1: acquiring an image to be encrypted, calculating by using an SHA-256 function to obtain an encryption key, and then taking the key as an initial value of a chaotic sequence;
step 2: substituting the initial value and the given control parameter into a 2D-Chebyshev chaotic map to obtain a chaotic sequence X 1 And Y 1 The 2D-Chebyshev chaotic map couples the 1D-Chebyshev map and the Fuch map, and then expands one dimension to two dimensions to generate output;
and step 3: converting the pixel value of the image to be encrypted into a twelve-bit binary pixel sequence according to a bitwise system conversion method, and then converting the pixel value into a decimal number to obtain an encryption matrix F;
and 4, step 4: using the chaotic sequence X 1 Integrally scrambling the matrix F to obtain an encryption matrix E;
and 5: converting each decimal value of the matrix E into a binary pixel sequence, and then converting the decimal value into a decimal number according to the bit-wise binary conversion method to obtain an encryption matrix R;
step 6: for the chaotic sequence X 1 And Y 1 Performing mod remainder to obtain chaotic sequences x 'and y';
and 7: and scanning the encryption matrix R into a one-dimensional matrix U according to the Zig-Zag sequence, then obtaining a one-dimensional matrix V through XOR operation, and reconstructing the matrix V into a two-dimensional matrix to obtain an encrypted image.
In a specific embodiment, the step 1 specifically includes:
obtaining an image to be encrypted with the size of M multiplied by N, wherein M and N are positive integers, mapping the image to be encrypted by an SHA-256 hash function to generate an external secret key with 256 bits, representing the external secret key as an array H consisting of 64 2-bit hexadecimal numbers, and converting elements in the H into decimal numbers, namely d 1 ,d 2 ,…,d 64 It is divided into 8 groups, each group containing 8 values, i.e. h 1 ,h 2 ,…,h 8 Respectively carrying out XOR on the values of the 1 st group, the 3 rd group, the 5 th group and the 7 th group to obtain an intermediate array h containing 8 values 0 I.e. h 0 =h 1 ⊕h 3 ⊕h 5 ⊕h 7 Then h is mixed 0 Adding the sum of the rest 4 number groups as the initial value x of the chaotic system 0 Respectively carrying out XOR on the values of the 2 nd group, the 4 th group, the 6 th group and the 8 th group to obtain a middle array h containing 8 values 0 ', i.e. h 0 '=h 2 ⊕h 4 ⊕h 6 ⊕h 8 Then h is added 0 ' adding the result of summing the remaining 4 number groups as the initial value y of the chaotic system 0 The initial iteration of 2D-Chebyshev was calculated according to the following formulaStarting value x 0 ,y 0
Figure BDA0003616713920000041
In an embodiment, in the step 2, the mathematical model of the 2D-Chebyshev chaotic map is specifically:
Figure BDA0003616713920000042
wherein a and k are control parameters, and k belongs to [0.2,100], when a is 8.98, the 2D-Chebyshev has chaotic behavior;
in the step 2, the initial value is substituted into a chaos mapping 2D-Chebyshev to obtain a chaos sequence X 1 And Y 1 The method specifically comprises the following steps: iterating an initial value x based on given parameters a and k of the chaotic map 0 And y 0 Iterating the 2D-Chebyshev chaotic mapping M multiplied by N +1000 times to obtain chaotic sequences X and y, then abandoning the first 1000 items of the sequences X and y, and modifying the chaotic sequences into chaotic sequences X with length of M multiplied by N 1 And Y 1
In a specific embodiment, the step 3 specifically includes:
carrying out binary conversion on each pixel value of an image I to be encrypted with the size of M multiplied by N according to bits: each digit of the decimal pixel value is converted into a four-digit binary number respectively, and after the four-digit binary numbers are combined into a twelve-digit binary number, the binary number is directly converted into a decimal number, and a matrix F is obtained.
In a specific embodiment, the step 5 specifically includes:
and converting each decimal value of the encryption matrix E into a twelve-bit binary sequence, converting each sequence from left to right, converting each four bits into a decimal number, and merging the decimal number into a new decimal number to obtain the encryption matrix R.
In a specific embodiment, the step 6 specifically includes:
the chaotic sequence X is expressed as 1 And Y 1 Respectively map toIntegers in the range of 0-255, obtaining chaotic sequences x 'and y':
Figure BDA0003616713920000051
in a specific embodiment, the step 7 specifically includes:
scanning the encryption matrix R into a one-dimensional matrix U according to the sequence of Zig-Zag, and then carrying out exclusive OR operation with the chaotic sequence x 'and y' and adjacent pixels, and storing the result in a one-dimensional matrix V:
Figure BDA0003616713920000052
and reconstructing the one-dimensional matrix V into a two-dimensional matrix to obtain an encrypted image.
The decryption process (i.e. the inverse process of encryption) of the ciphertext image obtained by encrypting by using the method of the invention is shown in fig. 2, and the specific process is as follows:
1) inputting a key: carrying out chaotic mapping according to the steps 2 and 6 in the encryption process to obtain a chaotic sequence for exclusive or diffusion;
2) and (3) carrying out inverse operation of exclusive or of the ciphertext image: converting the ciphertext image matrix into a one-dimensional matrix, performing exclusive or inverse operation on adjacent pixels and the chaotic sequence, and restoring pixel diffusion;
3) chaotic mapping: and generating a chaotic sequence according to the step 2 of the encryption process, and using the chaotic sequence for reducing and scrambling to obtain a plaintext image so as to realize image decryption.
The method is used for processing digital images with any size, the embodiment is a gray scale image of a 512 multiplied by 512 experimental image, the gray scale is 256, encryption/decryption and related safety test experiments are carried out, and the experimental result image is shown in figures 3-5.
The effectiveness of the method of the invention is further verified by measuring the index of the capability of resisting common attack means.
Histogram analysis: the method is adopted to carry out histogram analysis on the encrypted image; the uniform distribution of the histogram shows that the plaintext information can be better hidden, and an attacker can hardly recover the plaintext image through the histogram analysis attack.
Adjacent pixel correlation: the method of the invention is adopted to randomly select 1000 in the horizontal, vertical and diagonal directions of the plaintext and the ciphertext image respectively to analyze the adjacent pixel points; the value difference between adjacent pixels of the plaintext image is small, the pixel values between adjacent positions of the image have strong correlation, the correlation between adjacent pixels of the ciphertext image is close to 0, and the correlation between the pixel values between adjacent positions of the image is weak.

Claims (7)

1. A bit-level image encryption method based on 2D-Chebyshev chaotic mapping is characterized by comprising the following steps:
step 1: acquiring an image to be encrypted, calculating by using an SHA-256 function to obtain an encryption key, and then taking the key as an initial value of a chaotic sequence;
and 2, step: substituting the initial value and the given control parameter into a 2D-Chebyshev chaotic map to obtain a chaotic sequence X 1 And Y 1 The 2D-Chebyshev chaotic map couples the 1D-Chebyshev map and the Fuch map, and then expands one dimension to two dimensions to generate output;
and step 3: converting the pixel value of the image to be encrypted into a twelve-bit binary pixel sequence according to a bitwise system conversion method, and then converting the pixel value into a decimal number to obtain an encryption matrix F;
and 4, step 4: using the chaotic sequence X 1 Integrally scrambling the matrix F to obtain an encryption matrix E;
and 5: converting each decimal value of the matrix E into a binary pixel sequence, and then converting the decimal value into a decimal number according to the bit-wise binary conversion method to obtain an encryption matrix R;
step 6: for the chaotic sequence X 1 And Y 1 Performing mod remainder to obtain chaotic sequences x 'and y';
and 7: and scanning the encryption matrix R into a one-dimensional matrix U according to the Zig-Zag sequence, then obtaining a one-dimensional matrix V through XOR operation, and reconstructing the matrix V into a two-dimensional matrix to obtain an encrypted image.
2. The method of claim 1, wherein: the step 1 specifically comprises the following steps:
obtaining an image to be encrypted with the size of M multiplied by N, wherein M and N are positive integers, mapping the image to be encrypted by an SHA-256 hash function to generate an external secret key with 256 bits, representing the external secret key as an array H consisting of 64 2-bit hexadecimal numbers, and converting elements in the H into decimal numbers, namely d 1 ,d 2 ,...,d 64 It is divided into 8 groups, each group containing 8 values, i.e. h 1 ,h 2 ,...,h 8 Respectively carrying out XOR on the numerical values of the 1 st group, the 3 rd group, the 5 th group and the 7 th group to obtain a middle array h containing 8 numerical values 0 I.e. by
Figure FDA0003616713910000011
Figure FDA0003616713910000012
Then h is put 0 Adding the sum of the rest 4 number groups as the initial value x of the chaotic system 0 Respectively carrying out XOR on the values of the 2 nd group, the 4 th group, the 6 th group and the 8 th group to obtain a middle array h containing 8 values 0 ', i.e. that
Figure FDA0003616713910000013
Then h is put 0 ' adding the result of summing the remaining 4 number groups as the initial value y of the chaotic system 0 The iterative initial value x of 2D-Chebyshev is calculated according to the following formula 0 ,y 0
Figure FDA0003616713910000014
3. The method of claim 1, wherein: the step 2 specifically comprises the following steps:
the mathematical model of the 2D-Chebyshev chaotic mapping is specifically as follows:
Figure FDA0003616713910000015
wherein a and k are control parameters, k belongs to [0.2,100], and when a is 8.98, 2D-Chebyshev has chaotic behavior;
in the step 2, the initial value is substituted into a chaos mapping 2D-Chebyshev to obtain a chaos sequence X 1 And Y 1 The method specifically comprises the following steps: iterating an initial value x based on given parameters a and k of the chaotic map 0 And y 0 Iterating the 2D-Chebyshev chaotic mapping M multiplied by N +1000 times to obtain chaotic sequences X and y, then abandoning the first 1000 items of the sequences X and y, and modifying the chaotic sequences into chaotic sequences X with length of M multiplied by N 1 And Y 1
4. The method of claim 1, wherein: the step 3 specifically comprises the following steps:
carrying out binary conversion on each pixel value of an image I to be encrypted with the size of M multiplied by N according to bits: each digit of the decimal pixel value is converted into a four-digit binary number respectively, and after the four-digit binary numbers are combined into a twelve-digit binary number, the binary number is directly converted into a decimal number, and a matrix F is obtained.
5. The method of claim 1, wherein: the step 5 specifically comprises the following steps:
and converting each decimal value of the encryption matrix E into a twelve-bit binary sequence, converting each sequence from left to right, converting each four bits into a decimal number, and merging the decimal number into a new decimal number to obtain the encryption matrix R.
6. The method of claim 1, wherein: the step 6 specifically comprises the following steps:
the chaotic sequence X is expressed as 1 And Y 1 Respectively mapping to integers in the range of 0-255 to obtain chaotic sequences x 'and y':
Figure FDA0003616713910000021
7. the method of claim 1, wherein: the step 7 specifically comprises the following steps:
scanning the encryption matrix R into a one-dimensional matrix U according to the sequence of Zig-Zag, and then carrying out exclusive OR operation with the chaotic sequence x 'and y' and adjacent pixels, and storing the result in a one-dimensional matrix V:
Figure FDA0003616713910000022
and reconstructing the one-dimensional matrix V into a two-dimensional matrix to obtain an encrypted image.
CN202210449514.XA 2022-04-26 2022-04-26 Bit-level image encryption method based on 2D-Chebyshev chaotic mapping Active CN114915695B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210449514.XA CN114915695B (en) 2022-04-26 2022-04-26 Bit-level image encryption method based on 2D-Chebyshev chaotic mapping

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210449514.XA CN114915695B (en) 2022-04-26 2022-04-26 Bit-level image encryption method based on 2D-Chebyshev chaotic mapping

Publications (2)

Publication Number Publication Date
CN114915695A true CN114915695A (en) 2022-08-16
CN114915695B CN114915695B (en) 2024-02-13

Family

ID=82765691

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210449514.XA Active CN114915695B (en) 2022-04-26 2022-04-26 Bit-level image encryption method based on 2D-Chebyshev chaotic mapping

Country Status (1)

Country Link
CN (1) CN114915695B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040223616A1 (en) * 2003-04-07 2004-11-11 Stmicroelectronics S.R.I. Encryption process employing chaotic maps and digital signature process
CN102693523A (en) * 2012-05-09 2012-09-26 华南理工大学 Image two-grade encrypting method based on double-chaos system
US20130170641A1 (en) * 2010-03-29 2013-07-04 Universite De Nantes Generator of Chaotic Sequences and Corresponding Generating System
CN104008520A (en) * 2014-05-09 2014-08-27 河南大学 Color image encryption method based on SHA-384 function, spatiotemporal chaotic system, quantum chaotic system and neural network
CN108133446A (en) * 2016-12-01 2018-06-08 钦州市晶通科技有限公司 A kind of composite chaotic Second-scrambling resume image
CN112152775A (en) * 2019-08-12 2020-12-29 湖南大学 Image encryption method based on two-dimensional Henon-Chebyshev chaotic mapping and gene operation
CN113538203A (en) * 2021-09-01 2021-10-22 华侨大学 Image encryption method and device based on novel two-dimensional composite chaotic mapping and SHA-256
CN114049245A (en) * 2021-11-08 2022-02-15 苏州中科安源信息技术有限公司 Color image encryption method based on composite chaotic mapping

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040223616A1 (en) * 2003-04-07 2004-11-11 Stmicroelectronics S.R.I. Encryption process employing chaotic maps and digital signature process
US20130170641A1 (en) * 2010-03-29 2013-07-04 Universite De Nantes Generator of Chaotic Sequences and Corresponding Generating System
CN102693523A (en) * 2012-05-09 2012-09-26 华南理工大学 Image two-grade encrypting method based on double-chaos system
CN104008520A (en) * 2014-05-09 2014-08-27 河南大学 Color image encryption method based on SHA-384 function, spatiotemporal chaotic system, quantum chaotic system and neural network
CN108133446A (en) * 2016-12-01 2018-06-08 钦州市晶通科技有限公司 A kind of composite chaotic Second-scrambling resume image
CN112152775A (en) * 2019-08-12 2020-12-29 湖南大学 Image encryption method based on two-dimensional Henon-Chebyshev chaotic mapping and gene operation
CN113538203A (en) * 2021-09-01 2021-10-22 华侨大学 Image encryption method and device based on novel two-dimensional composite chaotic mapping and SHA-256
CN114049245A (en) * 2021-11-08 2022-02-15 苏州中科安源信息技术有限公司 Color image encryption method based on composite chaotic mapping

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
RONGKUN JIANG ET AL.: "An Efficient 2bits-Level for Image Encryption Based on Dna, Multi-Delayed Chebyshev Map and Cellular Automata", 《IEEE ACCESS》, vol. 7, pages 95779 - 95796 *
傅文渊等: "自适应折叠混沌优化方法", 《西安交通大学学报》, vol. 47, no. 2, pages 33 - 38 *
李涵等: "基于忆阻器神经网络和改进Logistic映射的图像加密法研究", 《通化师范学院学报》, vol. 42, no. 12, pages 108 - 115 *
蒋东华等: "结合二维压缩感知和混沌映射的双图像视觉安全加密算法", 《西安交通大学学报》, no. 2, pages 139 - 148 *

Also Published As

Publication number Publication date
CN114915695B (en) 2024-02-13

Similar Documents

Publication Publication Date Title
Wang et al. An image encryption algorithm based on hyperchaotic system and DNA coding
Zhu et al. 2D logistic-modulated-sine-coupling-logistic chaotic map for image encryption
CN110086601B (en) Joseph traversal and hyperchaotic system image encryption method based on pixel value association
CN109660696B (en) New image encryption method
CN112199690B (en) Image encryption method for synchronously realizing fractional order complex system based on mixed time lag
CN107094072B (en) Mixed chaotic encryption method based on generalized Henon mapping
CN109889686B (en) Image encryption method based on H fractal structure and dynamic self-reversible matrix
Song et al. Quantum video encryption based on qubit-planes controlled-XOR operations and improved logistic map
Khan et al. A new hybrid image encryption algorithm based on 2D-CA, FSM-DNA rule generator, and FSBI
CN107330338B (en) Color image encryption and decryption method and system based on double-chaos cross diffusion
CN109361830B (en) Image encryption method based on plaintext
CN114679250A (en) Image encryption algorithm based on mixed chaos and Arnold transformation
Cun et al. A new chaotic image encryption algorithm based on dynamic DNA coding and RNA computing
CN114418823A (en) Large-key space bit scrambling chaotic image encryption method based on logistic
CN114579993A (en) Image encryption method based on quantum key distribution and pixel scrambling
Fang et al. A secure chaotic block image encryption algorithm using generative adversarial networks and DNA sequence coding
CN113806781A (en) Energy internet data packet encryption algorithm based on 2D-LCLM
CN115766962A (en) Multi-key image encryption method based on five-dimensional conservative hyperchaotic system
CN103310157B (en) Based on the image encryption method of RT-DNA cellular automaton
CN112769545B (en) Image encryption method based on adjacent pixel Joseph transformation and Mealy state machine
CN113300827A (en) Latin square-based chaotic image encryption method
CN109559269B (en) Image encryption method and terminal
Tao et al. A Snake Encryption Algorithm for Image with Multiple Chaos Fusion.
CN116192362A (en) Lyapunov exponent adjustable chaotic system and image encryption and decryption method
CN107133994B (en) Image encryption method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant