CN115276992A - Domain arithmetic-based symmetric image password processing method - Google Patents
Domain arithmetic-based symmetric image password processing method Download PDFInfo
- Publication number
- CN115276992A CN115276992A CN202211210136.6A CN202211210136A CN115276992A CN 115276992 A CN115276992 A CN 115276992A CN 202211210136 A CN202211210136 A CN 202211210136A CN 115276992 A CN115276992 A CN 115276992A
- Authority
- CN
- China
- Prior art keywords
- pseudo
- random number
- elements
- number matrix
- representing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 17
- 239000011159 matrix material Substances 0.000 claims abstract description 450
- 238000000034 method Methods 0.000 claims description 26
- 239000013598 vector Substances 0.000 claims description 21
- 239000004576 sand Substances 0.000 claims description 12
- 238000013507 mapping Methods 0.000 claims description 6
- 238000009825 accumulation Methods 0.000 claims description 4
- 238000006243 chemical reaction Methods 0.000 claims description 3
- 238000000605 extraction Methods 0.000 claims description 3
- 230000003094 perturbing effect Effects 0.000 claims 1
- 230000008569 process Effects 0.000 description 6
- 238000009792 diffusion process Methods 0.000 description 5
- 230000000739 chaotic effect Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000006870 function Effects 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 101150061215 outM gene Proteins 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
- 230000036962 time dependent Effects 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
- H04L9/0656—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
- H04L9/0662—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32267—Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
- H04N1/32272—Encryption or ciphering
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Multimedia (AREA)
- Facsimile Transmission Control (AREA)
Abstract
The invention provides a domain arithmetic-based password processing method for symmetric images, wherein a pseudorandom matrix participates in encryption control, and different cipher text images are obtained by encrypting the same secret key and the same plaintext image at different moments on an encryption side; the cryptographic processing method of the symmetric image based on the domain arithmetic has the characteristic of one-time pad, and can resist various existing passive attacks; in addition, the cipher processing method is a symmetric cipher algorithm, a pseudo-random number matrix is not needed on a decryption side, and an original plaintext image can be restored from a ciphertext image.
Description
Technical Field
The invention relates to the technical field of image encryption, in particular to a cryptographic processing method of a symmetric image based on domain arithmetic.
Background
In the field of image encryption, a conventional image encryption scheme is shown in fig. 1, and comprises an equivalent key generator and a scrambling and diffusing module, and a chaotic system is generally selected as the key generator. Specifically, the image encryption scheme shown in fig. 1 is widely used, and in this encryption scheme, the image decryption algorithm is the reverse process of the image encryption algorithm. In fig. 1, the scrambling algorithm is used to scramble the positions of the pixels of the image without changing the values of the individual pixels; the diffusion algorithm is used for diffusing the information of any pixel point in the image into as many pixel points as possible, and the diffusion mainly changes the value of the pixel point without paying attention to the position of the pixel point. The scrambling and diffusion algorithms require a sequence of pseudo-random numbers generated by means of an equivalent key generator. In addition, the scrambling algorithm and the diffusion algorithm can be combined together for implementation, and a plaintext image is converted into a ciphertext image similar to a noise image by circularly executing the scrambling algorithm and the diffusion algorithm for multiple times, so that the aim of hiding image information is fulfilled.
However, the existing image encryption method has the following disadvantages:
(1) In the existing scheme, a plaintext image is encrypted into a unique ciphertext image by a key, and an enemy who steals the encryption equipment can use the equipment to generate a plurality of pairs of plaintext-ciphertext pairs, so that known plaintext attack or plaintext attack selection can be implemented to obtain an equivalent key of an encryption system;
(2) An adversary who steals the decryption device can use the device to generate a plurality of pairs of ciphertext-plaintext pairs, so that known ciphertext attacks or ciphertext attack selection can be effectively implemented to obtain an equivalent key of a decryption system;
(3) When an adversary has only obtained a pair of plaintext-ciphertext pairs, the adversary can take a ciphertext-only attack or an exhaustive key attack to obtain a key or an equivalent key of the encryption system.
Based on this, it is necessary to provide a symmetric image encryption method based on domain arithmetic to solve the above technical problems.
Disclosure of Invention
In view of the above situation, the main object of the present invention is to provide a symmetric image encryption method based on domain arithmetic to solve the above technical problems.
The embodiment of the invention provides a cryptographic processing method of a symmetric image based on domain arithmetic, wherein the method comprises the following steps:
step one, generating a pseudo-random number matrix by using an equivalent key generator:
step 1.1, from the first subkeykey 1 With a second subkeykey 2 Respectively calculating to obtain first state variablesx 0 And a second state changeQuantity ofy 0 ;
Step 1.2, setting circulation variableiIncrement from 0 to 1 stepd-3 at the firstiIn the secondary cycle, willx 0 Andy 0 the updating is carried out by substituting into a H non mapping equation, and the loop is carried outM×(N+ 4) times, the update is completed, and the updated first state variable is still recorded asx 0 The updated second state variable is still recorded asy 0 (ii) a Wherein,drepresenting the number of subkeys;
step 1.3, the extraction length isM×(N+ 4) state variablex i }, i=1,2,…, M×(N+ 4) and converted to a size ofM×(N+ 4) first pseudo-random number matrixSWherein, in the process,Mrepresenting the number of rows of a pseudo-random number matrix,Nrepresenting the number of columns of the pseudo random number matrix;
step two, an image encryption method;
step 2.1, the computer-based pseudo-random number generator generates a pseudo-random number of sizeMSecond pseudo-random number matrix of x 4R;
Step 2.2, based on the second pseudo-random number matrixRAnd elements of columns 1 and 3, and a first pseudo-random number matrixSTo middleN+3 columns andN+4 columns of elements, calculated to have a size ofMX 2 third pseudo-random number matrixY;
Step 2.3, based on the third pseudo-random number matrixYMiddle 2 nd column element, first pseudo random number matrixSElement of middle 2 nd column and second pseudo random number matrixRThe elements in column 2 scramble the elements of the plaintext image and are calculated to have a size ofM×NFourth pseudo random number matrix ofZ;
Step 2.4, based on the third pseudo-random number matrixYElement of middle 4 th column, first pseudo random number matrixSMiddle 4 th column of elements and a second pseudo-random number matrixRThe 4 th column element scrambles the fourth pseudo random number matrixZAnd calculating a size ofM×NOf the fifth pseudo-random number matrixW;
Step 2.5, use the first pseudo randomMachine number matrixSTo (1) aN+1 columns andN+2 columns of elements, for the sixth pseudo-random number matrixGScrambling is carried out, and the matrix after scrambling is marked as a seventh pseudo-random number matrixH;
Step 2.6, apply the fifth pseudo-random number matrixWAnd a seventh pseudo-random number matrixHAre combined into a size ofM×(N+ 2) eighth pseudo random number matrixC;
Step 2.7, based on the first pseudo-random number matrixSAnd ninth pseudo random number matrixQIs scrambled by a value ofCTo calculate a new position coordinate;
step three, an image decryption method;
step 3.1, apply the first pseudo-random number matrixS1 toMAnd lines 1 to 1NThe upper 4 bits and the lower 4 bits of each element in the region surrounded by +2 columns are interchanged to obtain a ninth pseudo-random number matrixQ;
Step 3.2, based on the first pseudo-random number matrixSAnd ninth pseudo random number matrixQA value of (b), restoring the eighth pseudo random number matrix before scramblingCThe element position of (a);
step 3.3, decompose the eighth pseudo-random number matrixCIs a fifth pseudo-random number matrixWAnd a seventh pseudo random number matrixH;
Step 3.4, based on the first pseudo-random number matrixSTo (1)N+1 columns andN+2 columns the seventh pseudo-random number matrixHReverting to a sixth pseudo-random number matrixG;
Step 3.5, based on the ninth pseudo-random number matrixQFirst pseudo random number matrixSAnd a sixth pseudo-random number matrixGA fifth pseudo random number matrixWInto a fourth pseudo-random number matrixZ;
Step 3.6, based on the first pseudo-random number matrixSAnd a sixth pseudo-random number matrixGApplying a fourth pseudo-random number matrixZConversion to a tenth pseudo-random number matrixPTenth pseudorandom number matrixPIs a restored plaintext image.
The invention has the following advantages:
(1) By introducing a sequence of pseudo-random numbers, a set of pseudo-random numbers generated randomly by the computer as part of the key participates in the encryption algorithm during encryption, the set of computer-generated pseudo-random numbers being time-dependent on the computer. Therefore, each time an image is encrypted, a different pseudo-random number is introduced, so that equivalent keys participating in operation in the encryption process are different, and the process is not reproducible; even if the same plaintext image is encrypted, ciphertext images obtained by encrypting at different moments are completely different.
(2) Because the encryption process uses the pseudo-random number generated by the computer, the relation between the plaintext image and the ciphertext image is not in one-to-one correspondence, and a plaintext image can be encrypted into different ciphertext images at different moments. Therefore, an adversary who steals the encryption device or the decryption device cannot implement various passive attacks.
(3) The whole image cryptosystem is a symmetric cryptosystem, and a legal decryption party can complete decryption only by owning a legal decryption key (the same as an encryption key) and a ciphertext image to obtain an original plaintext image. The encryptor uses a discrete exponent (or discrete logarithm) method to convert the introduced pseudo random number into a discrete exponent value and hide the discrete exponent value in the ciphertext information.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
FIG. 1 is a block diagram of a prior art image encryption algorithm;
FIG. 2 is a schematic block diagram of an encryption algorithm proposed by the present invention;
fig. 3 is a schematic block diagram of a decryption algorithm proposed by the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the accompanying drawings are illustrative only for the purpose of explaining the present invention, and are not to be construed as limiting the present invention.
These and other aspects of embodiments of the invention will be apparent with reference to the following description and attached drawings. In the description and drawings, particular embodiments of the invention have been disclosed in detail as being indicative of some of the ways in which the principles of the embodiments of the invention may be practiced, but it is understood that the scope of the embodiments of the invention is not limited correspondingly. On the contrary, the embodiments of the invention include all changes, modifications and equivalents coming within the spirit and terms of the claims appended hereto.
The symmetric image encryption algorithm provided by the invention comprises three parts: namely an equivalent cipher generator, an image encryption algorithm and an image decryption algorithm, and each algorithm module is described in detail as follows:
the invention provides a cryptographic processing method of a symmetric image based on domain arithmetic, wherein the method comprises the following steps:
step one, generating a pseudo-random number matrix by using an equivalent key generator:
noting the key of an image encryption system asKLength of 24dA bit. For example, taked=20, the key length is 480 bits. Let the plain text image be a 8-bit grayscale image with a size ofM×N。
In the invention, a H non mapping equation is used as the core of a key expansion algorithm. Specifically, the hnon mapping equation is expressed as:
Secret keyKIs divided intodSecondary keykey 1 , key 2 ,…,key d Each subkey is 24 bits long, and is composed of keysKGenerating a size ofM×(N+4) First pseudo random number matrix ofS. As a supplement, whena=1.4,bWhen =0.3, the hnon map has a chaotic attractor with a maximum Lyapunov exponent of 0.654.
Step 1.1, from the first subkeykey 1 With a second subkeykey 2 Respectively calculating to obtain first state variablesx 0 And a second state variabley 0 。
In step 1.1, the following formula exists:
the first state variablex 0 And a second state variabley 0 After iteration is carried out for 20 times in the formula (1), a group of chaotic states are obtained and still recorded asx 0 And withy 0 。
Step 1.2, setting circulation variableiIncrement from 0 to 1 stepd-3 in the first placeiIn the second cycle, willx 0 Andy 0 the updating is carried out by substituting into a H non mapping equation, and the loop is carried outM×(N+ 4) times, the update is completed, and the updated first state variable is still recorded asx 0 The updated second state variable is still recordedy 0 (ii) a Wherein,dindicating the number of subkeys.
In step 1.2, the following formula exists:
Will be provided withx 0 A second expression substituted in formula (1) yields a state, denoted asy 0 . Then will bex 1 Andy 1 in formula (1), after 20 iterations, a new set of states is obtained, which are still recorded asx 0 Andy 0 and adding a new state variable to realize the transition of the chaotic orbit.
Step 1.3, the extraction length isM×(N+ 4) state variablex i }, i=1,2,…, M×(N+ 4) and converted to a size ofM×(N+ 4) first pseudo-random number matrixSWherein, in the process,Mrepresenting the number of rows of the pseudo-random number matrix,Nrepresenting the number of columns of the pseudo random number matrix.
In step 1.3, the following formula exists:
wherein,representing a first pseudo-random number matrixSTo (1)iGo to the firstjThe elements of the column are,is shown asThe state variable of the state machine is changed into a state variable,,,representing a modulo operation.
Step two, an image encryption method;
the image encryption algorithm uses a Galois field GF (257) (Galois denotes a Galois field), and a set of all elements thereof is denoted byZ 257 ={0, 1, 2, …, 256},Z 257 The remaining classes of the module 257. Three parameter vectors are definedT 1 、T 2 AndT 3 as follows:
T 1 ={3, 5, 6, 7, 10, 12, 14, 19, 20, 24, 27, 28, 33, 37, 38, 39, 40, 41, 43, 45, 47, 48, 51, 53, 54, 55, 56, 63, 65, 66, 69, 71, 74, 75, 76, 77, 78, 80, 82, 83, 85, 86, 87, 90, 91, 93, 94, 96, 97, 101, 102, 103, 105, 106, 107, 108, 109, 110, 112, 115, 119, 125, 126, 127, 130, 131, 132, 138, 142, 145, 147, 148, 149, 150, 151, 152, 154, 155, 156, 160, 161, 163, 164, 166, 167, 170, 171, 172, 174, 175, 177, 179, 180, 181, 182, 183, 186, 188, 191, 192, 194, 201, 202, 203, 204, 206, 209, 210, 212, 214, 216, 217, 218, 219, 220, 224, 229, 230, 233, 237, 238, 243, 245, 247, 250, 251, 252, 254}。
T 2 = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93, 94, 95, 96, 97, 98, 99, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 117, 118, 119, 120, 121, 122, 123, 124, 125, 126, 127, 128, 129, 130, 131, 132, 133, 134, 135, 136, 137, 138, 139, 140, 141, 142, 143, 144, 145, 146, 147, 148, 149, 150, 151, 152, 153, 154, 155, 156, 157, 158, 159, 160, 161, 162, 163, 164, 165, 166, 167, 168, 169, 170, 171, 172, 173, 174, 175, 176, 177, 178, 179, 180, 181, 182, 183, 184, 185, 186, 187, 188, 189, 190, 191, 192, 193, 194, 195, 196, 197, 198, 199, 200, 201, 202, 203, 204, 205, 206, 207, 208, 209, 210, 211, 212, 213, 214, 215, 216, 217, 218, 219, 220, 221, 222, 223, 224, 225, 226, 227, 228, 229, 230, 231, 232, 233, 234, 235, 236, 237, 238, 239, 240, 241, 242, 243, 244, 245, 246, 247, 248, 249, 250, 251, 252, 253, 254, 255}。
T 3 ={1, 3, 5, 7, 9, 11, 13, 15, 17, 19, 21, 23, 25, 27, 29, 31, 33, 35, 37, 39, 41, 43, 45, 47, 49, 51, 53, 55, 57, 59, 61, 63, 65, 67, 69, 71, 73, 75, 77, 79, 81, 83, 85, 87, 89, 91, 93, 95, 97, 99, 101, 103, 105, 107, 109, 111, 113, 115, 117, 119, 121, 123, 125, 127, 129, 131, 133, 135, 137, 139, 141, 143, 145, 147, 149, 151, 153, 155, 157, 159, 161, 163, 165, 167, 169, 171, 173, 175, 177, 179, 181, 183, 185, 187, 189, 191, 193, 195, 197, 199, 201, 203, 205, 207, 209, 211, 213, 215, 217, 219, 221, 223, 225, 227, 229, 231, 233, 235, 237, 239, 241, 243, 245, 247, 249, 251, 253, 255}。
the image encryption algorithm provided by the invention is shown in fig. 2:
step 2.1, the computer-based pseudo-random number generator generates a pseudo-random number of sizeMSecond pseudo random number matrix of x 4R。
In step 2.1, the following formula exists:
wherein,representing a sixth pseudo-random number matrixGTo (1) aiGo to the firstjThe elements of the column are,representing a second pseudo-random number matrixRTo (1) aiLine 2j-1 column of elements,representing a second pseudo-random number matrixRTo (1) aiLine 2jThe elements of the column are,representing a vectorT 1 To (1) aThe elements at the location of the position,representing a vectorT 3 To (1)The elements at the location of the position(s),,。
step 2.2, based on the second pseudo-random number matrixRAnd elements of columns 1 and 3, and a first pseudo-random number matrixSTo middleN+3 columns andN+4 columns of elements, calculated to have a size ofMX 2 third pseudo-random number matrixY。
In step 2.2, the following formula exists:
wherein,representing a third pseudo-random number matrixYTo (1)iGo to the firstjThe elements of the column are,representing a first pseudo-random number matrixSTo (1)iGo to the firstN+2+jThe elements of the column are,representing a vectorT 2 To (1)The elements at the location of the position,,。
step 2.3, based on the third pseudo-random number matrixYElement of middle 2 nd column, first pseudo random number matrixSElement of middle 2 nd column and second pseudo random number matrixRThe elements in column 2 scramble the elements of the plaintext image and are calculated to have a size ofM×NFourth pseudo random number matrix ofZ。
Step 2.3 corresponds to a forward scrambling procedure, which corresponds to the following formula:
representing a tenth pseudorandom number matrixPRow 1 and column 1 elements of (a),representing a third pseudo-random number matrixYRow 1 and column 1 elements of,representing a second pseudo-random number matrixRRow 1 and column 2 elements of (a),representing a vectorT 3 To (1) aThe elements at the location of the position,representing a fourth pseudo-random number matrixZRow 1 and column 1 elements of,representing a first pseudo-random number matrixSRow 1, column 1 elements;
wherein,representing an eleventh pseudo-random number matrixULine 1 tojThe elements of the column(s) are,representing a fourth pseudo-random number matrixZLine 1 toj-1 column of elements of a group,representing a tenth pseudorandom number matrixPLine 1 tojThe elements of the column are,representing a fourth pseudo-random number matrixZLine 1 tojThe elements of the column are,representing a first pseudo-random number matrixSLine 1 tojElements of a column;
(3) For the tenth pseudo random number matrixPOther than line 1;
(i) For the firstiRow column 1 elements:
wherein,representing an eleventh pseudo-random number matrixUTo (1)iThe elements of row column 1 are shown,representing a fourth pseudo-random number matrixZTo (1) ai-1 line 1NThe elements of the column are,representing a tenth pseudorandom number matrixPTo (1) aiThe elements of row column 1 are,representing a third pseudo-random number matrixYTo (1) aiThe elements of row column 1 are shown,representing a second pseudo-random numberMatrix arrayRTo (1) aiThe elements of row and column 2 are,representing a vectorT 3 To (1) aThe elements at the location of the position,representing a fourth pseudo-random number matrixZTo (1) aiThe elements of row column 1 are,representing a first pseudo-random number matrixSTo (1) aiRow column 1 element;
(ii) For the firstiGo to the firstjElements of the column:
wherein,representing an eleventh pseudo-random number matrixUTo (1)iGo to the firstjThe elements of the column(s) are,representing a fourth pseudo-random number matrixZTo (1) aiGo to the firstj-1 column of elements,representing a tenth pseudorandom number matrixPTo (1)iGo to the firstjThe elements of the column are,representing a fourth pseudo-random number matrixZTo (1) aiGo to the firstjThe elements of the column are,representing a first pseudo-random number matrixSTo (1)iGo to the firstjThe elements of the column.
Step 2.3 of converting the plaintext image into a fourth pseudo-random number matrixZ。
Step 2.4, based on the third pseudo-random number matrixYColumn 4 element, first pseudo random number matrixSMiddle 4 th column of elements and a second pseudo-random number matrixRThe 4 th column element scrambles the fourth pseudo random number matrixZAnd calculating a size ofM×NOf the fifth pseudo-random number matrixW。
In step 2.4, the following formula exists:
(1) The first pseudo random number matrixS1 toMAnd lines 1 to 1NInterchanging the upper 4 bits and the lower 4 bits of each element in the area surrounded by the +2 columns to obtain a ninth pseudo-random number matrixQ;
Wherein,representing a twelfth pseudo-random number matrixVTo (1) aMGo to the firstNThe elements of the column are,representing a fourth pseudo-random number matrixZTo (1) aMGo to the firstNThe elements of the column(s) are,representing a third pseudo-random number matrixYTo (1) aMThe elements of row and column 2 are,representing a second pseudo-random number matrixRTo (1) aMThe elements of row and column 4,representing a vectorT 3 To (1) aThe elements at the location of the position,representing a fifth pseudo-random number matrixWTo (1) aMGo to the firstNThe elements of the column are,representing a ninth pseudorandom number matrixQTo (1)MGo to the firstNElements of a column;
wherein,representing a twelfth pseudo-random number matrixVTo (1) aMGo to the firstjThe elements of the column are,representing a fifth pseudo-random number matrixWTo (1) aMGo to the firstjThe elements of the +1 column are,representing a fourth pseudo-random number matrixZTo (1) aMGo to the firstjThe elements of the column are,representing a fifth pseudo-random number matrixWTo (1)MGo to the firstjThe elements of the column(s) are,representing a ninth pseudorandom number matrixQTo (1) aMGo to the firstjElements of a column;
(4) For the fourth pseudo-random number matrixZIs except forMElements of other rows outside the row:
Wherein,twelfth pseudo random number matrixVTo (1) aiGo to the firstNThe elements of the column are,representing a fifth pseudo-random number matrixWTo (1) aiThe element of +1 row and column 1,representing a fourth pseudo-random number matrixZTo (1)iGo to the firstNThe elements of the column are,representing a third pseudo-random number matrixYTo (1) aiThe elements of row and column 2 are,representing a second pseudo-random number matrixRTo (1)iThe elements of row column 4 are shown,representing a vectorT 3 To (1) aThe elements at the location of the position(s),representing a fifth pseudo-random number matrixWTo (1)iGo to the firstNThe elements of the column(s) are,representing a ninth pseudo-random number matrixQTo (1)iRow, column N element;
(ii) For the firstiGo to the firstjThe elements of the column:
wherein,representing a twelfth pseudo-random number matrixVTo (1) aiGo to the firstjThe elements of the column are,representing a fifth pseudo-random number matrixWTo (1)iGo to the firstjThe elements of the +1 column are,representing a fourth pseudo-random number matrixZTo (1) aiGo to the firstjThe elements of the column are,representing a fifth pseudo-random number matrixWTo (1)iGo to the firstjThe elements of the column are,representing a ninth pseudorandom number matrixQTo (1) aiGo to the firstjThe elements of the column.
Step 2.5, use the first pseudo-random number matrixSTo (1) aN+1 columns andN+2 columns of elements, for the sixth pseudo-random number matrixGScrambling is carried out, and the matrix after scrambling is recorded as a seventh pseudo-random number matrixH。
In step 2.5, the following formula exists:
wherein,representing a seventh pseudo-random number matrixHRow 1 and column 1 elements of,representing a sixth pseudo-random number matrixGRow 1 and column 1 elements of (a),representing a first pseudo-random number matrixSLine 1 toNThe elements of the +1 column are,representing a seventh pseudo-random number matrixHTo (1) aiThe elements of row column 1 are shown,representing a seventh pseudo-random number matrixHTo (1) ai-1 row and column 1 elements,representing a sixth pseudo-random number matrixGTo (1)iThe elements of row column 1 are shown,representing a first pseudo-random number matrixSTo (1) aiGo to the firstNThe elements of the +1 column are,representing a seventh pseudo-random number matrixHRow 1 and column 2 elements of (a),representing a seventh pseudo-random number matrixHTo (1) aMThe elements of row column 1 are,representing a sixth pseudo-random number matrixGRow 1 and column 2 elements of (a),representing a first pseudo-random number matrixSLine 1 toNThe elements of column +2 are,representing a seventh pseudo-random number matrixHTo (1)iThe elements of row and column 2 are,representing a seventh pseudo-random number matrixHTo (1) ai-1 row and 2 column of elements,representing a sixth pseudo-random number matrixGTo (1) aiThe elements of row and column 2 are,representing a first pseudo-random number matrixSTo (1) aiGo to the firstN+2 columns of elements.
Step 2.6, apply the fifth pseudo-random number matrixWAnd a seventh pseudo-random number matrixHAre combined into a size ofM×(N+ 2) eighth pseudo random number matrixC。
In step 2.6, the following formula exists:
wherein,representing an eighth pseudo-random number matrixCTo (1) aiGo to the firstjThe elements of the column are,representing a fifth pseudo-random number matrixWTo (1)iGo to the firstjThe elements of the column are,representing an eighth pseudo-random number matrixCTo (1)iGo to the firstN+jThe elements of the column are,representing a seventh pseudo-random number matrixHTo (1) aiGo to the firstjThe elements of the column.
Step 2.7, based on the first pseudo-random number matrixSAnd a ninth pseudo-random number matrixQValue of (a) disturbs the eighth pseudo-random number matrixCTo calculate a new position coordinate.
In step 2.7, the following formula exists:
wherein,ka row coordinate representing the new position coordinate,ta column coordinate representing the new position coordinate,representing an eighth pseudo-random number matrixCTo (1) auGo to the firstjThe elements of the column are,representing parametersuIncrement from 1 to 1 by step sizeMIn-process accumulation of,Representing a first pseudo-random number matrixSTo (1) aiGo to the firstjThe elements of the column are,representing an eighth pseudo-random number matrixCTo (1) aiGo to the firstvThe elements of the column are,representing parametersvIncrement from 1 to 1 by step sizeN+2 in-process accumulation。
Step three, an image decryption method;
in the present invention, the principle of the image decryption algorithm is shown in fig. 3:
step 3.1, apply the first pseudo-random number matrixS1 toMAnd lines 1 to 1NThe upper 4 bits and the lower 4 bits of each element in the region surrounded by +2 columns are interchanged to obtain a ninth pseudo random number matrixQ。
Step 3.2, based on the first pseudo-random number matrixSAnd a ninth pseudo-random number matrixQA value of (d), restoring the eighth pseudo random number matrix before scramblingCThe element position of (2).
Step 3.3, decompose the eighth pseudo-random number matrixCIs a fifth pseudo random number matrixWAnd a seventh pseudo-random number matrixH。
In step 3.3, the following formula exists:
wherein,representing a fifth pseudo-random number matrixWTo (1)iGo to the firstjThe elements of the column are,representing an eighth pseudo-random number matrixCTo (1) aiGo to the firstjThe elements of the column.
Step 3.4, based on the first pseudo-random number matrixSTo (1)N+1 columns andN+2 columns the seventh pseudo-random number matrixHReverting to a sixth pseudo-random number matrixG。
In step 3.4, the following formula exists:
wherein,representing a sixth pseudo-random number matrixGRow 1 and column 1 elements of (a),representing a seventh pseudo-random number matrixHRow 1 and column 1 elements of (a),representing a first pseudo-random number matrixSLine 1 toNThe elements in the +1 column are,sixth pseudo random number matrixGTo (1) aiRow column 1 element,Representing a seventh pseudo-random number matrixHTo (1)iThe elements of row column 1 are,representing a seventh pseudo-random number matrixHTo (1) ai-1 row and column 1 elements,representing a first pseudo-random number matrixSTo (1)iGo to the firstNThe elements of the +1 column are,representing a sixth pseudo-random number matrixGRow 1 and column 2 elements of (a),representing a seventh pseudo-random number matrixHRow 1 and column 2 elements of (a),representing a seventh pseudo-random number matrixHTo (1)MThe elements of row column 1 are,representing a first pseudo-random number matrixSLine 1 toNThe elements of column +2 are,representing a sixth pseudo-random number matrixGTo (1) aiThe elements of row and column 2 are,representing a seventh pseudo-random number matrixHTo (1)iThe elements of row and column 2 are,representing a seventh pseudo-random number matrixHTo (1) ai-1 row and 2 column of elements,representing a first pseudo-random number matrixSTo (1) aiGo to the firstN+2 columns of elements.
Step 3.5, based on the ninth pseudo-random number matrixQA first pseudo random number matrixSAnd a sixth pseudo-random number matrixGA fifth pseudo random number matrixWInto a fourth pseudo-random number matrixZ。
In step 3.5, the following formula exists:
Wherein,representing a twelfth pseudo-random number matrixVTo (1) aMGo to the firstNThe elements of the column are,representing a fifth pseudo-random number matrixWTo (1) aMGo to the firstNThe elements of the column(s) are,representing a ninth pseudorandom number matrixQTo (1)MGo to the firstNThe elements of the column(s) are,representing a fourth pseudo-random number matrixZTo (1) aMGo to the firstNThe elements of the column are,representing a sixth pseudo-random number matrixGTo (1)MThe elements of row and column 2 are,representing a first pseudo-random number matrixSTo (1) aMGo to the firstNThe elements in the +4 column(s),representing a vectorT 2 To (1) aAn element at a location;
for the fifth pseudo random number matrixWFirst, theMRemoval of rowsThe external elements are as follows:
wherein,representing a twelfth pseudo-random number matrixVTo (1) aMGo to the firstjThe elements of the column(s) are,representing a fifth pseudo-random number matrixWTo (1) aMGo to the firstjThe elements of the column are,representing a ninth pseudo-random number matrixQTo (1) aMGo to the firstjThe elements of the column are,representing a thirteenth pseudo-random number matrixETo (1)MGo to the firstjThe elements of the column(s) are,representing a fourth pseudo-random number matrixZLine M ofjThe elements of the column are,representing a fifth pseudo-random number matrixWTo (1) aMGo to the firstjAn element of column + 1;
for the fifth pseudo random number matrixWIs except forMElements of other rows outside the row:
for the firstiGo to the firstNElements of the column:
wherein,representing a twelfth pseudo-random number matrixVTo (1) aiGo to the firstNThe elements of the column are,representing a fifth pseudo-random number matrixWTo (1)iGo to the firstNThe elements of the column are,representing a ninth pseudo-random number matrixQTo (1) aiGo to the firstNThe elements of the column are,representing a thirteenth pseudo-random number matrixETo (1) aiGo to the firstNThe elements of the column are,representing a sixth pseudo-random number matrixGTo (1) aiThe elements of row and column 2 are,representing a first pseudo-random number matrixSTo (1) aiGo to the firstNThe elements of column +4 are,representing a vectorT 2 To (1) aThe elements at the location of the position,representing a fourth pseudo-random number matrixZTo (1)iGo to the firstNThe elements of the column are,representing a fifth pseudo-random number matrixWTo (1)i+1 row, column 1 element;
Wherein,representing a twelfth pseudo-random number matrixVTo (1) aiGo to the firstjThe elements of the column(s) are,representing a fifth pseudo-random number matrixWTo (1) aiGo to the firstjThe elements of the column are,representing a ninth pseudorandom number matrixQTo (1) aiGo to the firstjThe elements of the column are,representing a thirteenth pseudo-random number matrixETo (1)iGo to the firstjThe elements of the column are,representing a fourth pseudo-random number matrixZTo (1) aiGo to the firstjThe elements of the column are,representing a fifth pseudo-random number matrixWTo (1) aiGo to the firstj+1 columns of elements.
Step 3.6, based on the first pseudo-random number matrixSAnd a sixth pseudo-random number matrixGApplying a fourth pseudo-random number matrixZConversion to a tenth pseudo-random number matrixPTenth pseudorandom number matrixPIs a restored plaintext image.
In step 3.6, the following formula exists:
Wherein,representing an eleventh pseudo-random number matrixURow 1 and column 1 elements of,representing a fourth pseudo-random number matrixZRow 1 and column 1 elements of,representing a first pseudo-random number matrixSRow 1 and column 1 elements of,representing a tenth pseudorandom number matrixPRow 1 and column 1 elements of,representing a sixth pseudo-random number matrixGTo (1) aThe elements of row 1 and column 1,representing a first pseudo-random number matrixSLine 1 toNThe elements of the +3 column are,representing a vectorT 2 To (1) aAn element at a location;
wherein,representing an eleventh pseudo-random number matrixULine 1 tojThe elements of the column are,representing a fourth pseudo-random number matrixZLine 1 tojThe elements of the column(s) are,representing a first pseudo-random number matrixSLine 1 tojThe elements of the column are,representing a fourteenth pseudo-random number matrixFLine 1 tojThe elements of the column(s) are,representing a tenth pseudorandom number matrixPLine 1 tojThe elements of the column are,representing a fourth pseudo-random number matrixZLine 1 toj-1 column of elements;
(3) For the fourth pseudo random number matrixZOther rows than row 1 elements:
(i) For the firstiRow column 1 elements:
wherein,representing an eleventh pseudo-random number matrixUTo (1) aiThe elements of row column 1 are shown,representing a fourth pseudo-random number matrixZTo (1)iThe elements of row column 1 are shown,representing a first pseudo-random number matrixSTo (1) aiThe elements of row column 1 are,representing a fourteenth pseudo-random number matrixFTo (1)iThe elements of row column 1 are shown,representing a sixth pseudo-random number matrixGTo (1)iThe elements of row column 1 are,representing a tenth pseudorandom number matrixPTo (1)iThe elements of row column 1 are,representing a fourth pseudo randomMachine number matrixZTo (1)i-1 line 1NElements of a column;
(ii) For the firstiGo to the firstjElements of the column:
wherein,representing an eleventh pseudo-random number matrixUTo (1) aiGo to the firstjThe elements of the column are,representing a fourth pseudo-random number matrixZTo (1) aiGo to the firstjThe elements of the column are,representing a first pseudo-random number matrixSTo (1) aiGo to the firstjThe elements of the column are,representing a fourteenth pseudo-random number matrixFTo (1) aiGo to the firstjThe elements of the column are,representing a tenth pseudorandom number matrixPTo (1) aiGo to the firstjThe elements of the column are,representing a fourth pseudo-random number matrixZTo (1) aiGo to the firstj-1 column of elements;
finally, the tenth pseudo random number matrix is obtainedPIs a restored plaintext image.
It should be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following technologies, which are well known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is specific and detailed, but not to be understood as limiting the scope of the present invention. It should be noted that various changes and modifications can be made by those skilled in the art without departing from the spirit of the invention, and these changes and modifications are all within the scope of the invention. Therefore, the protection scope of the present patent should be subject to the appended claims.
Claims (10)
1. A cryptographic processing method of a symmetric image based on domain arithmetic, the method comprising the steps of:
step one, generating a pseudo-random number matrix by using an equivalent key generator:
step 1.1, from the first subkeykey 1 With a second subkeykey 2 Respectively calculating to obtain first state variablesx 0 And a second state variabley 0 ;
Step 1.2, setting circulation variableiStep 1 delivery from 0Is increased tod-3 in the first placeiIn the second cycle, willx 0 Andy 0 substituting into the H non mapping equation to update, and circulatingM×(N+ 4) time update is completed, and the updated first state variable is still recorded asx 0 The updated second state variable is still recorded asy 0 (ii) a Wherein,drepresenting the number of subkeys;
step 1.3, the extraction length isM×(N+ 4) state variable-x i }, i=1,2,…, M×(N+ 4) and converted to a size ofM×(N+ 4) first pseudo-random number matrixSWhereinMrepresenting the number of rows of the pseudo-random number matrix,Nrepresenting the number of columns of the pseudo random number matrix;
step two, an image encryption method;
step 2.1, the computer-based pseudo-random number generator generates a pseudo-random number of sizeMSecond pseudo-random number matrix of x 4R;
Step 2.2, based on the second pseudo-random number matrixRAnd elements of columns 1 and 3, and a first pseudo-random number matrixSTo middleN+3 columns andN+4 columns of elements, one size calculated asMX 2 third pseudo-random number matrixY;
Step 2.3, based on the third pseudo-random number matrixYMiddle 2 nd column element, first pseudo random number matrixSMiddle 2 nd column element and second pseudo-random number matrixRThe elements of column 2, perturbing the elements of the plaintext image, and calculating to obtain a size ofM×NOf the fourth pseudo-random number matrixZ;
Step 2.4, based on the third pseudo-random number matrixYColumn 4 element, first pseudo random number matrixSElement of middle 4 th column and second pseudo random number matrixRThe 4 th column element scrambles the fourth pseudo random number matrixZAnd calculating a size ofM×NOf the fifth pseudo-random number matrixW;
Step 2.5, use the first pseudo-random number matrixSTo (1)N+1 columns andN+2 columns of elements, for the sixth pseudo-random number matrixGScrambling is carried out, and the matrix after scrambling is marked as a seventh pseudo-random number matrixH;
Step 2.6, apply the fifth pseudo-random number matrixWAnd a seventh pseudo-random number matrixHAre combined into a size ofM×(N+ 2) eighth pseudo random number matrixC;
Step 2.7, based on the first pseudo-random number matrixSAnd a ninth pseudo-random number matrixQIs scrambled by a value ofCTo calculate a new position coordinate;
step three, an image decryption method;
step 3.1, apply the first pseudo-random number matrixS1 toMAnd row 1 toNThe upper 4 bits and the lower 4 bits of each element in the region surrounded by +2 columns are interchanged to obtain a ninth pseudo random number matrixQ;
Step 3.2, based on the first pseudo-random number matrixSAnd a ninth pseudo-random number matrixQA value of (b), restoring the eighth pseudo random number matrix before scramblingCThe element position of (a);
step 3.3, decompose the eighth pseudo-random number matrixCIs a fifth pseudo-random number matrixWAnd a seventh pseudo-random number matrixH;
Step 3.4, based on the first pseudo-random number matrixSTo (1)N+1 columns andN+2 columns the seventh pseudo random number matrixHReverting to a sixth pseudo-random number matrixG;
Step 3.5, based on the ninth pseudo-random number matrixQA first pseudo random number matrixSAnd a sixth pseudo-random number matrixGA fifth pseudo random number matrixWInto a fourth pseudo-random number matrixZ;
Step 3.6, based on the first pseudo-random number matrixSAnd a sixth pseudo-random number matrixGApplying a fourth pseudo-random number matrixZConversion to a tenth pseudo-random number matrixPTenth pseudorandom number matrixPIs a restored plaintext image.
2. The cryptographic processing method of a symmetric image based on domain arithmetic as claimed in claim 1, wherein in step one, the hnon mapping equation is expressed as:
in step 1.1, the following formula exists:
in step 1.2, the following formula exists:
in step 1.3, the following formula exists:
3. A cryptographic processing method of symmetric images based on domain arithmetic as claimed in claim 2, characterized in that in said step 2.1, the following formula exists:
wherein,representing a sixth pseudo-random number matrixGTo (1) aiGo to the firstjThe elements of the column(s) are,representing a second pseudo-random number matrixRTo (1)iLine 2j-1 column of elements of a group,representing a second pseudo-random number matrixRTo (1) aiLine 2jThe elements of the column(s) are,representing a vectorT 1 To (1)The elements at the location of the position,representing a vectorT 3 To (1) aThe elements at the location of the position(s),,;
in said step 2.2, the following formula exists:
wherein,representing a third pseudo-random number matrixYTo (1) aiGo to the firstjThe elements of the column(s) are,representing a first pseudo-random number matrixSTo (1) aiGo to the firstN+2+jThe elements of the column(s) are,representing a vectorT 2 To (1) aThe elements at the location of the position(s),,。
4. a cryptographic processing method of a symmetric image based on domain arithmetic as claimed in claim 3, characterized in that in said step 2.3, the following formula exists:
representing a tenth pseudorandom number matrixPRow 1 and column 1 elements of (a),representing a third pseudo-random number matrixYRow 1 and column 1 elements of,representing a second pseudo-random number matrixRRow 1 and column 2 elements of (a),representing a vectorT 3 To (1) aThe elements at the location of the position(s),representing a fourth pseudo-random number matrixZRow 1 and column 1 elements of (a),representing a first pseudo-random number matrixSRow 1, column 1 elements of (a);
wherein,representing an eleventh pseudo-random number matrixULine 1 tojThe elements of the column(s) are,representing a fourth pseudo-random number matrixZLine 1 toj-1 column of elements,representing a tenth pseudorandom number matrixPLine 1 tojThe elements of the column(s) are,representing a fourth pseudo-random number matrixZLine 1 tojThe elements of the column are,representing a first pseudo-random number matrixSLine 1 tojElements of a column;
for the tenth pseudo random number matrixPOther than line 1;
for the firstiRow column 1 elements:
wherein,representing the eleventh pseudo-random number matrixUTo (1)iThe elements of row column 1 are,representing a fourth pseudo-random number matrixZTo (1)i-1 line 1NThe elements of the column(s) are,representing a tenth pseudorandom number matrixPTo (1) aiThe elements of row column 1 are,representing a third pseudo-random number matrixYTo (1)iThe elements of row column 1 are shown,representing a second pseudo-random number matrixRTo (1)iThe elements of row and column 2 are,representing a vectorT 3 To (1)The elements at the location of the position,representing a fourth pseudo-random number matrixZTo (1)iThe elements of row column 1 are,representing a first pseudo-random number matrixSTo (1) aiRow column 1 element;
for the firstiGo to the firstjElements of the column:
wherein,representing the eleventh pseudo-random number matrixUTo (1) aiGo to the firstjThe elements of the column(s) are,representing a fourth pseudo-random number matrixZTo (1) aiGo to the firstj-1 column of elements of a group,representing a tenth pseudorandom number matrixPTo (1)iGo to the firstjThe elements of the column are,representing a fourth pseudo-random number matrixZTo (1)iGo to the firstjThe elements of the column(s) are,representing a first pseudo-random number matrixSTo (1)iGo to the firstjThe elements of the column.
5. A cryptographic processing method of symmetric images based on domain arithmetic as claimed in claim 4, characterized in that in step 2.4, the following formula exists:
applying a first pseudo-random number matrixS1 toMAnd lines 1 to 1NInterchanging the upper 4 bits and the lower 4 bits of each element in the area surrounded by +2 columns to obtain a ninth pseudo random number matrixQ;
Wherein,representing a twelfth pseudo-random number matrixVTo (1) aMGo to the firstNThe elements of the column are,representing a fourth pseudo-random number matrixZTo (1) aMGo to the firstNThe elements of the column(s) are,representing a third pseudo-random number matrixYTo (1) aMThe elements of row and column 2 are,representing a second pseudo-random number matrixRTo (1)MThe elements of row and column 4,representing a vectorT 3 To (1)The elements at the location of the position,representing a fifth pseudo-random number matrixWTo (1)MGo to the firstNThe elements of the column(s) are,representing a ninth pseudorandom number matrixQTo (1)MGo to the firstNElements of a column;
wherein,representing a twelfth pseudo-random number matrixVTo (1) aMGo to the firstjThe elements of the column are,representing a fifth pseudo-random number matrixWTo (1)MGo to the firstjThe elements of the +1 column are,representing a fourth pseudo-random number matrixZTo (1)MGo to the firstjThe elements of the column are,represents a fifth dummyRandom number matrixWTo (1) aMGo to the firstjThe elements of the column are,representing a ninth pseudorandom number matrixQTo (1) aMGo to the firstjElements of a column;
for the fourth pseudo random number matrixZIs except forMElements of other rows outside the row:
Wherein,twelfth pseudo random number matrixVTo (1) aiGo to the firstNThe elements of the column(s) are,representing a fifth pseudo-random number matrixWTo (1) aiThe element of +1 row and column 1,representing a fourth pseudo-random number matrixZTo (1) aiGo to the firstNThe elements of the column are,representing a third pseudo-random number matrixYTo (1) aiThe elements of row and column 2 are,representing a second pseudo-random number matrixRTo (1) aiThe elements of row column 4 are shown,representing a vectorT 3 To (1) aThe elements at the location of the position,representing a fifth pseudo-random number matrixWTo (1) aiGo to the firstNThe elements of the column are,representing a ninth pseudorandom number matrixQTo (1) aiRow, column N element;
for the firstiGo to the firstjElements of the column:
wherein,representing a twelfth pseudo-random number matrixVTo (1) aiGo to the firstjThe elements of the column(s) are,representing a fifth pseudo-random number matrixWTo (1)iGo to the firstjThe elements of the +1 column are,representing a fourth pseudo-random number matrixZTo (1)iGo to the firstjThe elements of the column(s) are,representing a fifth pseudo-random number matrixWTo (1)iGo to the firstjThe elements of the column(s) are,representing a ninth pseudo-random number matrixQTo (1)iGo to the firstjThe elements of the column.
6. A cryptographic processing method of symmetric images based on domain arithmetic as claimed in claim 5, characterized in that in step 2.5, the following formula exists:
wherein,representing a seventh pseudo-random number matrixHRow 1 and column 1 elements of,representing a sixth pseudo-random number matrixGRow 1 and column 1 elements of (a),representing a first pseudo-random number matrixSLine 1 toNThe elements in the +1 column are,representing a seventh pseudo-random number matrixHTo (1) aiThe elements of row column 1 are shown,representing a seventh pseudo-random number matrixHTo (1) ai-1 row and 1 column of elements,representing a sixth pseudo-random number matrixGTo (1)iThe elements of row column 1 are,representing a first pseudo-random number matrixSTo (1)iGo to the firstNThe elements of the +1 column are,representing a seventh pseudo-random number matrixHRow 1 and column 2 elements of (a),representing a seventh pseudo-random number matrixHTo (1)MThe elements of row column 1 are,representing a sixth pseudo-random number matrixGRow 1 and column 2 elements of (a),representing a first pseudo-random number matrixSLine 1 toNThe elements in the +2 column(s),representing a seventh pseudo-random number matrixHTo (1)iThe elements of row and column 2 are,representing a seventh pseudo-random number matrixHTo (1)i-1 row and 2 column of elements,representing a sixth pseudo-random number matrixGTo (1)iThe elements of row and column 2 are,representing a first pseudo-random number matrixSTo (1)iGo to the firstN+2 columns of elements.
7. A cryptographic processing method of a symmetric image based on domain arithmetic as claimed in claim 6, characterized in that in step 2.6 the following formula exists:
wherein,representing an eighth pseudo-random number matrixCTo (1)iGo to the firstjThe elements of the column are,representing a fifth pseudo-random number matrixWTo (1) aiGo to the firstjThe elements of the column(s) are,representing an eighth pseudo-random number matrixCTo (1) aiGo to the firstN+jThe elements of the column are,representing a seventh pseudo-random number matrixHTo (1)iGo to the firstjElements of a column;
in step 2.7, the following formula exists:
wherein,ka row coordinate representing the coordinates of the new position,ta column coordinate representing the new position coordinate,representing an eighth pseudo-random number matrixCTo (1)uGo to the firstjThe elements of the column are,representing parametersuIncrement from 1 to 1 by step sizeMIn-process accumulation of,Representing a first pseudo-random number matrixSTo (1)iGo to the firstjThe elements of the column are,representing an eighth pseudo-random number matrixCTo (1) aiGo to the firstvThe elements of the column are,representing parametersvIncrement from 1 to 1 by step sizeN+2 in-process accumulation。
8. A cryptographic processing method of a symmetric image based on domain arithmetic as claimed in claim 7, characterized in that in step 3.3 the following formula exists:
wherein,representing a fifth pseudo-random number matrixWTo (1)iGo to the firstjThe elements of the column are,representing an eighth pseudo-random number matrixCTo (1)iGo to the firstjElements of a column;
in step 3.4, the following formula exists:
wherein,representing a sixth pseudo-random number matrixGRow 1 and column 1 elements of (a),representing a seventh pseudo-random number matrixHRow 1 and column 1 elements of (a),representing a first pseudo-random number matrixSLine 1 toNThe elements in the +1 column are,sixth pseudo random number matrixGTo (1)iThe elements of row column 1 are,representing a seventh pseudo-random number matrixHTo (1)iThe elements of row column 1 are shown,representing a seventh pseudo-random number matrixHTo (1)i-1 row and column 1 elements,representing a first pseudo-random number matrixSTo (1)iGo to the firstNThe elements in the +1 column are,representing a sixth pseudo-random number matrixGRow 1 and column 2 elements of (a),representing a seventh pseudo-random number matrixHRow 1 and column 2 elements of (a),representing a seventh pseudo-random number matrixHTo (1)MThe elements of row column 1 are shown,representing a first pseudo-random number matrixSLine 1 toNThe elements of column +2 are,representing a sixth pseudo-random number matrixGTo (1)iThe elements of row and column 2 are,representing a seventh pseudo-random number matrixHTo (1)iThe elements of row and column 2 are,representing a seventh pseudo-random number matrixHTo (1) ai-1 row and 2 column of elements,representing a first pseudo-random number matrixSTo (1) aiGo to the firstN+2 columns of elements.
9. A cryptographic processing method of a symmetric image based on domain arithmetic as claimed in claim 8, characterized in that in step 3.5 the following formula exists:
Wherein,representing a twelfth pseudo-random number matrixVTo (1) aMGo to the firstNThe elements of the column(s) are,representing a fifth pseudo-random number matrixWTo (1) aMGo to the firstNThe elements of the column(s) are,representing a ninth pseudo-random number matrixQTo (1) aMGo to the firstNThe elements of the column(s) are,representing a fourth pseudo-random number matrixZTo (1)MGo to the firstNThe elements of the column(s) are,representing a sixth pseudo-random number matrixGTo (1) aMThe elements of row and column 2 are,representing a first pseudo-random number matrixSTo (1) aMGo to the firstNThe elements in the +4 column(s),representing a vectorT 2 To (1) aAn element at a location;
for the fifth pseudo random number matrixWFirst, theMRemoval of rowsThe external elements are as follows:
wherein,representing a twelfth pseudo-random number matrixVTo (1) aMGo to the firstjThe elements of the column are,representing a fifth pseudo-random number matrixWTo (1)MGo to the firstjThe elements of the column are,representing a ninth pseudo-random number matrixQTo (1) aMGo to the firstjThe elements of the column(s) are,representing a thirteenth pseudo-random number matrixETo (1) aMGo to the firstjThe elements of the column(s) are,representing a fourth pseudo-random number matrixZLine M ofjThe elements of the column are,representing a fifth pseudo-random number matrixWTo (1) aMGo to the firstjAn element of column + 1;
for the fifth pseudo random number matrixWIs except forMElements of other rows outside the row:
for the firstiGo to the firstNElements of the column:
wherein,representing a twelfth pseudo-random number matrixVTo (1) aiGo to the firstNThe elements of the column are,representing a fifth pseudo-random number matrixWTo (1) aiGo to the firstNThe elements of the column are,representing a ninth pseudorandom number matrixQTo (1) aiGo to the firstNThe elements of the column(s) are,representing a thirteenth pseudo-random number matrixETo (1) aiGo to the firstNThe elements of the column are,representing a sixth pseudo-random number matrixGTo (1) aiThe elements of row and column 2 are,representing a first pseudo-random number matrixSTo (1) aiGo to the firstNThe elements of column +4 are,representing a vectorT 2 To (1) aThe elements at the location of the position,representing a fourth pseudo-random number matrixZTo (1) aiGo to the firstNThe elements of the column(s) are,representing a fifth pseudo-random number matrixWTo (1)i+1 row, column 1 element;
Wherein,representing a twelfth pseudo-random number matrixVTo (1) aiGo to the firstjThe elements of the column are,representing a fifth pseudo-random number matrixWTo (1) aiGo to the firstjThe elements of the column are,representing a ninth pseudo-random number matrixQTo (1) aiGo to the firstjThe elements of the column are,representing a thirteenth pseudo random number matrixETo (1)iGo to the firstjThe elements of the column are,representing a fourth pseudo-random number matrixZTo (1)iGo to the firstjThe elements of the column are,representing a fifth pseudo-random number matrixWTo (1)iGo to the firstj+1 columns of elements.
10. A method of cryptographic processing of symmetric images based on domain arithmetic according to claim 9, characterized in that in step 3.6 the following formula exists:
Wherein,representing an eleventh pseudo-random number matrixURow 1 and column 1 elements of (a),representing a fourth pseudo-random number matrixZRow 1 and column 1 elements of (a),representing a first pseudo-random number matrixSRow 1 and column 1 elements of,representing a tenth pseudorandom number matrixPRow 1 and column 1 elements of,representing a sixth pseudo-random number matrixGRow 1 and column 1 elements of (a),representing a first pseudo-random number matrixSLine 1 toNThe elements in the +3 column(s),representing a vectorT 2 To (1)An element at a location;
wherein,representing an eleventh pseudo-random number matrixULine 1 tojThe elements of the column(s) are,representing a fourth pseudo-random number matrixZLine 1 tojThe elements of the column(s) are,representing a first pseudo-random number matrixSLine 1 tojThe elements of the column are,representing a fourteenth pseudo-random number matrixFLine 1 tojThe elements of the column(s) are,representing a tenth pseudorandom number matrixPLine 1 tojThe elements of the column are,representing a fourth pseudo-random number matrixZLine 1 toj-1 column of elements;
for the fourth pseudo random number matrixZOther rows than row 1 elements:
for the firstiRow column 1 elements:
wherein,representing an eleventh pseudo-random number matrixUTo (1) aiThe elements of row column 1 are shown,representing a fourth pseudo-random number matrixZTo (1)iThe elements of row column 1 are shown,representing a first pseudo-random number matrixSTo (1)iThe elements of row column 1 are,representing a fourteenth pseudo-random number matrixFTo (1) aiThe elements of row column 1 are shown,representing a sixth pseudo-random number matrixGTo (1) aiThe elements of row column 1 are shown,representing a tenth pseudorandom number matrixPTo (1)iThe elements of row column 1 are,representing a fourth pseudo-random number matrixZTo (1) ai-1 line 1NElements of a column;
for the firstiGo to the firstjElements of the column:
wherein,representing an eleventh pseudo-random number matrixUTo (1) aiGo to the firstjThe elements of the column(s) are,representing a fourth pseudo-random number matrixZTo (1) aiGo to the firstjThe elements of the column are,representing a first pseudo-random number matrixSTo (1) aiGo to the firstjThe elements of the column are,representing a fourteenth pseudo-random number matrixFTo (1) aiGo to the firstjThe elements of the column are,representing a tenth pseudorandom number matrixPTo (1) aiGo to the firstjThe elements of the column are,representing a fourth pseudo-random number matrixZTo (1) aiGo to the firstj-1 column of elements.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211210136.6A CN115276992A (en) | 2022-09-30 | 2022-09-30 | Domain arithmetic-based symmetric image password processing method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211210136.6A CN115276992A (en) | 2022-09-30 | 2022-09-30 | Domain arithmetic-based symmetric image password processing method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115276992A true CN115276992A (en) | 2022-11-01 |
Family
ID=83757916
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211210136.6A Pending CN115276992A (en) | 2022-09-30 | 2022-09-30 | Domain arithmetic-based symmetric image password processing method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115276992A (en) |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108234813A (en) * | 2018-01-11 | 2018-06-29 | 重庆邮电大学 | Plaintext associated images Encryption Algorithm based on Hyperchaotic Chen System |
-
2022
- 2022-09-30 CN CN202211210136.6A patent/CN115276992A/en active Pending
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108234813A (en) * | 2018-01-11 | 2018-06-29 | 重庆邮电大学 | Plaintext associated images Encryption Algorithm based on Hyperchaotic Chen System |
Non-Patent Citations (4)
Title |
---|
SUBHRAJYOTI DEB等: "Secure image encryption scheme using high efficiency word-oriented feedback shift register over finite field", 《MULTIMEDIA TOOLS AND APPLICATIONS (2019)》 * |
朱淑芹等: "密钥动态选择机制的图像加密算法", 《计算机工程与应用》 * |
蒋诗意等: "基于改进型Henon映射的图像加密算法", 《杭州电子科技大学学报(自然科学版)》 * |
谢国波等: "二次广义cat映射的混合混沌图像加密算法", 《计算机工程与应用》 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6763363B1 (en) | Computer efficient linear feedback shift register | |
CN104488218B (en) | Encryption device, decryption device, encryption method, decryption method | |
CN105051677B (en) | Mask is carried out with shared random bit | |
CN102196320B (en) | Image encrypting and decrypting system | |
Abraham et al. | Secure image encryption algorithms: A review | |
Zhang et al. | Cryptanalysis and improvement of an image encryption algorithm based on hyper-chaotic system and dynamic S-box | |
CN108964872B (en) | Encryption method and device based on AES | |
CN101378314B (en) | Method for generating key sequence and apparatus for generating cipher key | |
CN106059752B (en) | A kind of whitepack password encipher-decipher method based on expansion ciphertext | |
TW201721407A (en) | Hardware assisted fast pseudorandom number generation | |
CN110958108B (en) | Asymmetric image encryption method based on RSA and fractional order chaotic system | |
CN111597574A (en) | Parallel image encryption system and method based on spatial diffusion structure | |
CN110535624A (en) | A kind of medical image method for secret protection applied to DICOM format | |
CN109361830B (en) | Image encryption method based on plaintext | |
CN107578363B (en) | Digital image encryption and decryption method based on multiple chaotic chain algorithms and bit planes | |
El Bourakkadi et al. | Improved vigenere using affine functions surrounded by two genetic crossovers for image encryption | |
Sharma et al. | Cryptanalysis of image encryption algorithm based on pixel shuffling and chaotic S-box transformation | |
CN113076551B (en) | Color image encryption method based on lifting scheme and cross-component scrambling | |
CN108124076A (en) | Image encryption method based on isomery chaos and keccak hash functions | |
CN115276992A (en) | Domain arithmetic-based symmetric image password processing method | |
CN113407955A (en) | Image encryption method, medium, equipment and terminal based on four-dimensional hyper-chaotic system | |
Charalampidis et al. | A novel piecewise chaotic map for image encryption | |
CN104837131B (en) | A kind of batch Cramer-Shoup cryptographic methods based on batch processing multi-exponentiation | |
CN115834021A (en) | Cloud medical image encryption method based on neural network and half tensor product | |
CN115208551A (en) | Image space domain encryption and decryption method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20221101 |