CN116647327A - Programmable edge controller communication method based on image encryption - Google Patents

Programmable edge controller communication method based on image encryption Download PDF

Info

Publication number
CN116647327A
CN116647327A CN202310921053.6A CN202310921053A CN116647327A CN 116647327 A CN116647327 A CN 116647327A CN 202310921053 A CN202310921053 A CN 202310921053A CN 116647327 A CN116647327 A CN 116647327A
Authority
CN
China
Prior art keywords
matrix
sequence
image
pixel
dna
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310921053.6A
Other languages
Chinese (zh)
Other versions
CN116647327B (en
Inventor
姚文广
刘丽婷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aotuo Technology Co ltd
Original Assignee
Aotuo Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aotuo Technology Co ltd filed Critical Aotuo Technology Co ltd
Priority to CN202310921053.6A priority Critical patent/CN116647327B/en
Publication of CN116647327A publication Critical patent/CN116647327A/en
Application granted granted Critical
Publication of CN116647327B publication Critical patent/CN116647327B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/10Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
    • H04N19/102Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the element, parameter or selection affected or controlled by the adaptive coding
    • H04N19/13Adaptive entropy coding, e.g. adaptive variable length coding [AVLC] or context adaptive binary arithmetic coding [CABAC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/90Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using coding techniques not provided for in groups H04N19/10-H04N19/85, e.g. fractals
    • H04N19/93Run-length coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/34Encoding or coding, e.g. Huffman coding or error correction
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Power Engineering (AREA)
  • Image Processing (AREA)

Abstract

The invention relates to the technical field of image encryption communication, in particular to a programmable edge controller communication method based on image encryption, which is characterized in that a novel 2D-LCLMCP chaotic system is provided, the chaotic characteristic analysis is carried out on the novel 2D-LCLMCP chaotic system, NIST test proves that the novel 2D-LCLMCP chaotic system has good chaotic characteristic, the requirement of an encryption algorithm can be met, a novel initial value construction mode is designed by combining SHA-512 and an image to be encrypted aiming at the 2D-LCLMCP chaotic system, an initial value which is not easy to crack and changes along with plaintext can be generated, and a novel image encryption algorithm is constructed by combining DNA coding, position scrambling and confusion, so that the novel image encryption algorithm has better encryption performance.

Description

Programmable edge controller communication method based on image encryption
Technical Field
The invention relates to the technical field of image encryption communication, in particular to a programmable edge controller communication method based on image encryption.
Background
In the information transmission of the programmable edge controller, the problem of image safety exists, so that the image needs to be encrypted in the information transmission, the traditional encryption technology faces great safety risks and long encryption time when the image is encrypted due to the self characteristics of correlation, redundancy and the like between adjacent pixels of the image, and a new encryption algorithm is needed to adapt to the protection work of the image.
Disclosure of Invention
Therefore, the invention aims to provide a programmable edge controller communication method based on image encryption, so as to solve the problem of insufficient security performance of the conventional encryption algorithm.
Based on the above object, the present invention provides a programmable edge controller communication method based on image encryption, which includes encrypting an image when performing image communication of the programmable edge controller, the encrypting the image including the steps of:
s1, reading an image to be encrypted, and converting the image to be encrypted into a pixel matrix;
s2, calculating decimal sum of the pixel matrix, and calculating an initial value of the 2D-LCLMCP chaotic system by combining SHA-512;
s3, iterating an initial value of the 2D-LCLMCP chaotic system to generate a pseudo-random sequence, and performing modulo and integer arithmetic on the pseudo-random sequence to obtain a position sequence and an integer sequence;
s4, performing DNA coding on the pixel matrix to convert the pixel matrix into a DNA coding matrix, and performing position scrambling on the DNA coding matrix by using a position sequence to obtain a scrambled DNA coding matrix;
s5, decoding the DNA coding matrix with the scrambled positions;
s6, performing confusion operation on each pixel of the decoded matrix by using an integer sequence to obtain a pixel matrix, and adjusting the row number and the column number of the obtained pixel matrix to convert the row number and the column number of the obtained pixel matrix into a ciphertext image.
Preferably, the system equation of the 2D-LCLMCP chaotic system is as follows:
wherein ,acdare all real parameters, x n ,y n ,z n ,x n+1 ,y n+1 and zn+1 Are state variables.
Preferably, in step S2, calculating an initial value of the 2D-LCLMCP chaotic system includes:
reading data of an image to be encrypted, and solving decimal pixel sum of the data;
the pixel sum is taken as the input of SHA-512, resulting in a hash value of 512 bits:m 1 ,m 2 ,m 3 ,...,m 64
the hash value is calculated as follows to obtain an initial value of the system,
wherein ,x 1 (1),x 2 (1),x 3 (1) Is the original initial value of the value,x 1 '(1),x 2 '(1),x 3 '(1) Is a new initial value.
Preferably, in step S4, DNA encoding the pixel matrix into a DNA matrix includes:
the four bases in the DNA sequence are respectively represented by two binary numbers to obtain 24 different coding modes;
8 coding modes meeting complementary rules are selected from the codes to form a DNA coding table;
converting each bit pixel point of the image P to be encrypted of MxN into an eight-bit binary number to obtain an 8 xMxN binary matrix;
will beP 1 Every two bits of the DNA code table are converted into a corresponding base to obtain a DNA code matrix with the size of 4 xMxNP 2
Preferably, obtaining the sequence of positions comprises:
iterating the initial value of the chaotic system to obtain a pseudo-random sequence;
selecting 4 XM XN values to obtain chaos sequenceY 1 ={Y 1 (1),Y 1 (2),Y 1 (3),…,Y 1 (4×M×N)};
For a pair ofY 1 The following operations are performed:obtaining a position sequence;
wherein [:]=sort (:) represents an ascending function,lY 1 is the sequence after the scrambling of the sequence,fY 1 recording the original position;
in step S4, performing position scrambling on the DNA encoding matrix includes:
scrambling the DNA coding matrix by using the position sequence to obtain a scrambled DNA coding matrix, whereinlY 1 And converting the sequence into a matrix with a fixed line width to obtain a scrambled DNA coding matrix.
Preferably, in step S5, decoding the DNA encoding matrix after the position scrambling includes:
and converting the DNA coding matrix subjected to the position scrambling into a binary matrix, and converting each eight bits into a pixel point to obtain an MXN decoded matrix.
Preferably, deriving the integer sequence comprises:
selecting a sequence with M multiplied by N size through the proposed chaotic systemWWill beWEach bit of the sequence is processed into numbers between 0 and 255 to obtain an integer sequenceT
Step S6 further comprises:
each pixel after aliasing is calculated according to the following formula:
wherein P 4 (i) Each pixel of the pre-pixel matrix is to be confused,P 5 (i) Is the images after confusionEach pixel point of the pixel matrix,Tis a sequence of integers.
Preferably, the method further comprises decrypting the ciphertext image, the decrypting process comprising:
extracting a ciphertext image and converting the ciphertext image into a pixel matrix;
performing inverse confusion operation on the pixel matrix;
DNA coding is carried out on the pixel matrix after the inverse confusion operation;
performing inverse position scrambling operation on the DNA coding matrix;
performing DNA decoding operation on the DNA coding matrix with the scrambled reverse positions;
and converting the decrypted pixel matrix into an original image.
The invention has the beneficial effects that:
1. the new 2D-LCLMCP chaotic system is provided, and through carrying out chaotic characteristic analysis on the system, NIST test proves that the system has good chaotic characteristics and can meet the requirements of encryption algorithms;
2. aiming at a 2D-LCLMCP chaotic system, a new initial value construction mode is designed by combining SHA-512 with an image to be encrypted, and an initial value which is not easy to crack and changes along with a plaintext can be generated;
3. combining with DNA coding, position scrambling and confusion to construct a new image encryption algorithm has better encryption performance.
Drawings
In order to more clearly illustrate the invention or the technical solutions of the prior art, the drawings which are used in the description of the embodiments or the prior art will be briefly described, it being obvious that the drawings in the description below are only of the invention and that other drawings can be obtained from them without inventive effort for a person skilled in the art.
FIG. 1 is a schematic diagram of an image encryption flow according to an embodiment of the present invention;
FIG. 2 is a NIST test result diagram of the 2D-LCLMCP chaotic system according to the embodiment of the invention;
FIG. 3 is a diagram of the result of histogram analysis of an image encryption scheme according to an embodiment of the present invention;
FIG. 4 is a graph of the result of entropy analysis of the image encryption scheme information according to an embodiment of the present invention;
fig. 5 is a graph of correlation analysis results of an image encryption scheme according to an embodiment of the present invention.
Detailed Description
The present invention will be further described in detail with reference to specific embodiments in order to make the objects, technical solutions and advantages of the present invention more apparent.
As shown in fig. 1, an embodiment of the present disclosure provides a programmable edge controller communication method based on image encryption, including encrypting an image when performing image communication of the programmable edge controller, where encrypting the image includes the following steps:
s1, reading an image to be encrypted, and converting the image into a pixel matrixP 1
S2, calculating decimal sum of the pixel matrix, and calculating an initial value of the 2D-LCLMCP chaotic system by combining SHA-512;
for example, the system equation of the 2D-LCLMCP chaotic system is:
wherein ,acdare all real parameters, x n ,y n ,z n ,x n+1 ,y n+1 and zn+1 Are state variables.
The novel 2D-LCLMCP chaotic system provided by the invention has good chaotic characteristics through chaotic characteristic analysis, and NIST test proves that the chaotic system can meet the requirements of encryption algorithms, and the test result is shown in figure 2.
Initial values of the 2D-LCLMCP chaotic system include:
reading data of an image to be encrypted, and solving decimal pixel sum of the data;
the pixel sum is taken as the input of SHA-512, resulting in a hash value of 512 bits:m 1 ,m 2 ,m 3 ,...,m 64
the hash value is calculated as follows to obtain an initial value of the system,
wherein ,x 1 (1),x 2 (1),x 3 (1) Is the original initial value of the value,x 1 '(1),x 2 '(1),x 3 '(1) The initial value is a new initial value, and the initial value which is not easy to crack and changes along with the plaintext can be generated through the initial value construction mode.
S3, iterating an initial value of the 2D-LCLMCP chaotic system to generate a pseudo-random sequence, and performing modulo and integer arithmetic on the pseudo-random sequence to obtain a position sequence and an integer sequence;
the obtaining of the position sequence comprises:
iterating the initial value of the chaotic system to obtain a pseudo-random sequence;
selecting 4 XM XN values to obtain chaos sequenceY 1 ={Y 1 (1),Y 1 (2),Y 1 (3),…,Y 1 (4×M×N)};
For a pair ofY 1 The following operations are performed:obtaining a position sequence;
wherein [:]=sort (:) represents an ascending function,lY 1 is the sequence after the scrambling of the sequence,fY 1 the original position is recorded.
The obtaining of the integer sequence includes:
selecting a sequence with M multiplied by N size through the proposed chaotic systemWWill beWEach bit of the sequence is processed into numbers between 0 and 255 to obtain an integer sequenceT
S4, pixel matrixP 1 Conversion of DNA coding into DNA coding matrixP 2 Specifically:
the DNA encoding of the pixel matrix into a DNA matrix comprises:
the four bases in the DNA sequence are respectively represented by two binary numbers to obtain 24 different coding modes;
8 coding modes meeting complementary rules are selected from the codes to form a DNA coding table;
converting each bit pixel point of the image P to be encrypted of MxN into an eight-bit binary number to obtain an 8 xMxN binary matrix;
will beP 1 Every two bits of the DNA code table are converted into a corresponding base to obtain a DNA code matrix with the size of 4 xMxNP 2
Encoding DNA using position sequencesP 2 Position scrambling is carried out to obtain a DNA coding matrix after scramblingP 3
Specifically, the scrambling of the DNA encoding matrix includes:
scrambling the DNA coding matrix by using the position sequence to obtain a scrambled DNA coding matrix, whereinlY 1 And converting the sequence into a matrix with a fixed line width to obtain a scrambled DNA coding matrix.
S5, decoding the DNA coding matrix with the scrambled positions;
specifically, decoding the positionally scrambled DNA encoding matrix includes:
and converting the DNA coding matrix subjected to the position scrambling into a binary matrix, and converting each eight bits into a pixel point to obtain an MXN decoded matrix.
S6, matrix after decodingP 4 Is subjected to aliasing operation by using integer sequence to obtain pixel matrixP 5 And adjusting the row number and the column number of the obtained pixel matrix, and converting the row number and the column number into a ciphertext image.
Specifically, the obfuscation operation includes:
each pixel after aliasing is calculated according to the following formula:
wherein P 4 (i) Each pixel of the pre-pixel matrix is to be confused,P 5 (i) Is each pixel point of each pixel matrix after confusion,Tis a sequence of integers.
In the present invention, the number of elements in the chaotic sequence and the DNA encoding matrix is the same.
By combining DNA coding and position scrambling, a new image encryption algorithm is constructed by confusion, and the method has good encryption performance.
In order to verify that the method has better encryption performance, the MATLAB is utilized to realize the algorithm, the histogram analysis, the information entropy analysis and the correlation analysis are carried out on the algorithm, and the found scheme data are better and close to ideal values through the analysis of the result and the comparison with other method data.
The results of the experiment are as follows:
(1) The histogram analysis is shown in fig. 3:
the pixel values before encryption are concentrated through analysis, and the pixel values after encryption are uniform, which shows that the algorithm can resist statistical attack well.
(2) Information entropy
The degree of uncertainty of the image data can be discriminated using the information entropy. The closer the information entropy is to 8, the more disordered the data is, and the better the encryption performance of the corresponding algorithm is.
We selected standard test chart Lena for testing, the results are shown in fig. 4, the obtained data before and after encryption are as follows, and comparing the results to find that our data is superior to the image encryption model in Singh, a.k., chatterjee, k., singh, a. An image security model based on chaos and dna cryptography for iiot images IEEE Transacations on Industrial Informatics (2), 1957-1964 (2023).
(3) Correlation analysis
An image can be focused on because of the correlation between its neighboring pixels. We selected Lena's original image and encrypted image, randomly selecting 8000 points in three channels, and calculating correlation coefficients in horizontal, vertical and diagonal directions, as shown in fig. 5.
The correlation coefficients all tend to 1 before encryption and all approach 0 after encryption, and our method is superior to the image encryption algorithm in Wu, y., zhang, l., berretti, s., wan, s., medical image encryption by content-aware dna computing for secure healthcare IEEE Transactions on Industrial Informatics 19 (2), 2089-2098 (2023).
As one embodiment, in the communication process, the method further comprises decrypting the ciphertext image, and the decryption process comprises:
extracting a ciphertext image and converting the ciphertext image into a pixel matrix;
performing inverse confusion operation on the pixel matrix;
DNA coding is carried out on the pixel matrix after the inverse confusion operation;
performing inverse position scrambling operation on the DNA coding matrix;
performing DNA decoding operation on the DNA coding matrix with the scrambled reverse positions;
and converting the decrypted pixel matrix into an original image.
Those of ordinary skill in the art will appreciate that: the discussion of any of the embodiments above is merely exemplary and is not intended to suggest that the scope of the invention (including the claims) is limited to these examples; the technical features of the above embodiments or in the different embodiments may also be combined within the idea of the invention, the steps may be implemented in any order and there are many other variations of the different aspects of the invention as described above, which are not provided in detail for the sake of brevity.
The present invention is intended to embrace all such alternatives, modifications and variances which fall within the broad scope of the appended claims. Therefore, any omission, modification, equivalent replacement, improvement, etc. of the present invention should be included in the scope of the present invention.

Claims (7)

1. A programmable edge controller communication method based on image encryption, comprising encrypting an image when the image communication of the programmable edge controller is performed, characterized in that the encrypting the image comprises the following steps:
s1, reading an image to be encrypted, and converting the image to be encrypted into a pixel matrix;
s2, calculating decimal sum of the pixel matrix, and calculating an initial value of the 2D-LCLMCP chaotic system by combining SHA-512;
s3, iterating an initial value of the 2D-LCLMCP chaotic system to generate a pseudo-random sequence, and performing modulo and integer arithmetic on the pseudo-random sequence to obtain a position sequence and an integer sequence;
wherein obtaining the integer sequence comprises:
selecting a sequence with M multiplied by N size through the proposed chaotic systemWWill beWEach bit of the sequence is processed into numbers between 0 and 255 to obtain an integer sequenceT
S4, performing DNA coding on the pixel matrix to convert the pixel matrix into a DNA coding matrix, and performing position scrambling on the DNA coding matrix by using a position sequence to obtain a scrambled DNA coding matrix;
s5, decoding the DNA coding matrix with the scrambled positions;
s6, performing confusion operation on each pixel of the decoded matrix by using an integer sequence to obtain a pixel matrix, adjusting the row number and the column number of the obtained pixel matrix, and converting the row number and the column number of the obtained pixel matrix into a ciphertext image;
step S6 further comprises:
each pixel after aliasing is calculated according to the following formula:
wherein P 4 (i) Each pixel of the pre-pixel matrix is to be confused,P 5 (i) Is each pixel point of each pixel matrix after confusion,Tis a sequence of integers.
2. The programmable edge controller communication method based on image encryption of claim 1, wherein the system equation of the 2D-LCLMCP chaotic system is:
wherein ,acdare all real parameters, x n ,y n ,z n ,x n+1 ,y n+1 and zn+1 Are state variables.
3. The method of claim 2, wherein calculating an initial value of the 2D-LCLMCP chaotic system in step S2 includes:
reading data of an image to be encrypted, and solving decimal pixel sum of the data;
the pixel sum is taken as the input of SHA-512, resulting in a hash value of 512 bits:m 1 ,m 2 ,m 3 ,...,m 64
the hash value is calculated as follows to obtain an initial value of the system,
wherein ,x 1 (1),x 2 (1),x 3 (1) Is the original initial value of the value,x 1 '(1),x 2 '(1),x 3 '(1) Is a new initial value.
4. The method of claim 1, wherein in step S4, the step of DNA encoding the pixel matrix into a DNA matrix comprises:
the four bases in the DNA sequence are respectively represented by two binary numbers to obtain 24 different coding modes;
8 coding modes meeting complementary rules are selected from the codes to form a DNA coding table;
converting each bit pixel point of the image P to be encrypted of MxN into an eight-bit binary number to obtain an 8 xMxN binary matrix;
will beP 1 Every two bits of the DNA code table are converted into a corresponding base to obtain a DNA code matrix with the size of 4 xMxNP 2
5. The method of claim 1, wherein the image encryption based programmable edge controller communication is configured to,
the obtaining of the position sequence comprises:
iterating the initial value of the chaotic system to obtain a pseudo-random sequence;
selecting 4 XM XN values to obtain chaos sequenceY 1 ={Y 1 (1),Y 1 (2),Y 1 (3),…,Y 1 (4×M×N)};
For a pair ofY 1 The following operations are performed:obtaining a position sequence;
wherein [:]=sort (:) represents an ascending function,lY 1 is the sequence after the scrambling of the sequence,fY 1 recording the original position;
in step S4, performing position scrambling on the DNA encoding matrix includes:
scrambling the DNA coding matrix by using the position sequence to obtain a scrambled DNA coding matrix, whereinlY 1 And converting the sequence into a matrix with a fixed line width to obtain a scrambled DNA coding matrix.
6. The method of claim 1, wherein decoding the scrambled DNA encoding matrix in step S5 comprises:
and converting the DNA coding matrix subjected to the position scrambling into a binary matrix, and converting each eight bits into a pixel point to obtain an MXN decoded matrix.
7. The method of claim 1, further comprising decrypting the ciphertext image, the decrypting comprising:
extracting a ciphertext image and converting the ciphertext image into a pixel matrix;
performing inverse confusion operation on the pixel matrix;
DNA coding is carried out on the pixel matrix after the inverse confusion operation;
performing inverse position scrambling operation on the DNA coding matrix;
performing DNA decoding operation on the DNA coding matrix with the scrambled reverse positions;
and converting the decrypted pixel matrix into an original image.
CN202310921053.6A 2023-07-26 2023-07-26 Programmable edge controller communication method based on image encryption Active CN116647327B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310921053.6A CN116647327B (en) 2023-07-26 2023-07-26 Programmable edge controller communication method based on image encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310921053.6A CN116647327B (en) 2023-07-26 2023-07-26 Programmable edge controller communication method based on image encryption

Publications (2)

Publication Number Publication Date
CN116647327A true CN116647327A (en) 2023-08-25
CN116647327B CN116647327B (en) 2023-10-13

Family

ID=87643739

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310921053.6A Active CN116647327B (en) 2023-07-26 2023-07-26 Programmable edge controller communication method based on image encryption

Country Status (1)

Country Link
CN (1) CN116647327B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108388808A (en) * 2018-03-05 2018-08-10 郑州轻工业学院 Image encryption method based on Xi Er encryption and dynamic DNA encoding
AU2019100036A4 (en) * 2019-01-14 2019-02-28 Wenying Wen A symmetric encryption scheme for color light field image
CN109918923A (en) * 2019-01-25 2019-06-21 哈尔滨理工大学 A kind of multichannel color image chaos encrypting method based on DNA encoding
KR20190104728A (en) * 2018-03-02 2019-09-11 인천대학교 산학협력단 Apparatus and Method for Encrypting Based on Combined Chaos in Body Area Network
US20200287704A1 (en) * 2020-05-22 2020-09-10 Qiang Zhang Color Image Encryption Method Based on DNA Strand Displacement Analog Circuit
CN112084514A (en) * 2020-09-01 2020-12-15 宁波海特技术转移有限公司 Image encryption method and device for chaos sequence and DNA mutation
CN113129196A (en) * 2021-04-07 2021-07-16 中国人民解放军海军工程大学 Image encryption method based on DNA sequence and memristor chaos
CN113225449A (en) * 2021-05-27 2021-08-06 郑州轻工业大学 Image encryption method based on chaos sequence and DNA coding
WO2022077793A1 (en) * 2020-10-16 2022-04-21 齐鲁工业大学 Image encryption communication algorithm based on two-dimensional lag-complex logistic mapping, and image decryption communication algorithm based on two-dimensional lag-complex logistic mapping
CN114549266A (en) * 2021-12-30 2022-05-27 河南大学 Image encryption method based on DNA replacement rule and chaotic system
WO2023040365A1 (en) * 2021-09-18 2023-03-23 大连理工大学 Image encryption method based on multi-scale compressed sensing and markov model

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20190104728A (en) * 2018-03-02 2019-09-11 인천대학교 산학협력단 Apparatus and Method for Encrypting Based on Combined Chaos in Body Area Network
CN108388808A (en) * 2018-03-05 2018-08-10 郑州轻工业学院 Image encryption method based on Xi Er encryption and dynamic DNA encoding
AU2019100036A4 (en) * 2019-01-14 2019-02-28 Wenying Wen A symmetric encryption scheme for color light field image
CN109918923A (en) * 2019-01-25 2019-06-21 哈尔滨理工大学 A kind of multichannel color image chaos encrypting method based on DNA encoding
US20200287704A1 (en) * 2020-05-22 2020-09-10 Qiang Zhang Color Image Encryption Method Based on DNA Strand Displacement Analog Circuit
CN112084514A (en) * 2020-09-01 2020-12-15 宁波海特技术转移有限公司 Image encryption method and device for chaos sequence and DNA mutation
WO2022077793A1 (en) * 2020-10-16 2022-04-21 齐鲁工业大学 Image encryption communication algorithm based on two-dimensional lag-complex logistic mapping, and image decryption communication algorithm based on two-dimensional lag-complex logistic mapping
CN113129196A (en) * 2021-04-07 2021-07-16 中国人民解放军海军工程大学 Image encryption method based on DNA sequence and memristor chaos
CN113225449A (en) * 2021-05-27 2021-08-06 郑州轻工业大学 Image encryption method based on chaos sequence and DNA coding
WO2023040365A1 (en) * 2021-09-18 2023-03-23 大连理工大学 Image encryption method based on multi-scale compressed sensing and markov model
CN114549266A (en) * 2021-12-30 2022-05-27 河南大学 Image encryption method based on DNA replacement rule and chaotic system

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
SIMIAO WANG ET AL.: "Chaotic color image encryption based on 4D chaotic maps and DNA sequence", 《OPTICS &LASERTECHNOLOGY》, vol. 148 *
全俊杰;蔡清波;: "一种基于Lorenz混沌系统的有效图像加密算法", 泉州师范学院学报, no. 02 *
王宏达;: "一种基于混沌系统的新型图像加密算法", 光学技术, no. 03 *

Also Published As

Publication number Publication date
CN116647327B (en) 2023-10-13

Similar Documents

Publication Publication Date Title
CN110570344B (en) Image encryption method based on random number embedding and DNA dynamic coding
Abraham et al. Secure image encryption algorithms: A review
Wong Image encryption using chaotic maps
CN114549266B (en) Image encryption method based on DNA replacement rule and chaotic system
CN115865431A (en) Network security sharing method for private data
CN109242751B (en) Image encryption method based on chaotic tent mapping and DNA decoding
JP2000511755A (en) How to encrypt binary code information
CN112769545B (en) Image encryption method based on adjacent pixel Joseph transformation and Mealy state machine
Sultana et al. A new approach to hide data in color image using LSB steganography technique
CN114374775A (en) Image encryption method based on Julia set and DNA coding
Patro et al. Novel data encryption scheme using DNA computing
Jung Comparative histogram analysis of LSB-based image steganography
CN111444522B (en) Random blocking chaotic image encryption method
Saranya et al. A composite image cipher using DNA sequence and genetic algorithm
Ahmad Cryptanalysis of chaos based secure satellite imagery cryptosystem
Srinivasu et al. A multilevel image encryption based on duffing map and modified DNA hybridization for transfer over an unsecured channel
CN115379066B (en) Encryption image reversible data encryption and decryption method based on self-adaptive compression coding
CN116647327B (en) Programmable edge controller communication method based on image encryption
Swain et al. A dynamic approach to image steganography using the three least significant bits and extended hill cipher
Zhang et al. DNA coding and central dogma based image encryption using Vigenere cipher and chaos map
Saranya et al. A hybrid algorithm for enhanced image security using chaos and DNA theory
Yan et al. Design of image confusion-diffusion cryptosystem based on vector quantization and cross chaotic map
Hua et al. Secure reversible data hiding in encrypted images using cipher-feedback secret sharing
Hussein et al. A modified table lookup substitution method for hiding data in DNA
Kumari et al. A novel image encryption scheme with Huffman encoding and steganography technique

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant