CN117454394B - Image encryption method and system based on fuzzy neural network fixed time synchronization - Google Patents

Image encryption method and system based on fuzzy neural network fixed time synchronization Download PDF

Info

Publication number
CN117454394B
CN117454394B CN202311305958.7A CN202311305958A CN117454394B CN 117454394 B CN117454394 B CN 117454394B CN 202311305958 A CN202311305958 A CN 202311305958A CN 117454394 B CN117454394 B CN 117454394B
Authority
CN
China
Prior art keywords
image
channel component
color channel
response system
driving system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311305958.7A
Other languages
Chinese (zh)
Other versions
CN117454394A (en
Inventor
李小凡
黄鑫
李慧媛
陈洁
唐庆华
耿伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yancheng Institute of Technology
Original Assignee
Yancheng Institute of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yancheng Institute of Technology filed Critical Yancheng Institute of Technology
Priority to CN202311305958.7A priority Critical patent/CN117454394B/en
Publication of CN117454394A publication Critical patent/CN117454394A/en
Application granted granted Critical
Publication of CN117454394B publication Critical patent/CN117454394B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/043Architecture, e.g. interconnection topology based on fuzzy logic, fuzzy membership or fuzzy inference, e.g. adaptive neuro-fuzzy inference systems [ANFIS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/048Activation functions

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computational Linguistics (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Mathematical Physics (AREA)
  • Computing Systems (AREA)
  • Molecular Biology (AREA)
  • Evolutionary Computation (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Security & Cryptography (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Biomedical Technology (AREA)
  • Biophysics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Analysis (AREA)
  • Fuzzy Systems (AREA)
  • Computational Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Facsimile Image Signal Circuits (AREA)

Abstract

The invention belongs to the technical field of new generation information, and particularly discloses an image encryption method and system based on fixed time synchronization of a fuzzy neural network, wherein the image encryption method is based on the fuzzy neural network, and a driving system and a response system are established; setting a synchronization error, and designing a synchronization controller by adopting an aperiodic intermittent adjustment control strategy; the response system is synchronous with the driving system in a fixed time under the action of the synchronous controller, so that image encryption is realized. The invention solves the problem that the fuzzy neural network is difficult to realize fixed time synchronization, and provides a novel image encryption method and system, which remarkably improve the security of image encryption.

Description

Image encryption method and system based on fuzzy neural network fixed time synchronization
Technical Field
The invention belongs to the technical field of new generation information, and particularly relates to an image encryption method and system based on fixed time synchronization of a fuzzy neural network.
Background
The human brain is composed of about 100 to 1000 hundred million neurons, a very large and complex system, and numerous scientists and researchers are desirous of exploring the complex neuronal activity mechanisms of the brain. In 1982, the us scientist Hopfield neural network was proposed, from which the neural network research is carried out, and many achievements are achieved in the aspects of image denoising, image encryption and safety communication by using the neural networks such as the recurrent neural network and the memristive neural network.
The fuzzy neural network introduces fuzzy logic based on the traditional neural network, and compared with other neural networks, the fuzzy neural network can be used for maintaining continuity between cells, and the fuzzy logic is added between the fuzzy input and the fuzzy output besides the sum of output operations, so that the fuzzy neural network is better in the aspect of image processing.
Compared with a periodic intermittent adjustment control strategy, the non-periodic intermittent adjustment control strategy overcomes the defect that a first subinterval and a second subinterval of periodic intermittent adjustment are fixed, and is more suitable for most phenomena in real life, such as wind energy and solar energy power generation, non-periodic starting of a heating system and the like, and has uncertainty.
With the development of networks, people increasingly use networks to store personal photos of themselves, and whether personal privacy photos are transmitted in an encrypted manner receives more attention. The invention uses the characteristics of random-like, non-periodic and unpredictable chaotic signals of the neural network to greatly improve the effectiveness of the image encryption method.
Disclosure of Invention
The invention aims to solve the problem that the fuzzy neural network is difficult to realize fixed time synchronization, and provides an image encryption method and an image encryption system based on the fixed time synchronization of the fuzzy neural network, so that the security of image encryption is improved.
In order to achieve the above purpose, the present invention provides the following technical solutions: the image encryption method based on the fuzzy neural network fixed time synchronization comprises the following steps:
Step S1: based on the fuzzy neural network, a driving system and a response system are established; the specific contents of the step S1 are as follows:
the establishment of a driving system and a response system based on the fuzzy neural network is respectively as follows:
Wherein, the time t is more than or equal to 0, i=1, 2, …, n, j=1, 2, …, n; n represents the number of neurons contained in the driving system and the response system, x i (t) represents the state of the ith neuron of the driving system at the time t, and y i (t) represents the state of the ith neuron of the response system at the time t; a i denotes the damping coefficient of the ith neuron, b i denotes the rate at which the ith neuron resets its potential to a rest state when the network is disconnected from an external input, a i and b i satisfy a i >0 and b i>0;fj(xj (t), respectively), an activation function that the jth neuron of the drive system does not contain a time lag, f j(xj(t-τj (t)) denotes an activation function that the jth neuron of the drive system contains a time-varying discrete time lag, f j(yj (t)) denotes an activation function that the jth neuron of the response system does not contain a time lag, f j(yj(t-τj (t))) represents an activation function of a j-th neuron of the response system that contains a time-varying discrete time lag that is a discontinuous activation function and satisfies |f j(.)|≤Mj, where M j is a positive constant; τ j (t) and delta j (t) are time-varying discrete time lag and time-varying distributed time lag, respectively, and satisfy 0.ltoreq.τ j(t)≤τ,0≤δj (t.ltoreq.delta), wherein τ and delta are positive constants, and are set Η is an integral variable; z ij represents a feed-forward element; /(I)And q ij represents the elements of the fuzzy feedforward minimum and fuzzy feedforward maximum modules, respectively; h ij and ρ ij represent the elements of the minimum and maximum fuzzy feedback modules, respectively; m j (t) and I i (t) represent the input of the jth neuron and the bias of the ith neuron, respectively; v and V respectively represent fuzzy and fuzzy or operators, and the following conditions are satisfied:
u i (t) is an aperiodic intermittent adjustment synchronous controller; initial values of the driving system and the response system respectively satisfy: x i(s)=φi(s), cij(xi(t))、dij(xi(t))、wij(xi(t))、cij(yi(t))、dij(yi(t))、wij(yi(t)) The memristor connection weights are expressed, and respectively satisfy:
Wherein Γ i is a switching threshold and Γ i >0; Are all constant;
Since the right side of the equal sign of the driving system and the response system is discontinuous, the solutions of the driving system and the response system need to be considered in the Filippov sense, and then the driving system and the response system are respectively rewritten as follows by adopting the set value mapping and the differential inclusion theory:
wherein ,K[cij(xi(t))]、K[dij(xi(t))]、K[wij(xi(t))]、K[cij(yi(t))]、K[dij(yi(t))]、K[wij(yi(t))]、K[fj(xj(t))]、K[fj(yj(t))]、K[fj(xj(t-τj(t)))] and K [ f j(yj(t-τj (t))) satisfy respectively:
Wherein,
According to the measurable choice theorem, there is And/> Then it is further possible to obtain:
Wherein: And/> Satisfy/> And/>Satisfy/> Χ j and iota j are constants;
Step S2: setting a synchronous error according to the driving system and the response system established in the step S1, and designing a synchronous controller;
Step S3: based on the response system, under the action of the synchronous controller, the fixed time is synchronous with the driving system, so that the image encryption and decryption are realized, and the specific implementation steps are as follows:
The encryption process comprises the following steps:
Step S31: original color image is read, image size Extracting red channel component matrix/>, of original color imageGreen channel component matrix/>And blue channel component matrixWherein/>And/>The value ranges are all one value in (0, 1, …, 255);
Step S32: after the driving system and the response system reach fixed time synchronization, three chaotic signal sequences are selected according to discrete time sequence chaotic signals x i (t) of the driving system And
Step S33: three chaotic signal sequences obtained in the step S32And/>After specific conversion, three new signal sequences/>, are obtainedAnd/> Wherein/>And/>The value ranges are all one value in (0, 1, …, 255); the specific conversion formula used in step S33 is:
step S34: three new signal sequences obtained in step S33 And/>Three color channel component matrices/>, respectively with an unencrypted color image And/>Performing exclusive OR operation on the corresponding position elements in the three color channel component matrixes/>, and obtaining three color channel component matrixes/>, wherein the three color channel component matrixes/>, the three color channel component matrixes are replaced by the three color channel component matrixes/>, and the three color channel component matrixes/> areobtained by the three color channel component matrixesAnd/>
Step S35: the arnold transformation is adopted to replace the three color channel component matrixes And/>Scrambling operation is carried out to obtain a scrambled three-color channel component matrixAnd/>The arnold transform algorithm is:
Wherein the method comprises the steps of Is the original position of the pixel,/>Alpha and beta are constants for the position after pixel scrambling;
Step S36: the three color channel component matrices after being scrambled in step S35 And/>As three color channel component matrixes of the encrypted image, combining the color component matrixes of the encrypted image to generate the encrypted image;
the decryption process is the inverse of the encryption process, and specifically comprises the following steps:
step S37: reading an encrypted image, and extracting three color channel component matrixes of the encrypted image And/>Wherein/> And/>The value ranges are all one value in (0, 1, …, 255);
Step S38: three color channel component matrices for encrypted images using arnold inverse transforms And/>Performing inverse scrambling operation and recovering to obtain three color channel component matrixesAnd/>The arnold inversion algorithm is as follows:
Wherein the method comprises the steps of Is the original position of the pixel,/>Alpha and beta are constants for the position after pixel scrambling;
Step S39: after the driving system and the response system reach the fixed time synchronization, selecting and in step S32 according to the discrete time sequence chaotic signal y i (t) of the response system And/>Corresponding chaotic signal sequence/>And/>
Step S310: the chaotic signal sequence obtained in the step S39And/>After specific conversion, three new signal sequences/>And/> Wherein/>And/>The value ranges are all one value of (0, 1, …, 255), and the specific conversion formula used in step S310 is:
Step S311: three new signal sequences obtained in step S310 And/>Three color channel component matrices respectively reduced in step S38/>And/>Exclusive or operation is carried out on the corresponding position elements of the decryption image to obtain three color channel component matrixes of the decryption imageAnd/>
Step S312: three color channel component matrices of the decrypted image obtained in step S311 areAnd/>And (5) recombining to obtain a decrypted image.
Further, the step S2 specifically includes the following steps:
Step S21: the synchronization error of the driving system and the response system is set as follows:
ei(t)=yi(t)-xi(t)
Step S22: according to the synchronization error between the driving system and the response system set in step S21, the non-periodic intermittent adjustment synchronization controller is designed to:
Where k is the number of control cycles, i.e., k=0, 1,2, …; t k is the start-up time of the first subinterval controller in the kth period, s k represents the start-up time of the second subinterval controller in the kth period, and t k and s k are required to satisfy: Omega and/> Is constant and meetsEpsilon i、θi、∈i、λ1i、λ2i、λ3i、λ4i is the positive controller gain; 0< 1, gamma >1; expressed as derivative of synchronization error/> Is a sign function of (2); e i(t-τi (t)) represents the synchronization error of the state variable of the driving system i-th neuron comprising a time-varying discrete time lag and the state variable of the response system i-th neuron comprising a time-varying discrete time lag, and the controller gain/>Epsilon i、θi、∈i satisfies the following inequality:
Wherein,
And enabling the non-periodic intermittent adjustment synchronous controller to act on the response system so that the response system is synchronous with the driving system at a fixed time.
Further, the response system is synchronized with the driving system at a fixed time, and an upper bound T of the fixed time is:
Wherein ψ is a constant and
In a second aspect of the present invention, an image encryption system based on fixed time synchronization of a fuzzy neural network is provided, the image encryption system comprising:
Discrete time sequence chaotic signal acquisition module: the method is used for establishing a driving system and a response system based on a fuzzy neural network, setting a synchronous error, and designing an aperiodic intermittent adjusting synchronous controller so that the driving system and the response system are synchronous at a fixed time; after the driving system and the response system are synchronous, the driving system chaotic signal acquisition module selects three chaotic signal sequences according to a discrete time sequence chaotic signal x i (t) of the driving system And/>The response system chaotic signal acquisition module selects and/>, according to the discrete time sequence chaotic signal y i (t) of the response systemAnd/>Corresponding chaotic signal sequence/>And/>
The driving system chaotic signal conversion operation module: for sequencing chaotic signalsAndAfter specific conversion, three new signal sequences/>And/>Wherein the method comprises the steps ofAnd/>The value ranges are all one value in (0, 1, …, 255);
And the response system chaotic signal conversion operation module: for sequencing chaotic signals AndAfter specific conversion, three new signal sequences/>Wherein the method comprises the steps ofThe value ranges are all one value in (0, 1, …, 255);
the original color image component reading and extracting operation module comprises the following steps: used in the encryption process for reading the original color image and extracting the red component matrix of the original color image Green component matrix/>And blue component matrix
The encrypted image component reading and extracting operation module comprises: in the decryption process, the method is used for reading the encrypted image and extracting three color channel component matrixes of the encrypted image
Signal replacement operation module: for use in encrypting a signal sequenceAndThree color component matrices/>, respectively with the original color imageAnd/>Performing exclusive OR operation on the corresponding position elements in the table; for inserting signal sequences/>, in decryption processesAndRespectively with the reduced three color channel component matrices/> And/>Performing exclusive OR operation on the corresponding position elements in the table;
Signal scrambling operation module: used in the encryption process, arnold transformation is adopted to replace three color component matrixes And/>Scrambling operation is carried out to obtain a scrambled three-color channel component matrix/>And/>
The signal reverse scrambling operation module is as follows: three color channel component matrices for encrypted images using arnold inverse transforms in decryptionAnd/>Performing inverse scrambling operation, and recovering to obtain a color channel component matrix/>And/>
An encrypted image component combination operation module: three color channel component matrixes for combining encrypted images in encryption processAnd/>Generating an encrypted image;
a decrypted image component combining operation module: in the decryption process, three color channel component matrixes for combining decrypted images And (3) recombining and restoring to a color image.
Compared with the prior art, the invention has the beneficial effects that:
1. In the invention, in order to synchronize the response system with the driving system at a fixed time, an aperiodic intermittent adjustment synchronous controller is designed, and compared with the periodic intermittent adjustment synchronous controller, the controller effectively eliminates the defects and limitations of the periodic intermittent adjustment strategy.
2. In the invention, the synchronous control problem is analyzed directly by using a non-reduced-order method, so that the obtained synchronous criterion is more in line with the actual situation.
3. Compared with the limited time synchronous control method, the fixed time synchronous control method provided by the invention can effectively obtain the synchronous time of the system, does not depend on the initial condition of the system, and is more universal.
Drawings
The accompanying drawings are included to provide a further understanding of the invention, and are incorporated in and constitute a part of this specification, illustrate the invention and together with the description of the embodiment 1 of the invention serve to explain the invention.
In the drawings:
FIG. 1 is a schematic diagram of an image encryption and decryption process according to the present invention;
FIG. 2 is a flow chart of the image encryption system of the present invention;
FIG. 3 is a trace map of drive system state x 1 (t) and response system state y 1 (t) without controller action;
FIG. 4 is a trace map of drive system state x 2 (t) and response system state y 2 (t) without controller action;
FIG. 5 is a graph of the variation of synchronization errors e 1 (t) and e 2 (t) without controller;
FIG. 6 is a trace map of drive system state x 1 (t) and response system state y 1 (t) under the influence of a synchronous controller;
FIG. 7 is a trace map of drive system state x 2 (t) and response system state y 2 (t) under the influence of a synchronous controller;
FIG. 8 is a graph of the variation trace of synchronization errors e 1 (t) and e 2 (t) under the influence of a synchronization controller;
fig. 9 is an image encryption effect display diagram in which (a) is an original image, (b) is an encrypted image, and (c) is a decrypted image;
fig. 10 is a graph of adjacent pixels of an original image R color channel component and an encrypted image R color channel component, wherein (a) is a graph of adjacent pixels of the original image R color channel component in a horizontal direction, (b) is a graph of adjacent pixels of the original image R color channel component in a vertical direction, (c) is a graph of adjacent pixels of the original image R color channel component in a diagonal direction, (d) is a graph of adjacent pixels of the encrypted image R color channel component in a horizontal direction, (e) is a graph of adjacent pixels of the encrypted image R color channel component in a vertical direction, and (f) is a graph of adjacent pixels of the encrypted image R color channel component in a diagonal direction;
Fig. 11 is a graph of adjacent pixels of an original image G color channel component and an encrypted image G color channel component, wherein (a) is a graph of adjacent pixels of the original image G color channel component in a horizontal direction, (b) is a graph of adjacent pixels of the original image G color channel component in a vertical direction, (c) is a graph of adjacent pixels of the original image G color channel component in a diagonal direction, (d) is a graph of adjacent pixels of the encrypted image G color channel component in a horizontal direction, (e) is a graph of adjacent pixels of the encrypted image G color channel component in a vertical direction, and (f) is a graph of adjacent pixels of the encrypted image G color channel component in a diagonal direction;
fig. 12 is a neighboring pixel statistic diagram of an original image B color channel component and an encrypted image B color channel component, wherein (a) is a neighboring pixel statistic diagram of the original image B color channel component in the horizontal direction, (B) is a neighboring pixel statistic diagram of the original image B color channel component in the vertical direction, (c) is a neighboring pixel statistic diagram of the original image B color channel component in the diagonal direction, (d) is a neighboring pixel statistic diagram of the encrypted image B color channel component in the horizontal direction, (e) is a neighboring pixel statistic diagram of the encrypted image B color channel component in the vertical direction, and (f) is a neighboring pixel statistic diagram of the encrypted image B color channel component in the diagonal direction.
Detailed Description
The preferred embodiments of the present invention will be described below with reference to the accompanying drawings, it being understood that the preferred embodiments described herein are for illustration and explanation of the present invention only, and are not intended to limit the present invention.
Example 1:
the embodiment provides an image encryption method and system based on fixed time synchronization of a fuzzy neural network, wherein the image encryption and decryption process is shown in fig. 1. The image encryption method comprises the following steps:
Step S1: based on the fuzzy neural network, a driving system and a response system are established; the specific contents of the step S1 are as follows:
the establishment of a driving system and a response system based on the fuzzy neural network is respectively as follows:
Wherein, the time t is more than or equal to 0, i=1, 2, …, n, j=1, 2, …, n; n represents the number of neurons contained in the driving system and the response system, x i (t) represents the state of the ith neuron of the driving system at the time t, and y i (t) represents the state of the ith neuron of the response system at the time t; a i denotes the damping coefficient of the ith neuron, b i denotes the rate at which the ith neuron resets its potential to a rest state when the network is disconnected from an external input, a i and b i satisfy a i >0 and b i>0;fj(xj (t), respectively), an activation function that the jth neuron of the drive system does not contain a time lag, f j(xj(t-τj (t)) denotes an activation function that the jth neuron of the drive system contains a time-varying discrete time lag, f j(yj (t)) denotes an activation function that the jth neuron of the response system does not contain a time lag, f j(yj(t-τj (t))) represents an activation function of a j-th neuron of the response system that contains a time-varying discrete time lag that is a discontinuous activation function and satisfies |f j(.)|≤Mj, where M j is a positive constant; τ j (t) and delta j (t) are time-varying discrete time lag and time-varying distributed time lag, respectively, and satisfy 0.ltoreq.τ j(t)≤τ,0≤δj (t.ltoreq.delta), wherein τ and delta are positive constants, and are set Η is an integral variable; z ij represents a feed-forward element; /(I)And q ij represents the elements of the fuzzy feedforward minimum and fuzzy feedforward maximum modules, respectively; h ij and ρ ij represent the elements of the minimum and maximum fuzzy feedback modules, respectively; m j (t) and I i (t) represent the input of the jth neuron and the bias of the ith neuron, respectively; v and V respectively represent fuzzy and fuzzy or operators, and the following conditions are satisfied:
u i (t) is an aperiodic intermittent adjustment synchronous controller; initial values of the driving system and the response system respectively satisfy: x i(s)=φi(s), cij(xi(t))、dij(xi(t))、wij(xi(t))、cij(yi(t))、dij(yi(t))、wij(yi(t)) The memristor connection weights are expressed, and respectively satisfy:
Wherein Γ i is a switching threshold and Γ i >0; Are all constant;
Since the right side of the equal sign of the driving system and the response system is discontinuous, the solutions of the driving system and the response system need to be considered in the Filippov sense, and then the driving system and the response system are respectively rewritten as follows by adopting the set value mapping and the differential inclusion theory:
Wherein ,K[cij(xi(t))]、K[dij(xi(t))]、K[wij(xi(t))]、K[cij(yi(t))]、K[dij(yi(t))]、K[wij(yi(t))]、K[fj(xj(t))]、K[fj(yj(t))]、K[fj(xj(t-τj(t)))] and K [ f j(yj(t-τj (t))) satisfy respectively:
Wherein,
According to the measurable choice theorem, there is And/> Then it is further possible to obtain:
/>
Wherein: And/> Satisfy/> And/>Satisfy/> Χ j and iota j are constants;
Step S2: setting a synchronous error according to the driving system and the response system established in the step S1, and designing a synchronous controller;
Step S3: based on the response system, under the action of the synchronous controller, the fixed time is synchronous with the driving system, and then the image encryption method is realized.
In this embodiment, the step S2 specifically includes the following steps:
Step S21: the synchronization error of the driving system and the response system is set as follows:
ei(t)=yi(t)-xi(t)
Step S22: according to the synchronization error between the driving system and the response system set in step S21, the non-periodic intermittent adjustment synchronization controller is designed to:
Where k is the number of control cycles, i.e., k=0, 1,2, …; t k is the start-up time of the first subinterval controller in the kth period, s k represents the start-up time of the second subinterval controller in the kth period, and t k and s k are required to satisfy: Omega and/> Is constant and meetsEpsilon i、θi、∈i、λ1i、λ2i、λ3i、λ4i is the positive controller gain; 0< 1, gamma >1; expressed as derivative of synchronization error/> Is a sign function of (2); e i(t-τi (t)) represents the synchronization error of the state variable of the driving system i-th neuron comprising a time-varying discrete time lag and the state variable of the response system i-th neuron comprising a time-varying discrete time lag, and the controller gain/>Epsilon i、θi、∈i satisfies the following inequality: /(I)
Wherein,
And enabling the non-periodic intermittent adjustment synchronous controller to act on the response system so that the response system is synchronous with the driving system at a fixed time.
In the present embodiment, the upper bound of the fixed timeWherein ψ is a constant and/>
In this embodiment, step S3: based on the response system, the drive system is synchronized with fixed time under the action of the synchronous controller, and further image encryption and decryption are realized, and the method comprises the following specific implementation steps:
The encryption process comprises the following steps:
Step S31: original color image is read, image size Extracting red channel component matrix/>, of original color imageGreen channel component matrix/>And blue channel component matrixWherein/>And/>The value ranges are all one value in (0, 1, …, 255);
Step S32: after the driving system and the response system reach fixed time synchronization, three chaotic signal sequences are selected according to discrete time sequence chaotic signals x i (t) of the driving system And
Step S33: three chaotic signal sequences obtained in the step S32And/>After specific conversion, three new signal sequences/>, are obtainedAnd/> Wherein/>And/>The value ranges are all one value in (0, 1, …, 255); the specific conversion formula used in step S33 is:
step S34: three new signal sequences obtained in step S33 And/>Three color channel component matrices/>, respectively with an unencrypted color image And/>Performing exclusive OR operation on the corresponding position elements in the three color channel component matrixes/>, and obtaining three color channel component matrixes/>, wherein the three color channel component matrixes/>, the three color channel component matrixes are replaced by the three color channel component matrixes/>, and the three color channel component matrixes/> areobtained by the three color channel component matrixesAnd
Step S35: the arnold transformation is adopted to replace the three color channel component matrixes And/>Scrambling operation is carried out to obtain a scrambled three-color channel component matrixAnd/>The arnold transform algorithm is:
Wherein the method comprises the steps of Is the original position of the pixel,/>Alpha and beta are constants for the position after pixel scrambling; step S36: the three color channel component matrices after the scrambling in the step S35 are/> And/>As three color channel component matrixes of the encrypted image, combining the color component matrixes of the encrypted image to generate the encrypted image;
the decryption process is the inverse of the encryption process, and specifically comprises the following steps:
step S37: reading an encrypted image, and extracting three color channel component matrixes of the encrypted image And/>Wherein/> And/>The value ranges are all one value in (0, 1, …, 255);
Step S38: three color channel component matrices for encrypted images using arnold inverse transforms And/>Performing inverse scrambling operation and recovering to obtain three color channel component matrixesAnd/>The arnold inversion algorithm is as follows:
Wherein the method comprises the steps of Is the original position of the pixel,/>Alpha and beta are constants for the position after pixel scrambling;
Step S39: after the driving system and the response system reach the fixed time synchronization, selecting and in step S32 according to the discrete time sequence chaotic signal y i (t) of the response system And/>Corresponding chaotic signal sequence/>And/>
Step S310: the chaotic signal sequence obtained in the step S39And/>After specific conversion, three new signal sequences/>And/> Wherein/>And/>The value ranges are all one value of (0, 1, …, 255), and the specific conversion formula used in step S310 is:
/>
Step S311: three new signal sequences obtained in step S310 And/>Three color channel component matrices respectively reduced in step S38/>And/>Exclusive or operation is carried out on the corresponding position elements of the decryption image to obtain three color channel component matrixes of the decryption imageAnd/>
Step S312: three color channel component matrices of the decrypted image obtained in step S311 areAnd/>And (5) recombining to obtain a decrypted image.
In addition, the invention provides an image encryption system based on fixed time synchronization of a fuzzy neural network, the flow of the image encryption system is shown in figure 2, and the image encryption system comprises:
Discrete time sequence chaotic signal acquisition module: the method is used for establishing a driving system and a response system based on a fuzzy neural network, setting a synchronous error, and designing an aperiodic intermittent adjusting synchronous controller so that the driving system and the response system are synchronous at a fixed time; after the driving system and the response system are synchronous, the driving system chaotic signal acquisition module selects three chaotic signal sequences according to a discrete time sequence chaotic signal x i (t) of the driving system And/>The response system chaotic signal acquisition module selects and/>, according to the discrete time sequence chaotic signal y i (t) of the response systemAnd/>Corresponding chaotic signal sequence/>And/>
The driving system chaotic signal conversion operation module: for sequencing chaotic signalsAndAfter specific conversion, three new signal sequences/>And/>Wherein the method comprises the steps ofAnd/>The value ranges are all one value in (0, 1, …, 255);
And the response system chaotic signal conversion operation module: for sequencing chaotic signals AndAfter specific conversion, three new signal sequences/>Wherein the method comprises the steps ofThe value ranges are all one value in (0, 1, …, 255);
the original color image component reading and extracting operation module comprises the following steps: used in the encryption process for reading the original color image and extracting the red component matrix of the original color image Green component matrix/>And blue component matrix
The encrypted image component reading and extracting operation module comprises: in the decryption process, the method is used for reading the encrypted image and extracting three color channel component matrixes of the encrypted image
Signal replacement operation module: for use in encrypting a signal sequenceAndThree color component matrices/>, respectively with the original color imageAnd/>Performing exclusive OR operation on the corresponding position elements in the table; for inserting signal sequences/>, in decryption processesAndRespectively with the reduced three color channel component matrices/> And/>Performing exclusive OR operation on the corresponding position elements in the table;
Signal scrambling operation module: used in the encryption process, arnold transformation is adopted to replace three color component matrixes And/>Scrambling operation is carried out to obtain a scrambled three-color channel component matrix/>And/>
The signal reverse scrambling operation module is as follows: three color channel component matrices for encrypted images using arnold inverse transforms in decryptionAnd/>Performing inverse scrambling operation, and recovering to obtain a color channel component matrix/>And/>
An encrypted image component combination operation module: three color channel component matrixes for combining encrypted images in encryption processAnd/>Generating an encrypted image;
a decrypted image component combining operation module: in the decryption process, three color channel component matrixes for combining decrypted images And (3) recombining and restoring to a color image.
It is worth noting that, in order to synchronize the response system with the driving system at a fixed time, the invention designs an aperiodic intermittent adjustment synchronous controller, which effectively eliminates the defects and limitations of the periodic intermittent adjustment strategy compared with the periodic intermittent adjustment synchronous controller. And analyzing the synchronous control problem directly by using a non-reduced-order method, so that the obtained synchronous criterion is more in line with the actual situation. Compared with the limited time synchronization control method, the fixed time synchronization control method provided by the invention can effectively obtain the synchronization time of the system, is independent of the initial condition of the system, and is more universal. The image encryption method based on the fuzzy neural network fixed time synchronization combines the replacement and scrambling in the image encryption, thereby obtaining better encryption effect and having more effects in the aspects of noise resistance and statistical cracking.
Example 2:
the embodiment mainly comprises two parts of contents:
One is to carry out theoretical demonstration on the effectiveness of the non-periodic intermittent adjustment synchronous controller designed in the fixed time synchronous control method of the fuzzy neural network proposed in the embodiment 1.
Secondly, the method of numerical simulation is directed to whether the driving system and the response system constructed according to the fuzzy neural network in the embodiment 1 achieve fixed time synchronization or not, and whether the image encryption method is effective or not.
(Neither theoretical demonstration nor simulation experiment is intended to limit the invention, in other embodiments, simulation experiments may be omitted, or other experimental schemes may be used to verify the performance of the neural network system.)
1. Proof of theory
Defining a synchronization error between the drive system and the response system as: e i(t)=yi(t)-xi (t), the synchronization error system available from the drive system and the response system is as follows:
the quotation that will be adopted in the certification process is given below:
Lemma 1: let V (t) be at The above is a continuous, non-negative function and satisfies the following condition: /(I)
Wherein, t is 0, ++ infinity), t 0 = 0, k = 0,1,2, …, alpha >0, beta >0,0< 1, gamma >1, if whenV (t) ≡0, where/>
And (4) lemma 2: let a 12,…,αn be the normal number and 0<r 1≤1,r2 >1, then
Next, the lyapunov functional is constructed:
The established lyapunov functional is then solved for the dily derivative:
when t epsilon [ t k,sk)
/>
And because of the controller gainEpsilon i、θi、∈i satisfies the following four inequalities:
/>
Then it is further possible to obtain:
Wherein,
Then according to lemma 2, since l.epsilon. (0, 1), γ >1 can be obtained
Similarly, when t is E [ s k,tk+1)
According to lemma 1, then we can get: when (when)V (t) ≡0.
2. Numerical simulation
In this embodiment, taking a fuzzy neural network containing two neurons as an example, the driving system is determined as:
the response system corresponding to the driving system is as follows:
Wherein ,t≥0,i=1,2;f1(x1(t))=tanh(x1(t))+0.031*sign(x1(t))、f2(x2(t))=tanh(x2(t))+0.031*sign(x2(t))、f1(x1(t-τ1(t)))=tanh(x1(t-τ1(t)))+0.031*sign(x1(t-τ1(t)))、f2(x2(t-τ2(t)))=tanh(x2(t-τ2(t)))+0.031*sign(x2(t-τ2(t)))、f1(y1(t))=tanh(y1(t))+0.031*sign(y1(t))、f2(y2(t))=tanh(y2(t))+0.031*sign(y2(t))、f1(y1(t-τ1(t)))=tanh(y1(t-τ1(t)))+0.031*sign(y1(t-τ1(t)))、f2(y2(t-τ2(t)))=tanh(y2(t-τ2(t)))+0.031*sign(y2(t-τ2(t))); constant χ1=χ2=1,ι1=ι2=0.062,M1=M2=1.031;a1=a2=0.55,b1=b2=2.2; Τ=δ=1, then/>z11=z21=-1,z12=z22=1,m1(t)=m2(t)=1,/> q11=q12=-1,q21=q22=1,h11=h22=0.1,h12=h21=-0.1,ρ11=ρ22=0.2,ρ12=ρ21=-0.2;I1(t)=I2(t)=0; Memristor connection weights are selected as: /(I)
According to the above parameter settings, and inequality And/> The parameter value ranges of the non-periodic intermittent adjustment synchronous controller are respectively as follows: /(I) Epsilon 1≧4.2、ε2≧5.2、θ1≧4.8、θ2≧4.2、∈1≧3.9456、∈2 ∈ 3.9332, the non-periodic intermittent adjustment synchronous controller parameter may take the value of: /(I)Epsilon 1=4.5、ε2=5.5、θ1=5、θ2=4.5、∈1=∈2 = 4; the other non-periodic intermittent adjustment synchronous controller parameter values are λ11=λ12=λ21=λ22=4,λ31=λ32=λ41=λ42=1,l=0.6,γ=1.2,, and the non-periodic intermittent adjustment control time sequence is as follows:
[0,2.55]∪[2.81,5.5]∪[5.77,8]∪[8.2,10.13]∪[10.3,11.4]∪[11.5,13.03]∪[13.2,13.03]∪[13.2,15.73]∪[16,18.66]∪[18.9,19.89], It can be known that ψ=0.1.
And the driving system, the response system and the non-periodic intermittent adjustment synchronous controller carry out numerical simulation experiments on the driving system, the response system and the non-periodic intermittent adjustment synchronous controller under the set parameters. The initial values of the drive system and the response system are set as follows: x 1(s)=0.2,x2(s)=0.1,y1(s)=-0.25,y2(s) = -0.2, s e [ -1,0], according to the above parameter setting, the upper bound t≡10.033 of the fixed time can be calculated, and the specific simulation experiment results are as follows: FIG. 3 is a trace map of drive system state x 1 (t) and response system state y 1 (t) without controller action; FIG. 4 is a trace map of drive system state x 2 (t) and response system state y 2 (t) without controller action; FIG. 5 is a graph of the variation of synchronization errors e 1 (t) and e 2 (t) without controller; FIG. 6 is a trace map of drive system state x 1 (t) and response system state y 1 (t) under the influence of a synchronous controller; FIG. 7 is a trace map of drive system state x 2 (t) and response system state y 2 (t) under the influence of a synchronous controller; FIG. 8 is a graph of the variation trace of synchronization errors e 1 (t) and e 2 (t) under the influence of a synchronization controller; 3-5 show that the driving system and the response system cannot realize synchronization under the action of no controller; the traces of fig. 6-8 demonstrate that the response system is synchronized with the drive system within a fixed time under the action of the synchronization controller, verifying synchronization performance.
Based on the fact that the response system in the embodiment is synchronous with the driving system at fixed time under the action of the non-periodic intermittent adjustment synchronous controller, image encryption and decryption are achieved, and the method comprises the following specific implementation steps:
Step S31: reading an original color image, as shown in fig. 9 (a), the image size is 256×256×3, and extracting a red channel component matrix of the original color image Green channel component matrix/>And blue channel component matrixP.epsilon. {1,2, …,256}, q.epsilon.1, 2, …,256}, where/> And/>The value ranges are all one value in (0, 1, …, 255);
step S32: after the driving system and the response system reach fixed time synchronization, three chaotic signal sequences are selected according to discrete time sequence chaotic signals x 1(t)、x2 (t) and (x 1(t)+x2 (t)) of the driving system And/>p∈{1,2,…,256},q∈{1,2,…,256};
Step S33: three chaotic signal sequences obtained in the step S32And/>After specific conversion, three new signal sequences/>, are obtainedAnd/>P.epsilon. {1,2, …,256}, q.epsilon.1, 2, …,256}, where/>And/>The value ranges are all one value in (0, 1, …, 255); the specific conversion formula used in step S33 is:
step S34: three new signal sequences obtained in step S33 And/>Three color channel component matrices/>, respectively with an unencrypted color image And/>Performing exclusive OR operation on the corresponding position elements in the color channel matrix to obtain three color channel component matrixes after replacementAnd/>p∈{1,2,…,256},q∈{1,2,…,256};
Step S35: the arnold transformation is adopted to replace the three color channel component matrixes And/>Scrambling operation is carried out to obtain a scrambled three-color channel component matrixAnd/>P epsilon {1,2, …,256}, q epsilon {1,2, …,256}, the arnold transformation algorithm is:
Wherein the method comprises the steps of Is the original position of the pixel,/>Is the position of the scrambled pixels;
Step S36: the three color channel component matrices after being scrambled in step S35 And/>As the three color channel component matrices of the encrypted image, combining the color component matrices of the encrypted image to generate an encrypted image, as shown in fig. 9 (b);
the decryption process is the inverse of the encryption process, and specifically comprises the following steps:
Step S37: reading the encrypted image, extracting three color channel component matrices of the encrypted image as shown in fig. 9 (b) And/>P.epsilon.1, 2, …,256, q.epsilon.1, 2, …,256, whereAnd/>The value ranges are all one value in (0, 1, …, 255);
Step S38: three color channel component matrices for encrypted images using arnold inverse transforms And/>Performing inverse scrambling operation and recovering to obtain three color channel component matrixesAnd/>P epsilon {1,2, …,256}, q epsilon {1,2, …,256}, the arnold inverse transform algorithm is:
Wherein the method comprises the steps of Is the original position of the pixel,/>Is the position of the scrambled pixels;
Step S39: after the driving system and the response system reach fixed time synchronization, selecting and comparing with step S32 according to discrete time sequence chaotic signals y 1(t)、y2 (t) and (y 1(t)+y2 (t)) of the response system And/>Corresponding chaotic signal sequence/>And/>p∈{1,2,…,256},q∈{1,2,…,256};
Step S310: the chaotic signal sequence obtained in the step S39And/>After specific conversion, three new signal sequences/>And/>P.epsilon. {1,2, …,256}, q.epsilon.1, 2, …,256}, where/>And/>The value ranges are all one value of (0, 1, …, 255), and the specific conversion formula used in step S310 is:
Step S311: three new signal sequences obtained in step S310 And/>Three color channel component matrices respectively reduced in step S38/>And/>Exclusive or operation is carried out on the corresponding position elements of the decryption image to obtain three color channel component matrixes of the decryption imageAnd/>p∈{1,2,…,256},q∈{1,2,…,256};
Step S312: three color channel component matrices of the decrypted image obtained in step S311 areAnd/>The decrypted image is obtained by recombination, as shown in fig. 9 (c).
Fig. 9 shows the encryption effect in a visual sense. Fig. 10, 11 and 12 are respectively adjacent pixel statistics of the unencrypted color image R, G and the B color channel component and the encrypted color image R, G and the B color channel component in the horizontal, vertical and diagonal directions, fig. 10 (a), 10 (B), 10 (c), 11 (a), 11 (B), 11 (c), 12 (a), 12 (B), 12 (c) are respectively adjacent pixel statistics of the color channel component R, G and the B color channel component of the unencrypted color image in the horizontal, vertical and diagonal directions, and fig. 10 (d), 10 (e), 10 (f), 11 (d), 11 (e), 11 (f), 12 (d), 12 (e), 12 (f) are respectively adjacent pixel statistics of the color channel component R, G and the B color channel component of the encrypted image in the horizontal, vertical and diagonal directions. As can be seen from fig. 10, 11 and 12, the correlation between adjacent pixels of the original image which is not encrypted is strong, and the original image is easily attacked by statistical analysis, etc., and the encrypted image is different, and is uniformly distributed in horizontal, vertical or diagonal directions, which means that the encrypted image effectively masks the statistical characteristics of the image, thereby improving the security.
Through an image shannon entropy formulaWherein N represents the total number of pixels, hist i represents the total number of pixels of i, the image information entropy of an unencrypted image and the information entropy of an encrypted image can be calculated, the image information entropy of the encrypted image is different from the image information entropy of the unencrypted image, the image information entropy of the encrypted image is close to 8, and the image information entropy of a completely random image is 8, so that the encrypted image is close to the completely random image, thereby embodying the effectiveness of the encryption method provided by the invention.
TABLE 1
Image processing apparatus Entropy of image information R component information entropy G component information entropy B component information entropy
Unencrypted image 7.7301 7.2353 7.5683 6.9176
Encrypting an image 7.9989 7.9972 7.9974 7.9972
Finally, it should be noted that: the foregoing is merely a preferred example of the present invention, and the present invention is not limited thereto, but it is to be understood that modifications and equivalents of some of the technical features described in the foregoing embodiments may be made by those skilled in the art, although the present invention has been described in detail with reference to the foregoing embodiments. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (3)

1. The image encryption method based on the fuzzy neural network fixed time synchronization is characterized by comprising the following steps of:
Step S1: based on the fuzzy neural network, a driving system and a response system are established; the specific contents of the step S1 are as follows:
the establishment of a driving system and a response system based on the fuzzy neural network is respectively as follows:
Wherein, the time t is more than or equal to 0, i=1, 2, …, n, j=1, 2, …, n; n represents the number of neurons contained in the driving system and the response system, x i (t) represents the state of the ith neuron of the driving system at the time t, and y i (t) represents the state of the ith neuron of the response system at the time t; a i denotes the damping coefficient of the ith neuron, b i denotes the rate at which the ith neuron resets its potential to a rest state when the network is disconnected from an external input, a i and b i satisfy a i >0 and b i>0;fj(xj (t), respectively), an activation function that the jth neuron of the drive system does not contain a time lag, f j(xj(t-τj (t)) denotes an activation function that the jth neuron of the drive system contains a time-varying discrete time lag, f j(yj (t)) denotes an activation function that the jth neuron of the response system does not contain a time lag, f j(yj(t-τj (t))) represents an activation function of a j-th neuron of the response system that contains a time-varying discrete time lag that is a discontinuous activation function and satisfies |f j(.)|≤Mj, where M j is a positive constant; τ j (t) and δ j (t) are time-varying discrete time lags and time-varying distributed time lags, respectively, and satisfy 0.ltoreq.τ j(t)≤τ,0≤δj (t). Ltoreq.δ, wherein τ and δ are positive constants; η is an integral variable; z ij represents a feed-forward element; And q ij represents the elements of the fuzzy feedforward minimum and fuzzy feedforward maximum modules, respectively; h ij and ρ ij represent the elements of the minimum and maximum fuzzy feedback modules, respectively; m j (t) and I i (t) represent the input of the jth neuron and the bias of the ith neuron, respectively; v and V respectively represent fuzzy and fuzzy or operators, and the following conditions are satisfied:
u i (t) is an aperiodic intermittent adjustment synchronous controller; initial values of the driving system and the response system respectively satisfy: x i(s)=φi(s), Wherein the method comprises the steps ofcij(xi(t))、dij(xi(t))、wij(xi(t))、cij(yi(t))、dij(yi(t))、wij(yi(t)) The memristor connection weights are expressed, and respectively satisfy:
Wherein Γ i is a switching threshold and Γ i >0; Are all constant;
Since the right side of the equal sign of the driving system and the response system is discontinuous, the solutions of the driving system and the response system need to be considered in the Filippov sense, and then the driving system and the response system are respectively rewritten as follows by adopting the set value mapping and the differential inclusion theory:
Wherein ,K[cij(xi(t))]、K[dij(xi(t))]、K[wij(xi(t))]、K[cij)yi(t))]、K[dij(yi(t))]、K[wij(yi(t))]、K[fj)xj(t))]、K[fj)yj(t))]、K[fj(xj(t-τj(t)))] and K [ f j(yj)t-τj (t) ] satisfy respectively:
Wherein,
According to the measurable choice theorem, there is
And/> Then it is further possible to obtain:
Wherein: And/> Satisfy/> And/>Satisfy/> Χ j and iota j are constants;
Step S2: setting a synchronous error according to the driving system and the response system established in the step S1, and designing a synchronous controller;
the step S2 specifically comprises the following steps:
Step S21: the synchronization error of the driving system and the response system is set as follows:
ei(t)=yi(t)-xi(t)
Step S22: according to the synchronization error between the driving system and the response system set in step S21, the non-periodic intermittent adjustment synchronization controller is designed to:
Where k is the number of control cycles, i.e., k=0, 1,2, …; t k is the start-up time of the first subinterval controller in the kth period, s k represents the start-up time of the second subinterval controller in the kth period, and t k and s k are required to satisfy: Omega and/> Is constant and meets/>Ζ i、εi、θi、∈i、λ1i、λ2i、λ3i、λ4i is positive controller gain; 0< 1, gamma >1; /(I)Expressed as derivative of synchronization error/>Is a sign function of (2); e i(t-τi (t)) represents the synchronization error of the state variable of the driving system i-th neuron comprising a time-varying discrete time lag and the state variable of the response system i-th neuron comprising a time-varying discrete time lag, and the controller gain ζ i、εi、θi、∈i satisfies the following inequality:
ζi≧1-ai
Wherein,
Applying the non-periodic intermittent adjustment synchronization controller to the response system so that the response system is synchronized with the driving system at a fixed time;
Step S3: based on the response system, under the action of the synchronous controller, the fixed time is synchronous with the driving system, so that the image encryption and decryption are realized, and the specific implementation steps are as follows:
The encryption process comprises the following steps:
Step S31: original color image is read, image size Extracting red channel component matrix/>, of original color imageGreen channel component matrix/>And blue channel component matrixWherein/>And/>The element value ranges of (1), (…) and (255) are all one value in (0, 1, … and 255);
Step S32: after the driving system and the response system reach fixed time synchronization, three chaotic signal sequences are selected according to discrete time sequence chaotic signals x i (t) of the driving system And
Step S33: three chaotic signal sequences obtained in the step S32And/>After specific conversion, three new signal sequences/>, are obtainedAnd/> Wherein/>And/>The element value ranges of (1), (…) and (255) are all one value in (0, 1, … and 255); the specific conversion formula used in step S33 is:
step S34: three new signal sequences obtained in step S33 And/>Three color channel component matrices/>, respectively with an unencrypted color image And/>Performing exclusive OR operation on the corresponding position elements in the three color channel component matrixes/>, and obtaining three color channel component matrixes/>, wherein the three color channel component matrixes/>, the three color channel component matrixes are replaced by the three color channel component matrixes/>, and the three color channel component matrixes/> areobtained by the three color channel component matrixesAnd
Step S35: the arnold transformation is adopted to replace the three color channel component matrixes AndScrambling operation is carried out to obtain a scrambled three-color channel component matrix/>And/>The arnold transform algorithm is:
Wherein the method comprises the steps of Is the original position of the pixel,/>Alpha and beta are constants for the position after pixel scrambling;
Step S36: the three color channel component matrices after being scrambled in step S35 AndAs three color channel component matrixes of the encrypted image, combining the color component matrixes of the encrypted image to generate the encrypted image;
the decryption process is the inverse of the encryption process, and specifically comprises the following steps:
step S37: reading an encrypted image, and extracting three color channel component matrixes of the encrypted image And/>Wherein/> And/>The element value ranges of (1), (…) and (255) are all one value in (0, 1, … and 255);
Step S38: three color channel component matrices for encrypted images using arnold inverse transforms And/>Performing inverse scrambling operation and recovering to obtain three color channel component matrixesAnd/>The arnold inversion algorithm is as follows:
Wherein the method comprises the steps of Is the original position of the pixel,/>Alpha and beta are constants for the position after pixel scrambling;
Step S39: after the driving system and the response system reach the fixed time synchronization, selecting and in step S32 according to the discrete time sequence chaotic signal y i (t) of the response system And/>Corresponding chaotic signal sequence/>And/>
Step S310: the chaotic signal sequence obtained in the step S39And/>After specific conversion, three new signal sequences/>And/> Wherein/>And/>The element values of (3) are all one value of (0, 1, …, 255), and the specific conversion formula used in step S310 is:
Step S311: three new signal sequences obtained in step S310 And/>Three color channel component matrices respectively reduced in step S38/>And/>Performing exclusive or operation on the corresponding position elements of the image to obtain three color channel component matrixes/>, of the decrypted image, wherein the three color channel component matrixes/>, of the decrypted image are obtained through decryptionAnd/>
Step S312: three color channel component matrices of the decrypted image obtained in step S311 areAnd/>And (5) recombining to obtain a decrypted image.
2. The image encryption method based on the fixed time synchronization of the fuzzy neural network according to claim 1, wherein the response system is fixed time synchronized with the driving system, and an upper bound T of the fixed time is:
Wherein ψ is a constant and
3. An image encryption system based on fixed time synchronization of a fuzzy neural network applied to the method of claim 1, comprising:
Discrete time sequence chaotic signal acquisition module: the method is used for establishing a driving system and a response system based on a fuzzy neural network, setting a synchronous error, and designing an aperiodic intermittent adjusting synchronous controller so that the driving system and the response system are synchronous at a fixed time; after the driving system and the response system are synchronous, the driving system chaotic signal acquisition module selects three chaotic signal sequences according to a discrete time sequence chaotic signal x i (t) of the driving system AndThe response system chaotic signal acquisition module selects and/>, according to the discrete time sequence chaotic signal y i (t) of the response systemAnd/>Corresponding chaotic signal sequence/>And/>
The driving system chaotic signal conversion operation module: for sequencing chaotic signalsAnd/>After specific conversion, three new signal sequences/>And/>Wherein the method comprises the steps ofAnd/>The element value ranges of (1), (…) and (255) are all one value in (0, 1, … and 255);
And the response system chaotic signal conversion operation module: for sequencing chaotic signals And/>After specific conversion, three new signal sequences/>Wherein the method comprises the steps ofThe element value ranges of (1), (…) and (255) are all one value in (0, 1, … and 255);
the original color image component reading and extracting operation module comprises the following steps: used in the encryption process for reading the original color image and extracting the red component matrix of the original color image Green component matrix/>And blue component matrix/>
The encrypted image component reading and extracting operation module comprises: in the decryption process, the method is used for reading the encrypted image and extracting three color channel component matrixes of the encrypted image
Signal replacement operation module: for use in encrypting a signal sequenceAnd/>Three color component matrices/>, respectively with the original color imageAnd/>Performing exclusive OR operation on the corresponding position elements in the table; for inserting signal sequences/>, in decryption processesAnd/>Respectively with the reduced three color channel component matrices/> And/>Performing exclusive OR operation on the corresponding position elements in the table;
Signal scrambling operation module: used in the encryption process, arnold transformation is adopted to replace three color component matrixes And/>Scrambling operation is carried out to obtain a scrambled three-color channel component matrixAnd/>
The signal reverse scrambling operation module is as follows: three color channel component matrices for encrypted images using arnold inverse transforms in decryptionAnd/>Performing inverse scrambling operation, and recovering to obtain a color channel component matrix/>And/>
An encrypted image component combination operation module: three color channel component matrixes for combining encrypted images in encryption processAnd/>Generating an encrypted image;
a decrypted image component combining operation module: in the decryption process, three color channel component matrixes for combining decrypted images And (3) recombining and restoring to a color image.
CN202311305958.7A 2023-10-10 2023-10-10 Image encryption method and system based on fuzzy neural network fixed time synchronization Active CN117454394B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311305958.7A CN117454394B (en) 2023-10-10 2023-10-10 Image encryption method and system based on fuzzy neural network fixed time synchronization

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311305958.7A CN117454394B (en) 2023-10-10 2023-10-10 Image encryption method and system based on fuzzy neural network fixed time synchronization

Publications (2)

Publication Number Publication Date
CN117454394A CN117454394A (en) 2024-01-26
CN117454394B true CN117454394B (en) 2024-05-21

Family

ID=89593808

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311305958.7A Active CN117454394B (en) 2023-10-10 2023-10-10 Image encryption method and system based on fuzzy neural network fixed time synchronization

Country Status (1)

Country Link
CN (1) CN117454394B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115473464A (en) * 2022-09-19 2022-12-13 辽宁工程技术大学 Magnetic suspension yaw motor control method based on neural network model predictive control
CN115544542A (en) * 2022-09-29 2022-12-30 盐城工学院 Image encryption method based on memristor neural network synchronous control
CN116760933A (en) * 2023-07-03 2023-09-15 盐城工学院 Image encryption method and system based on neural network with reactive diffusion
CN116847033A (en) * 2023-07-03 2023-10-03 盐城工学院 Image encryption method and system based on inertial memristor neural network desynchronization

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110430435B (en) * 2019-08-09 2022-04-19 广东工业大学 Image encryption method and device, sensor and readable storage medium
JP2024519533A (en) * 2021-05-06 2024-05-15 ストロング フォース アイオーティ ポートフォリオ 2016,エルエルシー Quantum, Biological, Computer Vision and Neural Network Systems for the Industrial Internet of Things

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115473464A (en) * 2022-09-19 2022-12-13 辽宁工程技术大学 Magnetic suspension yaw motor control method based on neural network model predictive control
CN115544542A (en) * 2022-09-29 2022-12-30 盐城工学院 Image encryption method based on memristor neural network synchronous control
CN116760933A (en) * 2023-07-03 2023-09-15 盐城工学院 Image encryption method and system based on neural network with reactive diffusion
CN116847033A (en) * 2023-07-03 2023-10-03 盐城工学院 Image encryption method and system based on inertial memristor neural network desynchronization

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
忆阻型模糊细胞神经网络在时滞脉冲控制下的全局指数同步;牟晓辉;唐荣强;杨鑫松;;南通大学学报(自然科学版);20200320(第01期);全文 *

Also Published As

Publication number Publication date
CN117454394A (en) 2024-01-26

Similar Documents

Publication Publication Date Title
Ouyang et al. Impulsive synchronization of coupled delayed neural networks with actuator saturation and its application to image encryption
Hu et al. Sliding mode control for Markovian jump repeated scalar nonlinear systems with packet dropouts: The uncertain occurrence probabilities case
Zhang et al. Spatiotemporal chaos in mixed linear–nonlinear coupled logistic map lattice
Bao et al. Discrete memristive neuron model and its interspike interval-encoded application in image encryption
CN109104544B (en) Chaotic image encryption method based on complex network synchronization
CN116847033B (en) Image encryption method and system based on inertial memristor neural network desynchronization
CN116760933B (en) Image encryption method and system based on neural network with reactive diffusion
CN113746619B (en) Image encryption method, decryption method and system for predefined time synchronization control
CN113298268B (en) Vertical federal learning method and device based on anti-noise injection
Chen et al. Design of a model-free adaptive sliding mode control to synchronize chaotic fractional-order systems with input saturation: An application in secure communications
Gama et al. Controllability of bandlimited graph processes over random time varying graphs
Duan et al. Decentralized adaptive NN state-feedback control for large-scale stochastic high-order nonlinear systems
Wang et al. Pcnncec: Efficient and privacy-preserving convolutional neural network inference based on cloud-edge-client collaboration
Suma Community based network reconstruction for an evolutionary algorithm framework
CN117454394B (en) Image encryption method and system based on fuzzy neural network fixed time synchronization
CN116781369B (en) Image encryption method and system based on parameter uncertainty inertial neural network
CN117395067B (en) User data privacy protection system and method for Bayesian robust federal learning
CN117436098B (en) Image encryption method and system based on unknown disturbance inertial fuzzy neural network
CN116800508A (en) Complex value memristor neural network secret communication method with reaction diffusion term
Chen et al. Synchronization of reservoir computing models via a nonlinear controller
CN116193041A (en) Image encryption method based on multistable memristor and four-dimensional chaotic neural network
Liu et al. Secure state estimation for cyber-physical systems by unknown input observer with adaptive switching mechanism
Zhao et al. Accelerated projection algorithm based on smoothing approximation for distributed non-smooth optimization
CN117201687B (en) Image encryption method and system based on inertial memristor neural network projection synchronization
Wu et al. Distributed learning of human mobility patterns from cellular network data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant