CN117998025B - Key information identification image encryption method based on level metering operation - Google Patents
Key information identification image encryption method based on level metering operation Download PDFInfo
- Publication number
- CN117998025B CN117998025B CN202410407358.XA CN202410407358A CN117998025B CN 117998025 B CN117998025 B CN 117998025B CN 202410407358 A CN202410407358 A CN 202410407358A CN 117998025 B CN117998025 B CN 117998025B
- Authority
- CN
- China
- Prior art keywords
- image
- key information
- matrix
- sequence
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 25
- 239000011159 matrix material Substances 0.000 claims abstract description 43
- 238000005516 engineering process Methods 0.000 claims abstract description 7
- 238000007781 pre-processing Methods 0.000 claims abstract description 4
- 238000012163 sequencing technique Methods 0.000 claims description 12
- 238000005259 measurement Methods 0.000 claims description 6
- XTKDAFGWCDAMPY-UHFFFAOYSA-N azaperone Chemical compound C1=CC(F)=CC=C1C(=O)CCCN1CCN(C=2N=CC=CC=2)CC1 XTKDAFGWCDAMPY-UHFFFAOYSA-N 0.000 claims description 3
- 238000006073 displacement reaction Methods 0.000 claims description 3
- 230000007613 environmental effect Effects 0.000 abstract description 2
- 238000009792 diffusion process Methods 0.000 description 5
- 230000000739 chaotic effect Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 230000001413 cellular effect Effects 0.000 description 2
- 238000013478 data encryption standard Methods 0.000 description 2
- 108020004414 DNA Proteins 0.000 description 1
- 108091028043 Nucleic acid sequence Proteins 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000004880 explosion Methods 0.000 description 1
- 230000008092 positive effect Effects 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
- 238000004088 simulation Methods 0.000 description 1
- 238000007619 statistical method Methods 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Landscapes
- Image Processing (AREA)
Abstract
The invention discloses a key information identification image encryption method based on level metering operation, which is characterized by comprising the following steps: s1: preprocessing a plaintext image A with the size of MxN, and obtaining a key information image P of a summarized image key information area by identifying and positioning the plaintext image A; s2: establishing a sensitive key stream generation technology highly associated with a plaintext image A; s3: for the key information image P, bit values of its corresponding pixels are extracted as a bit matrix. The invention relates to the field of environmental protection equipment, in particular to a key information identification image encryption method based on level metering operation. The key information identification image encryption method based on the level metering operation is used for encrypting the key information twice in different levels, so that the security of the key information is effectively improved, and the key information identification image encryption method based on the level metering operation can be applied to the engineering fields of information security and the like and has important value.
Description
Technical Field
The invention relates to the field of environmental protection equipment, in particular to a key information identification image encryption method based on level metering operation.
Background
Today, with the advent of the information explosion age and the rapid development of network technology, secure transmission of information has become an increasingly interesting issue. There are various forms of information such as text, images, video and audio. Among them, images are often used in people's daily life because images can intuitively make people feel information that others want to communicate. Image encryption is one of the most important methods for ensuring confidentiality of image data. Several classical image encryption algorithms have been proposed, such as the Data Encryption Standard (DES), the Advanced Encryption Standard (AES), but they are no longer suitable for use in the field of image encryption. Finding a more efficient image encryption algorithm has become a further work direction for the relevant domain scholars. Therefore, in recent years, although many new image encryption algorithms have been proposed, including chaotic systems, DNA sequences, cellular automata, compressed sensing, boolean networks, perceptron-like networks, and the like. According to the method, the whole image is subjected to indifferent encryption, and the effective information of the whole image is only displayed in certain areas, so that the indifferent encryption protects the lacking important information, the non-important information is subjected to complex encryption operation, and timeliness is further reduced.
Because of its own characteristics, such as sensitivity to control, the chaotic system obtains wide application parameters and initial values, ergodic performance and unpredictability in image encryption. Common operations performed on chaos-based image encryption schemes include keystream generation using pseudo-random numbers obtained from a chaotic map, image pixel-level scrambling operations, and diffusion operations. In the prior art, for example, an image encryption algorithm based on DNA and cellular automaton and a plaintext related image encryption algorithm using a Lorenz system realize safe transmission of images in channels. However, the encryption scheme proposed at present is mostly divided into two steps of scrambling and diffusion, so that timeliness is lacking. The following drawbacks exist: (1) The encryption method is irrelevant to the plaintext information and is easy to select the plaintext attack, so that information leakage is caused; (2) The encryption method is divided into scrambling and diffusion, so that timeliness is poor; (3) Insufficient diffusion results in pixels that are vulnerable to statistical analysis. These drawbacks greatly reduce the security of the encryption method.
Disclosure of Invention
The key information identification image encryption method based on the level metering operation is used for encrypting the key information twice in different levels, so that the security of the key information is effectively improved, and the key information identification image encryption method based on the level metering operation can be applied to the engineering fields of information security and the like and has important value.
The invention adopts the following technical scheme to realize the aim of the invention:
the key information identification image encryption method based on the level metering operation is characterized by comprising the following steps of:
s1: preprocessing a plaintext image A with the size of MxN, and obtaining a key information image P of a summarized image key information area by identifying and positioning the plaintext image A;
S2: establishing a sensitive key stream generation technology highly associated with a plaintext image A;
S3: for the key information image P, extracting bit values of corresponding pixels as a bit matrix, and counting the number of 0 in the bit value of each pixel to obtain a level measurement matrix P_ZERO with the size of L multiplied by B;
s4: for the key stream M1, converting the key stream M1 into an LxB matrix, and counting the number of 1 in bit of each value of the matrix to obtain a level measurement matrix M 1 _ONE with the size of LxB;
s5: calculating a rotation control parameter matrix M_xuan of the key information image P, and performing rotation displacement on the key information image P through the M_xuan to obtain a rotation displaced image P_xuan;
S6: converting the image P_xuan into a level matrix with the size of L multiplied by 8 multiplied by B, marking the level matrix as P_bit, and longitudinally scrambling the level matrix to obtain an encrypted image P_encrypt of key information;
S7: replacing the encrypted image P_encrypt with the key information image P to obtain a semi-encrypted image A_half;
s8: and (5) carrying out quick encryption on the half-encrypted image A_half to obtain an encrypted image A_encrypt.
As a further limitation of the present technical solution, the specific steps of S1 are:
S11: after uniformly gridding the plaintext image A, converting the plaintext image A into a binary image;
s12: counting the duty ratio of the binary image of each grid region, and further counting the binary pixels of the expanded grid region;
S13: the area with the largest content in the binary pixel is set as a rectangular area of the key information, and the key information image P is obtained.
As a further limitation of the present technical solution, the specific steps of S2 are:
S21: randomly generating a 192-bit sequence as a key H, then acquiring a hash value I of a plaintext image A by using a SHA-256 hash function, and taking the hash value I as a part of the key, namely a key K= { H, I };
; (1)
S22: generating key stream by Lorentz system, and reading out initial parameter state of Lorentz systemAnd/>Then, parameters of pseudo-random key stream generation are calculated: /(I)And/>:
; (2)
S23: bringing the parameters into the Lorentz system, setting the size of the key information area as LXB, and iterating to generate the Lorentz system LXB times to obtain a sequence S 1、S2、S3:
; (3)
Wherein: Parameters representing the lorentz system;
,/>,/> is a state variable of the lorentz system time series;
n is a time series, S 1、S2、S3 is divided by L x B iterations ,/>,/>Composition;
s24: further processing of sequence S 1、S2、S3 results in a keystream { M 1、M2、M3 }:
; (4)
; (5)
; (6)
S25: the lorentz system is further iterated to obtain a sequence F of size mxn.
As a further limitation of the present technical solution, the specific step of S5 is:
s51: calculating a control parameter matrix m_xuan by equation 7 and equation 8:
; (7)
; (8)
S52: the obtained image p_xuan after rotating the key information image P by 9:
; (9)
As a further limitation of the present technical solution, the specific steps of S6 are:
s61: since the key information image P undergoes rotation only in the horizontal direction, p_bit of each layer is taken (i.e., k), k=1, 2, …, B, which is converted into the sequence Q k;
S62: taking a sequence of L multiplied by 8 in long bits from M 3, and sequencing the sequences according to the size to obtain a corresponding index sequence Sort;
S63: sequencing the sequence Q k according to the index sequence Sort, recovering the sequenced sequence Q k to be an L multiplied by 8 matrix, replacing the P_bit (k), and finally recombining the binary matrix P_bit to be a decimal matrix to obtain an encrypted image P_encrypt of key information.
As a further limitation of the present technical solution, the specific steps of S8 are:
s81: sequencing the sequence F to obtain a sequencing index F_start;
s82: converting A_half into a one-dimensional sequence, and then executing the following operations;
; (10)
S83: the sequence a_encrypt is converted into an mxn matrix.
Compared with the prior art, the invention has the advantages and positive effects that: the encryption method provided by the invention firstly adopts a new key stream generation method, and can effectively resist the attack of the known plaintext and the selected plaintext by generating the random key by a method depending on the original plaintext image. In addition, the encryption method of the key interference can change the position and the numerical value of the bit order of the pixel at the same time, so that the timeliness and the safety of encryption are further improved. And the identification of the object of the image effectively improves the safety of the key information. The key information identification image encryption method for level metering operation comprises a sensitive key stream technology for establishing high-correlation of plaintext, and the technology can sense small change of the plaintext so as to generate completely different key streams and effectively resist attack of selecting the plaintext. The key information is encrypted by high-safety level metering operation, the whole image is encrypted rapidly, the safety of the key information is effectively ensured, and meanwhile, the timeliness of encryption is improved. The bit values are disordered at the bit level, directly changing the values of the image pixels from a more macroscopic perspective. In addition, the synchronous scrambling and diffusion of the whole image effectively protects the safety of full-text information.
Drawings
FIG. 1 is a diagram of experimental simulation of the present invention.
In fig. 1, (a) represents an original image a; inside the basket in fig. 1 (b) is a key information image P; fig. 1 (c) represents an image after encryption of key information; fig. 1 (d) represents a full encrypted image a_encryption; fig. 1 (e) represents a decrypted image.
Detailed Description
One embodiment of the present invention will be described in detail below with reference to the attached drawings, but it should be understood that the scope of the present invention is not limited by the embodiment.
The invention comprises the following steps:
s1: preprocessing a plaintext image A with the size of MxN, and obtaining a key information image P of a summarized image key information area by identifying and positioning the plaintext image A;
the specific steps of the S1 are as follows:
S11: after uniformly gridding the plaintext image A, converting the plaintext image A into a binary image;
s12: counting the duty ratio of the binary image of each grid region, and further counting the binary pixels of the expanded grid region;
S13: the area with the largest content in the binary pixel is set as a rectangular area of the key information, and the key information image P is obtained.
S2: establishing a sensitive key stream generation technology highly associated with a plaintext image A;
the specific steps of the S2 are as follows:
S21: randomly generating a 192-bit sequence as a key H, then acquiring a hash value I of a plaintext image A by using a SHA-256 hash function, and taking the hash value I as a part of the key, namely a key K= { H, I };
; (1)
S22: generating key stream by Lorentz system, and reading out initial parameter state of Lorentz systemAnd/>Then, parameters of pseudo-random key stream generation are calculated: /(I)And/>:
; (2)
S23: bringing the parameters into the Lorentz system, setting the size of the key information area as LXB, and iterating to generate the Lorentz system LXB times to obtain a sequence S 1、S2、S3:
; (3)
Wherein: Parameters representing the lorentz system;
,/>,/> is a state variable of the lorentz system time series;
n is a time series, S 1、S2、S3 is divided by L x B iterations ,/>,/>Composition;
s24: further processing of sequence S 1、S2、S3 results in a keystream { M 1、M2、M3 }:
; (4)
; (5)
; (6)
S25: the lorentz system is further iterated to obtain a sequence F of size mxn.
S3: for the key information image P, extracting bit values of corresponding pixels as a bit matrix, and counting the number of 0 in the bit value of each pixel to obtain a level measurement matrix P_ZERO with the size of L multiplied by B;
s4: for the key stream M1, converting the key stream M1 into an LxB matrix, and counting the number of 1 in bit of each value of the matrix to obtain a level measurement matrix M 1 _ONE with the size of LxB;
s5: calculating a rotation control parameter matrix M_xuan of the key information image P, and performing rotation displacement on the key information image P through the M_xuan to obtain a rotation displaced image P_xuan;
The specific steps of the S5 are as follows:
s51: calculating a control parameter matrix m_xuan by equation 7 and equation 8:
; (7)
; (8)
S52: the obtained image p_xuan after rotating the key information image P by 9:
; (equation 9).
S6: converting the image P_xuan into a level matrix with the size of L multiplied by 8 multiplied by B, marking the level matrix as P_bit, and longitudinally scrambling the level matrix to obtain an encrypted image P_encrypt of key information;
the specific steps of the S6 are as follows:
s61: since the key information image P undergoes rotation only in the horizontal direction, p_bit of each layer is taken (i.e., k), k=1, 2, …, B, which is converted into the sequence Q k;
S62: taking a sequence of L multiplied by 8 in long bits from M 3, and sequencing the sequences according to the size to obtain a corresponding index sequence Sort;
S63: sequencing the sequence Q k according to the index sequence Sort, recovering the sequenced sequence Q k to be an L multiplied by 8 matrix, replacing the P_bit (k), and finally recombining the binary matrix P_bit to be a decimal matrix to obtain an encrypted image P_encrypt of key information.
S7: and replacing the encrypted image P_encrypt with the key information image P to obtain a semi-encrypted image A_half.
S8: and (5) carrying out quick encryption on the half-encrypted image A_half to obtain an encrypted image A_encrypt.
The specific steps of the S8 are as follows:
s81: sequencing the sequence F to obtain a sequencing index F_start;
s82: converting A_half into a one-dimensional sequence, and then executing the following operations;
; (10)
S83: the sequence a_encrypt is converted into an mxn matrix.
The above disclosure is merely illustrative of specific embodiments of the present invention, but the present invention is not limited thereto, and any variations that can be considered by those skilled in the art should fall within the scope of the present invention.
Claims (5)
1. The key information identification image encryption method based on the level metering operation is characterized by comprising the following steps of:
s1: preprocessing a plaintext image A with the size of MxN, and obtaining a key information image P of a summarized image key information area by identifying and positioning the plaintext image A;
S2: establishing a sensitive key stream generation technology highly associated with a plaintext image A;
the specific steps of the S2 are as follows:
S21: randomly generating a 192-bit sequence as a key H, then acquiring a hash value I of a plaintext image A by using a SHA-256 hash function, and taking the hash value I as a part of the key, namely a key K= { H, I };
; (1)
S22: generating key stream by Lorentz system, and reading out initial parameter state of Lorentz systemAnd/>Then, parameters of pseudo-random key stream generation are calculated: /(I)And/>:
; (2)
S23: bringing the parameters into the Lorentz system, setting the size of the key information area as LXB, and iterating to generate the Lorentz system LXB times to obtain a sequence S 1、S2、S3:
; (3)
Wherein: Parameters representing the lorentz system;
,/>,/> is a state variable of the lorentz system time series;
n is a time series, S 1、S2、S3 is divided by L x B iterations ,/>,/>Composition;
s24: further processing of sequence S 1、S2、S3 results in a keystream { M 1、M2、M3 }:
; (4)
; (5)
; (6)
S25: further iterating the Lorentz system to obtain a sequence F with the size of M multiplied by N;
S3: for the key information image P, extracting bit values of corresponding pixels as a bit matrix, and counting the number of 0 in the bit value of each pixel to obtain a level measurement matrix P_ZERO with the size of L multiplied by B;
s4: for the key stream M1, converting the key stream M1 into an LxB matrix, and counting the number of 1 in bit of each value of the matrix to obtain a level measurement matrix M 1 _ONE with the size of LxB;
s5: calculating a rotation control parameter matrix M_xuan of the key information image P, and performing rotation displacement on the key information image P through the M_xuan to obtain a rotation displaced image P_xuan;
S6: converting the image P_xuan into a level matrix with the size of L multiplied by 8 multiplied by B, marking the level matrix as P_bit, and longitudinally scrambling the level matrix to obtain an encrypted image P_encrypt of key information;
S7: replacing the encrypted image P_encrypt with the key information image P to obtain a semi-encrypted image A_half;
s8: and (5) carrying out quick encryption on the half-encrypted image A_half to obtain an encrypted image A_encrypt.
2. The key information identification image encryption method based on the level metric operation according to claim 1, characterized in that: the specific steps of the S1 are as follows:
S11: after uniformly gridding the plaintext image A, converting the plaintext image A into a binary image;
s12: counting the duty ratio of the binary image of each grid region, and further counting the binary pixels of the expanded grid region;
S13: the area with the largest content in the binary pixel is set as a rectangular area of the key information, and the key information image P is obtained.
3. The key information identification image encryption method based on the level metering operation according to claim 2, characterized in that: the specific steps of the S5 are as follows:
s51: calculating a control parameter matrix m_xuan by equation 7 and equation 8:
; (7)
; (8)
S52: the obtained image p_xuan after rotating the key information image P by 9:
; (equation 9).
4. The key information identification image encryption method based on level metric operation according to claim 3, wherein: the specific steps of the S6 are as follows:
s61: since the key information image P undergoes rotation only in the horizontal direction, p_bit of each layer is taken (i.e., k), k=1, 2, …, B, which is converted into the sequence Q k;
S62: taking a sequence of L multiplied by 8 in long bits from M 3, and sequencing the sequences according to the size to obtain a corresponding index sequence Sort;
S63: sequencing the sequence Q k according to the index sequence Sort, recovering the sequenced sequence Q k to be an L multiplied by 8 matrix, replacing the P_bit (k), and finally recombining the binary matrix P_bit to be a decimal matrix to obtain an encrypted image P_encrypt of key information.
5. The key information identification image encryption method based on the level metric operation according to claim 4, wherein: the specific steps of the S8 are as follows:
s81: sequencing the sequence F to obtain a sequencing index F_start;
s82: converting A_half into a one-dimensional sequence, and then executing the following operations;
; (10)
S83: the sequence a_encrypt is converted into an mxn matrix.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410407358.XA CN117998025B (en) | 2024-04-07 | 2024-04-07 | Key information identification image encryption method based on level metering operation |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410407358.XA CN117998025B (en) | 2024-04-07 | 2024-04-07 | Key information identification image encryption method based on level metering operation |
Publications (2)
Publication Number | Publication Date |
---|---|
CN117998025A CN117998025A (en) | 2024-05-07 |
CN117998025B true CN117998025B (en) | 2024-06-11 |
Family
ID=90887898
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202410407358.XA Active CN117998025B (en) | 2024-04-07 | 2024-04-07 | Key information identification image encryption method based on level metering operation |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117998025B (en) |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105681622A (en) * | 2015-12-31 | 2016-06-15 | 复旦大学 | Color image encryption method based on cellular neural network hyperchaos and DNA sequence |
CN108319859A (en) * | 2018-01-15 | 2018-07-24 | 西北工业大学 | A kind of grade synchronizes scramble diffusion and Pixel-level annular diffusion image encryption method |
CN108566500A (en) * | 2018-03-02 | 2018-09-21 | 西南交通大学 | The reversible hidden method of adapting to image encrypted domain based on Hybrid Encryption mechanism |
AU2020100421A4 (en) * | 2020-03-19 | 2020-04-30 | Yuming Fang | A multi-level encryption scheme for H.265/HEVC based on syntax elements scrambling |
CN112084517A (en) * | 2020-09-15 | 2020-12-15 | 郑州轻工业大学 | Image encryption method based on chaotic mapping and bit-level permutation |
CN113505280A (en) * | 2021-07-28 | 2021-10-15 | 全知科技(杭州)有限责任公司 | Sensitive key information identification and extraction technology for general scene |
WO2021227349A1 (en) * | 2020-05-11 | 2021-11-18 | 华南理工大学 | Front-end facial image encryption and recognition method for biometric privacy protection |
WO2022077793A1 (en) * | 2020-10-16 | 2022-04-21 | 齐鲁工业大学 | Image encryption communication algorithm based on two-dimensional lag-complex logistic mapping, and image decryption communication algorithm based on two-dimensional lag-complex logistic mapping |
CN114465706A (en) * | 2021-12-01 | 2022-05-10 | 哈尔滨理工大学 | Image parallel encryption method in network office batch based on hyperchaos |
CN116383837A (en) * | 2023-03-06 | 2023-07-04 | 广东海洋大学 | Image hiding method, system and equipment |
CN116567160A (en) * | 2023-05-10 | 2023-08-08 | 辽宁工程技术大学 | Wavelet fusion multi-image encryption method based on improved Lorentz chaos and New Joseph |
WO2024007095A1 (en) * | 2022-07-04 | 2024-01-11 | 嘉兴尚坤科技有限公司 | Secure encryption method and system for face data of door access control system |
-
2024
- 2024-04-07 CN CN202410407358.XA patent/CN117998025B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105681622A (en) * | 2015-12-31 | 2016-06-15 | 复旦大学 | Color image encryption method based on cellular neural network hyperchaos and DNA sequence |
CN108319859A (en) * | 2018-01-15 | 2018-07-24 | 西北工业大学 | A kind of grade synchronizes scramble diffusion and Pixel-level annular diffusion image encryption method |
CN108566500A (en) * | 2018-03-02 | 2018-09-21 | 西南交通大学 | The reversible hidden method of adapting to image encrypted domain based on Hybrid Encryption mechanism |
AU2020100421A4 (en) * | 2020-03-19 | 2020-04-30 | Yuming Fang | A multi-level encryption scheme for H.265/HEVC based on syntax elements scrambling |
WO2021227349A1 (en) * | 2020-05-11 | 2021-11-18 | 华南理工大学 | Front-end facial image encryption and recognition method for biometric privacy protection |
CN112084517A (en) * | 2020-09-15 | 2020-12-15 | 郑州轻工业大学 | Image encryption method based on chaotic mapping and bit-level permutation |
WO2022077793A1 (en) * | 2020-10-16 | 2022-04-21 | 齐鲁工业大学 | Image encryption communication algorithm based on two-dimensional lag-complex logistic mapping, and image decryption communication algorithm based on two-dimensional lag-complex logistic mapping |
CN113505280A (en) * | 2021-07-28 | 2021-10-15 | 全知科技(杭州)有限责任公司 | Sensitive key information identification and extraction technology for general scene |
CN114465706A (en) * | 2021-12-01 | 2022-05-10 | 哈尔滨理工大学 | Image parallel encryption method in network office batch based on hyperchaos |
WO2024007095A1 (en) * | 2022-07-04 | 2024-01-11 | 嘉兴尚坤科技有限公司 | Secure encryption method and system for face data of door access control system |
CN116383837A (en) * | 2023-03-06 | 2023-07-04 | 广东海洋大学 | Image hiding method, system and equipment |
CN116567160A (en) * | 2023-05-10 | 2023-08-08 | 辽宁工程技术大学 | Wavelet fusion multi-image encryption method based on improved Lorentz chaos and New Joseph |
Non-Patent Citations (7)
Title |
---|
An Image Encryption Scheme Based on Logistic Quantum Chaos;Wang Yu;Entropy;20220208;全文 * |
Design a 1D extended logistic map for a secure image encyption;Qiying Ren;Physica Scripta;20230705;全文 * |
基于改进二维混沌映射的彩色图像加密算法;纪元法;计算机仿真;20230415;全文 * |
基于物理随机位生成器与混沌像素交叉互换的图像加密算法;郭静博;;包装工程;20180710(13);全文 * |
基于特征选择算法的无线网络关键数据加密方法;朴承哲;;宁夏师范学院学报;20200415(04);全文 * |
整合ChaCha20哈希运算的分块扩散自适应图像加密算法;宋金林;张绍武;;中国图象图形学报;20160616(06);全文 * |
混沌映射与比特重组的图像加密;平萍;李健华;毛莺池;戚荣志;;中国图象图形学报;20171016(10);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN117998025A (en) | 2024-05-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hua et al. | Color image encryption using orthogonal Latin squares and a new 2D chaotic system | |
Li et al. | Cryptanalyzing an image-scrambling encryption algorithm of pixel bits | |
Enayatifar et al. | Image encryption using a synchronous permutation-diffusion technique | |
Ye et al. | An efficient symmetric image encryption algorithm based on an intertwining logistic map | |
Zhu et al. | Plaintext-related image encryption algorithm based on block structure and five-dimensional chaotic map | |
Gong et al. | Quantum image encryption algorithm based on quantum image XOR operations | |
Zhang et al. | A novel image encryption algorithm based on DNA subsequence operation | |
Sharif et al. | A novel method for digital image steganography based on a new three-dimensional chaotic map | |
CN106651976B (en) | A kind of image encryption method based on cluster and chaos | |
CN111461952A (en) | Image encryption method, computer device, and computer-readable storage medium | |
Fu-Yan et al. | Image encryption using high-dimension chaotic system | |
Rachmawanto et al. | A comparative study of image cryptographic method | |
CN105701755A (en) | Image encryption method based on fractal and DNA sequence operation | |
Zhao et al. | Primitively visually meaningful image encryption: A new paradigm | |
CN114679250A (en) | Image encryption algorithm based on mixed chaos and Arnold transformation | |
Akgul et al. | A novel data hiding method by using a chaotic system without equilibrium points | |
Fang et al. | A secure chaotic block image encryption algorithm using generative adversarial networks and DNA sequence coding | |
Zhou et al. | Novel multiple-image encryption algorithm based on a two-dimensional hyperchaotic modular model | |
CN110225222B (en) | Image encryption method based on 3D orthogonal Latin square and chaotic system | |
Zhou | A quantum image encryption method based on DNACNot | |
Hu et al. | On the Security Analysis of a Hopfield Chaotic Neural Network‐Based Image Encryption Algorithm | |
Wang et al. | Image encryption algorithm based on bit-level permutation and dynamic overlap diffusion | |
CN104050625B (en) | A kind of plaintext builds the composite chaotic image encryption method of initial key | |
Babu et al. | Higher dimensional chaos for Audio encryption | |
CN117998025B (en) | Key information identification image encryption method based on level metering operation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |