CN117998025B - Key information identification image encryption method based on level metering operation - Google Patents

Key information identification image encryption method based on level metering operation Download PDF

Info

Publication number
CN117998025B
CN117998025B CN202410407358.XA CN202410407358A CN117998025B CN 117998025 B CN117998025 B CN 117998025B CN 202410407358 A CN202410407358 A CN 202410407358A CN 117998025 B CN117998025 B CN 117998025B
Authority
CN
China
Prior art keywords
image
key information
matrix
sequence
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202410407358.XA
Other languages
Chinese (zh)
Other versions
CN117998025A (en
Inventor
李孔顺
代婷婷
高文鹏
王志鹏
任启迎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Qingcheng Digital Technology Co ltd
Original Assignee
Shandong Qingcheng Digital Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Qingcheng Digital Technology Co ltd filed Critical Shandong Qingcheng Digital Technology Co ltd
Priority to CN202410407358.XA priority Critical patent/CN117998025B/en
Publication of CN117998025A publication Critical patent/CN117998025A/en
Application granted granted Critical
Publication of CN117998025B publication Critical patent/CN117998025B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Image Processing (AREA)

Abstract

The invention discloses a key information identification image encryption method based on level metering operation, which is characterized by comprising the following steps: s1: preprocessing a plaintext image A with the size of MxN, and obtaining a key information image P of a summarized image key information area by identifying and positioning the plaintext image A; s2: establishing a sensitive key stream generation technology highly associated with a plaintext image A; s3: for the key information image P, bit values of its corresponding pixels are extracted as a bit matrix. The invention relates to the field of environmental protection equipment, in particular to a key information identification image encryption method based on level metering operation. The key information identification image encryption method based on the level metering operation is used for encrypting the key information twice in different levels, so that the security of the key information is effectively improved, and the key information identification image encryption method based on the level metering operation can be applied to the engineering fields of information security and the like and has important value.

Description

Key information identification image encryption method based on level metering operation
Technical Field
The invention relates to the field of environmental protection equipment, in particular to a key information identification image encryption method based on level metering operation.
Background
Today, with the advent of the information explosion age and the rapid development of network technology, secure transmission of information has become an increasingly interesting issue. There are various forms of information such as text, images, video and audio. Among them, images are often used in people's daily life because images can intuitively make people feel information that others want to communicate. Image encryption is one of the most important methods for ensuring confidentiality of image data. Several classical image encryption algorithms have been proposed, such as the Data Encryption Standard (DES), the Advanced Encryption Standard (AES), but they are no longer suitable for use in the field of image encryption. Finding a more efficient image encryption algorithm has become a further work direction for the relevant domain scholars. Therefore, in recent years, although many new image encryption algorithms have been proposed, including chaotic systems, DNA sequences, cellular automata, compressed sensing, boolean networks, perceptron-like networks, and the like. According to the method, the whole image is subjected to indifferent encryption, and the effective information of the whole image is only displayed in certain areas, so that the indifferent encryption protects the lacking important information, the non-important information is subjected to complex encryption operation, and timeliness is further reduced.
Because of its own characteristics, such as sensitivity to control, the chaotic system obtains wide application parameters and initial values, ergodic performance and unpredictability in image encryption. Common operations performed on chaos-based image encryption schemes include keystream generation using pseudo-random numbers obtained from a chaotic map, image pixel-level scrambling operations, and diffusion operations. In the prior art, for example, an image encryption algorithm based on DNA and cellular automaton and a plaintext related image encryption algorithm using a Lorenz system realize safe transmission of images in channels. However, the encryption scheme proposed at present is mostly divided into two steps of scrambling and diffusion, so that timeliness is lacking. The following drawbacks exist: (1) The encryption method is irrelevant to the plaintext information and is easy to select the plaintext attack, so that information leakage is caused; (2) The encryption method is divided into scrambling and diffusion, so that timeliness is poor; (3) Insufficient diffusion results in pixels that are vulnerable to statistical analysis. These drawbacks greatly reduce the security of the encryption method.
Disclosure of Invention
The key information identification image encryption method based on the level metering operation is used for encrypting the key information twice in different levels, so that the security of the key information is effectively improved, and the key information identification image encryption method based on the level metering operation can be applied to the engineering fields of information security and the like and has important value.
The invention adopts the following technical scheme to realize the aim of the invention:
the key information identification image encryption method based on the level metering operation is characterized by comprising the following steps of:
s1: preprocessing a plaintext image A with the size of MxN, and obtaining a key information image P of a summarized image key information area by identifying and positioning the plaintext image A;
S2: establishing a sensitive key stream generation technology highly associated with a plaintext image A;
S3: for the key information image P, extracting bit values of corresponding pixels as a bit matrix, and counting the number of 0 in the bit value of each pixel to obtain a level measurement matrix P_ZERO with the size of L multiplied by B;
s4: for the key stream M1, converting the key stream M1 into an LxB matrix, and counting the number of 1 in bit of each value of the matrix to obtain a level measurement matrix M 1 _ONE with the size of LxB;
s5: calculating a rotation control parameter matrix M_xuan of the key information image P, and performing rotation displacement on the key information image P through the M_xuan to obtain a rotation displaced image P_xuan;
S6: converting the image P_xuan into a level matrix with the size of L multiplied by 8 multiplied by B, marking the level matrix as P_bit, and longitudinally scrambling the level matrix to obtain an encrypted image P_encrypt of key information;
S7: replacing the encrypted image P_encrypt with the key information image P to obtain a semi-encrypted image A_half;
s8: and (5) carrying out quick encryption on the half-encrypted image A_half to obtain an encrypted image A_encrypt.
As a further limitation of the present technical solution, the specific steps of S1 are:
S11: after uniformly gridding the plaintext image A, converting the plaintext image A into a binary image;
s12: counting the duty ratio of the binary image of each grid region, and further counting the binary pixels of the expanded grid region;
S13: the area with the largest content in the binary pixel is set as a rectangular area of the key information, and the key information image P is obtained.
As a further limitation of the present technical solution, the specific steps of S2 are:
S21: randomly generating a 192-bit sequence as a key H, then acquiring a hash value I of a plaintext image A by using a SHA-256 hash function, and taking the hash value I as a part of the key, namely a key K= { H, I };
; (1)
S22: generating key stream by Lorentz system, and reading out initial parameter state of Lorentz systemAnd/>Then, parameters of pseudo-random key stream generation are calculated: /(I)And/>
; (2)
S23: bringing the parameters into the Lorentz system, setting the size of the key information area as LXB, and iterating to generate the Lorentz system LXB times to obtain a sequence S 1、S2、S3:
; (3)
Wherein: Parameters representing the lorentz system;
,/>,/> is a state variable of the lorentz system time series;
n is a time series, S 1、S2、S3 is divided by L x B iterations ,/>,/>Composition;
s24: further processing of sequence S 1、S2、S3 results in a keystream { M 1、M2、M3 }:
; (4)
; (5)
; (6)
S25: the lorentz system is further iterated to obtain a sequence F of size mxn.
As a further limitation of the present technical solution, the specific step of S5 is:
s51: calculating a control parameter matrix m_xuan by equation 7 and equation 8:
; (7)
; (8)
S52: the obtained image p_xuan after rotating the key information image P by 9:
; (9)
As a further limitation of the present technical solution, the specific steps of S6 are:
s61: since the key information image P undergoes rotation only in the horizontal direction, p_bit of each layer is taken (i.e., k), k=1, 2, …, B, which is converted into the sequence Q k;
S62: taking a sequence of L multiplied by 8 in long bits from M 3, and sequencing the sequences according to the size to obtain a corresponding index sequence Sort;
S63: sequencing the sequence Q k according to the index sequence Sort, recovering the sequenced sequence Q k to be an L multiplied by 8 matrix, replacing the P_bit (k), and finally recombining the binary matrix P_bit to be a decimal matrix to obtain an encrypted image P_encrypt of key information.
As a further limitation of the present technical solution, the specific steps of S8 are:
s81: sequencing the sequence F to obtain a sequencing index F_start;
s82: converting A_half into a one-dimensional sequence, and then executing the following operations;
; (10)
S83: the sequence a_encrypt is converted into an mxn matrix.
Compared with the prior art, the invention has the advantages and positive effects that: the encryption method provided by the invention firstly adopts a new key stream generation method, and can effectively resist the attack of the known plaintext and the selected plaintext by generating the random key by a method depending on the original plaintext image. In addition, the encryption method of the key interference can change the position and the numerical value of the bit order of the pixel at the same time, so that the timeliness and the safety of encryption are further improved. And the identification of the object of the image effectively improves the safety of the key information. The key information identification image encryption method for level metering operation comprises a sensitive key stream technology for establishing high-correlation of plaintext, and the technology can sense small change of the plaintext so as to generate completely different key streams and effectively resist attack of selecting the plaintext. The key information is encrypted by high-safety level metering operation, the whole image is encrypted rapidly, the safety of the key information is effectively ensured, and meanwhile, the timeliness of encryption is improved. The bit values are disordered at the bit level, directly changing the values of the image pixels from a more macroscopic perspective. In addition, the synchronous scrambling and diffusion of the whole image effectively protects the safety of full-text information.
Drawings
FIG. 1 is a diagram of experimental simulation of the present invention.
In fig. 1, (a) represents an original image a; inside the basket in fig. 1 (b) is a key information image P; fig. 1 (c) represents an image after encryption of key information; fig. 1 (d) represents a full encrypted image a_encryption; fig. 1 (e) represents a decrypted image.
Detailed Description
One embodiment of the present invention will be described in detail below with reference to the attached drawings, but it should be understood that the scope of the present invention is not limited by the embodiment.
The invention comprises the following steps:
s1: preprocessing a plaintext image A with the size of MxN, and obtaining a key information image P of a summarized image key information area by identifying and positioning the plaintext image A;
the specific steps of the S1 are as follows:
S11: after uniformly gridding the plaintext image A, converting the plaintext image A into a binary image;
s12: counting the duty ratio of the binary image of each grid region, and further counting the binary pixels of the expanded grid region;
S13: the area with the largest content in the binary pixel is set as a rectangular area of the key information, and the key information image P is obtained.
S2: establishing a sensitive key stream generation technology highly associated with a plaintext image A;
the specific steps of the S2 are as follows:
S21: randomly generating a 192-bit sequence as a key H, then acquiring a hash value I of a plaintext image A by using a SHA-256 hash function, and taking the hash value I as a part of the key, namely a key K= { H, I };
; (1)
S22: generating key stream by Lorentz system, and reading out initial parameter state of Lorentz systemAnd/>Then, parameters of pseudo-random key stream generation are calculated: /(I)And/>
; (2)
S23: bringing the parameters into the Lorentz system, setting the size of the key information area as LXB, and iterating to generate the Lorentz system LXB times to obtain a sequence S 1、S2、S3:
; (3)
Wherein: Parameters representing the lorentz system;
,/>,/> is a state variable of the lorentz system time series;
n is a time series, S 1、S2、S3 is divided by L x B iterations ,/>,/>Composition;
s24: further processing of sequence S 1、S2、S3 results in a keystream { M 1、M2、M3 }:
; (4)
; (5)
; (6)
S25: the lorentz system is further iterated to obtain a sequence F of size mxn.
S3: for the key information image P, extracting bit values of corresponding pixels as a bit matrix, and counting the number of 0 in the bit value of each pixel to obtain a level measurement matrix P_ZERO with the size of L multiplied by B;
s4: for the key stream M1, converting the key stream M1 into an LxB matrix, and counting the number of 1 in bit of each value of the matrix to obtain a level measurement matrix M 1 _ONE with the size of LxB;
s5: calculating a rotation control parameter matrix M_xuan of the key information image P, and performing rotation displacement on the key information image P through the M_xuan to obtain a rotation displaced image P_xuan;
The specific steps of the S5 are as follows:
s51: calculating a control parameter matrix m_xuan by equation 7 and equation 8:
; (7)
; (8)
S52: the obtained image p_xuan after rotating the key information image P by 9:
; (equation 9).
S6: converting the image P_xuan into a level matrix with the size of L multiplied by 8 multiplied by B, marking the level matrix as P_bit, and longitudinally scrambling the level matrix to obtain an encrypted image P_encrypt of key information;
the specific steps of the S6 are as follows:
s61: since the key information image P undergoes rotation only in the horizontal direction, p_bit of each layer is taken (i.e., k), k=1, 2, …, B, which is converted into the sequence Q k;
S62: taking a sequence of L multiplied by 8 in long bits from M 3, and sequencing the sequences according to the size to obtain a corresponding index sequence Sort;
S63: sequencing the sequence Q k according to the index sequence Sort, recovering the sequenced sequence Q k to be an L multiplied by 8 matrix, replacing the P_bit (k), and finally recombining the binary matrix P_bit to be a decimal matrix to obtain an encrypted image P_encrypt of key information.
S7: and replacing the encrypted image P_encrypt with the key information image P to obtain a semi-encrypted image A_half.
S8: and (5) carrying out quick encryption on the half-encrypted image A_half to obtain an encrypted image A_encrypt.
The specific steps of the S8 are as follows:
s81: sequencing the sequence F to obtain a sequencing index F_start;
s82: converting A_half into a one-dimensional sequence, and then executing the following operations;
; (10)
S83: the sequence a_encrypt is converted into an mxn matrix.
The above disclosure is merely illustrative of specific embodiments of the present invention, but the present invention is not limited thereto, and any variations that can be considered by those skilled in the art should fall within the scope of the present invention.

Claims (5)

1. The key information identification image encryption method based on the level metering operation is characterized by comprising the following steps of:
s1: preprocessing a plaintext image A with the size of MxN, and obtaining a key information image P of a summarized image key information area by identifying and positioning the plaintext image A;
S2: establishing a sensitive key stream generation technology highly associated with a plaintext image A;
the specific steps of the S2 are as follows:
S21: randomly generating a 192-bit sequence as a key H, then acquiring a hash value I of a plaintext image A by using a SHA-256 hash function, and taking the hash value I as a part of the key, namely a key K= { H, I };
; (1)
S22: generating key stream by Lorentz system, and reading out initial parameter state of Lorentz systemAnd/>Then, parameters of pseudo-random key stream generation are calculated: /(I)And/>
; (2)
S23: bringing the parameters into the Lorentz system, setting the size of the key information area as LXB, and iterating to generate the Lorentz system LXB times to obtain a sequence S 1、S2、S3:
; (3)
Wherein: Parameters representing the lorentz system;
,/>,/> is a state variable of the lorentz system time series;
n is a time series, S 1、S2、S3 is divided by L x B iterations ,/>,/>Composition;
s24: further processing of sequence S 1、S2、S3 results in a keystream { M 1、M2、M3 }:
; (4)
; (5)
; (6)
S25: further iterating the Lorentz system to obtain a sequence F with the size of M multiplied by N;
S3: for the key information image P, extracting bit values of corresponding pixels as a bit matrix, and counting the number of 0 in the bit value of each pixel to obtain a level measurement matrix P_ZERO with the size of L multiplied by B;
s4: for the key stream M1, converting the key stream M1 into an LxB matrix, and counting the number of 1 in bit of each value of the matrix to obtain a level measurement matrix M 1 _ONE with the size of LxB;
s5: calculating a rotation control parameter matrix M_xuan of the key information image P, and performing rotation displacement on the key information image P through the M_xuan to obtain a rotation displaced image P_xuan;
S6: converting the image P_xuan into a level matrix with the size of L multiplied by 8 multiplied by B, marking the level matrix as P_bit, and longitudinally scrambling the level matrix to obtain an encrypted image P_encrypt of key information;
S7: replacing the encrypted image P_encrypt with the key information image P to obtain a semi-encrypted image A_half;
s8: and (5) carrying out quick encryption on the half-encrypted image A_half to obtain an encrypted image A_encrypt.
2. The key information identification image encryption method based on the level metric operation according to claim 1, characterized in that: the specific steps of the S1 are as follows:
S11: after uniformly gridding the plaintext image A, converting the plaintext image A into a binary image;
s12: counting the duty ratio of the binary image of each grid region, and further counting the binary pixels of the expanded grid region;
S13: the area with the largest content in the binary pixel is set as a rectangular area of the key information, and the key information image P is obtained.
3. The key information identification image encryption method based on the level metering operation according to claim 2, characterized in that: the specific steps of the S5 are as follows:
s51: calculating a control parameter matrix m_xuan by equation 7 and equation 8:
; (7)
; (8)
S52: the obtained image p_xuan after rotating the key information image P by 9:
; (equation 9).
4. The key information identification image encryption method based on level metric operation according to claim 3, wherein: the specific steps of the S6 are as follows:
s61: since the key information image P undergoes rotation only in the horizontal direction, p_bit of each layer is taken (i.e., k), k=1, 2, …, B, which is converted into the sequence Q k;
S62: taking a sequence of L multiplied by 8 in long bits from M 3, and sequencing the sequences according to the size to obtain a corresponding index sequence Sort;
S63: sequencing the sequence Q k according to the index sequence Sort, recovering the sequenced sequence Q k to be an L multiplied by 8 matrix, replacing the P_bit (k), and finally recombining the binary matrix P_bit to be a decimal matrix to obtain an encrypted image P_encrypt of key information.
5. The key information identification image encryption method based on the level metric operation according to claim 4, wherein: the specific steps of the S8 are as follows:
s81: sequencing the sequence F to obtain a sequencing index F_start;
s82: converting A_half into a one-dimensional sequence, and then executing the following operations;
; (10)
S83: the sequence a_encrypt is converted into an mxn matrix.
CN202410407358.XA 2024-04-07 2024-04-07 Key information identification image encryption method based on level metering operation Active CN117998025B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410407358.XA CN117998025B (en) 2024-04-07 2024-04-07 Key information identification image encryption method based on level metering operation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410407358.XA CN117998025B (en) 2024-04-07 2024-04-07 Key information identification image encryption method based on level metering operation

Publications (2)

Publication Number Publication Date
CN117998025A CN117998025A (en) 2024-05-07
CN117998025B true CN117998025B (en) 2024-06-11

Family

ID=90887898

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410407358.XA Active CN117998025B (en) 2024-04-07 2024-04-07 Key information identification image encryption method based on level metering operation

Country Status (1)

Country Link
CN (1) CN117998025B (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105681622A (en) * 2015-12-31 2016-06-15 复旦大学 Color image encryption method based on cellular neural network hyperchaos and DNA sequence
CN108319859A (en) * 2018-01-15 2018-07-24 西北工业大学 A kind of grade synchronizes scramble diffusion and Pixel-level annular diffusion image encryption method
CN108566500A (en) * 2018-03-02 2018-09-21 西南交通大学 The reversible hidden method of adapting to image encrypted domain based on Hybrid Encryption mechanism
AU2020100421A4 (en) * 2020-03-19 2020-04-30 Yuming Fang A multi-level encryption scheme for H.265/HEVC based on syntax elements scrambling
CN112084517A (en) * 2020-09-15 2020-12-15 郑州轻工业大学 Image encryption method based on chaotic mapping and bit-level permutation
CN113505280A (en) * 2021-07-28 2021-10-15 全知科技(杭州)有限责任公司 Sensitive key information identification and extraction technology for general scene
WO2021227349A1 (en) * 2020-05-11 2021-11-18 华南理工大学 Front-end facial image encryption and recognition method for biometric privacy protection
WO2022077793A1 (en) * 2020-10-16 2022-04-21 齐鲁工业大学 Image encryption communication algorithm based on two-dimensional lag-complex logistic mapping, and image decryption communication algorithm based on two-dimensional lag-complex logistic mapping
CN114465706A (en) * 2021-12-01 2022-05-10 哈尔滨理工大学 Image parallel encryption method in network office batch based on hyperchaos
CN116383837A (en) * 2023-03-06 2023-07-04 广东海洋大学 Image hiding method, system and equipment
CN116567160A (en) * 2023-05-10 2023-08-08 辽宁工程技术大学 Wavelet fusion multi-image encryption method based on improved Lorentz chaos and New Joseph
WO2024007095A1 (en) * 2022-07-04 2024-01-11 嘉兴尚坤科技有限公司 Secure encryption method and system for face data of door access control system

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105681622A (en) * 2015-12-31 2016-06-15 复旦大学 Color image encryption method based on cellular neural network hyperchaos and DNA sequence
CN108319859A (en) * 2018-01-15 2018-07-24 西北工业大学 A kind of grade synchronizes scramble diffusion and Pixel-level annular diffusion image encryption method
CN108566500A (en) * 2018-03-02 2018-09-21 西南交通大学 The reversible hidden method of adapting to image encrypted domain based on Hybrid Encryption mechanism
AU2020100421A4 (en) * 2020-03-19 2020-04-30 Yuming Fang A multi-level encryption scheme for H.265/HEVC based on syntax elements scrambling
WO2021227349A1 (en) * 2020-05-11 2021-11-18 华南理工大学 Front-end facial image encryption and recognition method for biometric privacy protection
CN112084517A (en) * 2020-09-15 2020-12-15 郑州轻工业大学 Image encryption method based on chaotic mapping and bit-level permutation
WO2022077793A1 (en) * 2020-10-16 2022-04-21 齐鲁工业大学 Image encryption communication algorithm based on two-dimensional lag-complex logistic mapping, and image decryption communication algorithm based on two-dimensional lag-complex logistic mapping
CN113505280A (en) * 2021-07-28 2021-10-15 全知科技(杭州)有限责任公司 Sensitive key information identification and extraction technology for general scene
CN114465706A (en) * 2021-12-01 2022-05-10 哈尔滨理工大学 Image parallel encryption method in network office batch based on hyperchaos
WO2024007095A1 (en) * 2022-07-04 2024-01-11 嘉兴尚坤科技有限公司 Secure encryption method and system for face data of door access control system
CN116383837A (en) * 2023-03-06 2023-07-04 广东海洋大学 Image hiding method, system and equipment
CN116567160A (en) * 2023-05-10 2023-08-08 辽宁工程技术大学 Wavelet fusion multi-image encryption method based on improved Lorentz chaos and New Joseph

Non-Patent Citations (7)

* Cited by examiner, † Cited by third party
Title
An Image Encryption Scheme Based on Logistic Quantum Chaos;Wang Yu;Entropy;20220208;全文 *
Design a 1D extended logistic map for a secure image encyption;Qiying Ren;Physica Scripta;20230705;全文 *
基于改进二维混沌映射的彩色图像加密算法;纪元法;计算机仿真;20230415;全文 *
基于物理随机位生成器与混沌像素交叉互换的图像加密算法;郭静博;;包装工程;20180710(13);全文 *
基于特征选择算法的无线网络关键数据加密方法;朴承哲;;宁夏师范学院学报;20200415(04);全文 *
整合ChaCha20哈希运算的分块扩散自适应图像加密算法;宋金林;张绍武;;中国图象图形学报;20160616(06);全文 *
混沌映射与比特重组的图像加密;平萍;李健华;毛莺池;戚荣志;;中国图象图形学报;20171016(10);全文 *

Also Published As

Publication number Publication date
CN117998025A (en) 2024-05-07

Similar Documents

Publication Publication Date Title
Hua et al. Color image encryption using orthogonal Latin squares and a new 2D chaotic system
Li et al. Cryptanalyzing an image-scrambling encryption algorithm of pixel bits
Enayatifar et al. Image encryption using a synchronous permutation-diffusion technique
Ye et al. An efficient symmetric image encryption algorithm based on an intertwining logistic map
Zhu et al. Plaintext-related image encryption algorithm based on block structure and five-dimensional chaotic map
Gong et al. Quantum image encryption algorithm based on quantum image XOR operations
Zhang et al. A novel image encryption algorithm based on DNA subsequence operation
Sharif et al. A novel method for digital image steganography based on a new three-dimensional chaotic map
CN106651976B (en) A kind of image encryption method based on cluster and chaos
CN111461952A (en) Image encryption method, computer device, and computer-readable storage medium
Fu-Yan et al. Image encryption using high-dimension chaotic system
Rachmawanto et al. A comparative study of image cryptographic method
CN105701755A (en) Image encryption method based on fractal and DNA sequence operation
Zhao et al. Primitively visually meaningful image encryption: A new paradigm
CN114679250A (en) Image encryption algorithm based on mixed chaos and Arnold transformation
Akgul et al. A novel data hiding method by using a chaotic system without equilibrium points
Fang et al. A secure chaotic block image encryption algorithm using generative adversarial networks and DNA sequence coding
Zhou et al. Novel multiple-image encryption algorithm based on a two-dimensional hyperchaotic modular model
CN110225222B (en) Image encryption method based on 3D orthogonal Latin square and chaotic system
Zhou A quantum image encryption method based on DNACNot
Hu et al. On the Security Analysis of a Hopfield Chaotic Neural Network‐Based Image Encryption Algorithm
Wang et al. Image encryption algorithm based on bit-level permutation and dynamic overlap diffusion
CN104050625B (en) A kind of plaintext builds the composite chaotic image encryption method of initial key
Babu et al. Higher dimensional chaos for Audio encryption
CN117998025B (en) Key information identification image encryption method based on level metering operation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant