TWI452890B - Chaotic image encryption method for cloud album - Google Patents

Chaotic image encryption method for cloud album Download PDF

Info

Publication number
TWI452890B
TWI452890B TW101134063A TW101134063A TWI452890B TW I452890 B TWI452890 B TW I452890B TW 101134063 A TW101134063 A TW 101134063A TW 101134063 A TW101134063 A TW 101134063A TW I452890 B TWI452890 B TW I452890B
Authority
TW
Taiwan
Prior art keywords
image
chaotic
photo album
cloud
pixel
Prior art date
Application number
TW101134063A
Other languages
Chinese (zh)
Other versions
TW201414258A (en
Inventor
Chao Jung Cheng
Original Assignee
Univ Kun Shan
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Univ Kun Shan filed Critical Univ Kun Shan
Priority to TW101134063A priority Critical patent/TWI452890B/en
Publication of TW201414258A publication Critical patent/TW201414258A/en
Application granted granted Critical
Publication of TWI452890B publication Critical patent/TWI452890B/en

Links

Landscapes

  • Image Processing (AREA)

Description

雲端相簿之圖像混沌加密方法Image chaotic encryption method for cloud photo album

本發明係有關於一種雲端相簿之圖像混沌加密方法,尤其是指一種使用者登入雲端相簿伺服端,欲傳送圖像至雲端相簿時對其所執行之加密方法,藉由混沌序列分別對圖像之多原色元素數值進行行列置換以及mod運算加密,以達到強化雲端相簿的安全性,確保使用者所上傳圖像之隱私及保密性者。The invention relates to an image chaos encryption method for a cloud photo album, in particular to a method for a user to log in to a cloud photo album server, and to perform an encryption method for transmitting an image to a cloud photo album, by using a chaotic sequence The row and column replacement and mod operation encryption of the multi-primary color element values of the image are respectively performed to enhance the security of the cloud photo album and ensure the privacy and confidentiality of the image uploaded by the user.

按,現今網路科技蓬勃發展,因此目前在網路上已有專門業者提供諸多空間,以供上網者能將自己本身之資料照片或影片等儲存於網路相簿中;再者,由於網際網路技術不斷進步,雲端運算概念被廣泛應用於商業軟體、智慧型系統、網路服務等方面,但也衍生出一些資訊安全的議題;為了讓使用者在各種雲端服務裡能夠擁有隱私及保密性,且確保多媒體資料傳輸過程的安全性,影像加密技術的發展也越來越重要。According to today's Internet technology, there is a lot of space available on the Internet for professional Internet users to store their own photos or videos in the online photo album. Moreover, due to the Internet Road technology continues to advance, cloud computing concepts are widely used in commercial software, intelligent systems, network services, etc., but also some information security issues; in order to allow users to have privacy and confidentiality in various cloud services And to ensure the security of the multimedia data transmission process, the development of image encryption technology is becoming more and more important.

一般而言,雲端運算提供使用者所需要的計算能力、儲存及服務能力,最後的目的是方便使用者並大大降低軟硬體的採購費用;再者,雲端運算著眼於三點需求:一是提供方便、二是提升能力、三是降低開支;上述三點也是使用者使用雲端運算平台的目的,由於雲端運算平台將資源集中於伺服端,減少了客戶端資源的浪費和閒置,從而降低了客戶端在軟硬體上的投資,並且由於資源和軟體的管理和維護集中在伺服端,亦降 低了對使用者系統維護能力的要求,因此普通使用者即能夠享受到高階的計算及資源服務;而雲端服務程式則是定義為在伺服端提供使用者進行雲端運算的程式,它的能力在某種程度上已超越了一般傳統應用程式的限制,除了具備一般應用程式的基本功能之外,也包含了不受地點與平台限制的儲存與運算能力,只要使用者能擁有上網的設備,就可以儲存自己的雲端系統或運算程式,跟網路(Web)應用程式類似,但兩者運算模式不同,網路應用程式的運算是屬於單一台伺服器的運算,而雲端運算是屬於多台伺服器平行處理的運算。In general, cloud computing provides the computing power, storage, and service capabilities that users need. The final goal is to facilitate users and greatly reduce the cost of purchasing hardware and software. In addition, cloud computing focuses on three requirements: Providing convenience, the second is to improve the ability, and the third is to reduce expenses; the above three points are also the purpose of the user to use the cloud computing platform, because the cloud computing platform concentrates resources on the server side, reducing the waste and idleness of the client resources, thereby reducing the The client invests in software and hardware, and because the management and maintenance of resources and software are concentrated on the server, it also drops. Low requirements for user system maintenance, so ordinary users can enjoy high-end computing and resource services; and cloud service programs are defined as programs that provide users with cloud computing on the server. To some extent, it has surpassed the limitations of traditional applications. In addition to the basic functions of general applications, it also includes storage and computing capabilities that are not limited by location and platform. As long as users have access to the Internet, You can store your own cloud system or computing program, similar to the web application, but the computing mode is different. The operation of the web application belongs to the operation of a single server, and the cloud computing belongs to multiple servos. The operation of parallel processing.

再者,圖像加密係網路或雲端傳輸之一重要態樣,當圖像資料自一位置傳輸至另一位置時,可期望加密該圖像資料以僅使得一已授權之接收者可將其觀視;意即觀視者在未先解密一已加密圖像之情形下,係無法自該圖像辨別出任何有意義之資訊;然,目前之加密方法初期雖擁有較良好的加密效果,但經過多次的迭代之後,原始圖像之特徵漸漸出現而降低保密性;因此,如何在雲端相簿服務中,提高圖像的安全性,實為一個重要的課題。Furthermore, image encryption is an important aspect of network or cloud transmission. When image data is transmitted from one location to another, it may be desirable to encrypt the image data so that only an authorized recipient can The view; that is, the viewer can not distinguish any meaningful information from the image without first decrypting the encrypted image; however, the current encryption method has a good encryption effect at the beginning. However, after many iterations, the characteristics of the original image gradually appear to reduce the confidentiality; therefore, how to improve the security of the image in the cloud photo album service is an important issue.

今,發明人即是鑑於上述現有之雲端相簿加密方法在實際實施上仍具有多處之缺失,於是乃一本孜孜不倦之精神,並藉由其豐富之專業知識及多年之實務經驗所輔佐,而加以改善,並據此研創出本發明。Nowadays, the inventor is in view of the fact that the existing cloud photo album encryption method still has many defects in practical implementation, so it is a tireless spirit, and with its rich professional knowledge and years of practical experience, Improvements have been made, and the present invention has been developed based on this.

本發明主要目的為提供一種使用者登入雲端相簿伺服端,欲傳送圖像至雲端相簿時對其所執行之加密方法,藉由混沌序列分別對圖像之多原色元素數值進行行列置換以及mod運算加密,以達到強化雲端相簿的安全性,確保使用者所上傳圖像之隱私及保密性者。The main purpose of the present invention is to provide an encryption method for a user to log in to a cloud photo album server to transmit an image to a cloud photo album, and to perform row and column replacement on the values of multiple primary color elements of the image by chaotic sequences. Mod operation encryption, to enhance the security of cloud albums, to ensure the privacy and confidentiality of the images uploaded by users.

為了達到上述實施目的,本發明人乃研擬如下實施技術,首先於使用者登入雲端相簿伺服端,傳送圖像至雲端相簿時,取出圖像每一像素點其至少一多原色元素之數值;接著,藉由一非線性微分方程模組產生一對應圖像像素點其多原色元素數值的混沌序列;接續,將圖像之每一像素點以混沌序列進行行列置換;最後,將完成行列置換之每一像素點與混沌序列進行mod運算,以得到加密之每一像素點,再將加密之每一像素點轉換成一加密圖像;藉此,產生之混沌序列分別對圖像之多原色元素色階矩陣進行行列置換以及mod運算加密,可強化雲端相簿的安全性,以確保使用者所上傳圖像之隱私及保密性。In order to achieve the above-mentioned implementation, the inventors have developed the following implementation techniques. First, when a user logs in to the cloud photo album server and transmits an image to the cloud photo album, the image is extracted from at least one of the primary color elements of each pixel. Numerically; then, a nonlinear differential equation module is used to generate a chaotic sequence corresponding to the multi-primary element value of the image pixel; and then, each pixel of the image is replaced by a chaotic sequence; finally, it will be completed Each pixel of the row-column permutation is mod-operated with the chaotic sequence to obtain each pixel point of the encryption, and then each pixel of the encryption is converted into an encrypted image; thereby, the generated chaotic sequence is respectively for the image The primary color element gradation matrix performs row and column permutation and mod operation encryption to enhance the security of the cloud photo album to ensure the privacy and confidentiality of the images uploaded by the user.

在本發明的一實施例中,其中多原色元素可選自RGB、CMYK、YUV、HSV、LAB、XYZ、HSI以及YIQ等色彩空間所構成之群組。In an embodiment of the invention, the multi-primary elements may be selected from the group consisting of color spaces such as RGB, CMYK, YUV, HSV, LAB, XYZ, HSI, and YIQ.

在本發明的一實施例中,其中非線性微分方程模組係為一聯合混沌系統,且非線性微分方程可利用數值分析方法中的四階阮奇庫塔法來求解;其中,聯合混沌系統可由下述之方程式 所構成: ;其中,α [0,1]為系統參數,且xyz 係為該混沌序列的三個狀態變數;藉此,由於聯合混沌系統的狀態變數和系統參數對於時間的變動非常靈敏,且其軌跡具有不可預測的特性,具有較優良的加密效果,可防止有心人士輕易的破解。In an embodiment of the invention, the nonlinear differential equation module is a joint chaotic system, and the nonlinear differential equation can be solved by using a fourth-order chirp Kutta method in the numerical analysis method; wherein the joint chaotic system can be The equation is composed of: Where α [0,1] is the system parameter, and x , y , and z are the three state variables of the chaotic sequence; thereby, the state variables and system parameters of the joint chaotic system are very sensitive to time changes, and the trajectory has Unpredictable features, with better encryption, can prevent people from being easily cracked.

此外,如前所述,本發明雲端相簿之圖像混沌加密方法可結合應用於硬體或軟體、適當處或其組合,因此本發明之方法,某些觀點或是其部分可能為嵌入實際媒體中之程式碼(亦即指令),例如軟式磁碟、光碟機、硬碟機或是任何其他機器可讀儲存媒體,其中當程式碼被機器(例如一電腦)載入並執行時,此機器會變成一用以執行本發明之裝置,而在程式碼執行於可程式化電腦之情況中,此電腦裝置通常包含一處理器、一處理器可讀之儲存媒體(包含揮發性或非揮發性記憶體及/或儲存元件)、至少一輸入裝置以及至少一輸出裝置。In addition, as described above, the image chaotic encryption method of the cloud photo album of the present invention can be applied to hardware or software, where appropriate, or a combination thereof, and thus some aspects or portions thereof may be embedded in practice. A code (ie, a command) in the media, such as a floppy disk, a CD player, a hard disk drive, or any other machine readable storage medium, wherein when the code is loaded and executed by a machine (eg, a computer), The machine will become a device for performing the present invention, and in the case where the code is executed in a programmable computer, the computer device usually includes a processor, a processor-readable storage medium (including volatile or non-volatile A memory and/or storage element), at least one input device, and at least one output device.

本發明之目的及其結構設計功能上的優點,將依據以下圖面所示之較佳實施例予以說明,俾使審查委員能對本發明有更深入且具體之瞭解。The object of the present invention and its structural design and advantages will be explained in the light of the preferred embodiments shown in the following drawings, so that the reviewing committee can have a more in-depth and specific understanding of the present invention.

首先,請參閱第一圖所示,為本發明雲端相簿之圖像混沌 加密方法其較佳實施例之步驟流程圖,本發明雲端相簿之圖像混沌加密方法係於使用者登入雲端相簿伺服端,傳送圖像至雲端相簿時執行,包括有下述步驟:步驟一(S1):取出圖像每一像素點其至少一多原色元素之數值;其中,多原色元素可選自RGB、CMYK、YUV、HSV、LAB、XYZ、HSI以及YIQ等色彩空間所構成之群組;而為了說明方便起見,於本實施例中,多原色元素係以紅色(Red,R)、綠色(Green,G)以及藍色(Blue,B)色彩元素為例,在閱讀及了解本發明的教導後,熟此技藝者當知道本發明之多原色元素亦可為CMYK、YUV、HSV、LAB、XYZ、HSI以及YIQ等色彩空間其中之一,而並不會影響本發明的實施;步驟二(S2):藉由一非線性微分方程模組產生一對應圖像像素點其多原色元素數值的混沌序列;於本實施例中,非線性微分方程模組係為一聯合混沌系統(Unified Chaotic System),且聯合混沌系統由以下之方程式所構成: ;其中,α [0,1]為系統參數,且xyz 係為混沌序列的三個狀態變數;且上述之非線性微分方程可利用數值分析方法中的 四階阮奇庫塔法(Runge-Kutta 4th Order Method)來求解;步驟三(S3):將圖像之每一像素點以混沌序列進行行列置換;步驟四(S4):將完成行列置換之每一像素點與混沌序列進行mod運算,以得到加密之每一像素點;以及步驟五(S5):將加密之每一像素點轉換成一加密圖像。First, referring to the first figure, which is a flow chart of a preferred embodiment of the image chaotic encryption method of the cloud photo album of the present invention, the image chaotic encryption method of the cloud photo album of the present invention is applied to the user to log in to the cloud. The server server performs the process of transmitting the image to the cloud photo album, and includes the following steps: Step 1 (S1): extracting a value of at least one of the plurality of primary color elements of each pixel of the image; wherein, the multi-primary color element is selected from Groups of color spaces such as RGB, CMYK, YUV, HSV, LAB, XYZ, HSI, and YIQ; for convenience of description, in the present embodiment, the multi-primary elements are red (Red, R), green (Green, G) and blue (B, B) color elements are taken as an example. After reading and understanding the teachings of the present invention, those skilled in the art will know that the multi-primary elements of the present invention may also be CMYK, YUV, HSV, LAB. One of the color spaces, XYZ, HSI, and YIQ, without affecting the implementation of the present invention; Step 2 (S2): generating a multi-primary element value of a corresponding image pixel by a nonlinear differential equation module Chaotic sequence; in this embodiment, nonlinear The differential equation module is a Unified Chaotic System, and the joint chaotic system consists of the following equations: Where α [0,1] is a system parameter, and x , y , and z are three state variables of a chaotic sequence; and the above-mentioned nonlinear differential equation can utilize the fourth-order chirp method in the numerical analysis method (Runge-Kutta 4th Order) Method) to solve; Step 3 (S3): replace each pixel of the image with a chaotic sequence; Step 4 (S4): Perform mod operation on each pixel of the row-column replacement and the chaotic sequence to obtain Each pixel of the encryption; and step five (S5): converting each pixel of the encryption into an encrypted image.

根據上述之雲端相簿之圖像混沌加密方法於實施使用時,係實作在Google App Engine(GAE)雲端運算環境下,並使用Java實作聯合混沌系統為基礎的圖像加密技術;其中,GAE是Google在2008年釋出的一項新服務,它是以雲端運算的概念來輔助開發者建置可靠的網路應用程式,這項服務提供了完整的軟體開發套件、網路和伺服器等設備,所以開發者不需要考慮到諸如網路、伺服器管理與維護,以及硬體擴充等問題,只要把想要處理的任務都交給雲端處理,最後的結果會從雲端產生出來;因此,當使用者登入GAE雲端相簿伺服端,將圖像傳送至雲端相簿時,在此假設圖像之長、寬分別為M及N,意即圖像是由橫向N個格點、縱向M個格點所組成,包含了M×N個像素點,而經由大量的影像統計分析證實,影像中鄰近像素之間有很密切的關係,平均鄰近8到16個水平、垂直以及對角方向的像素之間都有著極高的關聯性;為了混亂此關聯性,以防止竊密者破 解,藉由聯合混沌系統所產生之混沌序列xyz ,個別對圖像之R、G、B色階數值進行行列位置混沌置亂,以提升加密影像之安全;其中,系統參數α =0,且xyz 分別為1、2、1以作為初始值的設定,當圖像進行步驟三(S3)之行列置換時,係透過下述雙迴圈進行:for i=1 to M for j=1 to N…行列置換Next j Next i;而將完成行列置換之每一像素點再與混沌序列進行步驟四(S4)之mod運算,如下:for i=1 to M for j=1 to N…mod運算Next j Next i;最後,將完成加密之每一像素點轉換成為一加密圖像;藉此,由於聯合混沌系統對於時間的高靈敏性及混沌軌跡不可預測之特性,利用所產生之混沌序列分別對圖像之R、G、B色階矩陣進行行列置換以及mod運算加密,具有優良的加密效果,並可防止竊密者破解,以強化雲端相簿的隱私性;值得注 意的,當雲端相簿之圖像完成加密後,持有正確解密金鑰的用戶端可瀏覽到雲端相簿伺服端的加密圖像,而未持有正確解密金鑰的用戶則無法瀏覽到伺服器的圖像。According to the image chaos encryption method of the cloud album described above, the implementation is implemented in a Google App Engine (GAE) cloud computing environment, and uses Java to implement a joint chaotic system-based image encryption technology; GAE is a new service released by Google in 2008. It is based on the concept of cloud computing to help developers build reliable web applications. This service provides a complete software development kit, network and server. Such devices, so developers do not need to consider issues such as network, server management and maintenance, and hardware expansion, as long as the tasks that are to be processed are handed over to the cloud, the final result will be generated from the cloud; When the user logs in to the GAE cloud photo album server and transmits the image to the cloud photo album, it is assumed that the length and width of the image are M and N respectively, that is, the image is from the horizontal N grid points and the vertical direction. M grid points consist of M × N pixels, and a large number of image statistical analysis confirmed that there are close relationships between adjacent pixels in the image, with an average of 8 to 16 horizontal, vertical and Direction between the pixels have high relevance; relevance for this disorder, in order to prevent theft by cracks, x chaotic sequence generated by the chaotic systems combined, y, z, individual images of the R, G, The B-level value is used to chaotic scrambling of the row and column position to improve the security of the encrypted image; wherein, the system parameter α =0, and x , y , and z are 1, 2, and 1 , respectively, as the initial value setting, when the image is performed In the third row (S3), the row and column are replaced by the following double loop: for i=1 to M for j=1 to N... row and column replacement Next j Next i; and each pixel point of the row and column replacement is completed. Perform the mod operation of step four (S4) with the chaotic sequence as follows: for i=1 to M for j=1 to N...mod operation Next j Next i; finally, convert each pixel point that completes encryption into an encrypted picture Therefore, due to the high sensitivity of the joint chaotic system and the unpredictable characteristics of the chaotic trajectory, the chaotic sequences generated are used to perform row-column replacement and mod operation encryption on the R, G, and B gradation matrices of the image, respectively. Excellent encryption and protection against thieves To enhance the privacy of the cloud photo album; it is worth noting that when the image of the cloud photo album is encrypted, the client holding the correct decryption key can browse the encrypted image of the cloud photo album server without holding Users who decrypt the key correctly will not be able to view the image of the server.

此外,如前所述,本發明之雲端相簿之圖像混沌加密方法可結合應用於硬體或軟體、適當處或其組合,因此本發明之方法,某些觀點或是其部分可能為嵌入實際媒體中之程式碼(亦即指令),例如軟式磁碟、光碟機、硬碟機或是任何其他機器可讀儲存媒體,其中當程式碼被機器(例如一電腦)載入並執行時,此機器會變成一用以執行本發明之裝置,而在程式碼執行於可程式化電腦之情況中,此電腦裝置通常包含一處理器、一處理器可讀之儲存媒體(包含揮發性或非揮發性記憶體及/或儲存元件)、至少一輸入裝置以及至少一輸出裝置。In addition, as described above, the image chaos encryption method of the cloud photo album of the present invention may be applied to hardware or software, where appropriate, or a combination thereof, and thus some aspects or portions thereof may be embedded in the method of the present invention. A code (ie, a command) in actual media, such as a floppy disk, a CD player, a hard disk drive, or any other machine readable storage medium, wherein when the code is loaded and executed by a machine (eg, a computer), The device may become a device for performing the present invention, and in the case where the code is executed in a programmable computer, the computer device usually includes a processor and a processor-readable storage medium (including volatile or non-volatile Volatile memory and/or storage element), at least one input device, and at least one output device.

由上述之雲端相簿之圖像混沌加密方法與實施說明可知,本發明具有以下優點:It can be seen from the image chaotic encryption method and the implementation description of the cloud album described above that the present invention has the following advantages:

1.本發明在Google App Engine雲端運算環境下,使用Java實作聯合混沌系統為基礎的影像加密技術,以其所產生之混沌序列分別對圖像之R、G、B色階矩陣進行行列置換以及mod運算加密,強化雲端相簿的安全性,確保使用者所上傳圖像之隱私及保密性。1. In the Google App Engine cloud computing environment, the image encryption technology based on the joint chaotic system is implemented in Java, and the chaotic sequence generated by the image is used to replace the R, G, B color matrix of the image. And mod operation encryption, strengthen the security of cloud albums, and ensure the privacy and confidentiality of images uploaded by users.

2.本發明雲端相簿之圖像混沌加密方法藉由聯合混沌系統的狀態變數和系統參數對於時間的變動非常靈敏,且其軌跡具有不可預測的特性,具有較優良的加密效果,可防止有 心人士輕易的破解。2. The image chaotic encryption method of the cloud photo album of the invention is very sensitive to temporal changes by the state variables and system parameters of the joint chaotic system, and the trajectory has unpredictable characteristics, and has better encryption effect, which can prevent The heart is easily cracked.

綜上所述,本發明之雲端相簿之圖像混沌加密方法,的確能藉由上述所揭露之實施例,達到所預期之使用功效,且本發明亦未曾公開於申請前,誠已完全符合專利法之規定與要求。爰依法提出發明專利之申請,懇請惠予審查,並賜准專利,則實感德便。In summary, the image chaos encryption method of the cloud photo album of the present invention can achieve the expected use efficiency by the above disclosed embodiments, and the present invention has not been disclosed before the application, and has completely met the requirements. The provisions and requirements of the Patent Law.爰Issuing an application for a patent for invention in accordance with the law, and asking for a review, and granting a patent, is truly sensible.

惟,上述所揭之圖示及說明,僅為本發明之較佳實施例,非為限定本發明之保護範圍;大凡熟悉該項技藝之人士,其所依本發明之特徵範疇,所作之其它等效變化或修飾,皆應視為不脫離本發明之設計範疇。The illustrations and descriptions of the present invention are merely preferred embodiments of the present invention, and are not intended to limit the scope of the present invention; those skilled in the art, which are characterized by the scope of the present invention, Equivalent variations or modifications are considered to be within the scope of the design of the invention.

(S1)‧‧‧步驟一(S1)‧‧‧Step one

(S2)‧‧‧步驟二(S2)‧‧‧Step 2

(S3)‧‧‧步驟三(S3) ‧ ‧ Step 3

(S4)‧‧‧步驟四(S4)‧‧‧Step four

(S5)‧‧‧步驟五(S5) ‧ ‧ step five

第一圖:本發明較佳實施例之步驟流程圖First Figure: Flowchart of the steps of a preferred embodiment of the present invention

(S1)‧‧‧步驟一(S1)‧‧‧Step one

(S2)‧‧‧步驟二(S2)‧‧‧Step 2

(S3)‧‧‧步驟三(S3) ‧ ‧ Step 3

(S4)‧‧‧步驟四(S4)‧‧‧Step four

(S5)‧‧‧步驟五(S5) ‧ ‧ step five

Claims (7)

一種雲端相簿之圖像混沌加密方法,於使用者登入雲端相簿伺服端,傳送圖像至雲端相簿時包括有下述步驟:步驟一:取出該圖像每一像素點其至少一多原色元素之數值;步驟二:藉由一非線性微分方程模組產生一對應該圖像像素點其多原色元素數值的混沌序列;步驟三:將該圖像之每一像素點以該混沌序列進行行列置換;步驟四:將完成行列置換之每一像素點與該混沌序列進行mod運算,以得到加密之每一像素點;以及步驟五:將加密之每一像素點轉換成一加密圖像。An image chaos encryption method for cloud photo albums, when the user logs in to the cloud photo album server, the following steps are included when transmitting the image to the cloud photo album: Step 1: extracting at least one pixel per pixel of the image The value of the primary color element; Step 2: generating a pair of chaotic sequences of the values of the plurality of primary color elements of the image pixel by a nonlinear differential equation module; Step 3: using each chaotic sequence of the image as the chaotic sequence Performing row and column replacement; step 4: performing mod operation on each pixel of the row and column replacement with the chaotic sequence to obtain each pixel point of encryption; and step 5: converting each pixel of the encryption into an encrypted image. 如申請專利範圍第1項所述之雲端相簿之圖像混沌加密方法,其中該非線性微分方程模組係利用數值分析方法求解。For example, the image chaotic encryption method of the cloud photo album described in the first application of the patent scope, wherein the nonlinear differential equation module is solved by a numerical analysis method. 如申請專利範圍第2項所述之雲端相簿之圖像混沌加密方法,其中該數值分析方法係為四階阮奇庫塔法(Runge-Kutta 4th Order Method)。For example, the image chaos encryption method of the cloud photo album described in claim 2, wherein the numerical analysis method is a Runge-Kutta 4th Order Method. 如申請專利範圍第1至3項中任意一項所述之雲端相簿之圖像混沌加密方法,其中該非線性微分方程模組係為一聯合混沌系統(Unified Chaotic System)。The image chaos encryption method of the cloud photo album according to any one of claims 1 to 3, wherein the nonlinear differential equation module is a Unified Chaotic System. 如申請專利範圍第4項所述之雲端相簿之圖像混沌加密方 法,其中該聯合混沌系統由以下之方程式所構成: ;其中,α[0,1]為系統參數,且xyz 係為該混沌序列的三個狀態變數。For example, the image chaos encryption method of the cloud photo album described in claim 4, wherein the joint chaotic system is composed of the following equations: ; among them, α [0,1] is a system parameter, and x , y , and z are the three state variables of the chaotic sequence. 如申請專利範圍第1項所述之雲端相簿之圖像混沌加密方法,其中該多原色元素係選自RGB、CMYK、YUV、HSV、LAB、XYZ、HSI以及YIQ色彩空間所構成之群組。 The image chaos encryption method of the cloud photo album according to claim 1, wherein the multi-primary color element is selected from the group consisting of RGB, CMYK, YUV, HSV, LAB, XYZ, HSI, and YIQ color space. . 一種電腦可讀媒體,該電腦可讀媒體具有電腦可執行指令,當電腦執行該電腦可執行指令時,可執行如申請專利範圍第1至6項中任意一項所述之方法。A computer readable medium having computer executable instructions for performing the method of any one of claims 1 to 6 when the computer executes the computer executable instructions.
TW101134063A 2012-09-17 2012-09-17 Chaotic image encryption method for cloud album TWI452890B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW101134063A TWI452890B (en) 2012-09-17 2012-09-17 Chaotic image encryption method for cloud album

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW101134063A TWI452890B (en) 2012-09-17 2012-09-17 Chaotic image encryption method for cloud album

Publications (2)

Publication Number Publication Date
TW201414258A TW201414258A (en) 2014-04-01
TWI452890B true TWI452890B (en) 2014-09-11

Family

ID=51942578

Family Applications (1)

Application Number Title Priority Date Filing Date
TW101134063A TWI452890B (en) 2012-09-17 2012-09-17 Chaotic image encryption method for cloud album

Country Status (1)

Country Link
TW (1) TWI452890B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106156347A (en) * 2016-07-21 2016-11-23 北京奇虎科技有限公司 Cloud photograph album classification methods of exhibiting, device and server
CN106339976A (en) * 2016-08-16 2017-01-18 广东工业大学 Encryption method

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108665964B (en) * 2018-05-14 2022-01-25 江西理工大学应用科学学院 Medical image wavelet domain real-time encryption and decryption algorithm based on multiple chaotic systems
CN112422269A (en) * 2020-11-10 2021-02-26 中国科学院大学 Combined chaotic pseudo-random number generator and digital image encryption method thereof
TWI790831B (en) * 2021-11-24 2023-01-21 國立勤益科技大學 Multimodal Dynamic Key Method Based on Chaotic Peak Coding and Its Application

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWM339162U (en) * 2007-09-28 2008-08-21 Jin-Feng Lin Chaos encryption device based on different degrees of mobile healthcare
TWI316360B (en) * 2006-06-15 2009-10-21 Nat Univ Chung Hsing Fresnel transform image encryption and decryption methods
US20100333116A1 (en) * 2009-06-30 2010-12-30 Anand Prahlad Cloud gateway system for managing data storage to cloud storage sites

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI316360B (en) * 2006-06-15 2009-10-21 Nat Univ Chung Hsing Fresnel transform image encryption and decryption methods
TWM339162U (en) * 2007-09-28 2008-08-21 Jin-Feng Lin Chaos encryption device based on different degrees of mobile healthcare
US20100333116A1 (en) * 2009-06-30 2010-12-30 Anand Prahlad Cloud gateway system for managing data storage to cloud storage sites

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106156347A (en) * 2016-07-21 2016-11-23 北京奇虎科技有限公司 Cloud photograph album classification methods of exhibiting, device and server
CN106339976A (en) * 2016-08-16 2017-01-18 广东工业大学 Encryption method
CN106339976B (en) * 2016-08-16 2019-10-29 广东工业大学 A kind of encryption method

Also Published As

Publication number Publication date
TW201414258A (en) 2014-04-01

Similar Documents

Publication Publication Date Title
Shankar et al. Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm
Ruan et al. Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results
TWI452890B (en) Chaotic image encryption method for cloud album
Zhao et al. TPE2: Three-pixel exact thumbnail-preserving image encryption
CN104851070B (en) A kind of image encryption and decryption method based on foreground and background separation
CN103701829B (en) A kind of off-line resolves the method for DPAPI encryption data
CN106685905A (en) Systems and methods of encrypted transmission of web pages
Rupa et al. Novel secure data protection scheme using Martino homomorphic encryption
Backes et al. X-pire 2.0: a user-controlled expiration date and copy protection mechanism
CN109005196A (en) Data transmission method, data decryption method, device and electronic equipment
Kuzminykh et al. The challenges with Internet of Things security for business
CN113055153B (en) Data encryption method, system and medium based on fully homomorphic encryption algorithm
Deepa et al. Security using colors and Armstrong numbers
Liu et al. Image sharing scheme based on combination theory
Huang et al. Mutual authentications to parties with QR-code applications in mobile systems
CN103390121A (en) Digital work ownership authentication method and digital work ownership authentication system
CN114339282A (en) Method and device for transmitting anchor image picture in live broadcast interaction
CN114845115A (en) Information transmission method, device, equipment and storage medium
CN103220551A (en) Digital resource encryption and decryption system and method based on image processing
Li et al. A novel image protection cryptosystem with only permutation stage: multi-shuffling process
Schäfer et al. Unleashing The Potential of Data Ecosystems: Establishing Digital Trust through Trust-Enhancing Technologies
Shrivastava et al. A modified approach of key manipulation in cryptography using 2d graphics image
Bahrami A dynamic cloud with data privacy preservation
Liu et al. A novel progressive secret image sharing method with better robustness
Keat et al. Cloud computing security and forensics issues and awareness of cloud storage users in Malaysia

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees