WO2023169532A1 - 图像加密方法、图像解密方法、图像处理装置及存储介质 - Google Patents

图像加密方法、图像解密方法、图像处理装置及存储介质 Download PDF

Info

Publication number
WO2023169532A1
WO2023169532A1 PCT/CN2023/080613 CN2023080613W WO2023169532A1 WO 2023169532 A1 WO2023169532 A1 WO 2023169532A1 CN 2023080613 W CN2023080613 W CN 2023080613W WO 2023169532 A1 WO2023169532 A1 WO 2023169532A1
Authority
WO
WIPO (PCT)
Prior art keywords
image data
decryption
encryption
stream
image
Prior art date
Application number
PCT/CN2023/080613
Other languages
English (en)
French (fr)
Inventor
张旭
吴睿振
陈静静
张永兴
孙华锦
王凛
张鹏妃
Original Assignee
山东云海国创云计算装备产业创新中心有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN202210228351.2A external-priority patent/CN114338022B/zh
Priority claimed from CN202210228353.1A external-priority patent/CN114338023B/zh
Priority claimed from CN202210228387.0A external-priority patent/CN114338024B/zh
Application filed by 山东云海国创云计算装备产业创新中心有限公司 filed Critical 山东云海国创云计算装备产业创新中心有限公司
Publication of WO2023169532A1 publication Critical patent/WO2023169532A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3

Definitions

  • the present application relates to the field of image processing, and in particular to an image encryption method, an image decryption method, an image processing device and a storage medium.
  • the block encryption algorithm is usually used to encrypt the image for transmission.
  • each row of image data needs to be encrypted in sequence, that is, the first row of image data is encrypted first, and then the second row of image data is encrypted. Until the encryption of the last line of image data is completed, the encryption speed is slow.
  • a correspondence between plaintext and ciphertext is usually established for subsequent decryption, but this scheme will reduce the security of encryption.
  • the purpose of this application is to provide an image encryption method, image decryption method, image processing device and storage medium, which improves the encryption speed, expands the secret key space, enhances the robustness of the encryption system, has higher encryption security and decryption
  • the process only relies on the ciphertext image data and the first derivative of the ciphertext image data, which improves the decryption efficiency.
  • the image encryption method includes:
  • Each stream encryption system performs encryption operations on the unencrypted plaintext image data it receives.
  • the encryption operations include:
  • the process of determining unencrypted plaintext image data allocated to each bitstream encryption system among the original plaintext image data includes:
  • the unencrypted plaintext image data allocated to each bit stream encryption system in the original plaintext image data is determined.
  • the Lorentz chaotic system is a Lorentz chaotic system transformed through the TS fuzzy model.
  • the mathematical model of the Lorentz chaotic system is:
  • y(t) is the ciphertext image data
  • C is the output matrix
  • x(t) is the key stream
  • a i is the system matrix
  • ⁇ (t) is the antecedent variable
  • ⁇ i is a function about ⁇ (t).
  • the process of injecting unencrypted plaintext image data into the state equation of the Lorentz chaotic system to obtain a key stream corresponding to the unencrypted plaintext image data includes:
  • the secret key is the system initial value.
  • an image encryption system which includes:
  • a determination module used to determine the unencrypted plaintext image data allocated to each bit stream encryption system in the original plain text image data, and the bit stream encryption systems are connected in parallel;
  • the encryption module is used to perform encryption operations on the unencrypted plaintext image data it receives through each stream encryption system.
  • the encryption operations include:
  • the determining module is specifically used to:
  • the unencrypted plaintext image data allocated to each bit stream encryption system in the original plaintext image data is determined.
  • an image encryption device including:
  • Memory used to store computer programs
  • the processor is used to implement the steps of any of the above image encryption methods when executing a computer program.
  • this application also provides a non-volatile computer-readable storage medium.
  • the non-volatile computer-readable storage medium stores a computer program.
  • the computer program is executed by the processor, any one of the above is implemented. Steps of image encryption method for items.
  • This application provides an image decryption method, including:
  • Each parallel bit stream decryption system performs decryption operations on the ciphertext image data received respectively.
  • the decryption operations include:
  • the state observer constructed based on the Lorentz flow encryption system observes the observation key flow corresponding to the ciphertext image data
  • the mathematical model of the Lorentz stream encryption system is:
  • y(t) is the ciphertext image data
  • B is the input matrix
  • C is the output matrix
  • a i is the system matrix
  • ⁇ (t) is the antecedent variable
  • ⁇ i is about ⁇ (t) function.
  • the process of determining whether the observed key stream meets the decryption condition includes:
  • the observation error system is used to determine whether the observed key stream meets the decryption conditions.
  • the mathematical model of the observation error system is
  • the decryption condition is that the differential of the observation error with time approaches 0.
  • the image decryption method further includes:
  • the process of obtaining the decrypted plaintext image data through the first relational expression includes:
  • the decrypted plaintext image data is obtained through the decryption key and the first relational expression.
  • the decryption key is the system initial value.
  • the image decryption method further includes:
  • each stream decryption system includes:
  • the observation module is a state observer constructed based on the Lorentz flow encryption system that observes the observation key stream corresponding to the ciphertext image data;
  • the judgment module is used to judge whether the observed key stream meets the decryption conditions. If so, trigger the decryption module;
  • the decryption module is used to obtain the decrypted plaintext image data through the first relational expression.
  • the first relational expression is is the plaintext image data
  • y(t) is the ciphertext image data
  • C is the output matrix, to observe the key stream.
  • this application also provides an image decryption device, including:
  • Memory used to store computer programs
  • the processor is used to implement the steps of any of the above image decryption methods when executing a computer program.
  • this application also provides a non-volatile computer-readable storage medium.
  • the non-volatile computer-readable storage medium stores a computer program.
  • the computer program is executed by the processor, any one of the above is implemented. Steps of image decryption method for items.
  • This application provides an image encryption method, which is applied to each stream encryption system in a parallel multi-bit stream encryption system.
  • the image encryption method includes:
  • the Lorentzian chaotic system is a Lorentzian chaotic system converted into a TS fuzzy model.
  • the mathematical model of the Lorentz chaotic system is:
  • y(t) is the ciphertext image data
  • C is the output matrix
  • x(t) is the key stream
  • a i is the system matrix
  • ⁇ (t) is the antecedent variable
  • ⁇ i is a function about ⁇ (t).
  • the input matrix is a full column rank matrix
  • the output matrix is a non-singular matrix
  • the number of bits of the parallel stream encryption system is determined according to the size of the original image data.
  • the image decryption method includes:
  • Each stream decryption system in parallel performs the following operations:
  • the number of bits of the parallel stream decryption system is determined based on the number of bits of the stream encryption system.
  • the image decryption method further includes:
  • the decrypted plaintext image data obtained by all stream decryption systems restores the original image data.
  • this application also provides an image processing device, including:
  • Memory used to store computer programs
  • a processor configured to implement the steps of the image encryption method as in any one of the above and/or the steps of the image decryption method as in any of the above when executing the computer program.
  • this application also provides a non-volatile computer-readable storage medium.
  • a computer program is stored on the storage medium.
  • the steps of any of the above image encryption methods are implemented. and/or the steps of the image decryption method as in any one of the above.
  • This application provides an image encryption method.
  • the unencrypted plaintext image data in the original plaintext image data is allocated to adapt to different encryption systems and enhance flexibility.
  • the original plaintext image data is processed through a parallel multi-bit stream encryption system.
  • Each row of unencrypted plaintext image data is encrypted in parallel, which improves the encryption speed, greatly expands the secret key space, and enhances the robustness of the encryption system.
  • the generation of the key stream relies on the unencrypted plaintext image data. This allows different unencrypted plaintext image data to have different key streams, thereby making encryption more secure.
  • This application also provides an image encryption system, an image encryption device and a non-volatile computer-readable storage medium, which have the same beneficial effects as the above image encryption method.
  • This application provides an image decryption method.
  • each received ciphertext image data is decrypted to achieve parallel decryption and improve decryption efficiency.
  • a state observer is constructed based on the Lorentz stream encryption system. , ensuring the synchronization of the key streams of the Lorentz stream encryption system and the stream decryption system.
  • the state observer observes the observed key stream corresponding to the ciphertext image data.
  • the decryption process does not require differential processing of ciphertext image data, further improving decryption efficiency.
  • This application also provides an image decryption system, device and non-volatile computer-readable storage medium, which have the same beneficial effects as the above-mentioned image decryption system.
  • This application provides an image encryption method that simultaneously encrypts each row of image data in the original image data through a parallel multi-bit stream encryption system, which improves the encryption speed, expands the secret key space, and enhances the robustness of the encryption system. , Since the generation of the key stream relies on unencrypted plaintext image data, different unencrypted plaintext image data correspond to different key streams, thereby generating different ciphertext image data, making encryption more secure.
  • This application also provides an image decryption method to decrypt the ciphertext image data encrypted by the above image encryption method. The decryption process only relies on the ciphertext image data and the first-order derivative of the ciphertext image data to improve the decryption efficiency.
  • the original image data can be restored through the decrypted plaintext image data of each bit stream decryption system.
  • This application also provides an image processing device and a non-volatile computer-readable storage medium, which have the same beneficial effects as the above-mentioned image encryption method and/or image decryption method.
  • Figure 1 is a step flow chart of an image encryption method provided by this application.
  • FIG. 2 is a schematic diagram of a block encryption provided by this application.
  • Figure 3 is a schematic diagram of image data division provided by an embodiment of the present application.
  • Figure 4 is a schematic structural diagram of a stream encryption system provided by an embodiment of the present application.
  • Figure 5 is a schematic structural diagram of a block encryption system provided by an embodiment of the present application.
  • FIG. 6 is a schematic structural diagram of an image encryption system provided by this application.
  • FIG. 7 is a schematic structural diagram of an image encryption device provided by this application.
  • Figure 8 is a structural diagram of a non-volatile computer-readable storage medium provided by this application.
  • Figure 9 is a schematic structural diagram of a Lorentz stream encryption system provided by this application.
  • Figure 10 is a step flow chart of a decryption operation provided by this application.
  • FIG 11 is a schematic structural diagram of a stream decryption system provided by this application.
  • Figure 12 is a block decryption system based on a state observer provided by this application.
  • Figure 13 is a schematic structural diagram of an image decryption system provided by this application.
  • Figure 14 is a schematic structural diagram of an image decryption device provided by this application.
  • Figure 15 is a schematic structural diagram of an electronic device provided by this application.
  • Figure 16 is a schematic structural diagram of another electronic device provided by the present application.
  • Figure 17 is a structural diagram of a non-volatile computer-readable storage medium provided by this application.
  • Figure 18 is a step flow chart of an image encryption method provided by this application.
  • Figure 19 is a schematic structural diagram of a Lorentz-based stream encryption system provided by this application.
  • Figure 20 is a schematic structural diagram of a Lorentz-based block encryption system provided by this application.
  • Figure 21 is a schematic diagram of Lorentz block decryption provided by this application.
  • Figure 22 is a schematic structural diagram of a stream decryption system based on inverse mapping provided by this application;
  • Figure 23 is a schematic structural diagram of a block decryption system provided by this application.
  • Figure 24 is a schematic structural diagram of an image processing device provided by this application.
  • Figure 25 is a structural diagram of a non-volatile computer-readable storage medium provided by this application.
  • the core of this application is to provide an image encryption method, system, device and computer-readable storage medium, which has strong encryption flexibility, adopts parallel encryption, improves encryption speed, greatly expands the secret key space, and enhances the robustness of the encryption system. while improving encryption security.
  • the image encryption method includes:
  • S101 Determine the unencrypted plaintext image data allocated to each bit stream encryption system in the original plain text image data, and connect the bit stream encryption systems in parallel;
  • a block encryption system is usually used to encrypt the original plaintext image data.
  • each row of pixels in the image can be regarded as one bit, and a one-bit stream encryption (Stream cipher) system can be arranged for each row of pixels to encrypt this row of pixels.
  • Stream cipher stream encryption
  • block encryption systems include multiple bitstream encryption systems in parallel.
  • the number of digits in the block encryption system often corresponds to the size of the original plaintext image data. Assuming that the original plaintext image data is 16 ⁇ 16, the number of digits in the block encryption system is 16. However, in actual engineering, production costs and manufacturing processes must be considered.
  • this step can split the original plaintext image data, and allocate stream encryption systems to the split original plaintext image data.
  • the block There are two bits in the encryption system and the image size is 4 ⁇ 4.
  • the 4 ⁇ 4 original plaintext image data can be split into 2 ⁇ 4 and then strung into the 2 ⁇ 4 original image data, which is the first of the original plaintext image data.
  • the unencrypted plaintext image data of the first row and the unencrypted plaintext image data of the third row are assigned to the first stream encryption system, so that the first stream encryption system sequentially processes the unencrypted plaintext image data of the first row and the unencrypted plaintext image data of the third row.
  • the plaintext image data is encrypted, and the unencrypted plaintext image data of the second row and the unencrypted plaintext image data of the fourth row in the original plaintext image data are allocated to the second bit stream encryption system, so that the second bit stream encryption system sequentially The unencrypted plaintext image data of the second row and the unencrypted plaintext image data of the fourth row are encrypted.
  • the original plaintext image data is first split, and the corresponding unencrypted plaintext image data is assigned to the corresponding stream encryption system for encryption according to the split result, which can flexibly adapt to different bit stream encryption systems.
  • the process of determining unencrypted plaintext image data allocated to each bitstream encryption system among the original plaintext image data includes:
  • the unencrypted plaintext image data allocated to each bit stream encryption system in the original plaintext image data is determined.
  • the division method of the original plaintext image data can be determined based on the number of bits of the stream encryption system and the total number of lines of the original plaintext image data, that is, the unencrypted plaintext image data allocated to each bit stream encryption system can be determined.
  • S102 Perform an encryption operation on the unencrypted plaintext image data received by each stream encryption system.
  • the encryption operation includes: injecting the unencrypted plaintext image data into the state equation of the Lorentz chaos system to obtain the same as the unencrypted plaintext image data.
  • Corresponding key stream, ciphertext image data is obtained based on the key stream and unencrypted plaintext image data.
  • the corresponding unencrypted plaintext image data is input into the corresponding stream encryption system.
  • the stream encryption system encrypts the unencrypted plaintext image data, where , the unencrypted plaintext image data is a row of image data in the unencrypted original image data, including all unencrypted pixels in the row, and the ciphertext image data is a row of image data encrypted by the stream encryption system, including the decrypted row of image data. All pixels.
  • the Lorentz chaotic system that implements image encryption operations is explained.
  • the Lorentz system is a nonlinear, aperiodic, three-dimensional deterministic continuous dynamic system. Its dynamic equation can be expressed as:
  • the Lorentz chaotic system is a nonlinear system
  • the Lorentz chaotic system is The chaotic system is converted into a TS fuzzy model, thereby realizing the conversion from nonlinear to linear.
  • the TS fuzzy model is the Takagi-Sugeno fuzzy model. The main idea of this model is to express the nonlinear system with many line segments, that is, the complex Nonlinear problems are transformed into problems on different small line segments.
  • rule i if x1(t) belongs to the fuzzy set F i , then we can get:
  • the unencrypted plaintext image data is defined as m(t), and at time t, is a constant, and the system input matrix is B i .
  • this application injects the unencrypted plaintext image data m(t) into Lorentz mixing respectively.
  • the unencrypted plaintext image data m(t) passes through the multiplier, is multiplied by the input matrix B, and is then added to the nonlinear function f(x(t)) to obtain the differential of the key stream over time.
  • the key stream x(t) is obtained.
  • x(t) is multiplied by the output matrix C through a multiplier and added to the plaintext m(t) to obtain the ciphertext image data y(t).
  • the Lorentz-based stream encryption systems are connected in parallel with a fixed number of bits. For example, when the encryption object is an 8-bit image, that is, the pixel value is 0-255, and the image size is 16 ⁇ 16, then 16 Lorenz stream encryption systems can be connected in parallel, so that each line of data in the image can be encrypted using the corresponding stream in turn.
  • the system performs encryption, and this stream encryption parallel processing technology behaves as a 16-bit block encryption method.
  • the Lorentz-based stream encryption system is described as:
  • equation (5) represents the 32nd bit stream encryption system of the block encryption system.
  • the system can connect enough Lorenz stream encryption systems in parallel to greatly increase the encryption speed of the target image.
  • the structural diagram of the block encryption system is shown in Figure 5.
  • the image encryption method provided in some embodiments first allocates the unencrypted plaintext image data in the original plaintext image data to adapt to different encryption systems and enhance flexibility, and then uses a parallel multi-bit stream encryption system to allocate the original plaintext image data.
  • Each line of unencrypted plaintext image data in the plaintext image data is encrypted in parallel, which increases the encryption speed, greatly expands the secret key space, and enhances the robustness of the encryption system.
  • the generation of the key stream relies on the unencrypted plaintext.
  • Image data allows different unencrypted plaintext image data to have different key streams, thereby making encryption more secure.
  • FIG. 6 is a schematic structural diagram of an image encryption system provided by this application.
  • the image encryption system includes:
  • Determination module used to determine the number of unencrypted plaintext images allocated to each bitstream encryption system in the original plaintext image data According to data, all stream encryption systems are connected in parallel;
  • Encryption module 2 is used to perform encryption operations on the unencrypted plaintext image data received through each stream encryption system.
  • the encryption operations include:
  • the image encryption system provided in some embodiments first allocates the unencrypted plaintext image data in the original plaintext image data to adapt to different encryption systems and enhance flexibility, and then uses a parallel multi-bit stream encryption system to allocate the original plaintext image data.
  • Each line of unencrypted plaintext image data in the plaintext image data is encrypted in parallel, which increases the encryption speed, greatly expands the secret key space, and enhances the robustness of the encryption system.
  • the generation of the key stream relies on the unencrypted plaintext.
  • Image data allows different unencrypted plaintext image data to have different key streams, thereby making encryption more secure.
  • determining module 1 is specifically used to:
  • the unencrypted plaintext image data allocated to each bit stream encryption system in the original plaintext image data is determined.
  • the Lorentz chaotic system is a Lorentz chaotic system transformed through the TS fuzzy model.
  • the mathematical model of the Lorentz chaotic system is:
  • y(t) is the ciphertext image data
  • C is the output matrix
  • x(t) is the key stream
  • a i is the system matrix
  • ⁇ (t) is the antecedent variable
  • ⁇ i is a function about ⁇ (t).
  • the process of injecting unencrypted plaintext image data into the state equation of the Lorentz chaotic system to obtain a key stream corresponding to the unencrypted plaintext image data includes:
  • the secret key is the system initial value.
  • this application also provides an image encryption device, including:
  • Memory 71 for storing computer programs
  • the processor 72 is configured to implement the steps of the image encryption method as described in any of the above embodiments when executing a computer program.
  • the memory 71 includes non-volatile computer-readable storage media and internal memory.
  • the non-volatile computer-readable storage medium stores an operating system and computer-readable instructions
  • the internal memory provides an environment for the execution of the operating system and computer-readable instructions in the non-volatile computer-readable storage medium.
  • the processor 72 executes the computer program stored in the memory 71, the following steps can be implemented: determine the unencrypted plaintext image data allocated to each bit stream encryption system in the original plain text image data, and connect the bit stream encryption systems in parallel; The received unencrypted plaintext image data performs an encryption operation.
  • the encryption operation includes: injecting the unencrypted plaintext image data into the state equation of the Lorentz chaotic system to obtain The key stream corresponding to the unencrypted plain text image data one-to-one, and the cipher text image data is obtained based on the key stream and the unencrypted plain text image data.
  • the image encryption device first allocates unencrypted plaintext image data in the original plaintext image data to adapt to different encryption systems and enhance flexibility, and then uses a parallel multi-bit stream encryption system to allocate the original plaintext image data.
  • Each row of unencrypted plaintext image data in the plaintext image data is encrypted in parallel, which increases the encryption speed, greatly expands the secret key space, and enhances the robustness of the encryption system.
  • the generation of the key stream relies on the unencrypted plaintext.
  • Image data allows different unencrypted plaintext image data to have different key streams, thereby making encryption more secure.
  • the processor 72 executes the computer program stored in the memory 71, the following steps may be implemented: according to the number of bits of the stream encryption system and the total number of lines of the original plaintext image data, determine the bit streams allocated to each of the original plaintext image data. Unencrypted plaintext image data for encryption systems.
  • the processor 72 executes the computer program stored in the memory 71, the following steps can be implemented: convert the Lorentz chaotic system through the TS fuzzy model.
  • the mathematical model of the converted Lorentz chaotic system is:
  • y(t) is the ciphertext image data
  • C is the output matrix
  • x(t) is the key stream
  • a i is the system matrix
  • ⁇ (t) is the antecedent variable
  • ⁇ i is a function about ⁇ (t).
  • the processor 72 executes the computer program saved in the memory 71, the following steps can be implemented: obtain the secret key; inject the unencrypted plaintext image data into the state equation of the Lorentz chaotic system, and obtain the unencrypted state equation through the secret key.
  • the processor 72 executes the computer program stored in the memory 71, the following steps may be implemented: obtaining the system initial value as a secret key.
  • the image encryption device further includes:
  • the input interface is connected to the processor 72 and is used to obtain externally imported computer programs, parameters and instructions, and save them to the memory 71 under the control of the processor 72 .
  • the input interface can be connected to an input device to receive parameters or instructions manually input by the user.
  • the input device may be a touch layer covered on the display screen, or may be a button, trackball or touch pad provided on the terminal housing.
  • the display unit is connected to the processor 72 and is used to display the data sent by the processor 72 .
  • the display unit may be a liquid crystal display or an electronic ink display.
  • the network port is connected to the processor 72 and is used for communicating with external terminal devices.
  • the communication technology used in the communication connection can be wired communication technology or wireless communication technology, such as Mobile High Definition Link Technology (MHL), Universal Serial Bus (USB), High Definition Multimedia Interface (HDMI), Wireless Fidelity Technology (WiFi), Bluetooth communication technology, low-power Bluetooth communication technology, communication technology based on IEEE802.11s, etc.
  • this application also provides a non-volatile computer-readable storage medium.
  • the non-volatile computer-readable storage medium stores a computer program.
  • the computer program is executed by the processor, the computer program is implemented.
  • the storage medium can include: U disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disk, etc., which can store program code. medium.
  • a computer program is stored on the storage medium. When the computer program is executed by the processor, the following steps are implemented: determine the unencrypted plaintext image data allocated to each bitstream encryption system in the original plaintext image data, and connect the bitstream encryption systems in parallel; through each stream encryption system It performs an encryption operation on the unencrypted plaintext image data it receives.
  • the encryption operation includes: injecting the unencrypted plaintext image data into the state equation of the Lorentz chaotic system to obtain a key stream corresponding to the unencrypted plaintext image data. Based on The key stream and unencrypted plaintext image data result in ciphertext image data.
  • the unencrypted plaintext image data in the original plaintext image data is first allocated to adapt to different encryption systems and enhance flexibility, and then the unencrypted plaintext image data in the original plaintext image data is allocated through a parallel multi-bit stream encryption system.
  • Each row of unencrypted plaintext image data is encrypted in parallel, which improves the encryption speed, greatly expands the secret key space, and enhances the robustness of the encryption system.
  • the generation of the key stream relies on the unencrypted plaintext image data, making it different
  • the unencrypted plaintext image data has a different key stream, making the encryption more secure.
  • the following steps may be implemented: according to the number of bits of the stream encryption system and the total number of lines of the original plaintext image data, determine the original Unencrypted plaintext image data assigned to each bitstream encryption system among the plaintext image data.
  • the following steps may be implemented: convert the Lorentz chaotic system through the TS fuzzy model, and the converted Lorentz chaotic system
  • the mathematical model is:
  • y(t) is the ciphertext image data
  • C is the output matrix
  • x(t) is the key stream
  • a i is the system matrix
  • ⁇ (t) is the antecedent variable
  • ⁇ i is a function about ⁇ (t).
  • the following steps may be implemented: obtaining a secret key; injecting unencrypted plaintext image data into the state equation of the Lorentz chaotic system, and passing the secret key to the state equation of the Lorentz chaotic system.
  • the key is obtained and the key stream corresponding to the unencrypted plaintext image data is obtained.
  • the following steps may be implemented: obtaining a system initial value as a secret key.
  • the image encryption method adopts a parallel encryption method, that is, the original image data is divided into row units. Each row of pixels in the image can be seen. into one bit, and then arrange a stream encryption (Stream cipher) system for each row of pixels, and input each row of image data (that is, all pixels in each row) into the corresponding parallel Lorentz stream cipher system to perform image encryption operations in parallel.
  • Stream cipher stream encryption
  • the encryption process will be described below by taking one line of image data as an example. The same applies to the encryption process of other lines of image data.
  • the Lorentz system that implements image encryption operations is explained.
  • the Lorentz system is a nonlinear, aperiodic, three-dimensional deterministic continuous dynamic system. Its dynamic equation can be expressed as:
  • x 1 (t), x 2 (t) and x 3 (t) are the states of the system
  • y (t) is the output of the system
  • the Lorentzian system is a nonlinear system
  • the Lorentzian system is first converted into a TS fuzzy model to achieve nonlinear to linear conversion.
  • the TS fuzzy model is the Takagi-Sugeno fuzzy model.
  • Model the main idea of this model is to represent the nonlinear system with many line segments, that is, to transform complex nonlinear problems into problems on different small line segments.
  • rule i if x 1 (t) belongs to the fuzzy set F i , then we can get:
  • the plaintext image data m(t) is directly injected into the state equation.
  • Such a construction makes the generation of the key stream extremely dependent on the plaintext.
  • the generation of the key stream is not only related to the system initial value x(0), but also related to the plaintext image data, thus improving the security of the stream encryption system.
  • Each Lorentz stream encryption system The structures of t)) expresses in equation (9) Get the differential of the key stream over time and After the integrator, the key stream x(t) is obtained. After obtaining the key stream x(t), the key stream x(t) is multiplied by the output matrix C through a multiplier and added to the plaintext image data m(t) to obtain the ciphertext image data y(t).
  • the ciphertext image data is the image data obtained after a certain line of plaintext image data is encrypted by the stream encryption system.
  • Each row of plaintext image data is input into the Lorentz flow encryption system shown in Figure 9 to perform an encryption operation, and ciphertext image data corresponding to each row of plaintext image data can be obtained.
  • the decryption solution provided by this application also includes a multi-bit parallel stream decryption system.
  • the ciphertext image data corresponding to each line of plaintext image data is input into a stream decryption system for decryption operation.
  • Figure 10 is a step flow chart of a decryption operation provided by this application.
  • the decryption operation includes:
  • S101 The state observer constructed based on the Lorentz flow encryption system observes the observation key stream corresponding to the ciphertext image data;
  • the mathematical model of the state observer is:
  • y(t) is the ciphertext image data
  • B is the input matrix
  • C is the output matrix
  • a i is the system matrix
  • ⁇ (t) is the antecedent variable
  • ⁇ i is about ⁇ (t) function.
  • the state observer observes the observation key stream corresponding to the ciphertext image data received in the stream decryption system.
  • the first relational expression is is the plaintext image data
  • y(t) is the ciphertext image data
  • C is the output matrix, to observe the key stream.
  • the process of determining whether the observed key stream meets the decryption condition includes:
  • the observation error system is used to determine whether the observed key stream meets the decryption conditions.
  • the mathematical model of the observation error system is
  • the decryption condition is that the differential of the observation error with time approaches 0.
  • observation error system can be constructed according to Equations (9) and (11).
  • the mathematical model of the observation error system is:
  • FIG. 11 the structural schematic diagram of a stream decryption system is shown in Figure 11.
  • this application includes a multi-bit parallel stream decryption system.
  • the number of bits of the parallel stream decryption system is Dependent on the number of bits of the Lorentz stream encryption system, for ease of understanding, the state observer-based stream decryption system is described as:
  • the superscript j is the current number of bits in the stream decryption system.
  • equation (15) represents the 32nd bit stream decryption system of the block decryption system.
  • Figure 12 The structural diagram of the block decryption system based on the state observer is shown in Figure 12.
  • the ciphertext image data received by each parallel bit stream decryption system is first decrypted to achieve parallel decryption and improve the decryption efficiency.
  • a state observer is constructed based on the Lorentz stream encryption system to ensure that the Lorentz stream encryption system The synchronization of the key streams of the Lenz stream encryption system and the stream decryption system.
  • the state observer observes the observation key stream corresponding to the ciphertext image data.
  • the plaintext image is obtained through the first relational expression.
  • the decryption process does not require differential processing of the ciphertext image data, further improving the decryption efficiency.
  • the image decryption method further includes:
  • the process of obtaining the decrypted plaintext image data through the first relational expression includes:
  • the decrypted plaintext image data is obtained through the decryption key and the first relational expression.
  • the decryption key is the system initial value.
  • the Lorentz system-based encryption algorithm and the Lorentz system-based block decryption key are selected as system initial values and/or system parameters. Since the block decryption algorithm is connected to multiple Lorentz flow decryption modules in parallel, the initial value of the system can be set to, Note: It should be noted that since the chaotic system is extremely sensitive to the initial value of the system, the block decryption system must strictly input the secret key according to the block encryption system in order to correctly restore the image.
  • this embodiment first decrypts the received ciphertext image data based on each stream decryption system in parallel to achieve parallel decryption and improve decryption efficiency. It constructs a state observer based on the Lorentz stream encryption system to ensure Lorentzian flow encryption. This is the synchronization of the key streams of the stream encryption system and the stream decryption system. The state observer observes the observation key stream corresponding to the ciphertext image data. When the observation key stream satisfies the decryption condition, the plaintext image data is obtained through the first relational expression. , the decryption process does not require differential processing of the ciphertext image data.
  • the block decryption algorithm only involves differential equation operations and matrix operations, and does not include high-order power operations in traditional decryption algorithms, so the decryption speed is faster and the decryption efficiency is further improved.
  • Figure 13 is a schematic structural diagram of an image decryption system provided by this application, including a multi-bit parallel stream decryption system 1.
  • Each stream decryption system 1 includes:
  • Observation module 11 a state observer constructed based on the Lorentz flow encryption system observes the observation key stream corresponding to the ciphertext image data;
  • the judgment module 12 is used to judge whether the observed key stream meets the decryption conditions, and if so, trigger the decryption module 13;
  • the decryption module 13 is used to obtain the decrypted plaintext image data through the first relational expression.
  • the first relational expression is is the plaintext image data
  • y(t) is the ciphertext image data
  • C is the output matrix, to observe the key stream.
  • the parallel bit stream decryption system 1 is first used to decrypt the received ciphertext image data to achieve parallel decryption and improve the decryption efficiency.
  • a state observer is constructed based on the Lorentz stream encryption system to ensure The synchronization of the key streams of the Lorentz stream encryption system and the stream decryption system 1 is achieved by observing the observed key stream corresponding to the ciphertext image data through the state observer.
  • the decryption process does not require differential processing of ciphertext image data, further improving decryption efficiency.
  • the mathematical model of the Lorentz stream encryption system is:
  • y(t) is the ciphertext image data
  • B is the input matrix
  • C is the output matrix
  • a i is the system matrix
  • ⁇ (t) is the antecedent variable
  • ⁇ i is about ⁇ (t) function.
  • the process of determining whether the observed key stream meets the decryption condition includes:
  • the observation error system is used to determine whether the observed key stream meets the decryption conditions.
  • the mathematical model of the observation error system is
  • the decryption condition is that the differential of the observation error with time approaches 0.
  • the image decryption system further includes:
  • the process of obtaining the decrypted plaintext image data through the first relational expression includes:
  • the decrypted plaintext image data is obtained through the decryption key and the first relational expression.
  • the decryption key is the system initial value.
  • the image decryption system further includes:
  • Restoration module 2 is used to restore the original image data based on the plaintext image data decrypted by all stream decryption systems 1.
  • an embodiment of the present application also provides an image decryption device.
  • the image decryption device includes:
  • the first observation module 61 observes the observation key stream corresponding to the ciphertext image data based on the state observer constructed by the Lorentz flow encryption system corresponding to the received ciphertext image data;
  • the first judgment module 61 is used to judge whether the observed key stream meets the decryption conditions, and if so, trigger the first decryption module 61;
  • the first decryption module 61 is used to obtain decrypted plaintext image data through a first relational expression, and the first relational expression is is the plaintext image data, y(t) is the ciphertext image data, C is the output matrix, is the observed key stream.
  • the mathematical model of the Lorentz stream encryption system is:
  • y(t) is the ciphertext image data
  • B is the input matrix
  • C is the output matrix
  • a i is the system matrix
  • ⁇ (t) is the antecedent variable
  • ⁇ i is about ⁇ (t) function.
  • the process of determining whether the observed key stream meets the decryption condition includes:
  • the observation error system is used to determine whether the observed key stream meets the decryption conditions.
  • the mathematical model of the observation error system is
  • the decryption condition is that the differential of the observation error with time approaches 0.
  • the image decryption device further includes:
  • the first acquisition module is used to obtain the decryption key
  • the process of obtaining the decrypted plaintext image data through the first relational expression includes:
  • the decrypted plaintext image data is obtained through the decryption key and the first relational expression.
  • the decryption key is the system initial value.
  • Figure 15 is a schematic structural diagram of an electronic device provided by an embodiment of the present application.
  • the electronic device includes:
  • Memory 31 used to store computer programs
  • the processor 32 is configured to implement the steps of the image decryption method described in any of the above embodiments when executing a computer program.
  • the memory 31 includes a non-volatile storage medium and an internal memory 31 .
  • the non-volatile storage medium stores an operating system and computer-readable instructions
  • the internal memory 31 provides an environment for the execution of the operating system and computer-readable instructions in the non-volatile storage medium.
  • the processor 32 executes the computer program stored in the memory 31, the following steps can be implemented: performing decryption operations on the respectively received ciphertext image data through the parallel bit stream decryption systems.
  • the decryption operations include: based on the Lorentz stream encryption system structure
  • the state observer observes the observation key stream corresponding to the ciphertext image data; determines whether the observation key stream meets the decryption conditions; if so, obtain the decrypted plaintext image data through the first relational expression, the first relational expression is is the plaintext image data, y(t) is the ciphertext image data, C is the output matrix, to observe the key stream.
  • the ciphertext image data received by each parallel bit stream decryption system is first decrypted to achieve parallel decryption and improve the decryption efficiency.
  • a state observer is constructed based on the Lorentz stream encryption system to ensure that the Lorentz stream encryption system The synchronization of the key streams of the Lenz stream encryption system and the stream decryption system.
  • the state observer observes the observation key stream corresponding to the ciphertext image data.
  • the plaintext image is obtained through the first relational expression.
  • the decryption process does not require differential processing of the ciphertext image data, further improving the decryption efficiency.
  • the processor 32 executes the computer subroutine stored in the memory 31, the following steps can be implemented: setting the mathematical model of the Lorentz stream encryption system as: Correspondingly, set the mathematical model of the state observer as in, To observe the differentiation of the key stream over time, is the observed key stream, y(t) is the ciphertext image data, B is the input matrix, C is the output matrix, A i is the system matrix, ⁇ (t) is the antecedent variable, and ⁇ i is about ⁇ (t) function.
  • the mathematical model of the observation error system is in is the observation error, is the differential of the observation error with time.
  • the processor 32 executes the computer subroutine stored in the memory 31, the following steps can be implemented: when the differential of the observation error with time approaches 0, it is determined that the observed key stream satisfies the decryption condition.
  • the processor 32 executes the computer subroutine stored in the memory 31, the following steps can be implemented: obtain the decryption key; obtain the decrypted plaintext image data through the decryption key and the first relational expression, where, decryption The secret key is the system initial value.
  • the processor 32 executes the computer subroutine stored in the memory 31, the following steps can be implemented: restoring the original image data according to the plaintext image data decrypted by all stream decryption systems.
  • Figure 16 is a schematic structural diagram of another electronic device provided by an embodiment of the present application.
  • the electronic device also includes:
  • the input interface 33 is connected to the processor 32 and is used to obtain externally imported computer programs, parameters and instructions, and save them to the memory 31 under the control of the processor 32 .
  • the input interface 33 can be connected to an input device to receive parameters or instructions manually input by the user.
  • the input device may be a touch layer covered on the display screen, or may be a button, trackball or touch pad provided on the terminal housing.
  • the display unit 34 is connected to the processor 32 and is used to display the data sent by the processor 32 .
  • the display unit 34 may be a liquid crystal display screen or an electronic ink display screen.
  • the network port 35 is connected to the processor 32 and is used for communicating with external terminal devices.
  • the communication technology used in the communication connection can be wired communication technology or wireless communication technology, such as Mobile High Definition Link Technology (MHL), Universal Serial Bus (USB), High Definition Multimedia Interface (HDMI), Wireless Fidelity Technology (WiFi), Bluetooth communication technology, low-power Bluetooth communication technology, communication technology based on IEEE802.11s, etc.
  • this application also provides a non-volatile computer-readable storage medium.
  • the non-volatile computer-readable storage medium stores a computer program.
  • the computer program is executed by the processor, the computer program is implemented. The steps of the image decryption method described in any of the above embodiments.
  • this application also provides a non-volatile computer-readable storage medium.
  • the non-volatile storage medium can include: U disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory. Random Access Memory (RAM), disk or optical disk and other media that can store program code.
  • a computer program is stored on the non-volatile storage medium. When the computer program is executed by the processor, the following steps are implemented: each parallel bit stream decryption system performs a decryption operation on the received ciphertext image data.
  • the decryption operation includes: based on Los Angeles
  • the state observer constructed by the Lentz flow encryption system observes the observation key stream corresponding to the ciphertext image data; it determines whether the observation key stream satisfies the decryption conditions; if so, the decrypted plaintext image data is obtained through the first relation.
  • the first relation The formula is is the plaintext image data, y(t) is the ciphertext image data, C is the output matrix, to observe the key stream.
  • the ciphertext image data received by each parallel bit stream decryption system is first decrypted to achieve parallel decryption and improve the decryption efficiency.
  • a state observer is constructed based on the Lorentz stream encryption system to ensure that the Lorentz stream encryption system The synchronization of the key streams of the Lenz stream encryption system and the stream decryption system.
  • the state observer observes the observation key stream corresponding to the ciphertext image data.
  • the plaintext image is obtained through the first relational expression.
  • the decryption process does not require differential processing of the ciphertext image data, further improving the decryption efficiency.
  • the following steps can be implemented: setting the mathematical model of the Lorentz stream encryption system as: Correspondingly, set the mathematical model of the state observer as in, To observe the differentiation of the key stream over time, is the observed key stream, y(t) is the ciphertext image data, B is the input matrix, C is the output matrix, A i is the system matrix, ⁇ (t) is the antecedent variable, and ⁇ i is about ⁇ (t) function.
  • the following steps may be implemented: judging whether the observed key stream satisfies the decryption condition through the observation error system, and the observation error system
  • the mathematical model of in is the observation error, is the differential of the observation error with time.
  • the following steps may be implemented: when the differential of the observation error over time approaches 0, determine the observation key stream Meet the decryption conditions.
  • the following steps can be implemented: obtaining the decryption key; obtaining the decrypted code through the decryption key and the first relational expression. Plain text image data, where the decryption key is the system initial value.
  • the following steps can be implemented: restoring the original image data according to the plaintext image data decrypted by all stream decryption systems.
  • this application uses a parallel encryption method, that is, each line of the image is processed simultaneously. Pixels are encrypted, and the block encryption diagram is shown in Figure 2. From a mathematical point of view, the image can be regarded as a high-dimensional matrix, we will Each row (column) of the image is regarded as a data channel, and then a stream encryption system is arranged for each row. In order to facilitate understanding of the image encryption scheme provided by this application, the block encryption system applicable to the image encryption method of this application will be described.
  • each row of pixels in the image can be regarded as one bit, and a one-bit stream encryption is arranged for each row of pixels ( Stream cipher) system to encrypt this row of pixels.
  • the block encryption system includes parallel multi-bit stream encryption systems.
  • the image encryption method provided in this embodiment is implemented by each bit stream encryption system.
  • the number of bits in the stream encryption system can be determined according to the size of the original image data. Assuming that the size of the original image data is 16 ⁇ 16, a 16-bit stream encryption system can be set up.
  • Each bit stream encryption system corresponds to encrypting one line of image data.
  • one line of image The data (including all pixels in this row) is unencrypted plaintext image data.
  • the process of executing the image encryption method by a one-bit stream encryption system is explained below.
  • the encryption process of other stream encryption systems for the remaining rows of image data is the same.
  • the image encryption method includes:
  • each bitstream encryption system is responsible for encrypting a row of image data in the original image data.
  • the unencrypted row of image data here is the unencrypted plaintext image data.
  • the unencrypted plaintext image The data includes all pixels in this row. Assuming that the bit stream encryption system corresponds to the first row of the image, then the unencrypted plaintext image data includes all pixels 35, 19, 25 and 6 in this row.
  • the Lorentz chaotic system is a nonlinear, aperiodic, three-dimensional deterministic continuous dynamic system. Its dynamic equation can be expressed as:
  • the Lorentz chaotic system is a nonlinear system
  • the Lorentz chaotic system is first converted into a TS fuzzy model to achieve nonlinear to linear conversion.
  • the TS fuzzy model is Takagi- Sugeno fuzzy model
  • the main idea of this model is to represent the nonlinear system with many line segments, that is, to transform complex nonlinear problems into problems on different small line segments.
  • rule i if x1(t) belongs to the fuzzy set F i , then we can get:
  • the unencrypted plaintext image data m(t) is directly injected into the state equation. This structure makes the generation of key stream x(t) extremely dependent on plaintext.
  • the generation of the key stream is not only related to the initial value x(0) of the system, but also related to the unencrypted plaintext image data m(t), so that different unencrypted plaintext image data have different key streams. , thus having different ciphertexts, which improves the security of the encryption system.
  • the present invention unifies the input and output matrices of all subsystems, that is, all subsystems share the input matrix B and the shared output matrix C.
  • the input matrix is a column-full rank matrix
  • the output matrix is a non-singular matrix.
  • each Lorentz-based stream encryption system can be obtained.
  • the unencrypted plaintext image data m(t) passes through the multiplier in the chip and is compared with the input matrix B. Multiply it, and then add it to the encapsulated nonlinear function f(x(t)).
  • f(x(t)) is used to express in equation (19) Get the differential of the key stream over time and After the integration circuit, the key stream x(t) is obtained. After obtaining the key stream, x(t) is multiplied by the output matrix C through the multiplier to obtain the ciphertext image data y(t).
  • Each row of plaintext image data is By inputting the one-to-one corresponding ciphertext image data into the Lorentz-based stream encryption system shown in Figure 3 and performing the encryption operation, the encrypted plaintext image data for each row can be obtained with the one-to-one corresponding ciphertext image data.
  • N-bit Lorentz-based stream encryption systems are connected in parallel.
  • 16 Lorenz-based stream encryption systems can be connected in parallel to make the image
  • Each row of data is encrypted in turn using the corresponding stream encryption system.
  • This stream encryption parallel processing technology is expressed as a 16-bit block encryption method.
  • the Lorentz-based stream encryption system is described as:
  • the superscript j is the current number of bits encrypted in the block.
  • equation (20) represents the 32nd bit stream encryption system of the block encryption system.
  • m 1 (t), m 2 (t)...m N (t) is N-dimensional unencrypted data.
  • This data is passed through the Lorenz block encryption module in parallel to obtain N-dimensional encrypted data y 1 (t), y 2 (t)...y N (t).
  • the system can connect enough Lorentz stream encryption systems in parallel to greatly increase the encryption speed of the target image.
  • the structure of the Lorentz-based block encryption system is shown in Figure 20.
  • each row of image data in the original image data is simultaneously encrypted through a parallel multi-bit stream encryption system, which improves the encryption speed, expands the key space, and enhances the robustness of the encryption system.
  • the generation of key stream relies on unencrypted plaintext image data, so that different unencrypted plaintext image data correspond to different key streams, thereby generating different ciphertext image data, making encryption more secure.
  • this application also provides an image decryption algorithm based on the concept of system inverse for the above image encryption scheme.
  • the schematic diagram of Lorentz block decryption is shown in Figure 21.
  • a stream decryption system with the same number of bits as the stream encryption system is used to decrypt each line of ciphertext image data encrypted by the above image encryption method through the stream decryption system.
  • each stream decryption system in parallel performs the following operations:
  • y(t) is the ciphertext image data
  • ciphertext image data is the first-order derivative of the ciphertext image data
  • B is the input matrix
  • C is the output matrix
  • a i is the system matrix
  • ⁇ (t) is the antecedent variable
  • ⁇ i is the function about ⁇ (t).
  • the output matrix C to be a non-singular matrix
  • CB also to be a column-full rank. This is a sufficient condition for the system to be invertible. Since matrices B and C are preset, the feasible matrix is easy to choose.
  • the structural schematic diagram of the stream decryption system based on inverse mapping is shown in Figure 22. Further, a block decryption system based on inverse mapping is constructed. For the Lorentz-based block encryption system, the corresponding block decryption system based on inverse mapping can be Multiple bit stream decryption systems are connected in parallel. The structure of the bit stream decryption system is the same, but the input and output data and secret keys are different.
  • the flow chart is shown in Figure 23. In Figure 23, the input signal is all the lines of the encrypted image, and all The row data passes through the block decryption system at the same time, and all row data of the original image can be obtained, which can be composed and restored to the original image data.
  • the ciphertext image data encrypted by the above image encryption method is decrypted.
  • the decryption process only relies on the ciphertext image data and the first-order derivative of the ciphertext image data, which improves the decryption efficiency.
  • the decrypted plaintext image data of the decryption system can restore the original image data.
  • this application proposes a block encryption and decryption scheme based on the Lorentz chaotic system.
  • the scheme first removes the pass-through part of the output equation of the stream encryption system, reducing the direct correlation between plaintext and ciphertext; secondly, it combines multiple
  • the parallel design of bit stream encryption modules has the following advantages: first, it improves the encryption speed of images; second, it greatly expands the secret key space; third, it enhances the robustness of the encryption system; fourth, The key stream depends on the image to be encrypted, so that different images have different key streams; fifth, the selection of bits is flexible.
  • this application uses the method of inverse mapping to provide the conditions for the system to be reversible, and then constructs a stream decryption system to decrypt single-channel ciphertext. Finally, for the Lorentz block encryption system, this application uses a parallel N-bit stream decryption system to directly decrypt multi-channel ciphertext simultaneously. Finally, using the concept of control system flatness, the theoretical guarantee of the security of the proposed encryption system is given.
  • the image processing device includes:
  • Memory 2401 used to store computer programs
  • the processor 2402 is configured to implement the steps of the image encryption method as described in any of the above embodiments and/or the steps of the image decryption method as described in any of the above embodiments when executing a computer program.
  • the memory includes non-volatile storage media and internal memory.
  • the non-volatile storage medium stores an operating system and computer-readable instructions
  • the internal memory provides an environment for the execution of the operating system and computer-readable instructions in the non-volatile storage medium.
  • the processor executes the computer program saved in the memory, it can implement the following steps: obtain unencrypted plaintext image data; inject the unencrypted plaintext image data into the state equation of the Lorentz chaotic system to obtain a one-to-one correspondence with the unencrypted plaintext image data. Key stream; use the key stream to obtain ciphertext image data.
  • the following steps can be implemented: performing the following operations through each stream decryption system in parallel: obtaining the ciphertext image data encrypted by any of the above image encryption methods; Based on the Lorentz decryption system, the ciphertext image data is decrypted to obtain the decrypted plaintext image data; the mathematical model of the Lorentz decryption system is:
  • y(t) is the ciphertext image data
  • ciphertext image data is the first-order derivative of the ciphertext image data
  • B is the input matrix
  • C is the output matrix
  • a i is the system matrix
  • ⁇ (t) is the antecedent variable
  • ⁇ i is the function about ⁇ (t).
  • each row of image data in the original image data is simultaneously encrypted through a parallel multi-bit stream encryption system, which improves the encryption speed, expands the key space, and enhances the robustness of the encryption system.
  • the generation of key stream relies on unencrypted plaintext image data, so that different unencrypted plaintext image data correspond to different key streams, thereby generating different ciphertext image data, making encryption more secure.
  • the decryption process only relies on the ciphertext image data and the first derivative of the ciphertext image data to improve the decryption efficiency.
  • the decrypted plaintext image through each bit stream decryption system data to restore the original image data.
  • the processor executes the computer subroutine stored in the memory
  • the following steps can be implemented: perform TS fuzzy model conversion on the Lorentz chaotic system to obtain the Lorentz chaotic system, and the converted Lorentz chaos
  • Mathematical model of the system in, is the differential of the key stream over time, y(t) is the ciphertext image data, C is the output matrix, x(t) is the key stream, A i is the system matrix, ⁇ (t) is the antecedent change Quantity, ⁇ i is a function about ⁇ (t).
  • the processor when the processor executes the computer subroutine stored in the memory, the following steps can be implemented: restoring the original image data through the decrypted plaintext image data obtained by all stream decryption systems.
  • the image processing device further includes:
  • the input interface is connected to the processor and is used to obtain externally imported computer programs, parameters and instructions, and save them to the memory under the control of the processor.
  • the input interface can be connected to an input device to receive parameters or instructions manually input by the user.
  • the input device may be a touch layer covered on the display screen, or may be a button, trackball or touch pad provided on the terminal housing.
  • the display unit is connected to the processor and used to display data sent by the processor.
  • the display unit may be a liquid crystal display or an electronic ink display.
  • the network port is connected to the processor and is used to communicate with external terminal devices.
  • the communication technology used in the communication connection can be wired communication technology or wireless communication technology, such as Mobile High Definition Link Technology (MHL), Universal Serial Bus (USB), High Definition Multimedia Interface (HDMI), Wireless Fidelity Technology (WiFi), Bluetooth communication technology, low-power Bluetooth communication technology, communication technology based on IEEE802.11s, etc.
  • this application also provides a non-volatile computer-readable storage medium.
  • the non-volatile computer-readable storage medium 25 stores a computer program 251, and the computer program is executed by the processor.
  • This application also provides a storage medium, which may include: U disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disk and other media that can store program code.
  • the storage medium stores a computer program.
  • the computer program When the computer program is executed by the processor, the following steps are implemented: obtain unencrypted plaintext image data; inject the unencrypted plaintext image data into the state equation of the Lorentz chaotic system to obtain the same as the unencrypted plaintext image data.
  • One-to-one corresponding key stream use the key stream to obtain ciphertext image data.
  • a computer program is stored on the storage medium.
  • each row of image data in the original image data is processed simultaneously through a parallel multi-bit stream encryption system.
  • Encryption improves the encryption speed, expands the secret key space, and enhances the robustness of the encryption system. Since the generation of the key stream relies on unencrypted plaintext image data, different unencrypted plaintext image data corresponds to different keys. stream, thereby generating different ciphertext image data, making encryption more secure.
  • Decrypt the ciphertext image data encrypted by the above image encryption method The decryption process only relies on the ciphertext image data and the first derivative of the ciphertext image data to improve the decryption efficiency.
  • the decrypted plaintext image through each bit stream decryption system data to restore the original image data.
  • the processor executes the computer subroutine stored in the memory
  • the following steps can be implemented: perform TS fuzzy model conversion on the Lorentz chaotic system to obtain the Lorentz chaotic system, and the converted Lorentz chaos
  • Mathematical model of the system in, is the differential of the key stream over time, y(t) is the ciphertext image data, C is the output matrix, x(t) is the key stream, A i is the system matrix, ⁇ (t) is the antecedent variable, ⁇ i is a function about ⁇ (t).
  • the processor when the processor executes the computer subroutine stored in the memory, the following steps can be implemented: restoring the original image data through the decrypted plaintext image data obtained by all stream decryption systems.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Facsimile Transmission Control (AREA)

Abstract

本申请公开了一种图像加密方法、图像解密方法、图像处理装置及存储介质,涉及图像处理领域,该图像加密方法通过并联的多位流加密系统对原始图像数据中的各行图像数据同时进行加密,提高了加密速度,扩展了秘钥空间,增强了加密系统的鲁棒性,由于密钥流的生成依赖于未加密明文图像数据,使得不同的未加密明文图像数据对应不同的密钥流,从而生成不同的密文图像数据,使得加密安全性更高。该图像解密方法对上述图像加密方法加密后的密文图像数据进行解密,解密过程仅依赖于密文图像数据,以及密文图像数据的一阶导数,提高了解密效率,通过各位流解密系统的解密后明文图像数据即可还原原始图像数据。

Description

图像加密方法、图像解密方法、图像处理装置及存储介质
相关申请的交叉引用
本申请要求于2022年03月10日提交中国专利局,申请号为202210228387.0,申请名称为“一种图像解密方法、系统、装置及计算机可读存储介质”的中国专利申请,于2022年03月10日提交中国专利局,申请号为202210228351.2,申请名称为“一种图像加密方法、系统、装置及计算机可读存储介质”的中国专利申请,以及于2022年03月10日提交中国专利局,申请号为202210228353.1,申请名称为“图像加密方法、图像解密方法、图像处理装置及存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及图像处理领域,特别涉及一种图像加密方法、图像解密方法、图像处理装置及存储介质。
背景技术
在各行各业中,如计算机视觉、机器人路径规划,医学影像处理等相关领域,图像数据的私密性已经成为了一个至关重要的问题。在图像传输过程中,通常采用块加密算法对图像进行加密传输,在加密时需要对图像每一行的数据依次进行加密,即先加密第一行的图像数据,然后再加密第二行图像数据,直至完成对最后一行图像数据的加密,加密速度慢。此外,现有的加密方案中,通常会建立明文和密文之间的对应关系,以便后续进行解密,但是这种方案会降低加密的安全性。
发明内容
本申请的目的是提供一种图像加密方法、图像解密方法、图像处理装置和存储介质,提高了加密速度,扩展了秘钥空间,增强了加密系统的鲁棒性,加密安全性更高,解密过程仅依赖于密文图像数据,以及密文图像数据的一阶导数,提高了解密效率。
为解决上述技术问题,本申请提供了一种图像加密方法,该图像加密方法包括:
确定原始明文图像数据中分配给各位流加密系统的未加密明文图像数据,各位流加密系统并联;
通过每一流加密系统对其接收到的未加密明文图像数据执行加密操作,加密操作包括:
将未加密明文图像数据注入洛伦兹混沌系统的状态方程,得到与未加密明文图像数据一一对应的密钥流,基于密钥流和未加密明文图像数据得到密文图像数据。
在一些实施例中,确定原始明文图像数据中分配给各位流加密系统的未加密明文图像数据的过程包括:
根据流加密系统的位数及原始明文图像数据的总行数,确定原始明文图像数据中分配给各位流加密系统的未加密明文图像数据。
在一些实施例中,洛伦兹混沌系统为通过TS模糊模型转换后的洛伦兹混沌系统。
在一些实施例中,洛伦兹混沌系统的数学模型为:
其中,为密钥流随时间的微分,y(t)为密文图像数据,C为输出矩阵,x(t)为密钥流,Ai为系统矩阵,ξ(t)为前件变量,μi为关于ξ(t)的函数。
在一些实施例中,将未加密明文图像数据注入洛伦兹混沌系统的状态方程,得到与未加密明文图像数据一一对应的密钥流的过程包括:
获取秘钥;
将未加密明文图像数据注入洛伦兹混沌系统的状态方程,通过秘钥得到与未加密明文图像数据一一对应的密钥流。
在一些实施例中,秘钥为系统初始值。
为解决上述技术问题,本申请还提供了一种图像加密系统,该图像加密系统包括:
确定模块,用于确定原始明文图像数据中分配给各位流加密系统的未加密明文图像数据,各位流加密系统并联;
加密模块,用于通过每一流加密系统对其接收到的未加密明文图像数据执行加密操作,加密操作包括:
将未加密明文图像数据注入洛伦兹混沌系统的状态方程,得到与未加密明文图像数据一一对应的密钥流,基于密钥流和未加密明文图像数据得到密文图像数据。
在一些实施例中,确定模块具体用于:
根据流加密系统的位数及原始明文图像数据的总行数,确定原始明文图像数据中分配给各位流加密系统的未加密明文图像数据。
为解决上述技术问题,本申请还提供了一种图像加密装置,包括:
存储器,用于存储计算机程序;
处理器,用于执行计算机程序时实现如上文任意一项的图像加密方法的步骤。
为解决上述技术问题,本申请还提供了一种非易失性计算机可读存储介质,非易失性计算机可读存储介质上存储有计算机程序,计算机程序被处理器执行时实现如上文任意一项的图像加密方法的步骤。
本申请提供了一种图像解密方法,包括:
通过并联的各位流解密系统对各自接收到的密文图像数据执行解密操作,解密操作包括:
基于洛伦兹流加密系统构造的状态观测器观测密文图像数据对应的观测密钥流;
判断观测密钥流是否满足解密条件;
若是,通过第一关系式得到解密后的明文图像数据,第一关系式为 为明文图像数据,y(t)为密文图像数据,C 为输出矩阵,为观测密钥流。
在一些实施例中,洛伦兹流加密系统的数学模型为:
相应的,状态观测器的数学模型为:
其中,为观测密钥流随时间的微分,为观测密钥流,y(t)为密文图像数据,B为输入矩阵,C为输出矩阵,Ai为系统矩阵,ξ(t)为前件变量,μi为关于ξ(t)的函数。
在一些实施例中,判断观测密钥流是否满足解密条件的过程包括:
通过观测误差系统判断观测密钥流是否满足解密条件,观测误差系统的数学模型为
其中,为观测误差,为观测误差随时间的微分。
在一些实施例中,解密条件为观测误差随时间的微分趋近于0。
在一些实施例中,该图像解密方法还包括:
获取解密秘钥;
通过第一关系式得到解密后的明文图像数据的过程包括:
通过解密秘钥和第一关系式得到解密后的明文图像数据。
在一些实施例中,解密秘钥为系统初始值。
在一些实施例中,该图像解密方法还包括:
根据所有流解密系统解密后的明文图像数据还原原始图像数据。
为解决上述技术问题,本申请还提供了一种图像解密系统,包括多位并联的流解密系统,每一流解密系统包括:
观测模块,基于洛伦兹流加密系统构造的状态观测器观测密文图像数据对应的观测密钥流;
判断模块,用于判断观测密钥流是否满足解密条件,若是,触发解密模块;
解密模块,用于通过第一关系式得到解密后的明文图像数据,第一关系式为 为明文图像数据,y(t)为密文图像数据,C 为输出矩阵,为观测密钥流。
为解决上述技术问题,本申请还提供了一种图像解密装置,包括:
存储器,用于存储计算机程序;
处理器,用于执行计算机程序时实现如上文任意一项的图像解密方法的步骤。
为解决上述技术问题,本申请还提供了一种非易失性计算机可读存储介质,非易失性计算机可读存储介质上存储有计算机程序,计算机程序被处理器执行时实现如上文任意一项的图像解密方法的步骤。
本申请提供了一种图像加密方法,应用于并联的多位流加密系统中的每一流加密系统,该图像加密方法包括:
获取未加密明文图像数据;
将未加密明文图像数据注入洛伦兹混沌系统的状态方程,得到与未加密明文图像数据一一对应的密钥流;
利用密钥流得到密文图像数据。
在本申请一些实施例中,洛伦兹混沌系统为进行TS模糊模型转换后的洛伦兹混沌系统。
在本申请一些实施例中,洛伦兹混沌系统的数学模型为:
其中,为密钥流随时间的微分,y(t)为密文图像数据,C为输出矩阵,x(t)为密钥流,Ai为系统矩阵,ξ(t)为前件变量,μi为关于ξ(t)的函数。
在本申请一些实施例中,输入矩阵为列满秩矩阵,输出矩阵为非奇异矩阵。
在本申请一些实施例中,并联的流加密系统的位数根据原始图像数据大小确定。
为解决上述技术问题,本申请还提供了一种图像解密方法,该图像解密方法包括:
通过并联的每一流解密系统执行以下操作:
获取通过上文任意一项的图像加密方法加密后的密文图像数据;
基于洛伦兹解密系统对密文图像数据进行解密操作,得到解密后明文图像数据;
洛伦兹解密系统的数学模型为:
其中,为解密后明文图像数据,y(t)为密文图像数据,为密文图像数据 的一阶导数,B为输入矩阵,C为输出矩阵,Ai为系统矩阵,ξ(t)为前件变量,μi为关于ξ(t)的函数。
在本申请一些实施例中,并联的流解密系统的位数根据流加密系统的位数确定。
在本申请一些实施例中,该图像解密方法还包括:
通过所有流解密系统得到的解密后明文图像数据还原原始图像数据。
为解决上述技术问题,本申请还提供了一种图像处理装置,包括:
存储器,用于存储计算机程序;
处理器,用于执行计算机程序时实现如上文任意一项的图像加密方法的步骤和/或如上文任意一项的图像解密方法的步骤。
为解决上述技术问题,本申请还提供了一种非易失性计算机可读存储介质,存储介质上存储有计算机程序,计算机程序被处理器执行时实现如上文任意一项的图像加密方法的步骤和/或如上文任意一项的图像解密方法的步骤。
本申请提供了一种图像加密方法,首先对原始明文图像数据中的未加密明文图像数据进行分配,以适应不同加密系统,增强灵活性,然后通过并联的多位流加密系统对原始明文图像数据中的各行未加密明文图像数据并行加密,提高加密速度,极大拓展了秘钥空间,增强了加密系统的鲁棒性,在加密过程中,密钥流的生成依赖于未加密明文图像数据,使得不同的未加密明文图像数据有不同的密钥流,从而使得加密安全性更高。本申请还提供了一种图像加密系统、图像加密装置及非易失性计算机可读存储介质,具有和上述图像加密方法相同的有益效果。
本申请提供了一种图像解密方法,首先基于并联的各位流解密系统对各自接收到的密文图像数据进行解密操作,实现并行解密,提高解密效率,基于洛伦兹流加密系统构造状态观测器,保证洛伦兹流加密系统和流解密系统密钥流的同步性,通过该状态观测器观测密文图像数据对应的观测密钥流,在观测密钥流满足解密条件,通过第一关系式获取明文图像数据,解密过程无需对密文图像数据进行微分处理,进一步提高解密效率。本申请还提供了一种图像解密系统、装置及非易失性计算机可读存储介质,具有和上述图像解密系统相同的有益效果。
本申请提供了一种图像加密方法,通过并联的多位流加密系统对原始图像数据中的各行图像数据同时进行加密,提高了加密速度,扩展了秘钥空间,增强了加密系统的鲁棒性,由于密钥流的生成依赖于未加密明文图像数据,使得不同的未加密明文图像数据对应不同的密钥流,从而生成不同的密文图像数据,使得加密安全性更高。本申请还提供了一种图像解密方法,对上述图像加密方法加密后的密文图像数据进行解密,解密过程仅依赖于密文图像数据,以及密文图像数据的一阶导数,提高了解密效率,通过各位流解密系统的解密后明文图像数据即可还原原始图像数据。本申请还提供了一种图像处理装置和非易失性计算机可读存储介质,具有和上述图像加密方法和/或图像解密方法相同的有益效果。
附图说明
为了更清楚地说明本申请实施例,下面将对实施例中所需要使用的附图做简单的介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1为本申请所提供的一种图像加密方法的步骤流程图;
图2为本申请所提供的一种块加密示意图;
图3为本申请实施例所提供的一种图像数据划分示意图;
图4为本申请实施例所提供的一种流加密系统的结构示意图;
图5为本申请实施例所提供的一种块加密系统的结构示意图;
图6为本申请所提供的一种图像加密系统的结构示意图;
图7为本申请所提供的一种图像加密装置的结构示意图;
图8为本申请所提供的一种非易失性计算机可读存储介质的结构图;
图9为本申请所提供的一种洛伦兹流加密系统的结构示意图;
图10为本申请所提供的一种解密操作的步骤流程图;
图11为本申请所提供的一种流解密系统的结构示意图;
图12为本申请所提供的一种基于状态观测器的块解密系统;
图13为本申请所提供的一种图像解密系统的结构示意图;
图14为本申请所提供的一种图像解密装置的结构示意图;
图15为本申请所提供的一种电子设备的结构示意图;
图16为本申请所提供的另一种电子设备的结构示意图;
图17为本申请提供的一种非易失性计算机可读存储介质的结构图;
图18为本申请所提供的一种图像加密方法的步骤流程图;
图19为本申请所提供的一种基于洛伦兹的流加密系统的结构示意图;
图20为本申请所提供的一种基于洛伦兹的块加密系统的结构示意图;
图21为本申请所提供的一种洛伦兹块解密示意图;
图22为本申请所提供的一种基于逆映射的流解密系统的结构示意图;
图23为本申请所提供的一种块解密系统的结构示意图;
图24为本申请所提供的一种图像处理装置的结构示意图;
图25为本申请所提供的一种非易失性计算机可读存储介质的结构图。
具体实施方式
本申请的核心是提供一种图像加密方法、系统、装置及计算机可读存储介质,加密灵活性强,采用并行加密,提高了加密速度,极大拓展了秘钥空间,增强了加密系统的鲁棒性,同时提高了加密安全性。
为使本申请实施例的目的、技术方案和优点更加清楚,下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
请参照图1,图1为本申请所提供的一种图像加密方法的步骤流程图,该图像加密方法包括:
S101:确定原始明文图像数据中分配给各位流加密系统的未加密明文图像数据,各位流加密系统并联;
具体的,为了提高图像加密效率,通常采用块加密系统对原始明文图像数据进行加密, 参照图2所示,可以理解的是,对于图像,图像的每一行像素可以看成一位,可以为每一行像素都安排一位流加密(Stream cipher)系统,对这一行像素进行加密,基于此,块加密系统包括并联的多位流加密系统。块加密系统的位数往往与原始明文图像数据的大小相对应,假设原始明文图像数据为16×16,则块加密系统的位数为16,但是在实际工程中,考虑生产成本和制作工艺等因素,可能并不会并联大量的流加密系统,因此,本步骤可以对原始明文图像数据进行拆分,分别为拆分后的原始明文图像数据分配流加密系统,参照图3所示,假设块加密系统共有两位,而图像大小是4×4,则可将4×4的原始明文图像数据拆分为2×4再串入2×4的原始图像数据,即原始明文图像数据中第一行的未加密明文图像数据和第三行的未加密明文图像数据分配给第一位流加密系统,以便第一位流加密系统依次对第一行的未加密明文图像数据和第三行的未加密明文图像数据进行加密,原始明文图像数据中第二行的未加密明文图像数据和第四行的未加密明文图像数据分配给第二位流加密系统,以便第二位流加密系统依次对第二行的未加密明文图像数据和第四行的未加密明文图像数据进行加密。
可以理解的是,首先对原始明文图像数据进行拆分,按拆分结果将对应的未加密明文图像数据分配给对应的流加密系统进行加密,这样可以灵活适应不同位数流加密系统。
在一些实施例中,确定原始明文图像数据中分配给各位流加密系统的未加密明文图像数据的过程包括:
根据流加密系统的位数及原始明文图像数据的总行数,确定原始明文图像数据中分配给各位流加密系统的未加密明文图像数据。
具体的,可以根据流加密系统的位数及原始明文图像数据的总行数,确定对原始明文图像数据的划分方式,也即确定分配给各位流加密系统的未加密明文图像数据。
S102:通过每一流加密系统对其接收到的未加密明文图像数据执行加密操作,加密操作包括:将未加密明文图像数据注入洛伦兹混沌系统的状态方程,得到与未加密明文图像数据一一对应的密钥流,基于密钥流和未加密明文图像数据得到密文图像数据。
具体的,按S101的分配方式,将对应的未加密明文图像数据输入对应的流加密系统中,每位流加密系统接收到未加密明文图像数据后,对该未加密明文图像数据进行加密,其中,未加密明文图像数据即未加密的原始图像数据中的一行图像数据,包括该行未加密的所有像素,密文图像数据即经流加密系统加密后的一行图像数据,包括该行解密后的所有像素。
首先,对实现图像加密操作的洛伦兹混沌系统进行说明,洛伦兹系统是一个非线性、非周期、三维的确定性连续动态系统。其动态方程可以表示为:
其中,x1(t),x2(t)和x3(t)是系统的状态;y(t)是系统的输出;x1(0),x2(0)和x3(0)设置为系统的初始状态,即t=0时刻的状态初始值。
考虑到洛伦兹混沌系统是一个非线性系统,为便于后续进行数据处理,首先将洛伦兹混 沌系统转换为TS模糊模型,从而实现非线性到线性的转换,其中,TS模糊模型即Takagi-Sugeno模糊模型,该模型的主要思想是将非线性系统用许多线段相近的表示出来,即将复杂的非线性问题转化为在不同小线段上的问题。
具体的,设规则i:如果x1(t)属于模糊集Fi,那么可以得到:
其中,系统的状态向量为x(t)=[x1(t) x2(t)]T,模糊集为系数矩阵为C1=C2=[1 0 0]。因此,洛伦兹混沌系统可以转换为TS模糊模型,写为:
其中,ξ(t)=x1(t), 并且其满足μ1(ξ(t))+μ2(ξ(t))=1。
具体的,定义要未加密明文图像数据为m(t),且在t时刻,是个常数,系统输入矩阵为Bi。为了设计解密系统方便,本申请将未加密明文图像数据m(t)分别注入洛伦兹混 沌系统的状态方程以及输出方程y(t)=Cx(t)中,得到:
从系统结构看出,未加密明文图像数据m(t)直接注入状态方程中。这样的构造使得密钥流的产生极其依赖明文,也就是说,密钥流的产生不仅仅与系统的初始值x(0)有关系,还与明文有关,从而使得加密系统的安全性得到了提高。基于洛伦兹的流加密系统的框图如图4所示。
参照图4,未加密明文图像数据m(t)经过乘法器,与输入矩阵B相乘,再与非线性函数f(x(t))相加,得到密钥流随时间的微分 经过积分器,得到密钥流x(t)。得到密钥流之后,x(t)经过乘法器与输出矩阵C相乘,并与明文m(t)相加,得到了密文图像数据y(t)。
进一步的,将基于洛伦兹的流加密系统按固定位数进行并联。例如,当加密对象为8位图像,即像素值为0-255,图像的大小为16×16,那么此时可以并联16个Lorenz流加密系统,让图像的每一行数据依次利用相应的流加密系统进行加密,这样的流加密并行处理技术表现为一个16位的块加密方式。为便于理解,将基于洛伦兹的流加密系统描述为:
其中,上角标j为块加密的当前位数。例如,当j=32时,式(5)表示为块加密系统的第32位流加密系统。理论上,系统可以将足够多的洛伦兹流加密系统并联在一起,来极大提升对目标图像的加密速度,块加密系统的结构示意图如图5所示。
此外,基于洛伦兹混沌系统的块加密算法,秘钥选择为系统初始值以及系统参数。由于块加密算法并联多位Lorenz流加密模块,因此,系统初始值可以设置为x(0)=[x1(0) x2(0) ... xN(0)]。
可见,在一些实施例中所提供的图像加密方法首先对原始明文图像数据中的未加密明文图像数据进行分配,以适应不同加密系统,增强灵活性,然后通过并联的多位流加密系统对原始明文图像数据中的各行未加密明文图像数据并行加密,提高加密速度,极大拓展了秘钥空间,增强了加密系统的鲁棒性,在加密过程中,密钥流的生成依赖于未加密明文图像数据,使得不同的未加密明文图像数据有不同的密钥流,从而使得加密安全性更高。
请参照图6,图6为本申请所提供的一种图像加密系统的结构示意图,该图像加密系统包括:
确定模块1,用于确定原始明文图像数据中分配给各位流加密系统的未加密明文图像数 据,各位流加密系统并联;
加密模块2,用于通过每一流加密系统对其接收到的未加密明文图像数据执行加密操作,加密操作包括:
将未加密明文图像数据注入洛伦兹混沌系统的状态方程,得到与未加密明文图像数据一一对应的密钥流,基于密钥流和未加密明文图像数据得到密文图像数据。
可见,在一些实施例中所提供的图像加密系统首先对原始明文图像数据中的未加密明文图像数据进行分配,以适应不同加密系统,增强灵活性,然后通过并联的多位流加密系统对原始明文图像数据中的各行未加密明文图像数据并行加密,提高加密速度,极大拓展了秘钥空间,增强了加密系统的鲁棒性,在加密过程中,密钥流的生成依赖于未加密明文图像数据,使得不同的未加密明文图像数据有不同的密钥流,从而使得加密安全性更高。
在一些实施例中,确定模块1具体用于:
根据流加密系统的位数及原始明文图像数据的总行数,确定原始明文图像数据中分配给各位流加密系统的未加密明文图像数据。
在一些实施例中,洛伦兹混沌系统为通过TS模糊模型转换后的洛伦兹混沌系统。
在一些实施例中,洛伦兹混沌系统的数学模型为:
其中,为密钥流随时间的微分,y(t)为密文图像数据,C为输出矩阵,x(t)为密钥流,Ai为系统矩阵,ξ(t)为前件变量,μi为关于ξ(t)的函数。
在一些实施例中,将未加密明文图像数据注入洛伦兹混沌系统的状态方程,得到与未加密明文图像数据一一对应的密钥流的过程包括:
获取秘钥;
将未加密明文图像数据注入洛伦兹混沌系统的状态方程,通过秘钥得到与未加密明文图像数据一一对应的密钥流。
在一些实施例中,秘钥为系统初始值。
另一方面,如图7所示,本申请还提供了一种图像加密装置,包括:
存储器71,用于存储计算机程序;
处理器72,用于执行计算机程序时实现如上文任意一个实施例所描述的图像加密方法的步骤。
具体的,存储器71包括非易失性计算机可读存储介质、内存储器。该非易失性计算机可读存储介质存储有操作系统和计算机可读指令,该内存储器为非易失性计算机可读存储介质中的操作系统和计算机可读指令的运行提供环境。处理器72执行存储器71中保存的计算机程序时,可以实现以下步骤:确定原始明文图像数据中分配给各位流加密系统的未加密明文图像数据,各位流加密系统并联;通过每一流加密系统对其接收到的未加密明文图像数据执行加密操作,加密操作包括:将未加密明文图像数据注入洛伦兹混沌系统的状态方程,得到与 未加密明文图像数据一一对应的密钥流,基于密钥流和未加密明文图像数据得到密文图像数据。
可见,在一些实施例中所提供的图像加密装置首先对原始明文图像数据中的未加密明文图像数据进行分配,以适应不同加密系统,增强灵活性,然后通过并联的多位流加密系统对原始明文图像数据中的各行未加密明文图像数据并行加密,提高加密速度,极大拓展了秘钥空间,增强了加密系统的鲁棒性,在加密过程中,密钥流的生成依赖于未加密明文图像数据,使得不同的未加密明文图像数据有不同的密钥流,从而使得加密安全性更高。
在一些实施例中,处理器72执行存储器71中保存的计算机程序时,可以实现以下步骤:根据流加密系统的位数及原始明文图像数据的总行数,确定原始明文图像数据中分配给各位流加密系统的未加密明文图像数据。
在一些实施例中,处理器72执行存储器71中保存的计算机程序时,可以实现以下步骤:将洛伦兹混沌系统通过TS模糊模型进行转换,转换后的洛伦兹混沌系统的数学模型为:
其中,为密钥流随时间的微分,y(t)为密文图像数据,C为输出矩阵,x(t)为密钥流,Ai为系统矩阵,ξ(t)为前件变量,μi为关于ξ(t)的函数。
在一些实施例中,处理器72执行存储器71中保存的计算机程序时,可以实现以下步骤:获取秘钥;将未加密明文图像数据注入洛伦兹混沌系统的状态方程,通过秘钥得到与未加密明文图像数据一一对应的密钥流。
在一些实施例中,处理器72执行存储器71中保存的计算机程序时,可以实现以下步骤:获取系统初始值作为秘钥。
在上述实施例的基础上,在一些实施例中,该图像加密装置还包括:
输入接口,与处理器72相连,用于获取外部导入的计算机程序、参数和指令,经处理器72控制保存至存储器71中。该输入接口可以与输入装置相连,接收用户手动输入的参数或指令。该输入装置可以是显示屏上覆盖的触摸层,也可以是终端外壳上设置的按键、轨迹球或触控板。
显示单元,与处理器72相连,用于显示处理器72发送的数据。该显示单元可以为液晶显示屏或者电子墨水显示屏等。
网络端口,与处理器72相连,用于与外部各终端设备进行通信连接。该通信连接所采用的通信技术可以为有线通信技术或无线通信技术,如移动高清链接技术(MHL)、通用串行总线(USB)、高清多媒体接口(HDMI)、无线保真技术(WiFi)、蓝牙通信技术、低功耗蓝牙通信技术、基于IEEE802.11s的通信技术等。
另一方面,本申请还提供了一种非易失性计算机可读存储介质,如图8所示,非易失性计算机可读存储介质上存储有计算机程序,计算机程序被处理器执行时实现如上文任意一个实施例所描述的图像加密方法的步骤。
具体的,该存储介质可以包括:U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。该存储介质上存储有计算机程序,计算机程序被处理器执行时实现以下步骤:确定原始明文图像数据中分配给各位流加密系统的未加密明文图像数据,各位流加密系统并联;通过每一流加密系统对其接收到的未加密明文图像数据执行加密操作,加密操作包括:将未加密明文图像数据注入洛伦兹混沌系统的状态方程,得到与未加密明文图像数据一一对应的密钥流,基于密钥流和未加密明文图像数据得到密文图像数据。
可见,在一些实施例中,首先对原始明文图像数据中的未加密明文图像数据进行分配,以适应不同加密系统,增强灵活性,然后通过并联的多位流加密系统对原始明文图像数据中的各行未加密明文图像数据并行加密,提高加密速度,极大拓展了秘钥空间,增强了加密系统的鲁棒性,在加密过程中,密钥流的生成依赖于未加密明文图像数据,使得不同的未加密明文图像数据有不同的密钥流,从而使得加密安全性更高。
在一些实施例中,非易失性计算机可读存储介质中存储的计算机程序被处理器执行时,具体可以实现以下步骤:根据流加密系统的位数及原始明文图像数据的总行数,确定原始明文图像数据中分配给各位流加密系统的未加密明文图像数据。
在一些实施例中,计算机可读存储介质中存储的计算机程序被处理器执行时,具体可以实现以下步骤:将洛伦兹混沌系统通过TS模糊模型进行转换,转换后的洛伦兹混沌系统的数学模型为:
其中,为密钥流随时间的微分,y(t)为密文图像数据,C为输出矩阵,x(t)为密钥流,Ai为系统矩阵,ξ(t)为前件变量,μi为关于ξ(t)的函数。
在一些实施例中,计算机可读存储介质中存储的计算机程序被处理器执行时,具体可以实现以下步骤:获取秘钥;将未加密明文图像数据注入洛伦兹混沌系统的状态方程,通过秘钥得到与未加密明文图像数据一一对应的密钥流。
在一些实施例中,计算机可读存储介质中存储的计算机程序被处理器执行时,具体可以实现以下步骤:获取系统初始值作为秘钥。
为便于理解本申请的图像解密方法,首先对该图像解密方法相对应的图像加密方法进行说明,图像加密方法采用并行加密的方式,即将原始图像数据以行为单位划分,图像的每一行像素可以看成一位,然后为每一行像素都安排一位流加密(Stream cipher)系统,将各行图像数据(即各行所有像素)输入对应的各位并联的洛伦兹流加密系统中并行进行图像加密操作。为便于说明,下面以一行图像数据为例,对加密过程进行说明,其余行图像数据的加密过程,同理。
首先对实现图像加密操作的洛伦兹系统进行说明,洛伦兹系统是一个非线性、非周期、三维的确定性连续动态系统。其动态方程可以表示为:
其中,x1(t),x2(t)和x3(t)是系统的状态,y(t)是系统的输出,x1(0),x2(0)和x3(0)设置为系统的初始状态,即t=0时刻的状态初始值。
考虑到洛伦兹系统是一个非线性系统,为便于后续进行数据处理,首先将洛伦兹系统转换为TS模糊模型,从而实现非线性到线性的转换,其中,TS模糊模型即Takagi-Sugeno模糊模型,该模型的主要思想是将非线性系统用许多线段相近的表示出来,即将复杂的非线性问题转化为在不同小线段上的问题。
具体的,设规则i:如果x1(t)属于模糊集Fi,那么可以得到:
其中,系统的状态向量为x(t)=[x1(t) x2(t)]T,模糊集为系数矩阵为C1=C2=[1 0 0]。因此,基于洛伦兹系统的TS模糊模型可以写为:
其中,ξ(t)=x1(t), 并且其满足μ1(ξ(t))+μ2(ξ(t))=1。定义原始图像数据中各行未加密的图像数据(即明文图像数据)为m(t),且在t时刻,是个常数,系统的输入矩阵为Bi。为了设计解密系统方便,方案共用矩阵B,且将明文图像数据m(t)分别注入基于洛伦兹系统的TS模糊模型的状态方程以及输出方程y(t)=Cx(t)中,得到洛伦兹流加密系统的数学模型:
可以理解的是,将明文图像数据m(t)直接注入状态方程中,这样的构造使得密钥流的产生极其依赖明文。也就是说,密钥流的产生不仅仅与系统初始值x(0)有关系,还与明文图像数据有关,从而使得流加密系统的安全性得到了提高,每一位洛伦兹流加密系统的结构均参照图9所示,明文图像数据m(t)经过乘法器,与输入矩阵B相乘,再与非线性函数f(x(t))相加,图9中用f(x(t))表示式(9)中的得到密钥流随时间的微分经过积分器,得到密钥流x(t)。得到密钥流x(t)之后,密钥流x(t)经过乘法器与输出矩阵C相乘,并与明文图像数据m(t)相加,得到了密文图像数据y(t),密文图像数据即某行明文图像数据经流加密系统加密后得到的图像数据。将每一行明文图像数据分别输入与其一一对应的如图9所示的洛伦兹流加密系统中进行加密操作,即可得到与每一行明文图像数据一一对应的密文图像数据。
在此基础上,本申请所提供的解密方案,也包括多位并联的流解密系统,每行明文图像数据对应的密文图像数据输入到一个流解密系统中进行解密操作,请参照图10,图10为本申请所提供的一种解密操作的步骤流程图,该解密操作包括:
S101:基于洛伦兹流加密系统构造的状态观测器观测密文图像数据对应的观测密钥流;
具体的,首先将洛伦兹流加密系统的状态方程转换成如下形式:
其中,明文图像数据m(t)利用输出方程替换掉,即 m(t)=y(t)-Cx(t),在此基础上构造状态观测器,状态观测器的数学模型为:
其中,为观测密钥流随时间的微分,为观测密钥流,y(t)为密文图像数据,B为输入矩阵,C为输出矩阵,Ai为系统矩阵,ξ(t)为前件变量,μi为关于ξ(t)的函数。
通过该状态观测器观测所在流解密系统接收到的密文图像数据对应的观测密钥流。
S102:判断观测密钥流是否满足解密条件,若是,执行S103;
S103:通过第一关系式得到解密后的明文图像数据,第一关系式为 为明文图像数据,y(t)为密文图像数据,C为输出矩阵,为观测密钥流。
在一些实施例中,判断观测密钥流是否满足解密条件的过程包括:
通过观测误差系统判断观测密钥流是否满足解密条件,观测误差系统的数学模型为
其中,为观测误差,为观测误差随时间的微分。
在一些实施例中,解密条件为观测误差随时间的微分趋近于0。
具体的,可以根据式(9)和式(11)构造观测误差系统,观测误差系统的数学模型为:
此处,为配合洛伦兹流加密系统,求解输入矩阵B,为了求解矩阵B,本申请利用共同Lyapunov函数方法,构造线性矩阵不等式如下:
其中,P为对称正定矩阵,Q=PB,γ为正常数。这里通过求解参数矩阵P,Q和正常数γ,然后利用等式关系B=P-1Q,求出输入矩阵B,在此基础上,即可得到单一通道的基于状态观测器的流解密系统,即:
具体的,一个流解密系统的结构示意图参照图11所示,参照上文,为与上文的图像加密方案相对应,本申请包括多位并联的流解密系统,并联的流解密系统的位数取决于洛伦兹流加密系统的位数,为便于理解,将基于状态观测器的流解密系统描述为:
其中,上角标j为流解密系统的当前位数。例如,当j=32时,式(15)表示为块解密系统的第32位流解密系统。基于状态观测器的块解密系统的结构示意图如图12所示。
可以理解的是,当所有流解密系统均完成解密操作后,根据所有流解密系统解密后的明文图像数据即可还原原始图像数据。
可见,本实施例中,首先基于并联的各位流解密系统对各自接收到的密文图像数据进行解密操作,实现并行解密,提高解密效率,基于洛伦兹流加密系统构造状态观测器,保证洛伦兹流加密系统和流解密系统密钥流的同步性,通过该状态观测器观测密文图像数据对应的观测密钥流,在观测密钥流满足解密条件,通过第一关系式获取明文图像数据,解密过程无需对密文图像数据进行微分处理,进一步提高解密效率。
在上述实施例的基础上:
在一些实施例中,该图像解密方法还包括:
获取解密秘钥;
通过第一关系式得到解密后的明文图像数据的过程包括:
通过解密秘钥和第一关系式得到解密后的明文图像数据。
在一些实施例中,解密秘钥为系统初始值。
具体的,基于洛伦兹系统的加密算法,基于洛伦兹系统的块解密秘钥选择为系统初始值和/或系统参数。由于块解密算法并联多位洛伦兹流解密模块,因此,系统初始值可以设置为,注需要注意的是,由于混沌系统对系统初值极其敏感,因此,块解密系统要根据块加密系统来严格输入秘钥,才能正确还原图像。
综上,本实施例首先基于并联的每一流解密系统对各自接收到的密文图像数据进行解密操作,实现并行解密,提高解密效率,基于洛伦兹流加密系统构造状态观测器,保证洛伦兹流加密系统和流解密系统密钥流的同步性,通过该状态观测器观测密文图像数据对应的观测密钥流,在观测密钥流满足解密条件,通过第一关系式获取明文图像数据,解密过程无需对密文图像数据进行微分处理,块解密算法只涉及微分方程运算和矩阵运算,并没有传统解密算法中的高次幂运算,所以解密速度更快,进一步提高解密效率。
请参照图13,图13为本申请所提供的一种图像解密系统的结构示意图,包括多位并联的流解密系统1,每一流解密系统1包括:
观测模块11,基于洛伦兹流加密系统构造的状态观测器观测密文图像数据对应的观测密钥流;
判断模块12,用于判断观测密钥流是否满足解密条件,若是,触发解密模块13;
解密模块13,用于通过第一关系式得到解密后的明文图像数据,第一关系式为 为明文图像数据,y(t)为密文图像数据,C为输出矩阵,为观测密钥流。
可见,本实施例中,首先基于并联的各位流解密系统1对各自接收到的密文图像数据进行解密操作,实现并行解密,提高解密效率,基于洛伦兹流加密系统构造状态观测器,保证洛伦兹流加密系统和流解密系统1密钥流的同步性,通过该状态观测器观测密文图像数据对应的观测密钥流,在观测密钥流满足解密条件,通过第一关系式获取明文图像数据,解密过程无需对密文图像数据进行微分处理,进一步提高解密效率。
在一些实施例中,洛伦兹流加密系统的数学模型为:
相应的,状态观测器的数学模型为:
其中,为观测密钥流随时间的微分,为观测密钥流,y(t)为密文图像数据,B为输入矩阵,C为输出矩阵,Ai为系统矩阵,ξ(t)为前件变量,μi为关于ξ(t)的函数。
在一些实施例中,判断观测密钥流是否满足解密条件的过程包括:
通过观测误差系统判断观测密钥流是否满足解密条件,观测误差系统的数学模型为
其中,为观测误差,为观测误差随时间的微分。
在一些实施例中,解密条件为观测误差随时间的微分趋近于0。
在一些实施例中,该图像解密系统还包括:
获取模块,用于获取解密秘钥;
通过第一关系式得到解密后的明文图像数据的过程包括:
通过解密秘钥和第一关系式得到解密后的明文图像数据。
在一些实施例中,解密秘钥为系统初始值。
在一些实施例中,该图像解密系统还包括:
还原模块2,用于根据所有流解密系统1解密后的明文图像数据还原原始图像数据。
请参照图14,本申请实施例还提供一种图像解密装置,该图像解密装置包括:
第一观测模块61,基于与接收到的密文图像数据对应的洛伦兹流加密系统构造的状态观测器观测所述密文图像数据对应的观测密钥流;
第一判断模块61,用于判断所述观测密钥流是否满足解密条件,若是,触发第一解密模块61;
所述第一解密模块61,用于通过第一关系式得到解密后的明文图像数据,所述第一关系式为 为所述明文图像数据,y(t)为所述密文图像数据,C为输出矩阵,为所述观测密钥流。
在一些实施例中,洛伦兹流加密系统的数学模型为:
相应的,状态观测器的数学模型为:
其中,为观测密钥流随时间的微分,为观测密钥流,y(t)为密文图像数据,B为输入矩阵,C为输出矩阵,Ai为系统矩阵,ξ(t)为前件变量,μi为关于ξ(t)的函数。
在一些实施例中,判断观测密钥流是否满足解密条件的过程包括:
通过观测误差系统判断观测密钥流是否满足解密条件,观测误差系统的数学模型为
其中,为观测误差,为观测误差随时间的微分。
在一些实施例中,解密条件为观测误差随时间的微分趋近于0。
在一些实施例中,图像解密装置还包括:
第一获取模块,用于获取解密秘钥;
通过第一关系式得到解密后的明文图像数据的过程包括:
通过解密秘钥和第一关系式得到解密后的明文图像数据。
在一些实施例中,解密秘钥为系统初始值。
另一方面,本申请还提供了一种电子设备,请参照图15,图15为本申请实施例所提供的一种电子设备的结构示意图,该电子设备包括:
存储器31,用于存储计算机程序;
处理器32,用于执行计算机程序时实现如上文任意一个实施例所描述的图像解密方法的步骤。
具体的,存储器31包括非易失性存储介质、内存储器31。该非易失性存储介质存储有操作系统和计算机可读指令,该内存储器31为非易失性存储介质中的操作系统和计算机可读指令的运行提供环境。处理器32执行存储器31中保存的计算机程序时,可以实现以下步骤:通过并联的各位流解密系统对各自接收到的密文图像数据执行解密操作,解密操作包括:基于洛伦兹流加密系统构造的状态观测器观测密文图像数据对应的观测密钥流;判断观测密钥流是否满足解密条件;若是,通过第一关系式得到解密后的明文图像数据,第一关系式为 为明文图像数据,y(t)为密文图像数据,C为输出矩阵,为观测密钥流。
可见,本实施例中,首先基于并联的各位流解密系统对各自接收到的密文图像数据进行解密操作,实现并行解密,提高解密效率,基于洛伦兹流加密系统构造状态观测器,保证洛伦兹流加密系统和流解密系统密钥流的同步性,通过该状态观测器观测密文图像数据对应的观测密钥流,在观测密钥流满足解密条件,通过第一关系式获取明文图像数据,解密过程无需对密文图像数据进行微分处理,进一步提高解密效率。
在一些实施例中,处理器32执行存储器31中保存的计算机子程序时,可以实现以下步骤:设置洛伦兹流加密系统的数学模型为:相应的,设置状态观测器的数学模型为其中,为观测密钥流随时间的微分,为观测密钥流,y(t)为密文图像数据,B为输入矩阵,C为输出矩阵,Ai为系统矩阵,ξ(t)为前件变量,μi为关于ξ(t)的函数。
在一些实施例中,处理器32执行存储器31中保存的计算机子程序时,可以实现以下步 骤:通过观测误差系统判断观测密钥流是否满足解密条件,观测误差系统的数学模型为其中,为观测误差,为观测误差随时间的微分。
在一些实施例中,处理器32执行存储器31中保存的计算机子程序时,可以实现以下步骤:当观测误差随时间的微分趋近于0,判定观测密钥流满足解密条件。
在一些实施例中,处理器32执行存储器31中保存的计算机子程序时,可以实现以下步骤:获取解密秘钥;通过解密秘钥和第一关系式得到解密后的明文图像数据,其中,解密秘钥为系统初始值。
在一些实施例中,处理器32执行存储器31中保存的计算机子程序时,可以实现以下步骤:根据所有流解密系统解密后的明文图像数据还原原始图像数据。
在上述实施例的基础上,在一些实施例中,参见图16,图16为本申请实施例提供的另一种电子设备的结构示意图,该电子设备还包括:
输入接口33,与处理器32相连,用于获取外部导入的计算机程序、参数和指令,经处理器32控制保存至存储器31中。该输入接口33可以与输入装置相连,接收用户手动输入的参数或指令。该输入装置可以是显示屏上覆盖的触摸层,也可以是终端外壳上设置的按键、轨迹球或触控板。
显示单元34,与处理器32相连,用于显示处理器32发送的数据。该显示单元34可以为液晶显示屏或者电子墨水显示屏等。
网络端口35,与处理器32相连,用于与外部各终端设备进行通信连接。该通信连接所采用的通信技术可以为有线通信技术或无线通信技术,如移动高清链接技术(MHL)、通用串行总线(USB)、高清多媒体接口(HDMI)、无线保真技术(WiFi)、蓝牙通信技术、低功耗蓝牙通信技术、基于IEEE802.11s的通信技术等。
另一方面,本申请还提供了一种非易失性计算机可读存储介质,如图17所示,非易失性计算机可读存储介质上存储有计算机程序,计算机程序被处理器执行时实现如上文任意一个实施例所描述的图像解密方法的步骤。
具体的,本申请还提供了一种非易失性计算机可读存储介质,该非易失性存储介质可以包括:U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。该非易失性存储介质上存储有计算机程序,计算机程序被处理器执行时实现以下步骤:通过并联的各位流解密系统对各自接收到的密文图像数据执行解密操作,解密操作包括:基于洛伦兹流加密系统构造的状态观测器观测密文图像数据对应的观测密钥流;判断观测密钥流是否满足解密条件;若是,通过第一关系式得到解密后的明文图像数据,第一关系式为 为明文图像数据,y(t)为密文图像数据,C为输出矩阵,为观测密钥流。
可见,本实施例中,首先基于并联的各位流解密系统对各自接收到的密文图像数据进行解密操作,实现并行解密,提高解密效率,基于洛伦兹流加密系统构造状态观测器,保证洛伦兹流加密系统和流解密系统密钥流的同步性,通过该状态观测器观测密文图像数据对应的观测密钥流,在观测密钥流满足解密条件,通过第一关系式获取明文图像数据,解密过程无需对密文图像数据进行微分处理,进一步提高解密效率。
在一些实施例中,非易失性计算机可读存储介质中存储的计算机子程序被处理器执行时,具体可以实现以下步骤:设置洛伦兹流加密系统的数学模型为:相应的,设置状态观测器的数学模型为其中,为观测密钥流随时间的微分,为观测密钥流,y(t)为密文图像数据,B为输入矩阵,C为输出矩阵,Ai为系统矩阵,ξ(t)为前件变量,μi为关于ξ(t)的函数。
在一些实施例中,非易失性计算机可读存储介质中存储的计算机子程序被处理器执行时,具体可以实现以下步骤:通过观测误差系统判断观测密钥流是否满足解密条件,观测误差系统的数学模型为其中,为观测误差,为观测误差随时间的微分。
在一些实施例中,非易失性计算机可读存储介质中存储的计算机子程序被处理器执行时,具体可以实现以下步骤:当观测误差随时间的微分趋近于0,判定观测密钥流满足解密条件。
在一些实施例中,非易失性计算机可读存储介质中存储的计算机子程序被处理器执行时,具体可以实现以下步骤:获取解密秘钥;通过解密秘钥和第一关系式得到解密后的明文图像数据,其中,解密秘钥为系统初始值。
在一些实施例中,非易失性计算机可读存储介质中存储的计算机子程序被处理器执行时,具体可以实现以下步骤:根据所有流解密系统解密后的明文图像数据还原原始图像数据。
考虑到图像数据的特点是数据量大,且相邻像素的相关性高,尤其针对多幅图像数据流,为提升对图像的加密速度,本申请采用并行加密方式,即同时对图像的每一行像素进行加密,块加密示意图参照图2所示。从数学的角度,图像可以看作一个高维的矩阵,我们将 图像的每一行(列)看作一个数据通道,然后对每一行都安排一个流加密系统。为便于理解本申请所提供的图像加密方案,对本申请图像加密方法所适用的块加密系统进行说明,对于图像,图像的每一行像素可以看成一位,为每一行像素都安排一位流加密(Stream cipher)系统,对这一行像素进行加密,基于此,块加密系统包括并联的多位流加密系统,本实施例所提供的图像加密方法由每一位流加密系统实现。流加密系统的位数可以根据原始图像数据大小确定,假设原始图像数据的大小为16×16,则可设置16位流加密系统,每一位流加密系统对应加密一行图像数据,这里的一行图像数据(包括这一行所有像素)即为未加密明文图像数据,下面以一位流加密系统执行图像加密方法的过程进行说明,其他流加密系统对其余行图像数据的加密过程,同理。
请参照图18,图18为本申请所提供的一种图像加密方法的步骤流程图,该图像加密方法包括:
S101:获取未加密明文图像数据;
可以理解的是,每一位流加密系统负责对原始图像数据中的一行图像数据进行加密,这里的一行未进行加密的图像数据即为未加密明文图像数据,可以理解的是,未加密明文图像数据包括该行所有像素,假设该位流加密系统对应图像的第一行,那么未加密明文图像数据包括该行所有像素35、19、25和6。
S102:将未加密明文图像数据注入洛伦兹混沌系统的状态方程,得到与未加密明文图像数据一一对应的密钥流;
S103:利用密钥流得到密文图像数据。
具体的,首先对实现图像加密操作的洛伦兹混沌系统进行说明,洛伦兹混沌系统是一个非线性、非周期、三维的确定性连续动态系统。其动态方程可以表示为:
其中,x1(t),x2(t)和x3(t)是系统的状态;y(t)是系统的输出;x1(0),x2(0)和x3(0)设置为系统的初始状态,即t=0时刻的状态初始值。
考虑到洛伦兹混沌系统是一个非线性系统,为便于后续进行数据处理,首先将洛伦兹混沌系统转换为TS模糊模型,从而实现非线性到线性的转换,其中,TS模糊模型即Takagi-Sugeno模糊模型,该模型的主要思想是将非线性系统用许多线段相近的表示出来,即将复杂的非线性问题转化为在不同小线段上的问题。
具体的,设规则i:如果x1(t)属于模糊集Fi,那么可以得到:
其中,系统的状态向量为x(t)=[x1(t) x2(t)]T,模糊集为系数矩阵为C1=C2=[1 0 0]。因此,基于洛伦兹混沌系统的TS模糊模型可以写为:
其中,ξ(t)=x1(t), 并且其满足μ1(ξ(t))+μ2(ξ(t))=1。
定义要加密的图像数据(未加密明文图像数据)为m(t),且在t时刻,m(t)是个常数,当需要对未加密明文图像数据进行加密时时,t时刻m(t)的取值范围为[0,255]。本申请将未加密明文图像数据m(t)注入基于洛伦兹混沌系统的TS模糊模型的状态方程中,系统输入矩阵记作Bi,得到基于洛伦兹的流加密系统的数学模型:
需要注意的是,本申请并没有将未加密明文图像数据m(t)直接注入流加密系统的输出方程y(t)=Cx(t)中。如果直接将m(t)注入输出方程,将会得到输入与输出,即明文与密文之间的对应关系y(t)=Cx(t)+m(t),而这样简单的对应关系会降低加密的安全性。另外,从上述流加密系统结构可以看出,将未加密明文图像数据m(t)直接注入到状态方程中,这样的构造使得密钥流x(t)的产生极其依赖明文。也就是说,密钥流的产生不仅仅与系统的初始值x(0)有关系,还与未加密明文图像数据m(t)有关,达到不同的未加密明文图像数据有不同的密钥流,从而有不同的密文,使得加密系统的安全性得到了提高。这里需要注意,在构造系统参数矩阵时,为了简化系统设计,本发明将所有子系统的输入输出矩阵统一,即所有子系统均共享输入矩阵B,共享输出矩阵C,在本申请一些实施例中,输入矩阵为列满秩矩阵,输出矩阵为非奇异矩阵。
参照上述内容,可以得到每一位基于洛伦兹的流加密系统的结构示意图参照图19所示,具体的,未加密明文图像数据m(t)经过芯片中的乘法器,与输入矩阵B相乘,再与封装的非线性函数f(x(t))相加,图19中,用f(x(t))表示式(19)中的得到密钥流随时间的微分经过积分电路,得到密钥流x(t),得到密钥流之后,x(t)经过乘法器与输出矩阵C相乘,得到了密文图像数据y(t),将每一行明文图像数据分别输入与其一一对应的如图3所示的基于洛伦兹的流加密系统中进行加密操作,即可得到对每一行明文图像数据加密后的、与其一一对应的密文图像数据。
进一步的,将N位基于洛伦兹的流加密系统并联。例如,当加密对象为8位图像,即像素值范围为0-255,图像的大小为16×16,N=16,那么此时可以并联16个基于洛伦兹的流加密系统,让图像的每一行数据依次利用相应的流加密系统进行加密,这样的流加密并行处理技术表现为一个16位的块加密方式。为便于理解,将基于洛伦兹的流加密系统描述为:
其中,上角标j为块加密的当前位数。例如,当j=32时,式(20)表示为块加密系统的第32位流加密系统。m1(t),m2(t)...mN(t)为N维未加密数据,将此数据并行通过Lorenz块加密模块,可以得到N维加密数据y1(t),y2(t)...yN(t)。理论上,系统可以将足够多的洛伦兹流加密系统并联在一起,来极大提升对目标图像的加密速度,基于洛伦兹的块加密系统的结构参照图20所示。
可以理解的是,基于洛伦兹混沌系统的块加密算法,秘钥选择为系统初始值以及系统参数。由于块加密算法并联多位洛伦兹流加密模块,因此,系统初始值可以设置为x(0)=[x1(0) x2(0) ... xN(0)]。
可见,本实施例中,通过并联的多位流加密系统对原始图像数据中的各行图像数据同时进行加密,提高了加密速度,扩展了秘钥空间,增强了加密系统的鲁棒性,由于密钥流的生成依赖于未加密明文图像数据,使得不同的未加密明文图像数据对应不同的密钥流,从而生成不同的密文图像数据,使得加密安全性更高。
进一步的,本申请还针对上文的图像加密方案,基于系统逆的概念,提供了一种图像解密算法,洛伦兹块解密示意图参照图21所示。相应的,块解密系统中,设于与流加密系统同样位数的流解密系统,通过流解密系统对每一行由上文图像加密方法加密后的密文图像数据进行解密。
具体的,通过并联的每一流解密系统执行以下操作:
获取通过上文任意一项的图像加密方法加密后的密文图像数据;
基于洛伦兹解密系统对密文图像数据进行解密操作,得到解密后明文图像数据;
洛伦兹解密系统的数学模型为:
其中,为解密后明文图像数据,y(t)为密文图像数据,为密文图像数据的一阶导数,B为输入矩阵,C为输出矩阵,Ai为系统矩阵,ξ(t)为前件变量,μi为关于ξ(t)的函数。
具体的,首先设定矩阵参数,参照上文,设定输入矩阵B为列满秩矩阵,输出矩阵C为非奇异矩阵,且CB也为列满秩,这是系统可逆的充分条件。由于矩阵B和C是预设的,所以可行矩阵很容易选择。
然后构造基于逆映射的流解密系统,考虑到矩阵C为非奇异,根据上文流加密系统的输出方程y(t)=Cx(t),可以求得:
x(t)=C-1y(t)    (21);
对输出方程两边同时进行微分,得到:
因为CB列满秩,因此CB的左伪逆存在,记作把x(t)=C-1y(t)代入式(21),从而解出明文图像数据为:
从上式(23)可以看出,基于逆映射的流解密系统解密得到明文仅仅依赖于密文y(t)以及它的一阶导数那么,基于逆映射的流解密系统可以定义为:
基于逆映射的流解密系统的结构示意图参照图22所示,进一步的,构造基于逆映射的块解密系统,针对基于洛伦兹的块加密系统,其对应的基于逆映射的块解密系统可以将多位流解密系统进行并联,每位流解密系统的结构一致,但是输入输出数据以及秘钥不同,其流程图如图23所示,图23中,输入信号为加密图像的所有行,将所有行数据同时通过块解密系统,可以得到原始图像的所有行数据,这些数据可以组成并还原原始图像数据。
进一步的,根据式(21)和(23),可以知道加密系统是平坦的。从而得到本申请提出Lorenz块加密方案等价于一个传统的自同步流加密方案。
可见,本实施例中,对上述图像加密方法加密后的密文图像数据进行解密,解密过程仅依赖于密文图像数据,以及密文图像数据的一阶导数,提高了解密效率,通过各位流解密系统的解密后明文图像数据即可还原原始图像数据。
综上,本申请提出了一种基于洛伦兹混沌系统的块加解密方案,方案首先去掉了流加密系统输出方程中的直通部分,减少了明文与密文的直接关联性;其次,将多位流加密模块进行并联设计,得到了如下优势:第一,提高了针对图像的加密速度;第二,极大拓展了秘钥空间;第三,增强了加密系统的鲁棒性;第四,密钥流依赖于要加密的图像,使得不同的图像有不同的密钥流;第五,位数选择具有灵活性。然后,本申请利用逆映射的手段,给出了系统可逆的条件,然后构造了流解密系统,针对单一通道密文进行解密。最后针对洛伦兹块加密系统,本申请并联N位流解密系统,直接对多通道密文进行同时解密。最后,利用控制系统平坦性概念,给出了所提出加密系统安全性的理论保证。
另一方面,本申请还提供了一种图像处理装置,如图24所示,该图像处理装置包括:
存储器2401,用于存储计算机程序;
处理器2402,用于执行计算机程序时实现如上文任意一个实施例所描述的图像加密方法的步骤和/或如上文任意一个实施例所描述的图像解密方法的步骤。
具体的,存储器包括非易失性存储介质、内存储器。该非易失性存储介质存储有操作系统和计算机可读指令,该内存储器为非易失性存储介质中的操作系统和计算机可读指令的运行提供环境。处理器执行存储器中保存的计算机程序时,可以实现以下步骤:获取未加密明文图像数据;将未加密明文图像数据注入洛伦兹混沌系统的状态方程,得到与未加密明文图像数据一一对应的密钥流;利用密钥流得到密文图像数据。和/或,处理器执行存储器中保存的计算机程序时,可以实现以下步骤:通过并联的每一流解密系统执行以下操作:获取通过上文任意一项的图像加密方法加密后的密文图像数据;基于洛伦兹解密系统对密文图像数据进行解密操作,得到解密后明文图像数据;洛伦兹解密系统的数学模型为:
其中,为解密后明文图像数据,y(t)为密文图像数据,为密文图像数据的一阶导数,B为输入矩阵,C为输出矩阵,Ai为系统矩阵,ξ(t)为前件变量,μi为关于ξ(t)的函数。
可见,本实施例中,通过并联的多位流加密系统对原始图像数据中的各行图像数据同时进行加密,提高了加密速度,扩展了秘钥空间,增强了加密系统的鲁棒性,由于密钥流的生成依赖于未加密明文图像数据,使得不同的未加密明文图像数据对应不同的密钥流,从而生成不同的密文图像数据,使得加密安全性更高。对上述图像加密方法加密后的密文图像数据进行解密,解密过程仅依赖于密文图像数据,以及密文图像数据的一阶导数,提高了解密效率,通过各位流解密系统的解密后明文图像数据即可还原原始图像数据。
在本申请一些实施例中,处理器执行存储器中保存的计算机子程序时,可以实现以下步骤:对洛伦兹混沌系统进行TS模糊模型转换得到洛伦兹混沌系统,转换后的洛伦兹混沌系统的数学模型:其中,为密钥流随时间的微分,y(t)为密文图像数据,C为输出矩阵,x(t)为密钥流,Ai为系统矩阵,ξ(t)为前件变 量,μi为关于ξ(t)的函数。
在本申请一些实施例中,处理器执行存储器中保存的计算机子程序时,可以实现以下步骤:通过所有流解密系统得到的解密后明文图像数据还原原始图像数据。
在上述实施例的基础上,在一些实施例中,该图像处理装置还包括:
输入接口,与处理器相连,用于获取外部导入的计算机程序、参数和指令,经处理器控制保存至存储器中。该输入接口可以与输入装置相连,接收用户手动输入的参数或指令。该输入装置可以是显示屏上覆盖的触摸层,也可以是终端外壳上设置的按键、轨迹球或触控板。
显示单元,与处理器相连,用于显示处理器发送的数据。该显示单元可以为液晶显示屏或者电子墨水显示屏等。
网络端口,与处理器相连,用于与外部各终端设备进行通信连接。该通信连接所采用的通信技术可以为有线通信技术或无线通信技术,如移动高清链接技术(MHL)、通用串行总线(USB)、高清多媒体接口(HDMI)、无线保真技术(WiFi)、蓝牙通信技术、低功耗蓝牙通信技术、基于IEEE802.11s的通信技术等。
另一方面,本申请还提供了一种非易失性计算机可读存储介质,如图25所示,非易失性计算机可读存储介质25上存储有计算机程序251,计算机程序被处理器执行时实现如上文任意一个实施例所描述的图像加密方法的步骤和/或如上文任意一个实施例所描述的图像解密方法的步骤。
本申请还提供了一种存储介质,该存储介质可以包括:U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。该存储介质上存储有计算机程序,计算机程序被处理器执行时实现以下步骤:获取未加密明文图像数据;将未加密明文图像数据注入洛伦兹混沌系统的状态方程,得到与未加密明文图像数据一一对应的密钥流;利用密钥流得到密文图像数据。和/或,该存储介质上存储有计算机程序,计算机程序被处理器执行时实现以下步骤:通过并联的每一流解密系统执行以下操作:获取通过上文任意一项的图像加密方法加密后的密文图像数据;基于洛伦兹解密系统对密文图像数据进行解密操作,得到解密后明文图像数据;洛伦兹解密系统的数学模型为:其中,为解密后明文图像数据,y(t)为密文图像数据,为密文图像数据的一阶导数,B为输入矩阵,C为输出矩阵,Ai为系统矩阵,ξ(t)为前件变量,μi为关于ξ(t)的函数。
可见,本实施例中,通过并联的多位流加密系统对原始图像数据中的各行图像数据同时 进行加密,提高了加密速度,扩展了秘钥空间,增强了加密系统的鲁棒性,由于密钥流的生成依赖于未加密明文图像数据,使得不同的未加密明文图像数据对应不同的密钥流,从而生成不同的密文图像数据,使得加密安全性更高。对上述图像加密方法加密后的密文图像数据进行解密,解密过程仅依赖于密文图像数据,以及密文图像数据的一阶导数,提高了解密效率,通过各位流解密系统的解密后明文图像数据即可还原原始图像数据。
在本申请一些实施例中,处理器执行存储器中保存的计算机子程序时,可以实现以下步骤:对洛伦兹混沌系统进行TS模糊模型转换得到洛伦兹混沌系统,转换后的洛伦兹混沌系统的数学模型:其中,为密钥流随时间的微分,y(t)为密文图像数据,C为输出矩阵,x(t)为密钥流,Ai为系统矩阵,ξ(t)为前件变量,μi为关于ξ(t)的函数。
在本申请一些实施例中,处理器执行存储器中保存的计算机子程序时,可以实现以下步骤:通过所有流解密系统得到的解密后明文图像数据还原原始图像数据。
还需要说明的是,在本说明书中,诸如第一和第二等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。而且,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。在没有更多限制的状况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、物品或者设备中还存在另外的相同要素。
对所公开的实施例的上述说明,使本领域专业技术人员能够实现或使用本申请。对这些实施例的多种修改对本领域的专业技术人员来说将是显而易见的,本文中所定义的一般原理可以在不脱离本申请的精神或范围的情况下,在其他实施例中实现。因此,本申请将不会被限制于本文所示的这些实施例,而是要符合与本文所公开的原理和新颖特点相一致的最宽的范围

Claims (34)

  1. 一种图像加密方法,其特征在于,该图像加密方法包括:
    确定原始明文图像数据中分配给各位流加密系统的未加密明文图像数据,各位所述流加密系统并联;
    通过每一所述流加密系统对其接收到的所述未加密明文图像数据执行加密操作,所述加密操作包括:
    将所述未加密明文图像数据注入洛伦兹混沌系统的状态方程,得到与所述未加密明文图像数据一一对应的密钥流,基于所述密钥流和所述未加密明文图像数据得到密文图像数据。
  2. 根据权利要求1所述的图像加密方法,其特征在于,所述确定原始明文图像数据中分配给各位流加密系统的未加密明文图像数据的过程包括:
    根据所述流加密系统的位数及所述原始明文图像数据的总行数,确定原始明文图像数据中分配给各位流加密系统的未加密明文图像数据。
  3. 根据权利要求2所述的图像加密方法,其特征在于,所述根据所述流加密系统的位数及所述原始明文图像数据的总行数,确定原始明文图像数据中分配给各位流加密系统的未加密明文图像数据,包括:
    根据流加密系统的位数及原始明文图像数据的总行数,确定对原始明文图像数据的划分方式,以确定分配给各位流加密系统的未加密明文图像数据。
  4. 根据权利要求1所述的图像加密方法,其特征在于,所述洛伦兹混沌系统为通过TS模糊模型转换后的洛伦兹混沌系统。
  5. 根据权利要求4所述的图像加密方法,其特征在于,所述洛伦兹混沌系统的数学模型为:

    y(t)=Cx(t);
    其中,为密钥流随时间的微分,y(t)为所述密文图像数据,C为输出矩阵,x(t)为所述密钥流,Ai为系统矩阵,ξ(t)为前件变量,μi为关于ξ(t)的函数。
  6. 根据权利要求1-5任意一项所述的图像加密方法,其特征在于,所述将所述未加密明文图像数据注入洛伦兹混沌系统的状态方程,得到与所述未加密明文图像数据一一对应的密钥流的过程包括:
    获取秘钥;
    将所述未加密明文图像数据注入洛伦兹混沌系统的状态方程,通过所述秘钥得到与所述未加密明文图像数据一一对应的密钥流。
  7. 根据权利要求6所述的图像加密方法,其特征在于,所述秘钥为系统初始值。
  8. 根据权利要求6所述的图像加密方法,其特征在于,所述将所述未加密明文图像 数据注入洛伦兹混沌系统的状态方程,包括:
    将未加密明文图像数据m(t)分别注入洛伦兹混沌系统的状态方程以及输出方程y(t)=Cx(t)中,得到:

    y(t)=Cx(t)+m(t);
    其中,Bi为输入矩阵,为密钥流随时间的微分,y(t)为所述密文图像数据,C为输出矩阵,x(t)为所述密钥流,Ai为系统矩阵,ξ(t)为前件变量,μi为关于ξ(t)的函数。
  9. 根据权利要求8所述的图像加密方法,其特征在于,所述输入矩阵为列满秩矩阵,所述输出矩阵为非奇异矩阵。
  10. 根据权利要求1所述的图像加密方法,其特征在于,所述确定原始明文图像数据中分配给各位流加密系统的未加密明文图像数据,包括:
    对所述原始明文图像数据进行拆分,
    按照拆分结果,将对应的未加密明文图像数据分配给对应的流加密系统。
  11. 根据权利要求1所述的图像加密方法,其特征在于,所述未加密明文图像数据为未加密的原始图像数据中的一行图像数据,包括该行未加密的所有像素;所述密文图像数据为经流加密系统加密后的一行图像数据,包括该行解密后的所有像素。
  12. 根据权利要求1所述的图像加密方法,其特征在于,所述基于所述密钥流和所述未加密明文图像数据得到密文图像数据,包括:
    所述密钥流经过乘法器与输出矩阵相乘,并与所述未加密明文图像数据相加,得到所述密文图像数据。
  13. 根据权利要求1所述的图像加密方法,其特征在于,所述方法还包括:
    将基于洛伦兹的流加密系统按固定位数进行并联。
  14. 根据权利要求1-13任意一项所述的图像加密方法,其特征在于,并联的流加密系统的位数根据原始图像数据大小确定。
  15. 根据权利要求12所述的图像加密方法,其特征在于,所述基于洛伦兹的流加密系统描述为:

    yj(t)=Cxj(t)+mj(t);
    其中,j为块加密的当前位数,Bi为输入矩阵,为密钥流随时间的微分,y(t)为所述密文图像数据,C为输出矩阵,x(t)为所述密钥流,Ai为系统矩阵,ξ(t)为前件变量,μi为关于ξ(t)的函数。
  16. 一种图像加密系统,其特征在于,该图像加密系统包括:
    确定模块,用于确定原始明文图像数据中分配给各位流加密系统的未加密明文图像数据,各位所述流加密系统并联;
    加密模块,用于通过每一所述流加密系统对其接收到的所述未加密明文图像数据执行加密操作,所述加密操作包括:
    将所述未加密明文图像数据注入洛伦兹混沌系统的状态方程,得到与所述未加密明文图像数据一一对应的密钥流,基于所述密钥流和所述未加密明文图像数据得到密文图像数据。
  17. 一种图像解密方法,其特征在于,该图像解密方法包括:
    通过并联的每一流解密系统执行以下操作:
    获取通过权利要求1-15任意一项所述的图像加密方法加密后的密文图像数据;
    基于洛伦兹解密系统对所述密文图像数据进行解密操作,得到解密后明文图像数据;
    所述洛伦兹解密系统的数学模型为:

    其中,为所述解密后明文图像数据,y(t)为所述密文图像数据,为所述密文图像数据的一阶导数,B为输入矩阵,C为输出矩阵,Ai为系统矩阵,ξ(t)为前件变量,μi为关于ξ(t)的函数。
  18. 根据权利要求19所述的图像解密方法,其特征在于,并联的流解密系统的位数根据流加密系统的位数确定。
  19. 根据权利要求19或20所述的图像解密方法,其特征在于,该图像解密方法还包括:
    通过所有所述流解密系统得到的解密后明文图像数据还原原始图像数据。
  20. 一种图像处理装置,其特征在于,包括:
    存储器,用于存储计算机程序;
    处理器,用于执行所述计算机程序时实现如权利要求1-15任意一项所述的图像加密方 法的步骤和/或如权利要求17-19任意一项所述的图像解密方法的步骤。
  21. 一种存储介质,其特征在于,所述存储介质上存储有计算机程序,所述计算机程序被处理器执行时实现如权利要求1-15任意一项所述的图像加密方法的步骤和/或如权利要求17-19任意一项所述的图像解密方法的步骤。
  22. 一种图像解密方法,其特征在于,包括:
    通过并联的各位流解密系统对各自接收到的密文图像数据执行解密操作,所述解密操作包括:
    基于与所述密文图像数据对应的洛伦兹流加密系统构造的状态观测器观测所述密文图像数据对应的观测密钥流;
    判断所述观测密钥流是否满足解密条件;
    若是,通过第一关系式得到解密后的明文图像数据,所述第一关系式为为所述明文图像数据,y(t)为所述密文图像数据,C为输出矩阵,为所述观测密钥流。
  23. 根据权利要求21所述的图像解密方法,其特征在于,所述洛伦兹流加密系统的数学模型为:
    相应的,所述状态观测器的数学模型为:
    其中,为所述观测密钥流随时间的微分,为所述观测密钥流,y(t)为所述密文图像数据,B为输入矩阵,C为输出矩阵,Ai为系统矩阵,ξ(t)为前件变量,μi为关于ξ(t)的函数。
  24. 根据权利要求22所述的图像解密方法,其特征在于,所述判断所述观测密钥流是否满足解密条件的过程包括:
    通过观测误差系统判断所述观测密钥流是否满足解密条件,所述观测误差系统的数学模型为
    其中,为观测误差,为所述观测误差随时间的微分。
  25. 根据权利要求24所述的图像解密方法,其特征在于,所述解密条件为所述观测误差随时间的微分趋近于0。
  26. 根据权利要求21所述的图像解密方法,其特征在于,该图像解密方法还包括:
    获取解密秘钥;
    所述通过第一关系式得到解密后的明文图像数据的过程包括:
    通过所述解密秘钥和第一关系式得到解密后的明文图像数据。
  27. 根据权利要求26所述的图像解密方法,其特征在于,所述解密秘钥为系统初始值。
  28. 根据权利要求26所述的图像解密方法,其特征在于,所述获取解密秘钥,包括:
    基于洛伦兹系统的加密算法,基于洛伦兹系统的块解密秘钥选择为系统初始值和/或系统参数。
  29. 根据权利要求21所述的图像解密方法,其特征在于,在所述通过并联的各位流解密系统对各自接收到的密文图像数据执行解密操作之前,还包括:
    根据流加密系统的位数确定并联的流解密系统的位数。
  30. 根据权利要求21所述的图像解密方法,其特征在于,所述通过并联的各位流解密系统对各自接收到的密文图像数据执行解密操作,包括:
    通过并联的各位流解密系统对各自接收到的密文图像数据并行执行解密操作。
  31. 根据权利要求21-30任意一项所述的图像解密方法,其特征在于,该图像解密方法还包括:
    根据所有所述流解密系统解密后的明文图像数据还原原始图像数据。
  32. 一种图像解密系统,其特征在于,包括多位并联的流解密系统,每一所述流解密系统包括:
    观测模块,基于与接收到的密文图像数据对应的洛伦兹流加密系统构造的状态观测器观测所述密文图像数据对应的观测密钥流;
    判断模块,用于判断所述观测密钥流是否满足解密条件,若是,触发解密模块;
    所述解密模块,用于通过第一关系式得到解密后的明文图像数据,所述第一关系式为为所述明文图像数据,y(t)为所述密文图像数据,C为输出矩阵,为所述观测密钥流。
  33. 一种电子设备,其特征在于,包括:
    存储器,用于存储计算机程序;
    处理器,用于执行所述计算机程序时实现如权利要求22-31任意一项所述的图像解密方法的步骤。
  34. 一种非易失性计算机可读存储介质,其特征在于,所述非易失性计算机可读存储介质上存储有计算机程序,所述计算机程序被处理器执行时实现如权利要求22-31任意一项所述的图像解密方法的步骤。
PCT/CN2023/080613 2022-03-10 2023-03-09 图像加密方法、图像解密方法、图像处理装置及存储介质 WO2023169532A1 (zh)

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
CN202210228351.2 2022-03-10
CN202210228351.2A CN114338022B (zh) 2022-03-10 2022-03-10 一种图像加密方法、系统、装置及计算机可读存储介质
CN202210228387.0 2022-03-10
CN202210228353.1 2022-03-10
CN202210228353.1A CN114338023B (zh) 2022-03-10 2022-03-10 图像加密方法、图像解密方法、图像处理装置及存储介质
CN202210228387.0A CN114338024B (zh) 2022-03-10 2022-03-10 一种图像解密方法、系统、装置及计算机可读存储介质

Publications (1)

Publication Number Publication Date
WO2023169532A1 true WO2023169532A1 (zh) 2023-09-14

Family

ID=87936108

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/080613 WO2023169532A1 (zh) 2022-03-10 2023-03-09 图像加密方法、图像解密方法、图像处理装置及存储介质

Country Status (1)

Country Link
WO (1) WO2023169532A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117793267A (zh) * 2024-02-23 2024-03-29 山东交通学院 一种乘务数据的隐私保护方法及系统

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040202326A1 (en) * 2003-04-10 2004-10-14 Guanrong Chen System and methods for real-time encryption of digital images based on 2D and 3D multi-parametric chaotic maps
CN112636895A (zh) * 2020-09-07 2021-04-09 长沙理工大学 一种图像加密解密方法和图像加密解密系统
CN114338024A (zh) * 2022-03-10 2022-04-12 山东云海国创云计算装备产业创新中心有限公司 一种图像解密方法、系统、装置及计算机可读存储介质
CN114338023A (zh) * 2022-03-10 2022-04-12 山东云海国创云计算装备产业创新中心有限公司 图像加密方法、图像解密方法、图像处理装置及存储介质
CN114338022A (zh) * 2022-03-10 2022-04-12 山东云海国创云计算装备产业创新中心有限公司 一种图像加密方法、系统、装置及计算机可读存储介质

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040202326A1 (en) * 2003-04-10 2004-10-14 Guanrong Chen System and methods for real-time encryption of digital images based on 2D and 3D multi-parametric chaotic maps
CN112636895A (zh) * 2020-09-07 2021-04-09 长沙理工大学 一种图像加密解密方法和图像加密解密系统
CN114338024A (zh) * 2022-03-10 2022-04-12 山东云海国创云计算装备产业创新中心有限公司 一种图像解密方法、系统、装置及计算机可读存储介质
CN114338023A (zh) * 2022-03-10 2022-04-12 山东云海国创云计算装备产业创新中心有限公司 图像加密方法、图像解密方法、图像处理装置及存储介质
CN114338022A (zh) * 2022-03-10 2022-04-12 山东云海国创云计算装备产业创新中心有限公司 一种图像加密方法、系统、装置及计算机可读存储介质

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117793267A (zh) * 2024-02-23 2024-03-29 山东交通学院 一种乘务数据的隐私保护方法及系统

Similar Documents

Publication Publication Date Title
CN110557245B (zh) 用于spdz的容错和安全多方计算的方法和系统
EP3676986B1 (en) Single node multi-party encryption
CN114338022B (zh) 一种图像加密方法、系统、装置及计算机可读存储介质
US20030046561A1 (en) Non-algebraic cryptographic architecture
CN107770405A (zh) 图像加密方法及装置
WO2022121623A1 (zh) 一种数据集合求交方法及装置
US10148427B2 (en) Information processing apparatus, method for processing information, and medium
WO2023169532A1 (zh) 图像加密方法、图像解密方法、图像处理装置及存储介质
CN114065252A (zh) 一种带条件检索的隐私集合求交方法、装置及计算机设备
CA3006700C (en) Systems and methods for facilitating data encryption and decryption and erasing of associated information
WO2023138265A1 (zh) 一种数据加解密方法、系统、设备及计算机可读存储介质
CN112865957A (zh) 数据加密传输方法、装置、计算机目标设备和存储介质
CN113098675B (zh) 基于多项式完全同态的二进制数据加密系统及方法
CN103260156A (zh) 密钥流生成装置及方法、机密性保护装置及方法
CN114338023B (zh) 图像加密方法、图像解密方法、图像处理装置及存储介质
CN114338024B (zh) 一种图像解密方法、系统、装置及计算机可读存储介质
CN113591117A (zh) 社交平台日常对话加密方法、系统、存储介质及计算设备
CN103902932B (zh) 根据支持usb型存储设备的数据加解密的装置进行加密的方法
CN116980194A (zh) 一种基于云边端协同的安全高效数据传输方法及其系统
CN106452726B (zh) 一种s盒及其构造方法
Salim et al. FPGA implementation of hiding information using cryptography
TWI552563B (zh) 時間擾動混沌映射加密解密系統與方法
CA2988628C (en) Methods and computer program products for encryption key generation and management
CN116015620B (zh) 一种卫星影像数据加密和解密方法和系统
Zheng et al. A Systematic Methodology for Multi‐Images Encryption and Decryption Based on Single Chaotic System and FPGA Embedded Implementation

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23766109

Country of ref document: EP

Kind code of ref document: A1