CN102196320A - Image encrypting and decrypting system - Google Patents

Image encrypting and decrypting system Download PDF

Info

Publication number
CN102196320A
CN102196320A CN 201110095616 CN201110095616A CN102196320A CN 102196320 A CN102196320 A CN 102196320A CN 201110095616 CN201110095616 CN 201110095616 CN 201110095616 A CN201110095616 A CN 201110095616A CN 102196320 A CN102196320 A CN 102196320A
Authority
CN
China
Prior art keywords
image
watermark
encryption
initial condition
condition value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 201110095616
Other languages
Chinese (zh)
Other versions
CN102196320B (en
Inventor
李金祥
顾才东
陈珂
牛丽
杨元峰
熊志勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Modern Enterprise Informatization Application And Support Software Engineering Technology Research And Development Center
Original Assignee
Jiangsu Modern Enterprise Informatization Application And Support Software Engineering Technology Research And Development Center
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Modern Enterprise Informatization Application And Support Software Engineering Technology Research And Development Center filed Critical Jiangsu Modern Enterprise Informatization Application And Support Software Engineering Technology Research And Development Center
Priority to CN 201110095616 priority Critical patent/CN102196320B/en
Publication of CN102196320A publication Critical patent/CN102196320A/en
Application granted granted Critical
Publication of CN102196320B publication Critical patent/CN102196320B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Facsimile Transmission Control (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The invention discloses an image encrypting and decrypting system comprising an input/output interface unit, a pseudo random number generator, an encrypting /decrypting unit, a watermark embedding unit and a watermark detecting unit, wherein the input/output interface unit is used for inputting image files and initial condition values which need to be encrypted/decrypted and outputting the encrypted/decrypted image files; the pseudo random number generator is used for generating a binary system random number sequence according to the input initial condition values; and the watermark detecting unit is used for detecting the images with watermark embedded and comprises a watermarked image DCT(Discrete Cosine Transform) coefficient selecting module and a watermark judging module. The image encrypting and decrypting system has the characteristics of simpleness and easiness in realization, can achieve an ideal encrypting effect and can nearly be restored after being decrypted.

Description

A kind of image encrypting and decrypting system
Technical field
The present invention relates to computer data encryption and decryption technology field, particularly, relate to a kind of image encrypting and decrypting system and method.
Background technology
The safety of digital picture is one of focus of studying in the information security field in recent years.Image encryption is the digital image security technology that proposes from different angles with image concealing, and image encryption technology and image concealing technology are organically combined, and just can further improve the fail safe of information.Wherein the digital image encryption technology not only can be protected view data effectively, but also can be used as the preliminary treatment and the reprocessing of image concealing technology.Therefore, the image encryption technology has very important realistic meaning.
The tradition cryptology mainly is to provide algorithm preferably to one-dimensional data stream, and image information is also lacked enough methods, because view data has and original different characteristics of enciphered data that need, as big, the two-dimentional self-similarity of data volume and correlation etc., therefore how image effectively being encrypted, is the new problem that runs in traditional cryptology research.
Summary of the invention
The objective of the invention is to overcome defective of the prior art, a kind of image encrypting and decrypting system and method are provided, the characteristics that it has simply, realizes easily can reach desirable cipher round results, also can almost reduce after the deciphering.
A kind of image encrypting and decrypting system for realizing that the object of the invention provides comprises pseudorandom number generator, encryption/decryption element, wherein:
Described pseudorandom number generator is used for the real number value random number sequence according to the initial condition value generation of input, and described real number value random number sequence intercepting is converted to binary sequence and integer value sequence;
Described encryption/decryption element is used for the image file of input is encrypted or is decrypted.
More preferably, described image encrypting and decrypting system also comprises the input/output interface unit, is used to import the image file and the initial condition value that need encrypt/decrypt, the image file behind the output encrypt/decrypt.
More preferably, described encryption/decryption element comprises ciphering unit and decrypting device, wherein:
Described ciphering unit, the binary sequence that is used to utilize pseudorandom number generator to produce is realized the RGB or the gray value conversion of image pixel by key xor operation in the Rijndael algorithm, finishes substituting of image pixel by the conversion of S-box then; The integer value sequence of utilizing pseudorandom number generator to generate again realizes the ranks replacement operator of image pixel, and the encryption of κ wheel is carried out in circulation, finally realizes image encryption;
Described decrypting device is the anti-order unit of the ciphering process of ciphering unit, the binary sequence that is used to utilize pseudorandom number generator to produce, and the key XOR is carried out in the inverse operation of encrypting then, and terminal realizes the image deciphering.
More preferably, described ciphering unit comprises the varitron unit, substitutes subelement and displacement subelement, wherein:
Described varitron unit is used to adopt the round key xor operation to realize the RGB or the greyscale transformation of image pixel;
Described alternative subelement is used to adopt the conversion of S-box to finish substituting of image pixel;
Described displacement subelement is used to adopt line replacement and column permutation to finish the displacement of image pixel.
For realizing that the object of the invention also provides a kind of image encryption method, comprise the following steps:
Step S100, input needs the image file of encryption, and the initial condition value of input encryption;
Step S200, the real number value random number sequence that generates according to the initial condition value of input/output interface unit input, and described real number value random number sequence intercepting is converted to binary sequence and integer value sequence;
Step S300, the binary sequence that utilizes pseudorandom number generator to produce by the RGB or the gray value conversion of key xor operation realization image pixel in the Rijndael algorithm, is finished substituting of image pixel by the conversion of S-box then; The integer value sequence of utilizing pseudorandom number generator to generate again realizes the ranks replacement operator of image pixel, and the encryption of N wheel is carried out in circulation, finally realizes image encryption.
The initial condition value that described input is encrypted comprises:
The encryption iterative initial value X of key sequence 0, encryption system parameter lambda, encryption parameter L, encryption parameter κ; The encryption iterative initial value X ' of integer sequence 0, the encryption system parameter lambda ', encryption parameter L ' and encryption parameter κ ';
Wherein, X 0Encryption iterative initial value for the key sequence of pseudorandom number generator; X ' 0Encryption iterative initial value for integer sequence;
λ, λ ' are the encryption system parameter of pseudorandom number generator, 3.569 945 6...<λ, λ '≤4;
L, L ' are for encrypting the intercepting value, the real-valued random number sequence { X of expression intercepting n, n=0,1,2, the real-valued X of each among the K} nPreceding L, L ' bit;
κ, κ ' are encryption parameters; When real-valued random number sequence is converted into the binary system random number sequence, specifies and get real-valued random number sequence { X n, n=0,1,2, X among the K} nκ, κ ' bit form the binary keys sequence.
More preferably, described step S300 comprises the following steps:
Step S310 is with the binary number key sequence K of pseudorandom number generator generation t(t=0,1 ..., (M * N * 8)-1) carry out cipher key spreading as seed key, key w[] [N * 8] deposit, top M behavior seed key is used for the first round when encrypting and the pixel XOR of image to be encrypted; Take turns encryption from second and bring into use round key, the round key of r wheel is capable of M * (r+1)-1 row provides by the M among the w * r;
The preceding M of w is capable to be seed key;
Each row of back is determined by recursive fashion by previous row: if i is not the multiple of M, then i is capable is the capable and capable XOR by turn of i-1 of i-M; Otherwise i is capable to be that i-M is capable and the XOR by turn of the nonlinear function that i-1 is capable;
Step S320 takes out w[in order] the capable key of M in [N * 8], by the pixel a in byte and the image to be encrypted Ij(i=0,1 ..., M-1, j=0,1 ..., N-1) three component XORs of the RGB in obtain new pixel b Ij((i=0,1 ..., M-1, j=0,1 ..., N-1);
Step S330 utilizes look-up table to carry out the conversion of S-box; With b IjIn three components of RGB make replacement operation respectively, promptly preceding 4 as S-box row coordinate, back 4 as S-box row-coordinate, replace b with the value at S-box ranks coordinate place IjIn three components of RGB obtain new pixel value c Ij((i=0,1 ..., M-1, j=0,1 ..., N-1);
Step S340, with pseudorandom number generator according to encrypting iterative initial value X ' 0, the encryption system parameter lambda ', the integer value random number sequence PP of encryption parameter L ' and deciphering parameter κ ' generation t(t=0,1 ..., M-1, M ..., M+N-1) carry out horizontal and vertical mobile figure place as image pixel, carry out the ranks displacement of pixel;
Every capable pixel c with image IjRing shift left PP successively t(t=0,1 ..., M-1) individual evolution is to the another location of this row;
Step S350 is with every row pixel c of image IjMobile PP successively circulates downwards t(t=M ..., M+N-1) individual evolution is to the another location of these row;
Step S360 returns step S320, carries out next round and encrypts, and up to finishing the N wheel, obtains encrypted image.
For realizing that the object of the invention also provides a kind of image decryption method, comprise the following steps:
Step S100 ', input needs the image file of encryption, and the initial condition value of input encryption.
Input/output interface unit input initial condition value comprises the encryption iterative initial value X of key sequence 0, encryption system parameter lambda, encryption parameter L, encryption parameter κ; The encryption iterative initial value X ' of integer sequence 0, the encryption system parameter lambda ', encryption parameter L ' and encryption parameter κ ';
The value of setting κ ' be κ '=(κ '+N) %L ', N is for encrypting number of times;
Step S200 ', binary keys sequence and the integer value sequence of utilizing pseudorandom number generator to produce, the key XOR is carried out in the inverse operation of encrypting then, and terminal realizes the image deciphering.
More preferably, described step S200 ' comprises the following steps:
Step S210 ', pseudorandom number generator utilize iterative initial value X ' 0, system parameters λ ', parameter L ' and parameter κ ', generate integer value sequence PP t(t=0,1 ..., M-1, M ..., M+N-1), carry out every row pixel c Ij(i=0,1 ..., M-1, j=0,1 ..., N-1) move PP to cocycle successively t(t=M ..., M+N-1) individual evolution is to the another location of these row;
Step S220 ' is with the every capable pixel c that encrypts IjRing shift right PP successively t(t=0,1 ..., M-1) individual evolution is to the another location of this row;
Step S230 ' utilizes contrary S-box substitution table to find inverse element by tabling look-up.With c IjIn three components of RGB make contrary S-box respectively and replace, promptly preceding 4 as S-box row coordinate, the contrary S-box row-coordinate of back 4 conducts is replaced c with the value at contrary S-box ranks coordinate place IjObtain pixel value b Ij(i=0,1 ..., M-1, j=0,1 ..., N-1);
Step S240 ', iterative initial value X is encrypted in the pseudorandom number generator utilization 0, encryption system parameter lambda, encryption parameter L and encryption parameter κ, the random number sequence K of generation t(t=0,1 ..., (M * N * 8)-1) as the seed key of W, obtain the round key sequence that each is taken turns by the cipher key spreading scheme;
Step S250 ' returns step S210 ', carries out the deciphering of next round, and the number of times of deciphering equates with the encryption number of times.
Particularly, the invention provides a kind of image encrypting and decrypting system, comprise input/output interface unit, pseudorandom number generator, encryption/decryption element, watermark embeds the unit, watermark detection unit, wherein:
Described input/output interface unit is used to import the image file and the initial condition value that need encrypt/decrypt, the image file behind the output encrypt/decrypt.
Described pseudorandom number generator is used for generating the binary system random number sequence according to the initial condition value of input;
Described encryption/decryption element is used for the binary system random number sequence according to described pseudorandom number generator generation, and the image file of input is encrypted or is decrypted;
Described watermark embeds the unit, is used at image watermarkedly, and described watermark embeds and comprises in the unit that original image DCT coefficient selects module and watermark merge module;
Described watermark detection unit is used for watermarked image is detected, and comprises in the described watermark detection unit that containing watermarking images DCT coefficient selects module and watermark judge module.
Preferably, described encryption/decryption element, comprise ciphering unit and decrypting device, wherein: comprise image encryption unit and watermark encrypting unit in the described ciphering unit, different initial condition values is got at image and watermark respectively with the watermark encrypting unit in described image encryption unit, the binary system random number sequence that image initial condition value and watermark initial condition value all utilize pseudorandom number generator to produce, intercepting one section binary system random number sequence wherein, carry out following encipheror:, finish substituting of image pixel by the conversion of S-box again by the RGB or the gray value conversion of key xor operation realization image pixel in the Rijndael algorithm; Realize the ranks replacement operator of image pixel again, intercept another section binary system random number sequence then, the next round cryptographic operation is carried out in circulation, carry out the encryption of a fixed wheel up to image, and the encryption of a fixed wheel has also been carried out in watermark, final image and the watermark double-encryption realized, and utilize RSA Algorithm picked at random integer as image initial condition value and watermark initial condition value encryption key, respectively image initial condition value and watermark initial condition value are encrypted according to described image initial condition value and watermark initial condition value encryption key, and calculated image initial condition value and watermark initial condition value initial condition value decruption key respectively by image initial condition value and watermark initial condition value encryption key;
Comprise image decrypting device and watermark decrypting device in the described decrypting device, described image decrypting device and watermark decrypting device are respectively the anti-order unit of the ciphering process of image encryption unit and watermark encrypting unit, at first utilize RSA Algorithm, encrypted image initial condition value and described watermark initial condition value are decrypted by described image initial condition value and the described watermark initial condition value decruption key that calculates; Next utilizes decrypted image initial condition value and described watermark initial condition value to produce the binary system random number sequence with pseudorandom number generator, and the key XOR is carried out in the inverse operation of encrypting then, and terminal realizes image and watermark double descrambling.
Preferably, described image encryption unit comprises the varitron unit, substitutes subelement and displacement subelement, and wherein: described varitron unit is used to adopt the round key xor operation to realize the RGB or the greyscale transformation of image pixel; Described alternative subelement is used to adopt the conversion of S-box to finish substituting of image pixel; Described displacement subelement is used to adopt line replacement and column permutation to finish the displacement of image pixel.
Preferably, image initial condition value and watermark initial condition value that described input is encrypted include: the encryption iterative initial value X of key sequence 0, encryption system parameter lambda, encryption parameter L, encryption parameter κ; The encryption iterative initial value X ' of integer sequence 0, the encryption system parameter lambda ', encryption parameter L ' and encryption parameter κ '.
Preferably, described original image DCT (discrete cosine transform) coefficient selects module at first original image to be divided into the sub-piece of 8 * 8 non-overlapping copies, again each sub-piece is carried out dct transform, selects intermediate frequency watermarked.
Preferably, the described watermarking images DCT coefficient that contains selects module at first will contain the sub-piece that watermarking images is divided into 8 * 8 non-overlapping copies, again the DCT coefficient of selected each sub-piece.
Preferably, described watermark judge module is selected the synthetic sequence R that length is φ of all selected DCT coefficient sets of module with the described watermarking images DCT coefficient that contains, calculate the correlation of R and pseudo-random number sequence W afterwards, if correlation surpasses threshold value ρ, judge that then watermark exists, otherwise judge that watermark does not exist.
The invention has the advantages that: image encrypting and decrypting system of the present invention and method, Rijndael and RSA encipher-decipher method are applied in the digital image encryption, utilize the fail safe of Rijndael method and the asymmetry of RSA method, make that the image resistance property after encrypting is improved further, make the images category after the encryption be similar to the white noise image, reach comparatively desirable scramble effect.The present invention improves the ranks replacement operator of Rijndael in image scrambling, have simple, realize that easily the image after the deciphering such as almost completely reduces at characteristic, be specially adapted to the encryption and decryption of gray level image and coloured image.
Description of drawings
Fig. 1 is an embodiment of the invention image encrypting and decrypting system structural representation;
Fig. 2 is a ciphering unit structural representation among Fig. 1;
Fig. 3 is the pixel process schematic diagram of column permutation to listing in the image block;
Fig. 4 a, 4b, 4c are the image after original image, usefulness embodiment of the invention image encrypting and decrypting system are encrypted, the image effect schematic diagram after the deciphering of embodiment of the invention image encrypting and decrypting system;
Fig. 5 is an image encryption method schematic flow sheet of the present invention.
Embodiment
In order to make purpose of the present invention, technical scheme and advantage clearer,, image encrypting and decrypting system of the present invention and method are further elaborated below in conjunction with drawings and Examples.Should be appreciated that specific embodiment described herein is only in order to explain the present invention rather than limitation of the present invention.
Embodiment one, image encrypting and decrypting system:
As shown in Figure 1, the image encrypting and decrypting system of the embodiment of the invention comprises input/output interface unit 1, pseudorandom number generator 2, and encryption/decryption element 3, watermark embeds unit and watermark detection unit (not shown), wherein:
Input/output interface unit 1 is used to import the image file and the initial condition value that need encrypt/decrypt, the image file behind the output encrypt/decrypt; The initial condition value here comprises the initial condition value of image, also comprises the initial condition value of watermark.
Pseudorandom number generator 2 is used for generating the binary system random number sequence according to the initial condition value of input/output interface unit 1 input; Like this, two groups of binary system random number sequences have in fact been generated, the binary system random number sequence of watermark and the binary system random number sequence of image.
Encryption/decryption element 3 is used for the image file of input is encrypted or is decrypted, and wherein also comprises the encryption and decryption to watermark;
Described encryption/decryption element 3 comprises ciphering unit 31 and decrypting device 32, wherein:
Described ciphering unit 31, the binary sequence that is used to utilize pseudorandom number generator 2 to produce is realized the RGB or the gray value conversion of image pixel by key xor operation in the Rijndael algorithm, finishes substituting of image pixel by the conversion of S-box then; The integer value sequence of utilizing pseudorandom number generator 2 to generate again realizes the row and column replacement operator of image pixel, and the encryption of N wheel is carried out in circulation, finally realizes image encryption.
The anti-order unit of the ciphering process that described decrypting device 32 is ciphering units 31; The binary sequence that is used to utilize pseudorandom number generator 2 to produce, the key XOR is carried out in the inverse operation of encrypting then, and terminal realizes the image deciphering.
Last took turns the inverse operation of N during decrypting device 32 was encrypted earlier, and then carried out N-1~1 and take turns inverse operation, carried out the key XOR at last.
Described watermark embeds the unit, is used at image watermarkedly, and described watermark embeds and comprises in the unit that original image DCT coefficient selects module and watermark merge module;
Described watermark detection unit is used for watermarked image is detected, and comprises in the described watermark detection unit that containing watermarking images DCT coefficient selects module and watermark judge module.
In the described image encrypting and decrypting system, described encryption/decryption element comprises ciphering unit and decrypting device, wherein:
Comprise image encryption unit and watermark encrypting unit in the described ciphering unit, different initial condition values is got at image and watermark respectively with the watermark encrypting unit in described image encryption unit, the binary system random number sequence that image initial condition value and watermark initial condition value all utilize pseudorandom number generator to produce, intercepting one section binary system random number sequence wherein, carry out following encipheror:, finish substituting of image pixel by the conversion of S-box again by the RGB or the gray value conversion of key xor operation realization image pixel in the Rijndael algorithm; Realize the ranks replacement operator of image pixel again, intercept another section binary system random number sequence then, the next round cryptographic operation is carried out in circulation, carry out the encryption of a fixed wheel up to image, and the encryption of a fixed wheel has also been carried out in watermark, final image and the watermark double-encryption realized, and utilize RSA Algorithm picked at random integer as image initial condition value and watermark initial condition value encryption key, respectively image initial condition value and watermark initial condition value are encrypted according to described image initial condition value and watermark initial condition value encryption key, and calculated image initial condition value and watermark initial condition value initial condition value decruption key respectively by image initial condition value and watermark initial condition value encryption key;
Comprise image decrypting device and watermark decrypting device in the described decrypting device, described image decrypting device and watermark decrypting device are respectively the anti-order unit of the ciphering process of image encryption unit and watermark encrypting unit, at first utilize RSA Algorithm, encrypted image initial condition value and described watermark initial condition value are decrypted by described image initial condition value and the described watermark initial condition value decruption key that calculates; Next utilizes decrypted image initial condition value and described watermark initial condition value to produce the binary system random number sequence with pseudorandom number generator, and the key XOR is carried out in the inverse operation of encrypting then, and terminal realizes image and watermark double descrambling.
Wherein,, during authentication, from image, extract watermark again, and judge according to the variation of watermark and to prevent from the integrality of image illegally to distort and forge by in image, embedding a watermark.
At first, select watermarked DCT coefficient.
Suppose that watermark signal is that length is the random sequence W={w (i) of the obedience Gaussian distribution N (0,1) of τ, 1≤i≤τ }.At first original image is divided into the sub-piece of 8 * 8 non-overlapping copies, each sub-piece is carried out dct transform, obtain F (β), β=1,2 ..., s.Select intermediate frequency watermarked, make that watermark can not perception, and can resist lossy compression method.
At each DCT piece F of 8 * 8 (β)Watermarked, have only
Figure BDA0000055689670000101
Individual DCT coefficient is used to watermarked, the generation method of this φ coefficient: at first each DCT coefficient of 8 * 8 is pressed the Zig-Zag rank order, preceding L DCT coefficient given up, get φ coefficient F (β)(L+1), F (β)(L+2) ..., F (β)(L+ φ) comes watermarked.
Secondly, the embedding of watermark.
Watermark embeds by following rule:
F′ (β)(L+j)=F (β)(L+j)+ω·|F (β)(L+j)|·w(β+j),
j=1,2,Λ,φ;s×φ=τ,β=1,2,Λ,s
Here, ω is a watermark embed strength, and it is after utilizing neural net to 8 * 8 block sorts, according to different classification results, selects same embedment strength to of a sort.F ' (β) is inserted back in F (β) position subsequently, does anti-dct transform, just can obtain containing watermarking images I ' (β).
The detection of watermark.
At last,, I ' is done 8 * 8DCT conversion in order to realize that watermarked image is detected, and with after the Zig-Zag rank order, by selecting each φ of 8 * 8 DCT coefficient with watermarked identical method.The DCT coefficient sets that all pieces are selected is synthesized the sequence R that length is φ, calculates the correlation of R and pseudo-random number sequence W afterwards.The computing formula of correlation:
c = 1 s Σ i = 1 s { 1 k Σ j = 1 k R ( β ) ( L + j ) · w ( β + j ) } , s × φ = τ
If pseudo-random number sequence produces with incorrect key, then the correlation of itself and R can be very low, otherwise will be very high.Thus, can set a threshold value ρ, whether the existence of relatively judging watermark by correlation and threshold value ρ.If correlation surpasses threshold value ρ, judge that then watermark exists, otherwise judge that watermark does not exist.
And utilize the asymmetrical encryption algorithm of mixing of RSA and Rijndael as follows:
At first, the initialization of RSA Algorithm
(1) system produces two big prime numbers (maintaining secrecy);
(2) calculate n=pq (disclosing), Euler's function ξ (n)=(p-1) (q-1);
(3) picked at random integer e satisfies gcd (e, ξ (n))=1 (disclosing) as PKI (encryption key);
(4) calculate private key d (decruption key), satisfy ed ≡ 1 (mod ξ (n)), i.e. e ≡ e -1(mod ξ (n)) destroys p, q and ξ (n).
Secondly, rsa encryption/deciphering conversion
(1) enciphering transformation: e encryption key key, i.e. c ≡ m use public-key e(mod (n));
(2) deciphering conversion: use private key d with key key ' deciphering, obtain key key, i.e. m ≡ c d(mod (n)).
In this case, rsa encryption is encrypted the initial parameter of image, when encrypting, can adopt PKI to encrypt, and deciphering time, then the private key with correspondence is decrypted, like this, make that initial parameter has obtained to maintain secrecy to greatest extent, and, strengthened fail safe with different secret key decryption initial parameters.
Wherein, N encrypts number of times by the circulation of input/output interface unit input, and preferably, N is an integer 6~10.
Preferably, described ciphering unit 31 comprises varitron unit 311, substitutes subelement 312 and displacement subelement 313, wherein:
Described varitron unit 311 is used to adopt the round key xor operation to realize the RGB or the greyscale transformation of image pixel;
Described alternative subelement 312 is used to adopt the conversion of S-box to finish substituting of image pixel;
Described displacement subelement 313 is used to adopt line replacement and column permutation to finish the displacement of image pixel.
Image encrypting and decrypting system of the present invention, ciphering unit are realized key xor operation in the Rijndael algorithm RGB or the gray value conversion of image pixel; Finish substituting of image pixel by the conversion of S-box; The random number sequence of utilizing pseudorandom number generator to generate realizes the ranks replacement operator of image pixel.Image encrypting and decrypting system of the present invention can also can carry out encryption and decryption to 24 coloured images to the gray level image encryption and decryption; Be not only applicable to image encryption, also be applicable to image encrypting and decrypting M * N to N * N.
The state matrix that the Rijndael encryption method is used is with 4 * 4 matrixes of byte as unit, and the matrix element value is between 0 to 255, and this and the gray value of image pixel or the value of R, G, B or each component of gray scale match.Therefore, preferably, as a kind of embodiment, in the embodiment of the invention, piece image is carried out piecemeal by 4 * 4 size handle, encryption/decryption element uses the Rijndael algorithm to each sub-image encryption and decryption.To the image block encryption and decryption, kept the spatial coherence between the inner neighbor of sub-piece like this, also reduced the scale of data processing simultaneously, improved encryption efficiency.
The binary sequence random number K that described ciphering unit 31 generates pseudorandom number generator 2 i(i=0,1 ..., 127) as seed key, by the seed key key that is expanded:
Key array w[] [4 * 8] expression, top 4 row are seed keys;
Expanded keys is subsequently determined by recursive fashion by previous row: if i is not 4 multiple, then i is capable is the capable and capable XOR by turn of i-1 of i-4; Otherwise i is capable to be that i-4 is capable and the XOR by turn of the nonlinear function that i-1 is capable;
Described nonlinear function is: elder generation is to the capable left cyclic shift of carrying out a byte of i-1 of w, each byte to i-1 in capable is carried out S-box conversion (byte replacement), carry out XOR with wheel constant Rcon (i/4) then, the i-1 that obtains after the conversion is capable, wherein takes turns constant Rcon (j)=(Rc (j), 00,00,00), Rc (1)=01, Rc (i)=02Rc (i-1); Wherein, the round key of r wheel encryption provides to the 4th * (r+1)-1 row by the 4th * r among the w is capable.
Ciphering unit carries out cryptographic operation then:
1) the varitron unit takes out w[] seed keys of preceding 4 row in [4 * 8], press the pixel a in byte and the image subblock to be encrypted Ij(i=0,1 ..., M-1, j=0,1 ..., N-1) XOR obtains new pixel b Ij(i=0,1 ..., M-1, j=0,1 ..., N-1);
2) substituting subelement adopts the conversion of S-box to finish substituting of image pixel.Its utilization is tabled look-up and is carried out the conversion of S-box.b IjPreceding 4 as S-box row coordinate, back 4 as S-box row-coordinate, replace b with the value at S-box ranks coordinate place IjObtain new pixel value c Ij(i=0,1 ..., M-1, j=0,1 ..., N-1).
3) the displacement subelement adopts line replacement and column permutation to finish the displacement of image pixel.
Line replacement is a byte ex-situ operations, and the row in the image subblock (4 * 4 matrix) is carried out left cyclic shift according to different side-play amounts; The 0th row moves 0 pixel, and the 1st row moves 1 pixel, and the 2nd row moves 2 pixels, and the 3rd row moves 3 pixels;
In column permutation, see each pixel that lists in the image subblock (4 * 4 matrix) as GF (2 earlier 8) on the coefficient (coefficient is a hexadecimal here) of 3 order polynomials, then these multinomials and fixed polynomial c (x) are taken advantage of about mould x4+1, wherein c (x)=02+01x+01x2+03x3.This computing can be calculated the pixel value d that makes new advances Ij(i=0,1 ..., M-1, j=0,1 ..., N-1), as shown in Figure 3.
Preferably, in the column permutation computing, each row in the sub-piece of computed image (4 * 4 matrix) are taken advantage of about mould x4+1 with fixed polynomial c (x), c (x)=02+01x+01x2+03x3 wherein, can be under the enough situation of memory space: z=xy by the territory multiplication is realized as look-up table, here x ∈ 01,02,03} and y ∈ GF (2 8).Byte 01 is the multiplicative identity of finite field, i.e. 01y=y.Therefore the foundation of this table only needs 2 * 256=512 item, and is not only very fast, but also can reduce the danger that timing analysis is attacked.Deciphering matrix and scrambled matrix have certain contact during deciphering, promptly decipher matrix and equal multiplying each other of a scrambled matrix and a matrix.
y 0 y 1 y 2 y 3 = 0 E 0 B 0 D 9 09 0 E 0 B 0 D 0 D 09 0 E 0 B 0 B 0 D 09 0 E · z 0 z 1 z 2 z 3 =
05 00 04 00 00 05 00 04 04 00 05 00 00 04 00 05 · 02 03 01 01 01 02 03 01 01 01 02 03 03 01 01 02 · z 0 z 1 z 2 z 3
Therefore, building method is the same when encrypting together in contrary column permutation computing, also can construct a look-up table and realize: y=x ' z=x " xz, x here " ∈ 00,04,05} and xz ∈ GF (2 8), this table also has 2 * 256=512 item.
4) the varitron unit takes out w[in order] rgb value or the gray value d of the round key in [4 * 8] and the pixel of image IjXOR;
In this conversion, the pixel d in the image block (4 * 4 matrix) IjObtain a new pixel e by carrying out byte-by-byte XOR with round key Ij(i=0,1 ..., M-1, j=0,1 ..., N-1);
Each round key length of taking out equals image block length (4 * 4 * 8).
Turn back to 2), carry out next round and encrypt, encrypt up to finishing the N wheel.
Preferably, the back end is taken turns in N=6~10, and wherein, during last was taken turns, the displacement subelement did not carry out column permutation.
Decrypting device is the anti-order of the ciphering process of ciphering unit when deciphering.Be last inverse operation of taking turns during decrypting device is encrypted earlier, and then carry out the inverse operation of many wheels, carry out the key XOR at last.
Wherein last inverse operation of taking turns N is described in the decrypting device: with expanded keys XOR, anti-line replacement, contrary S-box displacement.
The inverse operation of described many wheels is meant that preceding N-1~1 takes turns inverse operation, and every order of taking turns is: key XOR, anti-column permutation, anti-line replacement, contrary S-box displacement.
The employed order of steps of decrypting device is identical with the encryption of ciphering unit, just makes each step into it contrary, and changes the cipher key spreading scheme: except the first round and ending round key, use anti-column permutation on all round key.
Be example with 512 * 512 Aradar image below, image encrypting and decrypting system of the present invention is described, input/output interface unit input iterative initial value X 0=X ' 0=0.684, λ=λ '=3.816, L=L '=14, κ=κ '=10; Pseudorandom number generator generates random number, the random number K of generation according to the input iterative initial value i(i=0,1 ..., 511) as seed key, obtain every round key of taking turns encryption by the cipher key spreading method.
As long as different κ, the κ ' values of each setting, and X 0, λ and L value, and X ' 0, λ ' and L ' value constant, just can correspondingly produce a series of different random number sequences.
Shown in Fig. 4 a, be original image A=(a Ij) 512 * 512, a wherein Ij(i=0,1 ..., 511, j=0,1 ..., 511).
To Fig. 4 a, A1) be divided into (512/4) * (512/4) piece subgraph; A2) the random number K that produces by pseudorandom number generator i(i=0,1 ..., 511) as seed key, by the pixel a in byte and the image subblock to be encrypted IjXOR obtains new pixel b IjA3) utilization is tabled look-up and is carried out the conversion of S-box, replaces b with the value at S-box ranks coordinate place IjObtain new grey scale pixel value c IjA4) line replacement carries out left cyclic shift with the row in the image subblock (4 * 4 matrix) according to different side-play amounts; A5) in column permutation, to pixel c in the image subblock (4 * 4 matrix) IjThe grey scale pixel value d that calculating makes new advances IjA6) the grey scale pixel value d of image IjObtain a new pixel e with the round key XOR IjA7) turn back to A4), carry out next round and encrypt, carry out 10 altogether and take turns encryption; Wherein, do not carry out column permutation during last is taken turns.
Obtain the image behind the scramble at last Shown in Fig. 4 b.
Shown in Fig. 4 c, be to utilize the image encrypting and decrypting system of the embodiment of the invention from the scramble image, to recover the original image that comes out.Contrast as seen, the image after the encryption becomes disorderly and unsystematic, does not almost see any scenery and profile among the former figure, and the random number signal has been covered picture signal fully.Fig. 4 a, Fig. 4 b, Fig. 4 c show that this image scrambling algorithm is feasible.
How cipher key spreading is meant by the seed key key that is expanded.Expanded keys array w[N b] [N R+1] expression, top N kIndividual word is a seed key, and the generating mode of other key word is relevant with the value of Nk, is divided into N k≤ 6 and N k>6 two kinds of situations.
SubByte (w) is a function that returns 4 bytes, each byte all be in its input word the relevant position byte by the result after the effect of S-box; And function R otByte (w) returns is the words of these 4 bytes after cyclic permutation, and this cyclic permutation is: if input word for (a, b, c, d), then output word be (b, c, d, a).
For example, establishing seed key is 2b 7e 15 16 28 ae d2 a6 ab f7 15 88 09 cf 4f 3c
N k=4, then w0=2b 7e 15 16, w1=28 ae d2 a6, and w2=ab f7 15 88,
w3=09?cf?4f?3c;
w4=w0^SubByte(RotByte(w3))^Rcon[4/N k]=a0fafe17;
w5=w[5-N k]^w[5-1]=88542cb1;...
When carrying out the key XOR, key length must equate that therefore the key of i wheel is relevant with block length with block length, and by expanded keys word w[N b* i], w[N b* i+1] ..., w[N b* (i+1)-1] form.
Embodiment two, image encryption method:
If 24 color digital images can be used matrix A=(a Ij) M * N represents that the size of image is a M * N pixel, 0≤i≤M-1 wherein, 0≤j≤N-1.a IjPresentation video is at the rgb value at the capable j row of i pixel place, a IjBe made up of 3 bytes, each byte is represented a RGB component respectively.
The image encryption method of the embodiment of the invention, its schematic diagram comprises the steps: as shown in Figure 5
Step S100, input needs the image file of encryption, and the initial condition value of input encryption.
Input/output interface unit input initial condition value comprises the encryption iterative initial value X of key sequence 0, encryption system parameter lambda, encryption parameter L, encryption parameter κ; The encryption iterative initial value X ' of integer sequence 0, the encryption system parameter lambda ', encryption parameter L ' and encryption parameter κ ';
Wherein, X 0Encryption iterative initial value for the key sequence of pseudorandom number generator; X ' 0Encryption iterative initial value for integer sequence;
λ, λ ' are the encryption system parameter of pseudorandom number generator, 3.569 945 6...<λ, λ '≤4;
L, L ' are for encrypting the intercepting value, expression intercepting random number sequence { X n, n=0,1,2, the real-valued X of each among the K} nPreceding L, L ' bit;
κ, κ ' are encryption parameters; When random number sequence is converted into the binary system random number sequence, specifies and get random number sequence { X n, n=0,1,2, X among the K} nκ, κ ' bit form the binary keys sequence.
Step S200, the real number value random number sequence that generates according to the initial condition value of input/output interface unit input, and described real number value random number sequence intercepting is converted to binary keys sequence nucleotide sequence and integer value sequence;
Pseudorandom number generator is according to the encryption iterative initial value X of input key sequence 0, encryption system parameter lambda, encryption parameter L, encryption parameter κ, generate random number, the random number k of generation i(i=0,1 ..., 511) as seed key, obtain every round key sequence of taking turns encryption by the cipher key spreading scheme.
Pseudorandom number generator is according to the encryption iterative initial value X ' of the integer sequence of input key sequence 0, the encryption system parameter lambda ', encryption parameter L ' and encryption parameter κ ', generate random number, the random number k of generation i(i=0,1 ..., 511) as the integer value sequence.
Describe the encryption iterative initial value X of pseudorandom number generator below in detail according to the input key sequence 0, encryption system parameter lambda, encryption parameter L, encryption parameter κ, generate random number, the random number k of generation i(i=0,1 ..., 511) as seed key, obtain the process of key sequence, it is basic identical with the process that obtains key sequence that pseudorandom number generator obtains the integer value sequence according to the iteration initial condition, describes in detail no longer one by one in the embodiment of the invention.
If the size of a width of cloth digital picture is M * N, available matrix A=(a Ij) M * N represents, a wherein Ij(i=0,1 ..., M-1, j=0,1 ..., N-1) presentation video is at the rgb value or the gray value at the capable j row of i pixel place, a Ij∈ 0,1 ..., 255}.Image is divided into (M/4) * (N/4) piece, if the row value M of image array or train value N are not 4 multiples, fill with 0 value not enough position, to guarantee piecemeal.Pseudorandom number generator is converted to binary sequence with the real number value random number sequence that generates.
As a kind of embodiment, in the embodiment of the invention, in the pseudorandom number generator, the real number value random number sequence is generated by the formula of formula (1).
X n=(a*(n+b))mod?c (1)
Wherein, a, b, c are prime number, and n is an integer between 1 to c
(1) to real-valued random number sequence { X nIn each real-valued X n(adopting double precision prisoner point type number) do not have the symbol fractional fixed point with the p position to represent, i.e. X n=0. b 0b 1... b i... b P-2b P-1, X in the formula nWith p bit b iExpression, i=0,1 ..., p-2, p-1, b iValue be 0 or 1.P is big more, and then Biao Shi data precision is high more.
(2) to real-valued random number sequence { X nIn each real-valued X nAll intercept preceding L bit, give up all positions of back, satisfy 1<L≤p.X then nBe expressed as the integer of forming by the L bit.Random number sequence { X like this n,=0,1,2 ..., 0<X nAmong<the 1} each X nCorresponding to a L position bigit, X n=b 0b 1... b i... b L-1
(3) get { X nNew sequence { S of κ position b κ (value of b κ is 0 or 1) binary number composition n.
Figure BDA0000055689670000191
Step S300, binary keys sequence and the integer value sequence of utilizing pseudorandom number generator to produce by the RGB or the gray value conversion of key xor operation realization image pixel in the Rijndael algorithm, are finished substituting of image pixel by the conversion of S-box then; The integer value sequence of utilizing pseudorandom number generator to generate again realizes the ranks replacement operator of image pixel, and the encryption of N wheel is carried out in circulation, finally realizes image encryption.
Step S300 comprises the steps:
Step S310 is with the binary number key sequence K of pseudorandom number generator generation t(t=0,1 ..., (M * N * 8)-1) carry out cipher key spreading as seed key, key w[] [N * 8] deposit, top M behavior seed key is used for the first round when encrypting and the pixel XOR of image to be encrypted; Take turns encryption from second and bring into use round key, the round key of r wheel is capable of M * (r+1)-1 row provides by the M among the w * r;
The preceding M of w is capable to be seed key;
Each row of back is determined by recursive fashion by previous row: if i is not the multiple of M, then i is capable is the capable and capable XOR by turn of i-1 of i-M; Otherwise i is capable to be that i-M is capable and the XOR by turn of the nonlinear function that i-1 is capable.
The implementation method of described nonlinear function is: elder generation is to the capable left cyclic shift of carrying out a byte of i-1 of w, each byte to i-1 in capable is carried out S-box conversion (byte replacement), carry out XOR with wheel constant Rcon (i/M) then, the i-1 that obtains after the conversion is capable.
Wherein take turns constant
Figure BDA0000055689670000201
Rc (1)=01, Rc (i)=02Rc (i-1).
As given iterative initial value X 0, system parameters λ, parameter L and parameter κ, just determined the binary system random number sequence { S that pseudorandom number generator generates n, n=0,1,2, K}.Wherein L represents to intercept real-valued random number sequence { X n, n=0,1,2, the real-valued X of each among the K} nPreceding L bit; The implication of κ is when real-valued random number sequence is converted into the binary system random number sequence, specifies and gets real-valued random number sequence { X n, n=0,1,2, X among the K} nThe κ bit form the binary system random number sequence as key sequence.
Step S320 takes out w[in order] the capable key of M in [N * 8], by the pixel a in byte and the image to be encrypted Ij(i=0,1 ..., M-1, j=0,1 ..., N-1) three component XORs of the RGB in obtain new pixel b Ij((i=0,1 ..., M-1, j=0,1 ..., N-1).
Step S330 utilizes look-up table to carry out the conversion of S-box; With b IjIn three components of RGB make replacement operation respectively, promptly preceding 4 as S-box row coordinate, back 4 as S-box row-coordinate, replace b with the value at S-box ranks coordinate place IjIn three components of RGB obtain new pixel value c Ij((i=0,1 ..., M-1, j=0,1 ..., N-1).
Utilizing look-up table to carry out the conversion of S-box is to precompute GF (2 8) on multiplication contrary and this is carried out the affine conversion in ground, and be stored in the look-up table, just can realize the computing of S-box by look-up table.Just can find inverse element as long as set up a contrary S-box look-up table in addition.Therefore, S-box computing/contrary S-box computing can realize that wherein each look-up table has 256 bytes with two look-up tables.
Look-up table is not only very effective, can also resist timing analysis to attack.
Step S340, with pseudorandom number generator according to encrypting iterative initial value X ' 0, the encryption system parameter lambda ', the integer value random number sequence PP of encryption parameter L ' and deciphering parameter κ ' generation t(t=0,1 ..., M-1, M ..., M+N-1) carry out horizontal and vertical mobile figure place as image pixel, carry out the ranks displacement of pixel.
Every capable pixel c with image IjRing shift left PP successively t(t=0,1 ..., M-1) individual evolution is to the another location of this row.
Preferably, take turns pixel since second and move, the value of only revising parameter κ ' is κ '=(κ '+1) %L ', X ' 0, λ ' and L ' value constant;
Step S350 is with every row pixel c of image IjMobile PP successively circulates downwards t(t=M ..., M+N-1) individual evolution is to the another location of these row.
Step S360 returns step S320, carries out next round and encrypts, and up to finishing the N wheel, obtains encrypted image.
Step S400, the output encrypted image.
Embodiment three, the image decryption method of the embodiment of the invention:
Deciphering then is the anti-order of ciphering process, and every order of taking turns is: anti-column permutation, anti-line replacement, contrary S-box displacement, key XOR.
Image decryption method of the present invention comprises the steps:
Step S100 ', input needs the image file of encryption, and the initial condition value of input encryption.
Input/output interface unit input initial condition value comprises the encryption iterative initial value X of key sequence 0, encryption system parameter lambda, encryption parameter L, encryption parameter κ; The encryption iterative initial value X ' of integer sequence 0, the encryption system parameter lambda ', encryption parameter L ' and encryption parameter κ ';
The value of setting κ ' be κ '=(κ '+N) %L ', N is for encrypting number of times;
Preferably, from next round deciphering, the value of only revising parameter κ ' be κ '=(κ '+N-1) %L ', X ' 0, λ ' and L ' value constant.
Step S200 ', binary keys sequence and the integer value sequence of utilizing pseudorandom number generator to produce, the key XOR is carried out in the inverse operation of encrypting then, and terminal realizes the image deciphering.
Preferably, described step S200 ' comprises the steps:
Step S210 ', pseudorandom number generator utilize iterative initial value X ' 0, system parameters λ ', parameter L ' and parameter κ ', generate integer value sequence PP t(t=0,1 ..., M-1, M ..., M+N-1), carry out every row pixel c Ij(i=0,1 ..., M-1, j=0,1 ..., N-1) move PP to cocycle successively t(t=M ..., M+N-1) individual evolution is to the another location of these row.
Step S220 ' is with the every capable pixel c that encrypts IjRing shift right PP successively t(t=0,1 ..., M-1) individual evolution is to the another location of this row.
Step S230 ' utilizes contrary S-box substitution table to find inverse element by tabling look-up.With c IjIn three components of RGB make contrary S-box respectively and replace, promptly preceding 4 as S-box row coordinate, the contrary S-box row-coordinate of back 4 conducts is replaced c with the value at contrary S-box ranks coordinate place IjObtain pixel value b Ij(i=0,1 ..., M-1, j=0,1 ..., N-1).
Step S240 ', iterative initial value X is encrypted in the pseudorandom number generator utilization 0, encryption system parameter lambda, encryption parameter L and encryption parameter κ, the random number sequence K of generation t(t=0,1 ..., (M * N * 8)-1) as the seed key of W, obtain the round key sequence that each is taken turns by the cipher key spreading scheme;
Use when the first round deciphers and encrypt last round key of taking turns; Second takes turns use round key of taking turns second from the bottom when deciphering, and the like, by byte and the pixel b that encrypts among the figure IjIn three component XORs of RGB obtain pixel a Ij(i=0,1 ..., M-1, j=0,1 ..., N-1).
Step S250 ' returns step S210 ', carries out the deciphering of next round, and the number of times of deciphering equates with the encryption number of times.
Step S300 ', the image after the output deciphering.

Claims (7)

1. an image encrypting and decrypting system is characterized in that, comprises input/output interface unit, pseudorandom number generator, encryption/decryption element, and watermark embeds the unit, watermark detection unit, wherein:
Described input/output interface unit is used to import the image file and the initial condition value that need encrypt/decrypt, the image file behind the output encrypt/decrypt.
Described pseudorandom number generator is used for generating the binary system random number sequence according to the initial condition value of input;
Described encryption/decryption element is used for the binary system random number sequence according to described pseudorandom number generator generation, and the image file of input is encrypted or is decrypted;
Described watermark embeds the unit, is used at image watermarkedly, and described watermark embeds and comprises in the unit that original image DCT coefficient selects module and watermark merge module;
Described watermark detection unit is used for watermarked image is detected, and comprises in the described watermark detection unit that containing watermarking images DCT coefficient selects module and watermark judge module.
2. image encrypting and decrypting system according to claim 1 is characterized in that, described encryption/decryption element comprises ciphering unit and decrypting device, wherein:
Comprise image encryption unit and watermark encrypting unit in the described ciphering unit, different initial condition values is got at image and watermark respectively with the watermark encrypting unit in described image encryption unit, the binary system random number sequence that image initial condition value and watermark initial condition value all utilize pseudorandom number generator to produce, intercepting one section binary system random number sequence wherein, carry out following encipheror:, finish substituting of image pixel by the conversion of S-box again by the RGB or the gray value conversion of key xor operation realization image pixel in the Rijndael algorithm; Realize the ranks replacement operator of image pixel again, intercept another section binary system random number sequence then, the next round cryptographic operation is carried out in circulation, carry out the encryption of a fixed wheel up to image, and the encryption of a fixed wheel has also been carried out in watermark, final image and the watermark double-encryption realized, and utilize RSA Algorithm picked at random integer as image initial condition value and watermark initial condition value encryption key, respectively image initial condition value and watermark initial condition value are encrypted according to described image initial condition value and watermark initial condition value encryption key, and calculated image initial condition value and watermark initial condition value initial condition value decruption key respectively by image initial condition value and watermark initial condition value encryption key;
Comprise image decrypting device and watermark decrypting device in the described decrypting device, described image decrypting device and watermark decrypting device are respectively the anti-order unit of the ciphering process of image encryption unit and watermark encrypting unit, at first utilize RSA Algorithm, encrypted image initial condition value and described watermark initial condition value are decrypted by described image initial condition value and the described watermark initial condition value decruption key that calculates; Next utilizes decrypted image initial condition value and described watermark initial condition value to produce the binary system random number sequence with pseudorandom number generator, and the key XOR is carried out in the inverse operation of encrypting then, and terminal realizes image and watermark double descrambling.
3. image encrypting and decrypting system according to claim 2 is characterized in that, described image encryption unit comprises the varitron unit, substitutes subelement and displacement subelement, wherein:
Described varitron unit is used to adopt the round key xor operation to realize the RGB or the greyscale transformation of image pixel;
Described alternative subelement is used to adopt the conversion of S-box to finish substituting of image pixel;
Described displacement subelement is used to adopt line replacement and column permutation to finish the displacement of image pixel.
4. image encrypting and decrypting system according to claim 2 is characterized in that, image initial condition value and watermark initial condition value that described input is encrypted include:
The encryption iterative initial value X of key sequence 0, encryption system parameter lambda, encryption parameter L, encryption parameter κ; The encryption iterative initial value X ' of integer sequence 0, the encryption system parameter lambda ', encryption parameter L ' and encryption parameter κ.
5. image encrypting and decrypting system according to claim 2 is characterized in that, described original image DCT coefficient selects module at first original image to be divided into the sub-piece of 8 * 8 non-overlapping copies, again each sub-piece is carried out dct transform, selects intermediate frequency watermarked.
6. image encrypting and decrypting system according to claim 5 is characterized in that, the described watermarking images DCT coefficient that contains selects module at first will contain the sub-piece that watermarking images is divided into 8 * 8 non-overlapping copies, again the DCT coefficient of selected each sub-piece.
7. image encrypting and decrypting system according to claim 6, it is characterized in that, described watermark judge module is selected the synthetic sequence R that length is φ of all selected DCT coefficient sets of module with the described watermarking images DCT coefficient that contains, calculate the correlation of R and pseudo-random number sequence W afterwards, if correlation surpasses threshold value ρ, judge that then watermark exists, otherwise judge that watermark does not exist.
CN 201110095616 2011-04-15 2011-04-15 Image encrypting and decrypting system Active CN102196320B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201110095616 CN102196320B (en) 2011-04-15 2011-04-15 Image encrypting and decrypting system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201110095616 CN102196320B (en) 2011-04-15 2011-04-15 Image encrypting and decrypting system

Publications (2)

Publication Number Publication Date
CN102196320A true CN102196320A (en) 2011-09-21
CN102196320B CN102196320B (en) 2013-02-27

Family

ID=44603590

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201110095616 Active CN102196320B (en) 2011-04-15 2011-04-15 Image encrypting and decrypting system

Country Status (1)

Country Link
CN (1) CN102196320B (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103458316A (en) * 2013-07-22 2013-12-18 太原理工大学 Image encryption method
CN104184921A (en) * 2013-05-24 2014-12-03 中兴通讯股份有限公司 Encryption method and server, and decryption method and terminal
CN105046166A (en) * 2015-08-19 2015-11-11 Tcl移动通信科技(宁波)有限公司 Image safe sharing implementing method and system
CN105763762A (en) * 2014-12-17 2016-07-13 青岛海信电器股份有限公司 Image encryption and decryption method and apparatus
CN106096619A (en) * 2016-06-21 2016-11-09 青岛译锁堂安全技术有限公司 Based on artificial intelligence technology join spoon method and system
CN106599715A (en) * 2016-11-29 2017-04-26 江苏蓝深远望科技股份有限公司 File encryption method, file decryption method and device
CN107392834A (en) * 2017-07-28 2017-11-24 江西农业大学 A kind of image encryption method of random rotation displacement
CN108182220A (en) * 2017-12-25 2018-06-19 重庆邮电大学 Image search method based on privacy of user protection in Cloud Server
CN108364019A (en) * 2018-01-30 2018-08-03 上海大学 Image convolution outsourcing method based on DCTR features
CN110730188A (en) * 2019-10-23 2020-01-24 深圳市中仁信息科技有限公司 Method for encrypting, storing and transmitting static pictures
CN110958458A (en) * 2019-11-25 2020-04-03 李小平 Digital image encryption method and image decryption method based on modular inverse operation
CN111079164A (en) * 2019-12-18 2020-04-28 深圳前海微众银行股份有限公司 Feature correlation calculation method, device, equipment and computer-readable storage medium
CN111294480A (en) * 2018-12-06 2020-06-16 中国科学院深圳先进技术研究院 Image encryption and correction method and device and image decryption method and device
WO2020119645A1 (en) * 2018-12-13 2020-06-18 中国科学院深圳先进技术研究院 Image encryption method and device, and image decryption method and device
CN111476701A (en) * 2020-03-18 2020-07-31 创驱(上海)新能源科技有限公司 Digital image encryption method and decryption method based on Rijndael symmetric block encryption technology
CN112182610A (en) * 2020-09-25 2021-01-05 深圳职业技术学院 Image encryption method, device, equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040202326A1 (en) * 2003-04-10 2004-10-14 Guanrong Chen System and methods for real-time encryption of digital images based on 2D and 3D multi-parametric chaotic maps
CN101022331A (en) * 2006-02-16 2007-08-22 刘粉林 Chaos encrypting method based on carrier

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040202326A1 (en) * 2003-04-10 2004-10-14 Guanrong Chen System and methods for real-time encryption of digital images based on 2D and 3D multi-parametric chaotic maps
CN101022331A (en) * 2006-02-16 2007-08-22 刘粉林 Chaos encrypting method based on carrier

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
《国外电子测量技术》 20080331 张陶 《基于混沌加密的二值图像数字水印算法》 10-18 1-7 第27卷, 第3期 *
《苏州市职业大学学报》 20100331 陈珂,殷凡 《基于Rijndael的图像加密***的研究与设计》 47-50 1-7 第21卷, 第1期 *
《计算机工程与设计》 20071031 陈珂 《基于Rijndael的彩色图像加密算法的研究》 4908-4910 第28卷, 第20期 *

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104184921B (en) * 2013-05-24 2018-10-12 中兴通讯股份有限公司 Encryption method and server and decryption method and terminal
CN104184921A (en) * 2013-05-24 2014-12-03 中兴通讯股份有限公司 Encryption method and server, and decryption method and terminal
CN103458316A (en) * 2013-07-22 2013-12-18 太原理工大学 Image encryption method
CN103458316B (en) * 2013-07-22 2016-05-04 太原理工大学 A kind of image encryption method
CN105763762A (en) * 2014-12-17 2016-07-13 青岛海信电器股份有限公司 Image encryption and decryption method and apparatus
CN105763762B (en) * 2014-12-17 2019-01-01 青岛海信电器股份有限公司 A kind of image encryption and the method and apparatus of decryption
CN105046166A (en) * 2015-08-19 2015-11-11 Tcl移动通信科技(宁波)有限公司 Image safe sharing implementing method and system
CN106096619A (en) * 2016-06-21 2016-11-09 青岛译锁堂安全技术有限公司 Based on artificial intelligence technology join spoon method and system
CN106599715A (en) * 2016-11-29 2017-04-26 江苏蓝深远望科技股份有限公司 File encryption method, file decryption method and device
CN107392834A (en) * 2017-07-28 2017-11-24 江西农业大学 A kind of image encryption method of random rotation displacement
CN107392834B (en) * 2017-07-28 2021-02-26 江西农业大学 Random cyclic shift image encryption method
CN108182220A (en) * 2017-12-25 2018-06-19 重庆邮电大学 Image search method based on privacy of user protection in Cloud Server
CN108364019A (en) * 2018-01-30 2018-08-03 上海大学 Image convolution outsourcing method based on DCTR features
CN108364019B (en) * 2018-01-30 2021-12-03 上海大学 Image convolution outsourcing method based on DCTR (data communication and data transmission rate) features
CN111294480B (en) * 2018-12-06 2021-04-16 中国科学院深圳先进技术研究院 Image encryption and correction method and device and image decryption method and device
CN111294480A (en) * 2018-12-06 2020-06-16 中国科学院深圳先进技术研究院 Image encryption and correction method and device and image decryption method and device
WO2020119645A1 (en) * 2018-12-13 2020-06-18 中国科学院深圳先进技术研究院 Image encryption method and device, and image decryption method and device
CN110730188A (en) * 2019-10-23 2020-01-24 深圳市中仁信息科技有限公司 Method for encrypting, storing and transmitting static pictures
CN110958458A (en) * 2019-11-25 2020-04-03 李小平 Digital image encryption method and image decryption method based on modular inverse operation
CN110958458B (en) * 2019-11-25 2022-03-08 李小平 Digital image encryption method and image decryption method based on modular inverse operation
CN111079164A (en) * 2019-12-18 2020-04-28 深圳前海微众银行股份有限公司 Feature correlation calculation method, device, equipment and computer-readable storage medium
CN111476701A (en) * 2020-03-18 2020-07-31 创驱(上海)新能源科技有限公司 Digital image encryption method and decryption method based on Rijndael symmetric block encryption technology
CN112182610A (en) * 2020-09-25 2021-01-05 深圳职业技术学院 Image encryption method, device, equipment and storage medium
CN112182610B (en) * 2020-09-25 2023-05-23 深圳职业技术学院 Image encryption method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN102196320B (en) 2013-02-27

Similar Documents

Publication Publication Date Title
CN102196320B (en) Image encrypting and decrypting system
Lu et al. An efficient image encryption scheme based on the LSS chaotic map and single S-box
Mitra et al. A new image encryption approach using combinational permutation techniques
Li et al. Cryptanalyzing a color image encryption scheme based on hybrid hyper-chaotic system and cellular automata
CN102982499B (en) Based on color image encryption and the decryption method of multi-fractional order chaos system
Wu et al. A user-friendly secret image sharing scheme with reversible steganography based on cellular automata
CN107220923B (en) Digital picture feedback encryption method based on image network
Abd El-Latif et al. A new image cipher in time and frequency domains
CN107330338B (en) Color image encryption and decryption method and system based on double-chaos cross diffusion
CN109361830B (en) Image encryption method based on plaintext
Zhu et al. A novel 3D vector decomposition for color-image encryption
Mohammed et al. Cryptosystems using an improving hiding technique based on latin square and magic square
CN104050617A (en) Method for image encryption based on Liu chaotic system
CN114401351B (en) Image encryption and decryption method based on two-dimensional fractional order chaotic mapping
CN113099069B (en) Multi-image encryption method based on three-dimensional spiral model
Kapur et al. Two level image encryption using pseudo random number generators
CN109559269B (en) Image encryption method and terminal
Alhassan et al. Enhancing image security during transmission using residue number system and k-shuffle
Sitompul et al. Steganography with highly random linear congruential generator for security enhancement
CN113992811B (en) Novel three-dimensional fractional order discrete chaotic mapping-based image encryption method
Kaur et al. A review of image encryption schemes based on the chaotic map
Abu-Alhaija Crypto-Steganographic LSB-based System for AES-Encrypted Data
Allawi Image encryption based on chaotic mapping and random numbers
Venkatesha et al. AES based algorithm for image encryption and decryption
Fathimala et al. K out of N secret sharing scheme for gray and color images

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant