CN106570815A - Image encryption method based on double-chaos system and blocking - Google Patents

Image encryption method based on double-chaos system and blocking Download PDF

Info

Publication number
CN106570815A
CN106570815A CN201610918185.3A CN201610918185A CN106570815A CN 106570815 A CN106570815 A CN 106570815A CN 201610918185 A CN201610918185 A CN 201610918185A CN 106570815 A CN106570815 A CN 106570815A
Authority
CN
China
Prior art keywords
sequence
chaos
image
value
pixel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610918185.3A
Other languages
Chinese (zh)
Inventor
谢国波
朱柳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong University of Technology
Original Assignee
Guangdong University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong University of Technology filed Critical Guangdong University of Technology
Priority to CN201610918185.3A priority Critical patent/CN106570815A/en
Publication of CN106570815A publication Critical patent/CN106570815A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Storage Device Security (AREA)
  • Compression Or Coding Systems Of Tv Signals (AREA)

Abstract

The invention discloses an image encryption method based on a double-chaos system and blocking, which comprises the steps of performing blocking on a plaintext image; solving chaos parameters and the number of iterations of the chaos system; entirely scrambling the position of the image by taking the block as a unit; performing position scrambling on pixel points in each block of the plaintext image; generating a chaos sequence by adopting logistic mapping, and replacing a pixel value of the image. Compared with the prior art, the security of image encryption is greatly improved, and statistical characteristic analysis, plaintext or ciphertext attacks and differential attacks can be effectively resisted. Meanwhile, the image encryption method has excellent reversibility, and ensures the consistency between a decrypted image and the initial plaintext.

Description

It is a kind of based on double chaos systems and the image encryption method of piecemeal
Technical field
It is the present invention relates to technical field of image processing more particularly to a kind of based on double chaos systems and the image encryption of piecemeal Method.
Background technology
Constantly development also brings the variation of Information Communication form to network technology simultaneously, wherein digital image information due to It is lively directly perceived that its own has, the abundant advantage of image, extensively liking by user.But at the same time, due to interconnection The opening of network, also results in information leakage event and emerges in an endless stream.How privately owned or shared data safety is ensured, into For the popular problem of information security field research.
Chaos be it is a kind of seem random irregular movement phenomenon, its form of expression may be summarized to be nonlinear deterministic system A kind of intrinsic stochasticity having in system.From the point of view of science angle, the main feature of chaos shows its unpredictability. Shannon is it has been suggested that with regard to the central idea of cryptography design:Diffusion and confusion.And the spy that chaos system itself has Property greatly meet diffusion and chaotic basic principle:
1. ergodic:In the range of restriction, the point on chaotic orbit can be infinitely close, so as to result in initial strip The hardly possible property of part prediction.
2. Combination:Similar to white noise, this characteristic is derived from the folding of chaos system, local and expands for the output of chaos system The scrambling of exhibition, compression and its track.
The diversity of index:2 points be arbitrarily close on two dimensional surface enter guild's index diverging with iteration.
Sensitivity to initial condition:Any minor variations of initial condition, all can be by not through the iteration of chaos system It is disconnected to be amplified, directly result in produced result and huge change occurs.This is just just like famous " buterfly effect ", and it is perfect The initial value sensitivity for explaining chaos system.
3. according to above feature, chaos system is widely used in image encryption, and various AESs are also by researcher Propose and disclose.Chaos system not only has the good cryptographies such as initial value sensitivity, aperiodicity, non-convergency, pseudo-randomness Characteristic, can be quickly generated the substantial amounts of chaos sequence for being adapted to construction resume image again.
The scramble based on chaos system and replace AES that Zhang Guoji is proposed, in the replacement stage Cipher Feedback is introduced Mechanism, the mechanism realizes the impact to ciphertext by the iterationses of control chaotic system, but the program can be with spy There is potential safety hazard so as to cause algorithm being cracked in different selection Ciphertext policy.Zhu Congxu etc. is using two and three dimensions Cat maps combine, and carry out position scramble and pixel value is replaced, and solving chaos system can not resist phase space reconfiguration attack Feature, but the periodic problem of Cat maps cannot be prevented effectively from.
The content of the invention
To overcome the deficiencies in the prior art, the present invention proposes a kind of based on double chaos systems and the image encryption side of piecemeal Method, the method meets key plain dependency, anti-statistical analysiss, anti-plaintext (ciphertext) attack characteristics of encrypted image, encryption Process is simply easily achieved, and image is consistent with plaintext after decryption.
The technical scheme is that such:
It is a kind of based on double chaos systems and the image encryption method of piecemeal, including step
S1:Piecemeal is carried out to plaintext image, piecemeal quantity is determined according to the key that plaintext is produced;
S2:Obtain the chaotic parameter and iterationses of chaos system;
S3:The chaotic parameter and iterationses are substituted into into Kent chaotic maps and generates chaos sequence, sequence is risen Sequence or descending are arranged, and respectively value produces labelled sequence in the subscript position of initiation sequence to record generic sequence, using labelled sequence pair Image after piecemeal rearranges combination, so that picture position overall scramble in units of block;
S4:For each block of plaintext image, obtain the chaotic parameter and iterationses of chaos system and substitute into Kent chaos Mapping generates chaos sequence, and ascending order or descending arrangement are carried out to chaos sequence, new subscript sequence is generated, using subscript sequence pair Pixel in block carries out position scramble;
S5:Picture element matrix after the scramble of position is converted into into one-dimensional sequence, the non-linear of logistic chaos systems is set The initial value of intensive parameter and two logistic chaos systems, is generated the one-dimensional sequence using logistic chaotic maps Two the chaos sequence Ms and N consistent with number of pixels, by chaos sequence M sequence T of the codomain between [0,255] is converted into, will Sequential value in chaos sequence N carries out ascending order or descending arrangement, generates sequence Y of new labelling subscript position, by sequence Y come Determine that the value in sequence T carries out XOR with the pixel value of each pixel, complete image encryption.
Further, if the size of plaintext image is a × b in step S1, plaintext image is divided into j × k blocks, wherein, point The computing formula of block size is
Further, the computing formula of chaotic parameter S is s=(a+b+sum/ (a*b))/(a*a+b*b) in step S2, is mixed The computing formula of the iterationses c of ignorant system is c=mod (a*a+b*b, a+b)+2a+b.
Further, step S5 includes step:
S51:By chaos sequence M={ m1,m2,m3…ma*bBe converted to sequence T={ t1,t2,t3…ta*b, its conversion method For:T=mod (mi×108,256)1≤i≤a×b;
S52:Ascending order or arrangement are carried out to the sequential value in chaos sequence N, record sequence after sequential value in original series In subscript value, generate new sequence Y={ y1,y2,y3…ya×b};
S53:By sequence Y to determine sequence T in the pixel value of value and each pixel carry out XOR, computing Formula isWherein ii' for pixel new pixel value, iiFor pixel original pixel value.
The beneficial effects of the present invention is, compared with prior art, the present invention is greatly improved the safety of image encryption Property, statistics characteristic analysis, opposing can be effective against in plain text or ciphertext only attack, resisting differential are attacked, while can with excellent Inverse property, it is ensured that the concordance of the image after decryption and initial plaintext.
Description of the drawings
Fig. 1 is the present invention based on double chaos systems and the image encryption method flow chart of piecemeal.
Fig. 2 is original image.
Fig. 3 is images of the Fig. 2 after method of the present invention encryption.
Fig. 4 is the rectangular histogram of the original image in Fig. 2.
Fig. 5 is the rectangular histogram of image after the encryption in Fig. 3.
Fig. 6 is the distribution situation of the pixel of Fig. 2.
Fig. 7 is the distribution situation of the pixel of Fig. 3.
Fig. 8 is the decrypted image of normal decryption.
Fig. 9 is that the decrypted image after minor alteration is carried out to initial value.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than the embodiment of whole.It is based on Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of creative work is not made Embodiment, belongs to the scope of protection of the invention.
Refer to Fig. 1, the present invention is a kind of based on double chaos systems and the image encryption method of piecemeal, including step
S1:Piecemeal is carried out to plaintext image, piecemeal quantity is determined according to the key that plaintext is produced;
S2:Obtain the chaotic parameter and iterationses of chaos system;
S3:The chaotic parameter and iterationses are substituted into into Kent chaotic maps and generates chaos sequence, sequence is risen Sequence or descending are arranged, and respectively value produces labelled sequence in the subscript position of initiation sequence to record generic sequence, using labelled sequence pair Image after piecemeal rearranges combination, so that picture position overall scramble in units of block;
S4:For each block of plaintext image, obtain the chaotic parameter and iterationses of chaos system and substitute into Kent chaos Mapping generates chaos sequence, and ascending order or descending arrangement are carried out to chaos sequence, new subscript sequence is generated, using subscript sequence pair Pixel in block carries out position scramble;
S5:Picture element matrix after the scramble of position is converted into into one-dimensional sequence, the non-linear of logistic chaos systems is set The initial value of intensive parameter and two logistic chaos systems, is generated the one-dimensional sequence using logistic chaotic maps Two the chaos sequence Ms and N consistent with number of pixels, by chaos sequence M sequence T of the codomain between [0,255] is converted into, will Sequential value in chaos sequence N carries out ascending order or descending arrangement, generates sequence Y of new labelling subscript position, by sequence Y come Determine that the value in sequence T carries out XOR with the pixel value of each pixel, complete image encryption.
Kent mappings are the good chaos systems of performance, and its mapping relations is:
Wherein S is the control parameter of chaos system, and as x ∈, (0,1), (0, Kent chaotic maps have one just to S ∈ when 1) Lyapunov indexes, now Kent mappings will generate the acyclic and chaos sequence do not restrained.
Logistic mappings are a typical one-dimensional discrete Chaos dynamic systems, and its birth stems from demographics, Its concrete rule can use following mathematical formulae to define:
xn+1=μ xk(1-xk) (2)
Wherein μ is the parameter of mission nonlinear intensity, and its span is 0≤μ≤4, and k is secondary for the iteration of chaos system Number, xkFor the initial value of logistic chaos systems, its span is 0 < xk< 1.When 3.569≤μ≤4, the system mapping In chaos state, system now can be all caused to produce diverse non-convergent, acyclic to the minor alteration of initial value Sequence.
The size for assuming image I to be encrypted is a × b, and the present invention's concretely comprises the following steps:
S1:The picture element matrix of image I is carried out into isometric division according to its row and column, arrange the size for dividing be respectively j and K, wherein
Specific division rule is as follows:
Rule one:When mod (a, j)=0, mod (b, k)=0, image I is then divided into j × k blocks, the pixel per block Number is
Rule two:When mod (a, j) ≠ 0, mod (b, k)=0, image I is then divided into the different block of two classes, a class block Size isAnother kind of piece of size is
Rule three:When mod (a, j)=0, mod (b, k) ≠ 0, image I is then divided into the different block of two classes, a class block Size isAnother kind of piece of size is
Rule four:When mod (a, j) ≠ 0, mod (b, k) ≠ 0, image I is then divided into the different block of two classes, a class block Size isThe size of one class block isThe size of one class block isLast block it is big It is little for mod (a, j) × mod (b, k);
S2:Assembled arrangement again is carried out to piecemeal.
S21:First summation operation is carried out to the pixel value sum of the block plaintext image, then using formula (5) and public affairs respectively Formula (6) obtains the chaotic parameter S of the chaos system and iterationses c. of chaos system
S=
(a/j+b/k+sum/(a/j×b/k))/(a/j×a/j+b/k×b/k) (5)
S22:Parameter is substituted into into Kent chaos systems iteration c time to eliminate transient effect, from the c+1 time start recording, is given birth to Into length for j × k chaos sequence lj×k={ l1,l2,l3…lj×k}。
S23:Sequence to generating carries out ascending order (descending) arrangement, generates a record ordering presequence in generic sequence position The subscript labelled sequence put, is recorded as pj×k={ p1, p2, p3…pj×k};
S24:Position scramble is carried out to the position of each piecemeal, its scramble rule is as followsTake this Step causes each pixel position of plaintext to change by unit significance of block so that the dependency between adjacent block is deteriorated, So as to prepare for location of pixels scramble in ensuing piece.
S3:The scramble of location of pixels
The dependency further destroyed between neighbor pixel by upsetting the home position of image pixel.With block as list Each piece of interior pixels are clicked through line position scramble by position respectively, and concrete operations are as follows:
S31:To image to be encrypted in plain text according to (OK) preferential sequential scan is arranged, transforming into length is's One-dimensional sequence
S32:With reference to the chaotic parameter S that S21 draws, an initial value x is arranged to chaos system1, by parameter S and initial value x1In being updated to formula (1).Kent maps the c harmful effect to slacken transient effect of iteration.Following iteration againIt is secondary Producing a length isChaos sequenceChaos sequence is entered with sort algorithm Row order is arranged, so as to generate the sequence of a new position in former sequence H of each element recorded in generic sequence again
S33:Using sequence w come scramble plaintext image I, the interdependent rule of scramble isAfter scramble Sequential recording is:
H '={ h 'i,h′i,h′i…h′a×b}
Again line shuffle is entered to each piecemeal according to same operation, wherein the initial value of chaos system is in x1On the basis of every time Automatically Jia 0.00011, according to chaos system to this distinguishing feature of the sensitivity of initial value, to produce diverse chaos sequence Row.
S4:The pixel value of image is replaced, and using logistic mappings chaos sequence is generated.
In order to reduce encryption expenses, the stage no longer will be replaced in units of block, but directly by after piecemeal scramble Image be integrally replaced operation.
S5:The initial value x of setting chaos system2,x3, and systematic parameter λ.By x2,x3In being brought into formula 2 respectively, repeatedly For 1000 times to eliminate transient effect, record is proceeded by from the 1001st time, generate two sequences M=of the length scale for a*b {m1,m2,m3…ma*b, N={ n1,n2,n3…na*b}。
S51:Each sequential value in sequence M is substituted into into formula (5) to be converted, allows its codomain to control between [0,255], newly The chaos sequence of generation is changed to T={ t1,t2,t3…ta*b}。
T=mod (mi×108,256)1≤i≤a×b (5)
S62:Sequential value in sequence N is carried out ascending order (descending) arrangement, record sequence after sequential value in original series In subscript value, generate new sequence Y={ y1,y2,y3…ya×b}。
S53:Pixel value and sequence T are carried out into xor operation, the rule of its XOR is as follows:
Operation above is the overall process of whole encryption.
Experimental analysiss
Experimental situation
The test platform that this experiment is adopted for:
Intel (R) Core (TM) i5CPU dominant frequency 2.67GHz, inside saves as 4.0GB.
Win10 operating systems.
Picture adopts 256 × 256 gray scale Lena figure simulation software MATLAB 2015a.
Experiment content
Fig. 2 and Fig. 3 are original image and the image after encryption, and the image after encryption is fully and completely concealed in plain text, intuitively On cannot obtain any with the information that is associated of plaintext.
Fig. 4 and Fig. 5 are the histogrammic distribution situations of image after original image and encryption, are found through contrast, before encryption Pixel distribution it is uneven, greatly expose the distribution situation of image pixel, and take the figure after the algorithm for encryption of the present invention The rectangular histogram of picture is presented and is uniformly distributed, the good Pixel Information for concealing original image.
Fig. 6 and Fig. 7 are the distribution situations of the pixel before and after encryption, it can easily be seen that the neighbor before encryption from figure Dependency is stronger between point, and the pixel distribution after encryption is uniform, understands that the relative coefficient of pixel is very little by calculating.
Fig. 8 and Fig. 9 are normal decryption and carry out the decrypted image after minor alteration to initial value.Can be with bright from experimental result Even if aobvious find out that the change of initial key is extremely small, its impact to result is also thoroughly.Key after minor alteration without Method obtains correct cleartext information, further demonstrates the reliability for resisting ciphertext only attack of the algorithm.Meanwhile, sufficiently large is close Key space also ensure that the impossibility of exhaustive attack.
From experimental analysiss it will be seen that algorithm for encryption principle proposed by the present invention is simple, ciphering process is reversible, can The ciphertext graph picture after decryption again is completely secured to be consistent with initial plaintext.Meanwhile, take this algorithm to carry out image encryption, no The key that same plaintext is generated is different.This algorithm also meets the plaintext dependency of key so that picture transfer process can be resisted Plaintext or cipher text is attacked.In addition, also having ensured that what the ciphertext after this algorithm for encryption can be good resists statistics between sufficiently large key Analysis, act attack etc..It is encrypted using this algorithm and is enough to improve safety and key of the image during transmission on Internet Sensitivity.
The above is the preferred embodiment of the present invention, it is noted that for those skilled in the art For, under the premise without departing from the principles of the invention, some improvements and modifications can also be made, these improvements and modifications are also considered as Protection scope of the present invention.

Claims (4)

1. it is a kind of based on double chaos systems and the image encryption method of piecemeal, it is characterised in that including step
S1:Piecemeal is carried out to plaintext image, piecemeal quantity is determined according to the key that plaintext is produced;
S2:Obtain the chaotic parameter and iterationses of chaos system;
S3:The chaotic parameter and iterationses are substituted into into Kent chaotic maps and generate chaos sequence, sequence is carried out ascending order or Descending is arranged, and respectively value produces labelled sequence in the subscript position of initiation sequence to record generic sequence, using labelled sequence to piecemeal Image afterwards rearranges combination, so that picture position overall scramble in units of block;
S4:For each block of plaintext image, obtain the chaotic parameter and iterationses of chaos system and substitute into Kent chaotic maps Chaos sequence is generated, ascending order or descending arrangement are carried out to chaos sequence, new subscript sequence is generated, using in subscript sequence pair block Pixel carry out position scramble;
S5:Picture element matrix after the scramble of position is converted into into one-dimensional sequence, the nonlinear strength of logistic chaos systems is set The initial value of parameter and two logistic chaos systems, two are generated using logistic chaotic maps by the one-dimensional sequence The chaos sequence M and N consistent with number of pixels, is converted into sequence T of the codomain between [0,255], by chaos by chaos sequence M Sequential value in sequence N carries out ascending order or descending arrangement, generates sequence Y of new labelling subscript position, is determined by sequence Y Value in sequence T carries out XOR with the pixel value of each pixel, completes image encryption.
2. as claimed in claim 1 based on double chaos systems and the image encryption method of piecemeal, it is characterised in that in step S1 If the size of plaintext image is a × b, plaintext image is divided into j × k blocks, wherein, the computing formula of piecemeal size is
j = mod ( a × b a + b , 16 ) + 3 , k = mod ( a × b a + b , 16 ) + 3.
3. as claimed in claim 1 based on double chaos systems and the image encryption method of piecemeal, it is characterised in that in step S2 The computing formula of chaotic parameter S is s=(a+b+sum/ (a*b))/(a*a+b*b), and the calculating of the iterationses c of chaos system is public Formula is c=mod (a*a+b*b, a+b)+2a+b.
4. as claimed in claim 1 based on double chaos systems and the image encryption method of piecemeal, it is characterised in that step S5 bag Include step:
S51:By chaos sequence M={ m1,m2,m3…ma*bBe converted to sequence T={ t1,t2,t3a*b, its conversion method is:T =mod (mi×108,256)1≤i≤a×b;
S52:Ascending order or arrangement are carried out to the sequential value in chaos sequence N, record sequence after sequential value in original series Subscript value, generates new sequence Y={ y1,y2,y3…ya×b};
S53:By sequence Y to determine sequence T in the pixel value of value and each pixel carry out XOR, operational formula ForWherein ii' for pixel new pixel value, iiFor pixel original pixel value.
CN201610918185.3A 2016-10-21 2016-10-21 Image encryption method based on double-chaos system and blocking Pending CN106570815A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610918185.3A CN106570815A (en) 2016-10-21 2016-10-21 Image encryption method based on double-chaos system and blocking

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610918185.3A CN106570815A (en) 2016-10-21 2016-10-21 Image encryption method based on double-chaos system and blocking

Publications (1)

Publication Number Publication Date
CN106570815A true CN106570815A (en) 2017-04-19

Family

ID=60414254

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610918185.3A Pending CN106570815A (en) 2016-10-21 2016-10-21 Image encryption method based on double-chaos system and blocking

Country Status (1)

Country Link
CN (1) CN106570815A (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107239709A (en) * 2017-06-07 2017-10-10 广东工业大学 A kind of method of New chaotic image encryption, apparatus and system
CN107437005A (en) * 2017-07-18 2017-12-05 广东工业大学 A kind of Code obfuscation method and device based on the opaque predicate of chaos
CN108235060A (en) * 2018-03-12 2018-06-29 上海哔哩哔哩科技有限公司 Video-encryption playback method, system and the storage medium obscured based on parameter set
CN108665964A (en) * 2018-05-14 2018-10-16 江西理工大学应用科学学院 A kind of medical image wavelet field real-time encryption and decryption algorithm based on multi-chaos system
CN109995504A (en) * 2019-03-21 2019-07-09 南通大学 A kind of encryption and decryption approaches of character string
CN110012313A (en) * 2019-04-12 2019-07-12 中国民航大学 Feedback based on double chaos systems switches encryption method
CN110213552A (en) * 2019-06-25 2019-09-06 桂林电子科技大学 A kind of wide-band communication system for transmission of video
CN110535623A (en) * 2019-08-09 2019-12-03 广东浪潮大数据研究有限公司 A kind of image encryption method, device, equipment and readable storage medium storing program for executing
CN110677694A (en) * 2019-10-15 2020-01-10 华南理工大学 Video encryption method for resisting contour attack
CN111222147A (en) * 2019-11-19 2020-06-02 重庆师范大学 Image encryption method of new chaotic system based on adjacent orbit evolution
CN111832035A (en) * 2019-04-23 2020-10-27 北京掌慧纵盈科技股份有限公司 Image encryption storage method and device
CN112035847A (en) * 2019-06-03 2020-12-04 湖北微模式科技发展有限公司 Image encryption and decryption method and device, electronic equipment and storage medium
CN112330521A (en) * 2020-10-21 2021-02-05 南京航空航天大学 Image encryption method
CN115994373A (en) * 2023-03-22 2023-04-21 山东中联翰元教育科技有限公司 College entrance examination volunteer filling system data encryption method based on big data
CN116033089A (en) * 2023-03-31 2023-04-28 探长信息技术(苏州)有限公司 Remote intelligent monitoring method for security engineering

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103248854A (en) * 2013-04-27 2013-08-14 东北大学 Medical image encryption method based on uniform scrambling and chaotic mapping
CN104766264A (en) * 2015-01-22 2015-07-08 西北工业大学 Partitioning double-layer self-adaptation diffusion image encryption method
US20160098568A1 (en) * 2014-10-07 2016-04-07 Storagecraft Technology Corporation Client-side encryption in a deduplication backup system
CN105488426A (en) * 2015-11-30 2016-04-13 西安闻泰电子科技有限公司 Mobile platform image encryption method
US20160156970A1 (en) * 2014-11-27 2016-06-02 Handong Global University Industry- Academic Cooperation Foundation Fast processing and encryption method and system for compressed video

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103248854A (en) * 2013-04-27 2013-08-14 东北大学 Medical image encryption method based on uniform scrambling and chaotic mapping
US20160098568A1 (en) * 2014-10-07 2016-04-07 Storagecraft Technology Corporation Client-side encryption in a deduplication backup system
US20160156970A1 (en) * 2014-11-27 2016-06-02 Handong Global University Industry- Academic Cooperation Foundation Fast processing and encryption method and system for compressed video
CN104766264A (en) * 2015-01-22 2015-07-08 西北工业大学 Partitioning double-layer self-adaptation diffusion image encryption method
CN105488426A (en) * 2015-11-30 2016-04-13 西安闻泰电子科技有限公司 Mobile platform image encryption method

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
廖琪男: ""数字图像的通用加密算法"", 《计算机工程与设计》 *
王春淋等: ""基于分块置乱与扩散的分数阶混沌彩色图像加密算法"", 《河南大学学报(自然科学版)》 *
谢国波等: ""基于像素置乱和比特替换的混沌图像加密算法"", 《微电子学与计算机》 *

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107239709A (en) * 2017-06-07 2017-10-10 广东工业大学 A kind of method of New chaotic image encryption, apparatus and system
CN107239709B (en) * 2017-06-07 2020-08-11 广东工业大学 Chaotic image encryption method, device and system
CN107437005A (en) * 2017-07-18 2017-12-05 广东工业大学 A kind of Code obfuscation method and device based on the opaque predicate of chaos
CN107437005B (en) * 2017-07-18 2020-07-10 广东工业大学 Code obfuscation method and device based on chaotic opaque predicates
CN108235060A (en) * 2018-03-12 2018-06-29 上海哔哩哔哩科技有限公司 Video-encryption playback method, system and the storage medium obscured based on parameter set
CN108235060B (en) * 2018-03-12 2020-06-26 上海哔哩哔哩科技有限公司 Video encryption playing method, system and storage medium based on parameter set confusion
CN108665964A (en) * 2018-05-14 2018-10-16 江西理工大学应用科学学院 A kind of medical image wavelet field real-time encryption and decryption algorithm based on multi-chaos system
CN108665964B (en) * 2018-05-14 2022-01-25 江西理工大学应用科学学院 Medical image wavelet domain real-time encryption and decryption algorithm based on multiple chaotic systems
CN109995504B (en) * 2019-03-21 2022-02-08 南通大学 Encryption and decryption method for character string
CN109995504A (en) * 2019-03-21 2019-07-09 南通大学 A kind of encryption and decryption approaches of character string
CN110012313A (en) * 2019-04-12 2019-07-12 中国民航大学 Feedback based on double chaos systems switches encryption method
CN111832035A (en) * 2019-04-23 2020-10-27 北京掌慧纵盈科技股份有限公司 Image encryption storage method and device
CN112035847B (en) * 2019-06-03 2023-10-27 湖北微模式科技发展有限公司 Image encryption and decryption methods and devices, electronic equipment and storage medium
CN112035847A (en) * 2019-06-03 2020-12-04 湖北微模式科技发展有限公司 Image encryption and decryption method and device, electronic equipment and storage medium
CN110213552A (en) * 2019-06-25 2019-09-06 桂林电子科技大学 A kind of wide-band communication system for transmission of video
CN110535623A (en) * 2019-08-09 2019-12-03 广东浪潮大数据研究有限公司 A kind of image encryption method, device, equipment and readable storage medium storing program for executing
CN110677694A (en) * 2019-10-15 2020-01-10 华南理工大学 Video encryption method for resisting contour attack
CN111222147A (en) * 2019-11-19 2020-06-02 重庆师范大学 Image encryption method of new chaotic system based on adjacent orbit evolution
CN111222147B (en) * 2019-11-19 2023-03-28 重庆师范大学 Image encryption method of new chaotic system based on adjacent orbit evolution
CN112330521A (en) * 2020-10-21 2021-02-05 南京航空航天大学 Image encryption method
CN112330521B (en) * 2020-10-21 2024-07-05 南京航空航天大学 Image encryption method
CN115994373A (en) * 2023-03-22 2023-04-21 山东中联翰元教育科技有限公司 College entrance examination volunteer filling system data encryption method based on big data
CN116033089A (en) * 2023-03-31 2023-04-28 探长信息技术(苏州)有限公司 Remote intelligent monitoring method for security engineering
CN116033089B (en) * 2023-03-31 2024-02-06 探长信息技术(苏州)有限公司 Remote intelligent monitoring method for security engineering

Similar Documents

Publication Publication Date Title
CN106570815A (en) Image encryption method based on double-chaos system and blocking
Chai An image encryption algorithm based on bit level Brownian motion and new chaotic systems
Sheela et al. Image encryption based on modified Henon map using hybrid chaotic shift transform
Pak et al. A new color image encryption using combination of the 1D chaotic map
Zhou et al. Quantum image encryption scheme with iterative generalized Arnold transforms and quantum image cycle shift operations
Seyedzadeh et al. A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map
Zhu et al. An image encryption algorithm based on compound homogeneous hyper-chaotic system
Zhang et al. A new image encryption algorithm based on non-adjacent coupled map lattices
Gong et al. Quantum image encryption algorithm based on quantum image XOR operations
Ye et al. An image encryption scheme based on time-delay and hyperchaotic system
Norouzi et al. A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos
Sun et al. A novel image encryption scheme based on spatial chaos map
Bigdeli et al. A novel image encryption/decryption scheme based on chaotic neural networks
Rehman et al. A new image encryption scheme based on dynamic s-boxes and chaotic maps
Kumar et al. IEHC: An efficient image encryption technique using hybrid chaotic map
Wang et al. A chaotic image encryption algorithm based on improved Joseph traversal and cyclic shift function
Wang et al. A novel block cryptosystem based on the coupled chaotic map lattice
Lai et al. A cross-channel color image encryption algorithm using two-dimensional hyperchaotic map
CN105049400A (en) Splitting S-boxes in a White-Box implementation to resist attacks
CN107330338B (en) Color image encryption and decryption method and system based on double-chaos cross diffusion
Zheng et al. A novel image encryption scheme based on Hénon map and compound spatiotemporal chaos
Wang et al. A novel pseudo-random coupled LP spatiotemporal chaos and its application in image encryption
CN114679250B (en) Image encryption algorithm based on mixed chaos and Arnold transformation
Lone et al. A novel image encryption using random matrix affine cipher and the chaotic maps
Bouslehi et al. Innovative image encryption scheme based on a new rapid hyperchaotic system and random iterative permutation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170419