Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

46results about How to "Expand the key space" patented technology

Color digital image encryption method based on 2D-VMD and eight-dimensional hyperchaotic system

The invention provides a color digital image encryption method based on 2D-VMD and an eight-dimensional hyperchaotic system, and belongs to the technical field of information security. The problems ofpoor security, small key space and breaking easiness of the existing color digital image encryption methods are solved. The technical points are as follows: separating red, green and blue componentsof a color plaintext image; randomly selecting an initial value of the system, updating and calculating parameters and the initial value of the eight-dimensional hyperchaotic system by using the colorplaintext image, performing iteration on the hyperchaotic system to generate two key sequences with high randomness; separately decomposing the red, green and blue components by using a 2D-VMD method, separately performing pixel position scrambling and pixel value diffusion encryption on sub-images obtained by decompression, finally obtaining color ciphertext images of corresponding decompositionlayers, and decrypting the color ciphertext images. Compared with the existing encryption methods, the color image encryption algorithm provided by the invention has a significant increase in key space and can effectively resist multiple attacks.
Owner:HARBIN UNIV OF SCI & TECH

Image encryption method based on projection synchronization of hyperchaotic system

The invention discloses an image encryption method based on the projection synchronization of a hyperchaotic system. The method comprises the steps of plaintext image quantifying and ciphertext image quantifying. The first step comprises generating of a hyperchaotic sequence of a hyperchaotic driving system, image row scrambling, image column scrambling, image diffusing, circulation image row scrambling, image column scrambling, multiple rounds of image diffusing, and a ciphertext image is acquired. The second step comprises ciphertext image quantifying, generating of a hyperchaotic sequence of a hyperchaotic response system, time acquiring, column scrambling index and line scrambling index valuing, image inverse diffusing, image inverse column scrambling, image inverse row scrambling, circulation image inverse diffusing, image inverse column scrambling, multiple rounds of image inverse row scrambling, and a decrypted image is acquired. According to the invention, a feedback mechanism with the current image is introduced; the row (column) scrambling address code and the key matrix are dynamically changed in each round of encryption; experiments show that the method has the advantages of good encryption effect, high security and large key space, can resist selected plaintext attacks, known plaintext attacks and various statistical attacks.
Owner:SHAANXI NORMAL UNIV

Hyper-chaotic encryption method based on Josephf traversal and bit plane reconstruction

The invention provides a hyper-chaotic encryption method based on Josephf traversal and bit plane reconstruction. The hyper-chaotic encryption method comprises the following steps: converting a grayscale image into an image matrix; inputting the image matrix into an SHA-256 algorithm as a secret key, and obtaining initialization parameters according to the secret key; substituting the initialization parameters into a hyper-chaotic Lorenz system for iteration to generate four chaotic sequences, processing one chaotic sequence to serve as a variable step size sequence, performing pixel positionscrambling on a one-dimensional sequence of an image matrix by utilizing an improved Josephf traversal method, and rearranging a pixel scrambling matrix; dividing the pixel scrambling matrix into eight bit planes, and performing bit plane reconstruction on the pixel scrambling matrix by using the other three chaotic sequences and a bit plane reconstruction method to generate a bit plane reconstruction image matrix; and diffusing the bit plane reconstruction image matrix to generate a final encrypted image. According to the method, different types of images can be encrypted into uniformly distributed encrypted images, and the method has very sensitive key sensitivity and can resist various attacks.
Owner:ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY

Chaotic key distribution system and method based on dispersion keying synchronization

The invention belongs to the technical field of secret communication. The invention in particular relates to a chaotic key safety distribution system and method based on dispersion keying synchronization. The problems in the background technology are solved. The system comprises a first DFB laser 1, a first 1*2 optical fiber coupler 2, a CFBG chirped fiber bragg grating 3, a second 1*2 optical fiber coupler 4, a communication party A and a communication party B. Each of the communication party A and the communication party B comprises an optical fiber circulator, an optical switch, a memory,a first dispersion module, a second dispersion module, a photoelectric detector, an analog-to-digital converter and a bit filter. When the optical switch is switched, a random sequence of dispersion feedback can be directly obtained, involved key distribution is not influenced by synchronous recovery time, and the key distribution rate is improved; and, meanwhile, the chaotic light state of the first DFB laser is changed through dispersion feedback, so that the chaotic light directly emitted by the first DFB laser is not related to the chaotic light after dispersion feedback, and the securityof key distribution is enhanced by using nonlinear characteristics.
Owner:TAIYUAN UNIV OF TECH

Color image encryption and decryption method and system based on double-chaos cross diffusion

The invention discloses a color image encryption and decryption method and system based on double-chaos cross diffusion. Firstly, parameters of Logistic and ChebyShev iteration are randomly generated, initial secret keys needed by Logistic and ChebyShev iteration are input, after a transit state is eliminated through multiple times of iteration, Logistic and ChebyShev are used for carrying out iteration three times respectively, iteration results serve as initial secret keys used during encryption respectively, and therefore secret key space is actually increased. Then a pixel point in an image is taken, if the value corresponding to the position of the pixel point is an odd number, an encryption key is obtained through ChebyShev iteration, or else the encryption key is obtained through Logistic iteration, and therefore the dependency between adjacent pixel points is reduced. Then R, G and B channels of the pixel point and R', G' and B' of the former encrypted pixel point are subjected to difference or operation for diffusion. The iteration frequency is reduced on the premise of guaranteeing safety, the encryption time can be shortened, efficiency is improved, and the method and system are especially suitable for image encryption of mobile equipment such as mobile phones and tablet computers with the high real-time performance requirement.
Owner:HENGYANG NORMAL UNIV

Cellular automata and chaotic mapping-based digital image encryption method and decryption method thereof

InactiveCN106373082AHas chaotic propertiesChaotic characteristics are goodImage data processing detailsComputer visionExclusive or
The invention provides a cellular automata and chaotic mapping-based digital image encryption method and a decryption method thereof. The encryption method includes the following steps that: a 288-bit key is utilized to generate chaotic mapping parameters and cellular automaton evolution rules which are required by an encryption algorithm; pre-processing such as three-dimensional decomposition and blocking, is carried out on an original image; 3D chaotic mapping is adopted to scramble pixel positions; cross-exclusive-OR operation is performed on image blocks to be encrypted; and a 2D second-order cellular automata used for generating boundaries, which is provided by the present invention, is utilized to carry out iterative encryption on an unfolded plaintext, pixels are mixed, and iteration is repeated until an iteration requirement is satisfied; and reverse pre-processing is carried out, and blocked ciphertext images are combined into a ciphertext image.
Owner:SUN YAT SEN UNIV

Multi-image encryption menthod based on DNA encoding and Chenchao chaos

The invention discloses a multi-image encryption method based on DNA encoding and Chenchao chaos, and belongs to the field of information encryption. At present, the network batch image transmission and storage become more and more often in daily life, the invention provides the multi-image encryption method based on DNA encoding and Chenchao chaos protecting the content security of multiple interacted images. The method comprises the following steps: firstly performing DNA encoding on k images, and forming a big image; secondly, scrambling the bit image by using chaos sequences produced by using the Chenchao chaos; thirdly, performing the DNA computation on the scrambled big image and the chaos sequence so as to accomplish the diffusion; and finally performing DNA decoding on a diffusionresult to obtain k encrypted images. The experiment shows that the algorithm can simultaneously encrypt multiple interacted images, the secret key space is large, the secret key sensitivity is strong,and the security is high.
Owner:CHINA UNIV OF MINING & TECH

Hybrid chaotic virtual optical image encryption method

The invention discloses a hybrid chaotic virtual optical image encryption method, which comprises the following steps of: 1, assuming that the size of a plaintext image is M * N, and sequentially reading pixel values of each point of the image from left to right to obtain a pixel matrix F (x, y); step 2, performing phase encoding on the plaintext image F (x, y) to obtain Q (x, y); step 2, modulating Q (x, y) through a random phase template RM1 to obtain F1 (x, y); step 3, carrying out Fourier transform on F1 (x, y), and carrying out random phase template RM2 modulation to obtain F2 (alpha, y);step 4, carrying out inverse Fourier transform on F2 (alpha beta) to obtain a ciphertext image U1; and step 5, performing secondary encryption of pixel value substitution on U1 (x, y) to obtain a ciphertext image U2. According to the invention, a coparametric generalized Fibonacci chaotic system and a coupled tent space-time chaotic system are adopted to respectively construct random templates with good uniformity; therefore, the two chaotic systems have a linkage effect, the defect that the distribution of random template elements constructed by the Logistic chaotic system is not uniform isovercome, and the hiding property on a ciphertext and the sensitivity on a secret key are enhanced.
Owner:QIQIHAR UNIVERSITY

Method and device for realizing Shield block cipher generated by novel secret key and readable storage medium

The invention discloses a method and a device for realizing a Shield block cipher generated by a novel secret key, and a readable storage medium. According to the method, the Shield grouping length isdesigned to be 128 bits, a secret key is any length, an encryption round function is based on an SPN structure, and the encryption sequence is round secret key addition, S box replacement, row shifting and column hybrid transformation in sequence. The secret key expansion function divides an original secret key into three parts, generates three round secret keys by using a hash function MD5, anduses the round secret keys in different rounds of addition operation. According to the S box replacement transformation, 128-bit data replacement transformation is carried out by adopting two 4 * 4 Sboxes; the data are divided into 32 4-bit units; and along with the change of encryption/decryption rounds, the data units respectively carry out corresponding S box increasing/decreasing replacementoperation. According to the invention, the occupied area resource of the Shield cipher is small; the storage space for storing the original secret key is reduced; and the known attack can be well resisted by increasing the length of the secret key and expanding the secret key space.
Owner:HENGYANG NORMAL UNIV

Multiple image encryption method based on pwlcm chaos

A multi-image encryption method based on piecewise linear chaotic map (PWLCM) belongs to the field of information encryption, and aims to solve the problems that most of the conventional image encryption methods take a single image as an encryption object, and cannot adapt to mass image encryption, and the encryption efficiency of the conventional image encryption methods is relatively low. Being different to the conventional image encryption methods, the multi-image encryption method takes multiple images as encryption objects, and adopts the steps of converting the multiple images into a single large image, encrypting the single large image, and converting the encrypted single large image into multiple encrypted images, so as to protect contents in the multiple images. The multi-image encryption method comprises the key steps of combining k interactive images into a large image, encrypting the large image according to PWLCM to obtain an encrypted large image, dividing the encrypted large image into k encrypted images, and naming the k encrypted images sequentially according to a chaotic sequence generated based on PWLCM. Test results show that the method is easy to implement, the encryption effect is favorable, the encryption efficiency and security are high, and communication security of contents of any multiple images can be protected simultaneously.
Owner:CHINA UNIV OF MINING & TECH

Video image encryption method based on cascade chaotic technology

The invention relates to a video image encryption method based on a cascade chaotic technology. The method comprises a construction encryption process and a decryption process of a key space, and comprises the following steps of: firstly, constructing a cascade chaotic mapping, and generating the key space required by encryption and decryption by using the mapping; then, directly reading an existing video file in a computer disk, or calling a camera to acquire a video image, obtain an image sequence of each frame, compress an original image of each frame to obtain data information of the images, and performing encryption and decryption to obtain color images and R, G and B components before and after encryption and decryption; and therefore, the video data stream before and after final encryption and decryption can be obtained. The method has good practicability for video image encryption, and the problem that an existing chaotic encryption method is small in Lyapunov index, so that the sensitivity of a system to an initial value is not high is solved; and the chaotic mapping interval is small, so that the key space is small, and the sequence security is low.
Owner:SHANDONG UNIV OF SCI & TECH

JPEG image encryption method based on similar coefficient scrambling

The invention relates to an intra-class coefficient scrambling-based JPEG image encryption method. The method comprises the following steps: firstly reading in a JPEG image file, acquiring a Huffman coding table and image data which undergoes JPEG coding compression, carrying out decoding to acquire all the non-zero quantized DCT coefficient numerical values and positions and carrying out classification; selecting a password, carrying out chaotic iteration by utilizing the password, so as to generate a chaotic sequence, and scrambling the non-zero coefficients and 8*8 block of each class by utilizing the chaotic sequence; and carrying out entropy coding on a scrambled quantized DCT coefficient matrix, and writing the coded data into the JPEG image file so as to complete intra-class coefficient scrambling-based JPEG image encryption. According to the method disclosed in the invention, scrambling is carried out on different classes of quantized DCT coefficients through the chaotic sequence, and the quantized DC coefficients and the non-zero AC coefficients are processed by directly using one encryption scheme, so that the safety and the high efficiency are both considered; and the encrypted images are similar to clear text image files in the aspect of size, and have high compression ratios.
Owner:CHANGAN UNIV

A large key space chaotic optical communication transceiver

The present invention is a chaotic optical communication transceiver with a large key space, which belongs to the technical field of secure optical communication; the key space is increased by increasing the number of external cavities, the structure is complex, and it is susceptible to environmental interference, and the pseudo-random code modulation increases the key space and cannot play chaos The unique hardware encryption advantage of secure communication increases the complexity of the feedback loop and increases the key space, which is expensive and inconvenient for integration and large-scale production; the present invention provides a chaotic optical communication transceiver with a large key space, and the key space is DFB semiconductor The laser feedback intensity, driving current and key parameters of the random filter module are combined. The random filter module replaces the traditional feedback mirror to realize the random selection function after the optical path range is encoded to the spectrum, which greatly improves the key space of the chaotic optical communication transceiver and meets the legal requirements. The confidential communication of users increases the difficulty of stealing by illegal users, effectively hides delay characteristics, ensures hardware consistency, facilitates chaotic synchronization, and facilitates large-scale production.
Owner:TAIYUAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products