Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Image encryption and decryption method for utilizing gray system theory to confirm ICA output

A gray system theory and encryption and decryption technology, applied in the field of image encryption and decryption, can solve problems such as the uncertain sequence of decrypted output images, imperfect structure of underdetermined matrices, and uncertain decrypted output sequence, and achieve unconditional security and confidentiality. The problem of uncertain image order and the effect of fast algorithm speed

Active Publication Date: 2013-11-27
NORTHWESTERN POLYTECHNICAL UNIV
View PDF1 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to overcome the deficiencies of the prior art, and aiming at the imperfect structure of the underdetermined matrix of the existing blind source separation image encryption method and the uncertain decryption output sequence, the present invention proposes an image encryption and decryption method using the gray system theory to determine the output of the ICA, Improve and expand the construction space of the existing underdetermined encryption matrix to further improve the encryption and decryption algorithm based on ICA. At the same time, it overcomes the shortcomings of traditional feature extraction methods that are not universal, and solves the problem of uncertain sequence of decrypted output images.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image encryption and decryption method for utilizing gray system theory to confirm ICA output
  • Image encryption and decryption method for utilizing gray system theory to confirm ICA output
  • Image encryption and decryption method for utilizing gray system theory to confirm ICA output

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0029] The specific implementation of the ICA-based image encryption and decryption method proposed by the present invention is as follows:

[0030] 1. Encryption algorithm:

[0031] The encryption end of the present invention adopts the symmetric encryption algorithm based on ICA to encrypt the plaintext image, assuming that the existing plaintext image J,

[0032](1) Row vector straightening is performed on J plaintext images respectively to obtain J one-dimensional row straightening vectors S 1 ,S 2 ,...,S J ;

[0033] (2) First randomly select an integer as one of the random data for generating the key seed, then randomly select one from the data in the computer CPU clock register as the second random data, and use the linear congruential algorithm to generate and step (1) J one-dimensional vectors K of the same dimension as the one-dimensional...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an image encryption and decryption method for utilizing the gray system theory to confirm ICA output. The method comprises the steps of adopting the symmetric encryption algorithm based on ICA to conduct encryption work; adopting the Fast ICA algorithm to solve figures at the encryption end. If the sequence of encryption output images is not confirmed, using main components to analyze main components of the images, using the component data of the main components as model building data of a gray model, conducting gray association analysis on the images, and conducting Deng-type gray correlation degree calculation so as to obtain the gray correlation degree of the images. Sequences with the largest gray correlation degree are corresponding clear images and decrypted images. Image characteristic extracted through the method are accurate, and characterized data volume is not influenced by image blocks and image patterns, identification data volume is small, the algorithm speed is fast, manual threshold setting is not needed for judgment, and the problem that the decrypted output image sequence is not confirmed is well solved.

Description

technical field [0001] The invention relates to the technical field of image information security, in particular to an image encryption and decryption method. Background technique [0002] With the rapid development of computer network and multimedia technology, image information is widely used in finance, e-commerce and government affairs, as well as various personal businesses. Image information security has become an important research topic in the field of information security technology. [0003] Image encryption is the most direct method to protect the security of image information. Image information itself has redundancy and correlation, which makes image encryption methods different from traditional cryptography methods, and most of the existing image encryption methods are computationally secure rather than unconditionally secure. With the continuous improvement of computer computing power, current computationally secure encryption methods cannot ensure its future...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04N1/32
Inventor 谢松云王颖谢玉斌
Owner NORTHWESTERN POLYTECHNICAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products