Image Encryption Method Based on Dynamic Key Selection of Hyperchaotic System

An encryption method and hyper-chaotic technology, which can be used in image data processing, image data processing, instruments, etc., and can solve problems such as poor randomness, image security loopholes, and dynamic key selection.

Active Publication Date: 2018-01-09
HENAN UNIVERSITY
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the currently used image encryption methods have the following problems: First, in the scrambling stage, most encryption algorithms lack the connection with the plaintext. Although some encryption algorithms consider the connection with the plaintext, when a certain pixel When a change occurs, the scrambling effect still cannot spread to the entire image, and the scrambling effect only affects the pixels behind the pixel change, so that the stealer can find the scrambling law through a simple comparison, which makes There are huge loopholes in the security of images; second, digital images are discrete finite point sets composed of pixels one by one, and will return to the original state after multiple times of scrambling and transformation, so as long as the stealer knows the encryption algorithm , it can be decrypted violently, and through multiple iterations, the plaintext image will be obtained within a limited number of steps; third, no matter in the scrambling stage or in the diffusion stage, for different images, as long as the initial value is the same as the control parameter , the key used for encryption is the same, the key cannot be dynamically selected according to the difference of plaintext pixels, and the corresponding chaotic system must generate the key in the scrambling and diffusion stages, which not only increases the system cost, and reduces the security of the image encryption method; fourth, in the past, the low-dimensional chaotic system is generally used to encrypt the image, and the chaotic sequence generated by the low-dimensional chaotic system is only formed through simple repeated iterations, and the security is not good enough. And the calculation accuracy of the computer may also lead to the chaotic sequence of the low-dimensional chaotic system having a relatively short periodicity and poor randomness, which provides a breakthrough for the cracking of the image
The Chinese patent application number 201310412691.1 discloses a color image encryption method based on chaotic sequence and hyperchaotic system. In the scrambling stage of image encryption, the method uses the chaotic sequence generated by the one-dimensional chaotic system to scramble the image pixels. The scrambling process lacks the connection with the plaintext. In the diffusion stage, the hyperchaotic system is used to generate the key used for diffusion, which increases the overhead of the system and increases the complexity of the hardware. Its security needs to be improved.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image Encryption Method Based on Dynamic Key Selection of Hyperchaotic System
  • Image Encryption Method Based on Dynamic Key Selection of Hyperchaotic System
  • Image Encryption Method Based on Dynamic Key Selection of Hyperchaotic System

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0062] Embodiment one, a kind of image encryption method based on the key dynamic selection of hyperchaotic system, comprises the following steps:

[0063] Step 1. Input a grayscale image with an image size of M×N, and arrange the pixels of the grayscale image into a one-dimensional image array P from left to right and from top to bottom;

[0064] Step 2. Use the hyperchaotic system to generate chaotic sequences, and group the chaotic sequences to obtain the grouping vector A i , i∈[0,5];

[0065] Step 3. In combination with the KSSG dynamic selection mechanism dependent on the plaintext, according to the variable index1=T1%6, i=index1, dynamically select A for generating the scrambling key i , T1 is the calculation formula based on plaintext pixels T1=mod(floor(y 0 ×10 8 ),M×N) calculated non-negative integers, where, a i Indicates the i-th element of the original image array P, max(a i ) means to take the maximum value in the array P, floor(x) means the largest intege...

Embodiment 2

[0070] Embodiment 2: To further introduce the technical solution of the present invention in combination with specific images, see figure 1 As shown, the programming software adopted in this embodiment is Matlab R2014a, select the attached Figure 8 The lena grayscale image shown in (a) with a size of 512×512 is the experimental object, and the process of encrypting the lena grayscale image is as follows:

[0071] 1. Input the lena grayscale image with the original size of 512×512, use I 0 =imread('lena.bmp') read image information. Then the image I 0 According to the order from left to right and from top to bottom, they are arranged into a one-dimensional image array, denoted as P.

[0072] 2. In this paper, Chen's hyperchaotic system is used to generate the encryption key, and its equation expression is as follows:

[0073]

[0074] Here a, b, c, d and k are the control parameters of the hyperchaotic system, when a=36, b=3, c=28, d=-16 and when k is in the interval [-...

Embodiment 3

[0180] Embodiment three: in the present embodiment, the programming software that adopts is Matlab R2014a, selects the attached Figure 11 The grayscale image of boats with a size of 256×205 shown in (a) is the experimental object, and the process of encrypting the image is as follows:

[0181] (1) Input the boats grayscale image with the original size of 256×205, use I 0 =imread('boats.bmp') read image information. Then the image I 0 According to the order from left to right and from top to bottom, they are arranged into a one-dimensional image array, denoted as P.

[0182] (2) Use the hyperchaotic system to generate chaotic sequences, and then group the chaotic sequences.

[0183] (3) Combining the plaintext-dependent KSSG dynamic selection mechanism and KS dynamic selection mechanism to generate a scrambling key, and perform forward scrambling encryption on the original plaintext image array P to obtain an image array, denoted as P1.

[0184] (4) Combining the KSSG dyna...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an image encryption method based on hyperchaotic system key dynamic selection, which mainly includes the following steps: arranging the original plaintext images into an image array P, and then using the hyperchaotic system to generate chaotic sequences and grouping them; combining the plaintext-dependent KSSG and KS dynamic selection mechanism to generate forward scrambling key K1, and perform forward scrambling on P to obtain P1; combine KSSG and KS mechanism to generate forward diffusion key K2, and perform forward diffusion on P1 to obtain P2; combine KSSG and KS The dynamic selection mechanism generates reverse scrambling key K3, reverse scrambles P2 to obtain P3; uses KSSG and KS dynamic selection mechanism to generate reverse diffusion key K4, performs reverse diffusion on P3 to obtain P4, and reorganizes P4 That is, the final ciphertext image is obtained. The above method increases the key space, makes the security, the encryption effect and the key sensitivity higher, the anti-attack ability is stronger, and it is easier to realize by hardware.

Description

technical field [0001] The invention relates to an image encryption method, in particular to an image encryption method based on dynamic key selection of a hyperchaotic system. Background technique [0002] Today, with the rapid development of smart devices, the Internet of Things, high-definition multimedia, and network technology, the transmission of most information in our lives, such as documents, audio, video, and especially image information, is inseparable from the support of the network. On the one hand, the network brings convenience to people's life, but on the other hand, some criminals will use the network to steal information, which brings great hidden dangers to people's information security, so the security and safety of information in the process of network transmission Confidentiality issues are also more and more people's attention and attention. Generally speaking, image information has the same characteristics, and they all have the characteristics of la...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06T1/00
Inventor 柴秀丽杨康王俊甘志华高育林程云龙
Owner HENAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products