Cellular automata and chaotic mapping-based digital image encryption method and decryption method thereof

A technology of chaotic mapping and encryption method, which is applied in image data processing, image data processing, instruments, etc., and can solve problems such as not satisfying real-time performance, potential safety hazards, and increasing time

Inactive Publication Date: 2017-02-01
SUN YAT SEN UNIV
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Digital image encryption is different from traditional data encryption. It mainly has the following characteristics: (1) Digital images represent information with their visual images, so they have a larger amount of information than text information. Therefore, it takes more time to encrypt it using classical encryption algorithms. For a long time, the encryption efficiency is not high
(2) Digital images are stored in the data format of a two-dimensional matrix. When encrypting them, most algorithms cannot use this feature for parallel processing, but need to perform preprocessing, rearrangement and other operations, which greatly increases the time. Reduced encryption efficiency
(3) Unlike text and other information, images allow a certain degree of distortion during encryption and decryption due to their visual characteristics
[0005] At present, traditional scrambling algorithms such as Arnold mapping, Baker mapping, and Magic mapping have very simple scrambling operations, so it takes multiple scrambling operations to achieve the desired scrambling effect; secondly, because the scrambling operation does not change The value of each pixel, so its statistical characteristics will not change, and this brings a great security risk; the scheme of digital image encryption using chaotic map, its keys are mostly short, and it is difficult to deal with brute force cracking. In addition, the single use of chaotic maps as encryption means, its relative confusion is not high enough, and it is relatively easy to break in the face of chosen plaintext attacks; most schemes using cellular automata for digital image encryption require a high number of iterations. The number of encryption rounds is large, the encryption efficiency is low, and the real-time performance is not satisfied

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cellular automata and chaotic mapping-based digital image encryption method and decryption method thereof
  • Cellular automata and chaotic mapping-based digital image encryption method and decryption method thereof
  • Cellular automata and chaotic mapping-based digital image encryption method and decryption method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0061] Such as figure 1 , a digital image encryption method based on cellular automata and chaotic maps, its basic process is:

[0062] (1) Key generation stage;

[0063] (2) Image preprocessing stage;

[0064] (3) Pixel position scrambling stage;

[0065] (4) The evolution stage of cellular automata;

[0066] (5) Judging the condition of the number of iterations according to step (4), and outputting the result.

[0067] The steps (1) to (5) are described in detail below:

[0068] The step of described step (1) is as follows:

[0069] key generation stage. A binary bit stream with a length of 288 bits is selected as the key, which is used to generate the coefficients of the 3D chaotic map, the number of iterations and the rule number of the evolution rules of cellular automata. The key generation algorithm is as follows: the first 7×32 bits, each 32 bits represent an integer, which are respectively used as the six coefficients of the 3D chaotic map (a x a y a z b x ...

Embodiment 2

[0110] Such as Figure 4 , the basic process of a confidential method of digital image encryption method based on cellular automata and chaotic maps is:

[0111] (1) Key generation stage;

[0112] (2) Image preprocessing stage;

[0113] (3) Pixel reverse iteration stage;

[0114] (4) Chaos map reverse operation stage;

[0115] (5) Steps (3) and (4) are executed cyclically, the condition of the number of iterations is judged, and the result is output.

[0116] The steps (1) to (5) are described in detail below:

[0117] The step of described step (1) is as follows:

[0118] key generation stage. Using the same 288-bit binary stream key key as in the encryption stage, the parameters of the 3D chaotic map and the rule numbers of the 2D second-order cellular automata are generated in the same way as in the encryption stage.

[0119] The step of described step (2) is as follows:

[0120] Image preprocessing stage. The ciphertext image is chunked by preprocessing the image ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a cellular automata and chaotic mapping-based digital image encryption method and a decryption method thereof. The encryption method includes the following steps that: a 288-bit key is utilized to generate chaotic mapping parameters and cellular automaton evolution rules which are required by an encryption algorithm; pre-processing such as three-dimensional decomposition and blocking, is carried out on an original image; 3D chaotic mapping is adopted to scramble pixel positions; cross-exclusive-OR operation is performed on image blocks to be encrypted; and a 2D second-order cellular automata used for generating boundaries, which is provided by the present invention, is utilized to carry out iterative encryption on an unfolded plaintext, pixels are mixed, and iteration is repeated until an iteration requirement is satisfied; and reverse pre-processing is carried out, and blocked ciphertext images are combined into a ciphertext image.

Description

technical field [0001] The invention relates to the field of digital image processing, in particular to a digital image encryption and decryption method based on cellular automata and chaotic mapping. Background technique [0002] Digital images represent information with their visual effects, which have a large amount of data, high correlation between pixels, and high requirements for real-time encryption. Classical cryptography methods cannot meet this requirement well. Therefore, the technology for digital image encryption has attracted widespread attention of scholars, and has gradually become an important branch of cryptography. [0003] Digital image encryption is different from traditional data encryption. It mainly has the following characteristics: (1) Digital images represent information with their visual images, so they have a larger amount of information than text information. Therefore, it takes more time to encrypt it using classical encryption algorithms. In ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06T1/00
CPCG06T1/0021
Inventor 单汇丰陈炬桦
Owner SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products