Method for encrypting bit-level synchronous promiscuous diffusion images and pixel-level annular diffusion images

An encryption method, a pixel-level technology, applied in the field of image processing, which can solve the problems of low plaintext sensitivity of encryption method and weak ability to resist differential attacks.

Inactive Publication Date: 2018-07-24
NORTHWESTERN POLYTECHNICAL UNIV
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to propose a piecewise linear chaotic map (PiecewiseLinear Chaotic Map, PWLCM) bit-level synchronous scrambling diffusion and pixel-level annular diffusion image encryption method, this method has good encryption effect and strong anti-attack ability, and provides guarantee for safe storage and transmission of digital images

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for encrypting bit-level synchronous promiscuous diffusion images and pixel-level annular diffusion images
  • Method for encrypting bit-level synchronous promiscuous diffusion images and pixel-level annular diffusion images
  • Method for encrypting bit-level synchronous promiscuous diffusion images and pixel-level annular diffusion images

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] On a desktop computer with Intel(R) core(TM) i5-2400@3.10GHz and 4GB memory, based on the MATLABR2013a platform, four grayscale standard test images of Lena, Baboon, Couple and Peppers with a size of 256×256 and Lena , Peppers 2 color standard test images for encryption simulation experiments.

[0056] Take the Lena image with a size of 256×256 as an example, and set the key to [μ 1 , l 1 ,μ 2 , l 2 ]=[0.0123, 0.1234, 0.2345, 0.0234], explaining the specific encryption steps.

[0057] Step 1: Plaintext Image Preprocessing

[0058] 1) Convert the pixel matrix of the plaintext image Lena into a one-dimensional vector P={136, 136, 137, 132, ...} in the order of raster scanning. Given that M=N=256, calculate Therefore, M×N=S×S, no image reshaping is required.

[0059] 2) With Lena image pixel sum(I)=6401503, pixel XOR value xor(I)=3 as perturbation factor, perturb initial key μ according to formula (1) 1 , calculate μ 1 '=0.3027.

[0060] 3) Let the initial value...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for encrypting bit-level synchronous promiscuous diffusion images and pixel-level annular diffusion digital images. According to the method, bit-level encryption and pixel-level encryption are carried out on an image by utilizing a chaos sequence generated by piecewise linear chaotic map, so that ideal encryption effect can be obtained through one round of encryption. In the bit-level encryption stage, random blocking is carried out on the image by utilizing the chaos sequence to destroy the correlation of adjacent pixels, a low four-bit plane, a previous ciphertext pixel and a key stream are combined, synchronous promiscuous diffusion encryption is carried out on a high four-bit plane with a high information amount, overall scrambling is carried out on thelow four-bit plane with an extremely low information amount through cyclic shift, and inter-block diffusion is realized through parameter transfer. In the pixel-level encryption stage, a transverse sequential diffusion and longitudinal reversed diffusion combined annular diffusion method is adopted, so that phenomena such as plaintext sensitivity non-uniformity and break points caused by diffusionof each pixel along one direction are avoided.

Description

technical field [0001] The invention relates to an image processing method, mainly an image encryption method. Background technique [0002] Digital image has gradually developed into an irreplaceable information transmission carrier due to its intuitive image and rich information content, and has been widely used in many fields such as medical treatment, education, military affairs, and economy. However, due to the openness of information transmission channels, phenomena such as privacy leakage and information theft occur from time to time. As the most direct and effective information protection method, image encryption has important research significance and engineering application value. At present, encryption methods for digital images mainly include encryption methods based on pixel scrambling, encryption methods based on chaotic systems, encryption methods based on bit planes, and encryption methods combining multiple encryption technologies. There are also some limi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60H04L9/00
CPCG06F21/602G06F2221/2107H04L9/001
Inventor 张绍武梁颖
Owner NORTHWESTERN POLYTECHNICAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products