Three-dimensional mapping fast image encryption method

An encryption method and image technology, applied in the field of information security, can solve the problems of inability to resist plaintext attacks and weak security.

Inactive Publication Date: 2018-10-09
HUNAN INSTITUTE OF ENGINEERING
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the security is not strong and cannot resist plaintext attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Three-dimensional mapping fast image encryption method
  • Three-dimensional mapping fast image encryption method
  • Three-dimensional mapping fast image encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0088] Two-dimensional mapping principles and examples such as figure 1 , figure 2 shown. The image is regarded as an array, and the principle of mapping is to divide the square image into two upper and lower isosceles triangles in a diagonal direction. Utilizing the difference between the number of pixels in adjacent columns of each triangle, the pixels of each column are sequentially inserted between two adjacent pixels in adjacent columns. Repeating this process, the original image is stretched into a long N 2 straight line. .

[0089] figure 2 Take a 4*4 graph as an example. First divide the image into upper and lower isosceles triangles. In the upper triangle, pixel (3,3) is inserted before pixel (2,2), pixel (2,3) is inserted between pixel (2,2) and pixel (1,2), and pixel (1,3) ) pixel (1,2) pixel (0,2), repeat the above operations to form pixel rows: (3,3), (2,2), (2,3), (1,2), (1,3 ),(0,2)....In the lower triangle, pixel (3,0) is inserted before pixel (3,1)...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a three-dimensional mapping fast image encryption method, and belongs to the field of information security. According to the method, firstly eight different two-dimensional mappings are designed, and the concrete steps are that a square image is divided into upper and lower isosceles triangles in the diagonal direction, the column pixels are inserted between the two adjacentpixels of the adjacent columns by using the difference of the number of the pixels of the adjacent columns of each triangle, the process is repeated and the original image is stretched into a straight line of which the length is N2, and eight different two-dimensional mappings can be obtained because of different stretching directions and folding modes; then the image is divided into eight two-dimensional image layers according to the image pixel value; pixel permutation is performed on each image layer by using the eight two-dimensional mappings so as to form eight three-dimensional mappings; the mapping number of numbers is combined into an encryption key; and all the layers are laminated after mapping so as to obtain the cipher image of which the pixel value and the pixel position simultaneously change. According to the designed fast image encryption method based on three-dimensional mapping, multiple mapping combinations are applied to encrypt the pixel layer of the image and thecombination of the mapping number of times acts as the encryption and decryption key so that the key space can be increased. Besides, the pixel position and the pixel value simultaneously change in the encryption process so that the attack resistance capacity can be enhanced. Meanwhile, the encryption speed is high, and the method can be applied to the occasion of network image fast encryption having certain security requirements.

Description

technical field [0001] The invention relates to a three-dimensional mapping fast image encryption method, which belongs to the field of information security. Background technique [0002] With the rapid development of wireless network technology, it is more and more convenient to use mobile phones to shoot and transmit images. While people are frequently using mobile phones, on the other hand, there are more and more incidents of information leakage caused by malicious attacks on images. How to ensure image security and prevent privacy from being leaked and spread has gradually become an important issue of public concern. [0003] Traditional methods of protecting information are designed based on text information. They once played an important role in the fields of national economy, social life, national defense and military affairs. However, image and text information are different, and have the characteristics of large amount of data and strong correlation between pixe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06T1/00
CPCG06T1/0021
Inventor 黄峰雷芳芳
Owner HUNAN INSTITUTE OF ENGINEERING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products