Image encryption method based on 3D scrambling model and chaos

An encryption method and scrambling technology, applied in computer security devices, instruments, computing and other directions, can solve the problems of weak security and low encryption efficiency, and achieve the effect of protecting security, improving security and improving encryption effect.

Active Publication Date: 2021-10-22
CHINA UNIV OF MINING & TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to propose an image encryption method based on a three-dimensional scrambling model and chaos in view of the problems of weak security or low encryption efficiency of existing image encryption methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image encryption method based on 3D scrambling model and chaos
  • Image encryption method based on 3D scrambling model and chaos
  • Image encryption method based on 3D scrambling model and chaos

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The implementation process of the present invention will be further described in detail below in conjunction with specific drawings and examples.

[0035] figure 1 is the encryption flowchart of this method.

[0036] The programming software used is Matlab R2016a, select figure 2 is the original image, its size is 512×512. Using this method, the detailed process of Alice encrypting the original image is described as follows.

[0037] Step 1: chaotic sequence generation: Let the original image be I ; Select the initial value of PWLCM z 0 1 =0.203921568627451 and parameters p 1 =0.190196078431373, Alice iterates the map 512 times to obtain a chaotic sequence Z 1 ={ z i 1} 512 ;Use formula (1) to calculate R 1 ={ r i 1} 512 ; similarly, she utilizes the initial value of PWLCM z 0 2 =0.239215686274514 and parameters p 2 =0.378431372549021, iterate the map 512 times, and get another chaotic sequence Z 2 ={ z i 2} 512 ;Use formula (2) to calculat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An image encryption method based on a three-dimensional scrambling model and chaos belongs to the field of information encryption. At present, with the rapid development of multimedia communication technology, how to protect the security of image content has aroused the common concern of industry and academia. The invention proposes an image encryption method based on three-dimensional scrambling model and chaos. Inspired by the Rubik's Cube game, on the basis of defining row scrambling, column scrambling and plane scrambling, a three-dimensional image scrambling model is established. First, the pixels of the original image are scrambled using the three-dimensional scrambling model; then, using chaos, an exclusive OR (XOR) operation is performed on the scrambling result to generate an encrypted image. Experiments show that the algorithm has good encryption effect, large key space, strong key sensitivity, high security and high efficiency.

Description

technical field [0001] The invention relates to an information encryption technology, in particular to an image encryption method. Background technique [0002] In fields such as military systems, e-government affairs, financial systems, and daily life, a large number of images are generated every day. In order to protect the content of these image information from being stolen, image encryption technology has attracted extensive attention from academia and industry. Researchers have proposed various image encryption methods. However, some of these methods have been deciphered, some have weak security, and some have low efficiency, which are unsatisfactory. [0003] Inspired by the Rubik's Cube game, on the basis of defining row scrambling, column scrambling and plane scrambling, a three-dimensional image scrambling model is established. In order to improve the security and efficiency of image encryption and ensure the safe and efficient transmission of images, an image e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60
CPCG06F21/602
Inventor 张晓强王雪松程玉虎
Owner CHINA UNIV OF MINING & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products