Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An image encryption method based on four-dimensional Chen's hyperchaotic system and K-means clustering

A technology of k-means clustering and encryption method, which is applied in the field of image processing, can solve the problems of encryption security improvement, secret key deciphering, high space-time complexity, etc., to achieve large key space, improve performance, and enhance encryption security. Effect

Active Publication Date: 2019-02-22
SHENZHEN INSTITUTE OF INFORMATION TECHNOLOGY
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

First of all, the secret key based on the low-dimensional chaotic system still has the risk of being deciphered, especially for the one-dimensional chaotic system
Secondly, for high-dimensional chaotic systems, it has high security, but usually has high space-time complexity, which affects the efficiency of image encryption and decryption, especially when chaotic sequences are frequently generated
Finally, most of the chaotic sequences generated by the chaotic system have not been statistically tested, and their pseudo-randomness needs to be tested. Therefore, the encryption security needs to be further improved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An image encryption method based on four-dimensional Chen's hyperchaotic system and K-means clustering
  • An image encryption method based on four-dimensional Chen's hyperchaotic system and K-means clustering
  • An image encryption method based on four-dimensional Chen's hyperchaotic system and K-means clustering

Examples

Experimental program
Comparison scheme
Effect test

experiment example

[0092] (1) US NIST statistical test. Utilize the common standard US NIST statistical test group to pseudo-random binary sequence B={b 1 ,b 2 ,b 3 ,...,b 4L-1 ,b 4L} for randomness testing. Let sequence length L=1000000, significant level α=0.01, Table 1 lists the statistical test results. It can be seen that sequence B passes all the statistical tests well, indicating that it has good pseudo-random performance.

[0093] Table 1 NIST statistical test results for binary sequence B

[0094]

[0095] (2) Secret key sensitivity experiment. Set the secret key to x 0 =-0.1,y 0 =0.1,z 0 =-0.1,w 0 =0.1, for the plaintext image Lena( figure 2 a) Encrypt to get the ciphertext image ( figure 2 b). Then use two sets of secret keys to decrypt the ciphertext image. Among them, the first group is the original secret key, and the second group is the x in the original secret key 0 perform a 10 -14 A small disturbance of the level, that is, x 0 =-0.1+10 14 . figure 2 a ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of image processing, in particular to an image encryption method based on four-dimensional Chen's hyperchaotic system and K-means clustering. The invention adopts high-dimensional continuous hyperchaotic system-four-dimensional Chen's system to generate chaotic sequence, ensures that the algorithm has larger key space, and adopts K-Means clustering algorithm is used to process the chaotic sequences generated by Chen's system, and the binary sequences with good pseudo-random performance are obtained (through US NIST statistical test). Secondly, according to the property of bit-plane decomposition of plaintext image, an efficient scrambling algorithm is designed, and an intermediate result sharing link is added between scrambling and spreading to improve the encryption security. Finally, the traditional linear diffusion function is improved and the diffusion matrix generated by the pseudo-random binary sequence is used to perform linear bidirectional diffusion on the pixels of the initial ciphertext, which further improves the performance of the system against the attack of differential analysis.

Description

technical field [0001] The invention relates to the field of image processing, more specifically, to an image encryption method based on four-dimensional Chen's hyperchaotic system and K-means clustering. Background technique [0002] With the rapid development of the Internet and information technology, all kinds of digital information are constantly disseminated through electronic devices. In digital information, digital image is a relatively intuitive and vivid information. Since digital images may involve national security, commercial interests, and personal privacy, etc., they need to be encrypted for protection, especially during transmission. At present, the mainstream digital image encryption scheme is a scrambling-diffusion scheme based on chaos theory, which uses the chaotic sequence produced by the chaotic system to scramble the spatial position of the image pixels to obtain a scrambled image, and then scrambles the scrambled image. The pixel value is diffused, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/62G06F21/60G06F17/16
CPCG06F17/16G06F21/602G06F18/23213
Inventor 程东升谭旭邬可可
Owner SHENZHEN INSTITUTE OF INFORMATION TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products