Image encryption method based on a five-dimensional hyper-chaotic system

An encryption method and chaotic system technology, applied in the field of information security, can solve the problems of small key space and system parameters, and image encryption is not very secure.

Inactive Publication Date: 2019-05-24
FUQING BRANCH OF FUJIAN NORMAL UNIV
View PDF1 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most of the existing methods are based on low-dimensional chaotic maps, and the key space and system parameters are small, which is not very safe for image encryption.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image encryption method based on a five-dimensional hyper-chaotic system
  • Image encryption method based on a five-dimensional hyper-chaotic system
  • Image encryption method based on a five-dimensional hyper-chaotic system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] In order to better understand the above purpose, features and advantages of the present application, the present application will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be noted that, in the case of no conflict, the embodiments of the present application and the features in the embodiments can be combined with each other.

[0064] In the following description, many specific details are set forth in order to fully understand the application, but the application can also be implemented in other ways different from those described here, therefore, the protection scope of the application is not limited by the specific details disclosed below. EXAMPLE LIMITATIONS.

[0065] The five-dimensional chaotic system is a kind of high-dimensional chaotic system, which can produce more complex dynamic behavior and higher randomness than the three-dimensional and four-dimensional chaotic systems used in the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an image encryption method based on a five-dimensional hyper-chaotic system. The method comprises the steps of generating a first random sequence, a second random sequence anda third random sequence based on the five-dimensional hyper-chaotic system; Scrambling the plaintext image by using the generated first random sequence to obtain a scrambled image; Calculating to obtain a diffusion sequence by using the generated second and third random sequences and the obtained scrambled image; And transforming the diffusion sequence to an image matrix to complete encryption ofthe image. According to the embodiment of the invention, based on the five-dimensional hyper-chaotic system, the pseudo-randomness of the sequence and the scrambling effect of the image are improvedthrough the new chaotic sequence generation method and the new image scrambling method, so that the image has higher encryption security.

Description

technical field [0001] The present application relates to the field of information security, in particular to an image encryption method. Background technique [0002] With the rapid development of communication technology and the Internet, people pay more and more attention to the importance of information security. Images are a well-known medium and widely distributed on the Internet. In order to protect important and private images, various encryption methods have been proposed. As a nonlinear science, chaos theory has the characteristics of high sensitivity to system parameters and initial conditions, pseudo-randomness, ergodicity and repeatability of various states, and is very suitable for encryption. At present, many image encryption methods based on chaos theory have been proposed. For example, document CN108366181A discloses an image encryption algorithm based on DNA operation and chaos mapping. However, most of the existing methods are based on low-dimensional c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04N1/44H04L9/00
Inventor 孙树亮郭永宁陈泗盛方德坚
Owner FUQING BRANCH OF FUJIAN NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products