Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Image encryption method based on hyper-chaotic system and variable step size Josepher problem

An encryption method and super chaotic technology, applied in the field of image security transmission, can solve the problems of insufficient security of encryption methods and can not fully meet the needs of information encryption, and achieve the effect of sharp key sensitivity and strong key space.

Active Publication Date: 2019-08-02
ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Aiming at the technical problem that the existing encryption method is insufficient in security and cannot fully meet the requirements of information encryption, the present invention proposes an image encryption method based on a hyperchaotic system and a variable step size Joseph problem, which has a large key space and good Pseudo-randomness, very sensitive to plaintext, can resist various typical attacks, and can be used in the field of image encryption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image encryption method based on hyper-chaotic system and variable step size Josepher problem
  • Image encryption method based on hyper-chaotic system and variable step size Josepher problem
  • Image encryption method based on hyper-chaotic system and variable step size Josepher problem

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0044] Such as figure 1 As shown, an image encryption method based on hyperchaotic system and variable step size Joseph problem, its steps are as follows:

[0045] Step 1: Input the original image of height*width into the key generation function to generate a binary sequence, and calculate the initial value of the hyperchaotic system through the binary sequence.

[0046] The key generation function is the SHA-256 function, and the SHA-256 fu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an image encryption method based on a hyper-chaotic system and a variable step size Josepher problem, which comprises the following steps of inputting an original image into a key generation function to generate a binary sequence, and calculating an initial value of the hyper-chaotic system; iterating by utilizing the hyper-chaotic system to generate four pseudo-random sequences X, Y, Z and W; inputting the sequence X as a secret key into a variable step size Josepher function to scramble each line in the original image to obtain an image I1; taking the element of the sequence Y as a secret key to perform Josepher ring-based pixel position scrambling on the image I1 to obtain an image I2; inputting the sequence Z as a secret key into the variable step size Josepher function to scramble each column of the image I2 to obtain an image I3; and carrying out two-bit binary addition / subtraction operation on the image I3 by using the element of the sequence W to obtain aciphertext image. According to the invention, the plaintext is linked with the key, so that the method has plaintext sensitivity and can resist selection plaintext attacks and has a strong key spaceand the acute key sensitivity.

Description

Technical field [0001] The invention relates to the technical field of image safe transmission, in particular to an image encryption method based on a hyperchaotic system and a variable step length Joseph problem. Background technique [0002] In recent years, the commonly used SHA-1 cipher algorithm and MD5 cipher algorithm have been cracked. In the past, the SHA-1 cipher algorithm and MD5 cipher algorithm were very secure. Even if the most advanced computer is used for cracking operations, it will take nearly a hundred years. However, the proposed modular differential bit analysis method increases the probability of cracking five internationally-used hash function algorithms, including SHA-1 and MD5 cryptographic algorithms, so that these algorithms can be cracked in a short time. In the face of powerful cracking attacks by hackers, traditional cryptographic systems based on mathematical calculations cannot fully meet the needs of information encryption due to insufficient sec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04N1/32
CPCH04L9/001H04L9/002H04N1/32272
Inventor 牛莹张勋才葛勋王凌飞耿盛涛王宏焦洋洋周正
Owner ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products