Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An Image Encryption Method Based on Hyperchaotic System and Variable Step Size Josephian Problem

An encryption method and ultra-chaotic technology, applied in the field of image security transmission, can solve the problems that cannot fully meet the needs of information encryption and the security of encryption methods is insufficient

Active Publication Date: 2020-11-06
ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Aiming at the technical problem that the existing encryption method is insufficient in security and cannot fully meet the requirements of information encryption, the present invention proposes an image encryption method based on a hyperchaotic system and a variable step size Joseph problem, which has a large key space and good Pseudo-randomness, very sensitive to plaintext, can resist various typical attacks, and can be used in the field of image encryption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Image Encryption Method Based on Hyperchaotic System and Variable Step Size Josephian Problem
  • An Image Encryption Method Based on Hyperchaotic System and Variable Step Size Josephian Problem
  • An Image Encryption Method Based on Hyperchaotic System and Variable Step Size Josephian Problem

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0043] Such as figure 1 As shown, an image encryption method based on hyperchaotic system and variable step size Joseph problem, the steps are as follows:

[0044] Step 1: Input the original image whose size is height*width into the key generation function to generate a binary sequence, and calculate the initial value of the hyper-chaotic system through the binary sequence.

[0045] The key generation function is a SHA-256 function, and the SHA-256 function c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an image encryption method based on a hyper-chaotic system and a variable step size Josepher problem, which comprises the following steps of inputting an original image into a key generation function to generate a binary sequence, and calculating an initial value of the hyper-chaotic system; iterating by utilizing the hyper-chaotic system to generate four pseudo-random sequences X, Y, Z and W; inputting the sequence X as a secret key into a variable step size Josepher function to scramble each line in the original image to obtain an image I1; taking the element of the sequence Y as a secret key to perform Josepher ring-based pixel position scrambling on the image I1 to obtain an image I2; inputting the sequence Z as a secret key into the variable step size Josepher function to scramble each column of the image I2 to obtain an image I3; and carrying out two-bit binary addition / subtraction operation on the image I3 by using the element of the sequence W to obtain aciphertext image. According to the invention, the plaintext is linked with the key, so that the method has plaintext sensitivity and can resist selection plaintext attacks and has a strong key spaceand the acute key sensitivity.

Description

technical field [0001] The invention relates to the technical field of secure image transmission, in particular to an image encryption method based on a hyperchaotic system and a variable step size Joseph problem. Background technique [0002] In recent years, the SHA-1 cryptographic algorithm and MD5 cryptographic algorithm, which were once widely used, have been cracked successively. In the past, the SHA-1 cryptographic algorithm and MD5 cryptographic algorithm were highly secure, and it would take nearly a hundred years to crack them even with the most advanced computers. However, the proposal of the modular differential bit analysis method increases the probability of cracking five international general hash function algorithms including SHA-1 and MD5 encryption algorithms, so that these algorithms can be cracked in a short time. In the face of powerful cracking attacks by hackers, traditional cryptographic systems based on mathematical calculations cannot fully meet th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04N1/32
CPCH04L9/001H04L9/002H04N1/32272
Inventor 牛莹张勋才葛勋王凌飞耿盛涛王宏焦洋洋周正
Owner ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products