Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Image encryption method based on L-F cascade chaos and 3D bit scrambling

An encryption method and 3D technology, applied in image coding, image data processing, computer security devices, etc., can solve the problems of weak anti-noise and selected plaintext attack ability, bit scrambling, etc., so as to improve anti-noise attack ability and improve randomness. performance, improve the effect of plaintext sensitivity

Inactive Publication Date: 2020-03-17
QIQIHAR UNIVERSITY
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Aiming at the problem that the existing bit scrambling encryption method is not sensitive to bit scrambling and has weak anti-noise and chosen plaintext attack capabilities, the present invention provides an image encryption method based on L-F cascading chaos and 3D bit scrambling

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image encryption method based on L-F cascade chaos and 3D bit scrambling
  • Image encryption method based on L-F cascade chaos and 3D bit scrambling
  • Image encryption method based on L-F cascade chaos and 3D bit scrambling

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The technical solution of the present invention will be further described below in conjunction with the accompanying drawings, but it is not limited thereto. Any modification or equivalent replacement of the technical solution of the present invention without departing from the spirit and scope of the technical solution of the present invention should be covered by the present invention. within the scope of protection.

[0042] The present invention provides a kind of image encryption method based on L-F cascade chaos and 3D bit scrambling, and described method comprises the following contents:

[0043] 1. Encryption principle

[0044] The main core content of encryption in the present invention has three parts: (1) L-F cascade chaos, (2) key generation, (3) 3D bit scrambling. The three principles are introduced below:

[0045] 1. L-F cascading chaos

[0046] Logistic chaotic map is simple in expression, easy to realize, and has good randomness, so it is widely used ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an image encryption method based on L-F cascade chaos and 3D bit scrambling. Image encryption is mainly divided into two steps: (1) 3D bit scrambling encryption and (2) diffusion operation. A novel L-F cascade chaos is constructed, the problem that a blank window exists due to uneven distribution of Logistic is solved while the rapidity of the Logistic is guaranteed, the chaos interval and number of parameters are increased, the secret key space is increased, and the exhaustion attack resistance of the system is improved. According to the method, the randomness of scrambled ciphertext is improved by adopting a 3D cyclic shift bit scrambling mode, and the problem that a bit scrambling sequence is insensitive is solved. According to the method, high-order informationcontaining a large amount of plaintext information and low-order information containing a small amount of plaintext information are separately scrambled, so that the noise attack resistance of the system is improved. According to the encryption system, the plaintext SHA-256 is used for carrying out strong association on the chaotic key, so that the plaintext sensitivity and the capability of resisting the attack of the selected plaintext are effectively improved.

Description

technical field [0001] The invention relates to an image encryption method, in particular to a 3-dimensional (3D) cyclic shift bit scrambling image encryption method. Background technique [0002] Image information is intuitive and vivid, and is widely used in the modern digital age, but it is vulnerable to various attacks by hackers. Therefore, image security has attracted more and more attention from scholars, such as the encryption scheme of pixel position scrambling and pixel value replacement proposed by Chen G in 2004, and the idea of ​​bit scrambling proposed by Guodong Ye in 2010, but the above two methods are resistant to The attack ability is weak. Recently, a large number of scholars have made improvements. For example, Deng Xiaoheng et al. in 2014 and Xie Guobo et al. in 2016 added bit scrambling after pixel position scrambling on the basis of ChenG. In 2018, Shuliang Sun added DNA coding after bit scrambling. This type of algorithm not only retains the advanta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06T9/00G06F21/60
CPCG06F21/602G06T9/00
Inventor 郭媛敬世伟魏连锁陈炜王学文
Owner QIQIHAR UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products