Image Encryption Method Based on Stereo Composite Scrambling Model and Chaos

A technology of three-dimensional composite and encryption method, which is applied in the direction of secure communication, image communication, and secure communication device through chaotic signals, which can solve the problems of weak security and low encryption efficiency, and achieve security protection, security improvement, and secure encryption effect of effect

Active Publication Date: 2021-08-06
CHINA UNIV OF MINING & TECH
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Purpose of the present invention: In order to solve the problems of weak security or low encryption efficiency of existing image encryption methods, an image encryption method based on three-dimensional composite scrambling model and chaos is proposed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image Encryption Method Based on Stereo Composite Scrambling Model and Chaos
  • Image Encryption Method Based on Stereo Composite Scrambling Model and Chaos
  • Image Encryption Method Based on Stereo Composite Scrambling Model and Chaos

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The implementation process of the present invention will be further described in detail below in conjunction with specific drawings and examples.

[0040] figure 2 is the encryption flowchart of this method.

[0041] The programming software used is Matlab R2016a, select image 3 One image with a size of 256×256 is shown as the original image.

[0042] Step 1: Segmentation of the original image: the original image is divided into 1024 image block sets with a size of 8×8.

[0043] Step 2: Chaotic sequence generation: select the initial value of PWLCM x 0 =0.203921568627451 and parameters p =0.190196078431373, iterate the map 512 times to get a chaotic sequence X ={ x i} 512 .

[0044] Step 3: Chaotic matrix generation: using the initial value y 0 = 1.708431372549026, z 0 = 2.352941176470588 ,u 0 = 1.563212352941176, v 0 = 3.256454901968599 and control parameters a =35, b =7, c =12, d =3, e =0.2, iterate Chen Chao’s chaotic system mapping 256×25...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an image encryption method based on a three-dimensional composite scrambling model and chaos, which belongs to the field of information encryption. The current network transmission security problem is becoming more and more serious. In order to protect the network interactive image content, the present invention proposes an image encryption method based on a three-dimensional composite scrambling model and chaos. Combining technologies such as bit-plane decomposition, piecewise linear chaotic mapping and two-dimensional Zigzag transformation, a three-dimensional compound scrambling model is established on the basis of defining block internal scrambling and block scrambling. The model is used to scramble the pixels of the original image, and then the Chenchao system and XOR operation are used to diffuse the scrambled image to obtain an encrypted image. Experiments show that the algorithm has good encryption effect, high security and high efficiency.

Description

technical field [0001] The method relates to an information encryption technology, in particular to an image encryption method. Background technique [0002] In the "Internet 2.0" era, network information interaction has widely penetrated into many fields such as daily life, business and military. The Internet is characterized by strong openness, and there is a risk of information leakage in the process of transmitting information through the Internet for massive images. Although researchers have proposed a variety of image encryption methods, there are problems such as weak security or low efficiency in these methods. [0003] Combining technologies such as bit-plane decomposition, Piece-Wise Linear Chaotic Map (PWLCM) and two-dimensional Zigzag transform, a three-dimensional composite scrambling model is established on the basis of defining block internal scrambling and block scrambling . In order to improve the security and efficiency of the encryption method and ensur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04N1/44H04L9/00
CPCH04L9/001H04N1/44
Inventor 张晓强闫轩岗
Owner CHINA UNIV OF MINING & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products