Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Image encryption method based on filling curve and adjacent pixel bit scrambling

A technology of adjacent pixels and filling curves, applied in encryption devices with shift registers/memory, image communication, security communication devices, etc., can solve the problems of differential attack, failure to achieve strong diffusion characteristics, etc., and achieve good performance and high Key Sensitivity and Resistance to Differential Attacks, Effect of Improving Security

Active Publication Date: 2021-04-27
ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
View PDF6 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Aiming at the technical problem that the key used in the existing encryption method will not dissipate the ordinary image, does not achieve strong diffusion characteristics, and is very vulnerable to differential attacks, the present invention proposes an image encryption method based on filling curves and adjacent pixel bit scrambling , combined with hyperchaotic system, Joseph ergodic and filling curve, has high security and high sensitivity, which improves the security of image transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image encryption method based on filling curve and adjacent pixel bit scrambling
  • Image encryption method based on filling curve and adjacent pixel bit scrambling
  • Image encryption method based on filling curve and adjacent pixel bit scrambling

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0050] Such as Figure 9 As shown, an image encryption method based on filling curves and adjacent pixel bit scrambling has three main operations: first, in the pixel position scrambling, use the index composed of V-shaped curves to globally reset the image pixel position The second is location chaos: the bits of each pixel are traversed through Josephus traversal to realize the replacement and encryption of pixel values; finally, the pixels are further diffus...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an image encryption method based on a filling curve and adjacent pixel bit scrambling. The method comprises the following steps: converting a gray level image into a two-dimensional image matrix; calculating a hash value of the image matrix, and calculating an initial value of a four-dimensional hyper-chaotic system; scrambling the image matrix by using the V-shaped filling curve, and transposing the image matrix for second scrambling; iterating the hyper-chaotic system according to the obtained initial value to respectively obtain four chaotic sequences; taking one chaotic sequence as a starting point and one chaotic sequence as a step length, and performing adjacent pixel bit scrambling by utilizing binary bits of adjacent pixels of a Josephf traversal image matrix; and performing forward diffusion and reverse diffusion on the image by using a sequence matrix obtained by the chaotic sequence to obtain a ciphertext image. According to the invention, the high correlation between the pixels is broken through dual replacement of the bit level and the pixel level, selection / known plaintext attacks and common image related statistical attacks are overcome, and the method has high key sensitivity and differential attack resistance.

Description

technical field [0001] The invention relates to the technical field of image encryption, in particular to an image encryption method based on filling curves and bit scrambling of adjacent pixels. Background technique [0002] With the rapid development of multimedia technology and the popularization of the Internet, the transmission, storage and sharing of images has become more and more convenient. These images usually carry some sensitive information. The encryption of digital images is an important guarantee for the safe storage and transmission of digital images. Therefore, in order to prevent image content from being illegally stolen and utilized, people are devoting themselves to developing efficient and secure image encryption algorithms. [0003] Image encryption is a research hotspot in the field of image processing and information security, and is widely used in national security, medical imaging, privacy information protection and other fields. Images have inhe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04N1/44H04L9/00H04L9/06
CPCH04L9/001H04L9/0643H04N1/4486
Inventor 牛莹张勋才景志勇杨存祥张建伟曹祥红吴艳敏
Owner ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products