Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Image encryption method and device based on novel two-dimensional composite chaotic mapping and SHA-256

A SHA-256, chaotic mapping technology, applied in image data processing, image data processing, computer security devices, etc., can solve the problems of encryption security and low execution cost, improve the ability to resist differential attacks, and reduce execution costs , the effect of reducing dependence

Active Publication Date: 2021-10-22
HUAQIAO UNIVERSITY +1
View PDF4 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The image encryption algorithm in the prior art cannot meet the requirements of encryption security and low execution cost at the same time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image encryption method and device based on novel two-dimensional composite chaotic mapping and SHA-256
  • Image encryption method and device based on novel two-dimensional composite chaotic mapping and SHA-256
  • Image encryption method and device based on novel two-dimensional composite chaotic mapping and SHA-256

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0069] This embodiment provides an image encryption method based on a novel two-dimensional composite chaotic map and SHA-256, such as figure 1 shown, including:

[0070] Step 10, obtain the image to be encrypted, use the SHA-256 hash function to calculate the hash value of the image to be encrypted as a key, and store it as a matrix K;

[0071] Step 20, generating initial parameters based on the matrix K;

[0072] Step 30. Substituting the initial parameters into a new two-dimensional composite chaotic map 2D-LSC to obtain the chaotic sequence Y 1 and Y 2 , the novel two-dimensional composite chaotic map 2D-LSC combines the output of the Logistic map and the Sine map with a change constant, and then performs a cosine transform to generate an output;

[0073] Step 40, transforming the image to be encrypted to obtain a one-dimensional matrix Z, based on the chaotic sequence Y 1 Sorting and scrambling the one-dimensional matrix Z to obtain a scrambled matrix Z 1 , and then ...

Embodiment 2

[0097] Please refer to Figure 2 to Figure 7 , a specific embodiment of the present invention is realized as follows:

[0098] S10, read the image file to be encrypted (such as Figure 5 shown), use the SHA-256 hash function to calculate the hash value of the image file as the system key, and store it as a matrix K, and the matrix K is 826cc80fc06a1b09554fb559c353610744a47837fc41e63659ae8a9bc177caff;

[0099] The initial parameters of the two-dimensional composite chaotic map (2D-LSC) and other parameters of the algorithm can then be calculated based on said matrix K.

[0100] S20. Calculate the initial parameters of the iteration of the two-dimensional compound chaotic system and other parameters of the algorithm based on the matrix K, specifically as follows:

[0101] Based on the first twenty sub-blocks of the matrix K [k 1 ,k 2 ,...,k 20 ], calculate the control parameters α, β and γ of 2D-LSC according to the following formula, and the iterative initial value x 1 wi...

Embodiment 3

[0120] In this embodiment, an image encryption device based on a novel two-dimensional composite chaotic map and SHA-256 is provided, such as Figure 8As shown, it includes: key generation module, initial parameter generation module, chaotic sequence generation module, scrambling diffusion module, secondary diffusion module and reconstruction module;

[0121] The key generation module is used to obtain the image to be encrypted, and use the SHA-256 hash function to calculate the hash value of the image to be encrypted as a key, and store it as a matrix K;

[0122] The initial parameter generating module is configured to generate initial parameters based on the matrix K;

[0123] The chaotic sequence generation module is used to substitute the initial parameters into a new two-dimensional composite chaotic map 2D-LSC to obtain the chaotic sequence Y 1 and Y 2 , the novel two-dimensional composite chaotic map 2D-LSC combines the output of the Logistic map and the Sine map with...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an image encryption method based on novel two-dimensional composite chaotic mapping and SHA-256. The method comprises the following steps: calculating a Hash value of a to-be-encrypted image by using an SHA-256 Hash function, and taking the Hash value as a system input key; linking plaintext image information and the whole image encryption process closely by using the one-way irreversible characteristic of Hash calculation, therefore, the algorithm key space is expanded, and violent attacks of attackers can be effectively resisted; carrying out blocking and operation on the hash value to obtain an iterative initial parameter of the composite chaotic system; substituting into a composite chaotic system for iteration and processing to generate a chaotic sequence; converting the to-be-encrypted image into a one-dimensional matrix; sorting and scrambling the original image based on the chaotic sequence; performing primary diffusion processing on the matrix based on the chaos sequence to obtain an encrypted matrix; performing secondary diffusion processing on the encryption matrix through a parameter generated by a key to obtain a secondary encryption matrix; and finally, reconstructing to obtain an encrypted image. According to the invention, the security of image encryption is improved, and the execution cost is reduced.

Description

technical field [0001] The invention relates to the technical field of image encryption, in particular to an image encryption method and device based on a novel two-dimensional composite chaotic map and SHA-256. Background technique [0002] With the rapid development of the Internet and multimedia applications in recent years, digital image information, as an intuitive form of information expression, is widely used in today's human social life and social activities. A large number of images are transmitted, shared and stored on the Internet every day. Due to its own characteristics, the Internet determines that it is not a safe way to transmit information. The security of transmission and storage of digital images of sensitive information has always been a hot research direction of information security. The direct way to protect digital images involving sensitive information is to encrypt them. However, due to the characteristics of large data volume and strong correlation...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00G06F21/62G06F21/60
CPCG06T1/0021G06F21/602G06F21/6209Y02D30/50
Inventor 唐加能陈锦源张烽倪晖黄婷婷郑超英汤盈慧
Owner HUAQIAO UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products