Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Bit-level image encryption method based on composite Tent chaotic mapping

A technology of chaotic mapping and encryption method, which is applied in image data processing, image data processing, usage of multiple keys/algorithms, etc. It can solve the problem that the algorithm cannot effectively resist brute force attacks, the randomness of the key sequence is low, and the mapping distribution is uneven and other issues to achieve the effect of improving the ability to resist differential attacks, increasing complexity, and expanding the key space

Pending Publication Date: 2022-04-29
ANHUI UNIV OF SCI & TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The traditional one-dimensional chaotic map has shortcomings such as uneven distribution of mapping, small range of chaotic parameters, and low randomness of the generated key sequence, which leads to poor encryption effect of the image encryption algorithm based on one-dimensional chaotic map.
And because the chaotic parameters of the traditional one-dimensional chaotic map are less, the key space is small, and the algorithm cannot effectively resist brute force attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bit-level image encryption method based on composite Tent chaotic mapping
  • Bit-level image encryption method based on composite Tent chaotic mapping
  • Bit-level image encryption method based on composite Tent chaotic mapping

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The invention will be further described below in conjunction with the accompanying drawings and specific implementation examples. The purpose of the present invention is to solve the problems of low randomness of the key sequence generated by the traditional chaotic map, small key space and limitation of bit scrambling. First, the Tent map is coupled with the Logistic map and the Sine map to obtain the composite chaotic map TLS, which increases the complexity of the chaotic system, enhances the randomness of the key sequence, and expands the parameter range of the chaotic system, thereby effectively improving the encryption system. security. And compared with the high-dimensional chaotic system, the execution cost of the one-dimensional chaotic system is lower. By introducing multiple composite chaotic systems in the encryption process to increase the number of keys, the key space of the algorithm is expanded, so that the algorithm can better resist brute force attacks...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention proposes a bit-level image encryption method based on composite Tent chaotic mapping, and the method comprises the steps: firstly, carrying out the coupling of Tent mapping, Logistic mapping and Sine mapping, obtaining a composite chaotic mapping TLS, improving the complexity of a chaotic system, enhancing the randomness of a secret key sequence, enabling the parameter range of the chaotic system to be expanded, and achieving the encryption of a bit-level image. Therefore, the security of the encryption system is effectively improved. And compared with a high-dimensional chaotic system, the execution cost of the one-dimensional chaotic system is lower. A plurality of composite chaotic systems are introduced in the encryption process to increase the number of keys, the key space of the algorithm is expanded, and the algorithm can well resist violent attacks. A matrix splicing method is used in the scrambling process, and the problem of bit limitation during bit scrambling is solved. Two rounds of XOR operation are used in the diffusion process, and the differential attack resistance of the encryption system is effectively improved.

Description

technical field [0001] The invention belongs to the technical field of digital image encryption algorithms, in particular to a bit-level image encryption method of compound Tent chaotic maps. Background technique [0002] With the continuous development of Internet technology and modern communication technology, more and more multimedia data are widely disseminated in the Internet by taking advantage of the sharing and accessibility of the network. Among many multimedia information, digital images are used as a tool to transmit data information because of their vivid images and containing a large amount of visual information. However, many digital images are easy to leak a lot of personal privacy and military secrets when they are transmitted in the network without encryption. Therefore, how to design an effective digital image management system for digital images with high redundancy, large data volume, strong correlation between adjacent pixels, and image information secur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/08H04L9/14G06T1/00
CPCH04L9/001H04L9/0869H04L9/14G06T1/0021
Inventor 周衍庆葛斌李涵
Owner ANHUI UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products