Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

120 results about "Logistic map" patented technology

The logistic map is a polynomial mapping (equivalently, recurrence relation) of degree 2, often cited as an archetypal example of how complex, chaotic behaviour can arise from very simple non-linear dynamical equations. The map was popularized in a 1976 paper by the biologist Robert May, in part as a discrete-time demographic model analogous to the logistic equation first created by Pierre François Verhulst.

Compiling method from intermediate language (IL) program to C language program of instruction list

InactiveCN103123590AFeasible grammatical conventionFeasible semantic analysisProgram controlMemory systemsPerformance functionLexical analysis
The invention discloses a compiling method from an intermediate language (IL) program to a C language program of an instruction list. The method comprises the steps: building a middle storage structure syntax tree according to results of lexical analysis and grammatical analysis through logical analysis on a program of the instruction list and logistic mapping relation between semanteme of the instruction list and semanteme of the C language; combining an auxiliary performance function and an auxiliary data structure define file, and generating an integrated file of the C language program through program data of an original instruction list according to a C language programming method, wherein the program data of the original instruction list is stored in the structure of the syntax tree. The generated C language program completely corresponds to the logic program of the original instruction list and has the advantages of a high-level C language, wherein the advantages include strong transportability, strong compatibility and the like. Due to the structure of the syntax tree and an analytic method of semanteme mapping, compiling is standardized and mass-produced, complexity of the compiling is reduced through adoption of functions and modularization of an auxiliary function of a function block, compiling time is shortened, and speed of the whole compiling process is improved.
Owner:中国科学院沈阳计算技术研究所有限公司

Digital image encrypting and decrypting method

InactiveCN102609893AMaintain styleAchieving mean invarianceImage data processing detailsCiphertext48-bit
The invention discloses a digital image encrypting and decrypting method comprising the following steps of: appointing the gray value range of an encrypted image according to an image to be encrypted; dividing the image to be encrypted into pixel blocks with the same size, and computing a pixel mean value by virtue of a formula; generating a sub-secret key according a 48-bit binary system key stream preset by a user, and building Logistic mapping according to the pixel mean value; converting into a binary sequence according to the number of floating points generated by the Logistic mapping, and taking the binary sequence as the sub-secret key of the next pixel block; scrambling the pixel in each pixel block based on the improved Arnold conversion, and combining the scrambled pixel blocks into a matrix; and replacing the adjoining pixels in the matrix, so that a ciphertext image can be formed. According to the requirement of a user, the image can be encrypted by means of different numbers of sheaves, various filtering attacks can be resisted, and the invariability of the pixel mean value of the image can be realized, so that the whole style and feature of the original image can be maintained.
Owner:AEROSPACE SCI & IND SHENZHEN GROUP

Partitioning double-layer self-adaptation diffusion image encryption method

InactiveCN104766264AEnhanced scrambling randomnessIncreased sensitivityImage data processing detailsPlaintextCiphertext
The invention provides a partitioning double-layer self-adaptation diffusion image encryption method. The partitioning double-layer self-adaptation diffusion image encryption method includes the steps that every two kinds of Logistic mapping, Tent mapping and Sine mapping are combined to build three kinds of new one-dimensional chaotic mapping, and initial chaotic sequences are extracted, so that the new one-dimensional chaotic mapping has wide chaotic ranges and good chaotic behaviors; then scrambling and diffusion are synchronously carried out by combining Arnold forward mapping and Arnold backward mapping. The opportunities of accessing sequences of pixels and the opportunities of storage sequences of positions can be equal, the scrambling randomness can be improved, and the defects in the rules and random accessing of conventional Arnold mapping can be overcome; in addition, partitioning double-layer self-adaptation diffusion is adopted in the scrambling process, the interaction between the ciphertext pixels, the interaction between the ciphertext pixels and the plaintext pixels and the interaction between the ciphertext pixels and chaotic random sequences are used, influences of the pixels are nonlinearly diffused into a whole image array, a chaotic system is continuously disturbed in the diffusion process, a self-adaptation diffusion process is formed, and the sensitivity of an encryption image to a secret key, a ciphertext and a plaintext is improved.
Owner:NORTHWESTERN POLYTECHNICAL UNIV

Hyper-spectral image compression and encryption method

InactiveCN103281534AReduce the amount of encrypted dataImprove transmission efficiencyTelevision systemsComputer hardwarePlaintext
The invention provides a hyper-spectral image compression and encryption method. The method comprises the following steps of performing coding in a wavelet transform three-dimensional set partitioning in hierarchical trees (3DSPIHT) coding way, simultaneously performing encryption, constructing a scrambling table in a Logistic mapping way to scramble an initial list of insignificant pixels (LIP), continuously iterating a Chen's model until all bits of data of significant types are encrypted, and in a decryption process which is the inverse operation of encryption, continuously updating an initial value of the Chen's model to decrypt the data of the significant types to make the decrypted data gradually approximate to an original image and finally reproduce the original image. According to the method, forward dependence of a 3DSPIHT coding method is utilized, and the data of the significant types is selectively encrypted in real time in a compression process, so that the encrypted data volume of the image is reduced, and the image transmission and encryption efficiency is improved; and the encrypted data volume of each significant type in a bit plane is calculated, and an initial key is scrambled after preprocessing, so that the sensitivity of the coding method to a plaintext is improved.
Owner:NORTHWESTERN POLYTECHNICAL UNIV

Logistic chaotic mapping-based digital image encryption method

InactiveCN106530207AAchieved image encryption resultsImage data processing detailsComputer visionDigital image
The present invention discloses a logistic chaotic mapping-based digital image encryption method. Each pixel value of a gray-scale image is represented in the form of eight-bit binary numbers, so that the two-dimensional gray-scale image is converted into a one-dimensional code digital string of 0 and 1 for further treatment. According to given initial values, a chaotic sequence is generated based on the logistic mapping method. The chaotic sequence is then sorted, so that a position index is obtained. According to the position index, the original image is subjected to bit-level scrambling operation. In this way, an image encryption result, which integrates pixel fusion and pixel scrambling as a hole, is obtained.
Owner:NANJING UNIV OF SCI & TECH

Asymmetric double-image encryption and decryption method based on chaos and cascade DFrRT

The invention discloses an asymmetric double-image encryption method based on chaos and cascade DFrRT. The encryption method comprises the steps that two original gray level images are normalized and connected into an extension image in the horizontal direction; next, the extension image is scrambled by i times of cat mapping, and then the extension image is decomposed into two new images; two phase masks are generated through the image f'1, and the image f'2 and one phase mask are subjected to convolution; Logistic mapping is conducted on an obtained complex matrix, and a conversion result is obtained through DFrRT conversion with the order of alpha; the amplitude of the complex matrix is extracted, and the amplitude and the other phase mask are subjected to convolution; Logistic mapping is conducted on an obtained second complex matrix, and a conversion result is obtained through DFrRT conversion with the order of beta; the amplitude of the second complex matrix is extracted, and then a final ciphertext image is obtained. The invention further discloses a corresponding decryption method. By means of the asymmetric double-image encryption and decryption method, the nonlinearity and disorder of a plaintext image in a spatial domain and a transformation domain are enhanced, and conventional attacks can be well resisted.
Owner:XIAN UNIV OF TECH

Image duel scrambling method based on three-dimensional Logistic mapping

An image duel scrambling method based on three-dimensional Logistic mapping belongs to the field of digital image processing. The image positive scrambling process comprises the steps that firstly an IMAGE to be scrambled with the size of M*N is obtained, 5*M*N three-dimensional Logistic mapping function values are respectively obtained according to a three-dimensional Logistic mapping formula, the Logistic function values of last M first dimensions, last N second dimensions, and last M*N third dimensions of the 5*M*N three-dimensional Logistic mapping function values are obtained and sorted in an ascending mode respectively, and position sequences of an index 1, an index 2 and an index 3 are obtained; pixel position scrambling is conducted on the IMAGE by utilizing the sequences of the index 1 and the index 2, and an Image is obtained and converted into a single-dimensional image; an xor operation is conducted on the image and a result obtained through a reminder operation of the index 3 and 255, an image pixel value is changed to obtain an image fig, and the size of the fig is converted into the size of the IMAGE to obtain an image FIG which is a scrambling image. According to the image duel scrambling method based on three-dimensional Logistic mapping, the function value sequences of the three-dimensional Logistic mapping are utilized to respectively change the pixel position and the pixel value of the scrambling image, dual scrambling to the image is achieved, and the image duel scrambling method has the advantages of being high in generality and good in safety.
Owner:LIAONING UNIVERSITY

Test case set generation method based on combination chaotic sequence

The invention discloses a test case set generation method based on a combination chaotic sequence; the method comprises the following steps in sequence: a, using Chebyshev mapping and Logistic mapping to combine, thus forming the chaotic sequence; b, using the chaotic sequence to initialize population; c, setting an individual fitness function; d, defining a heredity operator; e, adding chaotic disturbance. The method uses the combination chaotic mapping to generate the initial population, each population individual comprises n genes, the population individual is a possible test case selection scheme, the combination chaotic sequence with uniform distribution characteristic is introduced to heredity algorithmic selection, intersect and variation operation, thus effectively preventing immature convergence, improving algorithmic global search capability, and calculating efficiency chaotic system generation initial population genes, adding chaotic small disturbance to each chaotic variable so as to carry out population optimization, and restraining to a proper individual through continuously evolution; test case minimization is converted into a method in which the individual with least genes is searched in the population, thus covering all test needs.
Owner:HUZHOU TEACHERS COLLEGE

Watermarking method for medical images on basis of DFT (discrete Fourier transform) and LogisticMap

The invention relates to a robust watermarking method on the basis of DFT (discrete Fourier transform) and a Logistic Map, and belongs to the field of multimedia signal processing. The robust watermarking method includes preprocessing and embedding watermarks and then extracting and reducing the watermarks, and particularly includes steps of (1), generating a binary encrypted matrix by the aid of the Logistic Map; (2), obtaining encrypted watermarks; (3), performing DFT for an original image and extracting feature vectors; (4), generating a binary logic sequence by the aid of the feature vectors and the chaotically encrypted watermarks to complete the process for preprocessing and embedding the watermarks; (5), performing DFT for an image to be measured to extract vectors of a feature; (6), extracting watermarks by the aid of a Hash function and the binary logic sequence generated when the watermarks are embedded; (7), generating a binary encrypted matrix by the Logistic Map; and (8), solving the reduced watermarks so as to complete the process for extracting and reducing the watermarks. The robust watermarking technology has a high practical value in the aspect of protecting personal information of patients during remote medical treatment.
Owner:HAINAN UNIVERSITY

DWT-DCT (Discrete Wavelet Transform-Discrete Cosine Transform) and Logistic Map-based medical image robust watermarking method

InactiveCN102945543AStrong resistance to conventional attacksStrong ability to resist geometric attacksImage data processing detailsThird partyFeature vector
The invention relates to a DWT-DCT (Discrete Wavelet Transform-Discrete Cosine Transform) and Logistic Map-based medical image robust watermarking method, which belongs to the field of multimedia signal processing. The method comprises preprocessing of a watermark and embedding of the watermark, wherein the preprocessing of the watermark and embedding of the watermark comprise the following steps of: (1) obtaining an encryption matrix by using a Logistic Map; (2) obtaining an encrypted watermark; (3) performing DWT on an original image, performing DCT on an approximation sub-image and extracting the vector of a characteristic; (4) obtaining a corresponding two-valued logic sequence by using the characteristic vector and chaotically encrypted watermark, storing the two-valued sequence at a third party, and then extracting and reducing the watermark, wherein the extraction and the reduction of the watermark comprise the following steps of: (5) performing operation similar to the step (3) on an image to be tested to solve one characteristic vector; (6) extracting the encrypted watermark; (7) generating a two-valued encryption matrix by using the Logistic Map; and (8) solving the reduced watermark. According to the method, the secrecy of information of a patient can be protected.
Owner:HAINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products