CN104868989B - Encryption method for view data safe transmission - Google Patents
Encryption method for view data safe transmission Download PDFInfo
- Publication number
- CN104868989B CN104868989B CN201510319969.XA CN201510319969A CN104868989B CN 104868989 B CN104868989 B CN 104868989B CN 201510319969 A CN201510319969 A CN 201510319969A CN 104868989 B CN104868989 B CN 104868989B
- Authority
- CN
- China
- Prior art keywords
- msub
- mrow
- image
- encryption
- msubsup
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 36
- 230000005540 biological transmission Effects 0.000 title claims abstract description 32
- 239000011159 matrix material Substances 0.000 claims abstract description 27
- 230000000739 chaotic effect Effects 0.000 claims description 53
- 230000008569 process Effects 0.000 description 5
- 230000006835 compression Effects 0.000 description 3
- 238000007906 compression Methods 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000006978 adaptation Effects 0.000 description 2
- 230000006837 decompression Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 238000004891 communication Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000012937 correction Methods 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Landscapes
- Compression Or Coding Systems Of Tv Signals (AREA)
Abstract
Description
技术领域technical field
本申请涉及图像加密处理,尤其涉及用于图像数据安全传输的加密方法。This application relates to image encryption processing, in particular to an encryption method for secure transmission of image data.
背景技术Background technique
在网络技术高度发达的信息时代,图片作为一种重要的网络信息传输媒介,被广泛应用于医学、军事、社交等领域,其传输过程的安全问题日益凸显。图像信息不同于文本信息,具有其自身信息特色,如相关性强、大数据量、高冗余度等。In the information age with highly developed network technology, pictures, as an important network information transmission medium, are widely used in medical, military, social and other fields, and the security problems of its transmission process have become increasingly prominent. Image information is different from text information and has its own information characteristics, such as strong correlation, large data volume, and high redundancy.
目前常用的混沌图像加密传输系统简单地利用线性混沌序列对图像序列进行混沌加密,这种方法对图像的相关性破坏较差,抗重构和抗破坏攻击性较弱。The currently commonly used chaotic image encryption transmission system simply uses linear chaotic sequences to perform chaotic encryption on image sequences. This method has poor correlation damage to images, and weak anti-reconstruction and anti-destruction attacks.
发明内容Contents of the invention
为克服相关技术中存在的问题,本申请提供用于图像数据安全传输的加密方法。In order to overcome the problems existing in related technologies, the present application provides an encryption method for secure transmission of image data.
根据本申请实施例的第一方面,提供一种用于图像数据安全传输的加密方法,包括以下步骤:According to the first aspect of the embodiments of the present application, an encryption method for secure transmission of image data is provided, including the following steps:
获取图像明文矩阵A;Obtain the image plaintext matrix A;
对图像明文矩阵A进行3D混沌加密得到图像密文E;Perform 3D chaotic encryption on the image plaintext matrix A to obtain the image ciphertext E;
对3D混沌加密的3D密钥进行ECC(Elliptic Curves Cryptography,椭圆曲线密码编码学)加密;ECC (Elliptic Curves Cryptography, elliptic curve cryptography) encryption is performed on the 3D key encrypted by 3D chaos;
将ECC加密的3D密钥与图像密文E共同生成加密文件,用于传输;其中,对图像明文矩阵A进行3D混沌加密包括以下步骤:The ECC-encrypted 3D key and the image ciphertext E are used to generate an encrypted file for transmission; wherein, performing 3D chaotic encryption on the image plaintext matrix A includes the following steps:
建立3D混沌系统模型如下:The 3D chaotic system model is established as follows:
ε=CTxi ε=C T x i
设置E=(A xor XT+A·Y)xor ZT,其中:Set E=(A xor X T +A·Y)xor Z T , where:
Xi=(integer(xi×K1)modN)X i =(integer( xi ×K 1 )modN)
Yi=(integer(yj×K2)modM)Y i =(integer(y j ×K 2 )modM)
Zi=(integer(zk×K3)mod256)Z i =(integer(z k ×K 3 )mod256)
式中,Xi,Yi,Zi为矩阵X,Y,Z的第i个元素,K1,K2,K3为随机整数,M,N为图像明文矩阵A的行数和列数,x0,y0,z0为随机生成的3D密钥种子,0<x0<1,0<y0<1,0<z0<1,2.77<γ<3.0,0<β<0.18,0<α<0.02,0<δ<0.02,xi,yj,zk为3D混沌系统输出的x,y,z方向的随机序列,0<i<N,0<j<M,0<k<M×N,ε为时间校验控制量,C为系统时间校对间隔控制矩阵;In the formula, X i , Y i , Z i are the ith elements of the matrix X, Y, Z, K 1 , K 2 , K 3 are random integers, M, N are the number of rows and columns of the image plaintext matrix A , x 0 , y 0 , z 0 are randomly generated 3D key seeds, 0<x 0 <1, 0<y 0 <1, 0<z 0 <1, 2.77<γ<3.0, 0<β<0.18 , 0<α<0.02, 0<δ<0.02, x i , y j , z k are random sequences in x, y, z directions output by the 3D chaotic system, 0<i<N, 0<j<M, 0 <k<M×N, ε is the time calibration control quantity, and C is the system time calibration interval control matrix;
其中,对3D混沌加密的3D密钥进行ECC加密包括以下步骤:Wherein, performing ECC encryption on the 3D key encrypted by 3D chaos includes the following steps:
获取图像接收方椭圆曲线参数Ep(a,b)、基点G和公钥K;Obtain the image receiver's elliptic curve parameters Ep(a, b), base point G and public key K;
设置K3D=x0||y0||z0||K1||K2||K3,其中,||为按或运算符,即按位进行或运算;Set K 3D =x 0 ||y 0 ||z 0 ||K 1 ||K 2 ||K 3 , where || is an OR operator, that is, a bitwise OR operation;
执行BCH编码算法将K3D编码到Ep(a,b)上的点E3D;Execute the BCH encoding algorithm to encode K 3D to point E 3D on Ep(a, b);
产生随机大整数r;Generate a random large integer r;
设置密文C1=E3D+rK,密文C2=rG,其中rK和rG为椭圆曲线标量乘运算;Set ciphertext C 1 =E 3D +rK, ciphertext C 2 =rG, where rK and rG are elliptic curve scalar multiplication operations;
其中,将ECC加密的所述3D密钥与所述图像密文E共同生成加密文件包括以下步骤:Wherein, generating the encrypted file jointly with the 3D key encrypted by ECC and the image ciphertext E includes the following steps:
创建二进制文件;Create binary files;
将C1,C2转换为二进制写入二进制文件中,并在最后写入ECC密文结束标志;Convert C 1 and C 2 into binary and write them into binary files, and write the ECC ciphertext end flag at the end;
将图像密文E以追加方式写入二进制文件;Write the image ciphertext E to the binary file in an appended manner;
其中,对图像明文矩阵A进行3D混沌加密还包括对图像密文E进行压缩编码。Wherein, performing 3D chaotic encryption on the image plaintext matrix A also includes compressing and encoding the image ciphertext E.
本申请附加的方面和优点将在下面的描述中部分给出,部分将从下面的描述中变得明显,或通过本申请的实践了解到。应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本申请。Additional aspects and advantages of the application will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the application. It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application.
附图说明Description of drawings
此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本发明的实施例,并与说明书一起用于解释本发明的原理。The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description serve to explain the principles of the invention.
图1示出了根据本发明实施例的用于图像数据安全传输的加密方法的流程图;Fig. 1 shows the flow chart of the encryption method that is used for secure transmission of image data according to an embodiment of the present invention;
图2示出了根据本发明优选实施例的用于图像数据安全传输的加密方法的流程图;Fig. 2 shows the flow chart of the encryption method for secure transmission of image data according to a preferred embodiment of the present invention;
图3示出了根据本发明实施例的用于图像数据安全传输的解密方法的流程图;Fig. 3 shows a flow chart of a decryption method for secure transmission of image data according to an embodiment of the present invention;
图4示出了根据本发明优选实施例的用于图像数据安全传输的解密方法的流程图;Fig. 4 shows a flow chart of a decryption method for secure transmission of image data according to a preferred embodiment of the present invention;
图5示出了根据本发明优选实施例的用于图像数据安全传输的流程图。Fig. 5 shows a flowchart for secure transmission of image data according to a preferred embodiment of the present invention.
具体实施方式detailed description
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本发明相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本发明的一些方面相一致的装置和方法的例子。Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present invention. Rather, they are merely examples of apparatuses and methods consistent with aspects of the invention as recited in the appended claims.
图1示出了根据本发明实施例的用于图像数据安全传输的加密方法的流程图,包括以下步骤:Fig. 1 shows the flow chart of the encryption method for secure transmission of image data according to an embodiment of the present invention, comprising the following steps:
步骤S10,获取图像明文矩阵A;Step S10, obtaining the image plaintext matrix A;
步骤S20,对图像明文矩阵A进行3D混沌加密得到图像密文E;Step S20, performing 3D chaotic encryption on the image plaintext matrix A to obtain the image ciphertext E;
步骤S30,对3D混沌加密的3D密钥进行ECC加密;Step S30, performing ECC encryption on the 3D key encrypted by 3D chaos;
步骤S40,将ECC加密的3D密钥与图像密文E共同生成加密文件,用于传输。In step S40, the ECC-encrypted 3D key and the image ciphertext E are used together to generate an encrypted file for transmission.
目前常用的混沌图像加密传输系统简单地利用线性混沌序列对图像序列进行混沌加密,这种方法对图像的相关性破坏较差,抗重构和抗破坏攻击性较弱,另外,由于没有考虑到实际软硬件环境对混沌效应稳定性的影响,混沌加密通信传输过程中混沌系统的混沌状态稳定性较差;图像加密传输过程中缺乏对混沌密钥的有效管理,导致混沌图像加密传输系统经常发生密钥泄露的问题。Currently commonly used chaotic image encryption transmission systems simply use linear chaotic sequences to perform chaotic encryption on image sequences. The influence of the actual software and hardware environment on the stability of the chaotic effect, the stability of the chaotic state of the chaotic system during the chaotic encrypted communication transmission process is poor; the lack of effective management of the chaotic key during the image encrypted transmission process leads to frequent occurrences in the chaotic image encrypted transmission system The problem of key disclosure.
而本实施例中融合了混沌加密和ECC加密的优点,有效提高了传统图像加密方法的加密速度、加密效率和安全性。该图像加密传输方法,有效地提高了加密速度、抗空间重构的攻击、基于回归映射攻击性能强,具有非常高的安全性能。为网络图像信息交互提供了一个稳定可靠的图像数据加密传输方案。However, this embodiment combines the advantages of chaotic encryption and ECC encryption, effectively improving the encryption speed, encryption efficiency and security of traditional image encryption methods. The image encryption transmission method effectively improves the encryption speed, is resistant to space reconstruction attacks, has strong performance based on regression mapping attacks, and has very high security performance. It provides a stable and reliable image data encryption transmission scheme for network image information interaction.
图2示出了根据本发明优选实施例的用于图像数据安全传输的加密方法的流程图。Fig. 2 shows a flowchart of an encryption method for secure transmission of image data according to a preferred embodiment of the present invention.
优选地,如图2所示,步骤S20包括以下步骤:Preferably, as shown in Figure 2, step S20 includes the following steps:
A)启动3D混沌加密进程,包括:A) Start the 3D chaos encryption process, including:
a.随机生成3D密钥种子x0,y0,z0,其中,0<x0<1,0<y0<1,0<z0<1,并使用x0,y0,z0初始化3D混沌系统,使用的3D混沌系统模型如下:a. Randomly generate 3D key seeds x 0 , y 0 , z 0 , where 0<x 0 <1, 0<y 0 <1, 0<z 0 <1, and use x 0 , y 0 , z 0 Initialize the 3D chaotic system, the 3D chaotic system model used is as follows:
S=CTxi S=C T x i
其中,2.77<γ<3.0,0<β<0.18,0<α<0.02,0<δ<0.02,xi,yj,zx为3D混沌系统输出x,y,z方向的随机序列,0<i<N,0<j<M,0<k<M×N,M为明文矩阵A的行数,N为明文矩阵A的列数,ε为时间校验控制量,C为系统时间校对间隔控制矩阵;Among them, 2.77<γ<3.0, 0<β<0.18, 0<α<0.02, 0<δ<0.02, xi, y j , zx is the random sequence of 3D chaotic system output x, y, z direction, 0<i <N, 0<j<M, 0<k<M×N, M is the number of rows of the plaintext matrix A, N is the number of columns of the plaintext matrix A, ε is the time calibration control quantity, and C is the system time calibration interval control matrix;
b.对图像明文矩阵A进行3D混沌加密,包括:b. Perform 3D chaotic encryption on the image plaintext matrix A, including:
设置E(A xor XT+A·Y)xor ZT,其中:Set E(A xor X T +A Y)xor Z T , where:
Xi=(integer(xi×K1)modN)X i =(integer( xi ×K 1 )modN)
Yi=(integer(yj×K2)modM)Y i =(integer(y j ×K 2 )modM)
Zi=(integer(zk×K3)mod256)Z i =(integer(z k ×K 3 )mod256)
式中,Xi,Yi,Zi为矩阵X,Y,Z的第i个元素,K1,K2,K3为随机整数,M,N为图像明文矩阵A的行数和列数;In the formula, X i , Y i , Z i are the ith elements of the matrix X, Y, Z, K 1 , K 2 , K 3 are random integers, M, N are the number of rows and columns of the image plaintext matrix A ;
c.对3D混沌加密后的图像密文E进行压缩编码,其中包括:c. Compress and encode the image ciphertext E encrypted by 3D chaos, including:
设置Z=C(E),其中C表示图像压缩编码算法,可以是jpg或者png图像压缩编码算法。Set Z=C(E), where C represents an image compression coding algorithm, which may be a jpg or png image compression coding algorithm.
优选地,如图2所示,步骤S30包括:Preferably, as shown in Figure 2, step S30 includes:
B)启动ECC加密进程,包括:B) Start the ECC encryption process, including:
a.获取图像接收方椭圆曲线参数Ep(a,b)、基点G和公钥K;a. Obtain the image receiver's elliptic curve parameters Ep(a, b), base point G and public key K;
b.对3D混沌加密密钥进行ECC加密,包括:b. Perform ECC encryption on the 3D chaotic encryption key, including:
设置K3D=x0||y0||0||K1||2||3;Set K 3D = x 0 || y 0 || 0 ||K 1 || 2 || 3 ;
执行BCH编码算法将K3D编码到Ep(a,b)上的点E3D;Execute the BCH encoding algorithm to encode K 3D to point E 3D on Ep(a,b);
产生随机大整数r;Generate a random large integer r;
设置C1=E3D+rK,C2=rG,其中rK和rG为椭圆曲线标量乘运算。Set C 1 =E 3D +rK, C 2 =rG, where rK and rG are elliptic curve scalar multiplication operations.
优选地,步骤S40包括以下步骤:Preferably, step S40 includes the following steps:
A)创建二进制文件imgname.en,其中文件名与获取图像的文件名一致,后缀以.en结尾;A) Create a binary file imgname.en, where the file name is consistent with the file name of the acquired image, and the suffix ends with .en;
B)将C1,C2转换为二进制写入文件imgname.en中,并在最后写入ECC密文结束标志0;B) Convert C 1 and C 2 into binary and write them into the file imgname.en, and write the ECC ciphertext end flag 0 at the end;
C)将3D混沌加密后的图像密文E以追加方式写入imgname.en;C) Write the image ciphertext E encrypted by 3D chaos into imgname.en in an additional way;
D)通过网络将imgname.en发送给图像接收方,就其具体的发送和传输方式,本申请不加以限制。D) Send imgname.en to the image receiver through the network. This application does not limit the specific sending and transmission methods.
图3示出了根据本发明实施例的用于图像数据安全传输的解密方法的流程图,包括以下步骤:Fig. 3 shows a flow chart of a decryption method for secure transmission of image data according to an embodiment of the present invention, including the following steps:
步骤S15,获取加密文件;Step S15, obtaining encrypted files;
步骤S25,根据加密文件中的ECC密文结束标志从加密文件中获取加密的3D密钥和图像密文E;Step S25, obtain the encrypted 3D key and image ciphertext E from the encrypted file according to the ECC ciphertext end mark in the encrypted file;
步骤S35,对加密的3D密钥进行ECC解密得到3D密钥;Step S35, performing ECC decryption on the encrypted 3D key to obtain the 3D key;
步骤S45,使用3D密钥对图像密文E进行3D混沌解密得到图像明文矩阵A。Step S45, using the 3D key to perform 3D chaotic decryption on the image ciphertext E to obtain the image plaintext matrix A.
本实施例对应于上述实施例中的加密方法,解压解码方法采用与加密过程中编码压缩方法对应的方法,可以是jpg或者png图像解压解码算法,其中融合了混沌加密和ECC加密的优点,有效提高了传统图像加密方法的加密速度、加密效率和安全性。This embodiment corresponds to the encryption method in the above-mentioned embodiment, and the decompression decoding method adopts the method corresponding to the encoding and compression method in the encryption process, which can be a jpg or png image decompression decoding algorithm, which combines the advantages of chaotic encryption and ECC encryption, effectively The encryption speed, encryption efficiency and security of the traditional image encryption method are improved.
图4示出了根据本发明优选实施例的用于图像数据安全传输的解密方法的流程图。Fig. 4 shows a flowchart of a decryption method for secure transmission of image data according to a preferred embodiment of the present invention.
优选地,如图4所示,步骤S35包括以下步骤:Preferably, as shown in Figure 4, step S35 includes the following steps:
a)生成椭圆曲线参数Ep(a,b)、基点G和公钥K;a) Generate elliptic curve parameters Ep(a, b), base point G and public key K;
b)采用椭圆曲线参数Ep(a,b)、基点G和公钥K对所述加密的3D密钥进行ECC解密,得到3D密钥:x0,y0,z0,K1,K2,K3。b) Using elliptic curve parameters Ep(a, b), base point G and public key K to perform ECC decryption on the encrypted 3D key to obtain 3D keys: x 0 , y 0 , z 0 , K 1 , K 2 , K 3 .
优选地,对所述加密的3D密钥进行ECC解密包括:Preferably, performing ECC decryption on the encrypted 3D key includes:
A)从密文文件imgname.en中提取C1,C2;A) extract C 1 , C 2 from the ciphertext file imgname.en;
B)设置E3D=C1-kC2,其中E3D为经过BCH编码的3D混沌加密密钥组合值;B) Set E 3D =C 1 -kC 2 , where E 3D is the BCH-encoded 3D chaotic encryption key combination value;
C)通过BCH解码算法对E3D进行解码得到3D混沌加密密钥组合值K3D;C) Decoding E 3D through the BCH decoding algorithm to obtain the 3D chaotic encryption key combination value K 3D ;
D)从K3D中通过二进制移位法提取3D混沌加密密钥x0,y0,z0,K1,K2,K3。D) Extract 3D chaotic encryption keys x 0 , y 0 , z 0 , K1, K2, K3 from K 3D by binary shift method.
优选地,步骤S45包括以下步骤:Preferably, step S45 includes the following steps:
A)使用x0,y0,z0初始化3D混沌系统,使用的3D混沌系统模型如下:A) Use x 0 , y 0 , z 0 to initialize the 3D chaotic system. The 3D chaotic system model used is as follows:
ε′=CT x′ε'=C T x '
其中,2.77<γ<3.0,0<β<0.18,0<α<0.02,0<δ<0.02,xi,yj,zk为3D混沌系统输出x,y,z方向的随机序列,0<i<N,0<j<M,0<k<M×N,M为图像密文E的行数,N为图像密文E的列数,ε为时间校验控制量,C为系统时间校对间隔控制矩阵,L为校对增益,通过选择适当的L使得该系统与加密3D混沌系统实现同步校对,校对过程中让 Among them, 2.77<γ<3.0, 0<β<0.18, 0<α<0.02, 0<δ<0.02, xi, y j , z k is the random sequence of 3D chaotic system output x, y, z direction, 0<i<N,0<j<M,0<k<M×N, M is the number of rows of image ciphertext E, N is the number of columns of image ciphertext E, ε is the time calibration control quantity, C is the system time calibration interval control matrix, and L is the calibration gain. By selecting an appropriate L, the system and the encrypted 3D chaotic system can be synchronized for calibration. During the calibration process, let
B)对图像密文E进行3D混沌解密,包括:B) Carry out 3D chaos decryption to the image ciphertext E, including:
设置A(E xor YT+E·X)·Z,其中:Set A(E xor Y T +E X) Z, where:
Xi=(tnteger(x×K1)modN)X i =(tnteger(x×K 1 )modN)
Yi=(tnteger(x×K2)modM)Y i =(tnteger(x×K 2 )modM)
Zi=(integer(x×K3)mod256)Z i =(integer(x×K 3 )mod256)
式中,Xi,Yi,Zi为矩阵X,Y,Z的第i个元素,K1,K2,K3为随机整数,M,N为图像密文E的行数和列数。In the formula, X i , Y i , Z i are the ith elements of the matrix X, Y, Z, K 1 , K 2 , K 3 are random integers, M, N are the number of rows and columns of the image ciphertext E .
图5示出了根据本发明优选实施例的用于图像数据安全传输的流程图,包括:图像发送方:首先从图像文件中获取图像明文A,然后对A执行3D混沌加密得到3D混沌加密图像密文E,并对E进行压缩编码得到压缩编码后的3D混沌加密密文Z;同时系统执行ECC加密,对3D混沌加密密钥x0,y0,z0,K1,K2,K3的组合二进制数K3D进行加密得到密文C1,C2;最后生成带有密钥的加密文件imgname.en,通过网络发送到图像接收方。图像接收方:通过网络接收图像发送方的加密文件imgname.en,提取ECC密文C1,C2,对其进行ECC解密得到x0,y0,z0,K1,K2,K3,提取压缩编码后的3D混沌加密密文Z,对其进行解压缩解码得到3D混沌加密密文E,最后对E执行3D混沌解密得到图像明文A。Figure 5 shows a flow chart for image data secure transmission according to a preferred embodiment of the present invention, including: image sender: first obtain image plaintext A from the image file, and then perform 3D chaos encryption on A to obtain a 3D chaos encrypted image Ciphertext E, and compress and encode E to obtain compressed 3D chaotic encrypted ciphertext Z; at the same time, the system performs ECC encryption, and the 3D chaotic encrypted keys x 0 , y 0 , z 0 , K 1 , K 2 , K The combined binary number K 3D of 3 is encrypted to obtain ciphertexts C 1 and C 2 ; finally, an encrypted file imgname.en with a key is generated and sent to the image receiver through the network. Image receiver: Receive the encrypted file imgname.en of the image sender through the network, extract the ECC ciphertext C 1 , C 2 , and perform ECC decryption on it to obtain x 0 , y 0 , z 0 , K 1 , K 2 , K 3 , extract the compressed 3D chaotic encrypted ciphertext Z, decompress and decode it to obtain the 3D chaotic encrypted ciphertext E, and finally perform 3D chaotic decryption on E to obtain the image plaintext A.
与现有技术相比,本发明上述实施例的优点在于:Compared with the prior art, the advantages of the foregoing embodiments of the present invention are:
1.该方法融合了混沌加密和ECC加密的优点,有效提高了传统图像加密方法的加密速度、加密效率和安全性;1. This method combines the advantages of chaotic encryption and ECC encryption, effectively improving the encryption speed, encryption efficiency and security of traditional image encryption methods;
2.该方法通过构建3D混沌系统解决了一维混沌系统加密对图像相关性破坏不强的问题;2. This method solves the problem that the encryption of a one-dimensional chaotic system does not strongly destroy the image correlation by constructing a 3D chaotic system;
3.该方法通过在3D混沌加密系统中设计时间校验机制,对加密方和解密方的3D混沌系统进行时间同步校验和纠正,有效防止了混沌系统运行过程中随时间变化混沌效应和稳定性的下降;3. By designing a time verification mechanism in the 3D chaotic encryption system, the method performs time synchronization verification and correction on the 3D chaotic system of the encryption party and the decryption party, effectively preventing the chaotic effect and stability of the chaotic system from changing over time during the operation process decline in sex;
4.在加密图像和3D混沌密钥传输过程中通过ECC加密算法对3D混沌加密密钥进行加密传输,有效提高了3D混沌密钥传输安全性和可靠性,提高了图像传输安全性。4. During the transmission process of the encrypted image and the 3D chaotic key, the 3D chaotic encryption key is encrypted and transmitted by the ECC encryption algorithm, which effectively improves the security and reliability of the 3D chaotic key transmission and improves the image transmission security.
本领域技术人员在考虑说明书及实践这里公开的发明后,将容易想到本发明的其它实施方案。本申请旨在涵盖本发明的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本发明的一般性原理并包括本申请未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本发明的真正范围和精神由下面的权利要求指出。Other embodiments of the invention will be readily apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any modification, use or adaptation of the present invention, these modifications, uses or adaptations follow the general principles of the present invention and include common knowledge or conventional technical means in the technical field not disclosed in this application . The specification and examples are to be considered exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
应当理解的是,本发明并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本发明的范围仅由所附的权利要求来限制。It should be understood that the present invention is not limited to the precise constructions which have been described above and shown in the accompanying drawings, and various modifications and changes may be made without departing from the scope thereof. The scope of the invention is limited only by the appended claims.
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510319969.XA CN104868989B (en) | 2015-06-11 | 2015-06-11 | Encryption method for view data safe transmission |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510319969.XA CN104868989B (en) | 2015-06-11 | 2015-06-11 | Encryption method for view data safe transmission |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104868989A CN104868989A (en) | 2015-08-26 |
CN104868989B true CN104868989B (en) | 2017-11-17 |
Family
ID=53914535
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510319969.XA Expired - Fee Related CN104868989B (en) | 2015-06-11 | 2015-06-11 | Encryption method for view data safe transmission |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104868989B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106028063A (en) * | 2016-06-14 | 2016-10-12 | 广州小百合信息技术有限公司 | Method and device for transmitting video displayed by display screen |
CN108718232B (en) * | 2018-08-17 | 2021-03-26 | 中国矿业大学 | Image encryption method based on AES and chaos |
CN110855362B (en) * | 2019-11-18 | 2021-08-03 | 南京工程学院 | Secure communication method and system based on visible light LED matrix |
CN114461988A (en) * | 2022-04-12 | 2022-05-10 | 恒生电子股份有限公司 | Image encryption method and device, image decryption method and device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101383703A (en) * | 2008-09-12 | 2009-03-11 | 华南理工大学 | Dynamic Encryption System and Method Based on Generalized Information Domain |
US7720305B2 (en) * | 2003-12-05 | 2010-05-18 | New Jersey Institute Of Technology | System and method for robust lossless data hiding and recovering from the integer wavelet representation |
CN102904717A (en) * | 2012-10-13 | 2013-01-30 | 华南理工大学 | Chaotic synchronous encryption and decryption method and device using data compression coding |
-
2015
- 2015-06-11 CN CN201510319969.XA patent/CN104868989B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7720305B2 (en) * | 2003-12-05 | 2010-05-18 | New Jersey Institute Of Technology | System and method for robust lossless data hiding and recovering from the integer wavelet representation |
CN101383703A (en) * | 2008-09-12 | 2009-03-11 | 华南理工大学 | Dynamic Encryption System and Method Based on Generalized Information Domain |
CN102904717A (en) * | 2012-10-13 | 2013-01-30 | 华南理工大学 | Chaotic synchronous encryption and decryption method and device using data compression coding |
Non-Patent Citations (1)
Title |
---|
混沌密码和ECC组合法在数据加密传送中的应用;萧萍;《现代计算机》;20090225;第124-126页 * |
Also Published As
Publication number | Publication date |
---|---|
CN104868989A (en) | 2015-08-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10311243B2 (en) | Method and apparatus for secure communication | |
KR101516574B1 (en) | Variable length block cipher apparatus for providing the format preserving encryption, and the method thereof | |
CN110096901B (en) | Electronic contract data encryption storage method and signing client | |
CN107492064B (en) | Image encryption method based on memristor chaos system, elementary cellular automata and compressed sensing | |
CN104488218B (en) | Encryption device, decryption device, encryption method, decryption method | |
KR101267109B1 (en) | Cryptographic primitives, error coding, and pseudo-random number improvement methods using quasigroups | |
KR101737299B1 (en) | Encoder, decoder and methods | |
WO2019231392A1 (en) | Key exchange system, method, and apparatus | |
TW200828938A (en) | Method for securely extending key stream to encrypt high-entropy data | |
US20160006568A1 (en) | Tag generation device, tag generation method, and tag generation program | |
JP5395051B2 (en) | A low complexity encryption method for content encoded by rateless codes | |
CN104868989B (en) | Encryption method for view data safe transmission | |
CN112715016A (en) | Key encapsulation protocol | |
US9231927B2 (en) | Information processing apparatus, data generation method, information processing method, and information processing system for updating and verifying software programs | |
CN105049176B (en) | Decryption method for view data safe transmission | |
WO2020213114A1 (en) | Mac tag list generation device, mac tag list verification device, method, and program | |
JP2017527225A (en) | Cryptographic system reproducible random sequence | |
CN115484082A (en) | Data transmission method, data transmission device and server | |
Hamsanandhini et al. | Securing Data in the Image Using SHA & ECC | |
CN108616351B (en) | A full dynamic encryption and decryption method and encryption and decryption device | |
Jiang et al. | A Public-Key Approach of Selective Encryption for Images. | |
US20200162106A1 (en) | Computer-Implemented method for error-correction-encoding and encrypting of a file | |
Kiayias et al. | A one-time stegosystem and applications to efficient covert communication | |
CN120512318B (en) | Data encryption method and system for hospital informatization system | |
RU2787692C2 (en) | Key encapsulation protocols |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
EXSB | Decision made by sipo to initiate substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20171117 |