CN113364573B - Chaotic image encryption and transmission method based on public key system and Hash algorithm - Google Patents
Chaotic image encryption and transmission method based on public key system and Hash algorithm Download PDFInfo
- Publication number
- CN113364573B CN113364573B CN202110654294.XA CN202110654294A CN113364573B CN 113364573 B CN113364573 B CN 113364573B CN 202110654294 A CN202110654294 A CN 202110654294A CN 113364573 B CN113364573 B CN 113364573B
- Authority
- CN
- China
- Prior art keywords
- image
- encrypted
- sequence
- blocks
- public key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 42
- 230000000739 chaotic effect Effects 0.000 title claims abstract description 21
- 230000005540 biological transmission Effects 0.000 title claims abstract description 19
- 238000009792 diffusion process Methods 0.000 claims description 22
- 239000011159 matrix material Substances 0.000 claims description 6
- 238000006243 chemical reaction Methods 0.000 claims description 2
- 238000010586 diagram Methods 0.000 description 7
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000006073 displacement reaction Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/001—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/50—Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Physics & Mathematics (AREA)
- Mathematical Analysis (AREA)
- General Physics & Mathematics (AREA)
- Algebra (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Facsimile Transmission Control (AREA)
Abstract
本发明提供了基于公钥系统和哈希算法的混沌图像加密及传输方法,包括针对基于ECC的综合加密方案和哈希算法,将密文图像与加密的哈希值合成一个加密数据包后进行传输,并在一种快速的动态分块图像加密方案下给出示例,重点强调该传输方案的在公共信道下的传输流程和该方法的可靠性,其中,基于ECC的公匙加密算法可以任意选择,超混沌系统及加密、解密方案可以任意更换,多样化的系统设计使得本发明具有很强的灵活性和可靠性。
The invention provides a chaotic image encryption and transmission method based on a public key system and a hash algorithm, including an ECC-based comprehensive encryption scheme and a hash algorithm, which synthesizes a ciphertext image and an encrypted hash value into an encrypted data packet and performs transmission, and give an example under a fast dynamic block image encryption scheme, emphasizing the transmission process of the transmission scheme under the public channel and the reliability of the method, wherein the public key encryption algorithm based on ECC can be arbitrary Choice, the hyperchaotic system and the encryption and decryption schemes can be replaced arbitrarily, and the diversified system design makes the present invention have strong flexibility and reliability.
Description
技术领域technical field
本发明属于图像加密技术领域,涉及基于公钥系统和哈希算法的混沌图像加密及传输方法。The invention belongs to the technical field of image encryption, and relates to a chaotic image encryption and transmission method based on a public key system and a hash algorithm.
背景技术Background technique
针对在公共信道中传输的文本、语音、图像、视频等数据,数据的安全性问题和传输方案一直是科学研究的难点。公钥加密系统可用来加密数据、进行数字签名或者在安全通信的开始阶段进行密匙交换,由于其非对称性,该方法能够很好地抵抗选择明文攻击和选择密文攻击。现有流行的图像加密算法,均在置乱-扩散的结构下进行,相关文献或专利一般只给出加密、解密的方案,未对实际应用场景下或在公共信道下传输给出具体的方法。另外,现有算法都有一个共同特点:对称,这导致密匙在公共信道传输时极易受到攻击,故本发明采用非对称的方式,将公匙与私匙分离,能有效解决该问题。For text, voice, image, video and other data transmitted in public channels, data security issues and transmission schemes have always been difficult points in scientific research. Public-key cryptography can be used to encrypt data, perform digital signatures, or exchange keys at the beginning of secure communication. Because of its asymmetry, this method can resist chosen-plaintext attacks and chosen-ciphertext attacks well. The existing popular image encryption algorithms are all carried out under the structure of scrambling-diffusion. Relevant documents or patents generally only provide encryption and decryption schemes, and do not give specific methods for actual application scenarios or transmission under public channels. . In addition, the existing algorithms all have a common feature: symmetry, which makes the key vulnerable to attack when it is transmitted on a public channel. Therefore, the present invention uses an asymmetric method to separate the public key from the private key, which can effectively solve this problem.
哈希算法被广泛应用于产生混沌序列的初始值,通常做法是发送方使用明文图像获得哈希值,再将哈希值用于加密。为了解密图像,在传递加密图像时,需要连同哈希值一起传送。这种方式的缺陷在于,由于哈希值与明文相关,故攻击者可以通过哈希值来获取明文信息,导致密文的安全性大大降低,故本发明将哈希值也进行加密,将能解决这一问题。The hash algorithm is widely used to generate the initial value of the chaotic sequence. The usual practice is that the sender uses the plaintext image to obtain the hash value, and then uses the hash value for encryption. In order to decrypt the image, when passing the encrypted image, it needs to be passed along with the hash value. The defect of this method is that since the hash value is related to the plaintext, an attacker can obtain the plaintext information through the hash value, resulting in a greatly reduced security of the ciphertext. Therefore, the present invention also encrypts the hash value, which will be able to fix it.
基于离散或连续混沌的图像加密方案,为了取得良好的加密效果,一般需要进行多轮置乱-扩散操作。最新的研究中,超混沌系统因其复杂的动力学行为,只需一轮扩散就能实现可靠的加密。Image encryption schemes based on discrete or continuous chaos generally require multiple rounds of scrambling-diffusion operations in order to achieve a good encryption effect. In the latest research, due to the complex dynamic behavior of the hyperchaotic system, only one round of diffusion can achieve reliable encryption.
针对上述客观挑战或现存问题,本发明提出了一种基于椭圆曲线密码(ECC)和哈希算法的图像加密及传输方案,提高加密的效率和传输安全性。In view of the above objective challenges or existing problems, the present invention proposes an image encryption and transmission scheme based on elliptic curve cryptography (ECC) and hash algorithm, which improves encryption efficiency and transmission security.
发明内容Contents of the invention
本发明的目的在于针对现有技术存在的问题,提供基于公钥系统和哈希算法的混沌图像加密及传输方法,解决了密匙在公共信道传输时极易受到攻击,导致安全性和传输效率较低的问题。The purpose of the present invention is to address the problems existing in the prior art, to provide a chaotic image encryption and transmission method based on a public key system and a hash algorithm, which solves the problem that the key is very vulnerable to attacks during public channel transmission, resulting in security and transmission efficiency lower question.
为此,本发明采取以下技术方案:For this reason, the present invention takes the following technical solutions:
基于公钥系统和哈希算法的混沌图像加密及传输方法,包括如下步骤:A chaotic image encryption and transmission method based on a public key system and a hash algorithm, comprising the following steps:
S1:接收方生成密匙对,并向发送方发送密匙对,所述密匙对包括公匙和私匙,其中,所述公匙用于加密数据,所述私匙用于解密数据;S1: The receiver generates a key pair and sends the key pair to the sender. The key pair includes a public key and a private key, wherein the public key is used to encrypt data, and the private key is used to decrypt data;
S2:发送方利用公匙和ECIES加密哈希值,根据加密方案加密明文图像,并将两者合成一个加密数据包,完成上述操作后,发送方将加密数据包通过公共信道发送给接收方;S2: The sender uses the public key and ECIES to encrypt the hash value, encrypts the plaintext image according to the encryption scheme, and synthesizes the two into an encrypted data packet. After the above operations are completed, the sender sends the encrypted data packet to the receiver through the public channel;
S3:接收方接收到加密数据包后,将加密数据包拆解为加密图像和加密哈希值,所述加密哈希值通过私匙和ECIES解密,再将解密后的哈希值用于解密明文图像即可。S3: After receiving the encrypted data packet, the receiver disassembles the encrypted data packet into an encrypted image and an encrypted hash value. The encrypted hash value is decrypted by the private key and ECIES, and then the decrypted hash value is used for decryption Plaintext images are fine.
进一步地,将所述哈希值与加密明文图像结合成加密数据包的方法包括置乱过程和扩散过程,在置乱过程完成后,执行扩散操作,其中,所述置乱过程包括如下步骤:Further, the method for combining the hash value and the encrypted plaintext image into an encrypted data packet includes a scrambling process and a diffusion process, and after the scrambling process is completed, a diffusion operation is performed, wherein the scrambling process includes the following steps:
S1:对大小为M×N的明文图像P,首先将其从原来的像素级格式转化为5个比特级平面,所述平面集合包括一个由原图像的所有像素的低1-4位比特所组合成的平面和四个依次由第5-8位比特所组成的平面;S1: For a plaintext image P with a size of M×N, first convert it from the original pixel-level format to 5 bit-level planes, the set of planes includes a set of low 1-4 bits of all pixels in the original image. The combined plane and four planes composed of bits 5-8 in turn;
S2:在完成对图片的转换后,对于平面集合中的每一个平面,如果它相对于其他的平面而言含有更多的信息量,那么就会被划分为更小的块,具体地,将由第8位比特组成的平面划分为若干1×1的块,将由第7、6和5位比特组成的平面划分为若干2×2、4×4和8×8的块,将由原图像所有像素的低1-4位比特组成的平面划分为16×16的块;S2: After completing the conversion of the picture, for each plane in the plane set, if it contains more information than other planes, it will be divided into smaller blocks. Specifically, it will be divided into smaller blocks by The plane composed of the 8th bit is divided into several 1×1 blocks, the plane composed of the 7th, 6 and 5 bits is divided into several 2×2, 4×4 and 8×8 blocks, and all pixels of the original image are divided into The plane composed of the lower 1-4 bits is divided into 16×16 blocks;
S3:由于划分完成的平面等价于由划分好的块为单位组成的矩阵,继续对上述矩阵其进行行移位操作与列移位操作,且所述移位距离由超混沌序列来决定的;S3: Since the divided plane is equivalent to a matrix composed of divided blocks, continue to perform row shift operation and column shift operation on the above matrix, and the shift distance is determined by the hyperchaotic sequence ;
S4:将上述五个置乱后的平面组合在一起并且转化为像素级格式的图像,并且尺寸为M×N。S4: Combine the above five scrambled planes together and convert them into an image in pixel-level format, and the size is M×N.
进一步地,所述扩散过程包括如下步骤:Further, the diffusion process includes the following steps:
S1:在产生的混沌序列的基础上,生成一个用于扩散操作的子混沌序列,用来生成子混沌序列的母序列为x(i),子序列将会从x(i)中产生后,将子序列转化为二维序列x(i,j),尺寸为M×N;S1: On the basis of the generated chaotic sequence, generate a sub-chaotic sequence for diffusion operation. The parent sequence used to generate the sub-chaotic sequence is x(i), and the sub-sequence will be generated from x(i), Convert the subsequence into a two-dimensional sequence x(i,j) with a size of M×N;
S2:将经过置乱过程后的图片PM(i,j)中的每一个像素,与其右方和下方的临近像素的关联将通过像素值之间与二维的序列x(i,j)的异或运算被建立起来,在扩散过程后生成的是最终的加密图片C(i,j)。S2: The association between each pixel in the picture PM(i,j) after the scrambling process and its adjacent pixels on the right and below will be through the relationship between pixel values and the two-dimensional sequence x(i,j) An XOR operation is established, and what is generated after the diffusion process is the final encrypted picture C(i,j).
进一步地,所述移位距离如下公式来计算:Further, the displacement distance is calculated by the following formula:
row = floor(mod(rowChao(indexRow2 + n)×104, indexCol))row = floor(mod(rowChao(indexRow2 + n)×10 4 , indexCol))
col = floor(mod(colChao(indexCol2 + n)×104, indexRow))col = floor(mod(colChao(indexCol2 + n)×10 4 , indexRow))
其中,indexRow和indexCol分别代表着行中的块数和列中的块数,rowChao和colChao是两个生成的混沌序列,n代表当前行或者当前列的序号数, floor(x)代表最大的但不大于x的整数。Among them, indexRow and indexCol represent the number of blocks in the row and the number of blocks in the column respectively, rowChao and colChao are two generated chaotic sequences, n represents the serial number of the current row or the current column, floor(x) represents the largest but An integer not greater than x.
本发明的有益效果在于:The beneficial effects of the present invention are:
1.本发明提出了一种非对称的公钥系统图像加密传输方案,将公匙与私匙分离,使加密图像可以安全地在公共信道中传输,另外,本发明在加密过程中采用超混沌序列,相较于混沌序列,其动力学行为更复杂,安全性更高;1. The present invention proposes an asymmetric public key system image encryption transmission scheme, which separates the public key from the private key, so that the encrypted image can be safely transmitted in the public channel. In addition, the present invention uses hyperchaotic Sequence, compared with chaotic sequence, its dynamic behavior is more complex and safer;
2.本发明在加密过程中只需一轮置乱-扩散的快速动态分块图像加密算法,能够提高加密效率;2. The present invention only needs one round of scrambling-diffusion fast dynamic block image encryption algorithm in the encryption process, which can improve the encryption efficiency;
3.本发明中基于ECC的公匙加密算法可以任意选择,超混沌系统及加密、解密方案也可以任意更换,多样化的系统设计使得本发明具有很强的灵活性和可靠性。3. In the present invention, the ECC-based public key encryption algorithm can be selected arbitrarily, and the hyperchaotic system and encryption and decryption schemes can also be replaced arbitrarily. The diversified system design makes the present invention have strong flexibility and reliability.
附图说明Description of drawings
图1为本发明传输流程示意图;Fig. 1 is a schematic diagram of the transmission process of the present invention;
图2为本发明加密流程示意图;Fig. 2 is a schematic diagram of the encryption process of the present invention;
图3为本发明实施例中置乱过程的平面转化示意图;Fig. 3 is a schematic diagram of plane transformation of the scrambling process in the embodiment of the present invention;
图4为本发明实施例中置乱过程的分块示意图;Fig. 4 is a block schematic diagram of the scrambling process in the embodiment of the present invention;
图5为本发明实施例中的矩阵移位示意图;FIG. 5 is a schematic diagram of matrix shifting in an embodiment of the present invention;
图6为本发明实施例中的扩散过程示意图;Fig. 6 is the schematic diagram of the diffusion process in the embodiment of the present invention;
图7为本发明实施例中的扩散算法示意图。Fig. 7 is a schematic diagram of a diffusion algorithm in an embodiment of the present invention.
具体实施方式Detailed ways
下面结合附图与实施方法对本发明的技术方案进行相关说明。The technical solutions of the present invention will be described below in conjunction with the accompanying drawings and implementation methods.
如图1和2所示,基于公钥系统和哈希算法的混沌图像加密及传输方法,包括如下步骤:As shown in Figures 1 and 2, the chaotic image encryption and transmission method based on the public key system and the hash algorithm includes the following steps:
S1:接收方生成密匙对,并向发送方发送密匙对,所述密匙对包括公匙和私匙,其中,所述公匙用于加密数据,所述私匙用于解密数据;S1: The receiver generates a key pair and sends the key pair to the sender. The key pair includes a public key and a private key, wherein the public key is used to encrypt data, and the private key is used to decrypt data;
S2:发送方利用公匙和ECIES加密哈希值,根据加密方案加密明文图像,并将两者合成一个加密数据包,完成上述操作后,发送方将加密数据包通过公共信道发送给接收方;S2: The sender uses the public key and ECIES to encrypt the hash value, encrypts the plaintext image according to the encryption scheme, and synthesizes the two into an encrypted data packet. After the above operations are completed, the sender sends the encrypted data packet to the receiver through the public channel;
S3:接收方接收到加密数据包后,将加密数据包拆解为加密图像和加密哈希值,所述加密哈希值通过私匙和ECIES解密,再将解密后的哈希值用于解密明文图像即可。S3: After receiving the encrypted data packet, the receiver disassembles the encrypted data packet into an encrypted image and an encrypted hash value. The encrypted hash value is decrypted by the private key and ECIES, and then the decrypted hash value is used for decryption Plaintext images are fine.
其中,将哈希值与加密明文图像结合成加密数据包的方法包括置乱过程和扩散过程,在置乱过程完成后,执行扩散操作。Wherein, the method of combining the hash value and the encrypted plaintext image into an encrypted data package includes a scrambling process and a diffusion process, and after the scrambling process is completed, the diffusion operation is performed.
具体地,置乱过程包括如下步骤:Specifically, the scrambling process includes the following steps:
S1:如图3所示,将明文图片转化为5个不同的平面,其中,一个平面是由明文图像中每一个像素的第1-4个比特位组合而成的,其余四个平面分别由第5-8位比特所组成;S1: As shown in Figure 3, convert the plaintext image into 5 different planes, one of which is composed of the 1st to 4th bits of each pixel in the plaintext image, and the remaining four planes are composed of Composed of the 5th-8th bits;
S2:将上述平面根据每个比特所含有的信息总量来分成大小不同的块,由于第8比特平面所含有的信息多于任意其他平面,故块的尺寸为1×1,当平面的长和宽都是16的倍数时,第7、第6和第5比特平面将依次被划分为2×2、4×4和8×8大小的块,否则,将用0来填充平面,对于组合平面,因为其含有的信息量是最少的,为了提升时间效率,采用16×16的尺寸来进行块的划分;S2: Divide the above plane into blocks of different sizes according to the total amount of information contained in each bit. Since the 8th bit plane contains more information than any other plane, the size of the block is 1×1. When the length of the plane When both and width are multiples of 16, the 7th, 6th, and 5th bit planes will be divided into 2×2, 4×4, and 8×8 blocks in turn, otherwise, the planes will be filled with 0. For the combination Plane, because it contains the least amount of information, in order to improve time efficiency, the size of 16×16 is used for block division;
如图4所示,图中展示针对一个第7比特平面范例进行划分的过程,在该过程中,示例平面以2×2的尺寸大小被划分为若干的块,为了便于描述,将自左向右、自上而下分别对划分好的块依次命名为A-P;As shown in Figure 4, the figure shows the process of dividing a 7th bit plane example. In this process, the example plane is divided into several blocks with a size of 2×2. For the convenience of description, the From the right and from top to bottom, the divided blocks are named A-P in turn;
S3:为了确保随机性和与明文图像之间的关系,之前所生成的超混沌序列被用来决定移位过程中的移位距离,为了避免过度使用序列所造成的不安全性,通过如下公式来计算移位的距离:S3: In order to ensure randomness and the relationship with the plaintext image, the previously generated hyperchaotic sequence is used to determine the shift distance during the shifting process. In order to avoid the insecurity caused by excessive use of the sequence, the following formula is used to calculate the shifted distance:
row = floor(mod(rowChao(indexRow2 + n)×104, indexCol))row = floor(mod(rowChao(indexRow2 + n)×10 4 , indexCol))
col = floor(mod(colChao(indexCol2 + n)×104, indexRow))col = floor(mod(colChao(indexCol2 + n)×10 4 , indexRow))
其中,indexRow和indexCol分别代表着行中的块数和列中的块数,rowChao和colChao代表着两个生成的混沌序列,n代表着当前行或者当前列的序号数, floor(x)代表着最大的但不大于x的整数。Among them, indexRow and indexCol represent the number of blocks in the row and the number of blocks in the column respectively, rowChao and colChao represent the two generated chaotic sequences, n represents the serial number of the current row or the current column, floor(x) represents The largest integer not greater than x.
如图5所示,在移位的距离确定之后,移位操作如图所示:在分块之后所有矩阵的行将根据之前计算出来的移位距离依次进行移位操作,然后所有的列也按照类似的过程进行移位。As shown in Figure 5, after the shift distance is determined, the shift operation is as shown in the figure: after the block, all matrix rows will be shifted sequentially according to the previously calculated shift distance, and then all columns will also be shifted according to A similar process is performed for shifting.
S4:将所有5个经过置乱后的平面组合成一个像素级别的,并且尺寸为M×N的图片,该过程本质上就是S1的逆过程,至此,置乱过程完成。S4: Combine all five scrambled planes into a pixel-level image with a size of M×N. This process is essentially the reverse process of S1. So far, the scrambling process is completed.
扩散过程操作步骤如下:The steps of the diffusion process are as follows:
S1:在产生的混沌序列的基础上,被用于扩散操作的子混沌序列是基于一个已经产生的混沌序列而生成的,假设被选择用来生成的母序列为x(i),某子序列将会从x(i)中产生,在生成所需要的子序列之后,该子序列将会被转化为二维的序列x(i,j),尺寸为M×N;S1: On the basis of the generated chaotic sequence, the sub-chaotic sequence used for the diffusion operation is generated based on an already generated chaotic sequence, assuming that the parent sequence selected for generation is x(i), a certain sub-sequence will be generated from x(i). After generating the required subsequence, the subsequence will be converted into a two-dimensional sequence x(i,j) with a size of M×N;
S2:作为扩散部分的输入,将经过置乱过程后的图片PM(i,j)中的每一个像素,与其右方和下方的临近像素的关联将通过像素值之间与二维的序列x(i,j)的异或运算被建立起来,在扩散过程后生成的是最终的加密图片C(i,j)。S2: As the input of the diffusion part, each pixel in the picture PM(i,j) after the scrambling process will be associated with the adjacent pixels on the right and below through the pixel value and the two-dimensional sequence x The XOR operation of (i,j) is established, and the final encrypted picture C(i,j) is generated after the diffusion process.
如图6所示,若被操作的像素位于图像右下角,则将其与二维混沌序列x(i,j)中对应位置的值进行异或运算得到密文的值;若被操作的像素位于最右侧或者最底一行,则先需要同二维混沌序列x(i,j)中对应位置的值进行异或运算,然后与存在的右侧或下方的临近像素的像素值进行异或运算得到密文的值;对于右侧和下方均有临近像素的像素,将其像素值与二维混沌序列x(i,j)中对应位置的值、右侧临近像素的值与下方临近像素的值依次进行异或运输得到对应的密文的值。As shown in Figure 6, if the pixel to be operated is located in the lower right corner of the image, it will be XORed with the value of the corresponding position in the two-dimensional chaotic sequence x(i, j) to obtain the value of the ciphertext; if the pixel to be operated Located on the rightmost or bottom row, it first needs to perform XOR operation with the value of the corresponding position in the two-dimensional chaotic sequence x(i,j), and then perform XOR operation with the pixel value of the adjacent pixel on the right or below. Calculate the value of the ciphertext; for a pixel with adjacent pixels on the right and below, compare its pixel value with the value of the corresponding position in the two-dimensional chaotic sequence x(i,j), and the value of the adjacent pixel on the right with the adjacent pixel below The values of are sequentially XORed and transported to obtain the corresponding ciphertext value.
如图7所示,上述算法的流程为:对于待操作的图片,从右下角的像素开始,自右向左、自底向上一次进行同二维混沌序列x(i,j)与临近像素的异或运算操作,在左上角的像素执行完后,全部的算法流程执行完毕。As shown in Figure 7, the process of the above algorithm is: for the picture to be operated, starting from the pixel in the lower right corner, from right to left, from bottom to top, carry out the same two-dimensional chaotic sequence x(i, j) and adjacent pixels. XOR operation, after the pixel in the upper left corner is executed, the entire algorithm flow is executed.
在对明文图像进行加密之后,用来产生混沌系统的哈希值将通过ECIES,基于从接收方接收到的公钥来进行加密,加密后的哈希值和密文图像将被组合成一个加密数据包以用于最终的传输,加密数据包的产生意味着整个加密过程的结束。After encrypting the plaintext image, the hash value used to generate the chaotic system will be encrypted based on the public key received from the receiver through ECIES, and the encrypted hash value and ciphertext image will be combined into an encrypted Data packets are used for final transmission, and the generation of encrypted data packets means the end of the entire encryption process.
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110654294.XA CN113364573B (en) | 2021-06-11 | 2021-06-11 | Chaotic image encryption and transmission method based on public key system and Hash algorithm |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110654294.XA CN113364573B (en) | 2021-06-11 | 2021-06-11 | Chaotic image encryption and transmission method based on public key system and Hash algorithm |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113364573A CN113364573A (en) | 2021-09-07 |
CN113364573B true CN113364573B (en) | 2023-04-18 |
Family
ID=77533979
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110654294.XA Active CN113364573B (en) | 2021-06-11 | 2021-06-11 | Chaotic image encryption and transmission method based on public key system and Hash algorithm |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113364573B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115146296B (en) * | 2022-08-04 | 2025-08-19 | 杭州电子科技大学 | Image encryption and decryption method based on chaos and elliptic curve encryption algorithm |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8670560B2 (en) * | 2008-10-23 | 2014-03-11 | University Of Ulster | Encryption method |
CN108124076A (en) * | 2017-11-29 | 2018-06-05 | 山东师范大学 | Image encryption method based on isomery chaos and keccak hash functions |
CN112134688A (en) * | 2020-09-22 | 2020-12-25 | 广东海洋大学 | An Asymmetric Image Encryption Method Based on Quantum Chaos Map and SHA-3 |
CN112714235A (en) * | 2020-12-22 | 2021-04-27 | 郑州轻工业大学 | Image encryption method based on filling curve and adjacent pixel bit scrambling |
CN112906043A (en) * | 2021-04-07 | 2021-06-04 | 华侨大学 | Image encryption method based on chaotic mapping and chaotic S-box substitution |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108513135A (en) * | 2017-02-27 | 2018-09-07 | 诺基亚技术有限公司 | Image encryption and decryption |
CN108365947B (en) * | 2018-03-05 | 2019-05-24 | 郑州轻工业学院 | A kind of image encryption method based on Feistel network Yu dynamic DNA encoding |
CN109617682B (en) * | 2018-12-12 | 2020-11-13 | 北京邮电大学 | Ciphertext domain reversible information hiding method based on histogram left-right shifting |
CN110535624B (en) * | 2019-08-16 | 2022-07-19 | 湖北工业大学 | A medical image privacy protection method applied to DICOM format |
CN110545179A (en) * | 2019-08-29 | 2019-12-06 | 中芯昊月(深圳)科技控股有限公司 | R-LWE-based NTRU encryption method and security proving method thereof |
CN111461952B (en) * | 2020-03-30 | 2023-07-04 | 三维通信股份有限公司 | Image encryption method, computer device, and computer-readable storage medium |
-
2021
- 2021-06-11 CN CN202110654294.XA patent/CN113364573B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8670560B2 (en) * | 2008-10-23 | 2014-03-11 | University Of Ulster | Encryption method |
CN108124076A (en) * | 2017-11-29 | 2018-06-05 | 山东师范大学 | Image encryption method based on isomery chaos and keccak hash functions |
CN112134688A (en) * | 2020-09-22 | 2020-12-25 | 广东海洋大学 | An Asymmetric Image Encryption Method Based on Quantum Chaos Map and SHA-3 |
CN112714235A (en) * | 2020-12-22 | 2021-04-27 | 郑州轻工业大学 | Image encryption method based on filling curve and adjacent pixel bit scrambling |
CN112906043A (en) * | 2021-04-07 | 2021-06-04 | 华侨大学 | Image encryption method based on chaotic mapping and chaotic S-box substitution |
Non-Patent Citations (3)
Title |
---|
K.PRASADH ect..Public key cryptosystems based on chaotic-Chebyshev polynomials.《2009 International Conference on Intelligent Agent & Multi-Agent Systems》.2009,全文. * |
宋金林;张绍武.整合ChaCha20哈希运算的分块扩散自适应图像加密算法.中国图象图形学报.2016,(第06期),全文. * |
陈森;薛伟.基于混沌系统和人工神经网络的图像加密算法.计算机系统应用.2020,(第08期),全文. * |
Also Published As
Publication number | Publication date |
---|---|
CN113364573A (en) | 2021-09-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112134688B (en) | An asymmetric image encryption method based on quantum chaos mapping and SHA-3 | |
CN103326852B (en) | Shared key method for building up under a kind of quantum computation environment | |
CN110535624B (en) | A medical image privacy protection method applied to DICOM format | |
CN104200424A (en) | Difference conversion based (K, N) meaningful image sharing and recovering method | |
CN110958108B (en) | An Asymmetric Image Encryption Method Based on RSA and Fractional Chaos System | |
CN103607276A (en) | Grouping encryption method based on random functions and resisting to known plaintext cipher attacks | |
Ray et al. | Comparative study of AES, RSA, genetic, affine transform with XOR operation, and watermarking for image encryption | |
CN113099069B (en) | Multi-image encryption method based on three-dimensional spiral model | |
CN113645021A (en) | Information hiding method and system based on elliptic curve cryptography | |
CN117879833A (en) | Digital signature generation method based on improved elliptic curve | |
Tayel et al. | A proposed serpent-elliptic hybrid cryptosystem for multimedia protection | |
CN113364573B (en) | Chaotic image encryption and transmission method based on public key system and Hash algorithm | |
CN104410496B (en) | Multi-receiver key encapsulation method | |
CN119232351B (en) | A n-choose-k oblivious transmission method based on homomorphic encryption | |
Sharma et al. | Cryptanalysis of image encryption algorithm based on pixel shuffling and chaotic S-box transformation | |
AbuTaha et al. | Chaos-based cryptosystems using dependent diffusion: An overview | |
US7356140B2 (en) | Encrypting device, decrypting device, cryptosystem including the same devices, encrypting method, and decrypting method | |
CN115146296B (en) | Image encryption and decryption method based on chaos and elliptic curve encryption algorithm | |
Mittal et al. | A retrospective study on NTRU cryptosystem | |
CN114239037B (en) | Multi-image encryption method based on sand road rule | |
US11502818B2 (en) | System to secure encoding and mapping on elliptic curve cryptography (ECC) | |
JP3358954B2 (en) | Pseudo-random bit string generator and cryptographic communication method using the same | |
Soleymani et al. | A binary grouping approach for image encryption based on elliptic curves over prime group field | |
Kandar et al. | Random sequence based secret sharing of an encrypted color image | |
CN110278206B (en) | A BWE Encryption Algorithm Based on Double Private Keys |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |