[go: up one dir, main page]

CN103606126A - Image duel scrambling method based on three-dimensional Logistic mapping - Google Patents

Image duel scrambling method based on three-dimensional Logistic mapping Download PDF

Info

Publication number
CN103606126A
CN103606126A CN201310627540.8A CN201310627540A CN103606126A CN 103606126 A CN103606126 A CN 103606126A CN 201310627540 A CN201310627540 A CN 201310627540A CN 103606126 A CN103606126 A CN 103606126A
Authority
CN
China
Prior art keywords
image
scrambling
scramble
scrambled
iterations
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310627540.8A
Other languages
Chinese (zh)
Inventor
范铁生
张忠清
吕红
李响
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Liaoning University
Original Assignee
Liaoning University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Liaoning University filed Critical Liaoning University
Priority to CN201310627540.8A priority Critical patent/CN103606126A/en
Publication of CN103606126A publication Critical patent/CN103606126A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

一种基于三维Logistic映射的图像双重置乱方法,属于数字图像处理领域。图像正置乱过程:先获取待置乱图像IMAGE的尺寸为M×N,根据三维Logistic映射公式分别获取5×M×N个三维Logistic映射函数值,分别取5×M×N的末尾M个第一维、5×M×N的末尾N个第二维和5×M×N的末尾M×N个第三维的Logistic函数值,并分别对他们进行升序排序,得到位置序列index1、index2和index3;用序列index1和index2对IMAGE进行像素位置置乱,得到图像Image,再将Image一维化为image;再用index3取余255的结果与image进行异或运算,改变图像像素值,得到图像fig,并将fig转换为IMAGE图像尺寸大小,得到图像FIG,即为置乱图像。本发明利用三维Logistic映射的函数值序列分别改变待置乱图像的像素位置和像素值,实现了对图像的双重置乱;具有置乱的通用性强,安全性好的优点。The invention relates to an image double reset scrambling method based on three-dimensional Logistic mapping, which belongs to the field of digital image processing. Image positive scrambling process: first obtain the size of the image to be scrambled IMAGE is M×N, respectively obtain 5×M×N three-dimensional Logistic mapping function values according to the three-dimensional Logistic mapping formula, and take the last M of 5×M×N respectively Logistic function values of the first dimension, the last N second dimensions of 5×M×N and the last M×N third dimensions of 5×M×N, and sort them in ascending order respectively to obtain the position sequences index1, index2 and index3; Use the sequence index1 and index2 to scramble the pixel position of IMAGE to obtain the image Image, and then convert the Image into an image; then use the result of taking the remainder 255 of index3 to perform XOR operation with image, change the pixel value of the image, and obtain the image fig, and convert fig to the size of the IMAGE image to obtain the image FIG, which is a scrambled image. The invention uses the function value sequence of the three-dimensional Logistic mapping to respectively change the pixel position and the pixel value of the image to be scrambled, and realizes double-reset scrambling of the image; it has the advantages of strong universality of scrambling and good security.

Description

一种基于三维Logistic映射的图像双重置乱方法A Method of Image Double Reset Scrambling Based on 3D Logistic Mapping

技术领域 technical field

本发明涉及一种三维Logistic映射的图像双重置乱方法,是一种信息隐藏预处理方法和图像加密手段,属于数字图像处理领域。  The invention relates to an image double reset scrambling method for three-dimensional Logistic mapping, is an information hiding preprocessing method and an image encryption means, and belongs to the field of digital image processing. the

背景技术 Background technique

近年来,随着社会科学技术以及信息技术的发展,数字化信息正以各种形式在网络上迅速便捷的传输,数字图像也因此克服了往日因其存储量大带来的困难,并逐渐成为人们信息交流的重要载体。但在现实生活中大多图像信息是要求保密的,因此图像信息的安全与保密性也逐渐受到人们密切的关注,数字图像置乱技术因此迅速发展了起来,并得到了广泛的应用。多年来,学者们研究了很多置乱方法,这些置乱方法主要分为两类:一类是像素位置置乱,如:Arnold置乱、幻方置乱、骑士巡游置乱以及生命游戏置乱等;另一类是像素值置乱,如:Gray码置乱和混沌置乱等。其中第一类置乱方法只改变像素位置,没有考虑置乱后的像素位置是否均匀扩散到整幅图像中,这样不能完全保证置乱方法的安全性;另一类置乱方法只改变像素值,方法较为单调,有些方法的相邻像素点之间还存在着很大的相关性。  In recent years, with the development of social science and technology and information technology, digital information is being transmitted quickly and conveniently in various forms on the network, and digital images have overcome the difficulties caused by the large storage capacity in the past, and have gradually become a An important carrier of information exchange. But in real life, most of the image information is required to be kept secret, so the security and confidentiality of the image information has gradually been paid close attention to by people. Therefore, digital image scrambling technology has developed rapidly and has been widely used. Over the years, scholars have studied many scrambling methods, which are mainly divided into two categories: one is pixel position scrambling, such as: Arnold scrambling, magic square scrambling, knight parade scrambling and life game scrambling etc.; the other type is pixel value scrambling, such as: Gray code scrambling and chaos scrambling. Among them, the first type of scrambling method only changes the pixel position, without considering whether the scrambled pixel position is evenly spread to the whole image, so the security of the scrambling method cannot be fully guaranteed; the other type of scrambling method only changes the pixel value , the method is relatively monotonous, and there is still a great correlation between adjacent pixels in some methods. the

已有的两类置乱方法陆续被研究者提出,而且各有优缺点,但将这两类置乱方法结合使用的方法破少,而且两者结合能将两者的缺点互相覆盖,是一种安全性较高的方法,因此研究一种安全性高且适用性好的双重置乱方法颇具有挑战性。  The existing two types of scrambling methods have been proposed by researchers one after another, and each has its own advantages and disadvantages, but there are few methods that combine these two types of scrambling methods, and the combination of the two can cover the shortcomings of the two. Therefore, it is quite challenging to study a dual reset scrambling method with high security and good applicability. the

发明内容 Contents of the invention

为了解决上述存在的技术问题,本发明提出一种三维Logistic映射的图像双重 置乱方法,该方法实现简单,安全性好,置乱度较高,通用性较好,并且能抵抗一定的攻击,可以较好的用于信息隐藏的预处理和图像加密,而且可以满足数字图像加密和隐藏的鲁棒性要求。  In order to solve the above-mentioned technical problems, the present invention proposes a double scrambling method for images of three-dimensional Logistic mapping. The method is simple to implement, has good security, high degree of scrambling, good versatility, and can resist certain attacks. It can be better used for information hiding preprocessing and image encryption, and can meet the robustness requirements of digital image encryption and hiding. the

本发明的目的是通过下述技术方案实现的:一种基于三维Logistic映射的图像双重置乱方法,其特征在于:该置乱方法分为图像的正置乱、图像的逆置乱两部分;  The object of the present invention is achieved through the following technical solutions: a double-reset scrambling method for images based on three-dimensional Logistic mapping, characterized in that: the scrambling method is divided into two parts: forward scrambling of images and reverse scrambling of images;

所述的图像正置乱过程如下:  The image is being scrambled as follows:

设待置乱图像为IMAGE、迭代次数为cycle、随机数密钥为key,置乱后的图像为FIG;利用三维Logistic映射的函数值序列分别改变待置乱图像的像素位置和像素值,从而得到置乱后的图像;步骤如下:  Set the image to be scrambled as IMAGE, the number of iterations as cycle, the key of random number as key, and the image after scrambling as FIG; use the function value sequence of three-dimensional Logistic mapping to change the pixel position and pixel value of the image to be scrambled respectively, so that Obtain the scrambled image; the steps are as follows:

1)定义迭代次数cycle=k;  1) Define the number of iterations cycle=k;

2)获取待置乱图像IMAGE的尺寸为M×N,根据三维Logistic映射公式分别获取5×M×N个三维Logistic映射函数值,分别取5×M×N的末尾M个第一维、5×M×N的末尾N个第二维和5×M×N的末尾M×N个第三维的Logistic函数值,并分别对他们进行升序排序,得到位置序列index1、index2和index3;  2) The size of the image IMAGE to be scrambled is obtained as M×N, and 5×M×N three-dimensional Logistic mapping function values are respectively obtained according to the three-dimensional Logistic mapping formula, and the last M first dimensions of 5×M×N, 5 Logistic function values of the last N second dimensions of ×M×N and the last M×N third dimensions of 5×M×N, and sort them in ascending order respectively to obtain the position sequences index1, index2 and index3;

3)一次迭代开始:用序列index1和index2对IMAGE进行像素位置置乱,得到图像Image,并将其赋值给IMAGE,一次迭代结束;  3) Start of an iteration: use the sequence index1 and index2 to scramble the pixel position of IMAGE, get the image Image, and assign it to IMAGE, and an iteration ends;

4)如果cycle不等于k,说明迭代次数未完成,转到步骤3)继续迭代,直到迭代次数为k,此时得到的图像结果为Image;  4) If the cycle is not equal to k, it means that the number of iterations has not been completed, go to step 3) continue to iterate until the number of iterations is k, and the image result obtained at this time is Image;

5)将Image一维化为image;再用index3取余255的结果与image进行异或运算,改变图像像素值,得到图像fig,并将其转换为IMAGE图像尺寸大小的图像Fig,输出最终结果为FIG,FIG即为置乱后图像;至此,正置乱过程结束;  5) One-dimensionalize the Image into an image; then use the result of taking the remainder 255 from index3 to perform an XOR operation with the image, change the pixel value of the image, obtain the image fig, and convert it into an image Fig of the size of the IMAGE image, and output the final result is FIG, and FIG is the image after scrambling; so far, the scrambling process is over;

正置乱在置乱密钥的前提下得到了置乱后的图像FIG,从FIG中看不到原始图像的任何信息,FIG置乱效果好,保证了原始信息的安全性。  Positive scrambling obtains the scrambled image FIG under the premise of scrambling the key, and no information of the original image can be seen from FIG. FIG scrambling effect is good, which ensures the security of the original information. the

第二部分是图像的逆置乱,即置乱图像的恢复。  The second part is the inverse scrambling of the image, that is, the restoration of the scrambled image. the

图像正逆置乱过程如下:设待置乱图像为FIG、迭代次数为cycle,随机数密钥为key,置乱后的图像为OUT;根据得到的置乱图像,按照正置乱的逆过程进行置乱图像的恢复,具体步骤如下:  The forward and reverse scrambling process of the image is as follows: set the image to be scrambled as FIG, the number of iterations as cycle, the random number key as key, and the scrambled image as OUT; according to the obtained scrambled image, follow the reverse process of forward scrambling To restore the scrambled image, the specific steps are as follows:

1)定义迭代次数cycle=k;  1) Define the number of iterations cycle=k;

2)同正置乱过程一样,获取相同的index1、index2、index3;  2) Same as the positive scrambling process, get the same index1, index2, index3;

3)将置乱图像FIG一维化为fig,再用index3取余255的结果与fig进行异或运算,得到图像fin,并将fin升维成FIG大小的图像Fig;  3) Dimensionalize the scrambled image FIG into fig, and then use index3 to take the result of 255 and perform XOR operation with fig to obtain the image fin, and upgrade fin to the image Fig of FIG size;

4)一次迭代开始:用序列index1和index2对Fig进行像素位置逆置乱,得到图像Out,并将结果赋值给Fig,则一次迭代结束;  4) Start of an iteration: Use the sequence index1 and index2 to inversely scramble the pixel position of Fig to obtain the image Out, and assign the result to Fig, then an iteration ends;

5)如果cycle不等于k,说明迭代次数未完成,转到步骤4)继续迭代,直到迭代次数为k,此时得到的Out输出为OUT,OUT即为置乱后图像;至此,逆置乱过程结束。  5) If the cycle is not equal to k, it means that the number of iterations has not been completed. Go to step 4) and continue to iterate until the number of iterations is k. At this time, the output of Out is OUT, and OUT is the image after scrambling; so far, inverse scrambling The process is over. the

在置乱密钥的前提下,经逆置乱过程恢复的图像OUT与原始图像无丝毫差别,达到完全恢复原始图像的目的。  Under the premise of scrambling the key, the image OUT restored through the inverse scrambling process has no slight difference from the original image, and the purpose of completely restoring the original image is achieved. the

本发明的有益效果:本发明方案,利用三维Logistic映射的函数值序列分别改变待置乱图像的像素位置和像素值,实现了对图像的双重置乱,并得到了无损失的置乱恢复图像,且置乱图像能抵抗一定的几何攻击。本发明所采用的方法包括图像正置乱过程和图像逆置乱过程两大部分,第一部分是图像的正置乱过程:有三个输入为待置乱图像IMAGE、迭代次数cycle以及随机数密钥key,一个输出为置乱后的 图像FIG;过程是利用三维Logistic映射的函数值序列分别改变待置乱图像的像素位置和像素值,从而得到置乱后的图像。(1)定义迭代次数cycle=k;(2)获取待置乱图像IMAGE的尺寸为M×N,根据三维Logistic映射公式分别获取5×M×N个三维Logistic映射函数值,分别取5×M×N的末尾M个第一维、5×M×N的末尾N个第二维和5×M×N的末尾M×N个第三维的Logistic函数值,并分别对他们进行升序排序,得到位置序列index1、index2和index3;(3)一次迭代开始:用序列index1和index2对IMAGE进行像素位置置乱,得到图像Image,并将其赋值给IMAGE,一次迭代结束;(4)如果cycle不等于k,说明迭代次数未完成,转到步骤(3)继续迭代,直到迭代次数为k,此时得到的图像结果为Image;(5)将Image一维化为image;再用index3取余255的结果与image进行异或运算,改变图像像素值,得到图像fig,并将其转换为IMAGE图像尺寸大小的图像Fig,输出最终结果为FIG,FIG即为置乱后图像;至此,正置乱过程结束。正置乱在置乱密钥的前提下得到了置乱后的图像FIG,从FIG中看不到原始图像的任何信息,FIG置乱效果好,保证了原始信息的安全性。第二部分是图像的逆置乱,即置乱图像的恢复。有三个输入为待置乱图像FIG、迭代次数cycle以及随机数密钥key,一个输出为置乱后的图像OUT;根据得到的置乱图像,按照正置乱的逆过程进行置乱图像的恢复。(1)定义迭代次数cycle=k;(2)同正置乱过程一样,获取相同的index1、index2、index3;(3)将置乱图像FIG一维化为fig,再用index3取余255的结果与fig进行异或运算,得到图像fin,并将fin升维成FIG大小的图像Fig;(4)一次迭代开始:用序列index1和index2对Fig进行像素位置逆置乱,得到图像Out,并将结果赋值给Fig,则一次迭代结束;(5)如果cycle不等于k,说明迭代次数未完成,转到步骤(4)继续迭代,直到迭代次数为k,此时得到的Out输出为OUT,OUT即为置乱后图像;至此,正置乱过程结束。  Beneficial effects of the present invention: the scheme of the present invention uses the function value sequence of the three-dimensional Logistic mapping to change the pixel position and pixel value of the image to be scrambled respectively, realizes double reset scrambling of the image, and obtains a lossless scrambled recovery image , and the scrambled image can resist certain geometric attacks. The method adopted in the present invention includes two parts: the positive scrambling process of the image and the reverse scrambling process of the image. The first part is the positive scrambling process of the image: there are three inputs: the image to be scrambled IMAGE, the number of iterations cycle and the random number key key, an output is a scrambled image FIG; the process is to change the pixel position and pixel value of the image to be scrambled by using the function value sequence of the three-dimensional Logistic mapping, so as to obtain the scrambled image. (1) Define the number of iterations cycle=k; (2) The size of the image IMAGE to be scrambled is M×N, and 5×M×N three-dimensional Logistic mapping function values are respectively obtained according to the three-dimensional Logistic mapping formula, and 5×M are respectively taken Logistic function values of the last M first dimensions of ×N, the last N second dimensions of 5×M×N, and the last M×N third dimensions of 5×M×N, and sort them in ascending order respectively to obtain Position sequence index1, index2 and index3; (3) Start of an iteration: Use the sequence index1 and index2 to scramble the pixel position of IMAGE to obtain the image Image, and assign it to IMAGE, and an iteration ends; (4) If the cycle is not equal to k, indicating that the number of iterations has not been completed, go to step (3) and continue to iterate until the number of iterations is k, and the image result obtained at this time is an Image; (5) convert the Image into an image; then use index3 to get the remainder 255 The result is XORed with image, the pixel value of the image is changed, the image fig is obtained, and it is converted into the image Fig of the size of the IMAGE image, and the final result is FIG, which is the scrambled image; so far, the scrambling process is in progress Finish. Positive scrambling obtains the scrambled image FIG under the premise of scrambling the key, and no information of the original image can be seen from FIG. FIG scrambling effect is good, which ensures the security of the original information. The second part is the inverse scrambling of the image, that is, the restoration of the scrambled image. There are three inputs for the image to be scrambled FIG, the number of iterations cycle and the random key key, and one output is the scrambled image OUT; according to the obtained scrambled image, the scrambled image is restored according to the reverse process of the normal scrambled . (1) Define the number of iterations cycle=k; (2) Obtain the same index1, index2, and index3 as in the normal scrambling process; (3) Convert the scrambled image FIG into fig, and then use index3 to get the remainder 255 The result is XORed with fig to obtain the image fin, and the dimension of fin is increased to the image Fig of FIG size; (4) an iteration starts: use the sequence index1 and index2 to inversely scramble the pixel position of Fig to obtain the image Out, and Assign the result to Fig, and one iteration ends; (5) If the cycle is not equal to k, it means that the number of iterations has not been completed, go to step (4) and continue iterating until the number of iterations is k, and the Out output obtained at this time is OUT, OUT is the image after scrambling; so far, the scrambling process is over. the

在置乱密钥的前提下,经逆置乱过程恢复的图像OUT与原始图像无丝毫差别,达到完全恢复原始图像的目的。  Under the premise of scrambling the key, the image OUT restored through the inverse scrambling process has no slight difference from the original image, and the purpose of completely restoring the original image is achieved. the

本发明与现有的图像置乱技术比较有以下优点:  Compared with the existing image scrambling technology, the present invention has the following advantages:

由于本发明是一种三维Logistic映射的图像双重置乱方法,方法是利用三维Logistic映射的函数值序列分别改变待置乱图像的像素位置和像素值,结合了像素位置置乱和像素值置乱两类方法的特性,实现了对图像的双重置乱,而且方法实现简单,解决了已有方法实现效率低等问题。  Since the present invention is a method for double-resetting images of three-dimensional Logistic mapping, the method is to use the function value sequence of three-dimensional Logistic mapping to respectively change the pixel position and pixel value of the image to be scrambled, combining pixel position scrambling and pixel value scrambling The characteristics of the two types of methods realize the dual reset scrambling of the image, and the method is simple to implement, which solves the problems of low implementation efficiency of the existing methods. the

本发明提出的方法是利用三维Logistic映射的函数值序列对图像像素位置进行调整以及对图像像素值进行改变,对图像尺寸没有要求,因此该发明对图像的通用性较强。  The method proposed by the invention uses the function value sequence of the three-dimensional Logistic mapping to adjust the image pixel position and change the image pixel value, and has no requirement on the image size, so the invention has strong versatility for images. the

该方法能抵抗来自剪切、加噪、压缩和滤波的攻击,且恢复图像的可读性不受影响,可以较好的用于信息隐藏的预处理和图像加密,而且可以满足数字图像加密和隐藏的鲁棒性要求。  This method can resist attacks from cutting, noise adding, compression and filtering, and the readability of the restored image will not be affected. It can be better used for information hiding preprocessing and image encryption, and can meet the requirements of digital image encryption and Hidden robustness requirements. the

附图说明 Description of drawings

图1(a)2000个三维Logistic映射点在三维空间中的整体分分布图。  Figure 1(a) The overall distribution of 2000 3D Logistic mapping points in 3D space. the

图1(b)2000个三维Logistic映射点在xy平面上的分布图。  Figure 1(b) The distribution of 2000 3D Logistic mapping points on the xy plane. the

图1(c)2000个三维Logistic映射点在yz平面上的分布图。  Figure 1(c) The distribution of 2000 3D Logistic mapping points on the yz plane. the

图1(d)2000个三维Logistic映射点在zx平面上的分布图。  Figure 1(d) The distribution of 2000 3D Logistic mapping points on the zx plane. the

图2(a)是标准lena原始图像。  Figure 2(a) is the standard lena original image. the

图2(b)是标准lena图经本方法置乱后的图。  Figure 2(b) is the scrambling of the standard lena graph by this method. the

图2(c)是标准lena图置乱后的恢复图。  Figure 2(c) is the recovery map after scrambling the standard lena map. the

图2(d)是宽矩形lena图。  Figure 2(d) is a wide rectangular lena map. the

图2(e)是宽矩形lena图经本方法置乱后的图。  Figure 2(e) is the wide rectangular lena graph scrambled by this method. the

图2(f)是宽矩形lena图置乱后的恢复图。  Figure 2(f) is the recovery map after scrambling the wide rectangular lena map. the

图2(g)是高矩形lena图。  Figure 2(g) is a tall rectangle lena map. the

图2(h)是高矩形lena图经本方法置乱后的图。  Figure 2(h) is the scrambled high rectangular lena graph by this method. the

图2(i)是高矩形lena图置乱后的恢复图。  Figure 2(i) is the recovery map after scrambling the high rectangular lena map. the

图3是用灰度值连续置乱度评价方法对本方法的置乱程度进行的评价曲线图。  Fig. 3 is a graph showing the evaluation curve of the scrambling degree of this method by the gray value continuous scrambling degree evaluation method. the

图4(a)标准lena原始图像的直方图。  Figure 4(a) Histogram of the standard lena raw image. the

图4(b)标准lena图经本方法置乱后图像的直方图。  Figure 4(b) The histogram of the image after the standard lena image is scrambled by this method. the

图5(a)本方法经过剪切攻击后的置乱图像。  Figure 5(a) The scrambled image after the clipping attack by this method. the

图5(b)本方法经过剪切攻击后的恢复图像。  Figure 5(b) The recovered image after the clipping attack by our method. the

图5(c)本方法经过加入噪声密度为0.15的椒盐噪声攻击后的置乱图像。  Figure 5(c) This method is a scrambled image after adding a salt and pepper noise attack with a noise density of 0.15. the

图5(d)本方法经过加入噪声密度为0.15的椒盐噪声攻击后的恢复图像。  Fig. 5(d) The recovered image after adding the salt and pepper noise attack with a noise density of 0.15 by this method. the

图5(e)本方法经过品质因子为0.7的JPEG压缩攻击后的置乱图像。  Figure 5(e) The scrambled image after this method undergoes a JPEG compression attack with a quality factor of 0.7. the

图5(f)本方法经过压缩攻击后的恢复图像。  Figure 5(f) The recovered image after compression attack by this method. the

图5(g)本方法经过高斯低通滤波攻击后的置乱图像。  Figure 5(g) The scrambled image after the Gaussian low-pass filtering attack by this method. the

图5(h)本方法经过高斯低通滤波攻击后的恢复图像。  Fig. 5(h) The restored image after Gaussian low-pass filtering attack by this method. the

具体实施方式 Detailed ways

下面结合附图对本发明作进一步说明:  The present invention will be further described below in conjunction with accompanying drawing:

以下从理论基础进行说明:  The following is an explanation from the theoretical basis:

1)三维Logistic映射函数  1) Three-dimensional Logistic mapping function

一维Logistic映射是数学生态学家R.May在英国的《自然》杂志上发表的一篇综述中所提出的,据一维的Logistic映射,给出三维Logistic映射的形式如下:  One-dimensional Logistic mapping is proposed by mathematical ecologist R.May in a review published in the British journal Nature. According to one-dimensional Logistic mapping, the form of three-dimensional Logistic mapping is as follows:

Figure 2013106275408100002DEST_PATH_IMAGE001
Figure 2013106275408100002DEST_PATH_IMAGE001

其中,g1,g2,g3是耦合项,可以取下面几种情况:(1)g1=rx3,g2=rx1和g3=rx2的一次耦合项;(2)g1=g2=g3=rx1x2x3的对称耦合项;(3)非对称二次耦合等。本方法采取的是情况(2)下的三维Logistic映射。  Among them, g 1 , g 2 , and g 3 are coupling items, and the following situations can be taken: (1) g 1 = rx 3 , g 2 = primary coupling items of rx 1 and g 3 = rx 2 ; (2) g 1 =g 2 =g 3 =rx 1 x 2 x 3 symmetric coupling term; (3) asymmetric secondary coupling, etc. This method adopts the three-dimensional Logistic mapping under the condition (2).

对称三次耦合项的三维Logistic映射函数如下:  The three-dimensional Logistic mapping function of the symmetrical cubic coupling term is as follows:

设f:R3×R3→R3,X‘=f(X,v),有  Let f: R 3 ×R 3→ R 3 , X'=f(X,v), have

Figure 2013106275408100002DEST_PATH_IMAGE002
Figure 2013106275408100002DEST_PATH_IMAGE002

其中,u1,u2,u3和r是三维Logistic映射函数中的四个参数,参数的取值会影响系统的最终状态;当u1=u2=u3时,r大于0.69时系统进入混沌状态(混沌状态指在非线性动力系统中出现的类似随机的过程,这种过程既非周期又不收敛),当u1,u2,u3均不相同(u1,u2,u3可用随机数生成器生成)时,r大于0.76时系统进入混沌状态;本方法取r=0.78;另外,x1,x2,x3是三维Logistic映射函数前一个状态的函数值(第一个状态作为函数初值,可用随机数生成器生成),x‘1,x’2,x‘3是紧接着的后一个状态的函数值。  Among them, u 1 , u 2 , u 3 and r are the four parameters in the three-dimensional Logistic mapping function, and the values of the parameters will affect the final state of the system; when u 1 =u 2 =u 3 , when r is greater than 0.69, the system Enter the chaotic state (the chaotic state refers to the similar random process in the nonlinear dynamical system, which is neither periodic nor convergent), when u 1 , u 2 , u 3 are all different (u 1 , u 2 , When u 3 can be generated by a random number generator), the system enters a chaotic state when r is greater than 0.76; this method takes r=0.78; in addition, x 1 , x 2 , and x 3 are the function values of the previous state of the three-dimensional Logistic mapping function (No. A state is used as the initial value of the function, which can be generated by a random number generator), and x' 1 , x' 2 , x' 3 are the function values of the next state.

2)三维Logistic映射函数分布图  2) Three-dimensional Logistic mapping function distribution diagram

设置三维Logistic映射函数的参数值u1=0.6,u2=0.65,u3=0.7;函数初值用随机数生成器生成(随机数种子为rand(‘state’,key),其中key=12);r=0.78;利用三维Logistic映射函数公式生成100000个点,取尾部2000个点画出这些点的三维Logistic的分布图如图1所示。其中,图1(a)是2000个点在三维空间中的整体分分布图,图1(b)(c)(d)分别是这2000个点在xy、yz和zx平面上的分布图。可以看到这2000个点基本散列到平面的整个空间,可见其散列性较好,基本处于混沌状态, 能较好的适用于置乱。  Set the parameter values of the three-dimensional Logistic mapping function u 1 =0.6, u 2 =0.65, u 3 =0.7; the initial value of the function is generated by a random number generator (the random number seed is rand('state', key), where key=12 ); r=0.78; 100,000 points were generated using the three-dimensional Logistic mapping function formula, and the three-dimensional Logistic distribution diagram of these points was drawn by taking the 2,000 points at the end, as shown in Figure 1. Among them, Figure 1(a) is the overall distribution map of 2000 points in three-dimensional space, and Figure 1(b)(c)(d) is the distribution map of these 2000 points on the xy, yz and zx planes respectively. It can be seen that these 2000 points are basically hashed to the entire space of the plane, which shows that its hashing property is good, basically in a chaotic state, and can be better suitable for scrambling.

3)图像置乱  3) Image scrambling

图像置乱的目的是把原本显示规则的图像信息转换为无序性的显示,这种无序性为加密或数据嵌入等的进一步处理打下了良好的基础。  The purpose of image scrambling is to convert the image information that originally displayed rules into a disordered display, which lays a good foundation for further processing such as encryption or data embedding. the

第一部分:利用三维Logistic映射的函数值序列分别改变待置乱图像的像素位置和像素值,实现了对图像的双重置乱,得到了置乱后的图像FIG。  The first part: Using the function value sequence of the three-dimensional Logistic mapping to change the pixel position and pixel value of the image to be scrambled, the double scrambling of the image is realized, and the scrambled image FIG is obtained. the

此部分有三个输入为待置乱图像IMAGE、迭代次数cycle以及随机数密钥key,一个输出为置乱后的图像FIG;过程是利用三维Logistic映射的函数值序列分别改变待置乱图像的像素位置和像素值,从而得到置乱后的图像。其中置乱密钥为迭代次数cycle、随机数密钥key。  This part has three inputs for the image to be scrambled IMAGE, the number of iterations cycle and the random key key, and one output is the scrambled image FIG; the process is to use the function value sequence of the three-dimensional Logistic mapping to change the pixels of the image to be scrambled respectively position and pixel value to get the scrambled image. The scrambling key is the number of iterations cycle and the random number key. the

1)定义迭代次数cycle=k;  1) Define the number of iterations cycle=k;

其中,cycle为置乱密钥中的一个,由用户定义,例如:cycle=1;  Among them, cycle is one of the scrambling keys, defined by the user, for example: cycle=1;

2)获取待置乱图像IMAGE的尺寸为M×N,根据三维Logistic映射公式分别获取5×M×N个三维Logistic映射函数值,分别取5×M×N的末尾M个第一维、5×M×N的末尾N个第二维和5×M×N的末尾M×N个第三维的Logistic函数值,并分别对他们进行升序排序,得到位置序列index1、index2和index3;其中,在获取三维Logistic映射函数值之前,要先设置其参数值及其函数初值;  2) The size of the image IMAGE to be scrambled is obtained as M×N, and 5×M×N three-dimensional Logistic mapping function values are respectively obtained according to the three-dimensional Logistic mapping formula, and the last M first dimensions of 5×M×N, 5 ×M×N at the end of the N second dimension and 5×M×N at the end of the M×N third dimension of the Logistic function values, and sort them in ascending order respectively to obtain the position sequence index1, index2 and index3; where, in Before obtaining the value of the three-dimensional Logistic mapping function, you must first set its parameter value and its function initial value;

这里我们用随机数生成器rand()设置函数初值以及部分参数值,随机数生成器需要用户定义随机数种子rand(‘state’,key),key是置乱密钥中的一个,是任意整数,如:key=12;另外,函数参数值的设置要达到混沌状态才能得到理想的置乱效果,而这个混沌状态与随机数种子的定义有关;还与生成的5× M×N个三维Logistic映射函数值有关,之所以求得多于图像像素数的函数值,是因为在获取的三维Logistic映射函数值中,位置越往后,其混沌散列性越好,所以我们通常取末尾个数的函数值。位置序列index1、index2、index3是一组整数序号序列;例如:a是这样一组数:0.1230,0.3450,0.7853,0.2970,0.0972,a的位置序列indexa为1,2,3,4,5;对a进行升序排序后得到b:0.0972,0.1230,0.2970,0.3450,0.7853,同时还可得到b的位置序列indexb为5,1,4,2,3;  Here we use the random number generator rand() to set the initial value of the function and some parameter values. The random number generator needs the user to define the random number seed rand('state', key), and key is one of the scrambling keys, which is any Integer, such as: key=12; in addition, the setting of the function parameter value must reach the chaotic state to obtain the ideal scrambling effect, and this chaotic state is related to the definition of the random number seed; it is also related to the generated 5× M×N three-dimensional The value of the Logistic mapping function is related to the value of the Logistic mapping function. The reason why the value of the function is more than the number of image pixels is that in the obtained 3D Logistic mapping function value, the farther the position is, the better the chaotic hashability is, so we usually take the last one function value of the number. The position sequence index1, index2, index3 is a set of integer sequence numbers; for example: a is such a set of numbers: 0.1230, 0.3450, 0.7853, 0.2970, 0.0972, the position sequence indexa of a is 1, 2, 3, 4, 5; After a is sorted in ascending order, b is obtained: 0.0972, 0.1230, 0.2970, 0.3450, 0.7853, and the position sequence indexb of b is also obtained as 5, 1, 4, 2, 3;

3)一次迭代开始:用序列index1和index2对IMAGE进行像素位置置乱,得到图像Image,并将其赋值给IMAGE,一次迭代结束;  3) Start of an iteration: use the sequence index1 and index2 to scramble the pixel position of IMAGE, get the image Image, and assign it to IMAGE, and an iteration ends;

其中,图像的像素位置置乱是改变图像的像素位置;此处采取的位置置乱是:有一像素坐标为(i,j),待置乱图像为IMAGE,置乱后图像为f,那么对这个像素点进行位置置乱过程是:f(index1(i),index(j))=IMAGE(i,j),也就是说将坐标(i,j)处的像素点调整到(index1(i),index(j))位置处;图像其它像素点依次这样调整。  Among them, the pixel position scrambling of the image is to change the pixel position of the image; the position scrambling adopted here is: a pixel coordinate is (i, j), the image to be scrambled is IMAGE, and the image after scrambling is f, then the The position scrambling process of this pixel point is: f(index1(i), index(j))=IMAGE(i, j), that is to say, adjust the pixel point at coordinate (i, j) to (index1(i ), index (j)); the other pixels of the image are adjusted in this way in turn. the

4)如果cycle不等于k,说明迭代次数未完成,转到步骤3)继续迭代,直到迭代次数为k,此时得到的图像结果为Image;  4) If the cycle is not equal to k, it means that the number of iterations has not been completed, go to step 3) continue to iterate until the number of iterations is k, and the image result obtained at this time is Image;

5)将Image一维化为image;再用index3取余255的结果与image进行异或运算,改变图像像素值,得到图像fig,并将其转换为IMAGE图像尺寸大小的图像Fig,输出最终结果为FIG,FIG即为置乱后图像;至此,正置乱过程结束。  5) One-dimensionalize the Image into an image; then use the result of taking the remainder 255 from index3 to perform an XOR operation with the image, change the pixel value of the image, obtain the image fig, and convert it into an image Fig of the size of the IMAGE image, and output the final result is FIG, and FIG is the image after scrambling; so far, the scrambling process is over. the

正置乱在置乱密钥的前提下得到了置乱后的图像FIG,从FIG中看不到原始图像的任何信息,FIG置乱效果好,保证了原始信息的安全性。  Positive scrambling obtains the scrambled image FIG under the premise of scrambling the key, and no information of the original image can be seen from FIG. FIG scrambling effect is good, which ensures the security of the original information. the

第二部分是图像的逆置乱,即置乱图像的恢复。有三个输入为待置乱图像FIG、迭代次数cycle以及随机数密钥key,一个输出为置乱后的图像OUT;根据得到的置乱图像,按照正置乱的逆过程进行置乱图像的恢复。  The second part is the inverse scrambling of the image, that is, the restoration of the scrambled image. There are three inputs for the image to be scrambled FIG, the number of iterations cycle and the random key key, and one output is the scrambled image OUT; according to the obtained scrambled image, the scrambled image is restored according to the reverse process of the normal scrambled . the

1)定义迭代次数cycle=k;  1) Define the number of iterations cycle=k;

其中,cycle同正置乱过程要一致,即cycle=1;  Among them, the cycle must be consistent with the positive scrambling process, that is, cycle=1;

2)同正置乱过程一样,获取相同的index1、index2、index3;  2) Same as the positive scrambling process, get the same index1, index2, index3;

3)将置乱图像FIG一维化为fig,再用index3取余255的结果与fig进行异或运算,得到图像fin,并将fin升维成FIG大小的图像Fig;  3) Dimensionalize the scrambled image FIG into fig, and then use index3 to take the result of 255 and perform XOR operation with fig to obtain the image fin, and upgrade fin to the image Fig of FIG size;

其中,两次异或运算又达到原始状态,所以逆置乱过程只需在正置乱过程的基础上再进行一次异或运算就是正置乱过程中异或运算的逆过程。  Among them, the two XOR operations reach the original state again, so the inverse scrambling process only needs to perform one more XOR operation on the basis of the positive scrambling process, which is the inverse process of the XOR operation in the positive scrambling process. the

4)一次迭代开始:用序列index1和index2对Fig进行像素位置逆置乱,得到图像Out,并将结果赋值给Fig,则一次迭代结束;  4) Start of an iteration: Use the sequence index1 and index2 to inversely scramble the pixel position of Fig to obtain the image Out, and assign the result to Fig, then an iteration ends;

其中,像素位置逆置乱与正置乱过程3)的像素位置置乱相反,即:f(i,j)=IMAGE(index1(i),index(j))。  Among them, the inverse scrambling of the pixel position is opposite to the scrambling of the pixel position in the forward scrambling process 3), namely: f(i, j)=IMAGE(index1(i), index(j)). the

5)如果cycle不等于k,说明迭代次数未完成,转到步骤4)继续迭代,直到迭代次数为k,此时得到的Out输出为OUT,OUT即为置乱后图像;至此,正置乱过程结束。  5) If the cycle is not equal to k, it means that the number of iterations has not been completed, go to step 4) continue to iterate until the number of iterations is k, and the output of Out obtained at this time is OUT, and OUT is the image after scrambling; so far, scrambling The process is over. the

在置乱密钥的前提下,经逆置乱过程恢复的图像OUT与原始图像无丝毫差别,达到完全恢复原始图像的目的。  Under the premise of scrambling the key, the image OUT restored through the inverse scrambling process has no slight difference from the original image, and the purpose of completely restoring the original image is achieved. the

一幅灰度图像可以看作一个二维数组,利用三维Logistic映射的函数值序列分别改变待置乱图像的像素位置和像素值,结合了像素位置置乱和像素值置乱两类方法的特性,实现了对图像的双重置乱;而且方法实现相对容易,置乱对图像尺寸没 有要求,有较好的抵抗非法攻击的能力。  A grayscale image can be regarded as a two-dimensional array, and the pixel position and pixel value of the image to be scrambled are changed respectively by using the function value sequence of the three-dimensional Logistic mapping, combining the characteristics of the two methods of pixel position scrambling and pixel value scrambling , to realize the dual reset scrambling of the image; and the method is relatively easy to implement, and the scrambling has no requirement on the size of the image, and has a good ability to resist illegal attacks. the

综上所述,我们通过对三维Logistic映射函数的分析,并利用其函数值序列实现对图像的双重置乱,得到了一种三维Logistic映射的图像双重置乱方法。  To sum up, by analyzing the 3D Logistic mapping function, and using its function value sequence to realize the double scrambling of the image, we obtained a 3D Logistic mapping image double scrambling method. the

1)置乱效果观察  1) Observation of scrambling effect

选用尺寸为方阵且大小为512×512的标准lena图和尺寸为矩形阵且大小分别为277×512和512×321的lena图,利用本发明方法对该图进行置乱操作。置乱密钥cycle为1,key为12;如图2示,(a)为大小为512×512的原始lena图,(b)为(a)经正置乱过程得到的置乱图像,(c)为(b)经逆置乱过程得到的恢复图像;(d)为大小为277×512的原始lena图,(e)为(d)经正置乱过程得到的置乱图像,(f)为(e)经逆置乱过程得到的恢复图像;(g)为大小为512×321的原始lena图,(h)为(g)经正置乱过程得到的置乱图像,(i)为(h)经逆置乱过程得到的恢复图像。从(b)(e)(h)中可以看到图像置乱视觉效果良好,置乱后的图像和白噪声一样;从(c)(f)(i)中可以看到恢复的图像与原始图像相比没有任何损失。说明本发明置乱效果基本成功。  A standard lena map whose size is a square matrix with a size of 512×512 and a lena map whose size is a rectangular matrix with a size of 277×512 and 512×321 are selected, and the method of the present invention is used to scramble the map. The scrambling key cycle is 1, and the key is 12; as shown in Figure 2, (a) is the original lena image with a size of 512×512, (b) is the scrambling image obtained by (a) the normal scrambling process, ( c) is (b) the restored image obtained by the inverse scrambling process; (d) is the original lena image with a size of 277×512, (e) is the scrambled image obtained by (d) the positive scrambling process, (f ) is (e) the restored image obtained by the inverse scrambling process; (g) is the original lena image with a size of 512×321, (h) is the scrambled image obtained by (g) the forward scrambling process, (i) (h) The restored image obtained through the inverse scrambling process. From (b) (e) (h), it can be seen that the visual effect of image scrambling is good, and the scrambled image is the same as white noise; from (c) (f) (i), it can be seen that the restored image is the same as the original There is no loss in comparison to the image. It shows that the scrambling effect of the present invention is basically successful. the

2)置乱效果评价  2) Evaluation of scrambling effect

我们用灰度值连续置乱度评价方法对本发明的方法进行置乱程度评价:  We use gray value continuous scrambling degree evaluation method to carry out scrambling degree evaluation to method of the present invention:

数字图像的置乱程度  The degree of scrambling of digital images

Figure 2013106275408100002DEST_PATH_IMAGE003
Figure 2013106275408100002DEST_PATH_IMAGE003

其中,||F‘m×n||表示置乱后图像矩阵中连续性区域的个数,||Fm×n||表示原始图像矩阵中连续区域性的个数。  Among them, ||F' m×n || represents the number of continuous regions in the scrambled image matrix, and ||F m×n || represents the number of continuous regions in the original image matrix.

置乱度评价结果如图3所示,选择大小为512×512的lena图,置乱次数为200次,从置乱度评价曲线图中可以看到:置乱无周期,不存在安全性恢复的问题;置乱能很快达到理想的置乱效果和稳定的置乱状态;置乱度相对较高。  The evaluation results of the degree of scrambling are shown in Figure 3. A lena graph with a size of 512×512 is selected, and the number of scrambling times is 200. From the evaluation curve of the degree of scrambling, it can be seen that there is no period of scrambling, and there is no security recovery problem; scrambling can quickly achieve the ideal scrambling effect and stable scrambling state; the scrambling degree is relatively high. the

3)直方图特征分析  3) Histogram feature analysis

在图4中,(a)为尺寸512×512的lena图像的直方图,(b)为512×512的lena图像经本方法置乱后图像的直方图。从图4(b)中可以看到,置乱后图像的直方图发生了变化,而且灰度值呈均匀分布的形式,说明经本方法置乱后的图像表现为白噪声,提高了非法攻击者根据置乱后图像的统计特征进行攻击的难度,从而提高了方法的安全性。  In Figure 4, (a) is the histogram of a lena image with a size of 512×512, and (b) is the histogram of a 512×512 lena image after being scrambled by this method. It can be seen from Figure 4(b) that the histogram of the image has changed after scrambling, and the gray value is uniformly distributed, indicating that the image after scrambling by this method appears as white noise, which increases the risk of illegal attacks. It is difficult for the attacker to attack according to the statistical characteristics of the scrambled image, thus improving the security of the method. the

4)抗攻击测试  4) Anti-attack test

实验选用512×512的lena图,分别对置乱图像进行剪切、加噪、JPEG压缩和滤波处理。置乱图像经过这些攻击处理后,仍具有良好的可恢复性,这个过程就是置乱图像的抗攻击测试。在图5中,(a)为剪切掉部分后的置乱图像,其中剪切部分为图像的(234:453,244:463)和(65:191,66:192)像素,(b)为剪切后恢复的图像;(c)加入椒盐噪声后的置乱图像,噪声密度为0.15,(d)加噪后恢复的图像;(e)为品质因子为0.7的JPEG压缩后的置乱图像,(f)为压缩后恢复的图像;(g)为滤波后的置乱图像,滤波用的是大小为3×3的高斯低通滤波器标准偏差为0.4,(h)为滤波后恢复图像。置乱图像经过攻击处理后的结果如图5(a)(c)(e)(g)所示,攻击处理后得到的恢复图像如图5(b)(d)(f)(h)所示。以上实验结果表明:对经本文方法置乱的图像进行一定的攻击处理,不会影响恢复图像的可知性,表明本方法有一定的抗攻击能力。  In the experiment, a lena image of 512×512 was selected, and the scrambled image was cut, added noise, JPEG compressed and filtered. After the scrambled image is processed by these attacks, it still has good recoverability. This process is the anti-attack test of the scrambled image. In Figure 5, (a) is the scrambled image after the cut part, where the cut part is the (234:453, 244:463) and (65:191, 66:192) pixels of the image, and (b) is the cut The restored image after cutting; (c) the scrambled image after adding salt and pepper noise, the noise density is 0.15, (d) the restored image after adding noise; (e) the scrambled image after JPEG compression with a quality factor of 0.7, (f) is the restored image after compression; (g) is the scrambled image after filtering, using a 3×3 Gaussian low-pass filter with a standard deviation of 0.4, (h) is the restored image after filtering. Figure 5(a)(c)(e)(g) shows the result of the scrambled image after attack processing, and the restored image after attack processing is shown in Figure 5(b)(d)(f)(h) Show. The above experimental results show that certain attack processing on the image scrambled by the method in this paper will not affect the intelligibility of the restored image, which shows that the method has certain anti-attack ability. the

Claims (1)

1. the doubling of the image disorder method based on three-dimensional Logistic mapping, is characterized in that: this disorder method is divided into the positive scramble of image, the random two parts of the inverted of image;
The positive scramble process of described image is as follows:
If treat that scramble image is that IMAGE, iterations are that cycle, random number key are key, the image after scramble is FIG; Utilize the functional value sequence of three-dimensional Logistic mapping to change respectively location of pixels and the pixel value for the treatment of scramble image, thereby obtain the image after scramble; Step is as follows:
1) definition iterations cycle=k;
2) obtain and treat that scramble image I MAGE is of a size of M * N, according to three-dimensional Logistic mapping formula, obtain respectively 5 * M * N three-dimensional Logistic mapping function value, get respectively end M the first dimension of 5 * M * N, the Logistic functional value of end M * N third dimension of end N second peacekeeping 5 * M * N of 5 * M * N, and respectively they are carried out to ascending sort, obtain position sequence index1, index2 and index3;
3) iteration starts: with sequence index1 and index2, IMAGE is carried out to location of pixels scramble, obtains image I mage, and by its assignment to IMAGE, one time iteration finishes;
4) if cycle is not equal to k, illustrate that iterations does not complete, forward step 3) to and continue iteration, until iterations is k, the image result now obtaining is Image;
5) Image one dimension is turned to image; With result and the image of index3 remainder 255, carry out XOR again, change image pixel value, obtain image fig, and be converted into the image Fig of IMAGE picture size size, output net result is FIG, and FIG is image after scramble; So far, positive scramble process finishes;
The random process of the positive inverted of described image is as follows:
If treat that scramble image is that FIG, iterations are cycle, random number key is key, and the image after scramble is OUT; Scramble image according to obtaining, carries out the recovery of scramble image according to the inverse process of positive scramble, concrete steps are as follows:
1) definition iterations cycle=k;
2) the same with positive scramble process, obtain identical index1, index2, index3;
3) scramble image FIG one dimension is turned to fig, then carry out XOR with result and the fig of index3 remainder 255, obtain image fin, and fin is risen to the image Fig that ties up into FIG size;
4) iteration starts: with sequence index1 and index2, Fig is carried out to location of pixels inverted disorderly, obtains image Out, and by result assignment to Fig, an iteration finishes;
5) if cycle is not equal to k, illustrate that iterations does not complete, forward step 4) to and continue iteration, until iterations is k, the Out now obtaining is output as OUT, OUT is image after scramble; So far, the random process of inverted finishes.
CN201310627540.8A 2013-11-28 2013-11-28 Image duel scrambling method based on three-dimensional Logistic mapping Pending CN103606126A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310627540.8A CN103606126A (en) 2013-11-28 2013-11-28 Image duel scrambling method based on three-dimensional Logistic mapping

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310627540.8A CN103606126A (en) 2013-11-28 2013-11-28 Image duel scrambling method based on three-dimensional Logistic mapping

Publications (1)

Publication Number Publication Date
CN103606126A true CN103606126A (en) 2014-02-26

Family

ID=50124346

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310627540.8A Pending CN103606126A (en) 2013-11-28 2013-11-28 Image duel scrambling method based on three-dimensional Logistic mapping

Country Status (1)

Country Link
CN (1) CN103606126A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104361551A (en) * 2014-12-08 2015-02-18 陕西师范大学 2D Wilson labyrinth based digital scrambling method
CN104361550A (en) * 2014-12-08 2015-02-18 陕西师范大学 2D BackterialGrowth labyrinth based digital scrambling method
CN104376527A (en) * 2014-12-08 2015-02-25 陕西师范大学 Figure scrambling method based on random 3D Prim labyrinth
CN104408683A (en) * 2014-12-08 2015-03-11 陕西师范大学 Digital scrambling method based on 3D (three-dimensional) Growing Tree labyrinth
CN104463769A (en) * 2014-12-08 2015-03-25 陕西师范大学 Figure scrambling method based on 3D DFS labyrinth
CN104463771A (en) * 2014-12-08 2015-03-25 陕西师范大学 Figure scrambling method based on 3D Wilson labyrinth
CN107027020A (en) * 2017-04-24 2017-08-08 万维云视(上海)数码科技有限公司 A kind of time slot scrambling of multi-view image
CN108629723A (en) * 2017-03-16 2018-10-09 湖南工程学院 A kind of three-dimensional mapping rapid image encryption method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101021941A (en) * 2007-03-23 2007-08-22 北京理工大学 Multi-channel filter group-based multifunction digital watermark method
WO2008053545A1 (en) * 2006-10-31 2008-05-08 Fujitsu Limited Image encryption/decryption device, method and program

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008053545A1 (en) * 2006-10-31 2008-05-08 Fujitsu Limited Image encryption/decryption device, method and program
CN101021941A (en) * 2007-03-23 2007-08-22 北京理工大学 Multi-channel filter group-based multifunction digital watermark method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
范铁生等: "云模型图像置乱算法", 《计算机应用》 *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104463771B (en) * 2014-12-08 2018-10-26 陕西师范大学 A kind of digital disorder method based on the labyrinths 3D Wilson
CN104376527B (en) * 2014-12-08 2018-10-26 陕西师范大学 A kind of digital disorder method based on the random labyrinths Prim 3D
CN104376527A (en) * 2014-12-08 2015-02-25 陕西师范大学 Figure scrambling method based on random 3D Prim labyrinth
CN104408683A (en) * 2014-12-08 2015-03-11 陕西师范大学 Digital scrambling method based on 3D (three-dimensional) Growing Tree labyrinth
CN104463769A (en) * 2014-12-08 2015-03-25 陕西师范大学 Figure scrambling method based on 3D DFS labyrinth
CN104463771A (en) * 2014-12-08 2015-03-25 陕西师范大学 Figure scrambling method based on 3D Wilson labyrinth
CN104361550A (en) * 2014-12-08 2015-02-18 陕西师范大学 2D BackterialGrowth labyrinth based digital scrambling method
CN104361550B (en) * 2014-12-08 2019-05-03 陕西师范大学 A digital scrambling method based on 2D BacterialGrowth maze
CN104361551B (en) * 2014-12-08 2019-03-05 陕西师范大学 A kind of digital disorder method based on the labyrinth 2D Wilson
CN104361551A (en) * 2014-12-08 2015-02-18 陕西师范大学 2D Wilson labyrinth based digital scrambling method
CN104408683B (en) * 2014-12-08 2019-03-05 陕西师范大学 A kind of digital disorder method based on the labyrinth 3D Growing Tree
CN104463769B (en) * 2014-12-08 2018-10-26 陕西师范大学 A kind of digital disorder method based on the labyrinths 3D DFS
CN108629723A (en) * 2017-03-16 2018-10-09 湖南工程学院 A kind of three-dimensional mapping rapid image encryption method
CN107027020B (en) * 2017-04-24 2018-10-02 万维云视(上海)数码科技有限公司 A kind of time slot scrambling of multi-view image
CN107027020A (en) * 2017-04-24 2017-08-08 万维云视(上海)数码科技有限公司 A kind of time slot scrambling of multi-view image

Similar Documents

Publication Publication Date Title
CN103606126A (en) Image duel scrambling method based on three-dimensional Logistic mapping
Li et al. Image encryption based on dynamic filtering and bit cuboid operations
Shang et al. A block location scrambling algorithm of digital image based on Arnold transformation
CN103955884B (en) Dual image encryption method based on chaos and discrete fraction stochastic transformation
CN107094072B (en) A Hybrid Chaos Encryption Method Based on Generalized Henon Map
CN101604440B (en) A Reversible Watermarking Method for Vector Map Based on Spatial Features
CN106604040A (en) Multi-image encryption method based on mixed primitives and full permutation
CN113115053A (en) Image encryption method based on integer wavelet transform and compressed sensing
CN107292805B (en) Image encryption method based on multi-parameter fractional order discrete Tchebichef transformation
CN108199828A (en) A kind of color image Encryption Algorithm and device
Han et al. A digital watermarking algorithm of color image based on visual cryptography and discrete cosine transform
CN105023236B (en) A kind of dual-color image blind watermarking method based on LU Decomposition
CN103971320B (en) A kind of image scrambling and restoration methods based on Henon mappings
CN106599703A (en) Mixed primitive and chaos-based multi-image encryption method
CN104143174B (en) Image disguising and reconstructing method based on Tangram algorithm and two-dimensional double-scale rectangular mapping
CN102833458B (en) Image scrambling method based on Hankel matrix scanning
Shi et al. A Blind Watermarking Technique for Color Image based on SVD with Circulation.
CN103617590B (en) A kind of image scrambling method based on Weierstrass function
Ye et al. Application of the chaotic ergodicity of standard map in image encryption and watermarking
CN115222575B (en) Vector data watermark embedding and extraction method using frequency domain coefficient ratio
Ye A novel image scrambling and watermarking scheme based on orbits of arnold transform
CN102833448B (en) Image scrambling method based on linear chain table
CN105005961B (en) Suitable for the information disguising and restoring method of TIN digital elevation model
Zhong et al. A spatial domain color watermarking scheme based on chaos
Alkhamese et al. Highly secured 3D object steganography technique for hiding compressed data

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20140226