CN114362918B - Image encryption method based on central law and three-dimensional bit plane - Google Patents
Image encryption method based on central law and three-dimensional bit plane Download PDFInfo
- Publication number
- CN114362918B CN114362918B CN202210030022.7A CN202210030022A CN114362918B CN 114362918 B CN114362918 B CN 114362918B CN 202210030022 A CN202210030022 A CN 202210030022A CN 114362918 B CN114362918 B CN 114362918B
- Authority
- CN
- China
- Prior art keywords
- bit plane
- dimensional
- matrix
- rna
- dimensional matrix
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 32
- 239000011159 matrix material Substances 0.000 claims abstract description 73
- 230000000739 chaotic effect Effects 0.000 claims abstract description 28
- 230000009948 RNA mutation Effects 0.000 claims abstract description 13
- 238000009792 diffusion process Methods 0.000 claims abstract description 8
- 238000013518 transcription Methods 0.000 claims description 9
- 230000035897 transcription Effects 0.000 claims description 9
- 230000035772 mutation Effects 0.000 claims description 8
- 238000004364 calculation method Methods 0.000 claims description 3
- 230000001174 ascending effect Effects 0.000 claims description 2
- 230000002452 interceptive effect Effects 0.000 claims description 2
- 230000005540 biological transmission Effects 0.000 abstract description 6
- 230000002068 genetic effect Effects 0.000 abstract description 5
- 238000004458 analytical method Methods 0.000 abstract description 2
- 150000001413 amino acids Chemical class 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 239000000969 carrier Substances 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000003786 synthesis reaction Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/001—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Complex Calculations (AREA)
Abstract
A large number of images are generated and distributed throughout the various fields each day. In order to protect image information from being stolen in the network transmission process, an image encryption method based on a genetic center rule and a three-dimensional bit plane is provided. The invention simulates a genetic center rule and defines a three-dimensional bit plane. Firstly, converting an original image into an 8-bit binary image and converting the 8-bit binary image into a standard three-dimensional matrix; secondly, replacing the three-dimensional matrix by rotating bit planes and replacing between the bit planes; thirdly, coding a chaotic three-dimensional matrix into a DNA code, introducing RNA mutation by simulating a genetic center rule, and combining with chaos to realize diffusion; finally, an encrypted image is obtained by an RNA decoding operation. Experimental results and method analysis show that the method has strong safety and good performance.
Description
Technical Field
The present invention relates to an information encryption technology, and in particular, to an image encryption method.
Background
In recent years, security problems of networks and information systems have been increasingly emphasized, and images have become important information carriers in daily life of people. It can intuitively and vividly transmit a large amount of information and is widely applied to the fields of communication, military and medical treatment. However, due to the openness of the internet, information is easily intercepted or leaked during network transmission. Data hiding and image encryption are common methods of maintaining image security, but the former suffers from some limitations due to insufficient embedding capability, in contrast to image encryption which can effectively protect images. Therefore, how to encrypt an image effectively and securely becomes very important.
Because the image has the characteristics of large data capacity and high correlation between pixels and data redundancy, the traditional data encryption algorithm cannot encrypt the digital image. In recent years, various encryption methods based on chaos have been proposed, such as chaos-based image encryption, compressed sensing-based image encryption, genetic algorithm-based image encryption. With the advent of the big data age, the network information transmission capability is improved, and the requirements on the efficiency and the security of the encryption method are further improved.
In order to protect image information from being stolen and improve the security and efficiency of encryption in the network transmission process, an image encryption method based on a central rule and a three-dimensional bit plane is provided. The method simulates a central rule, defines a three-dimensional bit plane and improves the safety and the high efficiency of the encryption process.
Disclosure of Invention
The purpose of the invention is that: in order to protect image information from being stolen and improve the security and efficiency of encryption in the network transmission process, an image encryption method based on a central rule and a three-dimensional bit plane is provided.
The technical scheme of the invention is as follows: in order to achieve the aim of the invention, the adopted technical scheme is an image encryption method based on a central rule and a three-dimensional bit plane, and the encryption steps are detailed as follows:
Step 1: constructing a three-dimensional matrix: the interactive image is I, the size is m multiplied by n, each pixel value in the I is converted into an 8-bit binary value, and the I can be constructed into a three-dimensional matrix C multiplied by d by C= [ C ij],cij =0 or 1 through zero padding operation, wherein d is a positive integer, d 3 is more than or equal to 8mn, and d takes the smallest value;
step 2: generating a key: calculating 256-bit hash value K of I by using SHA-256 secure hash algorithm, dividing the 256-bit hash value K into blocks according to 8 bits, obtaining K=k 1, k2,…, k32, randomly selecting c 1, c2, c3, c4, c5, c6 as external key input, and calculating an initial value u 0,v0 and a control parameter mu of a two-dimensional Logistic adjustment Sine Map (Two Dimension Logistic-Adjusted-Sine Map, 2D-LASM) shown in formula (4) and an initial value x 0, y0, z0 and control parameters a, b and c of a three-dimensional Sine chaotic system shown in formula (5) by using a key generator shown in formulas (1) - (3); u 0, v0,μ, x0, y0, z0, a, b, c are keys;
, (1)
Wherein ∈ represents an exclusive or operation;
, (2)
, (3)
Wherein mod ()' represents a modulo operation;
, (4)
Wherein μ ε [0, 1] is the control parameter, u 0, v0 ε (0, 1) is the initial value;
, (5)
wherein a, b, c epsilon [1, 4] is a control parameter, x 0, y0, z0 epsilon [0,1] is an initial value;
Step 3: generating a chaotic sequence: according to the initial value X 0, y0, z0 and the control parameters a, b and c, iterating the three-dimensional Sine chaotic system 1000+d times shown in the formula (5), discarding the previous 1000 iteration values, and generating 3 chaotic sequences X, Y and Z with the lengths d; according to the initial value U 0,v0 and the control parameter mu, 2D-LASM1000+d 3/2 times shown in the iterative formula (4), discarding the previous 1000 iterative values, and generating 2 chaotic sequences U and V with the lengths of D 3/2;
step 4: three-dimensional bit plane scrambling: three-dimensional bit plane sets of C are respectively scrambled by using X, Y and Z, wherein the three-dimensional bit plane sets comprise an X bit plane set P x={px (i), a Y bit plane set P y={py (i) and a Z bit plane set P z={pz (i), and a three-dimensional scrambling matrix P 6 can be finally obtained; the specific operation is as follows: using X and formulas (6) - (9), rotating and scrambling P x={px (i),
[X1, S1]=sort(x(i)),i=1, 2,…, d, (6)
T1=mod(floor(x(i)×1016), 4)×90, (7)
Wherein, sort (-) is an ascending sort function, floor (-) is a downward rounding function, X (i) ∈x, X 1 is a new sequence after sorting, S 1 is an index value of X 1;
P1(i, :, :)=imrotate(C(i, :, :), t1(i)),i=1, 2,…, d, (8)
Wherein imrotatet ()' is a rotation function, C (i,:) is the ith X bit plane of C, t 1(i)∈T1 is the rotation angle value of the bit plane, t 1 (i) takes the value of 0 degrees, 90 degrees, 180 degrees or 270 degrees, and P 1 (i,:) is the ith X bit plane of the three-dimensional matrix P 1;
P2(i, :, :)=P1(s1(i), :, :),i=1, 2,…, d, (9)
wherein s 1(i)∈S1,P2 (i,:) is the ith X-bit plane of the three-dimensional matrix P 2;
using Y and formulas (10) - (13), rotate and scramble P y={py (i) },
[Y1, S2]=sort(y(i)),i=1, 2,…, d, (10)
T2=mod(floor(y(i)×1016), 4)×90, (11)
Wherein Y (i) ∈y, Y 1 is the new sequence after sorting, S 2 is the index value of Y 1;
P3(:, i, :)=imrotate(P2(:, i, :), t2(i)),i=1, 2,…, d, (12)
Wherein P 2 (: i,:) is the ith Y-bit plane of the three-dimensional matrix P 2, and t 2(i)∈T2,P3 (: i,:) is the ith Y-bit plane of the three-dimensional matrix P 3;
P4(:, i, :)=P3(:, s2(i), :),i=1, 2,…, d, (13)
Wherein s 2(i)∈S2,P4 (: i,:) is the ith Y-bit plane of the three-dimensional matrix P 4;
Using Z and equations (14) - (17), rotate and scramble P z={pz (i) },
[Z1, S3]=sort(z(i)),i=1, 2,…, d, (14)
T3=mod(floor(z(i)×1016), 4)×90, (15)
Wherein Z (i) ∈z, Z 1 is the new sequence after ordering, S 3 is the index value of Z 1;
P5(:, :, i)=imrotate(P4(:, :, i), t3(i)),i=1, 2,…, d, (16)
Wherein P 4 (: i) is the ith Z-bit plane of the three-dimensional matrix P 4, and t 3(i)∈T3,P5 (: i) is the ith Z-bit plane of the three-dimensional matrix P 5;
P6(:, :, i)=P5(:, :, s3(i)),i=1, 2,…, d, (17)
Wherein s 3(i)∈S3,P6 (: i) is the ith Z bit plane of the three-dimensional matrix P 6;
step 5: DNA coding: the DNA coding rules are as follows:
And (3) calculating:
li=mod(sum(P6(i, :, :), 8),i=1, 2,…, d, (18)
wherein P 6 (i,:)) is the ith X bit plane of the three-dimensional matrix P 6, sum is a summation function, and the ith X bit plane of P 6 is encoded according to the first i encoding rules in the DNA encoding rules, so as to obtain a three-dimensional DNA encoding matrix P 7 with the size of d/2X d;
step 6: transcription of DNA: the DNA transcription rules are:
According to the DNA transcription rule, P 7 is transcribed to obtain a three-dimensional RNA matrix P 8 with the size of d/2×d×d;
step 7: RNA variation: the RNA mutation rule is as follows:
u is integer by means of formula (19),
U1=floor(mod(U×1016, 4), (19)
U 1 is an integer chaotic sequence, the value of which is 0,1,2 or 3, corresponds to four modes of RNA variation, and converts U 1 into a matrix U 2 with the size of d/2 x d according to a certain rule; RNA variation was performed on P 8 using U 2 and equation (20),
P9(w1, w2, w3)=Mutation(P8(w1, w2, w3), U2(w1, w2, w3)), (20)
Wherein w 1=1, 2,…, d/2,w2=1, 2,…, d,w3 =1, 2, …, d, mutation (x, y) indicates that the base x is mutated according to the y-th Mutation mode of the RNA Mutation rule, so as to obtain an RNA Mutation matrix P 9 with the size of d/2×d×d;
step 8: RNA translation: the RNA translation rules are:
According to the RNA translation rule, translating the P 9 to obtain a three-dimensional matrix P 10 with the size of d/2 multiplied by d;
Step 9: RNA calculation: the RNA encoding rule is:
The RNA exclusive OR rule is:
The first d 2/8 elements of V are selected to form a chaotic subsequence V 1, V 1 is integer by using a formula (21),
V2=floor(mod(V1×1016, 256), (21)
Wherein V 2 is the generated integer chaotic sequence; v 2 is encoded according to the 1 st RNA encoding rule, so that a two-dimensional RNA matrix V 3 with the size of d 2/8 multiplied by 4 can be obtained; according to a certain rule, V 3 is converted into a matrix V 4 with the size of d/2 x d; performing a diffusion operation as shown in formula (22) to obtain a diffusion matrix P 11 with a size of d/2×d×d;
, (22)
wherein ☉ denotes an RNA exclusive OR operation, P 10 (j:) is the j-th X-bit plane of the three-dimensional matrix P 10, and P 11 (j:) is the j-th X-bit plane of the three-dimensional matrix P 11;
step 10: and (3) RNA decoding: the RNA decoding rules are:
And (3) calculating:
ri=mod(sum(P11(:, :, i), 8),i=1, 2,…, d, (23)
Wherein P 11 (: i) is the ith Z bit plane of the three-dimensional matrix P 11; decoding the ith Z bit plane of P 11 according to the r i decoding rules in the RNA decoding rules to obtain a decoding matrix C p with the size of d multiplied by d; and (3) removing zero elements added in the step (1) in the matrix, and converting 8-bit binary values in the matrix into decimal pixel values to obtain an encryption image E with the size of m multiplied by n.
In the decryption process, the same chaotic sequence is used for decrypting the encrypted image, so that the original image can be restored, and the decryption process is the inverse process of the encryption process.
The beneficial effects are that: in order to protect image information from being stolen and improve the security and efficiency of encryption in the network transmission process, an image encryption method based on a central rule and a three-dimensional bit plane is provided, and the following five points are mainly contributed: (1) Three-dimensional bit planes are defined, a three-dimensional scrambling mode is designed, and a plurality of bit planes can be scrambled synchronously; (2) Generating an initial value and a control parameter of the chaotic system by the SHA-256 hash value of the plaintext image and the external parameter; (3) The central rule including DNA coding, transcription, translation and amino acid synthesis is simulated, so that the image encryption is tightly combined with the biological genetic process; (4) Introducing RNA mutation in the encryption process, simulating the mutation process in the nature, and further improving the safety of the encryption method by mutation mode and position randomness, and combining RNA operation with the RNA matrix generated by chaos to realize further diffusion; (5) Experimental results and method analysis verify the feasibility and safety of the proposed method.
Drawings
Fig. 1: an encryption flow chart;
Fig. 2: an original image;
fig. 3: the image is encrypted.
Detailed Description
The practice of the invention is described in further detail below with reference to the attached drawings and examples.
Fig. 1 is an encryption flow chart of the present method.
The programming software used was Matlab R2016a and the Lena gray scale image of size 512 x 512 shown in fig. 2 was selected as the subject.
Step 1: constructing a three-dimensional matrix: inputting 1 image of Lena gray scale with size 512×512 as plaintext image I, converting each pixel value in I into 8-bit binary value, by means of the zero-filling operation, I can be constructed to be 128X 128 in size x 128 three-dimensional matrix c= [ C ij],cij =0 or 1.
Step 2: generating a key: calculating 256-bit hash value K of I by using SHA-256 secure hash algorithm, dividing the hash value K into blocks according to 8 bits to obtain K=k 1, k2,…, k32, selecting c1=0.6723,c2=0.1839,c3=0.2343,c4=0.0928,c5=0.5623,c6=0.2613 as external key input, and calculating initial value u 0, v0 of 2D-LASM and control parameter mu, and initial value x 0, y0, z0 of the three-dimensional Sine chaotic system and control parameters a, b and c by using a key generator.
Step 3: generating a chaotic sequence: according to the initial value X 0, y0, z0 and the control parameters a, b and c, iterating the three-dimensional Sine chaotic system 1128 times, and discarding the previous 1000 iteration values, 3 chaotic sequences X, Y and Z with the lengths of 128 can be generated; according to the initial value U 0,v0 and the control parameter mu, 2D-LASM1049576 times are iterated, and the previous 1000 iteration values are discarded, so that 2 chaotic sequences U and V with the lengths of 1048576 can be generated.
Step 4: three-dimensional bit plane scrambling: three-dimensional bit plane sets of C, including X bit plane set P x={px (i), Y bit plane set P y={py (i) and Z bit plane set P z={pz (i), are scrambled with X, Y and Z, respectively, to finally obtain a three-dimensional scrambling matrix P 6.
Step 5: DNA coding: by using the formula (18), the ith X bit plane of P 6 is encoded according to the first i coding rules in the DNA coding rules, so as to obtain a three-dimensional DNA coding matrix P 7 with the size of 64×128×128.
Step 6: transcription of DNA: according to the DNA transcription rule, P 7 is transcribed to obtain a three-dimensional RNA matrix P 8 with the size of 64×128×128.
Step 7: RNA variation: u 1 is an integer chaotic sequence of U, the value of U is 0,1,2 or 3, and the four modes correspond to RNA variation; according to a certain rule, U 1 is converted into a matrix U 2 with the size of 64 multiplied by 128, and RNA mutation is carried out on P 8 by using U 2, so that an RNA mutation matrix P 9 with the size of 64 multiplied by 128 can be obtained.
Step 8: RNA translation: according to the RNA translation rule, P 9 is translated to obtain a three-dimensional matrix P 10 with the size of 64 multiplied by 128.
Step 9: RNA calculation: the first 2048 elements of V are selected to form an integer chaotic sequence with a chaotic subsequence V 1,V2 being V 1; v 2 is encoded according to the 1 st RNA encoding rule, so that a two-dimensional RNA matrix V 3 with the size of 2048 multiplied by 4 can be obtained; according to a certain rule, V 3 is converted into a matrix V 4 with the size of 64 multiplied by 128; the diffusion operation is performed on P 10 by using V 4, and a diffusion matrix P 11 with a size of 64×128×128 can be obtained.
Step 10: and (3) RNA decoding: according to the (i) th decoding rule of the RNA decoding rules by using the formula (23), decoding the ith Z bit plane of P 11, a size of 128×128 can be obtained a decoding matrix C p of x 128; the zero elements added in step 1 in the matrix are removed, and the 8-bit binary values in the matrix are converted into decimal pixel values, so that an encrypted image E with the size of 512×512 can be obtained, as shown in fig. 3.
In the decryption process, the same chaotic sequence is utilized to decrypt the encrypted image E, so that the original image can be restored, and the decryption process is the inverse process of the encryption process.
Claims (2)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210030022.7A CN114362918B (en) | 2022-01-12 | 2022-01-12 | Image encryption method based on central law and three-dimensional bit plane |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210030022.7A CN114362918B (en) | 2022-01-12 | 2022-01-12 | Image encryption method based on central law and three-dimensional bit plane |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114362918A CN114362918A (en) | 2022-04-15 |
CN114362918B true CN114362918B (en) | 2024-11-26 |
Family
ID=81108462
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210030022.7A Active CN114362918B (en) | 2022-01-12 | 2022-01-12 | Image encryption method based on central law and three-dimensional bit plane |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114362918B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114938266A (en) * | 2022-07-04 | 2022-08-23 | 中国矿业大学 | Multi-image encryption method based on multi-directional scanning model and DNA mask operation |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111080506A (en) * | 2020-01-06 | 2020-04-28 | 中国矿业大学 | Multi-image encryption method based on bit plane and chaos |
CN113612899A (en) * | 2021-07-26 | 2021-11-05 | 中国矿业大学 | Image encryption method based on RNA and pixel depth |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107392970B (en) * | 2017-07-12 | 2020-12-04 | 湖北民族学院 | A digital image encryption method based on bit plane and high-dimensional chaotic system |
CN107610037A (en) * | 2017-09-29 | 2018-01-19 | 重庆第二师范学院 | A kind of image encryption method and device for merging more chaotic maps and DNA encoding |
CN112422268B (en) * | 2020-11-10 | 2021-08-20 | 郑州轻工业大学 | An image encryption method based on block scrambling and state transition |
-
2022
- 2022-01-12 CN CN202210030022.7A patent/CN114362918B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111080506A (en) * | 2020-01-06 | 2020-04-28 | 中国矿业大学 | Multi-image encryption method based on bit plane and chaos |
CN113612899A (en) * | 2021-07-26 | 2021-11-05 | 中国矿业大学 | Image encryption method based on RNA and pixel depth |
Also Published As
Publication number | Publication date |
---|---|
CN114362918A (en) | 2022-04-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113297606B (en) | Color quantum image encryption and decryption method based on multiple chaos and DNA operation | |
CN112422266B (en) | Hyperchaotic encryption method based on Joseph traversal and bit plane reconstruction | |
CN1086260C (en) | variable key encryption system | |
CN109376540B (en) | An Image Encryption Method Based on Duffing Mapping and Genetic Operation | |
CN113225449A (en) | Image encryption method based on chaos sequence and DNA coding | |
CN107220923B (en) | Digital picture feedback encryption method based on image network | |
CN112202984A (en) | Ciphertext domain reversible information hiding method based on error correction redundancy | |
CN113691362B (en) | Bit plane image compression encryption method based on hyperchaotic system and DNA coding | |
CN112769545B (en) | Image Encryption Method Based on Adjacent Pixel Joseph Transform and Mealy State Machine | |
CN113612899A (en) | Image encryption method based on RNA and pixel depth | |
CN113099069B (en) | Multi-image encryption method based on three-dimensional spiral model | |
CN113129196A (en) | Image encryption method based on DNA sequence and memristor chaos | |
CN113132079B (en) | Multi-image encryption method and decryption method | |
CN111865553A (en) | Multi-audio encryption method based on chaos and Zigzag transform | |
CN117527984A (en) | Image encryption method based on sine and cosine two-dimensional chaotic system | |
CN114362918B (en) | Image encryption method based on central law and three-dimensional bit plane | |
CN114726497A (en) | Fractal sequencing and DNA chaotic image encryption method based on multi-target mayflies optimization | |
Alhassan et al. | Enhancing image security during transmission using residue number system and k-shuffle | |
CN115103080B (en) | Image encryption method and system based on DNA triploid variation | |
CN114882893B (en) | Audio encryption method based on DNA convolution | |
CN116318615B (en) | Image encryption method and decryption method based on combination of hyperchaotic system and DNA (deoxyribonucleic acid) coding | |
CN112182610A (en) | An image encryption method, device, equipment and storage medium | |
Li et al. | A novel image encryption algorithm based on cellular automata and chaotic system | |
CN115150059B (en) | Image encryption method based on RNA coding and three-dimensional dynamic S-box | |
CN116436589A (en) | Image encryption method and decryption method based on light chaos and DNA magic cube scrambling |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |