• 综合性科技类中文核心期刊
    • 中国科技论文统计源期刊
    • 中国科学引文数据库来源期刊
    • 中国学术期刊文摘数据库(核心版)来源期刊
    • 中国学术期刊综合评价数据库来源期刊
SUN Guangmin, WANG Hao. Image Encryption and Decryption Technology Based on Rubik's Cube and Dynamic Password[J]. Journal of Beijing University of Technology, 2021, 47(8): 833-841. DOI: 10.11936/bjutxb2020120003
Citation: SUN Guangmin, WANG Hao. Image Encryption and Decryption Technology Based on Rubik's Cube and Dynamic Password[J]. Journal of Beijing University of Technology, 2021, 47(8): 833-841. DOI: 10.11936/bjutxb2020120003

Image Encryption and Decryption Technology Based on Rubik's Cube and Dynamic Password

More Information
  • Received Date: December 03, 2020
  • Available Online: August 03, 2022
  • Published Date: August 09, 2021
  • To improve the cracking difficulty of encrypted images and not significantly increase the decryption time, a method to protect image data was proposed in this paper. First, a dynamic cipher verification method was proposed, which expanded the number of cipher text and ensured that the cipher text was different each time when typing the same plaintext so as to prevent the cipher algorithm from being cracked by dictionary or exhaustive method. At the same time, the encryption and decryption performance was adjusted independently according to the computer system environment. Second, the Rubik's cube algorithm was proposed, which the pixel and password data was rearranged into a hexahedral structure, the data on the face and bit was confused according to the form of cross axis, and the purpose of encrypting the image was achieved. According to the Rubik's cube principle, the data on each face was arranged in turn according to the password data sequence and pixel correlation. Experimental results show that this method can effectively prevent image privacy leakage and algorithm cracking, avoid the neural network to replay the pixel information, and run efficiently in the online image recognition system.

  • [1]
    JIE Y Z, LIU L F. Novel image encryption by combining dynamic DNA sequence encryption and the improved 2D logistic sine map[J]. IET Image Processing, 2020, 14(11): 2310-2320. doi: 10.1049/iet-ipr.2019.1340
    [2]
    RAM C B, SUVAMOY C. Perceptual accessible image encryption scheme conjugating multiple chaotic maps[J]. IET Image Processing, 2020, 14(11): 2457-2468. doi: 10.1049/iet-ipr.2019.0527
    [3]
    LI W, CHANG X Y, YAN A M, et al. Asymmetric multiple image elliptic curve cryptography[J]. Optics and Lasers in Engineering, 2021, 136: 106319. doi: 10.1016/j.optlaseng.2020.106319
    [4]
    BART K. Deciding the point-to-fixed-point problem for skew tent maps on an interval[J]. Journal of Computer and System Sciences, 2021, 115: 113-120. doi: 10.1016/j.jcss.2020.07.005
    [5]
    刘向东, 焉德军, 朱志良, 等. 基于排序变换的混沌图像置乱算法[J]. 中国图象图形学报, 2005, 10(5): 656-660. doi: 10.3969/j.issn.1006-8961.2005.05.021

    LIU X D, YAN D J, ZHU Z L, et al. Chaotic image scrambling algorithm based on sorting transformation[J]. Journal of Image and Graphics, 2005, 10(5): 656-660. (in Chinese) doi: 10.3969/j.issn.1006-8961.2005.05.021
    [6]
    耿彬彬, 朱范华, 王江燕. 基于改进的Logistic映射和Henon映射图像加密算法[J]. 科技经济导刊, 2019, 27(31): 158. https://www.cnki.com.cn/Article/CJFDTOTAL-JJKJ201931119.htm

    GENG B B, ZHU F H, WANG J Y. Image encryption algorithm based on improved logistic map and Henon map[J]. Technology and Economy Guide, 2019, 27(31): 158. (in Chinese) https://www.cnki.com.cn/Article/CJFDTOTAL-JJKJ201931119.htm
    [7]
    Openwall. Security info open environments. CRYPT_BLOWFISH security fix details[EB/OL]. [2011-06-21]. https://www.openwall.com/lists/announce/2011/06/21/1.
    [8]
    PHP Official Manual. Class: Crypt_Blowfish[EB/OL]. [2020-03-12]. https://pear.php.net/package/Crypt_Blowfish/docs/1.1.0RC2/Crypt_Blowfish/Crypt_Blowfish.html.
    [9]
    [10]
    程航, 王子驰, 张新鹏. 基于图像块分组的加密域可逆信息隐藏[J]. 北京工业大学学报, 2016, 42(5): 722-728. doi: 10.11936/bjutxb2015080007

    CHENG H, WANG Z C, ZHANG X P. Reversible data hiding for encrypted image based on image blocks grouping[J]. Journal of Beijing University of Technology, 2016, 42(5): 722-728. (in Chinese) doi: 10.11936/bjutxb2015080007
    [11]
    MORRIS W H, STEPHEN S, ROBERT L D. Differential equations, dynamical systems, and an introduction to chaos[M]. 3rd ed. Berkeley: Academic Press, 2012: 39-59.
    [12]
    JERRY S, DAVLD S. 魔方宝典[M]. 王皓, 译. 沈阳: 辽宁科学技术出版社, 2010: 50-140.
    [13]
    李亚翔, 张显全, 俞春强, 等. 采用相邻像素预测的可逆信息隐藏算法[J]. 华侨大学学报(自然科学版), 2020, 41(2): 223-229. https://www.cnki.com.cn/Article/CJFDTOTAL-HQDB202002013.htm

    LI Y X, ZHANG X Q, YU C Q, et al. Reversible information hiding algorithm based on adjacent pixel prediction[J]. Journal of Huaqiao University (Natural Science), 2020, 41(2): 223-229. (in Chinese) https://www.cnki.com.cn/Article/CJFDTOTAL-HQDB202002013.htm
    [14]
    李新社, 杜晓辉, 尹毅峰, 等. 多态密码机制的改进及其严格雪崩特性分析[J]. 北京工业大学学报, 2009, 35(6): 851-855. doi: 10.11936/bjutxb2009060851

    LI X S, DU X H, YIN Y F, et al. Improvement of polymorphic cipher mechanism and analysis of its strict avalanche property[J]. Journal of Beijing University of Technology, 2009, 35(6): 851-855. (in Chinese) doi: 10.11936/bjutxb2009060851
    [15]
    胡进, 何德彪, 陈建华, 等. 基于椭圆曲线同源的公钥密码机制[J]. 北京工业大学学报, 2011, 37(6): 916-920. doi: 10.11936/bjutxb2011060916

    HU J, HE D B, CHEN J H, et al. Public key cryptosystem based on elliptic curve homology[J]. Journal of Beijing University of Technology, 2011, 37(6): 916-920. (in Chinese) doi: 10.11936/bjutxb2011060916
    [16]
    梁晓萍, 郭振军, 朱昌洪. 基于头脑风暴优化算法的BP神经网络模糊图像复原[J]. 电子与信息学报, 2019, 41(12): 2980-2986. doi: 10.11999/JEIT190261

    LIANG X P, GUO Z J, ZHU C H. Fuzzy image restoration of BP neural network based on brain storming optimization algorithm[J]. Journal of Electronics and Information, 2019, 41(12): 2980-2986. (in Chinese) doi: 10.11999/JEIT190261
    [17]
    李德奎. 超混沌系统的函数投影同步在图像加密中的应用[J]. 北京工业大学学报, 2019, 45(1): 24-32. doi: 10.11936/bjutxb2018020027

    LI D K. Application for function projection synchronization of the hyper-chaotic system in image encryption[J]. Journal of Beijing University of Technology, 2019, 45(1): 24-32. (in Chinese) doi: 10.11936/bjutxb2018020027

Catalog

    Article views (213) PDF downloads (65) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return