Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Score Mellin transform-based optical image encryption method

A technology of Merlin transformation and encryption method, which is applied in the field of information security, can solve the problems of speed and cost limitations, and achieve high security, enhanced anti-attack, and good anti-attack effects

Inactive Publication Date: 2011-05-25
NANCHANG UNIV
View PDF6 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Traditional encryption technology mainly relies on electronic devices such as computers or digital signal processors, and these methods are limited by speed and cost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Score Mellin transform-based optical image encryption method
  • Score Mellin transform-based optical image encryption method
  • Score Mellin transform-based optical image encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] Embodiment 1: Image encryption based on double random phase encoding.

[0034] This implementation scheme is based on the principle of dual random phase encoding, and the encryption process comprehensively utilizes fractional Merlin transform and fractional Fourier transform. The encryption and decryption process can be expressed as follows:

[0035] Encryption process: (1-1)

[0036] Decryption process: (1-2)

[0037] in represents the input plaintext, represents the ciphertext, represents the decrypted image, express Fractional Merlin transform of order (assuming axis and The same order of transformation is carried out in the axial direction), express order of the Fractional Fourier Transform (assuming axis and The same order of transformation is carried out in the axial direction), and for distribution in independent white noise.

[0038] The schematic diagram of the optical image device of this embodiment is ...

Embodiment 2

[0043] Embodiment 2: Image encryption based on multi-order fractional Merlin transform.

[0044] to image Fractional Merlin transform of different orders is carried out in different areas of different regions. Since the fractional Merlin transform is convenient for ring processing, the sub-image are annular regions with different inner and outer radii. by For example, put Decomposed into 4 ring domains. Such as figure 2 As shown, these rings are all centered on the center of the picture, where is a radius of the circle, is the inner radius of The outer radius is ring domain, is the inner radius of The outer radius is ring domain, is the inner radius of The outer radius is ring domain, where It is the distance from the center of the image to the top corner of the image. right conduct Order Fractional Merlin Transform to get ,in .

[0045] (2-1)

[0046] in Represents the two-dimensional fractional Merlin transform, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a score Mellin transform-based optical image encryption method. The method comprises the following steps of: realizing score Mellin transform on an image according to an annular range in an optical mode; receiving a score Mellin transform result by using a charge coupled device (CCD) detector; taking a transform order of the score Mellin transform as a key; and taking a center coordinate of coordinate transform and the inner radius and the outer radius of an annular domain in which the transform is implemented as secondary keys. The method has high attack resistance and high safety.

Description

technical field [0001] The patent of the present invention belongs to the field of information security technology, in particular to image encryption technology. Background technique [0002] With the development of global networking, people are increasingly dependent on network systems and information resources. At the same time, hidden dangers of network information security inevitably arise. Therefore, information security technology has attracted much attention, and encryption technology is the core of information security. As a special information carrier, images are widely used in various fields due to their vivid features. In some special applications, image information, as confidential information, needs to be transmitted after special processing to prevent leakage of sensitive information. Image information is different from general text information. It has the characteristics of large data volume, wide frequency band, large information redundancy, and certain dist...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00
Inventor 周南润王轶娴吴建华
Owner NANCHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products