Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Regularized cosine transformation chaotic double-random phase encoding optical image encryption method

A chaotic random phase and double random phase technology, applied in image coding, image data processing, computer security devices, etc., can solve the problem of inconvenient updating of random phase masks, inconvenient key management and transmission, and encryption systems vulnerable to selected plaintext attacks. and known plaintext attacks, etc., to achieve the effect of convenient key management and transmission, security assurance, and reduction of calculation amount.

Inactive Publication Date: 2017-03-15
TIANJIN UNIV
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1) The key is a random phase mask of the image size, therefore, key management and transmission are inconvenient (see literature [6]);
[0006] 2) Since the random phase mask is inconvenient to update, the encryption system is vulnerable to chosen plaintext attack and known plaintext attack (see literature [7] and [8])

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Regularized cosine transformation chaotic double-random phase encoding optical image encryption method
  • Regularized cosine transformation chaotic double-random phase encoding optical image encryption method
  • Regularized cosine transformation chaotic double-random phase encoding optical image encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0071] An optical image encryption method based on canonical cosine transform (CCT) and chaotic double-random phase encoding, the schematic diagram of the encryption and decryption process is shown in figure 1 As shown, the encryption method consists of the construction of a two-dimensional canonical cosine transform (CCT) system, the generation of chaotic keys, and the process of image encryption and decryption.

[0072] (1) Construction of two-dimensional canonical cosine transform (CCT) system:

[0073] In the encryption method provided by the present invention, through rigorous mathematical derivation and proof, it is found that the two-dimensional canonical cosine transform (CCT) can be composed of a linear combination of two two-dimensional linear canonical transforms (LCT). Just as the linear canonical transform (LCT) is a more generalized Fourier transform and fractional Fourier transform, the canonical cosine transform (CCT) (both in one-dimensional and two-dimensiona...

Embodiment 2

[0080] Combine below figure 1 1. The design principle introduces the scheme in embodiment 1 in detail, see the following description for details:

[0081] An optical image encryption method based on canonical cosine transform (CCT) and chaotic dual-random phase encoding, the schematic diagram of the encryption and decryption process is shown in figure 1 shown. The encryption method consists of the construction of a two-dimensional canonical cosine transform (CCT) system, the generation of chaotic keys, and the process of image encryption and decryption. The specific implementation manners of these three parts will be described in detail below.

[0082](1) Construction of two-dimensional canonical cosine transform (CCT) system:

[0083] After rigorous mathematical derivation and proof (the proof and derivation process is omitted here), it is found that the two-dimensional canonical cosine transform (CCT) can be composed of a linear combination of two two-dimensional linear c...

Embodiment 3

[0103] Below in conjunction with specific accompanying drawing, the scheme in embodiment 1 and 2 is carried out feasibility verification, see the following description for details:

[0104] Adopt the encryption method provided by the implementation of the present invention to an image (such as figure 2 As shown in (a), after encryption, the obtained encrypted image is as follows figure 2 (b) shown.

[0105] Depend on figure 2 (b) It can be seen that any information of the original image is hidden. When all the keys are correct, the decrypted image is as follows figure 2 (c) shown. Depend on figure 2 (c) It can be seen that the original image can be completely restored. It shows that the encryption and decryption of grayscale images using this system is successful.

[0106] In addition, when one key is wrong and other keys are correct, the decryption result is as follows: image 3 (a)-3(h). It can be seen that the security of the system can be guaranteed.

[0107...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of image information safety and light information processing and aims at effectively resisting known plaintext attack and selected plaintext attack, making key management and transmission convenient, further ensuring the safety and obtaining good violent attack, statistics attack, noise attack and shear attack resisting capability. According to the adopted technical scheme, a regularized cosine transformation chaotic double-random phase encoding optical image encryption method comprises the following steps that 1, a two-dimensional regularized cosine transformation CCT system is established; 2, a chaotic secret key is generated, wherein two random phase masks playing a main secret key effect are respectively generated by a one-dimensional sine chaotic system controlled by different chaotic parameters, and an initial value and control parameters of the sine chaotic system serve as main secret keys; 3, image encryption and decryption process is performed, wherein decrypted images are obtained. The method is mainly applied to image information safety and light information processing occasions.

Description

technical field [0001] The invention relates to the technical fields of image information security and optical information processing, in particular to an optical image encryption method based on canonical cosine transform (CCT) and chaotic double random phase encoding. Background technique [0002] As one of the most popular multimedia forms at present, digital images are widely used in the fields of politics, economy, military affairs, education and so on. In today's highly developed Internet technology, how to protect digital images from tampering, illegal copying and dissemination has important practical significance. The research on image encryption technology has become one of the hotspots in the field of information security. [0003] Optical information processing technology has aroused great interest in the field of image encryption research because of its high processing speed, high parallelism, and fast realization of convolution and correlation operations (see l...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06T9/00
CPCG06F21/602G06T9/007
Inventor 唐晨苏永钢李碧原程佳佳谷帆
Owner TIANJIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products