Regularized cosine transformation chaotic double-random phase encoding optical image encryption method
A chaotic random phase and double random phase technology, applied in image coding, image data processing, computer security devices, etc., can solve the problem of inconvenient updating of random phase masks, inconvenient key management and transmission, and encryption systems vulnerable to selected plaintext attacks. and known plaintext attacks, etc., to achieve the effect of convenient key management and transmission, security assurance, and reduction of calculation amount.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0071] An optical image encryption method based on canonical cosine transform (CCT) and chaotic double-random phase encoding, the schematic diagram of the encryption and decryption process is shown in figure 1 As shown, the encryption method consists of the construction of a two-dimensional canonical cosine transform (CCT) system, the generation of chaotic keys, and the process of image encryption and decryption.
[0072] (1) Construction of two-dimensional canonical cosine transform (CCT) system:
[0073] In the encryption method provided by the present invention, through rigorous mathematical derivation and proof, it is found that the two-dimensional canonical cosine transform (CCT) can be composed of a linear combination of two two-dimensional linear canonical transforms (LCT). Just as the linear canonical transform (LCT) is a more generalized Fourier transform and fractional Fourier transform, the canonical cosine transform (CCT) (both in one-dimensional and two-dimensiona...
Embodiment 2
[0080] Combine below figure 1 1. The design principle introduces the scheme in embodiment 1 in detail, see the following description for details:
[0081] An optical image encryption method based on canonical cosine transform (CCT) and chaotic dual-random phase encoding, the schematic diagram of the encryption and decryption process is shown in figure 1 shown. The encryption method consists of the construction of a two-dimensional canonical cosine transform (CCT) system, the generation of chaotic keys, and the process of image encryption and decryption. The specific implementation manners of these three parts will be described in detail below.
[0082](1) Construction of two-dimensional canonical cosine transform (CCT) system:
[0083] After rigorous mathematical derivation and proof (the proof and derivation process is omitted here), it is found that the two-dimensional canonical cosine transform (CCT) can be composed of a linear combination of two two-dimensional linear c...
Embodiment 3
[0103] Below in conjunction with specific accompanying drawing, the scheme in embodiment 1 and 2 is carried out feasibility verification, see the following description for details:
[0104] Adopt the encryption method provided by the implementation of the present invention to an image (such as figure 2 As shown in (a), after encryption, the obtained encrypted image is as follows figure 2 (b) shown.
[0105] Depend on figure 2 (b) It can be seen that any information of the original image is hidden. When all the keys are correct, the decrypted image is as follows figure 2 (c) shown. Depend on figure 2 (c) It can be seen that the original image can be completely restored. It shows that the encryption and decryption of grayscale images using this system is successful.
[0106] In addition, when one key is wrong and other keys are correct, the decryption result is as follows: image 3 (a)-3(h). It can be seen that the security of the system can be guaranteed.
[0107...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com