Optical image encryption method based on four-step generalized phase shifting and multi-step Fresnel transform

A technology of transformation optics and encryption methods, which is applied in the field of optical image encryption based on four-step generalized phase-shift digital holography and multi-step Fresnel transform, can solve the problems of key management and transmission inconvenience, and achieve the effect of security assurance

Inactive Publication Date: 2017-03-29
TIANJIN UNIV
View PDF2 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0022] In order to overcome the deficiencies in the prior art, the present invention aims to propose an image encryption method, which can effectively resist known plaintext attacks and chosen plaintext attacks; in addition, it also solves the problems of key management and inconvenient transmission from key generation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Optical image encryption method based on four-step generalized phase shifting and multi-step Fresnel transform
  • Optical image encryption method based on four-step generalized phase shifting and multi-step Fresnel transform
  • Optical image encryption method based on four-step generalized phase shifting and multi-step Fresnel transform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0103] An optical image encryption method based on four-step generalized phase-shift digital holography and multi-step Fresnel transform, the optical path diagram is as follows figure 1 As shown, the encryption method consists of three parts: the key generation part, the image encryption part and the image decryption part.

[0104] see figure 1 , where the key generation part consists of two pieces of chaotic random phase mask CRPM generated by the Tinkerbell chaotic system 1 and CRPM 2 ; The image encryption part and the image decryption part include: lens (L, L 0 , L 1 , L 2 ), mirror (M 1 ,M 2 ), spatial filter (SF), beam splitter (BS 1 , BS 2 ), phase shifter (PZT), laser, CCD camera, computer, etc.

[0105] (1) Key generation part:

[0106] In the encryption method provided by the present invention, two random phase mask keys are respectively generated by Tinkerbell chaotic systems controlled by different chaotic parameters. The initial value and control parame...

Embodiment 2

[0113] Combine below figure 1 1. The design principle introduces the scheme in embodiment 1 in detail, see the following description for details:

[0114] An optical image encryption method based on four-step generalized phase-shift digital holography and multi-step Fresnel transform. The corresponding optical path of the encryption and decryption process is as follows: figure 1 As shown, the encryption method consists of three parts: the key generation part, the image encryption part and the image decryption part. The specific implementation manners of these three parts will be described in detail below.

[0115] (1) Key generation part:

[0116] In the encryption method, two chaotic random phase masks act as the master key, and the wavelength of the object light wave and the Fresnel transform distance act as the auxiliary key. The following is a detailed introduction on how to use the Tinkerbell chaotic system to generate these two chaotic random phase masks.

[0117] Th...

Embodiment 3

[0150] Below in conjunction with specific accompanying drawing, the scheme in embodiment 1 and 2 is carried out feasibility verification, see the following description for details:

[0151] Adopt the encryption method provided by the implementation of the present invention to an image (such as figure 2 As shown in (a), after encryption, the obtained encrypted image is as follows figure 2 (b) shown.

[0152] Depend on figure 2 (b) It can be seen that any information of the original image is hidden. When all the keys are correct, the decrypted image is as follows figure 2 (c) shown. Depend on figure 2 (c) It can be seen that the original image can be well restored. It shows that the encryption and decryption of grayscale images using this system is successful.

[0153] In addition, when one key is wrong and other keys are correct, the decryption result is as follows: image 3 (a)-3(j). It can be seen that the security of the system can be guaranteed.

[0154] Fi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of image information security and optical information processing, can effectively resist known-plaintext attack and chosen-plaintext attack, and solves the problem of being inconvenient in key management and transmission on an aspect of key generation so as to further guarantee security. The optical image encryption method based on four-step generalized phase shifting and multi-step Fresnel transform comprises the following steps of: 1) a key generation part: two random phase masks which perform a main key function are independently generated by Tinkerbell chaotic systems controlled by different chaotic parameters; 2) an image encryption part: four holograms are used for obtaining an encrypted image; and 3) an image decryption part: after an input image is subjected to Fresnel inverse transform of which the distance is Z2, the input image is subjected to complex conjugation modulation by a second chaotic random phase mask and is subjected to the complex conjugation modulation by a first chaotic random phase mask, and then, the obtained input image is subjected to the Fresnel inverse transform of which the distance is Z to obtain a decrypted image. The method is mainly applied to the field of image information security.

Description

technical field [0001] The invention relates to the technical fields of image information security and optical information processing, in particular to an optical image encryption method based on four-step generalized phase-shift digital holography and multi-step Fresnel transformation. Background technique [0002] As one of the most popular multimedia forms at present, digital images are widely used in the fields of politics, economy, military affairs, education and so on. In today's highly developed Internet technology, how to protect digital images from tampering, illegal copying and dissemination has important practical significance. The research on image encryption technology has become one of the hotspots in the field of information security. [0003] Optical information processing technology has aroused great interest in the field of image encryption research because of its high processing speed, high parallelism, and fast realization of convolution and correlation ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/10G06F21/62G06T1/00H04L9/00
CPCG06F21/10G06F21/62G06T1/0021H04L9/001
Inventor 唐晨苏永钢李碧原程佳佳谷帆
Owner TIANJIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products