Optical image encryption method based on Gyrator transform and coupled chaos
An encryption method and optical image technology, applied in image data processing, image data processing, instruments, etc., can solve the problem that encryption systems are vulnerable to selected plaintext attacks and known plaintext attacks, random phase masks are inconvenient to update, key management and Inconvenient transmission and other problems, to achieve the effect of resisting known plaintext attacks, resisting selected plaintext attacks, key management and convenient transmission
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0070] An optical image encryption method based on Gyrator transform and coupled Logistic chaos, the schematic diagram of the encryption and decryption process is as follows figure 1 As shown, the encryption method consists of the construction of coupled Logistic chaos, the generation of chaotic keys, and the image encryption and decryption based on Gyrator transform.
[0071] (1) Construction of coupled Logistic chaos:
[0072] In the encryption method provided by the present invention, the coupled Logistic chaotic system connects two one-dimensional Logistic chaotic maps through a coupling parameter; compared with a single one-dimensional Logistic chaotic system, the coupled Logistic chaotic system has a larger parameter space, Better pseudo-randomness, and more random number sequences can be generated.
[0073] (2) Generation of chaotic key:
[0074] In the encryption method provided by the present invention, the two random phase masks that play the role of the master key...
Embodiment 2
[0079] Combine below figure 1 1. The design principle introduces the scheme in embodiment 1 in detail, see the following description for details:
[0080] An optical image encryption method based on Gyrator transform and coupled Logistic chaos, the schematic diagram of the encryption and decryption process is as follows figure 1 shown. The encryption method consists of the construction of coupled Logistic chaos, the generation of chaotic keys, and the image encryption and decryption based on Gyrator transform. The specific implementation manners of these three parts will be described in detail below.
[0081] (1) Construction of coupled Logistic chaos:
[0082] The mathematical expression of the discrete form of the one-dimensional Logistic chaotic system is:
[0083] x n+1 =μx n (1-x n ) (1)
[0084] where x n is the initial value of the chaotic system, x n+1 is the iterative output value of the chaotic system; and when the control parameter μ∈(3.56,4], the Logistic...
Embodiment 3
[0103] Below in conjunction with specific accompanying drawing, the scheme in embodiment 1 and 2 is carried out feasibility verification, see the following description for details:
[0104] Adopt the encryption method provided by the implementation of the present invention to an image (such as figure 2 As shown in (a), after encryption, the obtained encrypted image is as follows figure 2 (b) shown.
[0105] Depend on figure 2 (b) It can be seen that any information of the original image is hidden. When all the keys are correct, the decrypted image is as follows figure 2 (c) shown. Depend on figure 2 (c) It can be seen that the original image can be completely restored. It shows that the encryption and decryption of grayscale images using this system is successful.
[0106] In addition, when one key is wrong and other keys are correct, the decryption result is as follows: image 3 (a)-3(e). It can be seen that the security of the system can be guaranteed.
[0107...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com