Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Optical image encryption method based on Gyrator transform and coupled chaos

An encryption method and optical image technology, applied in image data processing, image data processing, instruments, etc., can solve the problem that encryption systems are vulnerable to selected plaintext attacks and known plaintext attacks, random phase masks are inconvenient to update, key management and Inconvenient transmission and other problems, to achieve the effect of resisting known plaintext attacks, resisting selected plaintext attacks, key management and convenient transmission

Inactive Publication Date: 2017-05-10
TIANJIN UNIV
View PDF1 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1) The key is a random phase mask of the image size, therefore, key management and transmission are inconvenient (see literature [5]);
[0006] 2) Since the random phase mask is inconvenient to update, the encryption system is vulnerable to chosen plaintext attack and known plaintext attack (see literature [6] and [7])

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Optical image encryption method based on Gyrator transform and coupled chaos
  • Optical image encryption method based on Gyrator transform and coupled chaos
  • Optical image encryption method based on Gyrator transform and coupled chaos

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0070] An optical image encryption method based on Gyrator transform and coupled Logistic chaos, the schematic diagram of the encryption and decryption process is as follows figure 1 As shown, the encryption method consists of the construction of coupled Logistic chaos, the generation of chaotic keys, and the image encryption and decryption based on Gyrator transform.

[0071] (1) Construction of coupled Logistic chaos:

[0072] In the encryption method provided by the present invention, the coupled Logistic chaotic system connects two one-dimensional Logistic chaotic maps through a coupling parameter; compared with a single one-dimensional Logistic chaotic system, the coupled Logistic chaotic system has a larger parameter space, Better pseudo-randomness, and more random number sequences can be generated.

[0073] (2) Generation of chaotic key:

[0074] In the encryption method provided by the present invention, the two random phase masks that play the role of the master key...

Embodiment 2

[0079] Combine below figure 1 1. The design principle introduces the scheme in embodiment 1 in detail, see the following description for details:

[0080] An optical image encryption method based on Gyrator transform and coupled Logistic chaos, the schematic diagram of the encryption and decryption process is as follows figure 1 shown. The encryption method consists of the construction of coupled Logistic chaos, the generation of chaotic keys, and the image encryption and decryption based on Gyrator transform. The specific implementation manners of these three parts will be described in detail below.

[0081] (1) Construction of coupled Logistic chaos:

[0082] The mathematical expression of the discrete form of the one-dimensional Logistic chaotic system is:

[0083] x n+1 =μx n (1-x n ) (1)

[0084] where x n is the initial value of the chaotic system, x n+1 is the iterative output value of the chaotic system; and when the control parameter μ∈(3.56,4], the Logistic...

Embodiment 3

[0103] Below in conjunction with specific accompanying drawing, the scheme in embodiment 1 and 2 is carried out feasibility verification, see the following description for details:

[0104] Adopt the encryption method provided by the implementation of the present invention to an image (such as figure 2 As shown in (a), after encryption, the obtained encrypted image is as follows figure 2 (b) shown.

[0105] Depend on figure 2 (b) It can be seen that any information of the original image is hidden. When all the keys are correct, the decrypted image is as follows figure 2 (c) shown. Depend on figure 2 (c) It can be seen that the original image can be completely restored. It shows that the encryption and decryption of grayscale images using this system is successful.

[0106] In addition, when one key is wrong and other keys are correct, the decryption result is as follows: image 3 (a)-3(e). It can be seen that the security of the system can be guaranteed.

[0107...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of image information security and optical information processing, and aims to effectively resist known plaintext attack and chosen plaintext attack and make key management and transmission more convenient. The technical scheme adopted in the invention is as follows: an optical image encryption method based on Gyrator transform and coupled chaos comprises the following steps: (1) construction of a coupled Logistic chaos: two one-dimensional Logistic chaos maps are associated together by a coupling parameter; (2) generation of a chaotic key: two random phase masks serving as a master key are generated by coupled Logistic chaos systems controlled by different chaotic parameters; and (3) image encryption and decryption based on Gyrator transform: first, a to-be-encrypted image is modulated by the first chaos random phase mask in the process of encryption, and second, the image is modulated by the complex conjugate of the first chaos random phase mask. The method is mainly applied to an image information security occasion.

Description

technical field [0001] The invention relates to the technical fields of image information security and optical information processing, in particular to an optical image encryption method based on Gyrator transformation and coupled Logistic chaos. Background technique [0002] As one of the most popular multimedia forms at present, digital images are widely used in the fields of politics, economy, military affairs, education and so on. In today's highly developed Internet technology, how to protect digital images from tampering, illegal copying and dissemination has important practical significance. The research on image encryption technology has become one of the hotspots in the field of information security. [0003] Optical information processing technology has aroused great interest in the field of image encryption research because of its high processing speed, high parallelism, and fast realization of convolution and correlation operations (see literature [1]). In the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06T1/00
CPCG06T1/0021
Inventor 唐晨苏永钢李碧原谷帆程佳佳
Owner TIANJIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products