Digital image encryption and decryption system based on visual password

A digital image, encryption and decryption technology, applied in image coding, image data processing, digital data protection, etc., can solve the problem of increasing the danger of sharing images, secrets cannot be seen by ordinary people, and a single shared image cannot obtain secret useful information. and other issues to achieve the effect of reducing confidentiality requirements, increasing speed, and avoiding overlapping

Inactive Publication Date: 2020-06-05
UNIVERSITY OF CHINESE ACADEMY OF SCIENCES
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The existing visual cryptography technology can achieve concealment, because the pixels on the shared image are randomly distributed, the hidden secrets cannot be seen by ordinary people; secondly, the visual cryptography technology is safe: the analysis of a single shared image cannot get any useful information about the secret
[0006] However, most of the existing visual cryptography techniques do not require any mathematical calculations when decrypting, and the cracker does not need any mathematical knowledge, as long as the shared images are simply superimposed, the secret image can be recovered, which increases the risk of being photographed during the preservation of the shared image. The risk of theft, thereby reducing the security of traditional visual cryptography

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital image encryption and decryption system based on visual password
  • Digital image encryption and decryption system based on visual password
  • Digital image encryption and decryption system based on visual password

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The purpose, features and advantages of the present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0030] Based on the consideration of safety performance, the present invention improves and innovates the traditional visual cryptography technology on the basis of the existing technology, that is, adopts the Borch coding modified off-axis reference light calculation hologram technology, and based on the visual cryptography encryption Improve security and anti-deciphering capabilities.

[0031] refer to figure 2 , figure 2 It is a flow chart of the encryption and decryption system based on visual cryptography of the present invention, including the following three steps: Shared map generation step: process the original image through the visual cryptography algorithm to generate two shared maps corresponding to the original image. The hologram generation step: through the modified off-axis reference l...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an image encryption and decryption method and an image encryption and decryption system based on a Visual Code and by adopting a Burch coding correction type off-axis referencelight computer generated hologram principle (CGH for short). The original image is encrypted by adopting a visual password technology, two encrypted sharing images are generated by using the originalimage, holograms corresponding to the two sharing images are obtained by using CGH during decryption, and light fields of the two holograms are respectively reconstructed and superposed to obtain a decrypted image. A novel secret sharing technology is adopted, and encryption safety and decryption reliability are enhanced for the condition that secret information is an image; meanwhile, differentfrom the traditional visual cryptography method, the hologram generated by the CGH cannot be directly superposed to obtain the original image, so that the confidentiality is further enhanced; experiments prove that the safety performance of encryption and decryption is excellent.

Description

technical field [0001] The invention relates to the technical field of digital image encryption, in particular to the technical field of air domain image encryption. Background technique [0002] Digital image is a widely used form of information carrier, which has a profound impact on national defense, industry, science and technology, economy and other fields. In some special fields, such as military, commercial and aviation, digital images still have high confidentiality requirements. Facing the rapid development of decryption technology, traditional one-dimensional data encryption algorithms are facing severe challenges. The concept of image encryption technology is: a technology that uses the characteristics of digital images to design encryption algorithms to improve encryption security and operational efficiency. In order to meet the needs of practical applications, digital image encryption technology needs to be difficult to decipher and reliable in performance, so...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06T9/00
CPCG06F21/602G06T9/007
Inventor 马金戈于韬李桂林马锐杨栋宇史祎诗
Owner UNIVERSITY OF CHINESE ACADEMY OF SCIENCES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products