CN106651736A - Optical image encryption method based on Gyrator transform and coupled chaos - Google Patents
Optical image encryption method based on Gyrator transform and coupled chaos Download PDFInfo
- Publication number
- CN106651736A CN106651736A CN201610872982.2A CN201610872982A CN106651736A CN 106651736 A CN106651736 A CN 106651736A CN 201610872982 A CN201610872982 A CN 201610872982A CN 106651736 A CN106651736 A CN 106651736A
- Authority
- CN
- China
- Prior art keywords
- chaotic
- image
- gyrator
- random phase
- logistic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Facsimile Transmission Control (AREA)
Abstract
本发明涉及图像信息安全和光信息处理技术领域,为实现有效抵抗已知明文攻击和选择明文攻击,且使得密钥管理和传输变得更为方便。本发明采用的技术方案是,Gyrator变换和耦合混沌光学图像加密方法,步骤如下:1)耦合Logistic混沌的构造:将两个一维Logistic混沌映射通过一个耦合参数联系在一起;2)混沌密钥的生成:起主密钥作用的两块随机相位掩模分别由不同混沌参数控制的耦合Logistic混沌系统生成;3)基于Gyrator变换的图像加密和解密:(1)在加密过程中,待加密的图像首先被第一块混沌随机相位掩模调制,(2)被第一块混沌随机相位掩模的复共轭调制。本发明主要应用于图像信息安全场合。
The invention relates to the technical fields of image information security and optical information processing, and aims to effectively resist known plaintext attacks and chosen plaintext attacks, and make key management and transmission more convenient. The technical scheme that the present invention adopts is, Gyrator transformation and coupled chaotic optical image encryption method, the steps are as follows: 1) the structure of coupled Logistic chaos: two one-dimensional Logistic chaotic maps are linked together by a coupling parameter; 2) chaotic key The generation of two random phase masks that act as the master key are respectively generated by the coupled Logistic chaotic system controlled by different chaotic parameters; 3) Image encryption and decryption based on Gyrator transformation: (1) During the encryption process, the to-be-encrypted The image is first modulated by the first chaotic random phase mask and (2) by the complex conjugate of the first chaotic random phase mask. The present invention is mainly applied to image information security occasions.
Description
技术领域technical field
本发明涉及图像信息安全和光信息处理技术领域,尤其涉及一种基于Gyrator变换和耦合Logistic混沌的光学图像加密方法。The invention relates to the technical fields of image information security and optical information processing, in particular to an optical image encryption method based on Gyrator transformation and coupled Logistic chaos.
背景技术Background technique
数字图像作为当前最流行的多媒体形式之一,在政治、经济、军事、教育等领域有着广泛的应用。在互联网技术高度发达的今天,如何保护数字图像免遭篡改、非法复制和传播具有重要的实际意义。对图像加密技术的研究已成为当前信息安全领域的热点之一。As one of the most popular multimedia forms at present, digital images are widely used in the fields of politics, economy, military affairs, education and so on. In today's highly developed Internet technology, how to protect digital images from tampering, illegal copying and dissemination has important practical significance. The research on image encryption technology has become one of the hotspots in the field of information security.
光学信息处理技术以其高处理速度、高并行度、能快速实现卷积和相关运算等优点,在图像加密研究领域引起了人们的极大兴趣(见文献[1])。在光学图像加密技术中,最具有代表性的是Javidi等提出的双随机相位编码技术(见文献[2])。该技术开辟了光学图像加密研究的新领域,基于该技术诞生了一大批光学加密新方法和新技术(见综述文献[3])。此外,作为一种广义的傅里叶变换,Gyrator变换也可用于光学图像加密中(见文献[4])。Optical information processing technology has aroused great interest in the field of image encryption research because of its high processing speed, high parallelism, and fast realization of convolution and correlation operations (see literature [1]). In the optical image encryption technology, the most representative is the double random phase encoding technology proposed by Javidi et al. (see literature [2]). This technology has opened up a new field of optical image encryption research, and a large number of new optical encryption methods and technologies have been born based on this technology (see review literature [3]). In addition, as a generalized Fourier transform, Gyrator transform can also be used in optical image encryption (see literature [4]).
然而,在基于双随机相位编码的光学图像加密方法中,大都存在如下问题:However, most of the optical image encryption methods based on double random phase encoding have the following problems:
1)密钥为图像尺寸的随机相位掩膜,因此,密钥管理和传输不便(见文献[5]);1) The key is a random phase mask of the image size, therefore, key management and transmission are inconvenient (see literature [5]);
2)由于随机相位掩膜不便更新,因此,加密系统易受选择明文攻击和已知明文攻击(见文献[6]和[7])。2) Since the random phase mask is inconvenient to update, the encryption system is vulnerable to chosen plaintext attack and known plaintext attack (see literature [6] and [7]).
参考文献:references:
[1]O.Matoba,T.Nomura,E.Perez-Cabre,M.Millan,and B.Javidi,Opticaltechniques forinformation security,Proceedings of IEEE 2009,97:1128-1148[1] O. Matoba, T. Nomura, E. Perez-Cabre, M. Millan, and B. Javidi, Optical techniques for information security, Proceedings of IEEE 2009, 97: 1128-1148
[2]P.Réfrégier and B.Javidi,Optical image encryption based on inputplaneand Fourier plane random encoding,Opt.Lett.,1995,20:767-769[2]P.Réfrégier and B.Javidi,Optical image encryption based on inputplane and Fourier plane random encoding,Opt.Lett.,1995,20:767-769
[3]S.Liu,C.Guo,and J.T.Sheridan,A review of optical image encryptiontechniques,Optics&Laser Technology,2014,57:327-342[3] S. Liu, C. Guo, and J. T. Sheridan, A review of optical image encryption techniques, Optics & Laser Technology, 2014, 57:327-342
[4]J.Rodrigo,T.Alieva,M.Calvo,Gyrator transform:propertiesandapplications,Opt.Express,2007,15:2190-2203[4] J. Rodrigo, T. Alieva, M. Calvo, Gyrator transform: properties and applications, Opt. Express, 2007, 15: 2190-2203
[5]S.Yuan,Y.Xin,M.Liu,S.Yao,and X.Sun,An improved method to enhancethe security of double random-phaseencoding in the Fresnel domain,Optics&Laser Technology,2012,44:51-56[5] S.Yuan, Y.Xin, M.Liu, S.Yao, and X.Sun, An improved method to enhance the security of double random-phase encoding in the Fresnel domain, Optics&Laser Technology, 2012,44:51-56
[6]X.Peng,H.Wei,and P.Zhang,Chosen-plaintext attack on lenslessdouble-randomphase encoding in the Fresnel domain,Opt.Lett.,2006,31:3261-3263[6] X. Peng, H. Wei, and P. Zhang, Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain, Opt. Lett., 2006, 31:3261-3263
[7]U.Gopinathan,D.S.Monaghan,T.J.Naughton,and J.T.Sheridan,A known-plaintextheuristic attack on the Fourier plane encryptionalgorithm.Opt.Express,2006,14:3181-3186。[7] U. Gopinathan, D.S. Monaghan, T.J. Naughton, and J.T. Sheridan, A known-plain text heuristic attack on the Fourier plane encryption algorithm. Opt. Express, 2006, 14:3181-3186.
发明内容Contents of the invention
为克服现有技术的不足,本发明旨在实现有效抵抗已知明文攻击和选择明文攻击,且使得密钥管理和传输变得更为方便。本发明采用的技术方案是,Gyrator变换和耦合混沌光学图像加密方法,步骤如下:In order to overcome the deficiencies of the prior art, the present invention aims at effectively resisting known plaintext attacks and chosen plaintext attacks, and makes key management and transmission more convenient. The technical solution adopted in the present invention is, Gyrator transformation and coupling chaotic optical image encryption method, the steps are as follows:
1)耦合Logistic混沌的构造:将两个一维Logistic混沌映射通过一个耦合参数联系在一起;1) Construction of coupled Logistic chaos: link two one-dimensional Logistic chaos maps together through a coupling parameter;
2)混沌密钥的生成:起主密钥作用的两块随机相位掩模分别由不同混沌参数控制的耦合Logistic混沌系统生成,混沌系统的初值和控制参数作为主密钥;此外,Gyrator变换角度作为加解密过程中的辅助密钥;2) Generation of chaotic key: the two random phase masks used as the master key are respectively generated by the coupled Logistic chaotic system controlled by different chaotic parameters, and the initial value and control parameters of the chaotic system are used as the master key; in addition, the Gyrator transform The angle is used as an auxiliary key in the process of encryption and decryption;
3)基于Gyrator变换的图像加密和解密:(1)在加密过程中,待加密的图像首先被第一块混沌随机相位掩模调制,然后进行角度为a1的Gyrator变换,变换后的图像再被第二块混沌随机相位掩模调制,然后进行角度为a2的Gyrator变换;(2)在解密过程中,加密后的图像首先进行角度为a2的Gyrator逆变换,然后被第二块混沌随机相位掩模的复共轭调制,经调制后的图像再进行角度为a1的Gyrator逆变换,最后再被第一块混沌随机相位掩模的复共轭调制。3) Image encryption and decryption based on Gyrator transformation: (1) During the encryption process, the image to be encrypted is first modulated by the first chaotic random phase mask, and then undergoes Gyrator transformation with an angle of a 1 , and the transformed image is then It is modulated by the second chaotic random phase mask, and then undergoes Gyrator transformation with an angle of a 2 ; (2) In the decryption process, the encrypted image first undergoes a Gyrator inverse transformation with an angle of a 2 , and then is transformed by the second chaotic The complex conjugate modulation of the random phase mask, the modulated image is subjected to the Gyrator inverse transformation with an angle of a 1 , and finally is modulated by the complex conjugate of the first chaotic random phase mask.
一个实施例中具体步骤是:Concrete steps in an embodiment are:
(1)耦合Logistic混沌的构造:(1) Construction of coupled Logistic chaos:
一维Logistic混沌系统的离散形式的数学表达式为:The mathematical expression of the discrete form of the one-dimensional Logistic chaotic system is:
xn+1=μxn(1-xn) (1)x n+1 =μx n (1-x n ) (1)
其中,xn为混沌系统的初值,xn+1为混沌系统的迭代输出值;且当控制参数μ∈(3.56,4]时,Logistic系统处于混沌状态;Among them, x n is the initial value of the chaotic system, x n+1 is the iterative output value of the chaotic system; and when the control parameter μ∈(3.56,4], the Logistic system is in a chaotic state;
引入一个耦合参数ε,其中满足ε∈(-2,2),则耦合Logistic混沌系统离散形式的数学表达式为:Introduce a coupling parameter ε, which satisfies ε∈(-2,2), then the mathematical expression of the discrete form of the coupled Logistic chaotic system is:
xn+1=μxn(1-xn)+ε(yn-xn) (2)x n+1 =μx n (1-x n )+ε(y n -x n ) (2)
yn+1=μyn(1-yn)+ε(xn-yn) (3)y n+1 =μy n (1-y n )+ε(x n -y n ) (3)
其中,xn和yn分别为耦合Logistic混沌系统的初值,xn+1和yn+1分别为耦合Logistic混沌系统的迭代输出值,同样,当控制参数μ∈(3.56,4]时,耦合Logistic系统处于混沌状态;Among them, x n and y n are the initial values of the coupled Logistic chaotic system respectively, and x n+1 and y n+1 are the iterative output values of the coupled Logistic chaotic system respectively. Similarly, when the control parameter μ∈(3.56,4] , the coupled Logistic system is in a chaotic state;
(2)混沌密钥的生成:(2) Generation of chaotic key:
加密方法中两块混沌随机相位掩模起主密钥作用,Gyrator变换角度起辅助密钥作用。假设要加密的图像的尺寸为M×N个像素,则两块混沌随机相位掩膜的尺寸也是M×N个像素。对于由两组不同混沌参数控制的耦合Logistic混沌系统,使其迭代(M×N)/2次后,得到两组随机数序列X1={x′1,x′2,…,x′(M×N)/2},Y1={y′1,y′2,…,y′(M×N)/2}和X2={x″1,x″2,…,x″(M×N)/2},Y2={y″1,y″2,…,y″(M×N)/2};其中,y′1,y′2,…,y′(M×N)/2,x″1,x″2,…,x″(M×N)/2和y″1,y″2,…,y″(M×N)/2分别为耦合混沌系统的迭代输出值,将这两组随机数序列分别整合成两个二维矩阵的形式Z1={z′i,j|i=1,2,…,M;j=1,2,…,N}和Z2={z″i,j|i=1,2,…,M;j=1,2,…,N},其中z′i,j和z″i,j为二维矩阵的元素,下标i,j为矩阵元素的坐标,则可以得到两块混沌随机相位掩膜,其数学表达式分别为C1(x1,y1)=exp(j2πz′i,j)和C2(x2,y2)=exp(j2πz″i,j);其中,(x1,y1)和(x2,y2)分别为两块随机相位掩膜所处位置的坐标,j为虚数单位,π为圆周率,由于混沌随机相位掩膜是由混沌系统的初值和控制参数来控制的,因此,混沌系统的初值和控制参数作为加密系统的主密钥;In the encryption method, two chaotic random phase masks act as the master key, and the Gyrator transformation angle acts as the auxiliary key. Assuming that the size of the image to be encrypted is M×N pixels, the size of the two chaotic random phase masks is also M×N pixels. For the coupled Logistic chaotic system controlled by two sets of different chaotic parameters, after iterating (M×N)/2 times, two sets of random number sequences X 1 ={x′ 1 ,x′ 2 ,…,x′ ( M×N)/2 }, Y 1 ={y′ 1 ,y′ 2 ,…,y′ (M×N)/2 } and X 2 ={x″ 1 ,x″ 2 ,…,x″ ( M×N)/2 }, Y 2 ={y″ 1 ,y″ 2 ,…,y″ (M×N)/2 }; where, y′ 1 ,y′ 2 ,…,y′ (M×N)/2 , x″ 1 ,x″ 2 ,…,x″ (M×N)/2 and y″ 1 ,y″ 2 ,…, y″ (M×N)/2 are the iterative output values of the coupled chaotic system respectively, and these two sets of random number sequences are respectively integrated into two two-dimensional matrices Z 1 ={z′ i,j |i=1, 2,...,M; j=1,2,...,N} and Z 2 ={z″ i,j |i=1,2,...,M; j=1,2,...,N}, where z ′ i, j and z″ i, j are the elements of the two-dimensional matrix, and the subscripts i, j are the coordinates of the matrix elements, then two chaotic random phase masks can be obtained, and their mathematical expressions are respectively C 1 (x 1 ,y 1 )=exp(j2πz′ i,j ) and C 2 (x 2 ,y 2 )=exp(j2πz″ i,j ); among them, (x 1 ,y 1 ) and (x 2 ,y 2 ) are the coordinates of the positions of the two random phase masks, j is the imaginary unit, and π is the pi. Since the chaotic random phase mask is controlled by the initial value and control parameters of the chaotic system, the initial value of the chaotic system and control parameters as the master key of the encryption system;
(3)基于Gyrator变换的图像加密和解密:(3) Image encryption and decryption based on Gyrator transformation:
1)在加密过程中,待加密的图像U0(x0,y0)首先被第一块混沌随机相位掩模调制,然后进行角度为a1的Gyrator变换,变换后的图像再被第二块混沌随机相位掩模调制,然后进行角度为a2的Gyrator变换,经两次调制和两次变换后就可以得到加密图像U(x′,y′):1) During the encryption process, the image U 0 (x 0 , y 0 ) to be encrypted is firstly modulated by the first chaotic random phase mask, and then undergoes Gyrator transformation with an angle of a 1 , and the transformed image is then modulated by the second Block chaotic random phase mask modulation, and then perform Gyrator transformation with an angle of a 2. After two modulations and two transformations, the encrypted image U(x′,y′) can be obtained:
U(x′,y′)=GTa2{GTa1{U0(x0,y0)C1(x1,y1)}C2(x2,y2)} (4)U(x′,y′)=GT a2 {GT a1 {U 0 (x 0 ,y 0 )C 1 (x 1 ,y 1 )}C 2 (x 2 ,y 2 )} (4)
其中,(x′,y′)为输出面处的位置坐标;GTa{·}表示角度为a的Gyrator变换,其形式如下:Among them, (x′,y′) is the position coordinate of the output surface; GT a { } represents the Gyrator transformation with angle a, and its form is as follows:
其中,U0(x0,y0)和U(x,y)分别表示输入图像和变换后的图像;(x0,y0)和(x,y)分别表示输入图像与变换后图像所处位置的坐标;sin表示正弦函数,cos表示余弦函数;Among them, U 0 (x 0 ,y 0 ) and U(x,y) represent the input image and the transformed image respectively; (x 0 ,y 0 ) and (x,y) represent the input image and the transformed image respectively The coordinates of the position; sin represents the sine function, cos represents the cosine function;
2)在解密过程中,加密后的图像U(x′,y′)首先进行角度为a2的Gyrator逆变换,然后被第二块混沌随机相位掩模的复共轭调制,经调制后的图像再进行角度为a1的Gyrator逆变换,最后再被第一块混沌随机相位掩模的复共轭调制,得到解密后的图像:2) During the decryption process, the encrypted image U(x′,y′) is first subjected to Gyrator inverse transformation with an angle of a 2 , and then modulated by the complex conjugate of the second chaotic random phase mask, the modulated The image is then subjected to Gyrator inverse transformation with an angle of a 1 , and finally modulated by the complex conjugate of the first chaotic random phase mask to obtain the decrypted image:
其中,*表示复共轭算符。Among them, * represents the complex conjugate operator.
本发明的特点及有益效果是:Features and beneficial effects of the present invention are:
本发明提供的光学图像加密方法中,混沌密钥的使用,使得本加密方法可以有效抵抗已知明文攻击和选择明文攻击,且使得密钥管理和传输变得更为方便。Gyrator变换角度作为加解密过程中的辅助密钥,使得本加密方法的安全性得到了进一步的保证。In the optical image encryption method provided by the present invention, the use of the chaotic key enables the encryption method to effectively resist known plaintext attacks and chosen plaintext attacks, and makes key management and transmission more convenient. The Gyrator transformation angle is used as an auxiliary key in the process of encryption and decryption, which further guarantees the security of this encryption method.
附图说明:Description of drawings:
图1本发明提供的光学图像加密方法的加解密过程示意图。图中:Fig. 1 is a schematic diagram of the encryption and decryption process of the optical image encryption method provided by the present invention. In the picture:
(a)为本发明提供的光学图像加密方法的加密过程示意图;(a) a schematic diagram of the encryption process of the optical image encryption method provided by the present invention;
(b)为本发明提供的光学图像加密方法的解密过程示意图;(b) a schematic diagram of the decryption process of the optical image encryption method provided by the present invention;
图2加解密图像对比图。图中:Figure 2 Comparison of encrypted and decrypted images. In the picture:
(a)为待加密的原图像;(a) is the original image to be encrypted;
(b)为本方法加密的图像;(b) the image encrypted for this method;
(c)为所有密钥均正确时的解密图像。(c) is the decrypted image when all keys are correct.
图3存在错误时解密图像对比图。图中:Figure 3 Comparison of decrypted images when there is an error. In the picture:
(a)为控制第二块随机相位掩模的耦合Logistic混沌系统的初值x2错误,其它密钥均正确时的解密图像;(a) The initial value x2 of the coupled Logistic chaotic system controlling the second random phase mask is wrong, and the decrypted image when the other keys are all correct;
(b)为控制第二块随机相位掩模的耦合Logistic混沌系统的初值y2错误,其它密钥均正确时的解密图像;(b) The initial value y2 of the coupled Logistic chaotic system for controlling the second random phase mask is wrong, and the decrypted image when other keys are all correct;
(c)为控制第二块随机相位掩模的耦合Logistic混沌系统的控制参数μ2错误,其它密钥均正确时的解密图像;(c) The decrypted image when the control parameter μ2 of the coupled Logistic chaotic system controlling the second random phase mask is wrong and the other keys are all correct;
(d)为Gyrator变换角度a1错误,其它密钥均正确时的解密图像;(d) is the decrypted image when the Gyrator transformation angle a1 is wrong and other keys are correct;
(e)为Gyrator变换角度a2错误,其它密钥均正确时的解密图像;(e) is the decrypted image when the Gyrator transformation angle a2 is wrong and other keys are correct;
图4存在缺失解密图像对比图。Figure 4 is a comparison chart of missing decrypted images.
(a)为从缺失12.5%信息的加密图中解密得到的图像;(a) is the image decrypted from the encrypted image with 12.5% missing information;
(b)为从缺失25%信息的加密图中解密得到的图像;(b) is the image decrypted from the encrypted image with 25% missing information;
(c)为从缺失50%信息的加密图中解密得到的图像;(c) is the image decrypted from the encrypted image with 50% missing information;
图5不同高斯噪声下图像对比图。Figure 5 Comparison of images under different Gaussian noises.
(a)为从含有10%高斯噪声的加密图中解密得到的图像;(a) is an image decrypted from an encrypted image containing 10% Gaussian noise;
(b)为从含有10%椒盐噪声的加密图中解密得到的图像;(b) is an image decrypted from an encrypted image containing 10% salt and pepper noise;
(c)为从含有10%散斑噪声的加密图中解密得到的图像;(c) is an image decrypted from an encrypted image containing 10% speckle noise;
附图中,各标号所代表的部件列表如下:In the accompanying drawings, the list of parts represented by each label is as follows:
CRPM1:第一块混沌随机相位掩模;CRPM2:第二块混沌随机相位掩模;CRPM1*:第一块混沌随机相位掩模的复共轭;CRPM2*:第二块混沌随机相位掩模的复共轭;GT:Gyrator变换;IGT:Gyrator逆变换。CRPM 1 : first chaotic random phase mask; CRPM 2 : second chaotic random phase mask; CRPM 1 *: complex conjugate of first chaotic random phase mask; CRPM 2 *: second chaotic random phase mask Complex conjugate of phase mask; GT: Gyrator transform; IGT: inverse Gyrator transform.
具体实施方式detailed description
本发明提供了一种基于Gyrator变换和耦合Logistic混沌的光学图像加密方法。本发明提供的光学图像加密方法由耦合Logistic混沌的构造,混沌密钥的生成,基于Gyrator变换的图像加密和解密组成。混沌密钥的使用,使得本加密方法可以有效抵抗已知明文攻击和选择明文攻击,且使得密钥管理和传输变得更为方便。Gyrator变换角度作为加解密过程中的辅助密钥,使得本加密方法的安全性得到了进一步的保证。大量实验表明,本加密方法具有良好的抗暴力攻击、统计攻击、噪声攻击和剪切攻击能力。详见下文描述:The invention provides an optical image encryption method based on Gyrator transformation and coupled Logistic chaos. The optical image encryption method provided by the invention consists of the structure of coupling Logistic chaos, the generation of chaotic keys, and the image encryption and decryption based on Gyrator transformation. The use of chaotic keys makes this encryption method effective against known-plaintext attacks and chosen-plaintext attacks, and makes key management and transmission more convenient. The Gyrator transformation angle is used as an auxiliary key in the process of encryption and decryption, which further guarantees the security of this encryption method. A large number of experiments show that this encryption method has a good ability to resist brute force attack, statistical attack, noise attack and shear attack. See the description below for details:
1)耦合Logistic混沌的构造:耦合Logistic混沌系统将两个一维Logistic混沌映射通过一个耦合参数联系在一起;相较于单一的一维Logistic混沌系统,耦合Logistic混沌系统具有更大的参数空间、更好的伪随机性、以及可以产生更多的随机数序列。1) Construction of coupled Logistic chaos: The coupled Logistic chaotic system links two one-dimensional Logistic chaotic maps together through a coupling parameter; compared with a single one-dimensional Logistic chaotic system, the coupled Logistic chaotic system has a larger parameter space, Better pseudo-randomness, and more random number sequences can be generated.
2)混沌密钥的生成:起主密钥作用的两块随机相位掩模分别由不同混沌参数控制的耦合Logistic混沌系统生成,混沌系统的初值和控制参数作为主密钥;此外,Gyrator变换角度作为加解密过程中的辅助密钥。由于加解密过程中密钥更新方便,因此,本加密方法可以有效抵抗已知明文攻击和选择明文攻击;此外,密钥管理和传输也更为方便。2) Generation of chaotic key: the two random phase masks used as the master key are respectively generated by the coupled Logistic chaotic system controlled by different chaotic parameters, and the initial value and control parameters of the chaotic system are used as the master key; in addition, the Gyrator transform The angle is used as an auxiliary key in the process of encryption and decryption. Since the key is easily updated during encryption and decryption, the encryption method can effectively resist known plaintext attacks and chosen plaintext attacks; in addition, key management and transmission are also more convenient.
3)基于Gyrator变换的图像加密和解密:(1)在加密过程中,待加密的图像首先被第一块混沌随机相位掩模调制,然后进行角度为a1的Gyrator变换,变换后的图像再被第二块混沌随机相位掩模调制,然后进行角度为a2的Gyrator变换;(2)在解密过程中,加密后的图像首先进行角度为a2的Gyrator逆变换,然后被第二块混沌随机相位掩模的复共轭调制,经调制后的图像再进行角度为a1的Gyrator逆变换,最后再被第一块混沌随机相位掩模的复共轭调制。3) Image encryption and decryption based on Gyrator transformation: (1) During the encryption process, the image to be encrypted is first modulated by the first chaotic random phase mask, and then undergoes Gyrator transformation with an angle of a 1 , and the transformed image is then It is modulated by the second chaotic random phase mask, and then undergoes Gyrator transformation with an angle of a 2 ; (2) In the decryption process, the encrypted image first undergoes a Gyrator inverse transformation with an angle of a 2 , and then is transformed by the second chaotic The complex conjugate modulation of the random phase mask, the modulated image is subjected to the Gyrator inverse transformation with an angle of a 1 , and finally is modulated by the complex conjugate of the first chaotic random phase mask.
为使本发明的目的、技术方案和优点更加清楚,下面对本发明实施方式作进一步地详细描述。In order to make the purpose, technical solution and advantages of the present invention clearer, the implementation manners of the present invention will be further described in detail below.
实施例1Example 1
一种基于Gyrator变换和耦合Logistic混沌的光学图像加密方法,其加解密过程示意图如图1所示,加密方法由耦合Logistic混沌的构造,混沌密钥的生成,基于Gyrator变换的图像加密和解密组成。An optical image encryption method based on Gyrator transform and coupled Logistic chaos. The schematic diagram of the encryption and decryption process is shown in Figure 1. The encryption method consists of the construction of coupled Logistic chaos, the generation of chaotic keys, and the image encryption and decryption based on Gyrator transform. .
(1)耦合Logistic混沌的构造:(1) Construction of coupled Logistic chaos:
本发明提供的加密方法中,耦合Logistic混沌系统将两个一维Logistic混沌映射通过一个耦合参数联系在一起;相较于单一的一维Logistic混沌系统,耦合Logistic混沌系统具有更大的参数空间、更好的伪随机性、以及可以产生更多的随机数序列。In the encryption method provided by the present invention, the coupled Logistic chaotic system connects two one-dimensional Logistic chaotic maps through a coupling parameter; compared with a single one-dimensional Logistic chaotic system, the coupled Logistic chaotic system has a larger parameter space, Better pseudo-randomness, and more random number sequences can be generated.
(2)混沌密钥的生成:(2) Generation of chaotic key:
本发明提供的加密方法中,起主密钥作用的两块随机相位掩模分别由不同混沌参数控制的耦合Logistic混沌系统生成,混沌系统的初值和控制参数作为主密钥;此外,Gyrator变换角度作为加解密过程中的辅助密钥。由于加解密过程中密钥更新方便,因此,本加密方法可以有效抵抗已知明文攻击和选择明文攻击;此外,密钥管理和传输也更为方便。In the encryption method provided by the present invention, the two random phase masks that play the role of the master key are generated by the coupled Logistic chaotic system controlled by different chaotic parameters respectively, and the initial value and control parameters of the chaotic system are used as the master key; in addition, the Gyrator transform The angle is used as an auxiliary key in the process of encryption and decryption. Since the key is easily updated during encryption and decryption, the encryption method can effectively resist known plaintext attacks and chosen plaintext attacks; in addition, key management and transmission are also more convenient.
(3)基于Gyrator变换的图像加密和解密:(3) Image encryption and decryption based on Gyrator transformation:
1)在加密过程中,待加密的图像首先被第一块混沌随机相位掩模调制,然后进行角度为a1的Gyrator变换,变换后的图像再被第二块混沌随机相位掩模调制,然后进行角度为a2的Gyrator变换;2)在解密过程中,加密后的图像首先进行角度为a2的Gyrator逆变换,然后被第二块混沌随机相位掩模的复共轭调制,经调制后的图像再进行角度为a1的Gyrator逆变换,最后再被第一块混沌随机相位掩模的复共轭调制。1) During the encryption process, the image to be encrypted is firstly modulated by the first chaotic random phase mask, and then undergoes Gyrator transformation with an angle of a 1 , and the transformed image is then modulated by the second chaotic random phase mask, and then Perform Gyrator transformation with an angle of a 2 ; 2) In the decryption process, the encrypted image first undergoes a Gyrator inverse transformation with an angle of a 2 , and then is modulated by the complex conjugate of the second chaotic random phase mask, after modulation The image of is subjected to Gyrator inverse transformation with an angle of a 1 , and finally modulated by the complex conjugate of the first chaotic random phase mask.
综上所述,混沌密钥的使用,使得本加密方法可以有效抵抗已知明文攻击和选择明文攻击,且使得密钥管理和传输变得更为方便。Gyrator变换角度作为加解密过程中的辅助密钥,使得本加密方法的安全性得到了进一步的保证。In summary, the use of chaotic keys makes this encryption method effective against known plaintext attacks and chosen plaintext attacks, and makes key management and transmission more convenient. The Gyrator transformation angle is used as an auxiliary key in the process of encryption and decryption, which further guarantees the security of this encryption method.
实施例2Example 2
下面结合图1、设计原理对实施例1中的方案进行详细地介绍,详见下文描述:Below in conjunction with Fig. 1, design principle, the scheme in embodiment 1 is introduced in detail, see the following description for details:
一种基于Gyrator变换和耦合Logistic混沌的光学图像加密方法,其加解密过程示意图如图1所示。加密方法由耦合Logistic混沌的构造,混沌密钥的生成,基于Gyrator变换的图像加密和解密组成。下面就这三部分的具体实施方式分别予以详细的描述。An optical image encryption method based on Gyrator transform and coupled Logistic chaos, the schematic diagram of the encryption and decryption process is shown in Figure 1. The encryption method consists of the construction of coupled Logistic chaos, the generation of chaotic keys, and the image encryption and decryption based on Gyrator transform. The specific implementation manners of these three parts will be described in detail below.
(1)耦合Logistic混沌的构造:(1) Construction of coupled Logistic chaos:
一维Logistic混沌系统的离散形式的数学表达式为:The mathematical expression of the discrete form of the one-dimensional Logistic chaotic system is:
xn+1=μxn(1-xn) (1)x n+1 =μx n (1-x n ) (1)
其中,xn为混沌系统的初值,xn+1为混沌系统的迭代输出值;且当控制参数μ∈(3.56,4]时,Logistic系统处于混沌状态。Among them, x n is the initial value of the chaotic system, x n+1 is the iterative output value of the chaotic system; and when the control parameter μ∈(3.56,4], the Logistic system is in a chaotic state.
引入一个耦合参数ε,其中满足ε∈(-2,2),则耦合Logistic混沌系统离散形式的数学表达式为:Introduce a coupling parameter ε, which satisfies ε∈(-2,2), then the mathematical expression of the discrete form of the coupled Logistic chaotic system is:
xn+1=μxn(1-xn)+ε(yn-xn) (2)x n+1 =μx n (1-x n )+ε(y n -x n ) (2)
yn+1=μyn(1-yn)+ε(xn-yn) (3)y n+1 =μy n (1-y n )+ε(x n -y n ) (3)
其中,xn和yn分别为耦合Logistic混沌系统的初值,xn+1和yn+1分别为耦合Logistic混沌系统的迭代输出值。同样,当控制参数μ∈(3.56,4]时,耦合Logistic系统处于混沌状态。Among them, x n and y n are the initial values of the coupled Logistic chaotic system, respectively, and x n+1 and y n+1 are the iterative output values of the coupled Logistic chaotic system, respectively. Similarly, when the control parameter μ∈(3.56,4], the coupled Logistic system is in a chaotic state.
(2)混沌密钥的生成:(2) Generation of chaotic key:
加密方法中两块混沌随机相位掩模起主密钥作用,Gyrator变换角度起辅助密钥作用。下面就如何使用耦合Logistic混沌系统生成这两块混沌随机相位掩膜进行详细介绍。In the encryption method, two chaotic random phase masks act as the master key, and the Gyrator transformation angle acts as the auxiliary key. The following is a detailed introduction on how to use the coupled Logistic chaotic system to generate these two chaotic random phase masks.
假设要加密的图像的尺寸为M×N个像素,则两块混沌随机相位掩膜的尺寸也是M×N个像素。对于由两组不同混沌参数控制的耦合Logistic混沌系统,使其迭代(M×N)/2次后,得到两组随机数序列X1={x′1,x′2,…,x′(M×N)/2},Y1={y′1,y′2,…,y′(M×N)/2}和X2={x″1,x″2,…,x″(M×N)/2},Y2={y″1,y″2,…,y″(M×N)/2};其中,x′1,x′2,…,x′(M×N)/2,y′1,y′2,…,y′(M×N)/2,x″1,x″2,…,x″(M×N)/2和y″1,y″2,…,y″(M×N)/2分别为耦合混沌系统的迭代输出值。将这两组随机数序列分别整合成两个二维矩阵的形式Z1={z′i,j|i=1,2,…,M;j=1,2,…,N}和Z2={z″i,j|i=1,2,…,M;j=1,2,…,N},其中z′i,j和z″i,j为二维矩阵的元素,i,j为矩阵元素的坐标。则可以得到两块混沌随机相位掩膜,其数学表达式分别为C1(x1,y1)=exp(j2πz′i,j)和C2(x2,y2)=exp(j2πz″i,j);其中,(x1,y1)和(x2,y2)分别为两块随机相位掩膜所处位置的坐标,j为虚数单位,π为圆周率。由于混沌随机相位掩膜是由混沌系统的初值和控制参数来控制的,因此,混沌系统的初值和控制参数作为加密系统的主密钥。由于主密钥和辅助密钥都是一些数字,因此,管理和传输这些数字将变得十分方便;此外,加解密过程中更新这些数字也将变得十分方便。Assuming that the size of the image to be encrypted is M×N pixels, the size of the two chaotic random phase masks is also M×N pixels. For the coupled Logistic chaotic system controlled by two sets of different chaotic parameters, after iterating (M×N)/2 times, two sets of random number sequences X 1 ={x′ 1 ,x′ 2 ,…,x′ ( M×N)/2 }, Y 1 ={y′ 1 ,y′ 2 ,…,y′ (M×N)/2 } and X 2 ={x″ 1 ,x″ 2 ,…,x″ ( M×N)/2 }, Y 2 ={y″ 1 ,y″ 2 ,…,y″ (M×N)/2 }; among them, x′ 1 ,x′ 2 ,…,x′ (M× N)/2 ,y′ 1 ,y′ 2 ,…,y′ (M×N)/2 , x″ 1 ,x″ 2 ,…,x″ (M×N)/2 and y″ 1 ,y ″ 2 ,…,y″ (M×N)/2 are the iterative output values of the coupled chaotic system, respectively. These two sets of random number sequences are respectively integrated into two two-dimensional matrices Z 1 ={z′ i,j |i=1,2,...,M; j=1,2,...,N} and Z 2 ={z″ i,j |i=1,2,…,M; j=1,2,…,N}, where z′ i,j and z″ i,j are elements of two-dimensional matrix, i, j is the coordinate of the matrix element. Then two chaotic random phase masks can be obtained, and their mathematical expressions are respectively C 1 (x 1 ,y 1 )=exp(j2πz′ i,j ) and C 2 (x 2 ,y 2 )=exp(j2πz″ i,j ); where (x 1 ,y 1 ) and (x 2 ,y 2 ) are the coordinates of the two random phase masks, j is the imaginary unit, and π is the circumference ratio. Due to the chaotic random phase mask The membrane is controlled by the initial value and control parameters of the chaotic system. Therefore, the initial value and control parameters of the chaotic system are used as the master key of the encryption system. Since the master key and the auxiliary key are some numbers, the management and It will be very convenient to transmit these numbers; in addition, it will be very convenient to update these numbers during the encryption and decryption process.
(3)基于Gyrator变换的图像加密和解密:(3) Image encryption and decryption based on Gyrator transformation:
1)在加密过程中,待加密的图像U0(x0,y0)首先被第一块混沌随机相位掩模调制,然后进行角度为a1的Gyrator变换,变换后的图像再被第二块混沌随机相位掩模调制,然后进行角度为a2的Gyrator变换,经两次调制和两次变换后就可以得到加密图像U(x′,y′):1) During the encryption process, the image U 0 (x 0 , y 0 ) to be encrypted is firstly modulated by the first chaotic random phase mask, and then undergoes Gyrator transformation with an angle of a 1 , and the transformed image is then modulated by the second Block chaotic random phase mask modulation, and then perform Gyrator transformation with an angle of a 2. After two modulations and two transformations, the encrypted image U(x′,y′) can be obtained:
U(x′,y′)=GTa2{GTa1{U0(x0,y0)C1(x1,y1)}C2(x2,y2)} (4)U(x′,y′)=GT a2 {GT a1 {U 0 (x 0 ,y 0 )C 1 (x 1 ,y 1 )}C 2 (x 2 ,y 2 )} (4)
其中,(x′,y′)为输出面处的位置坐标;GTa{·}表示角度为a的Gyrator变换,其形式如下:Among them, (x′,y′) is the position coordinate of the output surface; GT a { } represents the Gyrator transformation with angle a, and its form is as follows:
其中,U0(x0,y0)和U(x,y)分别表示输入图像和变换后的图像;(x0,y0)和(x,y)分别表示输入图像与变换后图像所处位置的坐标;sin表示正弦函数,cos表示余弦函数。Among them, U 0 (x 0 ,y 0 ) and U(x,y) represent the input image and the transformed image respectively; (x 0 ,y 0 ) and (x,y) represent the input image and the transformed image respectively The coordinates of the position; sin represents the sine function, and cos represents the cosine function.
2)在解密过程中,加密后的图像U(x′,y′)首先进行角度为a2的Gyrator逆变换,然后被第二块混沌随机相位掩模的复共轭调制,经调制后的图像再进行角度为a1的Gyrator逆变换,最后再被第一块混沌随机相位掩模的复共轭调制,得到解密后的图像:2) During the decryption process, the encrypted image U(x′,y′) is first subjected to Gyrator inverse transformation with an angle of a 2 , and then modulated by the complex conjugate of the second chaotic random phase mask, the modulated The image is then subjected to Gyrator inverse transformation with an angle of a 1 , and finally modulated by the complex conjugate of the first chaotic random phase mask to obtain the decrypted image:
其中,*表示复共轭算符。Among them, * represents the complex conjugate operator.
综上所述,混沌密钥的使用,使得本加密方法可以有效抵抗已知明文攻击和选择明文攻击,且使得密钥管理和传输变得更为方便。Gyrator变换角度作为加解密过程中的辅助密钥,使得本加密方法的安全性得到了进一步的保证。In summary, the use of chaotic keys makes this encryption method effective against known plaintext attacks and chosen plaintext attacks, and makes key management and transmission more convenient. The Gyrator transformation angle is used as an auxiliary key in the process of encryption and decryption, which further guarantees the security of this encryption method.
实施例3Example 3
下面结合具体的附图对实施例1和2中的方案进行可行性验证,详见下文描述:Below in conjunction with specific accompanying drawing, the scheme in embodiment 1 and 2 is carried out feasibility verification, see the following description for details:
采用本发明实施提供的加密方法对一幅图像(如图2(a)所示)进行加密后,得到的加密图像如图2(b)所示。After an image (as shown in Figure 2(a)) is encrypted by using the encryption method provided by the implementation of the present invention, the obtained encrypted image is shown in Figure 2(b).
由图2(b)可以看出,原始图像的任何信息都被隐藏。当所有密钥均正确时,解密出的图像如图2(c)所示。由图2(c)可以看出,原始图像可以完全被还原。说明采用本系统对灰度图像的加密和解密是成功的。As can be seen from Figure 2(b), any information of the original image is hidden. When all the keys are correct, the decrypted image is shown in Figure 2(c). As can be seen from Figure 2(c), the original image can be completely restored. It shows that the encryption and decryption of grayscale images using this system is successful.
此外,当某一个密钥错误而其他密钥正确时,解密结果如图3(a)-3(e)所示。由此可见,本系统的安全性是可以得到保证的。In addition, when a certain key is wrong and other keys are correct, the decryption results are shown in Figure 3(a)-3(e). It can be seen that the security of the system can be guaranteed.
图4(a)-4(c)为加密图缺失12.5%,25%和50%信息情况下的解密图像。图5(a)-5(c)为加密图含有10%高斯噪声、椒盐噪声和散斑噪声情况下的解密图像。由此可见,即便加密图像缺失一部分信息或在一定程度上被噪声污染,本发明实施例仍然能够解密出一定质量的原始图像,验证了本系统的可行性,满足了实际应用中的多种需要。Figures 4(a)-4(c) are the decrypted images when the encrypted image is missing 12.5%, 25% and 50% of the information. Figures 5(a)-5(c) are the decrypted images when the encrypted image contains 10% Gaussian noise, salt and pepper noise and speckle noise. It can be seen that even if the encrypted image lacks some information or is polluted by noise to a certain extent, the embodiment of the present invention can still decrypt the original image with a certain quality, which verifies the feasibility of the system and meets various needs in practical applications .
本发明实施例对各器件的型号除做特殊说明的以外,其他器件的型号不做限制,只要能完成上述功能的器件均可。In the embodiments of the present invention, unless otherwise specified, the models of the devices are not limited, as long as they can complete the above functions.
本领域技术人员可以理解附图只是一个优选实施例的示意图,上述本发明实施例序号仅仅为了描述,不代表实施例的优劣。Those skilled in the art can understand that the accompanying drawing is only a schematic diagram of a preferred embodiment, and the serial numbers of the above-mentioned embodiments of the present invention are for description only, and do not represent the advantages and disadvantages of the embodiments.
以上所述仅为本发明的较佳实施例,并不用以限制本发明,凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。The above descriptions are only preferred embodiments of the present invention, and are not intended to limit the present invention. Any modifications, equivalent replacements, improvements, etc. made within the spirit and principles of the present invention shall be included in the protection of the present invention. within range.
Claims (2)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610872982.2A CN106651736A (en) | 2016-09-30 | 2016-09-30 | Optical image encryption method based on Gyrator transform and coupled chaos |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610872982.2A CN106651736A (en) | 2016-09-30 | 2016-09-30 | Optical image encryption method based on Gyrator transform and coupled chaos |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106651736A true CN106651736A (en) | 2017-05-10 |
Family
ID=58855068
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610872982.2A Pending CN106651736A (en) | 2016-09-30 | 2016-09-30 | Optical image encryption method based on Gyrator transform and coupled chaos |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106651736A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108898540A (en) * | 2018-05-23 | 2018-11-27 | 西安理工大学 | Dual image encryption method based on discrete fraction angular transformation and chaology |
CN109492414A (en) * | 2018-11-07 | 2019-03-19 | 上海师范大学 | More image encryptions and authentication method based on biometric keys |
CN109544435A (en) * | 2018-10-22 | 2019-03-29 | 天津大学 | Gyrator converts chaos random phase encoding digital image encryption method |
CN109918927A (en) * | 2019-03-04 | 2019-06-21 | 首都师范大学 | An image encryption method and device |
CN110516461A (en) * | 2019-08-29 | 2019-11-29 | 首都师范大学 | Multi-channel image encryption method, device, storage medium and electronic equipment |
CN111314048A (en) * | 2020-03-04 | 2020-06-19 | 广东工业大学 | A Chaotic Secure Optical Communication System Based on Double Random Phase Coding |
CN112364357A (en) * | 2020-10-12 | 2021-02-12 | 天津大学 | Optical image encryption method based on vector decomposition and chaotic phase coding |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103761703A (en) * | 2014-01-15 | 2014-04-30 | 西安理工大学 | Single channel color image encryption method based on GT conversion and chaos |
-
2016
- 2016-09-30 CN CN201610872982.2A patent/CN106651736A/en active Pending
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103761703A (en) * | 2014-01-15 | 2014-04-30 | 西安理工大学 | Single channel color image encryption method based on GT conversion and chaos |
Non-Patent Citations (3)
Title |
---|
S.BEHNIA等: ""A novel algorithm for image encryption based on mixture of chaotic maps"", 《CHAOS, SOLITONS AND FRACTALS》 * |
孔德彭等: ""基于回转器变换和混沌的光图像加密"", 《浙江工业大学学报》 * |
彭川等: ""基于耦合混沌系统和细胞自动机的图像加密算法"", 《计算机应用研究》 * |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108898540A (en) * | 2018-05-23 | 2018-11-27 | 西安理工大学 | Dual image encryption method based on discrete fraction angular transformation and chaology |
CN109544435A (en) * | 2018-10-22 | 2019-03-29 | 天津大学 | Gyrator converts chaos random phase encoding digital image encryption method |
CN109544435B (en) * | 2018-10-22 | 2023-07-18 | 天津大学 | Encryption Method of Digital Image with Gyrator Transform Chaotic Random Phase Encoding |
CN109492414A (en) * | 2018-11-07 | 2019-03-19 | 上海师范大学 | More image encryptions and authentication method based on biometric keys |
CN109918927A (en) * | 2019-03-04 | 2019-06-21 | 首都师范大学 | An image encryption method and device |
CN109918927B (en) * | 2019-03-04 | 2020-12-25 | 首都师范大学 | Image encryption method and device |
CN110516461A (en) * | 2019-08-29 | 2019-11-29 | 首都师范大学 | Multi-channel image encryption method, device, storage medium and electronic equipment |
CN111314048A (en) * | 2020-03-04 | 2020-06-19 | 广东工业大学 | A Chaotic Secure Optical Communication System Based on Double Random Phase Coding |
CN112364357A (en) * | 2020-10-12 | 2021-02-12 | 天津大学 | Optical image encryption method based on vector decomposition and chaotic phase coding |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106651736A (en) | Optical image encryption method based on Gyrator transform and coupled chaos | |
Li et al. | Asymmetric multiple-image encryption based on the cascaded fractional Fourier transform | |
CN106485761B (en) | Single Lens Color Image Encryption System | |
Pan et al. | Optical multi-image encryption scheme based on discrete cosine transform and nonlinear fractional Mellin transform | |
CN109583216B (en) | Single-channel color image encryption method of vector decomposition and phase coding | |
Kumar et al. | Multiuser optical image authentication platform based on sparse constraint and polar decomposition in Fresnel domain | |
CN106503568A (en) | Canonical cosine transform chaos Double random phase optical image encryption method | |
CN103700058B (en) | Many image encryption methods based on fractional fourier domain phase template multiplexing | |
Chen et al. | Security enhancement of double random phase encoding using rear-mounted phase masking | |
CN104778652A (en) | Double-image encryption and decryption method | |
CN107800924A (en) | Wavelet transform chaos Double random phase single channel coloured picture encryption method | |
Singh | Cryptosystem for securing image encryption using structured phase masks in Fresnel wavelet transform domain | |
Chen et al. | Cryptanalysis and improvement of an optical image encryption scheme using a chaotic Baker map and double random phase encoding | |
Kumar et al. | QR code-based non-linear image encryption using Shearlet transform and spiral phase transform | |
Rakheja et al. | Double image encryption scheme for iris template protection using 3D Lorenz system and modified equal modulus decomposition in hybrid transform domain | |
CN107742082B (en) | An Optical Image Encryption Algorithm | |
He et al. | Optical multiple-image hiding based on interference and grating modulation | |
CN106548044A (en) | Canonical hartley transform chaos Double random phase optical image encryption method | |
Wang et al. | Double image encryption based on phase–amplitude mixed encoding and multistage phase encoding in gyrator transform domains | |
Lee et al. | Double random phase encryption using orthogonal encoding for multiple-image transmission | |
CN106447591A (en) | Cascade Fresnel holographic encryption system and method combining two-dimensional chaos and constrained optimization algorithm | |
Vashisth et al. | Watermarking in gyrator domain using an asymmetric cryptosystem | |
Yang et al. | Securing color image by using bit-level modified integer nonlinear coupled chaos model in Fresnel diffraction domains | |
CN106447588A (en) | Fresnel transform domain chaotic double random phase encoding optical image encryption method | |
CN106485643A (en) | Image encryption method based on fractional fourier transform and Double random phase |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170510 |
|
RJ01 | Rejection of invention patent application after publication |