A dual graph encryption method based on fraction rank Fourier conversion

A technology of fractional Fourier and encryption method, which is applied in the field of information security, and can solve the problems of undiscussed secret map performance, difficult optical realization, mutual interference of decrypted maps, etc.

Inactive Publication Date: 2008-03-26
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF0 Cites 42 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the single-image encryption method is used, two noise images with similar statistical characteristics will be obtained after encrypting the two images separately, which will bring certain difficulties to distinguish and distinguish them, and they must be operated separately when decrypting, which is not conducive to key management.
Recently, researchers have begun to study multi-image encryption methods. Xiangfeng Meng et al. proposed a Fresnel transform-based dual-image encryption and digital watermarking method using amplitude and phase modulation separately. W

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A dual graph encryption method based on fraction rank Fourier conversion
  • A dual graph encryption method based on fraction rank Fourier conversion
  • A dual graph encryption method based on fraction rank Fourier conversion

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0092] The present invention will be further described below in conjunction with the drawings and embodiments.

[0093] Select the standard test gray-scale image "Lena" and the binary image "text" with a size of 256×256 as the original images f(x, y) and g(x, y) to be encrypted in this embodiment, as shown in Figure 4 -1 and Figure 4-2. Use Matlab 2006a for simulation.

[0094] First, normalize their pixel values. After scrambling the binary image, pure phase encoding is performed, and then a composite image is generated with the gray image to perform bi-phase encoding. The transformation order of two two-dimensional fractional Fourier transform is a x =a y = 0.82 and b x = B y = 0.45. The amplitude of the result of double-picture encryption using the present invention is shown in Figure 4-3.

[0095] The following is an explanation and performance analysis of the embodiments in conjunction with the drawings:

[0096] The histogram of the real part of the dense map is shown in Fig...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention puts forward a method for encrypting double images based on fractional stage Fourier transformation, which disorders pixels of one of two original images, then carries out pure phase coding to the disordered result to multiply the other original image to generate a composite image with a duplicate swing and then makes fractional stage Fourier domain double random phase coding and encryption to get an encrypted image having generalized stable white noise approaching to gaussion distribution, which presents a method for reducing errors by threshold value by analyzing influence to decryption result by disturbance.

Description

Technical field [0001] The invention relates to the fields of information security and information optics, especially image encryption technology, which is suitable for encrypting two images that need to be managed and used together. Background technique [0002] Image information is vivid and vivid, and has become one of the important means for human beings to express information. With the rapid development of network multimedia technology, the acquisition, transmission, and processing of image data have spread to every corner of the digital age, such as finance, e-commerce and government affairs, modern military information transmission, and various personal businesses. While the operation is more convenient, the security problem is also becoming more and more serious. Encryption is the most direct means to protect the security of image information. Image encryption technology processes them into random noise-like meaningless images for confidential transmission and stora...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/28G03H1/16G06T1/00
Inventor 陶然辛怡
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products