Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Asymmetric double image encryption method based on joint of fourier transformation and phase cutting

A technology of Fourier transform and inverse Fourier transform, which is applied in the field of security encryption of asymmetric images, can solve problems such as the increase of system complexity, and achieve the effect of strong anti-deciphering ability and improved security.

Inactive Publication Date: 2012-07-11
ZHEJIANG FORESTRY UNIVERSITY
View PDF3 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

By extending the system from the phase-cut Fourier transform domain to the phase-cut fractional Fourier transform domain or placing an amplitude plate in the frequency domain, the attack of the amplitude recovery method can be effectively resisted, but the complexity of the system is significantly increased

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Asymmetric double image encryption method based on joint of fourier transformation and phase cutting
  • Asymmetric double image encryption method based on joint of fourier transformation and phase cutting
  • Asymmetric double image encryption method based on joint of fourier transformation and phase cutting

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The present invention is described in detail below in conjunction with embodiment and with reference to accompanying drawing: the encryption decryption process of the method for the present invention can pass image 3 , Figure 4 The optoelectronic hybrid system shown is realized. Spatial light modulators (spatial light modulators, SLM) have the ability to display complex amplitude signals. The encryption process is divided into two steps:

[0061] (1) During the encryption process, the computer-controlled SLM1 and SLM2 are used to display the input information f 1 (x-a 1 ,y)×R 1 (x-a 1 , y) and f 2 (x-a 2 ,y)×R 1 (x-a 2 , y), that is, the input information is:

[0062] u 0 (x, y) = [f 1 (x-a 1 ,y)×R 1 (x-a 1 ,y)]+[f 2 (x-a 2 ,y)×R 2 (x-a 2 ,y)].

[0063] Under the irradiation of unit amplitude plane light wave, the joint Fourier transform of the input information can be realized by using the convex lens, and the result of the transformation is the c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an asymmetric double-image encryption method based on a joint of a fourier transformation and a phase cutting. Under modulation of random phase masks, two plain texts are modulated by the joint of the fourier transformation and the phase cutting, so that symmetrical and linear characteristics of a traditional double random phase encryption method are eliminated, so that the anti-attack capability of the encryption system is greatly improved. An encryption process, a decryption process and the asymmetry of an encryption key and a decryption key are achieved, and an optical asymmetric encryption system based on the double random encryption method is established. The test shows that, compared with traditional double random encryption techniques which are easy to be attacked, the asymmetric double image encryption method can resist violent attacks, known plaintext attacks, direct public key attacks and iterative amplitude recovery algorithm attacks, so that high security is provided.

Description

【Technical field】 [0001] The invention relates to the technical field of information security and the field of information optics, in particular to a secure encryption method for an asymmetric image. 【Background technique】 [0002] Protecting the security of information is an important task we are currently facing. As one of the important forms of information carrier, images are intuitive and vivid. In recent years, image security processing technology based on optical principles has attracted widespread attention, and has become a new research hotspot in the field of image security processing. At present, the most widely used is the dual random phase encoding technology based on 4f system proposed by two experts, P.Réfrégier and B.Javidi in the United States in 1995. This technology has been protected by a US patent. The main idea of ​​the dual random phase encoding technology is to place two statistically irrelevant random phase masks on the input plane and the Fourier ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06T1/00
Inventor 汪小刚赵道木
Owner ZHEJIANG FORESTRY UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products