Multi-image encryption method based on log-polar transform
A technology of logarithmic polar coordinates and encryption method, which is applied in the field of information security, can solve problems such as reducing the quality of restored images and plaintext crosstalk, and achieves the effects of enhancing security, eliminating crosstalk, and increasing capacity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0058] The present invention will be further described below in conjunction with the embodiments and drawings, but the protection scope of the present invention should not be limited thereby.
[0059] Step 1: Select three digital images as the images to be encrypted, namely Lena, Peppers and Baboon, grayscale images with a level of 255, and a size of 512*512 pixels. figure 1 is the specific process of encryption, where , , represent three images to be encrypted respectively, RPM1 and RPM2 are two random phase templates whose values are independently distributed in of white noise.
[0060] Step 2: Inversely transform the logarithmic polar coordinates of the three images respectively. In order to make the superimposed image after the transformation the same size as the original image, select an appropriate radius parameter. The maximum radius is selected as 255, and the size of the composite image is 511* 511. Let the first image radius parameter be selected as , th...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 