Multi-Image Encryption Method Based on Logarithmic Polar Coordinate Transformation

A logarithmic polar coordinate, encryption method technology, applied in the field of information security, can solve the problems of plaintext crosstalk, reduce the quality of restored images, etc., to achieve the effect of enhancing security, eliminating crosstalk, and resisting statistical attacks

Inactive Publication Date: 2014-10-29
NANCHANG UNIV
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Although some multi-image encryption algorithms have been proposed one after another, many current algorithms encrypt multiple images into one image, and there is crosstalk between the restored plaintext, which greatly reduces the quality of the restored image.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-Image Encryption Method Based on Logarithmic Polar Coordinate Transformation
  • Multi-Image Encryption Method Based on Logarithmic Polar Coordinate Transformation
  • Multi-Image Encryption Method Based on Logarithmic Polar Coordinate Transformation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The present invention will be further described below in conjunction with the embodiments and drawings, but the protection scope of the present invention should not be limited thereby.

[0059] Step 1: Select three digital images as the images to be encrypted, namely Lena, Peppers and Baboon, grayscale images with a level of 255, and a size of 512*512 pixels. figure 1 is the specific process of encryption, where , , represent three images to be encrypted respectively, RPM1 and RPM2 are two random phase templates whose values ​​are independently distributed in of white noise.

[0060] Step 2: Inversely transform the logarithmic polar coordinates of the three images respectively. In order to make the superimposed image after the transformation the same size as the original image, select an appropriate radius parameter. The maximum radius is selected as 255, and the size of the composite image is 511* 511. Let the first image radius parameter be selected as , th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a multi-image encryption method based on log-polar transform. The method comprises the following steps of: with log-polar transform, encoding different images to different annular ranges, wherein the inner and outer radiuses of the different annular ranges are not overlapped; and superposing all annular images to obtain one image; and performing double-random phase encoding encryption on the superposed image on the basis of fractional Fourier transform in an optical mode, wherein the transform order of the fractional Fourier transform and the random phase template are used as keys and the inner diameter and outer diameter of the transform annular area can be used as secondary keys. The method disclosed by the invention is simple and easy to operate, improves the image encryption efficiency, and has relatively good attack resistance and relatively high safety.

Description

technical field [0001] The patent of the present invention belongs to the field of information security technology, in particular to image encryption technology. Background technique [0002] With the continuous development of global computer network and multimedia technology, people increasingly rely on the information resources of the Internet, so network information security cannot be ignored. As a special information carrier, image has become an important means of information expression due to its intuitive image characteristics. In some special fields, such as military, finance, telemedicine, etc., image data needs to be processed for confidential communication to prevent information theft, and image encryption has attracted more and more attention. However, images are different from text information. Images have a large amount of data, and the redundancy of information is relatively large, and some distortion of a decrypted image is acceptable as long as it does not a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06T1/00
Inventor 周南润刘兴斌龚黎华张文全
Owner NANCHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products