Optical encryption method based on chaos and computer-generated holography

A technology of computational holography and encryption method, applied in the field of information security, can solve the problems of large amount of key data, difficult transmission, difficult Internet real-time transmission and remote display, etc., to achieve high security performance, improve security, and be beneficial to Effects of saving and transferring

Inactive Publication Date: 2013-05-22
ZHEJIANG NORMAL UNIVERSITY
View PDF2 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, using traditional encoding methods such as random phases, the encrypted data generated is often a complex number. It is difficult to transmit through the network when recording and storing using traditional recording holograms, and the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Optical encryption method based on chaos and computer-generated holography
  • Optical encryption method based on chaos and computer-generated holography
  • Optical encryption method based on chaos and computer-generated holography

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] Below in conjunction with accompanying drawing of description and invention is further described:

[0042] The schematic diagram of the optical encryption principle of the present invention is as follows figure 1 As shown, the three planes from left to right are the input plane (x, y), the transformation plane (x 1 ,y 1 ) and the output surface (x 2 ,y 2 ). f(x, y) is the plaintext information to be encrypted on the input side, f(x 1 ,y 1 ) is the wavefront distribution of the transformation plane, f(x 2 ,y 2 ) is the wavefront distribution of the output surface, RPM 1 and RPM 2 are two random phase array keys constructed from chaotic sequences, z 1 for RPM 1 distance to the transformation plane, z 2 for RPM 2 Distance to output face. R is the reference light introduced by computational holography.

[0043] The schematic diagram of the optical decryption principle of the present invention is as follows: figure 2 As shown, the schematic diagram of the de...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Provided is an optical encryption method based on chaos and computer-generated holography. By means of the method, a chaos sequence is successfully used for forming a random phase array to carry out modulation coding on object light waves, the boqi coding method which revises off-axis reference light is used, and optical encryption and decryption are achieved on the basis of computer-generated holography. The invention belongs to the technical field of information security. In the decryption process, by means of the method, as long as correct chaos sequence initial values are obtained, the random phase array can be obtained, and therefore clear initial images can be rebuilt combining correct system architecture parameters. Compared with a conventional random phase encryption method, the chaos sequence initial values are used as secret keys, and therefore difficulty of phase array storage and transmission does not exist any longer, data bulk of the secret keys is greatly compressed, and meanwhile, digitization of computer-generated holography technology encryption information is more beneficial for storage and transmission of information.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to an optical encryption method based on chaos and computational holography. Background technique [0002] Since the 1990s, with the development of computer hardware and software and the emergence of the Internet, people have been brought into the information society, and information technology has developed rapidly. Information security issues such as data encryption, anti-counterfeiting and security authentication are becoming more and more important. While computer and electronic information encryption technology has been widely used, due to the particularity of optical imaging systems, light waves are a multi-dimensional information carrier with multiple encoding properties such as amplitude, phase, spatial frequency, and polarization. Research on optical encryption technology also developed rapidly. In addition, optical and photoelectric information e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00G03H1/22
Inventor 金伟民刘健
Owner ZHEJIANG NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products