Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Image Authentication Method Based on Phase Recovery and Elliptic Curve Digital Signature Algorithm

An elliptic curve and digital signature technology, applied in the field of information security, can solve problems such as optical information security system collisions, and achieve the effects of improving security, avoiding collision problems, and avoiding trusteeship problems

Active Publication Date: 2015-11-18
SHANDONG UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Many reported optical information security systems based on iterative phase recovery algorithms have collision phenomena

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image Authentication Method Based on Phase Recovery and Elliptic Curve Digital Signature Algorithm
  • Image Authentication Method Based on Phase Recovery and Elliptic Curve Digital Signature Algorithm
  • Image Authentication Method Based on Phase Recovery and Elliptic Curve Digital Signature Algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] figure 1 The flow of authentication information generation in the present invention is given (only the authentication information generation flow of a single user is displayed, other users can generate authentication information according to the same flow), the authentication information generation process is as follows:

[0033] (1) The certification center generates and announces the parameters of the elliptic curve public key cryptosystem (E p (a,b),G,n):p is the specified finite field Z p A large prime number of , a and b are the elliptic curve y 2 ≡x 3 Coefficient of +ax+b(modp), G is the base point of the cyclic subgroup of points on the elliptic curve, and n is the order of the point G. In this embodiment, the secp160r1 elliptic curve on the prime number field recommended by StandardsforEfficientCryptography (SEC) and some simple parameters are selected. The parameters are:

[0034] Elliptic curve equation y 2 ≡x 3 +ax+b(modp)

[0035] p=FFFFFFFFFFFFFFFFF...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An image authentication method based on phase retrieval and an elliptic curve digital signature algorithm comprises two processes, namely an authentication information generation process and a security authentication process. An authentication center generates and publishes elliptic curve public key cryptosystem parameters; a user is authorized to select a private key and generate a public key; a signature is given to an identify label, and the signature is encoded into a two-dimension code; an authenticated image and the two-dimension code after noise addition processing are subjected to iterating encoding based on a phase retrieval algorithm so as to obtain two phase secret keys; Hash operation message authentication codes relevant to the authenticated image, the public key in the elliptic curve digital signature algorithm and a secret key of the identify label are sent to the authentication center and stored in an authentication center database; an output image is obtained according to the two phase secret keys; the amplitude of the output image is matched with the authenticated image in the authentication center database; phases are decoded, and the signature is verified; user rights of a user terminal are determined. The image authentication method based on the phase retrieval and the elliptic curve digital signature algorithm avoids a collision problem based on a Fresnel diffraction image encryption system, and improves safety.

Description

technical field [0001] The invention relates to an image authentication method based on a phase recovery algorithm and an elliptic curve digital signature algorithm, and belongs to the technical field of information security. Background technique [0002] In recent years, image encryption technology based on optical information processing has attracted widespread attention. Due to the natural advantages of optical information processing technology, such as parallel data processing capabilities, multi-dimensional coding freedom, and huge key space, it is considered by scholars from all over the world to be a new generation of information security technology. [0003] As a typical optical information processing technology - phase recovery technology has become a very important research field, it is an important technology to solve the "inverse problem". With the deepening of research, its design idea has been widely used in other fields, for example, it has been widely used i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/30
Inventor 孟祥锋范德胜王玉荣
Owner SHANDONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products