Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multi-image encrypting and decrypting method based on ghost imaging and public key cryptography

A technology of public key cryptography and encryption method, which is applied in image communication, electrical components, etc., can solve the problem of lack of research on multi-image encryption technology, and achieve the effect of saving costs and simplifying the system

Inactive Publication Date: 2015-01-14
NORTH CHINA UNIV OF WATER RESOURCES & ELECTRIC POWER
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the current image encryption technology based on ghost imaging is all for the encryption of a single image, while the research on multi-image encryption technology is quite scarce.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-image encrypting and decrypting method based on ghost imaging and public key cryptography
  • Multi-image encrypting and decrypting method based on ghost imaging and public key cryptography
  • Multi-image encrypting and decrypting method based on ghost imaging and public key cryptography

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0030] Such as figure 1 Shown, basic scheme of the present invention is:

[0031] The encryption process is as follows:

[0032] 1. First, multiple images are detected by a non-resolution bucket detector. The optical system is composed of several light paths, one light path is an SLM1, the image to be encrypted 2, and the convex lens is composed of 3, and each light path converges on the barrel detector 4.

[0033] 2. Using multiple random phase plates (P 1r ,P 2r ,...,P Nr ) light intensity information in its Fresnel domain (I 1r ,I 2r ,...,I Nr ) for N images to be encrypted (f 1 , f 2 ,..., f N ) are randomly modulated respectively, where P 1r ,P 2r ,...,P Nr Independent of each other, not related to each other. The modulated information converges on the barrel detector through the convex lens, and the barrel detector ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a multi-image encrypting and decrypting method based on ghost imaging and public key cryptography. The encrypting method includes the steps that at least one light path is sequentially arranged along a light path, and each light path is sequentially provided with a spatial light modulator (SLM), an image to be encrypted and a convex lens so that all the light paths can be converged to one barrel detector; the SLMs are controlled to generate different random phase plates so as to obtain all detection data, encryption is conducted through calculation based on a public key encryption algorithm, and a ciphertext is obtained. The decryption method includes the steps that the ciphertext and random phase plate information are received, and data are obtained by decrypting the ciphertext through a private key; light intensity information of the random phase plates in Fresnel areas of the random phase plates is obtained, data including all pieces of plaintext information are correlated to the light intensity information corresponding to the images, calculation is conducted, and decryption is conducted. According to the multi-image encrypting and decrypting method, an optical system is simplified, any images can be encrypted at the same time, mutual crosstalk does not exist among the images, and the number of the encrypted images does not affect the definition of the decrypted images.

Description

technical field [0001] The invention relates to a multi-image encryption and decryption method based on ghost imaging and public key encryption, belonging to the field of optical information security. Background technique [0002] In recent years, with the continuous improvement of computer computing speed and the rapid development of modern network and communication technology, the traditional information security technology that completely relies on cryptography and electronic information systems is facing increasingly severe challenges. However, in contrast, information security technology based on optical theory and methods has unique advantages such as fast parallel data processing capabilities, multi-dimensional (amplitude, phase, polarization, wavelength), large capacity, high robustness, and large key space. More and more researchers have turned their attention to the emerging field of optical information security. [0003] Among all kinds of information, images are...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04N1/32
CPCH04N1/32272
Inventor 袁胜刘明堂刘雪梅杨阳蕊段美霞
Owner NORTH CHINA UNIV OF WATER RESOURCES & ELECTRIC POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products