A Binary Image Encryption Method Based on Aperture Encryption and Phase Recovery Algorithm

A phase recovery and encryption method technology, applied in the field of information security, can solve the problems of phase recovery calculation convergence stagnation, serious problems, and reduced flexibility of the optical encryption system, so as to improve security, restore high quality, and simplify optical devices Effect

Inactive Publication Date: 2017-08-01
ZHEJIANG FORESTRY UNIVERSITY
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, adding digital constraints to the optical encryption process will obviously reduce the flexibility of the optical encryption system
In addition, for binary images, the method of adding a digital frame outside the image not only cannot solve the problem of convergence stagnation in the phase recovery calculation process, but also makes the problem more serious

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Binary Image Encryption Method Based on Aperture Encryption and Phase Recovery Algorithm
  • A Binary Image Encryption Method Based on Aperture Encryption and Phase Recovery Algorithm
  • A Binary Image Encryption Method Based on Aperture Encryption and Phase Recovery Algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The specific implementation of method of the present invention is as follows:

[0048] (1) The encryption process of the image (such as figure 1 shown) in the following steps:

[0049] (i) A(x, y) is an aperture function, f(x, y) represents the original image to be encrypted, R 1 (x, y) and R 2 (u, v) are two phase plates used as encryption keys in the optical encryption process, specifically expressed as exp[2πr 1 (x,y)] and exp[2πr 2 (u, v)], r 1 (x, y) and r 2 (u, v) represent two random matrices with a uniform probability distribution on the interval [0, 1] and are statistically independent, where (x, y) and (u, v) represent the input plane and the Fresnel diffraction output plane, respectively The coordinates of f(x, y) and the encryption key R 1 The product of (x, y) is once the wavelength is λ, and the distance is z 1 The Fresnel transform, the result obtained with R 2 (u, v) multiplied and then do it again The wavelength is λ, and the distance is z 2 T...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Provided is a binary image encryption method based on diaphragm encryption and a phase retrieval algorithm. After a binary image and a diaphragm which are to be encrypted are encrypted through a double-random-phase encryption system in a Fresnel domain, two strength distributions are obtained, and the two strength distributions are added according to a certain proportion to obtain a ciphertext; a holographic technique does not need to be utilized to record phase information in an optical encryption process, a decryption process is achieved through the phase retrieval algorithm, and the diaphragm serves a secrete key in the decryption process. The binary image encryption method based on diaphragm encryption and the phase retrieval algorithm has the advantages that the design of a light path is simple, the decryption operation is high in convergence rate and system safety is high.

Description

[0001] 【Technical field】 [0002] The invention relates to the technical field of information security, in particular to an image encryption method. [0003] 【Background technique】 [0004] Information security has become a major issue affecting individuals, companies, and even national interests, and it has also become a hot topic in information science. Information security processing technology based on optical theory and method is a new generation of information security processing technology gradually developed in recent years. The more striking one is the classic double random phase encoding technology based on the 4f system proposed by two experts, Refregier and Javidi of the University of Connecticut in the United States in 1995. This technology has been protected by a US patent. After that, research on the application of dual random phase encoding technology in the field of information security has become very popular, and reports on new methods and systems based on ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06T1/00
Inventor 汪小刚周国泉夏杰
Owner ZHEJIANG FORESTRY UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products