Safety authentication method based on phase retrieval and sparse double random phase encryption

A dual random phase and phase recovery technology, applied in the field of information security, can solve problems to be developed and so on

Inactive Publication Date: 2015-04-15
ZHEJIANG FORESTRY UNIVERSITY
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The phase recovery algorithm has been successfully used in the field of image encryption, but its applic

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety authentication method based on phase retrieval and sparse double random phase encryption
  • Safety authentication method based on phase retrieval and sparse double random phase encryption
  • Safety authentication method based on phase retrieval and sparse double random phase encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The present invention is described in detail below in conjunction with embodiment and with reference to accompanying drawing: the encryption process of the method for the present invention can pass through image 3 The optoelectronic hybrid system shown is realized. A spatial light modulator (spatial light modulator, SLM) has the ability to modulate complex amplitude signals. The encryption process is divided into two steps:

[0047] (1) During the encryption process, the computer-controlled SLM1 and SLM2 are used to display the information f(x, y)×R respectively 1 (x, y) and R 2 (u, v), under the illumination of a plane wave of unit amplitude with wavelength λ, f(x, y) and the encryption key R 1 The product of (x, y) is once the distance is z 1 The Fresnel transform, the transformed signal is passed through R 2 After (u, v) modulation, make another distance as z 2 The Fresnel transform of the output signal is recorded by the light intensity detector CCD placed on...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safety authentication method based on phase retrieval and sparse double random phase encryption. The method comprises the following two steps: firstly, encrypting, namely encrypting an image to be encrypted into an amplitude image by a Fresnel domain double random phase encryption system, obtaining approximate distribution of output surface phases through a phase retrieval algorithm, and at last generating a sparse double random phase encryption image through a method for randomly extracting elements; secondly, decrypting and authenticating, namely decrypting the sparse double random phase encryption image at first and then comparing the decrypted image with an original image for authentication. The method disclosed by the invention has the advantages of simple encryption light path, good original information security and simple and reliable authentication process.

Description

【Technical field】 [0001] The invention relates to the technical field of information security, in particular to an image security authentication method. 【Background technique】 [0002] In recent years, the image encryption technology based on double random phase encryption and the image encryption technology based on phase recovery algorithm have aroused people's widespread attention. Double random phase encryption technology was proposed by two experts, Refregier and Javidi of the University of Connecticut in the United States in 1995. It is an important application of optical theory in the field of information security. The main idea of ​​double random phase encryption technology is to place two statistically irrelevant random phase plates on the input plane and Fourier spectrum plane of the 4f optical system, which are used to randomly disturb the spatial information and spectral information of the original image, so that in the system The stationary white noise whose st...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06T1/00
Inventor 汪小刚周国泉戴朝卿
Owner ZHEJIANG FORESTRY UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products