Multi-image encryption and authentication method based on sparse constraint and system

A sparse constraint and authentication method technology, applied in the field of image processing, can solve problems such as low efficiency and time-consuming, and achieve the effect of saving storage space, improving efficiency, and saving running time

Active Publication Date: 2016-08-31
上海云梯信息科技有限公司
View PDF2 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the essence of the phase recovery algorithm is to determine the phase ma

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-image encryption and authentication method based on sparse constraint and system
  • Multi-image encryption and authentication method based on sparse constraint and system
  • Multi-image encryption and authentication method based on sparse constraint and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0042] In describing the present invention, it should be understood that the terms "center", "longitudinal", "transverse", "upper", "lower", "front", "rear", "left", "right", " The orientations or positional relationships indicated by "vertical", "horizontal", "top", "bottom", "inner" and "outer" are based on the orientations or positional relationships shown in the drawings, and are only for the convenience of describing the present invention and Simplified descriptions, rather than indicating or implying that the device or element refe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a multi-image encryption and authentication method based on sparse constraint and a system. The method comprises steps that multiple colorful images are respectively expressed as multiple quaternion matrixes; quaternion Gyrator transformation is employed to carry out double random phase encryption of the multiple quaternion matrixes to acquire multiple cryptograph data; according to the sparse matrixes, sparse expression of the multiple cryptograph data is carried out respectively to acquire multiple sparse cryptograph data; and components comprise real and imaginary components; the multiple sparse cryptograph data are superposed to acquire a final cryptograph; the final cryptograph is decrypted; and according to the decryption result and the to-be-detected images, non-linear correlation distribution is calculated to carry out authentication. The multi-image encryption and authentication method based on sparse constraint is advantaged in that relatively high security is realized, the cryptograph space and the operation time can effectively saved, and the method is suitable for being applied to image secret communication and authentication fields.

Description

technical field [0001] The invention relates to the technical field of image processing, in particular to a multi-image encryption and authentication method and system based on sparse constraints. Background technique [0002] Since the image encryption algorithm based on dual random phases in the related art was proposed, this technology has been widely combined with other transformations such as fractional Fourier transform, Gyrator transform, and phase recovery algorithms for secure communication of secret images. In order to further improve the security of encryption systems, sparse representations have recently been introduced into the field of image encryption based on dual random phases. This technique only decrypts the sparse ciphertext, although it can obtain visually invisible images, but it can be authenticated by means of non-linear correlation. [0003] Because color information can not only provide rich visual information and pleasing visual experience, the se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06T1/00
CPCG06T1/0021
Inventor 邵珠宏尚媛园付小雁丁辉周修庄
Owner 上海云梯信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products