Calculating holographic encryption method based on Hash function

A technology of hash function and encryption method, applied in computing, image data processing, image data processing and other directions, can solve the problems of affecting decryption effect, complicated operation, strict requirements on optical path and parameter accuracy of holographic encryption method, etc.

Active Publication Date: 2017-01-18
SICHUAN UNIV
View PDF8 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

attached figure 1 is most representative based on the 4 f Schematic diagram of the double random phase encryption method of the system, but the destruction of the random phase plate will seriously affect the decryption effect, and the existing holographic encryption methods generally have strict requirements on the accuracy of the optical path and parameters, and the operation is relatively complicated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Calculating holographic encryption method based on Hash function
  • Calculating holographic encryption method based on Hash function
  • Calculating holographic encryption method based on Hash function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The following describes in detail a typical embodiment of a computational holographic encryption method based on a hash function of the present invention, and further specifically describes the present invention. It is necessary to point out that the following examples are only used for further description of the present invention, and cannot be interpreted as limiting the protection scope of the present invention, and those skilled in the art make some non-essential improvements to the present invention according to the above-mentioned content of the present invention And adjustments still belong to the protection scope of the present invention.

[0028] The concrete steps of an embodiment of the present invention are:

[0029] Step 1: Use MATLAB R2013a version program to read in the attached Figure 4 The original image shown for encryption has a pixel resolution of 1920x1080, namely M =1920, N =1080. After 30 times of Gerchberg-Saxton (GS) iterative cycles, the e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a calculating holographic encryption method based on a Hash function. Information of an object which needs encrypting is recorded in a hologram by utilizing a calculating holographic encoding manner, the Hash function is set, 2D discrete pixels are arranged in a conflict-free scrambling manner according to the Hash function and a Hash table, original pixel distribution of the hologram is changed, and a cryptograph image is obtained. A decryption process is an inverse process of encryption, and accurate decryption and reproduction cannot be carried out unless the corresponding Hash function and a conflict processing operation are obtained.

Description

technical field [0001] The present invention relates to computing holographic encryption technology, more specifically, the present invention relates to a computing holographic encryption technology based on hash function. Background technique [0002] With the rapid development of information technology, information encryption and anti-counterfeiting have been paid more and more attention, attracting more and more researchers to invest in this area, and various encryption methods have emerged, such as optical encryption, computer encryption and quantum encryption. Ensure the security of information transmission. Among them, holographic encryption, as a special encryption method, is widely used in the field of information encryption and anti-counterfeiting because of its remarkable advantages that it can be realized by both computers and optics, and has the characteristics of high speed, parallelism, and high encryption dimension. . [0003] The dual random phase encoding ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00G03H1/00
CPCG03H1/0011G06T1/00
Inventor 王琼华李松杰刘素娟王迪
Owner SICHUAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products