Image encryption method based on fractional Fourier transform and double random phase encoding
A technology of fractional Fourier transform and double random phase, applied in image data processing, image data processing, instruments, etc., can solve the problem that random phase mask cannot be used as a key, and achieve the effect of convenient key management and transmission
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0068] An improved image encryption method based on fractional Fourier transform and double random phase encoding, the schematic diagram corresponding to the encryption and decryption process is as follows figure 1 As shown, the encryption method consists of three parts: the key generation part, the image encryption part and the image decryption part.
[0069] see figure 1 , where the key generation part includes two chaotic random phase masks CRPM1 and CRPM2 generated by the one-dimensional Chebyshev chaotic system; the image encryption part and image decryption part include: Fresnel transform FrT and fractional Fourier transform FrFT.
[0070] (1) Key generation part:
[0071] In the encryption method provided by the invention, two random phase mask keys are respectively generated by a one-dimensional Chebyshev chaotic system controlled by different chaotic parameters. The initial value and control parameters of the Chebyshev chaotic system can replace two random phase mas...
Embodiment 2
[0078] Combine below figure 1 1. The design principle introduces the scheme in embodiment 1 in detail, see the following description for details:
[0079] An improved image encryption method based on fractional Fourier transform and double random phase encoding, the schematic diagram corresponding to the encryption and decryption process is as follows figure 1 As shown, the encryption method consists of three parts: the key generation part, the image encryption part and the image decryption part. The specific implementation manners of these three parts will be described in detail below.
[0080] (1) Key generation part:
[0081] In the encryption method, two chaotic random phase masks act as the master key, and the object light wavelength, Fresnel diffraction distance and fractional Fourier transform order act as the auxiliary key. The following is a detailed introduction on how to use the one-dimensional Chebyshev chaotic system to generate these two chaotic random phase m...
Embodiment 3
[0104] Below in conjunction with specific accompanying drawing, the scheme in embodiment 1 and 2 is carried out feasibility verification, see the following description for details:
[0105] Adopt the encryption method provided by the implementation of the present invention to an image (such as figure 2 As shown in (a), after encryption, the obtained encrypted image is as follows figure 2 (b) shown.
[0106] Depend on figure 2 (b) It can be seen that any information of the original image is hidden. When all the keys are correct, the decrypted image is as follows figure 2 (c) shown. Depend on figure 2 (c) It can be seen that the original image can be completely restored. It shows that the encryption and decryption of grayscale images using this system is successful.
[0107] In addition, when one key is wrong and other keys are correct, the decryption result is as follows: image 3 (a)-3(h). It can be seen that the security of the system can be guaranteed.
[0108...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


