Three-step generalized phase-shifting and cascade fractional Fourier transform optical image encryption method
A fractional Fourier, encryption method technology, applied in the field of optical image encryption based on three-step generalized phase-shift digital holography and cascaded fractional Fourier transform, can solve the problems of demanding phase shifters, wavefront reproduction errors, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0102] An optical image encryption method based on three-step generalized phase shift digital holography and cascaded fractional Fourier transform, the optical path diagram is as follows figure 1 As shown, the encryption method consists of three parts: the key generation part, the image encryption part and the image decryption part.
[0103] see figure 1 , where the key generation part consists of two chaotic random phase masks CRPM generated by the Duffing chaotic system 1 and CRPM 2 ; The image encryption part and the image decryption part include: lens (L, L 0 , L 1 , L 2 , L 3 , L 4 , L 5 ), mirror (M 1 ,M 2 ), spatial filter (SF), beam splitter (BS 1 , BS 2 ), phase shifter (PZT), laser, CCD camera, computer, etc.
[0104] (1) Key generation part:
[0105] In the encryption method provided by the present invention, two random phase mask keys are respectively generated by a Duffing chaotic system controlled by different chaotic parameters. The initial value a...
Embodiment 2
[0112] Combine below figure 1 1. The design principle introduces the scheme in embodiment 1 in detail, see the following description for details:
[0113] An optical image encryption method based on three-step generalized phase-shift digital holography and cascaded fractional Fourier transform. The optical path corresponding to the encryption and decryption process is as follows: figure 1 As shown, the encryption method consists of three parts: the key generation part, the image encryption part and the image decryption part. The specific implementation manners of these three parts will be described in detail below.
[0114] (1) Key generation part:
[0115] In the encryption method, two chaotic random phase masks act as the main key, and the wavelength of the object light wave, the Fresnel transform distance and the order of the fractional Fourier transform act as the auxiliary key. The following is a detailed introduction on how to use the Duffing chaotic system to generat...
Embodiment 3
[0153] Below in conjunction with specific accompanying drawing, the scheme in embodiment 1 and 2 is carried out feasibility verification, see the following description for details:
[0154] Adopt the encryption method provided by the implementation of the present invention to an image (such as figure 2 As shown in (a), after encryption, the obtained encrypted image is as follows figure 2 (b) shown.
[0155] Depend on figure 2 (b) It can be seen that any information of the original image is hidden. When all the keys are correct, the decrypted image is as follows figure 2 (c) shown. Depend on figure 2 (c) It can be seen that the original image can be well restored. It shows that the encryption and decryption of grayscale images using this system is successful.
[0156] In addition, when one key is wrong and other keys are correct, the decryption result is as follows: image 3 (a)-3(h). It can be seen that the security of the system can be guaranteed.
[0157] Fi...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com