Unlock instant, AI-driven research and patent intelligence for your innovation.

Calculating integral imaging technology and Fourier transform optical image encryption method

A technology of Fourier transform and encryption method, which is applied in the fields of image information security and optical information processing, and can solve the problem that encryption systems are vulnerable to selected plaintext attacks and known plaintext attacks, inconvenient updating of random phase masks, and inconvenient key management and transmission. and other problems, to achieve the effect of resisting known plaintext attacks, resisting selected plaintext attacks, key management and convenient transmission.

Inactive Publication Date: 2017-03-22
TIANJIN UNIV
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1) The key is a random phase mask of the image size, therefore, key management and transmission are inconvenient (see literature [5]);
[0006] 2) Since the random phase mask is inconvenient to update, the encryption system is vulnerable to chosen plaintext attack and known plaintext attack (see literature [6] and [7])
[0007] 3) In the optical integral imaging technology, the use of a large number of optical components is likely to bring systematic errors to the imaging system and seriously reduce the quality of the reconstructed image (see literature [8])

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Calculating integral imaging technology and Fourier transform optical image encryption method
  • Calculating integral imaging technology and Fourier transform optical image encryption method
  • Calculating integral imaging technology and Fourier transform optical image encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0072] An optical image encryption method based on computational integral imaging technology and Fourier transform. The schematic diagram of the encryption principle is as follows: figure 1 As shown, the encryption method is composed of image preprocessing, chaotic key generation, image encryption and decryption.

[0073] (1) Image preprocessing part:

[0074] In the encryption method provided by the present invention, the computational integral imaging technique can modulate the original image to be encrypted into a pixel image array similar to a hologram; compared with the optical integral imaging technique, the computational integral imaging technique does not require a large number of optical elements, so System errors caused by optical components can be effectively avoided; in addition, computational integral imaging technology can also effectively solve problems such as poor quality of reconstructed images in optical integral imaging technology.

[0075] (2) The generat...

Embodiment 2

[0081] Combine below figure 1 1. The design principle introduces the scheme in embodiment 1 in detail, see the following description for details:

[0082] An optical image encryption method based on computational integral imaging technology and Fourier transform. The schematic diagram of the encryption principle is as follows: figure 1 shown. The encryption method is composed of image preprocessing, chaotic key generation, image encryption and decryption. The specific implementation manners of these three parts will be described in detail below.

[0083] (1) Image preprocessing part:

[0084] Using computational integral imaging, the original image to be encrypted is modulated into a hologram-like pixel image array, where the (k, l)th pixel image f obtained from the original image O(x, y) kl (x,y) is:

[0085] f kl (x,y)=O(-xv+kγ,-yv+lγ) (1)

[0086] where v=l 2 / l is the magnification factor, γ is the distance between the small lenses; (x, y) is the position coordinates...

Embodiment 3

[0109] Below in conjunction with specific accompanying drawing, the scheme in embodiment 1 and 2 is carried out feasibility verification, see the following description for details:

[0110] Adopt the encryption method provided by the implementation of the present invention to an image (such as figure 2 As shown in (a), after encryption, the obtained encrypted image is as follows figure 2 (b) shown.

[0111] Depend on figure 2 (b) It can be seen that any information of the original image is hidden. When all the keys are correct, the decrypted image is as follows figure 2 (c) shown. Depend on figure 2 (c) It can be seen that the original image can be well restored. It shows that the encryption and decryption of grayscale images using this system is successful.

[0112] In addition, when one key is wrong and other keys are correct, the decryption result is as follows: image 3 (a)-3(c). It can be seen that the security of the system can be guaranteed.

[0113] Fi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to the field of image information security and optical information processing, effectively avoids systematic errors caused by complex optical elements, has high reconstruction quality and is capable of effectively resisting known plaintext attacks and selecting plaintext attacks. The calculating integral imaging technology and Fourier transform optical image encryption method comprises the following steps of 1) image pretreatment: a to-be-encrypted original image is modulated into a pixel image array similar to a hologram; 2) chaotic secret key generation: two random phase masks serving as the master key are generated by two-dimensional Ikeda chaotic systems controlled by different chaotic parameters; and 3) image encryption and decryption: (1) in the encryption process, the pixel image array is firstly modulated by a first chaotic random phase mask, and (2) in the decryption process, an original image is reconstructed by the calculating integral imaging technology. The method is mainly applied to image information safety situations.

Description

technical field [0001] The invention relates to the technical fields of image information security and optical information processing, in particular to an optical image encryption method based on computational integral imaging technology and Fourier transform. Background technique [0002] As one of the most popular multimedia forms at present, digital images are widely used in the fields of politics, economy, military affairs, education and so on. In today's highly developed Internet technology, how to protect digital images from tampering, illegal copying and dissemination has important practical significance. The research on image encryption technology has become one of the hotspots in the field of information security. [0003] Optical information processing technology has aroused great interest in the field of image encryption research because of its high processing speed, high parallelism, and fast realization of convolution and correlation operations (see literature ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06T9/00
CPCG06T9/007
Inventor 唐晨苏永钢李碧原谷帆程佳佳
Owner TIANJIN UNIV