Calculating integral imaging technology and Fourier transform optical image encryption method
A technology of Fourier transform and encryption method, which is applied in the fields of image information security and optical information processing, and can solve the problem that encryption systems are vulnerable to selected plaintext attacks and known plaintext attacks, inconvenient updating of random phase masks, and inconvenient key management and transmission. and other problems, to achieve the effect of resisting known plaintext attacks, resisting selected plaintext attacks, key management and convenient transmission.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0072] An optical image encryption method based on computational integral imaging technology and Fourier transform. The schematic diagram of the encryption principle is as follows: figure 1 As shown, the encryption method is composed of image preprocessing, chaotic key generation, image encryption and decryption.
[0073] (1) Image preprocessing part:
[0074] In the encryption method provided by the present invention, the computational integral imaging technique can modulate the original image to be encrypted into a pixel image array similar to a hologram; compared with the optical integral imaging technique, the computational integral imaging technique does not require a large number of optical elements, so System errors caused by optical components can be effectively avoided; in addition, computational integral imaging technology can also effectively solve problems such as poor quality of reconstructed images in optical integral imaging technology.
[0075] (2) The generat...
Embodiment 2
[0081] Combine below figure 1 1. The design principle introduces the scheme in embodiment 1 in detail, see the following description for details:
[0082] An optical image encryption method based on computational integral imaging technology and Fourier transform. The schematic diagram of the encryption principle is as follows: figure 1 shown. The encryption method is composed of image preprocessing, chaotic key generation, image encryption and decryption. The specific implementation manners of these three parts will be described in detail below.
[0083] (1) Image preprocessing part:
[0084] Using computational integral imaging, the original image to be encrypted is modulated into a hologram-like pixel image array, where the (k, l)th pixel image f obtained from the original image O(x, y) kl (x,y) is:
[0085] f kl (x,y)=O(-xv+kγ,-yv+lγ) (1)
[0086] where v=l 2 / l is the magnification factor, γ is the distance between the small lenses; (x, y) is the position coordinates...
Embodiment 3
[0109] Below in conjunction with specific accompanying drawing, the scheme in embodiment 1 and 2 is carried out feasibility verification, see the following description for details:
[0110] Adopt the encryption method provided by the implementation of the present invention to an image (such as figure 2 As shown in (a), after encryption, the obtained encrypted image is as follows figure 2 (b) shown.
[0111] Depend on figure 2 (b) It can be seen that any information of the original image is hidden. When all the keys are correct, the decrypted image is as follows figure 2 (c) shown. Depend on figure 2 (c) It can be seen that the original image can be well restored. It shows that the encryption and decryption of grayscale images using this system is successful.
[0112] In addition, when one key is wrong and other keys are correct, the decryption result is as follows: image 3 (a)-3(c). It can be seen that the security of the system can be guaranteed.
[0113] Fi...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


