Unlock instant, AI-driven research and patent intelligence for your innovation.

Multi-level key generation method and user hierarchical authentication method based on double-beam interference

A double-beam interference and key technology, applied in the field of optical cryptography, can solve problems such as incomplete elimination of images, complex design, and difficulty in implementation.

Active Publication Date: 2019-07-19
SHENZHEN UNIV +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the above-mentioned improvement schemes usually face new problems such as complex design and difficult implementation, and some improvement schemes do not completely eliminate the image problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-level key generation method and user hierarchical authentication method based on double-beam interference
  • Multi-level key generation method and user hierarchical authentication method based on double-beam interference
  • Multi-level key generation method and user hierarchical authentication method based on double-beam interference

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] Further description will be given below in conjunction with the drawings and specific embodiments.

[0049] figure 1 It is a flowchart of a method for generating a multi-level key based on double-beam interference in an embodiment. The method includes:

[0050] Step S110: Save at least two standard reference images. The standard reference image is an image with fixed pixel intensity. Once it is determined as a standard reference image, the content is fixed. The standard reference image can be, for example, "Lena", "Peppers", "Baboon", etc., which are well-known in the image processing field, or other images.

[0051] Step S120: Generate a random pure phase distribution function as a phase lock. The pure phase distribution function refers to the distribution function with amplitude 1, which can be expressed as among them Represents the phase angle at (x,y) position. Random means that the phase angle of the (x, y) position is randomly selected on [0, 2π].

[0052] Specific...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a multi-level key generating method based on dual-beam interference and a hierarchical authentication method. The generating method comprises the following steps: saving at least two standard reference images; selecting a random pure phase distribution function to serve as a phase lock; coding each of the at least two standard reference images into a sparse phase distribution corresponding to an input plane by an iterative phase recovery processing process; and overlaying the at least two obtained sparse phase distributions according to different quantities to obtain phase keys of different authentication levels. The hierarchical authentication method comprises the following steps: acquiring interference field strength distributions of the phase lock and the phase keys on an output plane; calculating an interference field strength distribution and non-linear correlation distributions of the at least two standard reference images by a non-linear correlation algorithm; and taking the quantity of the standard reference images in which remarkable nonlinear correlation peaks relative to the interference field strength distribution appear as the authorization levels of the phase keys.

Description

Technical field [0001] The invention relates to the technical field of optical cryptography, in particular to a multi-level key generation method and a hierarchical authentication method based on double-beam interference. Background technique [0002] In 2008, Zhang Yan and others from Capital Normal University proposed an optical image encryption technology based on the principle of double-beam interference, using analytical deduction methods to encrypt an original plaintext image onto two pure phase templates. Because of its clear working principle, simple system structure and simplicity and efficiency of encryption algorithm, it has received continuous attention from researchers. However, follow-up studies show that the system has an inherent "contour reproduction" problem, that is, any one of the two random phase masks generated by the analysis during the encryption process is diffracted and the original image is still observable on the output surface. Contour, which makes t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
CPCH04L9/0869H04L9/088
Inventor 何文奇何江涛彭翔廖美华卢大江
Owner SHENZHEN UNIV