Encryption method for multiple color images based on complete ternary tree structure
A color image and encryption method technology, applied in the fields of information security and optical information processing, can solve the problems of large space, degraded image quality of decryption, limited encryption capacity of encryption system, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0096] A multi-color image encryption method based on a complete ternary tree structure, the schematic diagram of the encryption system is as follows figure 1 and figure 2 shown. The encryption module is used as the branch node and the root node of the complete ternary tree, and the three color channels of the color image are used as the leaf nodes connecting the branch nodes. Different color images correspond to different encryption modules and have different encryption and decryption processes.
[0097] (1) The encryption and decryption process in the encryption module (such as figure 1 shown) as follows:
[0098] 1) Encryption process:
[0099] The first step is to decompose the color image f to be encrypted into three color channels f of R, G, and B r , f g and f b ; then, put f r and f b synthesized into a complex image, namely
[0100] f rb =f r +j·f b , (1)
[0101] Among them, j represents the imaginary number operator, · represents the number multiplicat...
Embodiment 2
[0143] The scheme in embodiment 1 is verified for feasibility below in conjunction with specific accompanying drawings, see the following description for details:
[0144] Adopt the encryption method provided by the implementation of the present invention to 3 color images (such as image 3 Shown) After encryption, the obtained encrypted image is as follows Figure 4 shown.
[0145] Depend on Figure 4 It can be seen that any information of the original image is hidden. When all the keys are correct, the decrypted image is as follows Figure 5 shown. Depend on Figure 5 It can be seen that the original image can be completely restored. It shows that the encryption and decryption of grayscale images using this system is successful.
[0146] In addition, when one key is wrong and other keys are correct, the decryption result is as follows: Figure 6 (a)-6(f). It can be seen that the security of the system can be guaranteed.
[0147] Figure 7 are three decrypted image...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com