Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Optical image encryption method based on row multiplexing compressed ghost imaging and XOR operation

An encryption method and optical image technology, applied in image coding, image data processing, computing and other directions, can solve the problems of limited optical device accuracy, information loss, large storage and network bandwidth, etc., to reduce key space redundancy, The effect of reducing information loss and increasing encryption capacity

Inactive Publication Date: 2018-01-09
SHANDONG UNIV
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the currently widely researched optical information security scheme based on compressed ghost imaging has some inherent defects
First of all, ghost imaging based on compressed sensing requires a series of measurement matrices, which makes the encryption system consume a lot of storage and network bandwidth in the process of key storage and distribution.
Secondly, optical encryption methods operate more in the transform domain, and transforms such as fast Fourier transform (FFT) and discrete cosine transform (DCT) are often distributed in real numbers in the transform domain, which is limited by the accuracy of optical devices. cause a huge loss of information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Optical image encryption method based on row multiplexing compressed ghost imaging and XOR operation
  • Optical image encryption method based on row multiplexing compressed ghost imaging and XOR operation
  • Optical image encryption method based on row multiplexing compressed ghost imaging and XOR operation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention includes two processes of optical encryption and computational decryption, wherein figure 1 The principle of the optical encryption process is given, Figure 9 is a flowchart showing the calculation and decryption process.

[0036] Such as figure 1 , taking the encryption of six images as an example, the detailed process of the optical encryption process is as follows:

[0037] (1) figure 2 are six images to be encrypted with different information, denoted as I i (i∈[1:6]), whose size is N×N. The encryptor performs integer wavelet transformation on the six images to be encrypted in turn, transforms the image into the wavelet domain, selects an appropriate threshold, and sets all the coefficients in the image in the wavelet domain that are smaller than the threshold to 0, and then all remaining The number of coefficients that are 0 is the sparsity of the image, denoted as K, and different wavelet coefficients are selected for each image, so th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an optical image encryption method based on row multiplexing compressed ghost imaging and XOR operation. The method includes two processes of optical information encryption andcalculation decryption, for a plurality of images, an encipherer performs sparsification on images to be compressed through integer type wavelet transform and performs scrambling, and the scrambling images are integrated into an xor image through xor operation; the xor image is compressed to a ciphertext image through an improved row multiplexing compressed sensing frame, and ciphertext is published in an open mode; in a compression process, a scrambling key, an xor key and a measurement key are correspondingly generated, and are secretly distributed to different receivers; after receiving thekeys, the receivers utilize the measurement key, the xor key and the scrambling key in sequence to recover an xor image, a scrambling image and a spare image; and finally, a plaintext image is obtained through inverse wavelet transform. The method improves a compressed sensing optical implementation process, reduces key space redundancy, realizes simultaneous encryption and separate decryption ofa plurality of images, effectively enhances encryption capacity of an encryption system, and improves security.

Description

technical field [0001] The invention relates to an optical multiple image encryption method based on line multiplexing compressed ghost imaging and XOR operation, and belongs to the technical field of image encryption. Background technique [0002] In recent years, image encryption technology based on optical information processing has attracted widespread attention. Due to the natural advantages of optical information processing technology, such as parallel data processing capabilities, multi-dimensional coding freedom, and huge key space, it is considered by scholars from all over the world to be a new generation of information security technology. [0003] Compressed sensing, as a new compression acquisition technology in recent years, can realize simultaneous sampling and compression coding of signals, and has been extensively studied in the fields of signal processing and image acquisition. And because it can be conveniently implemented optically using the ghost imagin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06T9/00
Inventor 孟祥锋李显业王玉荣
Owner SHANDONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products