Unlock instant, AI-driven research and patent intelligence for your innovation.

An Optical Image Encryption Algorithm

An encryption algorithm and optical image technology, applied in computing, computer security devices, instruments, etc., can solve the problems of contour appearance and low attack resistance, achieve high security, solve the contour appearance problem, and eliminate the contour appearance problem.

Active Publication Date: 2020-09-11
CHANGSHA NORMAL UNIV
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The invention provides an optical image encryption algorithm, which solves the problems of outline appearance and low attack resistance in existing image encryption algorithms

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Optical Image Encryption Algorithm
  • An Optical Image Encryption Algorithm
  • An Optical Image Encryption Algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The present invention will be further described below in conjunction with embodiment.

[0057] The optical image encryption algorithm process of coherent superposition coupling mode equal vector decomposition figure 1 , which includes three processes: (1) Generation of chaotic phase mask based on Logistic mapping and plaintext pixels; (2) Plaintext transformation based on Fourier mechanism and chaotic mask; (3) Equal modulus decomposition technology and Fourier mechanism image encryption.

[0058] Let f(x,y) be the initial color image, its size is M×N, and by normalizing it, f 1 '(x,y). Subsequently, a Logistic chaotic map is introduced to generate a chaotic phase mask, for f 1 '(x,y) completes the modulation process. Among them, the Logistic mapping function is

[0059] x n+1 =μx n (1-x n ) (1)

[0060] Among them, μ∈(0 4] is the chaos control parameter; xi is the system variable.

[0061] figure 2 The autocorrelation between the dynamic characteristics of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an optical image encryption algorithm and belongs to the field of image encryption. Firstly, normalization processing is conducted on input images; based on Logistic mapping, pixel characteristics of the input images are utilized to generate their initial values, and chaos phase masks are output through iterative Logistic mapping; the images are modulated by using the phasemasks, the modulated images are processed by combining with Fourier transformation, and their Fourier frequency spectra are output; secondly, mode decomposition is conducted on the frequency spectra respectively, and two masks are obtained; based on Fourier mechanisms different in fractional order, the two masks are transformed; finally, a phase-amplitude truncation coding technology is introduced, and the contour display problem is effectively solved. An experimental result shows that compared with a current image encryption mechanism based on an interference principle, the proposed algorithmhas higher security, and the contour display problem is effectively solved.

Description

technical field [0001] The invention relates to the technical field of image encryption, in particular to an optical image encryption algorithm. Background technique [0002] With the globalization of the economy, the issue of information security has become increasingly prominent and has become the focus of global attention. Especially with the rapid development and application of the Internet and computer technology, information leakage or tampering has become increasingly serious. Because of its good visual and intuitive expression characteristics and rich content information, images have become an important medium for users to communicate and bring convenience to users. However, in the transmission of open networks, image information is easily attacked, resulting in Its content information has been tampered with or leaked, which has brought huge losses to people. In order to deal with the increasingly prominent problem of image information security, researchers have pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60
CPCG06F21/602
Inventor 张博
Owner CHANGSHA NORMAL UNIV