Asymmetric optical image encryption method based on cylindrical diffraction transformation and equivalent mode decomposition

An optical image and encryption method technology, applied in the field of information security and information optics, can solve the problems of system iterative recovery algorithm attacks, hidden dangers of system security, etc. Effect

Active Publication Date: 2019-04-12
SICHUAN UNIV
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since the system still has the risk of being attacked by the iterat

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Asymmetric optical image encryption method based on cylindrical diffraction transformation and equivalent mode decomposition
  • Asymmetric optical image encryption method based on cylindrical diffraction transformation and equivalent mode decomposition
  • Asymmetric optical image encryption method based on cylindrical diffraction transformation and equivalent mode decomposition

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] A typical embodiment of an asymmetric optical image encryption method based on cylindrical diffraction transformation and equivalent mode decomposition of the present invention will be described in detail below, and the present invention will be further described in detail. It is necessary to point out that the following examples are only used for further description of the present invention, and cannot be interpreted as limiting the protection scope of the present invention, and those skilled in the art make some non-essential improvements to the present invention according to the above-mentioned content of the present invention And adjustments still belong to the protection scope of the present invention.

[0015] The present invention proposes an asymmetric optical image encryption method based on cylindrical diffraction transformation and equivalent mode decomposition. The optical encryption method is as follows: figure 1 with figure 2 shown, including figure 1 e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an asymmetric optical image encryption method based on cylindrical diffraction transformation and equivalent mode decomposition. The method can effectively resist attacks of aniteration recovery method. According to the method, a classical asymmetric optical encryption technology based on equivalent mode decomposition is simply improved; cylindrical diffraction is used forreplacing Fresnel diffraction or Fraunhofer diffraction, and a pure amplitude ciphertext and a pure phase private key are used for replacing two complex amplitude masks, so that the security of the encryption method can be greatly improved, and particularly, the attack of an iterative recovery method can be resisted.

Description

technical field [0001] The invention relates to the technical fields of information security and information optics, in particular to an optical image encryption method. Background technique [0002] The application of optical diffraction theory in image encryption is a hot topic in the field of optical information security research in recent years. In 2015, Cai Jianjun and other scholars proposed an asymmetric optical encryption method based on coherent superposition and equal modulus decomposition [J. J. Cai, X. J. Shen, M. Lei, C. Lin, and S. F. Dou. Asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition [J] . Opt.Lett., 2015, 40(4): 475-478.], this method is the successful application of optical diffraction theory in the field of information security, which has triggered a series of research by related scholars. However, because the system still has the risk of being attacked by the iterative recovery algorithm, the security of t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60
CPCG06F21/602G06F2221/2107
Inventor 王君吴超陈旭东
Owner SICHUAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products