Three-dimensional image encryption method and device
A technology of stereoscopic image and encryption method, applied in image communication, secure communication device, key distribution, and can solve the problem of weak anti-attack strength
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0041] See figure 2 , figure 2 A schematic flow chart of the method for encrypting stereoscopic images provided by the embodiment of the present application is shown. The method includes:
[0042] Step S100: Obtain a first-view image matrix and a second-view image matrix of the stereoscopic image. The first-view image matrix and the second-view image matrix are image matrices under different viewing angles of the stereoscopic image.
[0043] Among them, the first perspective map matrix refers to the perspective map matrix that can be obtained from observing the stereoscopic image from a perspective, and the second perspective map matrix refers to the perspective map obtained from observing the stereoscopic image from a perspective different from the first perspective map matrix. matrix.
[0044] Optionally, the first perspective view here may be a perspective view obtained by observing the stereoscopic image from the left front perspective of the stereoscopic image, and t...
Embodiment approach
[0128] For ease of understanding, another implementation of the stereoscopic image encryption method provided by the embodiment of the present application is introduced below, and another implementation manner of the stereoscopic image encryption method provided by the embodiment of the present application is specifically described as follows:
[0129] See Figure 7 , Figure 7 A schematic flowchart of another implementation manner of the stereoscopic image encryption method provided by the embodiment of the present application is shown. Another implementation of the stereoscopic image encryption method provided in the embodiment of the present application is to propose a two-view stereoscopic image encryption method and system based on chaotic sequences, multi-resolution singular values, and equimodulus decomposition.
[0130] (1) Suppose the image f 1 (x,y), f 2 (x, y) are the first-view matrix and the second-view matrix of the stereoscopic image, both of which are N×M in...
no. 2 example
[0175] See Figure 8 , Figure 8 A schematic structural diagram of the stereoscopic image encryption device provided by the embodiment of the present application is shown. An embodiment of the present application provides a stereoscopic image encryption device 100, the stereoscopic image encryption device 100 includes:
[0176] The viewing angle image matrix obtaining module 110 is configured to obtain a first viewing angle image matrix and a second viewing angle image matrix of the stereoscopic image, where the first viewing angle image matrix and the second viewing angle image matrix are image matrices under different viewing angles of the stereoscopic image.
[0177] The first complex matrix obtaining module 120 is configured to obtain the first complex matrix according to the first view matrix and the second view matrix.
[0178] The mapping matrix obtaining module 130 is configured to perform a first preset operation according to a plurality of randomly generated first ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


