Unlock instant, AI-driven research and patent intelligence for your innovation.

Stereoscopic image encryption method and device

A technology of stereoscopic image and encryption method, which is applied in image communication, secure communication device, and key distribution, and can solve problems such as weak resistance to attack

Active Publication Date: 2020-02-07
上海晶橘数码科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of this, the present application provides a stereoscopic image encryption method and device, which are used to improve the problem that the anti-attack strength of the image encryption method in the prior art is very weak
Using the steps of this method enhances the randomness and security of the ciphertext by using random multi-resolution singular value decomposition, and avoids the concentration of the phase information after the stereo image is encrypted by using the equimodulus decomposition, thereby effectively improving the The problem that the anti-attack strength of the image encryption method in the prior art is very weak

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Stereoscopic image encryption method and device
  • Stereoscopic image encryption method and device
  • Stereoscopic image encryption method and device

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0041] See figure 2 , figure 2 A schematic flow chart of the method for encrypting stereoscopic images provided by the embodiment of the present application is shown. The method includes:

[0042] Step S100: Obtain a first-view image matrix and a second-view image matrix of the stereoscopic image. The first-view image matrix and the second-view image matrix are image matrices under different viewing angles of the stereoscopic image.

[0043] Among them, the first perspective map matrix refers to the perspective map matrix that can be obtained from observing the stereoscopic image from a perspective, and the second perspective map matrix refers to the perspective map obtained from observing the stereoscopic image from a perspective different from the first perspective map matrix. matrix.

[0044] Optionally, the first perspective view here may be a perspective view obtained by observing the stereoscopic image from the left front perspective of the stereoscopic image, and t...

Embodiment approach

[0128] For ease of understanding, another implementation of the stereoscopic image encryption method provided by the embodiment of the present application is introduced below, and another implementation manner of the stereoscopic image encryption method provided by the embodiment of the present application is specifically described as follows:

[0129] See Figure 7 , Figure 7 A schematic flowchart of another implementation manner of the stereoscopic image encryption method provided by the embodiment of the present application is shown. Another implementation of the stereoscopic image encryption method provided in the embodiment of the present application is to propose a two-view stereoscopic image encryption method and system based on chaotic sequences, multi-resolution singular values, and equimodulus decomposition.

[0130] (1) Suppose the image f 1 (x,y), f 2 (x, y) are the first-view matrix and the second-view matrix of the stereoscopic image, both of which are N×M in...

no. 2 example

[0175] See Figure 8 , Figure 8 A schematic structural diagram of the stereoscopic image encryption device provided by the embodiment of the present application is shown. An embodiment of the present application provides a stereoscopic image encryption device 100, the stereoscopic image encryption device 100 includes:

[0176] The viewing angle image matrix obtaining module 110 is configured to obtain a first viewing angle image matrix and a second viewing angle image matrix of the stereoscopic image, where the first viewing angle image matrix and the second viewing angle image matrix are image matrices under different viewing angles of the stereoscopic image.

[0177] The first complex matrix obtaining module 120 is configured to obtain the first complex matrix according to the first view matrix and the second view matrix.

[0178] The mapping matrix obtaining module 130 is configured to perform a first preset operation according to a plurality of randomly generated first ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a three-dimensional image encryption method and a three-dimensional image encryption device, which are used for improving the problem of weak anti-attack strength of an image encryption method in the prior art. The method comprises the steps of obtaining a first view angle image matrix and a second view angle image matrix of a three-dimensional image, wherein the first viewangle image matrix and the second view angle image matrix are image matrixes of the three-dimensional image under different view angles; obtaining a first complex matrix according to the first view matrix and the second view matrix; performing a first preset operation according to a plurality of randomly generated first keys to obtain a first mapping matrix and a second mapping matrix, the plurality of first keys being first preset lengths,with the first preset operation comprising an interception operation and a merging operation; performing a second preset operation on the first complex matrix, the first mapping matrix and the second mapping matrix to obtain a second complex matrix, the second preset operation comprising singular value decomposition; And performing decomposition operation on the second complex matrix according to a preset formula to obtain the encrypted ciphertext of the three-dimensional image and the secret key of the ciphertext.

Description

technical field [0001] The present application relates to the technical field of image encryption, and relates to a stereoscopic image encryption method and device. Background technique [0002] The common image encryption method in the industry at present, such as double random phase encoding, its basic principle is: phase modulation is performed on the input plane and the Fourier spectrum plane respectively, and encoded by two Fourier transforms, and the phase modulation is performed on the output plane The generalized stationary white noise image whose statistical properties are invariant with time translation is obtained on the above, but the anti-attack strength of this image encryption method is very weak. Contents of the invention [0003] In view of this, the present application provides a stereoscopic image encryption method and device, which are used to improve the problem that the anti-attack strength of the image encryption method in the prior art is very weak....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04N1/44H04L9/00H04L9/08
Inventor 邵珠宏尚媛园丁辉赵晓旭刘铁王云飞
Owner 上海晶橘数码科技有限公司