Unlock instant, AI-driven research and patent intelligence for your innovation.

A Double Image Encryption Method Based on Interference and Logical Mapping

A technology of logical mapping and encryption method, which is applied in the field of dual image encryption based on interference and logical mapping, can solve the problem of non-linear low-plaintext images in image encryption, and achieve the goal of increasing nonlinearity, expanding key space, and improving security Effect

Active Publication Date: 2022-01-21
厦门强云网络科技有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a dual-image encryption method based on interference and logical mapping, which solves the problem of low nonlinear image encryption and the outline of the plaintext image in the interference method existing in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Double Image Encryption Method Based on Interference and Logical Mapping
  • A Double Image Encryption Method Based on Interference and Logical Mapping
  • A Double Image Encryption Method Based on Interference and Logical Mapping

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0158] Embodiment 1, using a random phase mask instead of the master key exp(jM 1 ’(x,y)), the decryption result is as follows Figure 7(a)-Figure 7(b) shown.

Embodiment 2

[0159] Embodiment 2, using a random phase mask instead of the master key exp(jM 2 (x,y)), the decryption result is as Figure 8(a)-Figure 8(b) shown.

[0160] From Figure 7(a)-Figure 7(b) and Figure 8(a)-Figure 8(b) No information about the plaintext image can be seen.

[0161] Other key security tests:

[0162] (1) Using the wrong wavelength

Embodiment 3

[0163] Embodiment 3, when the wavelength λ increases by 10nm, the decryption result is as follows Figure 9(a)-Figure 9(b) As shown, the correlation coefficients are 0.0833 and 0.0864, ​​respectively.

[0164] (2) Using the wrong axial distance

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A dual-image encryption method based on interference and logical mapping, image O 1 (μ,υ) and image O 2 (μ,υ) spliced ​​into image O e (μ,υ), generate sequence S based on logical mapping 1 , sequence S 2 , sequence S 3 , with the sequence S 1 to image O e (μ,υ) is scrambled to get the image O e ′(μ,υ), the image O e ′(μ,υ) decomposes into image O 1 ′(μ,υ) and image O 2 ′(μ,υ), calculate the image O 1 The pure phase mask exp(jM in ′(μ,υ) 1 (x,y)) and pure phase mask exp(jM 2 (x,y)), using the sequence S 2 For a pure phase mask exp(jM 1 (x,y)) is scrambled to get the mask exp(jM 1 '(x,y)), using the sequence S 3 For a pure phase mask exp(jM 2 (x,y)) is scrambled to get the mask exp(jM 2 ′(x,y)), for image O 2 ′(μ, υ) performs inverse free-space wave propagation twice to obtain the ciphertext image V(ξ, η). It can increase the non-linearity of the encryption system and improve the security.

Description

technical field [0001] The invention belongs to the technical field of image encryption methods, and relates to a double image encryption method based on interference and logical mapping. Background technique [0002] Image is an important carrier of information, and its security during transmission is particularly important, so the research on image encryption is of great significance. [0003] In recent years, optical methods have been widely used in information security due to their advantages of parallel processing and high speed. The dual random phase encoding method proposed by Refregier Philippe and Javidi Bahram in 1995 can encrypt images into ciphertext with static white noise. Traditional dual random phase encoding methods are vulnerable to different types of attacks due to their inherent linearity. In recent years, it has been developed to Fresnel transform domain, fractional Fourier domain and gyrator transform domain. Yuan Lin et al. proposed a method for dua...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04N1/44
CPCH04N1/44
Inventor 隋连升赵小宇杜聪张笑
Owner 厦门强云网络科技有限公司