Unlock instant, AI-driven research and patent intelligence for your innovation.

Asymmetric image encryption and authentication method based on cylindrical diffraction domain and phase truncation

An authentication method and asymmetric technology, applied in the field of asymmetric image encryption and authentication, can solve the problems of inconvenient transmission and storage, and achieve the effect of overcoming contour problems and information leakage problems, efficient image encryption and authentication effects

Active Publication Date: 2020-05-19
HUNAN UNIV OF SCI & TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, this method also has the problem of complex value output, which is inconvenient for transmission and storage
In addition, the method is also vulnerable to special attacks based on iterative phase recovery

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Asymmetric image encryption and authentication method based on cylindrical diffraction domain and phase truncation
  • Asymmetric image encryption and authentication method based on cylindrical diffraction domain and phase truncation
  • Asymmetric image encryption and authentication method based on cylindrical diffraction domain and phase truncation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0042] Please refer to figure 1 , the present invention provides an asymmetric image encryption and authentication method based on cylindrical diffraction domain and phase truncation, comprising the following steps:

[0043] S1: The plaintext image to be encrypted is modulated by a random phase mask and diffracted from the inner to the outer cylinder, and then undergoes sparse sampling to obtain a sparsely sampled spectrum.

[0044] Specifically, the input im...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an asymmetric image encryption and authentication method based on a cylindrical diffraction domain and phase truncation. The method comprises the steps of carrying out the modulation of a to-be-encrypted plaintext image through a random phase mask and the cylindrical diffraction from the inside to the outside, and obtaining a sparse sampling spectrum through sparse sampling;decomposing the sparse sampling spectrum into a phase decryption key and a real-value amplitude ciphertext by using a phase truncation reservation operation; reconstructing a sparse sampling spectrumin combination with the phase decryption key and the real value amplitude ciphertext; performing inverse cylindrical diffraction on the sparse sampling spectrum from outside to inside to obtain an inverse diffraction spectrum, and performing conjugate modulation of a random phase mask to obtain a decryption result; authenticating the decryption result and the input plaintext image by adopting non-linear correlation; if the decryption result is related to the plaintext image, determining that the non-linear correlation distribution has a unique high peak value; and if the decrypted image is not related to the input plaintext image, determining that the noise-like effect is presented in a non-linear correlation mode, and no high peak value exists. According to the method provided by the invention, the problems of contour and information leakage under a sparse sampling high proportion can be solved.

Description

【Technical field】 [0001] The invention relates to the technical field of multimedia information security, in particular to an asymmetric image encryption and authentication method based on cylindrical diffraction domain and phase truncation. 【Background technique】 [0002] Since the classic Double Random-Phase Encoding (Double Random-Phase Encoding, DRPE) was proposed by Refregier and Javidi in 1995, the theory of Fourier optics has been widely studied and deeply applied in the field of information security. There are many extended encoding techniques to enhance its security by fusing double random phase encoding with Fresnel transform, fractional random transform, etc. Due to the inherent symmetry and linearity of DRPE, DRPE and its extended encoding technology cannot resist traditional attacks, such as known plaintext attack, chosen plaintext attack and chosen key attack. [0003] In the related art, in order to overcome the symmetry and linearity, an asymmetric image enc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04N1/32
CPCH04N1/32272
Inventor 丁湘陵黄艳明
Owner HUNAN UNIV OF SCI & TECH