Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Three-dimensional image encryption method and system based on computer-generated hologram

A technology for computing holograms and three-dimensional images, which is applied in computer security devices, computing, image enhancement, etc., and can solve problems such as difficulty in recovering original images, low confidentiality, and oversimplification

Inactive Publication Date: 2020-10-13
汪金玲
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among them, the function of image scrambling is to scramble the positions or colors of pixels in the image, and transform the original image into a messy new image. If you do not know the scrambling transformation used, it is difficult to restore the original image. Based on Generally speaking, the image encryption technology of scrambling technology can be equivalent to performing a finite-step elementary transformation on the image matrix, thereby disrupting the arrangement of pixels, but the elementary transformation is a one-dimensional linear transformation, and its confidentiality is not high.
Scaling of pixel RGB values ​​Each pixel has its own color value. The image encryption technology based on the color saturation confusion algorithm scales the image color value by a certain multiple and overwrites its original value, resulting in a different image from the original image. The image plays the role of encryption. The encryption effect of this encryption method will be better with the increase of the multiple, but because it is too simple, it is easy to be decrypted

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Three-dimensional image encryption method and system based on computer-generated hologram
  • Three-dimensional image encryption method and system based on computer-generated hologram
  • Three-dimensional image encryption method and system based on computer-generated hologram

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0138] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0139] The three-dimensional object is encoded by tomography and plane angle spectroscopy to generate a computational hologram, and then the computational hologram is encoded into three phase plates through phase plate iteration to realize the encryption of the three-dimensional object image. refer to figure 1 As shown, it is a schematic diagram of a computational hologram-based three-dimensional image encryption method provided by an embodiment of the present invention.

[0140] In this embodiment, the three-dimensional image encryption method based on computational hologram includes:

[0141] S1. Obtain the three-dimensional image to be encrypted, and layer the three-dimensional image by tomography to obtain a cross-section of each layer.

[0142] Firstly, the present invention obtains the three-dimensional image ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of three-dimensional image encryption, and discloses a three-dimensional image encryption method based on a computer-generated hologram, which comprises the following steps of acquiring a three-dimensional image to be encrypted, and layering the three-dimensional image by using a tomography method to obtain a cross section of each layer, detecting section edge points by using an edge distance algorithm based on an edge graph, connecting the edge points into candidate line segments based on a linear support area method, decomposing the cross sectioninto a plurality of plane waves with different spatial frequencies by using a plane angular spectrum method, calculating each layer of sub-hologram of the three-dimensional image based on angular spectrum diffraction, and superposing the sub-holograms corresponding to the layers to obtain a complete computer-generated hologram of the three-dimensional image, and encoding the computer-generated hologram into the three phase plates through phase plate iteration, so that the encryption of the three-dimensional object image is realized. The invention further provides a three-dimensional image encryption system based on the computer-generated hologram. Thus, encryption of the three-dimensional image is realized.

Description

technical field [0001] The present invention relates to the technical field of image encryption, in particular to a three-dimensional image encryption method and system based on a computational hologram. Background technique [0002] With the rapid development of modern network technology and communication technology, information exchange has become increasingly close. Image information is one of the important components of information transmission, and people are paying more and more attention to its security. The emergence of encryption technology ensures the security of information in communication and transmission, and how to improve the security and information capacity of encrypted information has become an important research topic in information encryption. [0003] At the same time, with the rapid development of computer technology, computational holography technology also emerges, which combines optical holography and computer technology, and realizes the functions ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06K9/62G06T7/13
CPCG06F21/602G06T7/13G06T2207/10012G06T2207/20056G06F18/22
Inventor 汪金玲
Owner 汪金玲
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products