Image compression encryption method and cloud auxiliary decryption method based on compressed sensing and optical transformation

An optical transformation and image compression technology, applied in the field of cloud-assisted decryption, which can solve the problems of limited algorithm security, low quality of compressed sensing reconstruction, and poor security.

Active Publication Date: 2020-12-25
HENAN UNIVERSITY
View PDF12 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to solve the problems of limited algorithm security and low quality of compressed sensing reconstruction in the existing compressed sensing-based image compression encryption algorithm, as well as the poor security and low efficiency of encryption on the cloud, the present invention provides a method based on Image Encryption and Cloud-Assisted Decryption Methods for Compressed Sensing and Optical Transformation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image compression encryption method and cloud auxiliary decryption method based on compressed sensing and optical transformation
  • Image compression encryption method and cloud auxiliary decryption method based on compressed sensing and optical transformation
  • Image compression encryption method and cloud auxiliary decryption method based on compressed sensing and optical transformation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0095] Such as figure 1As shown, the embodiment of the present invention provides an image compression encryption method based on compressed sensing and optical transformation, comprising the following steps:

[0096] S101: The hash key and the initial key generated according to the plaintext image P use the LTS system and the 2D-LASM system to generate a chaotic sequence, wherein the LTS system is used to generate a chaotic sequence U 1 and K 1 , the 2D-LASM system is used to generate the chaotic sequence X 1 , Y 1 ,Z 1 and W 1 ; The size of the plaintext image P is M×M;

[0097] Specifically, the LTS system refers to the Logistic-tent system, which has good chaotic cryptographic properties, which is a nonlinear combination of the Logistic map and the tent map, and is considered as a seed map. The LTS system is defined by equation (1):

[0098]

[0099] where μ is a control parameter in the range (0,4], and the state value z n ∈[0,1]. The output sequence of LTS fo...

Embodiment 2

[0111] Such as figure 2 As shown, the embodiment of the present invention provides another image compression encryption method based on compressed sensing and optical transformation, including the following steps:

[0112] S201: Generate the initial value x of the LTS system and the 2D-LASM system according to the hash key and the initial key generated by the plaintext image P according to formula (3) 0 、y 0 ,z 0 、w 0 , u 0 and k 0 :

[0113]

[0114] Among them, t 1 , t 2 , t 3 and t 4 Indicates the given initial key; k i Indicates the hash key, i=1,2,...,32; Indicates bitwise XOR operation; | indicates bitwise OR operation; & indicates bitwise AND operation; for example: Indicates the bitwise exclusive OR operation of x and y, x|y indicates the bitwise OR operation of x and y, and x&y indicates the bitwise AND operation of x and y.

[0115] Specifically, the SHA-256 function is used to generate a 256-bit hash key for the M×M plaintext image P, and then t...

Embodiment 3

[0159] Corresponding to the above encryption methods, such as image 3 As shown, the embodiment of the present invention also provides a cloud-assisted decryption method based on compressed sensing and optical transformation, including the following steps:

[0160] S301: Using the chaotic sequence X on the cloud platform 1 , Y 1 ,Z 1 and W 1 Perform inverse diffusion on the ciphertext image to obtain the matrix LL 4 and H 4 ;

[0161] S302: Using the chaotic sequence Z on the cloud platform 1 pair matrix LL 4 and H 4 Perform inverse random pixel exchange to obtain matrix LL 3 and H 3 ;

[0162] S303: On the cloud platform, the matrix LL 3 and H 3 Perform inverse quantization to obtain the matrix LL 2 and H 2 ;

[0163] S304: On the cloud platform, the matrix LL 2 and H 2 Combined into a complex field matrix LLH 2 , using according to the chaotic sequence X 1 , Y 1 ,Z 1 and W 1 The resulting two random phase mask matrices pair the complex field matrix LLH ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an image compression encryption method and a cloud auxiliary decryption method based on compressed sensing and optical transformation. The encryption method comprises the following steps: generating a chaotic sequence by respectively utilizing an LTS system and a 2D-LASM system according to a hash key and an initial key generated by a plaintext image P; dividing the plaintext image P into an approximate component LL and three detail components HL, LH and HH by using discrete wavelet transform; performing lossless encryption on the approximate component LL by using a chaotic sequence X1, and performing lossy encryption on the detail components HL, LH and HH by using chaotic sequences U1 and K1; combining the encrypted matrixes LL1 and H1 into a complex domain matrix LLH1, and performing double random phase encoding on the complex domain matrix LLH1 by using two random phase mask matrixes to obtain matrixes LL2 and H2; quantifying the matrix LL2 and the matrix H2;carrying out the random pixel scrambling on the quantized matrix by using a chaotic sequence Z1; recombining the scrambled matrixes to generate a sequence B, and diffusing the sequence B to obtain a ciphertext image C.

Description

technical field [0001] The invention relates to the technical field of image encryption, in particular to an image compression encryption method and a cloud-assisted decryption method based on compressed sensing and optical transformation. Background technique [0002] At present, with the rapid development of the Internet and information processing technology, more and more video and image information is transmitted and stored on the network. The development of these technologies makes it easy for people to obtain information or transmit the information they need through the network, which greatly facilitates people's life. However, the Internet is an open and shared platform. There may be many security risks in the transmission and storage of multimedia information through the Internet, especially in many fields such as military, medical and commercial. Image security is one of the most critical issues, and image encryption It is an effective way to protect images. At th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L29/06H04L9/06
CPCH04L9/001H04L9/0643H04L63/0428H04L63/1441
Inventor 柴秀丽付江豫田野王音景甘志华路杨
Owner HENAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products