Multi-image encryption and decryption method based on Walsh transform and ghost imaging calculation

A multi-image, ghost imaging technology, applied in the field of information security, can solve the problems of large measurement times and data, limitations, etc., to achieve the effect of increasing security, high security, and simple process

Active Publication Date: 2021-06-18
ZHEJIANG UNIVERSITY OF SCIENCE AND TECHNOLOGY
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Because these methods need to store and transmit a large number of random phases, the number of measurements and data are very large, so their practical application is still very limited

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-image encryption and decryption method based on Walsh transform and ghost imaging calculation
  • Multi-image encryption and decryption method based on Walsh transform and ghost imaging calculation
  • Multi-image encryption and decryption method based on Walsh transform and ghost imaging calculation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0044] Embodiment: multi-image encryption and decryption methods based on Walsh transform and computational ghost imaging, including as figure 1 Encryption steps shown:

[0045] S1, to many images f i (i=1,2,3...N) (ie figure 1 Target images) to perform Walsh-Hadamard transform to obtain the compressed sparse image g i ( figure 1 Compress images in), ie g i (x 0 ,y 0 ) = WHT[f i (m,n)], where WHT[] represents the Walsh-Hadamard transform, extracting all sparse images g i The pixels in the energy concentrated part of the middle form the pixel set Pix(x, y), and the pixel set is reorganized according to the index sequence of the back shape to obtain the reorganized image B(x, y)( figure 1 in Reassembledimage); namely B(x, y)=RA{Pix(x, y)}, wherein RA{} represents the extraction operation of the back font, that is, scans and extracts the pixels in the matrix sequence according to the back font;

[0046] S2. After performing the sign-taking operation on the restructured i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a multi-image encryption and decryption method based on Walsh transform and ghost imaging calculation, and the method comprises the steps: encryption: carrying out Walsh-Hadamard compression transform on a plurality of plaintext images, selecting some effective pixels to carry out Arnold scrambling transform, and then loading the light intensity of an object plane to a calculation ghost imaging light path in sequence, and encrypting a target image into a ciphertext sequence; and 2, decryption: in the decryption process, sucessfully decrypting a corresponding plaintext image from a correct key set through measurement key recovery, compression algorithm reconstruction, inverse Arnold transformation and inverse Walsh-Hadamard transformation. The image encryption method provided by the invention has the advantages of simple encryption operation, high decryption efficiency and high security.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a multi-image encryption and decryption method based on Walsh transformation and computational ghost imaging. Background technique [0002] In recent years, the development of information technology has brought great convenience to people, but at the same time, information security has also brought us severe challenges. Some optical methods for information security, such as optical image encryption, image hiding, and identity verification, etc., have received more and more attention. Among them, the optical double random phase encoding technology based on 4f system is widely used. However, the double random phase encoding technology needs to record the amplitude and phase of the information at the same time during the encryption process, so the encryption efficiency and decryption efficiency are not high. [0003] Ghost imaging is a novel imaging technique based on...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60
CPCG06F21/602G06F2221/2107
Inventor 汪小刚朱昂昂
Owner ZHEJIANG UNIVERSITY OF SCIENCE AND TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products