Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Computational ghost imaging image encryption method based on chaotic mapping and DNA coding

A technology of chaotic mapping and encryption method, which is applied to secure communication, image communication, and key distribution through chaotic signals, which can solve problems such as system security defects and large amount of key data, so as to increase the system key space and improve reconstruction quality, the effect of making up for the linearity vulnerability

Inactive Publication Date: 2022-01-14
SICHUAN UNIV
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since the system uses a large number of measured speckle matrices as encryption keys, the amount of key data that needs to be transmitted for decryption is very large; and the linearity between plaintext and ciphertext also brings potential threats to attackers. Attacks are convenient, and system security is flawed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computational ghost imaging image encryption method based on chaotic mapping and DNA coding
  • Computational ghost imaging image encryption method based on chaotic mapping and DNA coding
  • Computational ghost imaging image encryption method based on chaotic mapping and DNA coding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The present invention will be further described below in conjunction with the accompanying drawings, and a specific implementation example of the present invention will be described.

[0052] In this example, a binary image with a size of 64×64 is used as the original target image, such as image 3 As shown in (a), the encryption result is obtained through the computational ghost imaging image encryption system based on chaotic mapping and DNA coding, namely figure 2 {B' in i}.

[0053] The entire encryption process can be implemented as follows:

[0054] (1) Pass the target image through figure 1 The shown computational ghost imaging system is encrypted to obtain a series of decimal real numbers {B i}. Among them, the measured speckle of the computational ghost imaging encryption system is generated by the Logistics chaotic map, such as image 3 As shown in (b), the system parameters and initial values ​​of the Logistic chaotic map are 3.9999 and 0.3196, respect...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a computational ghost imaging image encryption method based on chaotic mapping and DNA coding, and belongs to the field of optical encryption. According to the method, the key quantity of a traditional calculation ghost imaging encryption system can be reduced, the key space is increased, the problem that the traditional calculation ghost imaging encryption system is prone to being attacked linearly is solved, and the security of the encryption system is improved. According to the main method, a random sequence generated by Logistic chaotic mapping is used for constructing a measurement speckle matrix of a ghost imaging system, and the chaotic sequence is determined by initial values and system parameters, so that the initial values and the system parameters play a role in encrypting a system key, the key quantity of the encryption system is greatly reduced, and the sensitivity of the chaotic sequence to an initial value and system parameters also increases the key space; and partitioning and DNA operation are carried out on a decimal real number measured value detected by a barrel detector, so that the inherent defect that a ghost imaging system is prone to being attacked in a linear mode is overcome, and the system safety is improved.

Description

technical field [0001] The invention belongs to the field of optical encryption. Background technique [0002] Since Klyshko proposed the ghost imaging scheme in 1988, ghost imaging has received more and more attention because of its remarkable physical properties. Since the measurement results of ghost imaging represent information that has nothing to do with the target image, it has been introduced into the field of optical information security very early. Compared with the traditional optical encryption method, ghost imaging does not encrypt the target image into a complex-valued matrix, but a simple intensity vector, which is very beneficial to the recording, storage and transmission of encrypted information, so this type of optical encryption technology has been obtained developed rapidly. [0003] figure 1 Schematic diagram of the encryption process of traditional computational ghost imaging. In this encryption system, the two-dimensional target image (plaintext) is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04N1/44H04L9/08H04L9/00
CPCH04N1/44H04L9/0869H04L9/0866H04L9/001H04L2209/08
Inventor 周昕杨忠卓余展
Owner SICHUAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products