CN102664727A - Virtual optical encryption method based on chaotic mapping - Google Patents

Virtual optical encryption method based on chaotic mapping Download PDF

Info

Publication number
CN102664727A
CN102664727A CN2012101057722A CN201210105772A CN102664727A CN 102664727 A CN102664727 A CN 102664727A CN 2012101057722 A CN2012101057722 A CN 2012101057722A CN 201210105772 A CN201210105772 A CN 201210105772A CN 102664727 A CN102664727 A CN 102664727A
Authority
CN
China
Prior art keywords
lambda
delta
exp
dfd
discrete
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012101057722A
Other languages
Chinese (zh)
Inventor
杨庚
徐宁
陈蕾
徐小龙
杨晓玲
朱薇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Post and Telecommunication University
Nanjing University of Posts and Telecommunications
Original Assignee
Nanjing Post and Telecommunication University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Post and Telecommunication University filed Critical Nanjing Post and Telecommunication University
Priority to CN2012101057722A priority Critical patent/CN102664727A/en
Publication of CN102664727A publication Critical patent/CN102664727A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Prostheses (AREA)

Abstract

The invention discloses a virtual optical encryption method based on chaotic mapping and belongs to the field of information security technology and non-mathematical encryption and decryption technology. Random templates of key parameters are generated through spatial-temporal chaotic mapping, system security is enhanced and an information encryption method based on a virtual optical system is formed. Aiming at the most important problem in a virtual optical encryption system, namely, generation of the random templates, the method is based on the spatial-temporal chaotic mapping and the random templates with fine statistical performance are generated. Combining the random templates with other key parameters in the virtual optical encryption system, an encrypted ciphertext is obtained by calculating discrete Fresnel transform of a plaintext and the random templates and discretion of complex amplitude transmittance function of a lens. A decrypted plaintext is obtained by calculating reverse Fresnel transform.

Description

A kind of virtual optics encryption method based on chaotic maps
Technical field
The present invention relates to a kind of virtual optics encryption method, belong to field of information security technology based on the space-time chaos mapping.
Background technology
Traditional cipher mechanism all is based on mathematical theory; And be to utilize optical imaging concept based on the virtual optics encryption mechanism of optical imaging system; Adopt the computer programing method to realize the optical encryption process; As key, realize the data encryption and the Information hiding of High Security Level with the geometric parameter of propagation law in the two-phonon process and structure.Because the particularity of optical imaging system; Light wave is a kind of information carrier of multidimensional; Have multiple attributes such as amplitude, phase place, wavelength, polarization, the adding of key element such as random mask in the virtual optics encryption system simultaneously makes its key space more broad; But and have the characteristic of parallel computation, for information encryption provides new means.But compare with encryption system based on mathematical theory; The Fundamentals of Mathematics of virtual optics encryption system lack systematic Study; Characteristic and generation, key management, enciphering and deciphering algorithm like safety analysis, key space are analyzed or the like, and the foundation of these Fundamentals of Mathematics will make the real trend of virtual optics encryption system improve and use.
Summary of the invention
Technical problem to be solved by this invention is the generation problem according to random mask key in the virtual optics encryption system, makes up the random mask that statistical nature is good, forms key space and encryption method in the virtual optics encryption system.
The present invention adopts following technical scheme for solving the problems of the technologies described above:
A kind of virtual optics encryption method based on chaotic maps specifically may further comprise the steps:
Random mask (U in step 1, the generation key parameter m) as one of encryption key parameters, specific as follows:
To selected parameter (init, w, α), produce a two dimension, size is equal to the space-time chaos sequence U of information plane to be encrypted m:
x 0 i = f Logistic ( init , w ) x n + 1 i = ( 1 - ϵ ) f Tent ( x n i , α ) + ϵ 2 [ f Tent ( x n i - 1 , α ) + f Tent ( x n i + 1 , α ) ]
Wherein, f LogisticExpression Logistic chaotic maps is used to produce the system drive sequence, i.e. the initial value of 0 each grid of the moment; Init, w are respectively initial value and the Control Parameter that chaos drives the Logistic mapping; f TentExpression tent chaotic maps is system's local state EVOLUTION EQUATION; Represent i grid at n state constantly, i=1,2 ..., M, M are the line number of information plane matrix to be encrypted, n=1, and 2 ..., N, N are information plane matrix column number to be encrypted; α is the Control Parameter of tent mapping;
Logistic chaotic maps function is: x N+1=wx n(1-x n), x n∈ [0,1], w ∈ [0,4].
Step 2, calculating discrete fresnel transform expressly:
By key parameter (d 0, λ) calculate information plane U 0Discrete fresnel transform DFD [U to the lens front surface 0(k, l), λ, d 0]:
U 1 ( m , n ) = DFD [ U 0 ( k , l ) , λ , d 0 ]
= 1 jλ d 0 exp ( j 2 π d 0 λ ) exp [ j π λ d 0 ( m 2 Δϵ 2 + n 2 Δη 2 ) ] ×
Σ k = 0 N - 1 Σ l = 0 N - 1 U 0 ( k , l ) exp [ j π λ d 0 ( k 2 Δx 2 + l 2 Δy 2 ) ] × exp [ - j 2 π ( mk N + nl N ) ]
Wherein, j is a plural number, and Δ ε, Δ η are respectively the sampling step length of lens front surface complex amplitude on x direction and y direction; Δ x, Δ y are respectively the sampling step length of lens information plane complex amplitude on x direction and y direction; D0 is the distance of information plane to the imaging len front surface, and λ is a wavelength, step-length subscript k, and l, m, n=0,1 ..., N-1;
By key parameter (λ f), adopts same discrete processes method that the complex amplitude transmittance function t of lens is carried out discrete calculation, obtains its discrete form:
t ( m , n , λ , f ) = Exp [ -j π λ f ( m 2 Δ ϵ 2 + n 2 Δ η 2 ) ] , Wherein f is the focal length of lens.
Step 3: calculate random mask (U m) discrete fresnel transform:
(d λ) calculates two-dimensional random template (U by key parameter m) to the discrete fresnel transform DFD [U of lens front surface m, λ, d]:
U 2 ( m , n ) = DFD [ U m ( k , l ) , λ , d ]
= 1 jλ d exp ( j 2 π d λ ) exp [ j π λ d ( m 2 Δϵ 2 + n 2 Δη 2 ) ] ×
Σ k = 0 N - 1 Σ l = 0 N - 1 U m ( k , l ) exp [ j π λ d ( k 2 Δx 2 + l 2 Δy 2 ) ] × exp [ - j 2 π ( mk N + nl N ) ]
Wherein, d represents two-dimension time-space chaos sequence U mTo the distance of lens front surface, j is a plural number.
Step 4: calculate ciphertext U c:
According to discrete fresnel transform and random mask (U expressly m) discrete fresnel transform, and the discrete transform of complex amplitude transmittance function t calculates ciphertext U c:
U c={DFD[U 0(k,l),λ,d 0]+DFD[U m(k,l),λ,d]}×t(m,n,λ,f)。
Step 5: calculate expressly U 0:
Decrypting process is the inverse operation process of above-mentioned ciphering process, that is:
DFD[U 0(k,l),λ,d 0]=U c/t(m,n,λ,f)-DFD[U m(k,l),λ,d];
U 0=IDFD[U 0(k,l),λ,d 0]。
The present invention adopts above technical scheme compared with prior art, has following technique effect:
But the present invention designs the random mask generation method in a kind of applying virtual optical encryption system; Shine upon based on space-time chaos; Generate the good key parameter of statistic property, thereby constituted the higher virtual optics encryption system of fail safe, can be applied to the encryption of information.Be characterized in that the random mask statistic property that generates is good, the virtual encryption system of formation is safe, is easy to realize.
Description of drawings
Fig. 1 is the sketch map of virtual optics encryption system.
Fig. 2 is based on the sketch map of the virtual optics encryption system of space-time chaos mapping.
Fig. 3 is the realization calculation process of method.
Fig. 4 is the plaintext two-dimension code in the embodiment.
Fig. 5 is the random mask that generates in the embodiment.
Fig. 6 is the encryption ciphertext that generates in the embodiment.
Fig. 7 is the plaintext that reduces in the embodiment.
Embodiment
Below in conjunction with accompanying drawing technical scheme of the present invention is done further detailed description:
As shown in Figure 1, be a virtual optics encryption system, wherein information plane U 0Be expressly, be the ciphertext U after encrypting as the plane c, λ is a wavelength, f is the focal length of lens, d 0Be the distance of information plane to the imaging len front surface, d iBe the distance that the picture plane is arrived on the surface behind the lens, d d 1+ d 2, d 1Be the distance of random mask to optical splitter, d 2Be the distance of lens to optical splitter, d represents the distance of two-dimension time-space chaos sequence to the lens front surface; Key is Θ=(U m, d 0, d, λ, f), U wherein mBe random mask, will generate by following method.
To selected parameter (init, w, α), produce a two dimension, size is equal to the space-time chaos sequence U of information plane to be encrypted m:
x 0 i = f Logistic ( init , w ) x n + 1 i = ( 1 - ϵ ) f Tent ( x n i , α ) + ϵ 2 [ f Tent ( x n i - 1 , α ) + f Tent ( x n i + 1 , α ) ] ;
Wherein, f LogisticExpression Logistic chaotic maps is used to produce the system drive sequence, i.e. the initial value of 0 each grid of the moment; Init, w are respectively initial value and the Control Parameter that chaos drives the Logistic mapping; f TentExpression tent chaotic maps is system's local state EVOLUTION EQUATION;
Figure BDA0000152084960000032
Represent i grid at n state constantly, i=1,2 ..., M, M are the line number of information plane matrix to be encrypted, n=1, and 2 ..., N, N are information plane matrix column number to be encrypted; α is the Control Parameter of tent mapping;
Wherein, Logistic chaotic maps function is: x N+1=wx n(1-x n), x n∈ [0,1], w ∈ [0,4].
As shown in Figure 2, adopt the space-time chaos system to produce two space-time chaos sequences, and as random mask.
As shown in Figure 3; The cleartext information of selecting for use to be encrypted is the two-dimension code (hits N=256) of 256 * 256 * 1bit; Chaos drives the initial value init=0.5706 of Logistic mapping, Control Parameter w=4, tent mapping parameters α=0.001; The two-dimension time-space chaos sequence to the lens front surface apart from d=0.01m, information plane to the lens front surface apart from d 0=0.1m, wavelength 2=623 * 10 -9M, focal length of lens f=0.025m.Expressly as shown in Figure 4.
According to above parameter, generate random mask, as shown in Figure 5.
Calculate discrete fresnel transform expressly: by key parameter (d 0, λ) calculate information plane U 0Discrete fresnel transform DFD [U to the lens front surface 0(k, l), λ, d 0]:
U 1 ( m , n ) = DFD [ U 0 ( k , l ) , λ , d 0 ]
= 1 jλ d 0 exp ( j 2 π d 0 λ ) exp [ j π λ d 0 ( m 2 Δϵ 2 + n 2 Δη 2 ) ] ×
Σ k = 0 N - 1 Σ l = 0 N - 1 U 0 ( k , l ) exp [ j π λ d 0 ( k 2 Δx 2 + l 2 Δy 2 ) ] × exp [ - j 2 π ( mk N + nl N ) ]
Wherein, j is a plural number, and Δ ε, Δ η are respectively the sampling step length of lens front surface complex amplitude on x direction and y direction; Δ x, Δ y are respectively the sampling step length of lens information plane complex amplitude on x direction and y direction; d 0Be the distance of information plane to the imaging len front surface, λ is a wavelength, step-length subscript k, and l, m, n=0,1 ..., N-1.
By key parameter (λ f), adopts same discrete processes method that the complex amplitude transmittance function t of lens is carried out discrete calculation, obtains its discrete form:
t ( m , n , λ , f ) = Exp [ -j π λ f ( m 2 Δ ϵ 2 + n 2 Δ η 2 ) ] , Wherein f is the focal length of lens.
Calculate random mask (U m) discrete fresnel transform: (d λ) calculates two-dimensional random template (U by key parameter m) to the discrete fresnel transform DFD [U of lens front surface m, λ, d]:
U 2 ( m , n ) = DFD [ U m ( k , l ) , λ , d ]
= 1 jλ d exp ( j 2 π d λ ) exp [ j π λ d ( m 2 Δϵ 2 + n 2 Δη 2 ) ] ×
Σ k = 0 N - 1 Σ l = 0 N - 1 U m ( k , l ) exp [ j π λ d ( k 2 Δx 2 + l 2 Δy 2 ) ] × exp [ - j 2 π ( mk N + nl N ) ]
Wherein, d represents two-dimension time-space chaos sequence U mTo the distance of lens front surface, j is a plural number.
According to formula U c={ DFD [U 0(k, l), λ, d 0]+DFD [U m(k, l), λ, d] } * (λ f) calculates ciphertext to t, and is as shown in Figure 6 for m, n.
According to formula DFD [U 0(k, l), λ, d 0]=U c/ t (m, n, λ, f)-DFD [U m(k, l), λ, d] calculate expressly, obtain original image information, as shown in Figure 7.
The content that does not specify among the present invention and explain is the known method in this area, and those of ordinary skills' content disclosed according to the present invention can realize fully.

Claims (1)

1. virtual optics encryption method based on chaotic maps is characterized in that this method may further comprise the steps:
Random mask (U in step 1, the generation key parameter m) as one of encryption key parameters, specific as follows:
To selected parameter (init, w, α), produce a two dimension, size is equal to the space-time chaos sequence U of information plane to be encrypted m:
x 0 i = f Logistic ( init , w ) x n + 1 i = ( 1 - ϵ ) f Tent ( x n i , α ) + ϵ 2 [ f Tent ( x n i - 1 , α ) + f Tent ( x n i + 1 , α ) ]
Wherein, f LogisticExpression Logistic chaotic maps is used to produce the system drive sequence, i.e. the initial value of 0 each grid of the moment; Init, w are respectively initial value and the Control Parameter that chaos drives the Logistic mapping; f TentExpression tent chaotic maps is system's local state EVOLUTION EQUATION;
Figure FDA0000152084950000012
Represent i grid at n state constantly, i=1,2 ..., M, M are the line number of information plane matrix to be encrypted, n=1, and 2 ..., N, N are information plane matrix column number to be encrypted; α is the Control Parameter of tent mapping;
Logistic chaotic maps function is: x N+1=wx n(1-x n), x n∈ [0,1], w ∈ [0,4];
Step 2, calculating discrete fresnel transform expressly:
By key parameter (d 0, λ) calculate information plane U 0Discrete fresnel transform DFD [U to the lens front surface 0(k, l), λ, d 0]:
U 1 ( m , n ) = DFD [ U 0 ( k , l ) , λ , d 0 ]
= 1 jλ d 0 exp ( j 2 π d 0 λ ) exp [ j π λ d 0 ( m 2 Δϵ 2 + n 2 Δη 2 ) ] ×
Σ k = 0 N - 1 Σ l = 0 N - 1 U 0 ( k , l ) exp [ j π λ d 0 ( k 2 Δx 2 + l 2 Δy 2 ) ] × exp [ - j 2 π ( mk N + nl N ) ]
Wherein, j is a plural number, and Δ ε, Δ η are respectively the sampling step length of lens front surface complex amplitude on x direction and y direction; Δ x, Δ y are respectively the sampling step length of lens information plane complex amplitude on x direction and y direction; d 0Be the distance of information plane to the imaging len front surface, λ is a wavelength, step-length subscript k, and l, m, n=0,1 ..., N-1;
By key parameter (λ f), adopts same discrete processes method that the complex amplitude transmittance function t of lens is carried out discrete calculation, obtains its discrete form:
t ( m , n , λ , f ) = Exp [ -j π λ f ( m 2 Δ ϵ 2 + n 2 Δ η 2 ) ] , Wherein f is the focal length of lens;
Step 3: calculate random mask (U m) discrete fresnel transform:
(d λ) calculates two-dimensional random template (U by key parameter m) to the discrete fresnel transform DFD [U of lens front surface m, λ, d]:
U 2 ( m , n ) = DFD [ U m ( k , l ) , λ , d ]
= 1 jλ d exp ( j 2 π d λ ) exp [ j π λ d ( m 2 Δϵ 2 + n 2 Δη 2 ) ] ×
Σ k = 0 N - 1 Σ l = 0 N - 1 U m ( k , l ) exp [ j π λ d ( k 2 Δx 2 + l 2 Δy 2 ) ] × exp [ - j 2 π ( mk N + nl N ) ]
Wherein, d represents two-dimension time-space chaos sequence U mTo the distance of lens front surface, j is a plural number;
Step 4: calculate ciphertext U c:
According to discrete fresnel transform and random mask (U expressly m) discrete fresnel transform, and the discrete transform of complex amplitude transmittance function t calculates ciphertext U c:
U c={DFD[U 0(k,l),λ,d 0]+DFD[U m(k,l),λ,d]}×t(m,n,λ,f);
Step 5: calculate expressly U 0:
Decrypting process is the inverse operation process of above-mentioned ciphering process, that is:
DFD[U 0(k,l),λ,d 0]=U c/t(m,n,λ,f)-DFD[U m(k,l),λ,d];
U 0=IDFD[U 0(k,l),λ,d 0]。
CN2012101057722A 2012-04-11 2012-04-11 Virtual optical encryption method based on chaotic mapping Pending CN102664727A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012101057722A CN102664727A (en) 2012-04-11 2012-04-11 Virtual optical encryption method based on chaotic mapping

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012101057722A CN102664727A (en) 2012-04-11 2012-04-11 Virtual optical encryption method based on chaotic mapping

Publications (1)

Publication Number Publication Date
CN102664727A true CN102664727A (en) 2012-09-12

Family

ID=46774148

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012101057722A Pending CN102664727A (en) 2012-04-11 2012-04-11 Virtual optical encryption method based on chaotic mapping

Country Status (1)

Country Link
CN (1) CN102664727A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103049779A (en) * 2012-12-31 2013-04-17 郑莹娜 Method for generating and recognizing food safety liability insurance electronic policy two-dimensional code voucher
CN103414549A (en) * 2013-07-16 2013-11-27 广东工业大学 QR two-dimensional code binary image partition-based key varying chaotic encryption method
CN103973427A (en) * 2013-08-27 2014-08-06 哈尔滨理工大学 Encryption method of chaotic parallel data based on virtual computing and data optimization
CN106408498A (en) * 2016-09-10 2017-02-15 天津大学 Two-dimensional hyper-chaotic combining Fresnel transformation single lens optical image encrypting method
CN109413297A (en) * 2018-09-07 2019-03-01 西安理工大学 Turn round the more resume images of optics based on chaos structure phase exposure mask in domain
CN109981921A (en) * 2019-03-11 2019-07-05 齐齐哈尔大学 A kind of mixed chaos virtual optics image encryption method
CN111327417A (en) * 2020-01-20 2020-06-23 宋国训 Data encryption system, method and device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
刘建东等: "基于耦合帐篷映射的时空混沌单向Hash函数构造", 《通信学报》 *
朱从旭等: "基于混沌掩码虚拟光学成像系统的图像加密", 《红外与激光工程》 *

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103049779A (en) * 2012-12-31 2013-04-17 郑莹娜 Method for generating and recognizing food safety liability insurance electronic policy two-dimensional code voucher
CN103049779B (en) * 2012-12-31 2016-12-28 郑莹娜 The generation of food safety liability insurance electronic insurance policy two-dimension code credential and recognition methods
CN103414549A (en) * 2013-07-16 2013-11-27 广东工业大学 QR two-dimensional code binary image partition-based key varying chaotic encryption method
CN103414549B (en) * 2013-07-16 2016-12-28 广东工业大学 A kind of QR two-dimensional code binary image partition becomes key chaos encrypting method
CN103973427A (en) * 2013-08-27 2014-08-06 哈尔滨理工大学 Encryption method of chaotic parallel data based on virtual computing and data optimization
CN103973427B (en) * 2013-08-27 2017-12-08 哈尔滨理工大学 Encryption method based on virtual computing and data-optimized Chaotic Parallel data
CN106408498A (en) * 2016-09-10 2017-02-15 天津大学 Two-dimensional hyper-chaotic combining Fresnel transformation single lens optical image encrypting method
CN106408498B (en) * 2016-09-10 2019-09-13 天津大学 Two-dimension Hyperchaos combination fresnel transform Single-lens Optical image encryption method
CN109413297A (en) * 2018-09-07 2019-03-01 西安理工大学 Turn round the more resume images of optics based on chaos structure phase exposure mask in domain
CN109981921A (en) * 2019-03-11 2019-07-05 齐齐哈尔大学 A kind of mixed chaos virtual optics image encryption method
CN111327417A (en) * 2020-01-20 2020-06-23 宋国训 Data encryption system, method and device

Similar Documents

Publication Publication Date Title
CN102664727A (en) Virtual optical encryption method based on chaotic mapping
Xian et al. Double parameters fractal sorting matrix and its application in image encryption
Zhou et al. Quantum image encryption scheme with iterative generalized Arnold transforms and quantum image cycle shift operations
Yang et al. Quantum cryptographic algorithm for color images using quantum Fourier transform and double random-phase encoding
Song et al. Quantum image encryption based on restricted geometric and color transformations
CN103259643B (en) Matrix fully homomorphic encryption method
CN101739695B (en) Three-dimensional Arnold mapping-based image grouping encryption method
CN102904710B (en) Hyper-chaos encryption method for weak password based on quantum cellular neural network
Wang et al. A novel encryption algorithm for quantum images based on quantum wavelet transform and diffusion
Li-Hong et al. New image encryption algorithm based on logistic map and hyper-chaos
CN103402040A (en) Spatial domain and Fourier frequency domain double encryption-based dual image encryption method
CN105373739A (en) Hyperchaotic system based quantum image encryption method
CN103778593A (en) Quantum image encryption method based on image association dissection
CN104778652A (en) Double-image encryption and decryption method
CN107742082B (en) Optical image encryption algorithm
Hu et al. Quantum image encryption scheme based on 2d s ine 2-l ogistic chaotic map
CN104376526A (en) Image encryption method based on vortex beams and phase recovery algorithm
CN106604040A (en) Multi-image encryption method based on mixed primitives and full permutation
Abuturab Securing multiple information using chaotic spiral phase encoding with simultaneous interference and superposition methods
CN104009835A (en) File encrypting and decrypting method allowing parallel computing to be conducted in cloud storage system
CN103258315A (en) Double-image encryption method based on tangential fractional Fourier transformation
CN105117653B (en) A kind of near infrared spectrum data encryption method
Abuturab Multiple color image cryptosystem based on coupled-logistic-map-biometric keys, QR decomposition with column pivoting and optical Fresnel transform
Liu et al. Optical asymmetric JTC cryptosystem based on multiplication-division operation and RSA algorithm
CN104376525B (en) Image encryption method based on iterative nonlinear Double random phase

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20120912