CN102664727A - Virtual optical encryption method based on chaotic mapping - Google Patents
Virtual optical encryption method based on chaotic mapping Download PDFInfo
- Publication number
- CN102664727A CN102664727A CN2012101057722A CN201210105772A CN102664727A CN 102664727 A CN102664727 A CN 102664727A CN 2012101057722 A CN2012101057722 A CN 2012101057722A CN 201210105772 A CN201210105772 A CN 201210105772A CN 102664727 A CN102664727 A CN 102664727A
- Authority
- CN
- China
- Prior art keywords
- lambda
- delta
- exp
- dfd
- discrete
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Prostheses (AREA)
Abstract
The invention discloses a virtual optical encryption method based on chaotic mapping and belongs to the field of information security technology and non-mathematical encryption and decryption technology. Random templates of key parameters are generated through spatial-temporal chaotic mapping, system security is enhanced and an information encryption method based on a virtual optical system is formed. Aiming at the most important problem in a virtual optical encryption system, namely, generation of the random templates, the method is based on the spatial-temporal chaotic mapping and the random templates with fine statistical performance are generated. Combining the random templates with other key parameters in the virtual optical encryption system, an encrypted ciphertext is obtained by calculating discrete Fresnel transform of a plaintext and the random templates and discretion of complex amplitude transmittance function of a lens. A decrypted plaintext is obtained by calculating reverse Fresnel transform.
Description
Technical field
The present invention relates to a kind of virtual optics encryption method, belong to field of information security technology based on the space-time chaos mapping.
Background technology
Traditional cipher mechanism all is based on mathematical theory; And be to utilize optical imaging concept based on the virtual optics encryption mechanism of optical imaging system; Adopt the computer programing method to realize the optical encryption process; As key, realize the data encryption and the Information hiding of High Security Level with the geometric parameter of propagation law in the two-phonon process and structure.Because the particularity of optical imaging system; Light wave is a kind of information carrier of multidimensional; Have multiple attributes such as amplitude, phase place, wavelength, polarization, the adding of key element such as random mask in the virtual optics encryption system simultaneously makes its key space more broad; But and have the characteristic of parallel computation, for information encryption provides new means.But compare with encryption system based on mathematical theory; The Fundamentals of Mathematics of virtual optics encryption system lack systematic Study; Characteristic and generation, key management, enciphering and deciphering algorithm like safety analysis, key space are analyzed or the like, and the foundation of these Fundamentals of Mathematics will make the real trend of virtual optics encryption system improve and use.
Summary of the invention
Technical problem to be solved by this invention is the generation problem according to random mask key in the virtual optics encryption system, makes up the random mask that statistical nature is good, forms key space and encryption method in the virtual optics encryption system.
The present invention adopts following technical scheme for solving the problems of the technologies described above:
A kind of virtual optics encryption method based on chaotic maps specifically may further comprise the steps:
Random mask (U in step 1, the generation key parameter
m) as one of encryption key parameters, specific as follows:
To selected parameter (init, w, α), produce a two dimension, size is equal to the space-time chaos sequence U of information plane to be encrypted
m:
Wherein, f
LogisticExpression Logistic chaotic maps is used to produce the system drive sequence, i.e. the initial value of 0 each grid of the moment; Init, w are respectively initial value and the Control Parameter that chaos drives the Logistic mapping; f
TentExpression tent chaotic maps is system's local state EVOLUTION EQUATION;
Represent i grid at n state constantly, i=1,2 ..., M, M are the line number of information plane matrix to be encrypted, n=1, and 2 ..., N, N are information plane matrix column number to be encrypted; α is the Control Parameter of tent mapping;
Logistic chaotic maps function is: x
N+1=wx
n(1-x
n), x
n∈ [0,1], w ∈ [0,4].
Step 2, calculating discrete fresnel transform expressly:
By key parameter (d
0, λ) calculate information plane U
0Discrete fresnel transform DFD [U to the lens front surface
0(k, l), λ, d
0]:
Wherein, j is a plural number, and Δ ε, Δ η are respectively the sampling step length of lens front surface complex amplitude on x direction and y direction; Δ x, Δ y are respectively the sampling step length of lens information plane complex amplitude on x direction and y direction; D0 is the distance of information plane to the imaging len front surface, and λ is a wavelength, step-length subscript k, and l, m, n=0,1 ..., N-1;
By key parameter (λ f), adopts same discrete processes method that the complex amplitude transmittance function t of lens is carried out discrete calculation, obtains its discrete form:
Step 3: calculate random mask (U
m) discrete fresnel transform:
(d λ) calculates two-dimensional random template (U by key parameter
m) to the discrete fresnel transform DFD [U of lens front surface
m, λ, d]:
Wherein, d represents two-dimension time-space chaos sequence U
mTo the distance of lens front surface, j is a plural number.
Step 4: calculate ciphertext U
c:
According to discrete fresnel transform and random mask (U expressly
m) discrete fresnel transform, and the discrete transform of complex amplitude transmittance function t calculates ciphertext U
c:
U
c={DFD[U
0(k,l),λ,d
0]+DFD[U
m(k,l),λ,d]}×t(m,n,λ,f)。
Step 5: calculate expressly U
0:
Decrypting process is the inverse operation process of above-mentioned ciphering process, that is:
DFD[U
0(k,l),λ,d
0]=U
c/t(m,n,λ,f)-DFD[U
m(k,l),λ,d];
U
0=IDFD[U
0(k,l),λ,d
0]。
The present invention adopts above technical scheme compared with prior art, has following technique effect:
But the present invention designs the random mask generation method in a kind of applying virtual optical encryption system; Shine upon based on space-time chaos; Generate the good key parameter of statistic property, thereby constituted the higher virtual optics encryption system of fail safe, can be applied to the encryption of information.Be characterized in that the random mask statistic property that generates is good, the virtual encryption system of formation is safe, is easy to realize.
Description of drawings
Fig. 1 is the sketch map of virtual optics encryption system.
Fig. 2 is based on the sketch map of the virtual optics encryption system of space-time chaos mapping.
Fig. 3 is the realization calculation process of method.
Fig. 4 is the plaintext two-dimension code in the embodiment.
Fig. 5 is the random mask that generates in the embodiment.
Fig. 6 is the encryption ciphertext that generates in the embodiment.
Fig. 7 is the plaintext that reduces in the embodiment.
Embodiment
Below in conjunction with accompanying drawing technical scheme of the present invention is done further detailed description:
As shown in Figure 1, be a virtual optics encryption system, wherein information plane U
0Be expressly, be the ciphertext U after encrypting as the plane
c, λ is a wavelength, f is the focal length of lens, d
0Be the distance of information plane to the imaging len front surface, d
iBe the distance that the picture plane is arrived on the surface behind the lens, d d
1+ d
2, d
1Be the distance of random mask to optical splitter, d
2Be the distance of lens to optical splitter, d represents the distance of two-dimension time-space chaos sequence to the lens front surface; Key is Θ=(U
m, d
0, d, λ, f), U wherein
mBe random mask, will generate by following method.
To selected parameter (init, w, α), produce a two dimension, size is equal to the space-time chaos sequence U of information plane to be encrypted
m:
Wherein, f
LogisticExpression Logistic chaotic maps is used to produce the system drive sequence, i.e. the initial value of 0 each grid of the moment; Init, w are respectively initial value and the Control Parameter that chaos drives the Logistic mapping; f
TentExpression tent chaotic maps is system's local state EVOLUTION EQUATION;
Represent i grid at n state constantly, i=1,2 ..., M, M are the line number of information plane matrix to be encrypted, n=1, and 2 ..., N, N are information plane matrix column number to be encrypted; α is the Control Parameter of tent mapping;
Wherein, Logistic chaotic maps function is: x
N+1=wx
n(1-x
n), x
n∈ [0,1], w ∈ [0,4].
As shown in Figure 2, adopt the space-time chaos system to produce two space-time chaos sequences, and as random mask.
As shown in Figure 3; The cleartext information of selecting for use to be encrypted is the two-dimension code (hits N=256) of 256 * 256 * 1bit; Chaos drives the initial value init=0.5706 of Logistic mapping, Control Parameter w=4, tent mapping parameters α=0.001; The two-dimension time-space chaos sequence to the lens front surface apart from d=0.01m, information plane to the lens front surface apart from d
0=0.1m, wavelength 2=623 * 10
-9M, focal length of lens f=0.025m.Expressly as shown in Figure 4.
According to above parameter, generate random mask, as shown in Figure 5.
Calculate discrete fresnel transform expressly: by key parameter (d
0, λ) calculate information plane U
0Discrete fresnel transform DFD [U to the lens front surface
0(k, l), λ, d
0]:
Wherein, j is a plural number, and Δ ε, Δ η are respectively the sampling step length of lens front surface complex amplitude on x direction and y direction; Δ x, Δ y are respectively the sampling step length of lens information plane complex amplitude on x direction and y direction; d
0Be the distance of information plane to the imaging len front surface, λ is a wavelength, step-length subscript k, and l, m, n=0,1 ..., N-1.
By key parameter (λ f), adopts same discrete processes method that the complex amplitude transmittance function t of lens is carried out discrete calculation, obtains its discrete form:
Calculate random mask (U
m) discrete fresnel transform: (d λ) calculates two-dimensional random template (U by key parameter
m) to the discrete fresnel transform DFD [U of lens front surface
m, λ, d]:
Wherein, d represents two-dimension time-space chaos sequence U
mTo the distance of lens front surface, j is a plural number.
According to formula U
c={ DFD [U
0(k, l), λ, d
0]+DFD [U
m(k, l), λ, d] } * (λ f) calculates ciphertext to t, and is as shown in Figure 6 for m, n.
According to formula DFD [U
0(k, l), λ, d
0]=U
c/ t (m, n, λ, f)-DFD [U
m(k, l), λ, d] calculate expressly, obtain original image information, as shown in Figure 7.
The content that does not specify among the present invention and explain is the known method in this area, and those of ordinary skills' content disclosed according to the present invention can realize fully.
Claims (1)
1. virtual optics encryption method based on chaotic maps is characterized in that this method may further comprise the steps:
Random mask (U in step 1, the generation key parameter
m) as one of encryption key parameters, specific as follows:
To selected parameter (init, w, α), produce a two dimension, size is equal to the space-time chaos sequence U of information plane to be encrypted
m:
Wherein, f
LogisticExpression Logistic chaotic maps is used to produce the system drive sequence, i.e. the initial value of 0 each grid of the moment; Init, w are respectively initial value and the Control Parameter that chaos drives the Logistic mapping; f
TentExpression tent chaotic maps is system's local state EVOLUTION EQUATION;
Represent i grid at n state constantly, i=1,2 ..., M, M are the line number of information plane matrix to be encrypted, n=1, and 2 ..., N, N are information plane matrix column number to be encrypted; α is the Control Parameter of tent mapping;
Logistic chaotic maps function is: x
N+1=wx
n(1-x
n), x
n∈ [0,1], w ∈ [0,4];
Step 2, calculating discrete fresnel transform expressly:
By key parameter (d
0, λ) calculate information plane U
0Discrete fresnel transform DFD [U to the lens front surface
0(k, l), λ, d
0]:
Wherein, j is a plural number, and Δ ε, Δ η are respectively the sampling step length of lens front surface complex amplitude on x direction and y direction; Δ x, Δ y are respectively the sampling step length of lens information plane complex amplitude on x direction and y direction; d
0Be the distance of information plane to the imaging len front surface, λ is a wavelength, step-length subscript k, and l, m, n=0,1 ..., N-1;
By key parameter (λ f), adopts same discrete processes method that the complex amplitude transmittance function t of lens is carried out discrete calculation, obtains its discrete form:
Step 3: calculate random mask (U
m) discrete fresnel transform:
(d λ) calculates two-dimensional random template (U by key parameter
m) to the discrete fresnel transform DFD [U of lens front surface
m, λ, d]:
Wherein, d represents two-dimension time-space chaos sequence U
mTo the distance of lens front surface, j is a plural number;
Step 4: calculate ciphertext U
c:
According to discrete fresnel transform and random mask (U expressly
m) discrete fresnel transform, and the discrete transform of complex amplitude transmittance function t calculates ciphertext U
c:
U
c={DFD[U
0(k,l),λ,d
0]+DFD[U
m(k,l),λ,d]}×t(m,n,λ,f);
Step 5: calculate expressly U
0:
Decrypting process is the inverse operation process of above-mentioned ciphering process, that is:
DFD[U
0(k,l),λ,d
0]=U
c/t(m,n,λ,f)-DFD[U
m(k,l),λ,d];
U
0=IDFD[U
0(k,l),λ,d
0]。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012101057722A CN102664727A (en) | 2012-04-11 | 2012-04-11 | Virtual optical encryption method based on chaotic mapping |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012101057722A CN102664727A (en) | 2012-04-11 | 2012-04-11 | Virtual optical encryption method based on chaotic mapping |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102664727A true CN102664727A (en) | 2012-09-12 |
Family
ID=46774148
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2012101057722A Pending CN102664727A (en) | 2012-04-11 | 2012-04-11 | Virtual optical encryption method based on chaotic mapping |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102664727A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103049779A (en) * | 2012-12-31 | 2013-04-17 | 郑莹娜 | Method for generating and recognizing food safety liability insurance electronic policy two-dimensional code voucher |
CN103414549A (en) * | 2013-07-16 | 2013-11-27 | 广东工业大学 | QR two-dimensional code binary image partition-based key varying chaotic encryption method |
CN103973427A (en) * | 2013-08-27 | 2014-08-06 | 哈尔滨理工大学 | Encryption method of chaotic parallel data based on virtual computing and data optimization |
CN106408498A (en) * | 2016-09-10 | 2017-02-15 | 天津大学 | Two-dimensional hyper-chaotic combining Fresnel transformation single lens optical image encrypting method |
CN109413297A (en) * | 2018-09-07 | 2019-03-01 | 西安理工大学 | Turn round the more resume images of optics based on chaos structure phase exposure mask in domain |
CN109981921A (en) * | 2019-03-11 | 2019-07-05 | 齐齐哈尔大学 | A kind of mixed chaos virtual optics image encryption method |
CN111327417A (en) * | 2020-01-20 | 2020-06-23 | 宋国训 | Data encryption system, method and device |
-
2012
- 2012-04-11 CN CN2012101057722A patent/CN102664727A/en active Pending
Non-Patent Citations (2)
Title |
---|
刘建东等: "基于耦合帐篷映射的时空混沌单向Hash函数构造", 《通信学报》 * |
朱从旭等: "基于混沌掩码虚拟光学成像系统的图像加密", 《红外与激光工程》 * |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103049779A (en) * | 2012-12-31 | 2013-04-17 | 郑莹娜 | Method for generating and recognizing food safety liability insurance electronic policy two-dimensional code voucher |
CN103049779B (en) * | 2012-12-31 | 2016-12-28 | 郑莹娜 | The generation of food safety liability insurance electronic insurance policy two-dimension code credential and recognition methods |
CN103414549A (en) * | 2013-07-16 | 2013-11-27 | 广东工业大学 | QR two-dimensional code binary image partition-based key varying chaotic encryption method |
CN103414549B (en) * | 2013-07-16 | 2016-12-28 | 广东工业大学 | A kind of QR two-dimensional code binary image partition becomes key chaos encrypting method |
CN103973427A (en) * | 2013-08-27 | 2014-08-06 | 哈尔滨理工大学 | Encryption method of chaotic parallel data based on virtual computing and data optimization |
CN103973427B (en) * | 2013-08-27 | 2017-12-08 | 哈尔滨理工大学 | Encryption method based on virtual computing and data-optimized Chaotic Parallel data |
CN106408498A (en) * | 2016-09-10 | 2017-02-15 | 天津大学 | Two-dimensional hyper-chaotic combining Fresnel transformation single lens optical image encrypting method |
CN106408498B (en) * | 2016-09-10 | 2019-09-13 | 天津大学 | Two-dimension Hyperchaos combination fresnel transform Single-lens Optical image encryption method |
CN109413297A (en) * | 2018-09-07 | 2019-03-01 | 西安理工大学 | Turn round the more resume images of optics based on chaos structure phase exposure mask in domain |
CN109981921A (en) * | 2019-03-11 | 2019-07-05 | 齐齐哈尔大学 | A kind of mixed chaos virtual optics image encryption method |
CN111327417A (en) * | 2020-01-20 | 2020-06-23 | 宋国训 | Data encryption system, method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102664727A (en) | Virtual optical encryption method based on chaotic mapping | |
Xian et al. | Double parameters fractal sorting matrix and its application in image encryption | |
Zhou et al. | Quantum image encryption scheme with iterative generalized Arnold transforms and quantum image cycle shift operations | |
Yang et al. | Quantum cryptographic algorithm for color images using quantum Fourier transform and double random-phase encoding | |
Song et al. | Quantum image encryption based on restricted geometric and color transformations | |
CN103259643B (en) | Matrix fully homomorphic encryption method | |
CN101739695B (en) | Three-dimensional Arnold mapping-based image grouping encryption method | |
CN102904710B (en) | Hyper-chaos encryption method for weak password based on quantum cellular neural network | |
Wang et al. | A novel encryption algorithm for quantum images based on quantum wavelet transform and diffusion | |
Li-Hong et al. | New image encryption algorithm based on logistic map and hyper-chaos | |
CN103402040A (en) | Spatial domain and Fourier frequency domain double encryption-based dual image encryption method | |
CN105373739A (en) | Hyperchaotic system based quantum image encryption method | |
CN103778593A (en) | Quantum image encryption method based on image association dissection | |
CN104778652A (en) | Double-image encryption and decryption method | |
CN107742082B (en) | Optical image encryption algorithm | |
Hu et al. | Quantum image encryption scheme based on 2d s ine 2-l ogistic chaotic map | |
CN104376526A (en) | Image encryption method based on vortex beams and phase recovery algorithm | |
CN106604040A (en) | Multi-image encryption method based on mixed primitives and full permutation | |
Abuturab | Securing multiple information using chaotic spiral phase encoding with simultaneous interference and superposition methods | |
CN104009835A (en) | File encrypting and decrypting method allowing parallel computing to be conducted in cloud storage system | |
CN103258315A (en) | Double-image encryption method based on tangential fractional Fourier transformation | |
CN105117653B (en) | A kind of near infrared spectrum data encryption method | |
Abuturab | Multiple color image cryptosystem based on coupled-logistic-map-biometric keys, QR decomposition with column pivoting and optical Fresnel transform | |
Liu et al. | Optical asymmetric JTC cryptosystem based on multiplication-division operation and RSA algorithm | |
CN104376525B (en) | Image encryption method based on iterative nonlinear Double random phase |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20120912 |