CN104134184B - Image encryption method based on iteration cut fractional Fourier transform - Google Patents
Image encryption method based on iteration cut fractional Fourier transform Download PDFInfo
- Publication number
- CN104134184B CN104134184B CN201410355310.5A CN201410355310A CN104134184B CN 104134184 B CN104134184 B CN 104134184B CN 201410355310 A CN201410355310 A CN 201410355310A CN 104134184 B CN104134184 B CN 104134184B
- Authority
- CN
- China
- Prior art keywords
- mrow
- msup
- phase
- amplitude
- fourier transform
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Image Processing (AREA)
- Image Analysis (AREA)
Abstract
Description
Claims (1)
- A kind of 1. image encryption method based on iteration cut fractional Fourier transform, it is characterized in that carrying out as follows:(1) encrypt:(i) f (x, y) represents original image to be encrypted, R1(x, y) and R '1(u, v) is close as encrypting in first interative computation Two pieces of random phase plates that key uses, exp [2 π r can be specifically expressed as respectively1(x, y)] and exp [2 π r2(u, v)], wherein (x, y) and (u, v) difference representation space domain and the coordinate of fraction Fourier frequency domain, r1(x, y) and r2(u, v) represents Liang Ge areas Between there is non-uniform probability to be distributed on [0,1] and count unrelated random matrix, when using iteration cut fractional Fourier transform When being encrypted, kth time interative computation process can generate two encryption key R required for+1 interative computation of kthk+1(x, And R ' y)k+1(u, v), wherein k=1,2,3 ..., when carrying out kth time interative computation, first to f (x, y) and encryption key Rk The product of (x, y) makees fractional Fourier transform, then the complex amplitude obtained after conversion is carried out taking amplitude and takes phase operation, point Distribution of amplitudes g is not obtainedk(u, v) and phase distribution Pk(u, v), i.e.,gk(u, v)=PT { Fα[f (x, y) Rk(x, y)] } (1)Pk(u, v)=PR { Fα[f (x, y) Rk(x, y)] } (2)Wherein PT { }, which is represented, takes amplitude computing, that is, removes the phase information of complex amplitude, and PR { } is represented and taken phase operation, that is, removes multiple The amplitude information of amplitude, Fα[] represent exponent number as α fractional Fourier transform (Fractional Fourier Transform, FRFT), in formula (1) and formula (2) two functions product f (x, y) RkThe α rank fractional Fourier transforms of (x, y) are defined as<mrow> <msup> <mi>F</mi> <mi>&alpha;</mi> </msup> <mrow> <mo>&lsqb;</mo> <mrow> <mi>f</mi> <mrow> <mo>(</mo> <mrow> <mi>x</mi> <mo>,</mo> <mi>y</mi> </mrow> <mo>)</mo> </mrow> <msub> <mi>R</mi> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mrow> <mi>x</mi> <mo>,</mo> <mi>y</mi> </mrow> <mo>)</mo> </mrow> </mrow> <mo>&rsqb;</mo> </mrow> <mrow> <mo>(</mo> <mrow> <mi>u</mi> <mo>,</mo> <mi>v</mi> </mrow> <mo>)</mo> </mrow> <mo>=</mo> <msubsup> <mo>&Integral;</mo> <mrow> <mo>-</mo> <mi>&infin;</mi> </mrow> <mrow> <mo>+</mo> <mi>&infin;</mi> </mrow> </msubsup> <msub> <mi>K</mi> <mi>&alpha;</mi> </msub> <mrow> <mo>(</mo> <mrow> <mi>x</mi> <mo>,</mo> <mi>y</mi> <mo>;</mo> <mi>u</mi> <mo>,</mo> <mi>v</mi> </mrow> <mo>)</mo> </mrow> <mi>f</mi> <mrow> <mo>(</mo> <mrow> <mi>x</mi> <mo>,</mo> <mi>y</mi> </mrow> <mo>)</mo> </mrow> <msub> <mi>R</mi> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mrow> <mi>x</mi> <mo>,</mo> <mi>y</mi> </mrow> <mo>)</mo> </mrow> <mi>d</mi> <mi>x</mi> <mi>d</mi> <mi>y</mi> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>3</mn> <mo>)</mo> </mrow> </mrow>Wherein Kα(x, y;U, v) be two-dimentional fractional Fourier transform core, i.e.,<mrow> <msub> <mi>K</mi> <mi>&alpha;</mi> </msub> <mrow> <mo>(</mo> <mrow> <mi>x</mi> <mo>,</mo> <mi>u</mi> <mo>;</mo> <mi>y</mi> <mo>,</mo> <mi>v</mi> </mrow> <mo>)</mo> </mrow> <mo>=</mo> <mi>A</mi> <mi> </mi> <mi>exp</mi> <mrow> <mo>(</mo> <mrow> <mi>i</mi> <mi>&pi;</mi> <mfrac> <mrow> <msup> <mi>x</mi> <mn>2</mn> </msup> <mo>+</mo> <msup> <mi>y</mi> <mn>2</mn> </msup> <mo>+</mo> <msup> <mi>u</mi> <mn>2</mn> </msup> <mo>+</mo> <msup> <mi>v</mi> <mn>2</mn> </msup> </mrow> <mrow> <mi>&lambda;</mi> <mi>f</mi> <mi> </mi> <mi>tan</mi> <mi>&phi;</mi> </mrow> </mfrac> <mo>-</mo> <mn>2</mn> <mi>i</mi> <mi>&pi;</mi> <mfrac> <mrow> <mi>x</mi> <mi>y</mi> <mi>u</mi> <mi>v</mi> </mrow> <mrow> <msup> <mi>&lambda;</mi> <mn>2</mn> </msup> <msup> <mi>f</mi> <mn>2</mn> </msup> <mi>sin</mi> <mi>&phi;</mi> </mrow> </mfrac> </mrow> <mo>)</mo> </mrow> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>4</mn> <mo>)</mo> </mrow> </mrow>WhereinAnd φ=α pi/2s, α are the exponent numbers of fractional form;(ii) to gk(u, v) and R 'kThe product of (u, v) carries out taking phase operation after making α rank fractional Fourier transforms, obtains phase It is distributed P 'k(x, y), i.e.,P′k(x, y)=PR { Fα[gk(u, v) R 'k(u, v)] } (5)(iii) to P 'k(x, y) obtains a COMPLEX AMPLITUDE after making (- α) rank fractional Fourier transform, and the distribution is carried out to take amplitude With take phase operation after respectively obtain distribution of amplitudes g 'k(u, v) and phase distribution R 'k+1(u, v), i.e.,g′k(u, v)=PT { F-α[P′k(x, y)] } (6)R′k+1(u, v)=PR { F-α[P′k(x, y)] } (7)Then to g 'k(u, v) and PkThe product of (u, v) makees (- α) rank fractional Fourier transform, and the complex amplitude obtained after conversion is entered Row takes phase and takes amplitude to operate, and respectively obtains phase distribution Rk+1(x, y) and distribution of amplitudes f 'k(x, y), calculation formula difference ForRk+1(x, y)=PR { F-α[g′k(u, v) Pk(u, v)] } (8)f′k(x, y)=PT { F-α[g′k(u, v) Pk(u, v)] } (9)Thus, during kth time interative computation, by using P 'k(x, y) and Pk(u, v) two pieces of phase-plates be calculated kth+ The two encryption key R ' used required for 1 interative computation processk+1(u, v) and Rk+1(x, y), amplitude image is also obtained in addition As f 'k(x, y), subsequently enter lower whorl interative computation process (i.e.+1 interative computation of kth);(iv) when iterations is completed n times altogether, interative computation is terminated, and two pieces of phases are respectively obtained according to formula (2), formula (5) Plate P 'n(u, v) and Pn(x, y), i.e.,Pn(u, v)=PR { Fα[f (x, y) Rn(x, y)] } (10)P′n(x, y)=PR { Fα[gn(u, v) R 'n(u, v)] } (11)Wherein gn(u, v) is generated in nth iteration calculating process, and its value is gn(u, v)=PT { Fα[f (x, y) Rn(x, y)] }, From formula (7) and formula (8), Rn(x, y) and R 'n(u, v) is generated during (n-1)th interative computation, in nth iteration The encrypted result finally given after computing is two pieces of phase-plates, is represented respectively with function P (u, v) and P ' (x, y), its expression formula For<mrow> <mi>P</mi> <mrow> <mo>(</mo> <mrow> <mi>u</mi> <mo>,</mo> <mi>v</mi> </mrow> <mo>)</mo> </mrow> <mo>=</mo> <msubsup> <mi>R</mi> <mrow> <mi>n</mi> <mo>+</mo> <mn>1</mn> </mrow> <mrow> <mo>&prime;</mo> <mo>*</mo> </mrow> </msubsup> <mrow> <mo>(</mo> <mrow> <mi>u</mi> <mo>,</mo> <mi>v</mi> </mrow> <mo>)</mo> </mrow> <msub> <mi>P</mi> <mi>n</mi> </msub> <mrow> <mo>(</mo> <mrow> <mi>u</mi> <mo>,</mo> <mi>v</mi> </mrow> <mo>)</mo> </mrow> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>12</mn> <mo>)</mo> </mrow> </mrow>P ' (x, y)=P 'n(x, y) (13)Wherein " * " represents conjugation, R 'n+1(u, v) is generated in nth iteration calculating process, and its value is R 'n+1(u, v)=PR { F-α [P′n(x, y)] };(2) decrypt:(i) (- α) rank fractional Fourier transform, the result F obtained after conversion are made to the phase-plate P ' (x, y) that encryption obtains-α[P′ (x, y)] with encrypting work (- α) rank fractional Fourier transform after obtained another phase-plate P (u, v) is multiplied, the knot obtained after conversion Fruit is expressed as F-α[F-α[P ' (x, y)] P (u, v)];(ii) result obtained in previous step is carried out taking amplitude computing, finally gives decrypted image, represented with f ' (x, y), Then there are f ' (x, y)=PT { F-α[F-α[P ' (x, y)] P (u, v)] }, can be with by formula (6), formula (7), formula (9), formula (12), formula (13) Prove:<mrow> <mtable> <mtr> <mtd> <mrow> <msup> <mi>f</mi> <mo>&prime;</mo> </msup> <mrow> <mo>(</mo> <mrow> <mi>x</mi> <mo>,</mo> <mi>y</mi> </mrow> <mo>)</mo> </mrow> <mo>=</mo> <mi>P</mi> <mi>T</mi> <mrow> <mo>{</mo> <mrow> <msup> <mi>F</mi> <mrow> <mo>-</mo> <mi>&alpha;</mi> </mrow> </msup> <mrow> <mo>&lsqb;</mo> <mrow> <msup> <mi>F</mi> <mrow> <mo>-</mo> <mi>&alpha;</mi> </mrow> </msup> <mrow> <mo>&lsqb;</mo> <mrow> <msup> <mi>P</mi> <mo>&prime;</mo> </msup> <mrow> <mo>(</mo> <mrow> <mi>x</mi> <mo>,</mo> <mi>y</mi> </mrow> <mo>)</mo> </mrow> </mrow> <mo>&rsqb;</mo> </mrow> <mi>P</mi> <mrow> <mo>(</mo> <mrow> <mi>u</mi> <mo>,</mo> <mi>v</mi> </mrow> <mo>)</mo> </mrow> </mrow> <mo>&rsqb;</mo> </mrow> </mrow> <mo>}</mo> </mrow> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <mo>=</mo> <mi>P</mi> <mi>T</mi> <mrow> <mo>{</mo> <mrow> <msup> <mi>F</mi> <mrow> <mo>-</mo> <mi>&alpha;</mi> </mrow> </msup> <mrow> <mo>&lsqb;</mo> <mrow> <msup> <mi>F</mi> <mrow> <mo>-</mo> <mi>&alpha;</mi> </mrow> </msup> <mrow> <mo>&lsqb;</mo> <mrow> <msubsup> <mi>P</mi> <mi>n</mi> <mo>&prime;</mo> </msubsup> <mrow> <mo>(</mo> <mrow> <mi>x</mi> <mo>,</mo> <mi>y</mi> </mrow> <mo>)</mo> </mrow> </mrow> <mo>&rsqb;</mo> </mrow> <msubsup> <mi>R</mi> <mrow> <mi>n</mi> <mo>+</mo> <mn>1</mn> </mrow> <mrow> <mo>&prime;</mo> <mo>*</mo> </mrow> </msubsup> <mrow> <mo>(</mo> <mrow> <mi>u</mi> <mo>,</mo> <mi>v</mi> </mrow> <mo>)</mo> </mrow> <msub> <mi>P</mi> <mi>n</mi> </msub> <mrow> <mo>(</mo> <mrow> <mi>u</mi> <mo>,</mo> <mi>v</mi> </mrow> <mo>)</mo> </mrow> </mrow> <mo>&rsqb;</mo> </mrow> </mrow> <mo>}</mo> </mrow> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <mo>=</mo> <mi>P</mi> <mi>T</mi> <mrow> <mo>{</mo> <mrow> <msup> <mi>F</mi> <mrow> <mo>-</mo> <mi>&alpha;</mi> </mrow> </msup> <mrow> <mo>&lsqb;</mo> <mrow> <msubsup> <mi>g</mi> <mi>n</mi> <mo>&prime;</mo> </msubsup> <mrow> <mo>(</mo> <mrow> <mi>u</mi> <mo>,</mo> <mi>v</mi> </mrow> <mo>)</mo> </mrow> <msubsup> <mi>R</mi> <mrow> <mi>n</mi> <mo>+</mo> <mn>1</mn> </mrow> <mo>&prime;</mo> </msubsup> <mrow> <mo>(</mo> <mrow> <mi>u</mi> <mo>,</mo> <mi>v</mi> </mrow> <mo>)</mo> </mrow> <msubsup> <mi>R</mi> <mrow> <mi>n</mi> <mo>+</mo> <mn>1</mn> </mrow> <mrow> <mo>&prime;</mo> <mo>*</mo> </mrow> </msubsup> <mrow> <mo>(</mo> <mrow> <mi>u</mi> <mo>,</mo> <mi>v</mi> </mrow> <mo>)</mo> </mrow> <msub> <mi>P</mi> <mi>n</mi> </msub> <mrow> <mo>(</mo> <mrow> <mi>u</mi> <mo>,</mo> <mi>v</mi> </mrow> <mo>)</mo> </mrow> </mrow> <mo>&rsqb;</mo> </mrow> </mrow> <mo>}</mo> </mrow> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <mo>=</mo> <msubsup> <mi>f</mi> <mi>n</mi> <mo>&prime;</mo> </msubsup> <mrow> <mo>(</mo> <mrow> <mi>x</mi> <mo>,</mo> <mi>y</mi> </mrow> <mo>)</mo> </mrow> </mrow> </mtd> </mtr> </mtable> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>14</mn> <mo>)</mo> </mrow> </mrow>Therefore, the image for decrypting to obtain is exactly amplitude image that ciphering process nth iteration computing obtains as f 'n(x, y);The process of visual decryption, fractional Fourier transform is completed using the simple lens structure of Lohmann propositions;Space light modulation Device (Spatial Light Modulator, SLM) has the ability of display phase signal;It is controllable by computer during encryption SLM1 and SLM2 shows P ' (x, y) and P (u, v) respectively, and incidence wave is unit Amplitude Plane light wave, and two pieces of lens are real twice in succession The fractional Fourier transform of existing (- α) rank, the result in the output face of system be complex amplitude, it is only necessary to light intensity detector C CD notes The amplitude components information in output face is recorded, amplitude information f ' (x, y) is obtained after record;Whole visual decryption process can be expressed as F ' (x, y)=PT { F-α[F-α[P ' (x, y)] P (u, v)] };Using mean square deviation (Mean Square Error, MSE) as the difference weighed in two images quality in computing, it is known that f The image that (x, y) and f ' (x, y) represent original image respectively and decryption obtains, MSE between the two can be expressed as<mrow> <mi>M</mi> <mi>S</mi> <mi>E</mi> <mrow> <mo>(</mo> <mrow> <mi>f</mi> <mo>,</mo> <msup> <mi>f</mi> <mo>&prime;</mo> </msup> </mrow> <mo>)</mo> </mrow> <mo>=</mo> <mfrac> <mn>1</mn> <mrow> <mi>M</mi> <mi>N</mi> </mrow> </mfrac> <munderover> <mi>&Sigma;</mi> <mrow> <mi>x</mi> <mo>=</mo> <mn>1</mn> </mrow> <mi>M</mi> </munderover> <munderover> <mi>&Sigma;</mi> <mrow> <mi>y</mi> <mo>=</mo> <mn>1</mn> </mrow> <mi>N</mi> </munderover> <mo>|</mo> <mi>f</mi> <mrow> <mo>(</mo> <mrow> <mi>x</mi> <mo>,</mo> <mi>y</mi> </mrow> <mo>)</mo> </mrow> <mo>-</mo> <msup> <mi>f</mi> <mo>&prime;</mo> </msup> <mrow> <mo>(</mo> <mrow> <mi>x</mi> <mo>,</mo> <mi>y</mi> </mrow> <mo>)</mo> </mrow> <msup> <mo>|</mo> <mn>2</mn> </msup> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>15</mn> <mo>)</mo> </mrow> </mrow>Wherein M, N are the sizes of image, and f (x, y) and f ' (x, y) represent value of the two width amplitude image pictures in pixel (x, y) respectively, Reflect the convergence for the interative computation that this method carried out by MSE.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410355310.5A CN104134184B (en) | 2014-07-21 | 2014-07-21 | Image encryption method based on iteration cut fractional Fourier transform |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410355310.5A CN104134184B (en) | 2014-07-21 | 2014-07-21 | Image encryption method based on iteration cut fractional Fourier transform |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104134184A CN104134184A (en) | 2014-11-05 |
CN104134184B true CN104134184B (en) | 2018-01-16 |
Family
ID=51806855
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410355310.5A Active CN104134184B (en) | 2014-07-21 | 2014-07-21 | Image encryption method based on iteration cut fractional Fourier transform |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104134184B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104517261B (en) * | 2015-01-08 | 2017-06-23 | 浙江农林大学 | Safety certifying method based on phase recovery and sparse double random-phase encoding |
CN105912940B (en) * | 2016-05-20 | 2018-11-06 | 浙江农林大学 | Image authentication method based on two pieces of binary masks |
CN106408500B (en) * | 2016-09-13 | 2019-04-26 | 华北水利水电大学 | A kind of image encrypting and decrypting method based on Phase Retrieve Algorithm and calculating relevance imaging |
CN110191251A (en) * | 2019-05-13 | 2019-08-30 | 四川大学 | A kind of scalability optical image encryption method based on cylinder diffraction and phase truncation |
CN110275347A (en) * | 2019-07-12 | 2019-09-24 | 京东方科技集团股份有限公司 | A kind of display device and its driving method |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103258315A (en) * | 2013-05-24 | 2013-08-21 | 浙江农林大学 | Double-image encryption method based on tangential fractional Fourier transformation |
CN103279916A (en) * | 2013-05-24 | 2013-09-04 | 浙江农林大学 | Image encryption method based on double random phase encoding and interference principle |
CN103295185A (en) * | 2013-06-28 | 2013-09-11 | 浙江农林大学 | Asymmetrical image encryption method based on random amplitude plate and Fourier transformation |
CN103402040A (en) * | 2013-08-06 | 2013-11-20 | 浙江农林大学 | Spatial domain and Fourier frequency domain double encryption-based dual image encryption method |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5115930B2 (en) * | 2008-05-14 | 2013-01-09 | 国立大学法人 千葉大学 | An image information encryption method, an image information encryption device, and a computer program for image encryption. |
-
2014
- 2014-07-21 CN CN201410355310.5A patent/CN104134184B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103258315A (en) * | 2013-05-24 | 2013-08-21 | 浙江农林大学 | Double-image encryption method based on tangential fractional Fourier transformation |
CN103279916A (en) * | 2013-05-24 | 2013-09-04 | 浙江农林大学 | Image encryption method based on double random phase encoding and interference principle |
CN103295185A (en) * | 2013-06-28 | 2013-09-11 | 浙江农林大学 | Asymmetrical image encryption method based on random amplitude plate and Fourier transformation |
CN103402040A (en) * | 2013-08-06 | 2013-11-20 | 浙江农林大学 | Spatial domain and Fourier frequency domain double encryption-based dual image encryption method |
Non-Patent Citations (2)
Title |
---|
"Simultaneous nonlinear encryption of grayscale and color images based on phase-truncated fractional Fourier transform and optical superposition principle";Xiaogang Wang等;《Applied Optics》;20130822;第52卷(第25期);第6170-6178页 * |
"用迭代傅里叶变换算法实现光学分级图像加密";王永瑛等;《中国激光》;20061020;第33卷(第10期);正文第1361-1362页第2-3节 * |
Also Published As
Publication number | Publication date |
---|---|
CN104134184A (en) | 2014-11-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yu et al. | Optical image encryption algorithm based on phase-truncated short-time fractional Fourier transform and hyper-chaotic system | |
Kang et al. | Color image encryption using pixel scrambling operator and reality-preserving MPFRHT | |
US9054871B2 (en) | Physical key-protected one time pad | |
CN104134184B (en) | Image encryption method based on iteration cut fractional Fourier transform | |
Su et al. | Cascaded Fresnel holographic image encryption scheme based on a constrained optimization algorithm and Henon map | |
CN103279916B (en) | Based on the image encryption method of Double random phase and principle of interference | |
US11245519B1 (en) | Systems and methods for quantum entanglement random number generation | |
CN103402040B (en) | Based on the dual image encryption method of spatial domain and Fourier domain double-encryption | |
CN104376526B (en) | Image encryption method based on vortex beams and Phase Retrieve Algorithm | |
Wang et al. | Color image encryption based on chaotic compressed sensing and two-dimensional fractional Fourier transform | |
Kumar et al. | Double random phase encoding based optical encryption systems using some linear canonical transforms: weaknesses and countermeasures | |
CN102567943A (en) | Asymmetric double image encryption method based on joint of fourier transformation and phase cutting | |
Abuturab | Single-channel color information security system using LU decomposition in gyrator transform domains | |
CN104517261B (en) | Safety certifying method based on phase recovery and sparse double random-phase encoding | |
Liu et al. | Image encryption based on the random rotation operation in the fractional Fourier transform domains | |
CN103258315B (en) | Based on the dual image encryption method of cut fractional Fourier transform | |
Sui et al. | Color image encryption by using Yang-Gu mixture amplitude-phase retrieval algorithm in gyrator transform domain and two-dimensional Sine logistic modulation map | |
US11356247B1 (en) | Systems and methods for quantum one-time pad generation | |
Xu et al. | Phase-only asymmetric optical cryptosystem based on random modulus decomposition | |
Du et al. | High-efficiency optical image authentication scheme based on ghost imaging and block processing | |
Kang et al. | Fast image encryption algorithm based on (n, m, k)-PCMLCA | |
CN104376524B (en) | Bianry image encryption method with Phase Retrieve Algorithm is encrypted based on diaphragm | |
US11240223B1 (en) | Systems and methods for quantum consensus | |
Huo et al. | Novel image compression–encryption hybrid scheme based on DNA encoding and compressive sensing | |
Lee et al. | Double random phase encryption based orthogonal encoding technique for color images |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20200107 Address after: 310052 floor 2, No. 1174, Binhe Road, Changhe street, Binjiang District, Hangzhou City, Zhejiang Province Patentee after: Hangzhou fog Technology Co.,Ltd. Address before: Room 207, main office building, No.118 Longxing Road, Haining Economic Development Zone, Haining City, Jiaxing City, Zhejiang Province Patentee before: Haining Economic Development Industrial Park Development and Construction Co.,Ltd. Effective date of registration: 20200107 Address after: Room 207, main office building, No.118 Longxing Road, Haining Economic Development Zone, Haining City, Jiaxing City, Zhejiang Province Patentee after: Haining Economic Development Industrial Park Development and Construction Co.,Ltd. Address before: 311300 No. 88 North Ring Road, Zhejiang, Ling'an Patentee before: Zhejiang A & F University |
|
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20201221 Address after: No. 188, Shengxing Road, Wangdian Town, Xiuzhou District, Jiaxing City, Zhejiang Province Patentee after: SUNYA OPTOELECTRONIC Co.,Ltd. Address before: 310052 2nd floor, No. 1174 Binhe Road, Changhe street, Binjiang District, Hangzhou City, Zhejiang Province Patentee before: Hangzhou fog Technology Co.,Ltd. |