CN106447588A - Fresnel transform domain chaotic double random phase encoding optical image encryption method - Google Patents

Fresnel transform domain chaotic double random phase encoding optical image encryption method Download PDF

Info

Publication number
CN106447588A
CN106447588A CN201610874788.8A CN201610874788A CN106447588A CN 106447588 A CN106447588 A CN 106447588A CN 201610874788 A CN201610874788 A CN 201610874788A CN 106447588 A CN106447588 A CN 106447588A
Authority
CN
China
Prior art keywords
image
chaos
random phase
fresnel transform
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610874788.8A
Other languages
Chinese (zh)
Inventor
唐晨
苏永钢
李碧原
程佳佳
谷帆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin University
Original Assignee
Tianjin University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin University filed Critical Tianjin University
Priority to CN201610874788.8A priority Critical patent/CN106447588A/en
Publication of CN106447588A publication Critical patent/CN106447588A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking

Abstract

The invention relates to the technical field of image information security and optical information processing, and aims at effectively avoiding the system error caused by complex optical elements in an optical integral imaging technology so that the security can be further guaranteed. The adopted technical scheme is a Fresnel transform domain chaotic double random phase encoding optical image encryption method comprising the following steps of 1) an image preprocessing part: an original image under encryption is modulated into an elemental image array similar to a hologram by using integral imaging calculation; 2) a chaotic key generation part: two random phase masks acting as master keys are respectively generated by two-dimensional Zaslavskii chaotic systems controlled by different chaotic parameters; and 3) an image encryption and decryption part: inverse transform of Fresnel transform of which the distance is z1 is performed on the modulated image, and finally the original image is reconstructed through the integral imaging calculation technology. The Fresnel transform domain chaotic double random phase encoding optical image encryption method is mainly used for the occasion of information security.

Description

Fresnel transform domain chaos Double random phase optical image encryption method
Technical field
The present invention relates to image information safety and optical information processing technical field, in more particularly, to a kind of fresnel transform domain Based on the optical image encryption method calculating integration imaging technology and chaos Double random phase.Concretely relate to Fresnel Transform domain chaos Double random phase optical image encryption method.
Background technology
Digital picture, as currently one of most popular multimedia form, has in fields such as politics, economic, military, education And be widely applied.In Internet technology highly developed today, how to protect digital picture exempt from distort, bootlegging and biography Broadcast and there is important practical significance.Research to image encryption technology has become one of the focus in current information security field.
Optical information processing technique is with its high processing rate, high degree of parallelism, quickly to realize convolution and related operation etc. excellent Point, causes the great interest (see document [1]) of people in image encryption research field.In optical image encryption technology, Representative is the Double random phase technology (see document [2]) of the propositions such as Javidi.This technology opens optical picture As the frontier of encryption research, large quantities of optical encryption new methods and new technique are born (see Review literature based on this technology [3]).Additionally, optical integration imaging technique and fresnel transform have also obtained extensively in research fields such as image encryption, digital watermarkings General concern (see document [4] and [5]).
However, in the optical image encryption method based on Double random phase and optical integration imaging technique, existing Following problem:
1) key is the random phase mask of picture size, and therefore, key management and transmission are inconvenient (see document [6]);
2) because the inconvenience of random phase mask updates, therefore, encryption system is easily attacked by chosen -plain attact and known-plaintext Hit (see document [7] and [8]).
3) in optical integration imaging technique, the use of a large amount of optical elements, easily brings systematic error to imaging system, makes weight The quality degradation (see document [9]) of composition picture.
List of references:
[1]O.Matoba,T.Nomura,E.Perez-Cabre,M.Millan,and B.Javidi,Optical techniques forinformation security,Proceedings of IEEE 2009,97:1128-1148
[2]P.Réfrégier and B.Javidi,Optical image encryption based on input planeand Fourier plane random encoding,Opt.Lett.,1995,20:767-769
[3]S.Liu,C.Guo,and J.T.Sheridan,A review of optical image encryption techniques,Optics&Laser Technology,2014,57:327-342
[4]X.Li,I-K Lee,S.Kim,Improved integral imaging based image copyright protection algorithmusing 3-D computational integral imaging pickup and super-resolution reconstruction technique,Opt.Laser Eng.,2015,62:103-111
[5]S.Yuan,Y.Xin,M.Liu,S.Yao,and X.Sun,An improved method to enhance the security of double random-phaseencoding in the Fresnel domain,Opt.Laser Technol.,2012,44:51-56
[6]S.Yuan,Y.Xin,M.Liu,S.Yao,and X.Sun,An improved method to enhance the security of double random-phaseencoding in the Fresnel domain,Optics& Laser Technology,2012,44:51-56
[7]X.Peng,H.Wei,and P.Zhang,Chosen-plaintext attack on lensless double-randomphase encoding in the Fresnel domain,Opt.Lett.,2006,31:3261-3263
[8]U.Gopinathan,D.S.Monaghan,T.J.Naughton,and J.T.Sheridan,A known- plaintextheuristic attack on the Fourier plane encryption algorithm.Opt.Express,2006,14:3181-3186
[9]D.Shin,H.Yoo,Image quality enhancement in 3D computational integral imaging by use ofinterpolation methods,Opt.Express,2007,15:12039- 12049.
Content of the invention
For overcoming the deficiencies in the prior art, it is contemplated that proposition is a kind of being added based on the optical imagery of Double random phase Decryption method and optical integration imaging technique scheme, realize being prevented effectively from what complicated optics in optical integration imaging technique were brought Systematic error is so that safety is further ensured.The technical solution used in the present invention is that fresnel transform domain chaos is double Optical Image Encryption Using Random Phase Mask method, step is as follows:
1) Image semantic classification part:Using calculating integration imaging, original image to be encrypted is modulated into similar hologram Pixel pattern matrix;
2) generating portion of chaotic key:Two pieces of random phase masks playing master key effect are respectively by different chaotic parameters The two-dimentional Zaslavskii chaos system controlling generates, and, as master key, Fresnel becomes for the initial value of chaos system and control parameter Change distance as the auxiliary key in encryption process;
3) image encryption and decryption portion:(1) in ciphering process, pixel pattern matrix is random by first piece of chaos first Phase mask is modulated, and then entering row distance is z1Fresnel transform, the image after conversion is again by second piece of chaos random phase Mask is modulated, and then entering row distance is z2Fresnel transform;(2) in decrypting process, the image after encryption enters line-spacing first From for z2Fresnel transform inverse transformation, then modulated by the complex conjugate of second piece of chaos random phase masks, modulated after Image enter again row distance be z1Fresnel transform inverse transformation, then again by first piece of chaos random phase masks multiple altogether Yoke is modulated, and is finally computed integration imaging technology reengineering and goes out original image.
Comprise the concrete steps that in one embodiment:
(1) Image semantic classification part:
Using calculating integration imaging, original image to be encrypted is modulated into the pixel pattern matrix of similar hologram, its In, (k, l) individual pixel image f of being obtained by original image O (x, y)kl(x, y) is:
fkl(x, y)=O (- xv+k γ ,-yv+l γ) (1)
Wherein, v is amplification factor, and γ is the spacing between lenslet;(x, y) is the position coordinateses of original image, (k, l) Position coordinateses for lenslet;
By pixel pattern matrix f (x, y) that each pixel image forms it is:
Wherein, p × q represents the quantity of pixel image.
(2) generating portion of chaotic key:
In encryption method, two pieces of chaos random phase masks play master key effect, two-dimentional Zaslavskii chaos system from The mathematic(al) representation of scattered form is:
Wherein, xnAnd ynIt is respectively the input value of chaos system, xn+1And yn+1It is respectively the iteration output valve of chaos system; Mod represents modulo operation, and π represents pi;W, μ, ν are the control parameter of chaos system, and the wherein form of μ is as follows:
When control parameter w=5, when v=0.2, r=2, two-dimentional Zaslavskii system is in chaos state;Join when controlling When number takes other numerical value, this system is likely to be in chaos state;
The size of hypothesis image to be encrypted is M × N number of pixel, then the size of two pieces of chaos random phase masks is also M × N number of pixel.For by the two-dimentional Zaslavskii chaos system of two groups of different chaos state modulator so as to iteration (M × N)/2 After secondary, obtain two groups of random number sequences X1={ x1′,x2′,…,x′(M×N)/2, Y1={ y1′,y2′,…,y′(M×N)/2And X2= {x1″,x2″,…,x″(M×N)/2, Y2={ y1″,y2″,…,y″(M×N)/2, wherein, x1′,x2′,…,x′(M×N)/2, y1′, y2′,…,y′(M×N)/2, x1″,x2″,…,x″(M×N)/2And y1″,y2″,…,y″(M×N)/2For the iteration output valve of chaos system, incite somebody to action This two groups of random number sequences are integrated into form Z of two two-dimensional matrixs respectively1={ zi,j| i=1,2 ..., M;J=1,2 ..., N } and Z2=z "i,j| i=1,2 ..., M;J=1,2 ..., N }, wherein z 'i,jWith z "i,jFor the element of two-dimensional matrix, subscript i, j The position coordinateses of representing matrix element;Then obtain two pieces of chaos random phase masks, its mathematic(al) representation is respectively C1(x1,y1) =exp (j2 π zi,j) and C2(x2,y2)=exp (j2 π z "i,j), wherein, (x1,y1) and (x2,y2) represent respectively two pieces of chaos with The coordinate of machine phase mask present position, j represents imaginary unit, because chaos random phase mask is by the initial value of chaos system To control with control parameter, therefore, the initial value of chaos system and control parameter are as the master key of encryption system.
(3) image encryption and decryption portion:
1) in ciphering process, pixel pattern matrix f (x, y) is modulated by first piece of chaos random phase masks first, so Laggard row distance is z1Fresnel transform, the image after conversion modulated by second piece of chaos random phase masks again, Ran Houjin Row distance is z2Fresnel transform, through twice modulation and twice convert after can be obtained by encrypted image U (x ', y '):
Wherein, FrTλ,z{ } represents the fresnel transform for z for the distance, and its form is as follows:
Wherein, U0(x0,y0) represent original image, U1(x1,y1) represent the image after fresnel transform;(x0,y0) and (x1,y1) respectively represent original image and conversion after image position coordinateses;J is imaginary unit, and π is pi, and λ is Object light wave Wavelength;
2) in decrypting process, it is z that the image after encryption enters row distance first2Fresnel transform inverse transformation, then Modulated by the complex conjugate of second piece of chaos random phase masks, modulated after image enter again row distance be z1Fresnel transform Inverse transformation, then modulated it is possible to pixel figure after being deciphered again by the complex conjugate of first piece of chaos random phase masks As array f (x, y):
Wherein, * represents complex conjugate operator;
The pixel pattern matrix obtaining after deciphering is computed integration imaging technology again and reduces it is possible to finally give reconstruct Original image O (x, y):
The feature of the present invention and beneficial effect are:
In the optical image encryption method that the present invention provides, calculate the use of integration imaging technology, light can be prevented effectively from Learn the systematic error that in integration imaging technology, complicated optics are brought so that the quality of reconstructed image is significantly carried High.The use of chaotic key is so that this encryption method can be effective against known plain text attack and chosen -plain attact, and makes Key management and transmission become more convenient.Fresnel transform distance is as the auxiliary key in encryption process so that this adds The safety of decryption method has obtained further guarantee.
Brief description:
The principle schematic of the optical image encryption method that Fig. 1 provides for the present invention;
Fig. 2 (a) is original image to be encrypted;
The image that Fig. 2 (b) encrypts for this method;
Fig. 2 (c) is decrypted image when all keys are all correct;
Fig. 3 (a) is the initial value x of the two-dimentional Zaslavskii chaos system controlling second piece of random phase masks2Mistake, its Decrypted image when its key is all correct;
Fig. 3 (b) is the initial value y of the two-dimentional Zaslavskii chaos system controlling second piece of random phase masks2Mistake, its Decrypted image when its key is all correct;
Fig. 3 (c) is control parameter w of the two-dimentional Zaslavskii chaos system controlling second piece of random phase masks2Wrong By mistake, decrypted image when other keys are all correct;
Fig. 3 (d) is control parameter v of the two-dimentional Zaslavskii chaos system controlling second piece of random phase masks2Wrong By mistake, decrypted image when other keys are all correct;
Fig. 3 (e) is control parameter r of the two-dimentional Zaslavskii chaos system controlling second piece of random phase masks2Wrong By mistake, decrypted image when other keys are all correct;
Fig. 3 (f) is fresnel transform apart from z1Mistake, decrypted image when other keys are all correct;
Fig. 3 (g) is fresnel transform apart from z2Mistake, decrypted image when other keys are all correct;
Fig. 4 (a) is the image obtaining from the encryption in figure deciphering of 12.5% information that lacks;
Fig. 4 (b) is the image obtaining from the encryption in figure deciphering of 25% information that lacks;
Fig. 4 (c) is the image obtaining from the encryption in figure deciphering of 50% information that lacks;
Fig. 5 (a) is the image obtaining from the deciphering of the encryption in figure containing 10% Gaussian noise;
Fig. 5 (b) is the image obtaining from the deciphering of the encryption in figure containing 10% salt-pepper noise;
Fig. 5 (c) is the image obtaining from the deciphering of the encryption in figure containing 10% speckle noise;
In accompanying drawing, the list of parts representated by each label is as follows:
CRPM1:First piece of chaos random phase masks;CRPM2:Second piece of chaos random phase masks;CRPM1*:First The complex conjugate of block chaos random phase masks;CRPM2*:The complex conjugate of second piece of chaos random phase masks;
Specific embodiment
The invention provides be based in a kind of fresnel transform domain calculating integration imaging technology and chaos double random phase volume The optical image encryption method of code.The present invention provide optical image encryption method by Image semantic classification part, chaotic key Generating portion, image encryption and decryption part are grouped into.In Image semantic classification part, calculating integration imaging technology can will be to be encrypted Original image be modulated into the pixel pattern matrix of similar hologram.Additionally, calculating the use of integration imaging technology, can be effective Avoid the systematic error that complicated optics are brought so that the quality of reconstructed image is significantly improved.Chaotic key Using so that this encryption method can be effective against known plain text attack and chosen -plain attact, and make key management and Transmission becomes more convenient.Fresnel transform distance is as the auxiliary key in encryption process so that the peace of this encryption method Full property is further ensured that.Additionally, many experiments show, this encryption method has good violence and attacks, counts and attack Hit, attacked by noise and shearing attack ability.Described below:
1) Image semantic classification part:Calculate integration imaging technology and original image to be encrypted can be modulated into similar holography The pixel pattern matrix of figure;Compared to optical integration imaging technique, calculating integration imaging technology does not need substantial amounts of optical element, The systematic error that optical element brings therefore can be prevented effectively from;Additionally, calculate integration imaging technology can be with effectively solving light Learn integration imaging technology in reconstructed image second-rate the problems such as.
2) generating portion of chaotic key:Two pieces of random phase masks playing master key effect are respectively by different chaotic parameters The two-dimentional Zaslavskii chaos system controlling generates, and the initial value of chaos system and control parameter are as master key.Fresnel becomes Change distance as the auxiliary key in encryption process.Because in encryption process, key updating is convenient, therefore, this encryption method Known plain text attack and chosen -plain attact can be effective against;Additionally, key management and transmission are also more convenient.
3) image encryption and decryption portion:(1) in ciphering process, pixel pattern matrix is random by first piece of chaos first Phase mask is modulated, and then entering row distance is z1Fresnel transform, the image after conversion is again by second piece of chaos random phase Mask is modulated, and then entering row distance is z2Fresnel transform;(2) in decrypting process, the image after encryption enters line-spacing first From for z2Fresnel transform inverse transformation, then modulated by the complex conjugate of second piece of chaos random phase masks, modulated after Image enter again row distance be z1Fresnel transform inverse transformation, then again by first piece of chaos random phase masks multiple altogether Yoke is modulated, and is finally computed integration imaging technology reengineering and goes out original image.
For making the object, technical solutions and advantages of the present invention clearer, below embodiment of the present invention is made further Ground describes in detail.
Embodiment 1
Based on the optical imagery calculating integration imaging technology and chaos Double random phase in a kind of fresnel transform domain Encryption method, its encryption principle schematic diagram is as shown in figure 1, encryption method is by Image semantic classification part, the generating unit of chaotic key Divide, image encryption and decryption part are grouped into.
(1) Image semantic classification part:
In the encryption method that the present invention provides, calculate integration imaging technology and original image to be encrypted can be modulated into class Pixel pattern matrix like hologram;Compared to optical integration imaging technique, calculating integration imaging technology does not need substantial amounts of light Learn element, therefore can be prevented effectively from the systematic error that optical element brings;Additionally, calculate integration imaging technology can also be effectively Solve optical integration imaging technique in reconstructed image second-rate the problems such as.
(2) generating portion of chaotic key:
In the encryption method that the present invention provides, two pieces of random phase masks playing master key effect are joined by different chaos respectively The two-dimentional Zaslavskii chaos system of numerical control generates, and the initial value of chaos system and control parameter are as master key.Additionally, it is luxuriant and rich with fragrance Alunite ear transformed distances are as the auxiliary key in encryption process.Because in encryption process, key updating is convenient, therefore, this adds Decryption method can be effective against known plain text attack and chosen -plain attact;Additionally, key management and transmission are also more convenient.
(3) image encryption and decryption portion:
1) in ciphering process, pixel pattern matrix is modulated by first piece of chaos random phase masks first, then carries out Distance is z1Fresnel transform, the image after conversion is modulated by second piece of chaos random phase masks again, then enters row distance For z2Fresnel transform;2) in decrypting process, it is z that the image after encryption enters row distance first2Fresnel transform inversion Change, then modulated by the complex conjugate of second piece of chaos random phase masks, modulated after image enter again row distance be z1Phenanthrene The inverse transformation of alunite ear conversion, is then modulated by the complex conjugate of first piece of chaos random phase masks again, is finally computed being integrated into As technology reengineering goes out original image.
In sum, calculate the use of integration imaging technology, complicated light can be prevented effectively from optical integration imaging technique The systematic error that element brings is so that the quality of reconstructed image is significantly improved.Chaotic key using so that This encryption method can be effective against known plain text attack and chosen -plain attact, and key management and transmission are become more Convenient.Fresnel transform distance is as the auxiliary key in encryption process so that the safety of this encryption method is entered The guarantee of one step.
Embodiment 2
With reference to Fig. 1, design principle, the scheme in embodiment 1 is introduced in detail, described below:
Based on the optical imagery calculating integration imaging technology and chaos Double random phase in a kind of fresnel transform domain Encryption method, its encryption principle schematic diagram is as shown in Figure 1.Encryption method is by Image semantic classification part, the generating unit of chaotic key Divide, image encryption and decryption part are grouped into.Specific embodiment with regard to this three part is described in detail respectively below.
(1) Image semantic classification part:
Calculate the pixel pattern matrix that original image to be encrypted can be modulated into similar hologram by integration imaging technology. Wherein, (k, l) the individual pixel image f being obtained by original image O (x, y)kl(x, y) is:
fkl(x, y)=O (- xv+k γ ,-yv+l γ) (1)
Wherein, v=l2/ l is amplification factor, and γ is the spacing between lenslet;(x, y) is that the position of original image is sat Mark, (k, l) is the position coordinateses of lenslet.
By pixel pattern matrix f (x, y) that each pixel image forms it is:
Wherein, p × q represents the quantity of pixel image.
(2) generating portion of chaotic key:
In encryption method, two pieces of chaos random phase masks play master key effect.Below with regard to how using two dimension Zaslavskii chaos system generates this two pieces of chaos random phase masks and describes in detail.
The mathematic(al) representation of the discrete form of two-dimentional Zaslavskii chaos system is:
Wherein, xnAnd ynIt is respectively the input value of chaos system, xn+1And yn+1It is respectively the iteration output valve of chaos system; Mod represents modulo operation, and π represents pi;W, μ, ν are the control parameter of chaos system, and the wherein form of μ is as follows:
When control parameter w=5, when v=0.2, r=2, two-dimentional Zaslavskii system is in chaos state.Merit attention , when above-mentioned control parameter takes other value, two-dimentional Zaslavskii system is likely to be in chaos state.
The size of hypothesis image to be encrypted is M × N number of pixel, then the size of two pieces of chaos random phase masks is also M × N number of pixel.For by the two-dimentional Zaslavskii chaos system of two groups of different chaos state modulator so as to iteration (M × N)/2 After secondary, obtain two groups of random number sequences X1={ x1′,x2′,…,x′(M×N)/2, Y1={ y1′,y2′,…,y′(M×N)/2And X2= {x1″,x2″,…,x″(M×N)/2, Y2={ y1″,y2″,…,y″(M×N)/2}.Wherein, x1′,x2′,…,x′(M×N)/2, y1′, y2′,…,y′(M×N)/2, x1″,x2″,…,x″(M×N)/2And y1″,y2″,…,y″(M×N)/2Iteration output valve for chaos system.Will This two groups of random number sequences are integrated into form Z of two two-dimensional matrixs respectively1={ z 'i,j| i=1,2 ..., M;J=1,2 ..., N } and Z2=z "i,j| i=1,2 ..., M;J=1,2 ..., N }, wherein z 'i,jWith z "i,jFor the element of two-dimensional matrix, i, j represent The position coordinateses of matrix element;Then obtain two pieces of chaos random phase masks, its mathematic(al) representation is respectively C1(x1,y1)=exp (j2πz′i,j) and C2(x2,y2)=exp (j2 π z "i,j).Wherein, (x1,y1) and (x2,y2) represent the random phase of two pieces of chaos respectively The coordinate of position mask present position, j represents imaginary unit.Because chaos random phase mask is by the initial value of chaos system and control Controlling, therefore, the initial value of chaos system and control parameter are as the master key of encryption system for parameter processed.Due to master key and Auxiliary key is all some numerals, and therefore, managing and transmit these numerals will become very convenient;Additionally, in encryption process Updating these numerals also will become very convenient.
(3) image encryption and decryption portion:
1) in ciphering process, pixel pattern matrix f (x, y) is modulated by first piece of chaos random phase masks first, so Laggard row distance is z1Fresnel transform, the image after conversion modulated by second piece of chaos random phase masks again, Ran Houjin Row distance is z2Fresnel transform, through twice modulation and twice convert after can be obtained by encrypted image U (x, y):
Wherein, FrTλ,z{ } represents the fresnel transform for z for the distance, and its form is as follows:
Wherein, U0(x0,y0) represent original image, U1(x1,y1) represent the image after fresnel transform;(x0,y0) and (x1,y1) respectively represent original image and conversion after image position coordinateses;J is imaginary unit, and π is pi, and λ is Object light wave Wavelength.
2) in decrypting process, it is z that the image after encryption enters row distance first2Fresnel transform inverse transformation, then Modulated by the complex conjugate of second piece of chaos random phase masks, modulated after image enter again row distance be z1Fresnel transform Inverse transformation, then modulated it is possible to pixel figure after being deciphered again by the complex conjugate of first piece of chaos random phase masks As array f (x, y):
Wherein, * represents complex conjugate operator.
The pixel pattern matrix obtaining after deciphering is computed integration imaging technology again and reduces it is possible to finally give reconstruct Original image O (x, y):
In sum, calculate the use of integration imaging technology, complicated light can be prevented effectively from optical integration imaging technique The systematic error that element brings is so that the quality of reconstructed image is significantly improved.Chaotic key using so that This encryption method can be effective against known plain text attack and chosen -plain attact, and key management and transmission are become more Convenient.Fresnel transform distance is as the auxiliary key in encryption process so that the safety of this encryption method is entered The guarantee of one step.
Embodiment 3
With reference to specific accompanying drawing, feasibility checking is carried out to the scheme in embodiment 1 and 2, described below:
After piece image (as shown in Fig. 2 (a)) being encrypted using the encryption method that the present invention implements to provide, obtain Shown in encrypted image such as Fig. 2 (b).
By Fig. 2 (b) as can be seen that any information of original image is all hidden.When all keys are all correct, decrypt Image such as Fig. 2 (c) shown in.By Fig. 2 (c) as can be seen that original image can be very good to be reduced.Illustrate to adopt the system pair The encryption of gray level image and deciphering are successful.
Additionally, when other keys of some wrong cipher key are correct, shown in decrypted result such as Fig. 3 (a) -3 (g).Thus It can be seen that, the safety of the system is can be guaranteed.
Fig. 4 (a) -4 (c) is the decrypted image under encryption figure disappearance 12.5%, 25% and 50% information state.Fig. 5 (a) -5 C () is encryption figure containing the decrypted image in the case of 10% Gaussian noise, salt-pepper noise and speckle noise.As can be seen here, even if Encrypted image lacks a part of information or to a certain extent by sound pollution, and the embodiment of the present invention remains able to decrypt necessarily The original image of quality, demonstrates the feasibility of the system, meets the multiple needs in practical application.
To the model of each device in addition to doing specified otherwise, the model of other devices is not limited the embodiment of the present invention, As long as the device of above-mentioned functions can be completed.
It will be appreciated by those skilled in the art that accompanying drawing is the schematic diagram of a preferred embodiment, the embodiments of the present invention Sequence number is for illustration only, does not represent the quality of embodiment.
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all spirit in the present invention and Within principle, any modification, equivalent substitution and improvement made etc., should be included within the scope of the present invention.

Claims (2)

1. a kind of fresnel transform domain chaos Double random phase optical image encryption method, is characterized in that, step is as follows:
1) Image semantic classification part:Using calculating integration imaging, original image to be encrypted is modulated into the pixel of similar hologram Pattern matrix;
2) generating portion of chaotic key:Two pieces of random phase masks playing master key effect are respectively by different chaos state modulator Two-dimentional Zaslavskii chaos system generate, the initial value of chaos system and control parameter as master key, fresnel transform away from From as the auxiliary key in encryption process;
3) image encryption and decryption portion:(1) in ciphering process, pixel pattern matrix is first by first piece of chaos random phase Mask is modulated, and then entering row distance is z1Fresnel transform, the image after conversion is again by second piece of chaos random phase masks Modulation, then entering row distance is z2Fresnel transform;(2) in decrypting process, it is z that the image after encryption enters row distance first2 Fresnel transform inverse transformation, then modulated by the complex conjugate of second piece of chaos random phase masks, modulated after image Entering row distance again is z1Fresnel transform inverse transformation, then adjusted by the complex conjugate of first piece of chaos random phase masks again System, is finally computed integration imaging technology reengineering and goes out original image.
2. fresnel transform domain as claimed in claim 1 chaos Double random phase optical image encryption method, its feature It is to comprise the concrete steps that in one embodiment:
(1) Image semantic classification part:
Using calculating integration imaging, original image to be encrypted is modulated into the pixel pattern matrix of similar hologram, wherein, by (k, l) individual pixel image f that original image O (x, y) obtainskl(x, y) is:
fkl(x, y)=O (- xv+k γ ,-yv+l γ) (1)
Wherein, v is amplification factor, and γ is the spacing between lenslet;(x, y) is the position coordinateses of original image, and (k, l) is little The position coordinateses of lens;
By pixel pattern matrix f (x, y) that each pixel image forms it is:
f ( x , y ) = Σ k = 0 p - 1 Σ l = 0 q - 1 f k l ( x , y ) - - - ( 2 )
Wherein, p × q represents the quantity of pixel image.
(2) generating portion of chaotic key:
In encryption method, two pieces of chaos random phase masks play master key effect, the discrete shape of two-dimentional Zaslavskii chaos system The mathematic(al) representation of formula is:
x n + 1 = [ x n + v ( 1 + μy n ) + w v μ c o s ( 2 πx n ) ] ( mod 1 ) y n + 1 = e - r ( y n + w c o s ( 2 πx n ) ) - - - ( 3 )
Wherein, xnAnd ynIt is respectively the input value of chaos system, xn+1And yn+1It is respectively the iteration output valve of chaos system;Mod table Show modulo operation, π represents pi;W, μ, ν are the control parameter of chaos system, and the wherein form of μ is as follows:
μ = 1 - e - r r
When control parameter w=5, when v=0.2, r=2, two-dimentional Zaslavskii system is in chaos state;When control parameter takes During other numerical value, this system is likely to be in chaos state;
The size of hypothesis image to be encrypted is M × N number of pixel, then the size of two pieces of chaos random phase masks is also M × N number of Pixel.For by the two-dimentional Zaslavskii chaos system of two groups of different chaos state modulator so as to after iteration (M × N)/2 time, Obtain two groups of random number sequences X1={ x '1,x′2,…,x′(M×N)/2, Y1={ y '1,y′2,…,y′(M×N)/2And X2=x "1, x″2,…,x″(M×N)/2, Y2=y "1,y″2,…,y″(M×N)/2, wherein, x '1,x′2,…,x′(M×N)/2, y '1,y′2,…, y′(M×N)/2, x "1,x″2,…,x″(M×N)/2With y "1,y″2,…,y″(M×N)/2For the iteration output valve of chaos system, by this two groups Random number sequence is integrated into form Z of two two-dimensional matrixs respectively1={ z 'i,j| i=1,2 ..., M;J=1,2 ..., N } and Z2= {z′i,j| i=1,2 ..., M;J=1,2 ..., N }, wherein z 'i,jWith z "i,jFor the element of two-dimensional matrix, subscript i, j representing matrix The position coordinateses of element;Then obtain two pieces of chaos random phase masks, its mathematic(al) representation is respectively C1(x1,y1)=exp (j2 π z′i,j) and C2(x2,y2)=exp (j2 π z "i,j), wherein, (x1,y1) and (x2,y2) represent that two pieces of chaos random phases are covered respectively The coordinate of film present position, j represents imaginary unit, because chaos random phase mask is to be joined by the initial value of chaos system and control Controlling, therefore, the initial value of chaos system and control parameter are as the master key of encryption system for number.
(3) image encryption and decryption portion:
1) in ciphering process, pixel pattern matrix f (x, y) is modulated by first piece of chaos random phase masks first, Ran Houjin Row distance is the fresnel transform of z1, and the image after conversion is modulated by second piece of chaos random phase masks again, then enters line-spacing From the fresnel transform for z2, after converting through modulation twice and twice, can be obtained by encrypted image U (x ', y '):
U ( x ′ , y ′ ) = FrT λ , z 2 { FrT λ , z 1 { f ( x , y ) C 1 ( x 1 , y 1 ) } C 2 ( x 2 , y 2 ) } - - - ( 4 )
Wherein, FrTλ,z{ } represents the fresnel transform for z for the distance, and its form is as follows:
U 1 ( x 1 , y 1 ) = FrT λ , z [ U 0 ( x 0 , y 0 ) ] = exp ( j 2 π z / λ ) j λ z ∫ ∫ U 0 ( x 0 , y 0 ) × exp [ j π [ ( x 0 - x 1 ) 2 + ( y 0 - y 1 ) 2 ] / λ z ] dx 0 dy 0 ,
Wherein, U0(x0,y0) represent original image, U1(x1,y1) represent the image after fresnel transform;(x0,y0) and (x1,y1) The position coordinateses of image after representing original image respectively and converting;J is imaginary unit, and π is pi, and λ is the wavelength of Object light wave;
2) in decrypting process, the image after encryption enters the inverse transformation of the fresnel transform that row distance is z2 first, then by the Two pieces of chaos random phase masks complex conjugate modulation, modulated after image enter again row distance be z1 fresnel transform inverse Conversion, is then modulated the pixel image battle array it is possible to after being deciphered by the complex conjugate of first piece of chaos random phase masks again Row f (x, y):
f ( x , y ) = FrT λ , - z 1 { FrT λ , - z 2 [ U ( x ′ , y ′ ) ] C 2 * ( x 2 , y 2 ) } C 1 * ( x 1 , y 1 ) - - - ( 5 )
Wherein, * represents complex conjugate operator;
The pixel pattern matrix obtaining after deciphering is computed integration imaging technology again and reduces it is possible to finally give the original of reconstruct Image O (x, y):
O ( x , y ) = Σ k = 0 p - 1 Σ l = 0 q - 1 f k l ( - x γ + l v , - y γ + k v ) - - - ( 6 ) .
CN201610874788.8A 2016-09-30 2016-09-30 Fresnel transform domain chaotic double random phase encoding optical image encryption method Pending CN106447588A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610874788.8A CN106447588A (en) 2016-09-30 2016-09-30 Fresnel transform domain chaotic double random phase encoding optical image encryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610874788.8A CN106447588A (en) 2016-09-30 2016-09-30 Fresnel transform domain chaotic double random phase encoding optical image encryption method

Publications (1)

Publication Number Publication Date
CN106447588A true CN106447588A (en) 2017-02-22

Family

ID=58171649

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610874788.8A Pending CN106447588A (en) 2016-09-30 2016-09-30 Fresnel transform domain chaotic double random phase encoding optical image encryption method

Country Status (1)

Country Link
CN (1) CN106447588A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110969783A (en) * 2019-12-12 2020-04-07 镇江市第一人民医院 Medical insurance and multi-payment-mode integrated settlement processing system and method
CN111428267A (en) * 2020-03-24 2020-07-17 大唐七台河发电有限责任公司 Distributed enterprise information management system and method based on information sharing mechanism
CN111967030A (en) * 2020-08-12 2020-11-20 浙江师范大学 Optical image encryption and decryption method based on biological information

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101604439A (en) * 2008-06-13 2009-12-16 西北工业大学 A kind of color image encrypting method based on multi-chaos system
CN102520602A (en) * 2011-11-08 2012-06-27 浙江师范大学 Two-step quadrature phase-shift interferometry-based optical image encryption device and method
CN103117859A (en) * 2013-01-23 2013-05-22 山东大学 Asymmetric optical image encryption method based on ellipse curve
US20140307047A1 (en) * 2013-04-15 2014-10-16 Microsoft Corporation Active stereo with adaptive support weights from a separate image

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101604439A (en) * 2008-06-13 2009-12-16 西北工业大学 A kind of color image encrypting method based on multi-chaos system
CN102520602A (en) * 2011-11-08 2012-06-27 浙江师范大学 Two-step quadrature phase-shift interferometry-based optical image encryption device and method
CN103117859A (en) * 2013-01-23 2013-05-22 山东大学 Asymmetric optical image encryption method based on ellipse curve
US20140307047A1 (en) * 2013-04-15 2014-10-16 Microsoft Corporation Active stereo with adaptive support weights from a separate image

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
朱薇: "基于混沌的虚拟光学图像加密关键技术研究", 《中国博士学位论文全文数据库 信息科技辑》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110969783A (en) * 2019-12-12 2020-04-07 镇江市第一人民医院 Medical insurance and multi-payment-mode integrated settlement processing system and method
CN111428267A (en) * 2020-03-24 2020-07-17 大唐七台河发电有限责任公司 Distributed enterprise information management system and method based on information sharing mechanism
CN111967030A (en) * 2020-08-12 2020-11-20 浙江师范大学 Optical image encryption and decryption method based on biological information

Similar Documents

Publication Publication Date Title
Nishchal Optical cryptosystems
CN106485761B (en) Simple lens color image encryption system
Li et al. Asymmetric multiple-image encryption based on the cascaded fractional Fourier transform
CN106651736A (en) Optical image encryption method based on Gyrator transform and coupled chaos
Wang et al. Multiple-image encryption system using cascaded phase mask encoding and a modified Gerchberg–Saxton algorithm in gyrator domain
CN109583216B (en) Single-channel color image encryption method of vector decomposition and phase coding
CN106503568A (en) Canonical cosine transform chaos Double random phase optical image encryption method
CN106447591A (en) Cascade Fresnel holographic encryption system and method combining two-dimensional chaos and constrained optimization algorithm
CN106447588A (en) Fresnel transform domain chaotic double random phase encoding optical image encryption method
Kumar et al. QR code-based non-linear image encryption using Shearlet transform and spiral phase transform
CN106570819A (en) Chaotic and Fresnel transformation and two-step generalized phase shift optical image encryption method
Rakheja et al. Double image encryption scheme for iris template protection using 3D Lorenz system and modified equal modulus decomposition in hybrid transform domain
Wang et al. Double image encryption based on phase–amplitude mixed encoding and multistage phase encoding in gyrator transform domains
Kumar et al. Optical colour image encryption using spiral phase transform and chaotic pixel scrambling
Faragallah Optical double color image encryption scheme in the Fresnel-based Hartley domain using Arnold transform and chaotic logistic adjusted sine phase masks
CN106548044A (en) Canonical hartley transform chaos Double random phase optical image encryption method
CN106485643A (en) Image encryption method based on fractional fourier transform and Double random phase
US20130308776A1 (en) Method and system for conditional access to a digital content, associated terminal and subscriber device
CN106530362A (en) Calculating integral imaging technology and Fourier transform optical image encryption method
Yang et al. Securing color image by using bit-level modified integer nonlinear coupled chaos model in Fresnel diffraction domains
CN106408498B (en) Two-dimension Hyperchaos combination fresnel transform Single-lens Optical image encryption method
Xiong et al. Optical encryption and authentication scheme based on phase-shifting interferometry in a joint transform correlator
Lee et al. Double random phase encryption based orthogonal encoding technique for color images
CN106846232A (en) Several color image encrypting methods based on complete ternary tree structure
CN106504175A (en) Nonlinear optics image encryption method in Gyrator transform domains

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170222

WD01 Invention patent application deemed withdrawn after publication