CN106530363A - Optical image encryption method based on phase cut fractional Fourier transform - Google Patents

Optical image encryption method based on phase cut fractional Fourier transform Download PDF

Info

Publication number
CN106530363A
CN106530363A CN201610943575.6A CN201610943575A CN106530363A CN 106530363 A CN106530363 A CN 106530363A CN 201610943575 A CN201610943575 A CN 201610943575A CN 106530363 A CN106530363 A CN 106530363A
Authority
CN
China
Prior art keywords
image
fourier transform
fractional fourier
encryption
distribution
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610943575.6A
Other languages
Chinese (zh)
Inventor
唐晨
苏永钢
李碧原
谷帆
程佳佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin University
Original Assignee
Tianjin University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin University filed Critical Tianjin University
Priority to CN201610943575.6A priority Critical patent/CN106530363A/en
Publication of CN106530363A publication Critical patent/CN106530363A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T9/00Image coding
    • G06T9/007Transform coding, e.g. discrete cosine transform

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Discrete Mathematics (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The invention relates to the technical field of information security and optical information processing. Known plaintext attacks, chosen plaintext attacks and other password attacks are effectively resisted. The safety is further ensured. The method can strongly resist violent attacks, statistical attacks, noise attacks, cropping attacks and the like. The optical image encryption method based on phase cut fractional Fourier transform comprises the steps of image encryption and image decryption. According to the step of image encryption, an image to be encrypted is first modulated by a first random phase mask during an encryption process; fractional Fourier transform with the order a1 is carried out under the irradiation of plane light; phase cutting is carried out on the image in the complex form after the first fractional Fourier transform to acquire an amplitude distribution part and a phase distribution part; and the amplitude distribution part is modulated by a second random phase mask. According to the step of image decryption, the decrypted image is acquired. The method provided by the invention is mainly applied to design and manufacturing occasions.

Description

Optical image encryption method based on cut fractional fourier transform
Technical field
The present invention relates to information security and optical information processing technical field, more particularly to it is a kind of based on cut fractional Fourier The optical image encryption method of conversion.
Background technology
Digital picture has in the field such as politics, economic, military, education as one of current most popular multimedia form And be widely applied.In Internet technology highly developed today, how to protect digital picture exempt from distort, bootlegging and biography Broadcast with important practical significance.Research to image encryption technology has become one of the focus in current information security field.
As optical information processing technique has high processing rate, high degree of parallelism, can quickly realize convolution and related operation The advantages of, in recent years, carry out the great interest that digital image encryption causes people using optical meanss (see document [1]). In optical image encryption technology, most it is representational be the propositions such as Javidi based on Optical processing system double random phase compile Code method (see document [2]).The technology opens the frontier of optical image encryption, has been born large quantities of optics based on the technology New Method for Encryption and new technique (see Review literature [3]).Additionally, the encryption method based on fractional fourier transform has also been obtained extensively General concern and research are (see document [4] and [5]).
However, great majority are linear symmetric cryptographic systems based on the image encryption system of Double random phase method, i.e., Ciphering process is identical with the key that decrypting process is used.Such linear symmetric cryptographic system easily receives chosen -plain attact and known bright (see document [6] and [7]) such as text attacks.
List of references:
[1]O.Matoba,T.Nomura,E.Perez-Cabre,M.Millan,and B.Javidi,Optical techniques forinformation security,Proceedings of IEEE 2009,97:1128-1148
[2]P.Réfrégier and B.Javidi,Optical image encryption based on input planeand Fourier plane random encoding,Opt.Lett.,1995,20:767-769
[3]S.Liu,C.Guo,and J.T.Sheridan,A review of optical image encryption techniques,Optics&Laser Technology,2014,57:327-342
[4]Unnikrishnan G,Joseph J,Singh K.Optical encryption by double- randomphase encoding in the fractional Fourier domain.Optics Letters,2000,25: 887-889
[5]A.Sinha,K.Singh,Image encryption by using fractional Fourier transform andjigsaw transform in image bit planes.Optical Engineering,2005, 44:057001
[6]X.Peng,P.Zhang,H.Wei,and B.Yu,Known-plaintext attack on opticalencryption based on double random phase keys,Opt.Lett.,2006,31:1044- 1046
[7]W.Stallings,Cryptography and Network Security:Principles and Practice,4th ed.(Prentice Hall,2006)。
The content of the invention
To overcome the deficiencies in the prior art, it is contemplated that realizing being effective against known plain text attack, chosen -plain attact Deng cryptographic attack, safety is further ensured, also with stronger violence attack, statistical attack, attacked by noise and The ability of shearing attack etc..The technical solution used in the present invention is, the optical image encryption based on cut fractional fourier transform Method, step are as follows:
1) the encryption part of image:In ciphering process, image to be encrypted is adjusted by first piece of random phase masks first System, then carries out order for a under the irradiation of planar light1Fractional fourier transform;To Jing first time fractional fourier transforms The image of plural form afterwards carries out cut operation, obtains distribution of amplitudes part and PHASE DISTRIBUTION part;Distribution of amplitudes part quilt Second piece of random phase masks modulation, then carries out order for a under the irradiation of planar light2Fractional fourier transform;To Jing The image of the plural form after second fractional fourier transform carries out cut operation again, obtains distribution of amplitudes part and phase place point Portion part, wherein distribution of amplitudes part are the image after encryption;
2) decryption portion of image:In decrypting process, obtained by decruption key is for the operation of cut twice in ciphering process PHASE DISTRIBUTION part;The PHASE DISTRIBUTION partial modulation that image after encryption is obtained by second cut operation first, Ran Hou Order is carried out under the irradiation of planar light for a2Fractional fourier transform inverse transformation;The image of the plural form after transformed The PHASE DISTRIBUTION partial modulation that mould is obtained by first time cut operation, then carries out order for a under the irradiation of planar light1Point The inverse transformation of number Fourier transformation;Image delivery to the plural form after above-mentioned conversion, the image after being decrypted.
Comprise the concrete steps that in an example of the present invention:
(1) the encryption part of image:
Key used in ciphering process be two pieces of random phase masks, its mathematic(al) representation be respectively exp [j φ (x, Y)] andWherein, j is imaginary unit, φ (x, y) andThe respectively phase of two pieces of random phase masks Bit function, (x, y) and (u, v) are respectively the coordinate of two pieces of random phase mask present positions, and image P (x, y) to be encrypted is first First modulated by first piece of random phase masks exp [j φ (x, y)], then order is carried out under the irradiation of planar light for a1Point Number Fourier transformation, obtains following form:
W (u, v)=FrFTa1{P(x,y)exp[jφ(x,y)]} (1)
Wherein, W (u, v) is the Object light wave of carrying image information before second piece of random phase mask;FrFTa{ } represents rank The secondary fractional fourier transform for a, its form is:
Wherein, Ua(xa,ya) represent the image after conversion, (xa,ya) represent conversion after image present position coordinate;U(x, Y) original image is represented, (x, y) represents the coordinate of original image present position;Sgn () represents sign function.Formula (1) is cut Mutually operate, obtain distribution of amplitudes part Aw(u, v) and PHASE DISTRIBUTION part Pw(u,v):
Aw(u, v)=| W (u, v) | (2)
Pw(u, v)=W (u, v)/| W (u, v) | (3)
Distribution of amplitudes part Aw(u, v) is by second piece of random phase masksModulation, then in planar light Irradiation under carry out order for a2Fractional fourier transform, obtain following form:
Wherein, Object light waves of the O (ξ, η) for carrying image information at output face, (ξ, η) is the position coordinateses at output face. Cut operation is carried out to formula (4), distribution of amplitudes part A is obtainedo(ξ, η) and PHASE DISTRIBUTION part Po(ξ,η):
Ao(ξ, η)=| O (ξ, η) | (5)
Po(ξ, η)=O (ξ, η)/| O (ξ, η) | (6)
Wherein, Ao(ξ, η) is exactly the image after encryption.
(2) decryption portion of image:
In decrypting process, decruption key is Pw(u, v) and Po(ξ, η), the image A after encryptiono(ξ, η) is first by Po(ξ, η) modulate, then order is carried out under the irradiation of planar light for a2Fractional fourier transform inverse transformation;Answering after transformed The mould of the image of number form formula is by Pw(u, v) is modulated, and then carries out order under the irradiation of planar light for a1Fractional fourier transform Inverse transformation;Image delivery to the plural form after above-mentioned conversion, the image after being decrypted
The characteristics of of the invention and beneficial effect are:
In the image encryption method that the present invention is provided, the key used by ciphering process is with the key used by decrypting process not Together.The asymmetrical optical image encryption method can be effective against the cryptographic attacks such as known plain text attack, chosen -plain attact.Point Number Fourier transformation order is used as the additional keys in encryption process so that the safety of encryption method has been obtained further Ensure.Additionally, substantial amounts of numerical simulation experiment shows, also there is the asymmetrical optical image encryption method stronger violence to attack Hit, the ability of statistical attack, attacked by noise and shearing attack etc..
Description of the drawings:
The principle schematic of the image encryption method that Fig. 1 is provided for the present invention;
Fig. 2 encryption and decryption image comparison figures.In figure:
A () is original image to be encrypted;
B () is the image of this encryption method encryption;
C () is decrypted image when all keys are correct;
The various situation decrypted image comparison diagrams of Fig. 3.In figure:
A () is the image obtained using first piece of random phase masks decryption;
B () is the image obtained using second piece of random phase masks decryption;
C () is the P using mistakewThe image that (u, v) decryption is obtained;
D () is the P using mistakeoThe image that (ξ, η) decryption is obtained;
E () is the fractional fourier transform order a using mistake1The image that decryption is obtained;
F () is the fractional fourier transform order a using mistake2The image that decryption is obtained;
Decrypted image comparison diagram under the various noise conditions of Fig. 4.In figure:
A () is that the image for obtaining is decrypted from the encryption figure containing 10% Gaussian noise;
B () is that the image for obtaining is decrypted from the encryption figure containing 10% salt-pepper noise;
C () is that the image for obtaining is decrypted from the encryption figure containing 10% speckle noise;
Fig. 5 shears different proportion decrypted image comparison diagram.In figure:
A () is that the image for obtaining is decrypted from the encryption figure for cutting off 12.5%;
B () is that the image for obtaining is decrypted from the encryption figure for cutting off 25%;
C () is that the image for obtaining is decrypted from the encryption figure for cutting off 50%.
In accompanying drawing, the list of parts representated by each label is as follows:
M1:First piece of random phase masks;M2:Second piece of random phase masks;FrFT:Fractional fourier transform.
Specific embodiment
The invention provides a kind of optical image encryption method based on cut fractional fourier transform.In encryption method, Key used by ciphering process is different from the key used by decrypting process.The asymmetrical optical image encryption method effectively can be supported The cryptographic attacks such as anti-known plain text attack, chosen -plain attact.Fractional fourier transform order is used as the volume in encryption process Outer key so that the safety of encryption method has obtained further guarantee.Additionally, substantial amounts of numerical simulation experiment shows, should Asymmetrical optical image encryption method also has stronger violence attack, statistical attack, attacked by noise and shearing attack etc. Ability.It is described below:
1) the encryption part of image:In ciphering process, image to be encrypted is adjusted by first piece of random phase masks first System, then carries out order for a under the irradiation of planar light1Fractional fourier transform;To Jing first time fractional fourier transforms The image of plural form afterwards carries out cut operation, obtains distribution of amplitudes part and PHASE DISTRIBUTION part;Distribution of amplitudes part quilt Second piece of random phase masks modulation, then carries out order for a under the irradiation of planar light2Fractional fourier transform;To Jing The image of the plural form after second fractional fourier transform carries out cut operation again, obtains distribution of amplitudes part and phase place point Portion part, wherein distribution of amplitudes part are the image after encryption.
2) decryption portion of image:In decrypting process, obtained by decruption key is for the operation of cut twice in ciphering process PHASE DISTRIBUTION part;The PHASE DISTRIBUTION partial modulation that image after encryption is obtained by second cut operation first, Ran Hou Order is carried out under the irradiation of planar light for a2Fractional fourier transform inverse transformation;The image of the plural form after transformed The PHASE DISTRIBUTION partial modulation that mould is obtained by first time cut operation, then carries out order for a under the irradiation of planar light1Point The inverse transformation of number Fourier transformation;Image delivery to the plural form after above-mentioned conversion, it is possible to the image after being decrypted.
To make the object, technical solutions and advantages of the present invention clearer, further is made to embodiment of the present invention below Ground is described in detail.
Embodiment 1
A kind of optical image encryption method based on cut fractional fourier transform, which adds solution principle schematic such as Fig. 1 institutes Show, encryption method is made up of the encryption part of image and the decryption portion of image.
(1) the encryption part of image:
In ciphering process, image to be encrypted is modulated by first piece of random phase masks first, then in planar light Order is carried out under irradiation for a1Fractional fourier transform;Image to the plural form Jing after first time fractional fourier transform Cut operation is carried out, distribution of amplitudes part and PHASE DISTRIBUTION part is obtained;Distribution of amplitudes part is by second piece of random phase masks Modulation, then carries out order for a under the irradiation of planar light2Fractional fourier transform;Second fractional Fourier of Jing is become The image of the plural form after changing carries out cut operation again, obtains distribution of amplitudes part and phase place branch portion, wherein amplitude point Cloth part is the image after encryption.
(2) decryption portion of image:
In decrypting process, decruption key is the resulting PHASE DISTRIBUTION part of the operation of cut twice in ciphering process;Plus The PHASE DISTRIBUTION partial modulation that image after close is obtained by second cut operation first, is then carried out under the irradiation of planar light Order is a2Fractional fourier transform inverse transformation;The mould of the image of the plural form after transformed is operated by first time cut The PHASE DISTRIBUTION partial modulation for obtaining, then carries out order for a under the irradiation of planar light1Fractional fourier transform inversion Change;Image delivery to the plural form after above-mentioned conversion, it is possible to the image after being decrypted.
In sum, in this encryption method, the key used by ciphering process is different from the key used by decrypting process.This is non- Symmetrical optical image encryption method can be effective against the cryptographic attacks such as known plain text attack, chosen -plain attact.In fraction Fu Leaf transformation order is used as the additional keys in encryption process so that the safety of encryption method has obtained further guarantee. Additionally, substantial amounts of numerical simulation experiment shows, also there is the asymmetrical optical image encryption method stronger violence to attack, system The ability of meter attack, attacked by noise and shearing attack etc..
Embodiment 2
The scheme in embodiment 1 is introduced in detail with reference to Fig. 1, design principle, it is described below:
A kind of optical image encryption method based on cut fractional fourier transform, its encryption principle figure as shown in figure 1, plus Decryption method is made up of the encryption part of image and the decryption portion of image.Below this two-part specific embodiment is given respectively With detailed description.
(1) the encryption part of image:
Key used in ciphering process be two pieces of random phase masks, its mathematic(al) representation be respectively exp [j φ (x, Y)] andWherein, j is imaginary unit, φ (x, y) andThe respectively phase of two pieces of random phase masks Bit function, (x, y) and (u, v) are respectively the coordinate of two pieces of random phase mask present positions.Image P (x, y) to be encrypted is first First modulated by first piece of random phase masks exp [j φ (x, y)], then order is carried out under the irradiation of planar light for a1Point Number Fourier transformation, obtains following form:
Wherein, W (u, v) is the Object light wave of carrying image information before second piece of random phase mask;FrFTa{ } represents rank The secondary fractional fourier transform for a, its form is:
Wherein, Ua(xa,ya) represent the image after conversion, (xa,ya) represent conversion after image present position coordinate;U(x, Y) original image is represented, (x, y) represents the coordinate of original image present position;Sgn () represents sign function.Formula (1) is cut Mutually operate, obtain distribution of amplitudes part Aw(u, v) and PHASE DISTRIBUTION part Pw(u,v):
Aw(u, v)=| W (u, v) | (2)
Pw(u, v)=W (u, v)/| W (u, v) | (3)
Distribution of amplitudes part Aw(u, v) is by second piece of random phase masksModulation, then in planar light Irradiation under carry out order for a2Fractional fourier transform, obtain following form:
Wherein, Object light waves of the O (ξ, η) for carrying image information at output face, (ξ, η) is the position coordinateses at output face. Cut operation is carried out to formula (4), distribution of amplitudes part A is obtainedo(ξ, η) and PHASE DISTRIBUTION part Po(ξ,η):
Ao(ξ, η)=| O (ξ, η) | (5)
Po(ξ, η)=O (ξ, η)/| O (ξ, η) | (6)
Wherein, Ao(ξ, η) is exactly the image after encryption.
(2) decryption portion of image:
In decrypting process, decruption key is Pw(u, v) and Po(ξ, η), the image A after encryptiono(ξ, η) is first by Po(ξ, η) modulate, then order is carried out under the irradiation of planar light for a2Fractional fourier transform inverse transformation;Answering after transformed The mould of the image of number form formula is by Pw(u, v) is modulated, and then carries out order under the irradiation of planar light for a1Fractional fourier transform Inverse transformation;Image delivery to the plural form after above-mentioned conversion, it is possible to the image after being decrypted
In sum, in this encryption method, the key used by ciphering process is different from the key used by decrypting process.This is non- Symmetrical optical image encryption method can be effective against the cryptographic attacks such as known plain text attack, chosen -plain attact.In fraction Fu Leaf transformation order is used as the additional keys in encryption process so that the safety of encryption method has obtained further guarantee. Additionally, substantial amounts of numerical simulation experiment shows, also there is the asymmetrical optical image encryption method stronger violence to attack, system The ability of meter attack, attacked by noise and shearing attack etc..
Embodiment 3
Feasibility checking is carried out to the scheme in embodiment 1 and 2 with reference to specific accompanying drawing, it is described below:
After the encryption method for implementing offer using the present invention is encrypted to piece image (as shown in Fig. 2 (a)), obtain Shown in encrypted image such as Fig. 2 (b).
By Fig. 2 (b) as can be seen that any information of original image is all hidden.When all keys are correct, decrypt Image such as Fig. 2 (c) shown in.By Fig. 2 (c) as can be seen that original image can be reduced completely.Illustrate using the system to ash The encryption and decryption of degree image is successful.
Additionally, when correct other keys of some wrong cipher key, shown in decrypted result such as Fig. 3 (a) -3 (f).Thus It can be seen that, the safety of the system can be guaranteed.
Fig. 4 (a) -4 (c) is encryption figure containing the decryption figure in the case of 10% Gaussian noise, salt-pepper noise and speckle noise Picture.Fig. 5 (a) -5 (c) respectively encrypts the decrypted image in the case of figure disappearance 12.5%, 25% and 50%.As can be seen here, even if To a certain extent by sound pollution or lack part information, the embodiment of the present invention remains able to decrypt certain matter encrypted image The original image of amount, demonstrates the feasibility of the system, meets the various needs in practical application.
To the model of each device in addition to specified otherwise is done, the model of other devices is not limited the embodiment of the present invention, As long as the device of above-mentioned functions can be completed.
It will be appreciated by those skilled in the art that accompanying drawing is the schematic diagram of a preferred embodiment, the embodiments of the present invention Sequence number is for illustration only, does not represent the quality of embodiment.
The foregoing is only presently preferred embodiments of the present invention, not to limit the present invention, all spirit in the present invention and Within principle, any modification, equivalent substitution and improvements made etc. should be included within the scope of the present invention.

Claims (2)

1. a kind of optical image encryption method based on cut fractional fourier transform, is characterized in that, step is as follows:
1) the encryption part of image:In ciphering process, image to be encrypted is modulated by first piece of random phase masks first, so Order is carried out under the irradiation of planar light for a afterwards1Fractional fourier transform;To answering Jing after first time fractional fourier transform The image of number form formula carries out cut operation, obtains distribution of amplitudes part and PHASE DISTRIBUTION part;Distribution of amplitudes part is by second piece Random phase masks are modulated, and then carry out order under the irradiation of planar light for a2Fractional fourier transform;To Jing for the second time The image of the plural form after fractional fourier transform carries out cut operation again, obtains distribution of amplitudes part and portion of phase place branch Point, wherein distribution of amplitudes part is the image after encryption;
2) decryption portion of image:In decrypting process, decruption key is the resulting phase of the operation of cut twice in ciphering process Bit distribution part;The PHASE DISTRIBUTION partial modulation that image after encryption is obtained by second cut operation first, then in plane Order is carried out under the irradiation of light for a2Fractional fourier transform inverse transformation;The mould quilt of the image of the plural form after transformed The PHASE DISTRIBUTION partial modulation that first time cut operation is obtained, then carries out order for a under the irradiation of planar light1Fraction Fu In leaf transformation inverse transformation;Image delivery to the plural form after above-mentioned conversion, the image after being decrypted.
2. the optical image encryption method based on cut fractional fourier transform as claimed in claim 1, is characterized in that, one Comprise the concrete steps that in example:
(1) the encryption part of image:
Key used in ciphering process be two pieces of random phase masks, its mathematic(al) representation be respectively exp [j φ (x, y)] andWherein, j is imaginary unit, φ (x, y) andThe phase place letter of respectively two pieces of random phase masks Number, the coordinate of (x, y) and (u, v) respectively two pieces of random phase mask present positions, image P (x, y) to be encrypted first by The modulation of first piece of random phase masks exp [j φ (x, y)], then carries out fraction Fu that order is a1 under the irradiation of planar light In leaf transformation, obtain following form:
W ( u , v ) = FrFT a 1 { P ( x , y ) exp [ j φ ( x , y ) ] } - - - ( 1 )
Wherein, W (u, v) is the Object light wave of carrying image information before second piece of random phase mask;FrFTa{ } represents that order is a Fractional fourier transform, its form is:
U a ( x a , y a ) = FrFT a { U ( x , y ) } ( x a , y a ) = exp [ - j π sgn ( sin a π 2 ) / 4 + j a π / 4 ] | sin a π 2 | 1 / 2 × ∫ - ∞ + ∞ ∫ - ∞ + ∞ U ( x , y ) exp { j π ( x 2 + x a 2 tan a π 2 - 2 ( xx a + yy a ) sin a π 2 + y 2 + y a 2 tan a π 2 ) } d x d y
Wherein, Ua(xa,ya) represent the image after conversion, (xa,ya) represent conversion after image present position coordinate;U (x, y) table Show original image, (x, y) represents the coordinate of original image present position;Sgn () represents sign function.Cut behaviour is carried out to formula (1) Make, obtain distribution of amplitudes part Aw(u, v) and PHASE DISTRIBUTION part Pw(u,v):
Aw(u, v)=| W (u, v) | (2)
Pw(u, v)=W (u, v)/| W (u, v) | (3)
Distribution of amplitudes part Aw(u, v) is by second piece of random phase masksModulation, then in the irradiation of planar light Under carry out order for a2Fractional fourier transform, obtain following form:
Wherein, Object light waves of the O (ξ, η) for carrying image information at output face, (ξ, η) is the position coordinateses at output face.To formula (4) cut operation is carried out, obtains distribution of amplitudes part Ao(ξ, η) and PHASE DISTRIBUTION part Po(ξ,η):
Ao(ξ, η)=| O (ξ, η) | (5)
Po(ξ, η)=O (ξ, η)/| O (ξ, η) | (6)
Wherein, Ao(ξ, η) is exactly the image after encryption.
(2) decryption portion of image:
In decrypting process, decruption key is Pw(u, v) and Po(ξ, η), the image A after encryptiono(ξ, η) is first by Po(ξ, η) is adjusted System, then carries out order for a under the irradiation of planar light2Fractional fourier transform inverse transformation;Plural shape after transformed The mould of the image of formula is by Pw(u, v) is modulated, and then carries out order under the irradiation of planar light for a1Fractional fourier transform it is inverse Conversion;Image delivery to the plural form after above-mentioned conversion, the image after being decrypted
P ^ ( x , y ) = | FrFT - a 1 { | FrFT - a 2 [ A o ( ξ , η ) P o ( ξ , η ) ] | P w ( u , v ) } | - - - ( 7 ) .
CN201610943575.6A 2016-10-26 2016-10-26 Optical image encryption method based on phase cut fractional Fourier transform Pending CN106530363A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610943575.6A CN106530363A (en) 2016-10-26 2016-10-26 Optical image encryption method based on phase cut fractional Fourier transform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610943575.6A CN106530363A (en) 2016-10-26 2016-10-26 Optical image encryption method based on phase cut fractional Fourier transform

Publications (1)

Publication Number Publication Date
CN106530363A true CN106530363A (en) 2017-03-22

Family

ID=58292055

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610943575.6A Pending CN106530363A (en) 2016-10-26 2016-10-26 Optical image encryption method based on phase cut fractional Fourier transform

Country Status (1)

Country Link
CN (1) CN106530363A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108769455A (en) * 2018-05-15 2018-11-06 深圳大学 A kind of identity identifying method and system
CN110191251A (en) * 2019-05-13 2019-08-30 四川大学 A kind of scalability optical image encryption method based on cylinder diffraction and phase truncation

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103279916A (en) * 2013-05-24 2013-09-04 浙江农林大学 Image encryption method based on double random phase encoding and interference principle
CN104794675A (en) * 2015-04-24 2015-07-22 华南师范大学 Phase-cut Fourier transform based image hiding method, image restoring method and image encrypted transmission method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103279916A (en) * 2013-05-24 2013-09-04 浙江农林大学 Image encryption method based on double random phase encoding and interference principle
CN104794675A (en) * 2015-04-24 2015-07-22 华南师范大学 Phase-cut Fourier transform based image hiding method, image restoring method and image encrypted transmission method

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
WAN QIN 等: "Asymmetric cryptosystem based on phase-truncated Fourier transforms", 《OPTICS LETTERS》 *
王银花 等: "基于分频域相位和幅度的数字图像加密新方法", 《计算机技术与发展》 *
马左红 等: "基于双随机相位加密技术的图像隐藏方法", 《光学仪器》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108769455A (en) * 2018-05-15 2018-11-06 深圳大学 A kind of identity identifying method and system
CN108769455B (en) * 2018-05-15 2020-09-11 深圳大学 Identity authentication method and system
CN110191251A (en) * 2019-05-13 2019-08-30 四川大学 A kind of scalability optical image encryption method based on cylinder diffraction and phase truncation

Similar Documents

Publication Publication Date Title
Wang et al. Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform
CN102567943B (en) Asymmetric double image encryption method based on joint of fourier transformation and phase cutting
Kumar et al. Double random phase encoding based optical encryption systems using some linear canonical transforms: weaknesses and countermeasures
CN106651736A (en) Optical image encryption method based on Gyrator transform and coupled chaos
CN106503568A (en) Canonical cosine transform chaos Double random phase optical image encryption method
Carnicer et al. Optical encryption in the longitudinal domain of focused fields
CN106485761A (en) Simple lens color image encryption system
CN106485643A (en) Image encryption method based on fractional fourier transform and Double random phase
CN106548044A (en) Canonical hartley transform chaos Double random phase optical image encryption method
Kumar et al. Multiuser optical image authentication platform based on sparse constraint and polar decomposition in Fresnel domain
CN106504175A (en) Nonlinear optics image encryption method in Gyrator transform domains
CN106530363A (en) Optical image encryption method based on phase cut fractional Fourier transform
CN109413299B (en) Linear regular transformation and chaotic double-random phase coding double-image encryption method
CN106408498B (en) Two-dimension Hyperchaos combination fresnel transform Single-lens Optical image encryption method
CN106447588A (en) Fresnel transform domain chaotic double random phase encoding optical image encryption method
CN106530362A (en) Calculating integral imaging technology and Fourier transform optical image encryption method
CN106530364A (en) Optical image encryption method based on phase-cut Fourier transform
CN106503567A (en) Nonlinear optics image encryption method in linear canonical transform domain
CN106327412B (en) Based on two-dimension discrete cosine transform and two-dimensional chaotic map image encryption method
CN106447589A (en) Double random phase optical image encryption method based on Fourier transform
CN110312053B (en) Optical encryption method based on fractional Fourier spectrum decomposition and mixed random mask
Pan et al. Triple-image encryption based on phase-truncated Fresnel transform and basic vector operation
CN106570818A (en) Optical image encryption method based on LCT and Logistic chaos
CN106504176A (en) Fresnel transform chaos list Optical Image Encryption Using Random Phase Mask method
Yadav et al. Improving security by utilizing hybrid deterministic phase mask and orthogonal encoding

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170322

WD01 Invention patent application deemed withdrawn after publication