CN106570818A - Optical image encryption method based on LCT and Logistic chaos - Google Patents

Optical image encryption method based on LCT and Logistic chaos Download PDF

Info

Publication number
CN106570818A
CN106570818A CN201610945840.4A CN201610945840A CN106570818A CN 106570818 A CN106570818 A CN 106570818A CN 201610945840 A CN201610945840 A CN 201610945840A CN 106570818 A CN106570818 A CN 106570818A
Authority
CN
China
Prior art keywords
chaos
image
lct
random phase
logistic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610945840.4A
Other languages
Chinese (zh)
Inventor
唐晨
苏永钢
李碧原
谷帆
程佳佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin University
Original Assignee
Tianjin University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin University filed Critical Tianjin University
Priority to CN201610945840.4A priority Critical patent/CN106570818A/en
Publication of CN106570818A publication Critical patent/CN106570818A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking

Abstract

The invention relates to image information security and optical information processing, and aims to effectively resist known-plaintext attack and chosen-plaintext attack, make key management and transmission more convenient, further guarantee the security, and achieve good ability to resist violent attack, statistic attack, noise attack and cropping attack. An optical image encryption method based on LCT and Logistic chaos of the invention comprises the following steps: (1) construction of a 2D Logistic chaos: a 2D Logistic chaos system is a 2D extension of a 1D Logistic chaos system; (2) generation of a chaos key: two random phase masks as main keys are respectively generated by 2D Logistic chaos systems controlled by different chaos parameters; and (3) image encryption and decryption based on linear canonical transform LCT: a decrypted image is obtained. The method of the invention is mainly used in image information security and optical information processing occasions.

Description

Optical image encryption method based on LCT and Logistic chaos
Technical field
The present invention relates to image information safety and optical information processing technical field, more particularly to it is a kind of based on the change of linear canonical Change the optical image encryption method of (LCT) and two dimension Logistic chaotic.
Background technology
Digital picture has as one of current most popular multimedia form in the field such as politics, economic, military, education And be widely applied.In Internet technology highly developed today, how to protect digital picture exempt from distort, bootlegging and biography Broadcast with important practical significance.Research to image encryption technology has become one of the focus in current information security field.
Optical information processing technique with its high processing rate, high degree of parallelism, can quickly realize that convolution and related operation etc. are excellent Point, in image encryption research field the great interest (see document [1]) of people is caused.In optical image encryption technology, most Representative is the Double random phase technology (see document [2]) of the propositions such as Javidi.The technology opens optical picture As the frontier of encryption research, large quantities of optical encryption new methods and new technique are born (see Review literature based on the technology [3]).Additionally, as a kind of Fourier transformation of broad sense, fractional fourier transform, fresnel transform etc., linear canonical transform (LCT) can also be used in optical image encryption (see document [4]).
However, in the optical image encryption method based on Double random phase, mostly there are the following problems:
1) key is the random phase mask of picture size, therefore, key management and transmission are inconvenient (see document [5]);
2) because the inconvenience of random phase mask updates, therefore, encryption system is easily attacked by chosen -plain attact and known-plaintext Hit (see document [6] and [7]).
List of references:
[1] O.Matoba, T.Nomura, E.Perez-Cabre, M.Millan, and B.Javidi, Optical Techniques forinformation security, Proceedings of IEEE 2009,97:1128-1148
[2] P.R é fr é gier and B.Javidi, Optical image encryption based on input Planeand Fourier plane random encoding, Opt.Lett., 1995,20:767-769
[3] S.Liu, C.Guo, and J.T.Sheridan, A review of optical image encryption Techniques, Optics&Laser Technology, 2014,57:327-342
[4] A.Sahin, H.Ozaktas, D.Mendlovic, Optical implementations of twodimensional fractional Fourier transforms and linear canonical Transformswith arbitrary parameters.Applied Optics, 1998,37:2130-41
[5] S.Yuan, Y.Xin, M.Liu, S.Yao, and X.Sun, An improved method to enhance The security of double random-phaseencoding in the Fresnel domain, Optics& Laser Technology, 2012,44:51-56
[6] X.Peng, H.Wei, and P.Zhang, Chosen-plaintext attack on lensless Double-randomphase encoding in the Fresnel domain, Opt.Lett., 2006,31:3261-3263
[7] U.Gopinathan, D.S.Monaghan, T.J.Naughton, and J.T.Sheridan, A known- plaintextheuristic attack on the Fourier plane encryption Algorithm.Opt.Express, 2006,14:3181-3186.
The content of the invention
To overcome the deficiencies in the prior art, it is contemplated that proposing image encryption method, realization is effective against known-plaintext Attack and chosen -plain attact, and cause key management and transmission to become more convenient, safety is further ensured, tool There are good violence attack, statistical attack, attacked by noise and shearing attack ability.The technical solution used in the present invention is, base In the optical image encryption method of LCT and Logistic chaos, step is as follows:
1) construction of two dimension Logistic chaotic:Two dimension Logistic chaotic system is dimensional Logistic chaos system 2 D extension;
2) generation of chaotic key:Play two pieces of random phase masks of master key effect respectively by different chaos state modulators Two dimension Logistic chaotic system generate, the initial value and control parameter of chaos system is used as master key;Additionally, linear canonical becomes The geometric parameter of (LCT) system is changed as the auxiliary key in encryption process;
3) image encryption based on linear canonical transform LCT and decryption:(1) in ciphering process, image to be encrypted is first First modulated by first piece of chaos random phase masks, then carry out first time linear canonical transform (LCT1), the image after conversion Modulated by second piece of chaos random phase masks again, then carry out second linear canonical transform (LCT2);(2) in decrypting process In, the image after encryption carries out first the inverse transformation (ILCT2) of second linear canonical transform, then random by second piece of chaos The complex conjugate modulation of phase mask, it is modulated after image carry out the inverse transformation (ILCT1) of first time linear canonical transform again, most Afterwards again by the complex conjugate modulation of first piece of chaos random phase masks.
An example of the invention is comprised the concrete steps that:
(1) construction of two dimension Logistic chaotic:
The mathematic(al) representation of the discrete form of dimensional Logistic chaos system is:
xn+1=μ xn(1-xn) (1)
When control parameter μ ∈ (3.56,4] when, Logistic systems be in chaos state;xnFor the initial of chaos system Value, xn+1For the iteration output valve of chaos system;
It is two dimensional form that dimensional Logistic chaos system is expanded, and the mathematic(al) representation of its discrete form is:
When control parameter μ=4, α=0.89, β=0.89, during γ=0.1, two-dimentional Logistic systems are in chaos shape State;xn, ynThe respectively initial value of two dimension Logistic chaotic system;xn+1And yn+1The respectively output valve of chaos system;
(2) generation of chaotic key:
Two pieces of chaos random phase masks play master key effect in encryption method, linear canonical transform (LCT) system it is several What parameter plays auxiliary key effect.Generate this two pieces of chaos random phases using two dimension Logistic chaotic system with regard to how below Mask describes in detail.
The size for assuming the image to be encrypted is M × N number of pixel, then the size of two pieces of chaos random phase masks is also M × N number of pixel, for the two dimension Logistic chaotic system by two groups of different chaos state modulators so as to iteration (M × N)/2 time Afterwards, two groups of random number sequences X are obtained1={ x '1, x '2..., x '(M×N)/2, Y1={ y '1, y '2..., y '(M×N)/2And X2= {x″1, x "2..., x "(M×N)/2, Y2=y "1, y "2..., y "(M×N)/2};Wherein, x '1, x '2..., x '(M×N)/2, y '1, y ′2..., y '(M×N)/2, x "1, x "2..., x "(M×N)/2With y "1, y "2..., y "(M×N)/2For the output valve of chaos system, by this two groups Random number sequence is integrated into respectively form Z of two two-dimensional matrixs1={ z 'M, n| m=1,2 ..., M;N=1,2 ..., N } and Z2= {z″M, n| m=1,2 ..., M;N=1,2 ..., N }, wherein z 'M, nWith z "M, nFor the element of two-dimensional matrix, m, n are matrix element Coordinate.Two pieces of chaos random phase masks can be then obtained, its mathematic(al) representation is respectively C1(x1, y1)=exp (j2 π z 'M, n) And C2(x2, y2)=exp (j2 π z "M, n);Wherein, (x1, y1) and (x2, y2) it is respectively position residing for two pieces of chaos random phase masks The coordinate put, j is imaginary unit, and π is pi;
(3) image encryption based on linear canonical transform (LCT) and decryption:
1) in ciphering process, image U to be encrypted0(x0, y0) modulated by first piece of chaos random phase masks first, Then first time linear canonical transform LCT1 is carried out, the image after conversion is modulated again by second piece of chaos random phase masks, so After carry out second linear canonical transform LCT2, Jing modulate twice and twice convert after can be obtained by encrypted image U (x, y):
Wherein, (x0, y0) and (x, y) be respectively the coordinate of original image and encrypted image present position;LCTα, beta, gamma{ } table Show that transformation parameter is α, the linear canonical transform of beta, gamma, its form is as follows:
In formula (3), α1, β1, γ1And α2, β2, γ2There is respectively following form:
Wherein, λ is the wavelength of Object light wave, and f is the focal length of lens;d1, d2, d3, d4For the geometry of linear canonical transform system Parameter;
2) in decrypting process, image U (x, y) after encryption carries out first the inverse transformation of second linear canonical transform ILCT2, then by the complex conjugate modulation of second piece of chaos random phase masks, it is modulated after image carry out the first sublinear again The inverse transformation ILCT1 of contact transformation, finally again by the complex conjugate modulation of first piece of chaos random phase masks, after being decrypted Image
Wherein, * is complex conjugate operator.
Of the invention the characteristics of and beneficial effect are:
In the optical image encryption method that the present invention is provided, the use of chaotic key so that this encryption method can be effective Opposing known plain text attack and chosen -plain attact, and cause key management and transmission to become more convenient.Linear canonical transform (LCT) geometric parameter of system is used as the auxiliary key in encryption process so that the safety of this encryption method is entered The guarantee of one step.
Description of the drawings:
Fig. 1 encryption process schematic diagrams.In figure:
The ciphering process schematic diagram of a optical image encryption method that () provides for the present invention;
The decrypting process schematic diagram of b optical image encryption method that () provides for the present invention;
Fig. 2 encryption and decryption image comparison figures.In figure:
A () is original image to be encrypted;
B () is the image of this method encryption;
C () is decrypted image when all keys are correct;
Decrypted image comparison diagram under Fig. 3 different situations.In figure:
A () is the initial value x of the two dimension Logistic chaotic system for controlling second piece of random phase masks2Mistake, other are close Decrypted image when key is correct;
B () is the initial value y of the two dimension Logistic chaotic system for controlling second piece of random phase masks2Mistake, other are close Decrypted image when key is correct;
C () is control parameter μ of the two dimension Logistic chaotic system for controlling second piece of random phase masks2Mistake, its Decrypted image when its key is correct;
D () is control parameter α of the two dimension Logistic chaotic system for controlling second piece of random phase masks2Mistake, its Decrypted image when its key is correct;
E () is control parameter β of the two dimension Logistic chaotic system for controlling second piece of random phase masks2Mistake, its Decrypted image when its key is correct;
F () is control parameter γ of the two dimension Logistic chaotic system for controlling second piece of random phase masks2Mistake, its Decrypted image when its key is correct;
G () is the geometric parameter d of linear canonical transform (LCT) system1Mistake, decryption figure when other keys are correct Picture;
H () is the geometric parameter d of linear canonical transform (LCT) system2Mistake, decryption figure when other keys are correct Picture;
I () is the geometric parameter d of linear canonical transform (LCT) system3Mistake, decryption figure when other keys are correct Picture;
J () is the geometric parameter d of linear canonical transform (LCT) system4Mistake, decryption figure when other keys are correct Picture;
Decrypted image comparison diagram under Fig. 4 difference deletion conditions.
A () is that the image for obtaining is decrypted from the encryption figure of 12.5% information of disappearance;
B () is that the image for obtaining is decrypted from the encryption figure of 25% information of disappearance;
C () is that the image for obtaining is decrypted from the encryption figure of 50% information of disappearance;
Fig. 5 difference noise like decrypted image comparison diagrams.In figure:
A () is that the image for obtaining is decrypted from the encryption figure containing 10% Gaussian noise;
B () is that the image for obtaining is decrypted from the encryption figure containing 10% salt-pepper noise;
C () is that the image for obtaining is decrypted from the encryption figure containing 10% speckle noise;
In accompanying drawing, the list of parts representated by each label is as follows:
CRPM1:First piece of chaos random phase masks;CRPM2:Second piece of chaos random phase masks;CRPM1*:First The complex conjugate of block chaos random phase masks;CRPM2*:The complex conjugate of second piece of chaos random phase masks;L1:Lens;L2:Thoroughly Mirror.
Specific embodiment
The invention provides a kind of optical image encryption for being based on linear canonical transform (LCT) and two dimension Logistic chaotic Method.The optical image encryption method that the present invention is provided by two dimension Logistic chaotic construction, the generation of chaotic key is based on The image encryption and decryption composition of linear canonical transform (LCT).The use of chaotic key so that this encryption method can be supported effectively Anti- known plain text attack and chosen -plain attact, and cause key management and transmission to become more convenient.Linear canonical transform (LCT) geometric parameter of system is used as the auxiliary key in encryption process so that the safety of this encryption method is entered The guarantee of one step.Many experiments show that this encryption method has good violence attack, statistical attack, attacked by noise and cuts Cut attacking ability.It is described below:
1) construction of two dimension Logistic chaotic:Two dimension Logistic chaotic system is dimensional Logistic chaos system 2 D extension;Compared to dimensional Logistic chaos system, two dimension Logistic chaotic system has bigger parameter space, more Good pseudo-randomness and more random number sequences can be produced.
2) generation of chaotic key:Play two pieces of random phase masks of master key effect respectively by different chaos state modulators Two dimension Logistic chaotic system generate, the initial value and control parameter of chaos system is used as master key;Additionally, linear canonical becomes The geometric parameter of (LCT) system is changed as the auxiliary key in encryption process.Because key updating is convenient in encryption process, Therefore, this encryption method can be effective against known plain text attack and chosen -plain attact;Additionally, key management and transmission are also more For convenience.
3) image encryption based on linear canonical transform (LCT) and decryption:(1) in ciphering process, image to be encrypted Modulated by first piece of chaos random phase masks first, then carry out first time linear canonical transform (LCT1), the figure after conversion , by second piece of chaos random phase masks modulation, second linear canonical transform (LCT2) is then carried out as again;(2) decrypted Cheng Zhong, the image after encryption carries out first the inverse transformation (ILCT2) of second linear canonical transform, then by second piece of chaos with The complex conjugate modulation of machine phase mask, it is modulated after image carry out the inverse transformation (ILCT1) of first time linear canonical transform again, It is last to be modulated by the complex conjugate of first piece of chaos random phase masks again.
To make the object, technical solutions and advantages of the present invention clearer, below further is made to embodiment of the present invention Ground is described in detail.
Embodiment 1
Based on linear canonical transform (LCT) and the optical image encryption method of two dimension Logistic chaotic, it adds solution to one kind Close process schematic as shown in figure 1, encryption method by two dimension Logistic chaotic construction, the generation of chaotic key, based on line Property contact transformation (LCT) image encryption and decryption composition.
(1) construction of two dimension Logistic chaotic:
In the encryption method that the present invention is provided, two dimension Logistic chaotic system is the two of dimensional Logistic chaos system Dimension is expanded;Compared to dimensional Logistic chaos system, two dimension Logistic chaotic system has bigger parameter space, more preferably Pseudo-randomness and more random number sequences can be produced.
(2) generation of chaotic key:
In the encryption method that the present invention is provided, two pieces of random phase masks for playing master key effect are joined respectively by different chaos The two dimension Logistic chaotic system of numerical control is generated, and the initial value and control parameter of chaos system is used as master key;Additionally, linear The geometric parameter of contact transformation (LCT) system is used as the auxiliary key in encryption process.Because key is more in encryption process It is new convenient, therefore, this encryption method can be effective against known plain text attack and chosen -plain attact;Additionally, key management and Transmission is also more convenient.
(3) image encryption based on linear canonical transform (LCT) and decryption:
1) in ciphering process, image to be encrypted is modulated first by first piece of chaos random phase masks, is then carried out First time linear canonical transform (LCT1), the image after conversion is modulated again by second piece of chaos random phase masks, is then carried out Second linear canonical transform (LCT2);2) in decrypting process, the image after encryption carries out first the change of the second sublinear canonical The inverse transformation (ILCT2) changed, then by the complex conjugate modulation of second piece of chaos random phase masks, it is modulated after image enter again The inverse transformation (ILCT1) of row first time linear canonical transform, finally again by the complex conjugate tune of first piece of chaos random phase masks System.
In sum, the use of chaotic key so that this encryption method can be effective against known plain text attack and selection Plaintext attack, and cause key management and transmission to become more convenient.The geometric parameter conduct of linear canonical transform (LCT) system Auxiliary key in encryption process so that the safety of this encryption method has obtained further guarantee.
Embodiment 2
The scheme in embodiment 1 is introduced in detail with reference to Fig. 1, design principle, it is described below:
Based on linear canonical transform (LCT) and the optical image encryption method of two dimension Logistic chaotic, it adds solution to one kind Close process schematic is as shown in Figure 1.Encryption method by two dimension Logistic chaotic construction, the generation of chaotic key, based on line Property contact transformation (LCT) image encryption and decryption composition.The specific embodiment of this three part is given respectively in detail below Description.
(1) construction of two dimension Logistic chaotic:
The mathematic(al) representation of the discrete form of dimensional Logistic chaos system is:
xn+1=μ xn(1-xn) (1)
When control parameter μ ∈ (3.56,4] when, Logistic systems be in chaos state;xnFor the initial of chaos system Value, xn+1For the iteration output valve of chaos system.
It is two dimensional form that dimensional Logistic chaos system is expanded, and the mathematic(al) representation of its discrete form is:
When control parameter μ=4, α=0.89, β=0.89, during γ=0.1, two-dimentional Logistic systems are in chaos shape State;xn, ynThe respectively initial value of two dimension Logistic chaotic system;xn+1And yn+1The respectively output valve of chaos system.It is worth note Meaning, when above-mentioned control parameter takes other values, two-dimentional Logistic systems are likely in mixed degree state.
(2) generation of chaotic key:
Two pieces of chaos random phase masks play master key effect in encryption method, linear canonical transform (LCT) system it is several What parameter plays auxiliary key effect.Generate this two pieces of chaos random phases using two dimension Logistic chaotic system with regard to how below Mask describes in detail.
The size for assuming the image to be encrypted is M × N number of pixel, then the size of two pieces of chaos random phase masks is also M × N number of pixel, for the two dimension Logistic chaotic system by two groups of different chaos state modulators so as to iteration (M × N)/2 time Afterwards, two groups of random number sequences X are obtained1={ x '1, x '2..., x '(M×N)/2, Y1={ y '1, y '2..., y '(M×N)/2And X2= {x″1, x "2..., x "(M×N)/2, Y2=y "1, y "2..., y "(M×N)/2};Wherein, x '1, x '2..., x '(M×N)/2, y '1, y ′2..., y '(M×N)/2, x "1, x "2..., x "(M×N)/2With y "1, y "2..., y "(M×N)/2For the output valve of chaos system.By this two groups Random number sequence is integrated into respectively form Z of two two-dimensional matrixs1={ z 'M, n| m=1,2 ..., M;N=1,2 ..., N } and Z2= {z″M, n| m=1,2 ..., M;N=1,2 ..., N }, wherein z 'M, nWith z "M, nFor the element of two-dimensional matrix, m, n are matrix element Coordinate.Two pieces of chaos random phase masks can be then obtained, its mathematic(al) representation is respectively C1(x1, y1)=exp (j2 π z 'M, n) And C2(x2, y2)=exp (j2 π z "M, n);Wherein, (x1, y1) and (x2, y2) it is respectively position residing for two pieces of chaos random phase masks The coordinate put, j is imaginary unit, and π is pi.Because chaos random phase mask is by the initial value and control ginseng of chaos system Number controlling, therefore, the master key of the initial value and control parameter of chaos system as encryption system.Due to master key and auxiliary Key is all some numerals, therefore, managing and transmit these numerals will become very convenient;Additionally, updating in encryption process These numerals will also become very convenient.
(3) image encryption based on linear canonical transform (LCT) and decryption:
1) in ciphering process, image U to be encrypted0(x0, y0) modulated by first piece of chaos random phase masks first, Then first time linear canonical transform LCT1 is carried out, the image after conversion is modulated again by second piece of chaos random phase masks, so After carry out second linear canonical transform LCT2, Jing modulate twice and twice convert after can be obtained by encrypted image U (x, y):
Wherein, (x0, y0) and (x, y) be respectively the coordinate of original image and encrypted image present position;LCTα, beta, gamma{ } table Show that transformation parameter is α, the linear canonical transform of beta, gamma, its form is as follows:
In formula (3), α1, β1, γ1And α2, β2, γ2There is respectively following form:
Wherein, λ is the wavelength of Object light wave, and f is the focal length of lens;d1, d2, d3, d4For the geometry of linear canonical transform system Parameter.
2) in decrypting process, image U (x, y) after encryption carries out first the inverse transformation of second linear canonical transform ILCT2, then by the complex conjugate modulation of second piece of chaos random phase masks, it is modulated after image carry out the first sublinear again The inverse transformation ILCT1 of contact transformation, finally again by the complex conjugate modulation of first piece of chaos random phase masks, after being decrypted Image
Wherein, * is complex conjugate operator.
In sum, the use of chaotic key so that this encryption method can be effective against known plain text attack and selection Plaintext attack, and cause key management and transmission to become more convenient.The geometric parameter conduct of linear canonical transform (LCT) system Auxiliary key in encryption process so that the safety of this encryption method has obtained further guarantee.
Embodiment 3
Feasibility checking is carried out to the scheme in embodiment 1 and 2 with reference to specific accompanying drawing, it is described below:
After the encryption method for implementing offer using the present invention is encrypted to piece image (as shown in Fig. 2 (a)), obtain Shown in encrypted image such as Fig. 2 (b).
By Fig. 2 (b) as can be seen that any information of original image is all hidden.When all keys are correct, decrypt Image such as Fig. 2 (c) shown in.By Fig. 2 (c) as can be seen that original image can be reduced completely.Illustrate using the system to ash The encryption and decryption of degree image is successful.
Additionally, when some wrong cipher key during correct other keys, shown in decrypted result such as Fig. 3 (a) -3 (j).Thus It can be seen that, the safety of the system can be guaranteed.
Fig. 4 (a) -4 (c) is the decrypted image under encryption figure 12.5%, 25% and 50% information state of disappearance.Fig. 5 (a) -5 C () is encryption figure containing the decrypted image in the case of 10% Gaussian noise, salt-pepper noise and speckle noise.As can be seen here, even if Encrypted image lacks a part of information or to a certain extent by sound pollution, and the embodiment of the present invention remains able to decrypt necessarily The original image of quality, demonstrates the feasibility of the system, meets the various needs in practical application.
To the model of each device in addition to specified otherwise is done, the model of other devices is not limited the embodiment of the present invention, As long as the device of above-mentioned functions can be completed.
It will be appreciated by those skilled in the art that accompanying drawing is the schematic diagram of a preferred embodiment, the embodiments of the present invention Sequence number is for illustration only, does not represent the quality of embodiment.
The foregoing is only presently preferred embodiments of the present invention, not to limit the present invention, all spirit in the present invention and Within principle, any modification, equivalent substitution and improvements made etc. should be included within the scope of the present invention.

Claims (2)

1. a kind of optical image encryption method based on LCT and Logistic chaos, is characterized in that, step is as follows:
1) construction of two dimension Logistic chaotic:Two dimension Logistic chaotic system is the two dimension of dimensional Logistic chaos system Expand;
2) generation of chaotic key:Play two pieces of random phase masks of master key effect respectively by the two of different chaos state modulators Dimension Logistic chaos systems are generated, and the initial value and control parameter of chaos system is used as master key;Additionally, linear canonical transform (LCT) geometric parameter of system is used as the auxiliary key in encryption process;
3) image encryption based on linear canonical transform LCT and decryption:(1) in ciphering process, image to be encrypted first by The modulation of first piece of chaos random phase masks, then carries out first time linear canonical transform (LCT1), the image after conversion again by Second piece of chaos random phase masks modulation, then carries out second linear canonical transform (LCT2);(2) in decrypting process, Image after encryption carries out first the inverse transformation (ILCT2) of second linear canonical transform, then by the random phase of second piece of chaos The complex conjugate modulation of bit mask, it is modulated after image carry out the inverse transformation (ILCT1) of first time linear canonical transform again, finally Again by the complex conjugate modulation of first piece of chaos random phase masks.
2. the optical image encryption method based on LCT and Logistic chaos as claimed in claim 1, is characterized in that, one Example is comprised the concrete steps that:
(1) construction of two dimension Logistic chaotic:
The mathematic(al) representation of the discrete form of dimensional Logistic chaos system is:
xn+1=μ xn(1-xn) (1)
When control parameter μ ∈ (3.56,4] when, Logistic systems be in chaos state;xnFor the initial value of chaos system, xn+1 For the iteration output valve of chaos system;
It is two dimensional form that dimensional Logistic chaos system is expanded, and the mathematic(al) representation of its discrete form is:
x n + 1 = μαx n ( 1 - x n ) + γy n y n + 1 = μβy n ( 1 - y n ) + γx n - - - ( 2 )
When control parameter μ=4, α=0.89, β=0.89, during γ=0.1, two-dimentional Logistic systems are in chaos state;xn, ynThe respectively initial value of two dimension Logistic chaotic system;xn+1And yn+1The respectively output valve of chaos system;
(2) generation of chaotic key:
Two pieces of chaos random phase masks play master key effect, the geometric parameters of linear canonical transform (LCT) system in encryption method It is several to play auxiliary key effect.Generate this two pieces of chaos random phase masks using two dimension Logistic chaotic system with regard to how below Describe in detail.
The size for assuming the image to be encrypted is M × N number of pixel, then the size of two pieces of chaos random phase masks is also M × N number of Pixel, for the two dimension Logistic chaotic system by two groups of different chaos state modulators so as to after iteration (M × N)/2 time, obtain To two groups of random number sequences X1={ x '1,x′2,…,x′(M×N)/2, Y1={ y '1,y′2,…,y′(M×N)/2And X2=x "1,x ″2,…,x″(M×N)/2, Y2=y "1,y″2,…,y″(M×N)/2};Wherein, x '1,x′2,…,x′(M×N)/2, y '1,y′2,…, y′(M×N)/2, x "1,x″2,…,x″(M×N)/2With y "1,y″2,…,y″(M×N)/2It is random by this two groups for the output valve of chaos system Number Sequence is integrated into respectively form Z of two two-dimensional matrixs1={ z 'm,n| m=1,2 ..., M;N=1,2 ..., N } and Z2= {z″m,n| m=1,2 ..., M;N=1,2 ..., N }, wherein z 'm,nWith z "m,nFor the element of two-dimensional matrix, m, n are matrix element Coordinate.Two pieces of chaos random phase masks can be then obtained, its mathematic(al) representation is respectively C1(x1,y1)=exp (j2 π z 'm,n) And C2(x2,y2)=exp (j2 π z "m,n);Wherein, (x1,y1) and (x2,y2) it is respectively position residing for two pieces of chaos random phase masks The coordinate put, j is imaginary unit, and π is pi;
(3) image encryption based on linear canonical transform (LCT) and decryption:
1) in ciphering process, image U to be encrypted0(x0,y0) modulated by first piece of chaos random phase masks first, then First time linear canonical transform LCT1 is carried out, the image after conversion is modulated again by second piece of chaos random phase masks, Ran Houjin Second linear canonical transform LCT2 of row, Jing after modulating twice and convert twice encrypted image U (x, y) is can be obtained by:
U ( x , y ) = LCT α 2 , β 2 , γ 2 { LCT α 1 , β 1 , γ 1 { U 0 ( x 0 , y 0 ) C 1 ( x 1 , y 1 ) } C 2 ( x 2 , y 2 ) } - - - ( 3 )
Wherein, (x0,y0) and (x, y) be respectively the coordinate of original image and encrypted image present position;LCTα,β,γ{ } represents and becomes It is α to change parameter, and the linear canonical transform of beta, gamma, its form is as follows:
U ( x , y ) = LCT α , β , γ { U 0 ( x 0 , y 0 ) } ( x , y ) = β · exp ( - j π 4 ) ∫ - ∞ + ∞ ∫ - ∞ + ∞ U 0 ( x 0 , y 0 ) exp { α ( x 0 2 + y 0 2 ) - 2 β ( x 0 x + y 0 y ) + γ ( x 2 + y 2 ) } dx 0 dy 0 - - - ( 4 )
In formula (3), α111And α222There is respectively following form:
α 1 = d 1 - f λ [ f ( d 1 + d 2 ) - d 1 d 2 ]
β 1 = f λ [ f ( d 1 + d 2 ) - d 1 d 2 ]
γ 1 = d 2 - f λ [ f ( d 1 + d 2 ) - d 1 d 2 ]
α 2 = d 3 - f λ [ f ( d 3 + d 4 ) - d 3 d 4 ]
β 2 = f λ [ f ( d 3 + d 4 ) - d 3 d 4 ]
γ 2 = d 4 - f λ [ f ( d 3 + d 4 ) - d 3 d 4 ] - - - ( 5 )
Wherein, λ is the wavelength of Object light wave, and f is the focal length of lens;d1,d2,d3,d4For the geometric parameter of linear canonical transform system;
2) in decrypting process, image U (x, y) after encryption carries out first the inverse transformation ILCT2 of second linear canonical transform, Then by the complex conjugate modulation of second piece of chaos random phase masks, it is modulated after image carry out the change of the first sublinear canonical again The inverse transformation ILCT1 for changing, finally again by the complex conjugate modulation of first piece of chaos random phase masks, the image after being decrypted
Wherein, * is complex conjugate operator.
CN201610945840.4A 2016-10-26 2016-10-26 Optical image encryption method based on LCT and Logistic chaos Pending CN106570818A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610945840.4A CN106570818A (en) 2016-10-26 2016-10-26 Optical image encryption method based on LCT and Logistic chaos

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610945840.4A CN106570818A (en) 2016-10-26 2016-10-26 Optical image encryption method based on LCT and Logistic chaos

Publications (1)

Publication Number Publication Date
CN106570818A true CN106570818A (en) 2017-04-19

Family

ID=58536576

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610945840.4A Pending CN106570818A (en) 2016-10-26 2016-10-26 Optical image encryption method based on LCT and Logistic chaos

Country Status (1)

Country Link
CN (1) CN106570818A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108898540A (en) * 2018-05-23 2018-11-27 西安理工大学 Dual image encryption method based on discrete fraction angular transformation and chaology

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103679625A (en) * 2013-11-08 2014-03-26 西安理工大学 Single-channel color image encryption method based on chaos and phase retrieval process
CN104063833A (en) * 2013-03-21 2014-09-24 中国水利水电科学研究院 Image encryption and reading methods and devices

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104063833A (en) * 2013-03-21 2014-09-24 中国水利水电科学研究院 Image encryption and reading methods and devices
CN103679625A (en) * 2013-11-08 2014-03-26 西安理工大学 Single-channel color image encryption method based on chaos and phase retrieval process

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
刘镔: "混沌与信息隐藏相关技术研究", 《中国优秀博硕士学位论文全文数据库 (硕士) 信息科技辑》 *
朱薇: "基于混沌的虚拟光学图像加密关键技术研究", 《中国博士学位论文全文数据库 信息科技辑》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108898540A (en) * 2018-05-23 2018-11-27 西安理工大学 Dual image encryption method based on discrete fraction angular transformation and chaology

Similar Documents

Publication Publication Date Title
CN106651736A (en) Optical image encryption method based on Gyrator transform and coupled chaos
CN106485761B (en) Simple lens color image encryption system
Singh Nonlinear optical double image encryption using random-optical vortex in fractional Hartley transform domain
Liu et al. Double-image encryption based on the affine transform and the gyrator transform
CN106503568A (en) Canonical cosine transform chaos Double random phase optical image encryption method
Luan et al. Asymmetric image encryption and authentication based on equal modulus decomposition in the Fresnel transform domain
CN106548044A (en) Canonical hartley transform chaos Double random phase optical image encryption method
Wang et al. Multiple-image encryption system using cascaded phase mask encoding and a modified Gerchberg–Saxton algorithm in gyrator domain
CN106570819A (en) Chaotic and Fresnel transformation and two-step generalized phase shift optical image encryption method
CN106447591A (en) Cascade Fresnel holographic encryption system and method combining two-dimensional chaos and constrained optimization algorithm
CN106485643A (en) Image encryption method based on fractional fourier transform and Double random phase
CN103295185A (en) Asymmetrical image encryption method based on random amplitude plate and Fourier transformation
Ahouzi et al. Optical triple random-phase encryption
Chen et al. Optical image encryption based on multiple-region plaintext and phase retrieval in three-dimensional space
Yang et al. Securing color image by using bit-level modified integer nonlinear coupled chaos model in Fresnel diffraction domains
CN106408498B (en) Two-dimension Hyperchaos combination fresnel transform Single-lens Optical image encryption method
CN106846232A (en) Several color image encrypting methods based on complete ternary tree structure
CN106504175A (en) Nonlinear optics image encryption method in Gyrator transform domains
CN106447588A (en) Fresnel transform domain chaotic double random phase encoding optical image encryption method
CN106570818A (en) Optical image encryption method based on LCT and Logistic chaos
CN106530362A (en) Calculating integral imaging technology and Fourier transform optical image encryption method
CN109413299A (en) Linear canonical transform and chaos Double random phase dual image encryption method
CN106529311A (en) Three-step generalized phase-shifting and cascade fractional Fourier transform optical image encryption method
CN106530363A (en) Optical image encryption method based on phase cut fractional Fourier transform
CN106447589A (en) Double random phase optical image encryption method based on Fourier transform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170419