CN107835333A - More image encryption methods based on compressed sensing relevance imaging - Google Patents

More image encryption methods based on compressed sensing relevance imaging Download PDF

Info

Publication number
CN107835333A
CN107835333A CN201711169514.XA CN201711169514A CN107835333A CN 107835333 A CN107835333 A CN 107835333A CN 201711169514 A CN201711169514 A CN 201711169514A CN 107835333 A CN107835333 A CN 107835333A
Authority
CN
China
Prior art keywords
image
information
coding
width
msub
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711169514.XA
Other languages
Chinese (zh)
Inventor
康祎
张雷洪
孙庆丽
占文杰
曾茜
熊锐
袁晓
叶华龙
田苗
齐梦瑶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Shanghai for Science and Technology
Original Assignee
University of Shanghai for Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Shanghai for Science and Technology filed Critical University of Shanghai for Science and Technology
Priority to CN201711169514.XA priority Critical patent/CN107835333A/en
Publication of CN107835333A publication Critical patent/CN107835333A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering

Abstract

The present invention relates to a kind of more image encryption methods based on compressed sensing relevance imaging, more images of collection are encrypted first:Different pictures is subjected to Unified coding and then deviation is gradually overlapped at an appropriate location by the image after coding, finally imaging is associated with the image after Stochastic Modulation signal and superposition, obtain a series of information after encryptions, that is ciphertext, coding information and Stochastic Modulation signal are combined as key;During information transfer, pass loser and recipient both sides share the key, the ciphertext is transmitted between both sides;Key and ciphertext are compressed into perception when finally decrypting to calculate, reconstruct cleartext information, i.e. multiple image.This encryption method realizes coding and relevance imaging double layer encryption, adds the difficulty of decoding.When decryption, realize that double layer encryption once unties mode, while compressed sensing algorithm can reconstruct cleartext information under less sampling number, greatly improve decryption efficiency, and new method is provided for more image encryptions.

Description

More image encryption methods based on compressed sensing relevance imaging
Technical field
The present invention relates to a kind of image encryption technology, more particularly to a kind of more images based on compressed sensing relevance imaging add Decryption method.
Background technology
In order to ensure the safe transmission of digital picture, large quantities of digital image encryption methods have been emerged in large numbers, wherein with The Double random phase technology of the propositions such as Refregier is most widely applied.But with the development of technology, single adds Secret skill art can not meet to be actually needed, and for more image encryptions, existing technology uses Gerchberg-Saxton phases mostly Position iterative algorithm, but in order to mitigate system complexity, this method tackles DeGrain in the defence of plaintext attack again.
Relevance imaging realizes the separation of imaging detection and object, it also avoid being disturbed because carrying the light field of object information The problem of random and unavailable clear image.Information is mainly carried on object to be imaged by relevance imaging encipherment scheme, So that diffusion of information is in the space distribution information of object, and distributes key in a manner of one-time pad, the randomness of key increases The strong randomness of ciphertext, and then add the difficulty of decoding.Relevance imaging is applied to image encryption by someone at present, such as profit With ghost imaging is calculated, Pere etc. realizes single image optical encryption;Chen etc. proposes produces three using Phase Retrieve Algorithm Key is tieed up, so as to carry out the method for image encryption.But the image encryption technology for being currently based on ghost imaging is to be directed to single width mostly The encryption of image, and the research for more image encryption technologies is then quite deficient.
The content of the invention
The present invention be directed to the problem of more image encryption technology scarcities, it is proposed that a kind of based on compressed sensing relevance imaging More image encryption methods, realize the encryption of more images.
The technical scheme is that:A kind of more image encryption methods based on compressed sensing relevance imaging, are specifically included Following steps:
1) encrypt:First by the different picture T of N widthi(x, y) (i=1,2 ... N) carry out Unified coding, coding information A (x, y), N width coded images are obtained, are then gradually overlapped the image after coding with the position deviation set, form a width Aliased image M (x, y);
With Stochastic Modulation signal Ir(x, y) and aliased image M (x, y) are associated imaging, obtain ciphertext Br;Coding information A (x, y) and Stochastic Modulation signal Ir(x, y) is combined as key Kr
2) transmit:During information transfer, pass loser and recipient both sides share the key Kr, transmit between both sides described close Literary Br
3) decrypt:Key and ciphertext are compressed into perception during decryption to calculate, reconstruct cleartext information, i.e. N width image moment Battle array.
N width coded images are obtained in the step 1), if N > 10 by coded image with the position deviation of a pixel gradually It is overlapped;Coded image is gradually overlapped with the position deviation of two pixels if N≤10, forms a width aliased image M (x, y).
In the step 1)
Br=∫ dxdyIr(x, y) M (x, y) (r=1,2 ... Z)
Kr(x, y)=A (x, y) × Ir(x, y) (r=1,2 ... Z)
Wherein Z is pendulous frequency, and the size of Z how much decision ciphertexts.
Decrypting process is as follows in the step 3):
Tcs=T;min||Ti(x, y) | | L1subject to:
Br=∫ dxdyIr(x, y) M (x, y) (r=1, Z)
In formula, Ti(x, y) represents plaintext to be decrypted, i.e. N width image information, and Z represents pendulous frequency, by Ti(x, y) is formed Matrix as sparse matrix to be asked;The combination K of the Z Stochastic Modulation signals being independently distributed and coding informationr(x, y) is formed New matrix, as calculation matrix;Z measured value BrThe matrix of composition, as measured value;Calculate TiThe matrix of (x, y) composition is most Small L1 norms represent, so that it may obtain the cleartext information T of reconstructionCS
The beneficial effects of the present invention are:More image encryption methods of the invention based on compressed sensing relevance imaging, are used The mode of double layer encryption completes the encryption to more images, and first layer is Unified coding, realizes the displacement to more images, and will More image aliasings together, make multiple image be transformed into one every image, substantially increase the difficulty of decoding.The second layer is encoded to pass It is unified into as algorithm for encryption, the randomness of modulated signal enhances the randomness of ciphertext, and then improves security.Because key packet Containing coding information and modulated signal, even if code breaker intercepts part of key and ciphertext, ciphertext and the correspondence of key can not be known Relation, it is impossible to rebuild in plain text.The present invention use double layer encryption, but rebuild plaintext need only to once calculate can be obtained by it is bright Text, substantially increase decryption efficiency.The present invention being capable of adopting in sampling thheorem requirement of the sampling number far below Naquist simultaneously Cleartext information is reconstructed well under sample number, is realized under identical design conditions, can transmit more encryption information, Improve the information content of transmission.
Brief description of the drawings
Fig. 1 is more image encryption method schematic diagrames of the invention based on compressed sensing relevance imaging.
Embodiment
A kind of more image relevance imaging methods based on compressed sensing relevance imaging, key are coding information and modulated signal Combination, be in plain text more image informations to be encrypted, ciphertext be carry out coding and relevance imaging obtain a series of encryptions after Information.Method as shown in Figure 1 comprises the following steps:
Step 1 is encrypted:First by the different picture T of N widthi(x, y) (i=1,2 ... N) carry out Unified coding, coding information For A (x, y), N width coded images are obtained, are then gradually overlapped the image after coding with the position deviation set.If obtain N width coded images are taken, are gradually overlapped coded image with the position deviation of a pixel if N > 10;It will be compiled if N≤10 Code image is gradually overlapped with the position deviation of two pixels, forms a width aliased image M (x, y).For example, add as shown in Figure 1 Close amount of images is 4, and every width pixel size is 128 × 128, you can it is three-dimensional to be expressed as the image that size is 128 × 128 × 4 Data.Every width figure is encoded, 128 × 128 × 4 coded image will be obtained after 128 × 128 × 4 Image Coding.Because Amount of images itself is less than 10, so coded image is gradually overlapped with the position deviation of two pixels, i.e., by size be 128 × 128 × 4 image stereo data is superimposed as the view data of 128 × 138 pixel sizes.
With Stochastic Modulation signal Ir(x, y) and aliased image M (x, y) are associated imaging, will both be multiplied, obtain Take a series of information after encryptions, ciphertext BrObtained by formula (1).Coding information A (x, y) and Stochastic Modulation signal Ir(x, y) is combined As key, key KrObtained by formula (2).
Br=∫ dxdyIr(x, y) M (x, y) (r=1,2 ... Z) (1)
Kr(x, y)=A (x, y) × Ir(x, y) (r=1,2 ... Z) (2)
Wherein Z is pendulous frequency, and the size of Z how much decision ciphertexts.
Step (2) is transmitted:During information transfer, pass loser and recipient both sides share the key Kr, transmit between both sides The ciphertext Br
Step (3) is decrypted:Key and ciphertext are compressed into perception during decryption to calculate, reconstruct cleartext information, i.e. N width figure As matrix.
For example, N=4, decrypting process is exactly that ciphertext is reverted into aliased image first, then by aliased image inverting into plain text (i.e. an image stereo data of multiple images composition).But coding information is all that image is multiplied in itself with Stochastic Modulation signal Process, therefore in decryption, coding information and Stochastic Modulation signal are combined as key, then reduces and reverts to aliasing figure The process of picture, directly ciphertext is reconstructed into plain text using compressed sensing.I.e. by the ciphertext that length is Z, 128 × 128 × 4 are reconstructed into Cleartext information, as 4 width images matrix, per it is one-dimensional is piece image, totally 4 width image.
Decrypting process is as follows:Key and ciphertext are compressed into perception to calculate, rebuild cleartext information, is obtained by formula (3)
Tcs=T;min||Ti(x, y) | | L1subject to: (3)
Br=∫ dxdyIr(x, y) M (x, y) (r=1, Z)
In formula, Ti(x, y) represents plaintext to be decrypted, i.e., more image informations, and Z represents pendulous frequency.By Ti(x, y) is formed Matrix as sparse matrix to be asked;The combination K of the Z Stochastic Modulation signals being independently distributed and coding informationr(x, y) is formed New matrix, as calculation matrix;Z measured value BrThe matrix of composition, as measured value.Calculate TiThe matrix of (x, y) composition is most Small L1 norms represent, it is possible to obtain the cleartext information T of reconstructionCS

Claims (4)

1. a kind of more image encryption methods based on compressed sensing relevance imaging, it is characterised in that specifically comprise the following steps:
1) encrypt:First by the different picture T of N widthi(x, y) (i=1,2...N), i.e., in plain text, carry out Unified coding, coding information For A (x, y), N width coded images are obtained, are then gradually overlapped the image after coding with the position deviation set, formed One width aliased image M (x, y);
With Stochastic Modulation signal Ir(x, y) and aliased image M (x, y) are associated imaging, obtain ciphertext Br;Coding information A (x, And Stochastic Modulation signal I y)r(x, y) is combined as key Kr
2) transmit:During information transfer, pass loser and recipient both sides share the key Kr, the ciphertext B is transmitted between both sidesr
3) decrypt:Key and ciphertext are compressed into perception during decryption to calculate, reconstruct cleartext information, i.e. N width image array.
2. more image encryption methods based on compressed sensing relevance imaging according to claim 1, it is characterised in that the step Coded image, is gradually overlapped by rapid 1) middle acquisition N width coded images if N > 10 with the position deviation of a pixel;If N≤ 10 are gradually overlapped coded image with the position deviation of two pixels, form a width aliased image M (x, y).
3. more image encryption methods according to claim 1 or claim 2 based on compressed sensing relevance imaging, it is characterised in that institute State in step 1)
Br=∫ dxdyIr(x, y) M (x, y) (r=1,2...Z)
Kr(x, y)=A (x, y) × Ir(x, y) (r=1,2...Z)
Wherein Z is pendulous frequency, and the size of Z how much decision ciphertexts.
4. more image encryption methods based on compressed sensing relevance imaging according to claim 3, it is characterised in that the step It is rapid 3) in decrypting process it is as follows:
<mrow> <msub> <mi>T</mi> <mi>cs</mi> </msub> <mo>=</mo> <mi>T</mi> <mo>;</mo> <mi>min</mi> <msub> <mrow> <mo>|</mo> <mo>|</mo> <msub> <mi>T</mi> <mi>i</mi> </msub> <mrow> <mo>(</mo> <mi>x</mi> <mo>,</mo> <mi>y</mi> <mo>)</mo> </mrow> <mo>|</mo> <mo>|</mo> </mrow> <msub> <mi>L</mi> <mi>i</mi> </msub> </msub> <mi>subject to</mi> <mo>:</mo> </mrow>
Br=∫ dxdyIr(x, y) M (x, y) (r=1 ..., Z)
In formula, Ti(x, y) represents plaintext to be decrypted, i.e. N width image information, and Z represents pendulous frequency, by TiThe square of (x, y) composition Battle array is as sparse matrix to be asked;The combination K of the Z Stochastic Modulation signals being independently distributed and coding informationr(x, y) forms new square Battle array, as calculation matrix;Z measured value BrThe matrix of composition, as measured value;Calculate TiThe minimum L1 of the matrix of (x, y) composition Norm represents, so that it may obtains the cleartext information T of reconstructionCS
CN201711169514.XA 2017-11-21 2017-11-21 More image encryption methods based on compressed sensing relevance imaging Pending CN107835333A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711169514.XA CN107835333A (en) 2017-11-21 2017-11-21 More image encryption methods based on compressed sensing relevance imaging

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711169514.XA CN107835333A (en) 2017-11-21 2017-11-21 More image encryption methods based on compressed sensing relevance imaging

Publications (1)

Publication Number Publication Date
CN107835333A true CN107835333A (en) 2018-03-23

Family

ID=61653215

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711169514.XA Pending CN107835333A (en) 2017-11-21 2017-11-21 More image encryption methods based on compressed sensing relevance imaging

Country Status (1)

Country Link
CN (1) CN107835333A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109858264A (en) * 2019-01-22 2019-06-07 四川大学 A kind of color image encipher-decipher method of the moulds resolutions of vectors such as score stochastic transformation domain
CN110348232A (en) * 2019-06-21 2019-10-18 西安理工大学 Use the optical image encryption method of the calculating ghost imaging of phase iterative algorithm
CN111738897A (en) * 2020-05-29 2020-10-02 南京航空航天大学 Multi-image multi-encryption method based on speckle decorrelation
CN113285797A (en) * 2021-04-30 2021-08-20 四川大学 Optical rotation domain multi-image encryption method based on compressed sensing and deep learning
CN115314602A (en) * 2022-08-02 2022-11-08 上海理工大学 Multi-image encryption system based on image scaling and associated imaging

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101447071A (en) * 2009-01-04 2009-06-03 清华大学 Method for visual cryptography and counterfeit prevention of patterns
CN103428399A (en) * 2012-06-29 2013-12-04 上海理工大学 Compressive sensing theory-based correlated imaging optical encryption method
CN106599703A (en) * 2016-12-12 2017-04-26 中国矿业大学 Mixed primitive and chaos-based multi-image encryption method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101447071A (en) * 2009-01-04 2009-06-03 清华大学 Method for visual cryptography and counterfeit prevention of patterns
CN103428399A (en) * 2012-06-29 2013-12-04 上海理工大学 Compressive sensing theory-based correlated imaging optical encryption method
CN106599703A (en) * 2016-12-12 2017-04-26 中国矿业大学 Mixed primitive and chaos-based multi-image encryption method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张红梅等: "基于迭代复数模型的多图像无损同步加密算法研究", 《科学技术与工程》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109858264A (en) * 2019-01-22 2019-06-07 四川大学 A kind of color image encipher-decipher method of the moulds resolutions of vectors such as score stochastic transformation domain
CN110348232A (en) * 2019-06-21 2019-10-18 西安理工大学 Use the optical image encryption method of the calculating ghost imaging of phase iterative algorithm
CN111738897A (en) * 2020-05-29 2020-10-02 南京航空航天大学 Multi-image multi-encryption method based on speckle decorrelation
CN111738897B (en) * 2020-05-29 2024-02-13 南京航空航天大学 Multi-image multi-encryption method based on speckle decorrelation
CN113285797A (en) * 2021-04-30 2021-08-20 四川大学 Optical rotation domain multi-image encryption method based on compressed sensing and deep learning
CN115314602A (en) * 2022-08-02 2022-11-08 上海理工大学 Multi-image encryption system based on image scaling and associated imaging
CN115314602B (en) * 2022-08-02 2023-05-09 上海理工大学 Multi-image encryption method based on image scaling and associated imaging

Similar Documents

Publication Publication Date Title
CN107835333A (en) More image encryption methods based on compressed sensing relevance imaging
Zhang et al. A review of compressive sensing in information security field
Gong et al. Image compression-encryption algorithms by combining hyper-chaotic system with discrete fractional random transform
Shiu et al. Encrypted image-based reversible data hiding with public key cryptography from difference expansion
Patel et al. LSB based image steganography using dynamic key cryptography
Soni et al. A novel image encryption technique using Arnold transform and asymmetric RSA algorithm
Mukhedkar et al. Secure non real time image encryption algorithm development using cryptography & steganography
CA2869817A1 (en) Systems, methods and apparatuses for the secure transmission of media content
CN103973937A (en) Information hiding method based on wireless multimedia sensor network
CN103634100A (en) Encryption method and device
CN104009842A (en) Communication data encryption and decryption method based on DES encryption algorithm, RSA encryption algorithm and fragile digital watermarking
CN105812614B (en) More image encryptions and decryption method based on optical field imaging with digital refocusing technology
CN112040086A (en) Image encryption and decryption method and device, equipment and readable storage medium
Kester A visual cryptographic encryption technique for securing medical images
Chen et al. Information authentication using sparse representation of double random phase encoding in fractional Fourier transform domain
Ramírez-Torres et al. Image encryption with an improved cryptosystem based on a matrix approach
Agham et al. A novel approach towards separable reversible data hiding technique
CN110312055A (en) A kind of more image encryption methods and decryption method based on light field sub-aperture image
Ajmera et al. Video Steganography: Using Scrambling-AES Encryption and DCT, DST Steganography
Sunar et al. A fast approach to encrypt and decrypt of video streams for secure channel transmission
Deshmukh et al. Multi-share crypt-stego authentication system
Sharma et al. Digital Image Encryption Techniques: A Review
Gunasekaran et al. Encrypting and decrypting image using computer visualization techniques
Pandey et al. Medical image protection using steganography by crypto-image as cover image
Karthik et al. High capacity, secure (n, n/8) multi secret image sharing scheme with security key

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180323