CN108810313A - Image encryption method based on high-dimension chaotic system and QR codes in revolution domain - Google Patents

Image encryption method based on high-dimension chaotic system and QR codes in revolution domain Download PDF

Info

Publication number
CN108810313A
CN108810313A CN201810430507.9A CN201810430507A CN108810313A CN 108810313 A CN108810313 A CN 108810313A CN 201810430507 A CN201810430507 A CN 201810430507A CN 108810313 A CN108810313 A CN 108810313A
Authority
CN
China
Prior art keywords
formula
codes
image
rotation angle
revolution
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810430507.9A
Other languages
Chinese (zh)
Inventor
隋连升
徐敏杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian University of Technology
Original Assignee
Xian University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian University of Technology filed Critical Xian University of Technology
Priority to CN201810430507.9A priority Critical patent/CN108810313A/en
Publication of CN108810313A publication Critical patent/CN108810313A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/448Rendering the image unintelligible, e.g. scrambling
    • H04N1/4486Rendering the image unintelligible, e.g. scrambling using digital data encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of image encryption methods based on high-dimension chaotic system and QR codes in revolution domain, include that image to be encrypted is converted to corresponding QR codes f (x by the encryption to original plaintext image and decryption first, y), later by itself and random phase mask r1(x, y) and r2(x', y') carries out revolution transformation, obtains ciphertext image, and guesses the initial estimate f of QR codes0(x,y);It is iterated in simulated optical system, optics product g will be obtainedk(x "; y ") in amplitude portion replaced carrying out revolution transformation with ciphertext image, the last correlation coefficient value CC using it between QR codes again is as convergence criterion, it is constrained three position detection patterns of QR codes as support, as correlation coefficient value CC=0.9978, terminate iteration to get to the QR codes of decryption.This method has very strong robustness to occlusion attack, attacked by noise, key brute force attack, and has damage resistance ability.

Description

Image encryption method based on high-dimension chaotic system and QR codes in revolution domain
Technical field
The invention belongs to technical field of image processing, and in particular to one kind is based on high-dimension chaotic system and QR codes in revolution domain Image encryption method.
Background technology
It is well known that realizing that safety of image has become an important subject in recent decades using optical technology. Since Refregier and Javidi propose the famous figure based on Double random phase (DRPE) in Fourier transform domain Since encryption system structure, lot of domestic and international experts and scholars have been proposed largely utilizing the image encryption of different optical technologies Scheme provides potential solution for pure optics cryptographic system.In recent years, Javidi et al., which is outlined, utilizes free space Optics is in potentiality, latest developments and the challenge for encrypting direction, such as new image encryption method, data compression, phase retrieval calculation Method, the realization of nanometer or micro-meter scale, ghost image imaging and quantum imaging.
Due to intrinsic linear problem, the Image Encryption Scheme based on DRPE frameworks have serious security risk, i.e., it It is easy to be attacked by several forms, such as known plain text attack.In order to enhance safety, the architecture based on DRPE is Various transform domains are expanded to, such as fractional Fourier transform domain, fresnel transform domain, the domain rotator transform (GT), score angular transformation Domain, score stochastic transformation domain, fractional mellin transform domain, circulator wavelet transformed domain and lifting wavelet transform frequency domain etc..These sides The output of case is typically the amplitude distribution of complexity, since the optical elements such as spatial light modulator cannot record phase and amplitude simultaneously Data, therefore be not easy to store and transmit.In order to avoid complicated data are considered as ciphertext, since Zhang Yan and Wang Bo is initially proposed Normal image is encrypted as two pure phase masks (POMs) without using iterative calculation, therefore is proposed largely based on interference Scheme.When disposing any one synthesis mask during decryption, the profile information of normal image can be speculatively detected. In addition, experts and scholars also proposed the Image Encryption Scheme largely based on different chaotic maps, wherein normal image can be compiled Code is real-valued function.
Invention content
The object of the present invention is to provide a kind of image encryption method based on high-dimension chaotic system and QR codes in revolution domain, solutions It has determined the problem of reconstruction image problem of dtmf distortion DTMF existing in the prior art and key management inconvenience.
The technical solution adopted in the present invention is the image encryption side based on high-dimension chaotic system and QR codes in revolution domain Method includes the encryption to original plaintext image and decryption, is as follows:
The ciphering process, specifically includes following steps:
Step 1, image to be encrypted is converted into corresponding QR codes f (x, y);
Step 2, optical analog modulation is carried out to the QR code f (x, y) obtained after step 1, modulated process is as follows:By QR codes f (x, y) and random phase mask r1(x, y) is multiplied, and it is α to carry out rotation angle1Revolution transformation, later again with random phase Position mask r2(x', y') is multiplied, and it is α to carry out rotation angle2Revolution convert to get to ciphertext image;
The decrypting process, specifically includes following steps:
Step 3, according to the ciphertext image obtained in step 2, guess the initial estimate f of QR codes0(x,y);
Step 4, in simulated optical system, by the initial estimate f of the QR codes obtained after step 30(x, y) is being carried out F when kth time iterationk(x, y) is irradiated by coherent parallel lights, and with random phase mask r1(x, y) is multiplied, and is rotated Angle is α1Revolution transformation, later again by the initial estimate f of QR codes0(x, y) and random phase mask r2(x', y') is carried out It is multiplied, and it is α to carry out rotation angle2Revolution transformation, obtain optics product gk(x″,y″);
Step 5, the optics product g that will be obtained after step 4kAmplitude portion in (x ", y ") is replaced with ciphertext image, and It keeps phase bit position constant, obtains optics product
Step 6, by the optics product after step 5Progress rotation angle is α1It is α with rotation angle2Return Transformation is changed, and optics product is obtained
Step 7, the optics product that will be obtained after step 6Correlation coefficient value CC between QR codes is as receipts Criterion is held back, using three position detection patterns of QR codes as supporting to constrain, as correlation coefficient value CC=0.9978, terminates to change In generation, is to get to the QR codes of decryption.
The features of the present invention also characterized in that
In step 2, ciphertext image, as shown in formula (1):
It is α for rotation angle1Revolution transformation,It is α for rotation angle2Revolution transformation.
In step 2, random phase mask r1(x,y)、r2(x', y'), rotation angle α1With rotation angle α2By Chen systems System is random to be generated, and is as follows:
The Chen systems, as shown in formula (2):
In formula (2), control parameter a=35, control parameter b=3, control parameter c ∈ [20,28.4];
Step 2.1, Chen systems are iterated, enable x0=0.25, y0=1.005 and z0=0.35, then generate three not The same random sequence x with aperiodic and non-convergent propertyi、yiAnd zi
Step 2.2, by the random sequence x of the middle generation after step 2.1iAnd yi, retain last m × n iteration respectively Value, formation sequence S1And S2, as shown in formula (3) and formula (4):
S1=2 π × ((abs (xi)-floor(abs(xi)))×1014mod(256))/255 (3);
S2=2 π × ((abs (yi)-floor(abs(yi)))×1014mod(256))/255 (4);
Step 2.3, the sequence S that will be obtained after step 2.21And S2(reshape (S are carried out respectively1, [], m × n)), (reshape(S2, [], m × n)) arrangement, that is, obtain two-dimensional matrix S1' (i, j) and S2' (i, j), such as formula (5) and formula (6) institute Show:
{S1' (i, j) | i=1,2 ..., M;J=1,2 ..., N } (5);
{S2' (i, j) | i=1,2 ..., M;J=1,2 ..., N } (6);
Step 2.4, the two-dimensional matrix S that will be obtained after step 2.31' (i, j) and S2' (i, j) respectively carry out (r1(x,y) =exp (is1' (i, j)) and (r2(x ', y ')=exp (is '2(i, j)) operation, you can obtain random phase mask r1(x, y) and r2(x′,y′);
Step 2.5, after step 2.4, retain random sequence ZiIt is last 2K value, formation sequence S3, such as formula (7) institute Show:
S3=floor ((abs (zi)-floor(abs(zi)))×1014) (7);
Step 2.6, in the coordinate (m for after step 2.5, randomly selecting either element in flat imagei,ni), coordinate mi With coordinate ni, respectively as shown in formula (8) and formula (9):
mi=S3(2i)modM (8);
ni=S3(2i+1)modN (9);
Wherein, in formula (8) and formula (9):I=1,2 ... k;
Step 2.7, after step 2.6, by coordinate miWith coordinate niIt carries out advising such as the calculating of formula (10) and formula (11) respectively Then, rotation angle α is obtained1With rotation angle α2
In step 4, optics product gk(x ", y "), as shown in formula (12):
In step 5, optics productAs shown in formula (13):
In formula (13), arg (gk(x ", y ")) it is used for the phase bit position of extracting parameter.
In step 6, optics productAs shown in formula (14):
In formula (14):It is α for rotation angle1Reverse back transformation change,For rotation angle α2Reverse back transformation It changes;Conj () is the conjugate of return parameters.
In step 7, convergence criterion, as shown in formula (15) and formula (16):
In formula (15), β is adjustment parameter, the convergence rate for adjusting iterative process, β=0.09;γ is adjustment parameter, For ensureing that the denominator in formula (16) is not zero, γ=0.0001;E [] is desired value operator.
The invention has the advantages that the ciphertext in this method is real-valued function, convenient for storing and transmitting for ciphertext;And only There are three initial values of Chen systems to be used as private key, key management is convenient;In addition, due to Chen system initial value high sensitivities, Therefore, the safety of the algorithm is substantially increased;It is generated simultaneously as the parameters such as rotation angle of rotator transform are mutual informations , it cannot directly access, therefore also there is very strong resistivity to the various possible attacks such as known plain text attack.
Description of the drawings
Fig. 1 is that the present invention is based on to be added in the image encryption method embodiment of high-dimension chaotic system and QR codes in revolution domain Close image;
Fig. 2 is that the present invention is based on QR codes in the image encryption method embodiment of high-dimension chaotic system and QR codes in revolution domain to scheme Picture;
Fig. 3 is that the present invention is based on the ciphertexts in the image encryption method embodiment of high-dimension chaotic system and QR codes in revolution domain Image;
Fig. 4 is that the present invention is based on random in the image encryption method embodiment of high-dimension chaotic system and QR codes in revolution domain Phase mask image r1(x,y);
Fig. 5 is that the present invention is based on random in the image encryption method embodiment of high-dimension chaotic system and QR codes in revolution domain Phase mask image r2(x′,y′);
Fig. 6 be the present invention is based in revolution domain in the image encryption method embodiment of high-dimension chaotic system and QR codes from QR codes Three position detection patterns of middle extraction;
Fig. 7 is that the present invention is based on pass through solution in the image encryption method embodiment of high-dimension chaotic system and QR codes in revolution domain Close obtained QR code images;
Fig. 8 is that the present invention is based on restore in the image encryption method embodiment of high-dimension chaotic system and QR codes in revolution domain Original image;
Fig. 9 is that the present invention is based on initial Q R in the image encryption method embodiment of high-dimension chaotic system and QR codes in revolution domain Calculated CC curve graphs between code and decryption QR codes;
Figure 10 be the present invention method in as initial value x0When with little deviation, counted between initial Q R codes and decryption QR codes The CC curve graphs of calculating;
Figure 11 be the present invention method in as initial value y0When with little deviation, counted between initial Q R codes and decryption QR codes The CC curve graphs of calculating;
Figure 12 be the present invention method in as initial value z0When with little deviation, counted between initial Q R codes and decryption QR codes The CC curve graphs of calculating;
Figure 13 is that the present invention is based on mistake during the image encryption method of high-dimension chaotic system and QR codes is implemented in revolution domain is first Initial value x0Decrypted image;
Figure 14 is that the present invention is based on mistake during the image encryption method of high-dimension chaotic system and QR codes is implemented in revolution domain is first Initial value y0Decrypted image;
Figure 15 is that the present invention is based on mistake during the image encryption method of high-dimension chaotic system and QR codes is implemented in revolution domain is first Initial value z0Decrypted image;
Figure 16 is the image of 20% occlusion attack in ciphertext image to be decrypted in the method for the present invention;
Figure 17 is the QR codes restored when 20% occlusion attack in ciphertext image to be decrypted in the method for the present invention;
Figure 18 is scanned when being 20% occlusion attack in ciphertext image to be decrypted in the method for the present invention by the QR codes restored The original image arrived.
Specific implementation mode
The following describes the present invention in detail with reference to the accompanying drawings and specific embodiments.
The present invention is based on the image encryption methods of high-dimension chaotic system and QR codes in revolution domain, including to original plaintext image Encryption and decryption, be as follows:
Ciphering process specifically includes following steps:
Step 1, image to be encrypted is converted into corresponding QR codes f (x, y);
Optical analog modulation is carried out to the QR code f (x, y) obtained after step 1, modulated process is as follows:By QR code f (x, y) with Random phase mask r1(x, y) is multiplied, and it is α to carry out rotation angle1Revolution transformation, later again with random phase mask r2(x', y') is multiplied, and it is α to carry out rotation angle2Revolution convert to get to ciphertext image, as shown in formula (1):
It is α for rotation angle1Revolution transformation,It is α for rotation angle2Revolution transformation;
Wherein, random phase mask r1(x,y)、r2(x', y'), rotation angle α1With rotation angle α2By Chen systems It is random to generate, it is as follows:
Wherein, Chen systems, as shown in formula (2):
In formula (2), control parameter a=35, control parameter b=3, control parameter c ∈ [20,28.4];
Step 2.1, Chen systems are iterated, enable x0=0.25, y0=1.005 and z0=0.35, then generate three not The same random sequence x with aperiodic and non-convergent propertyi、yiAnd zi
Step 2.2, by the random sequence x of the middle generation after step 2.1iAnd yi, retain last m × n iteration respectively Value, formation sequence S1And S2, as shown in formula (3) and formula (4):
S1=2 π × ((abs (xi)-floor(abs(xi)))×1014mod(256))/255 (3);
S2=2 π × ((abs (yi)-floor(abs(yi)))×1014mod(256))/255 (4);
Step 2.3, the sequence S that will be obtained after step 2.21And S2(reshape (S are carried out respectively1, [], m × n)), (reshape(S2, [], m × n)) arrangement, that is, obtain two-dimensional matrix S1' (i, j) and S2' (i, j), such as formula (5) and formula (6) institute Show:
{S1' (i, j) | i=1,2 ..., M;J=1,2 ..., N } (5);
{S2' (i, j) | i=1,2 ..., M;J=1,2 ..., N } (6);
Step 2.4, the two-dimensional matrix S that will be obtained after step 2.31' (i, j) and S2' (i, j) respectively carry out (r1(x,y) =exp (is1' (i, j)) and (r2(x ', y ')=exp (is '2(i, j)) operation, you can obtain random phase mask r1(x, y) and r2(x′,y′);
Step 2.5, after step 2.4, retain random sequence ZiIt is last 2K value, formation sequence S3, such as formula (7) institute Show:
S3=floor ((abs (zi)-floor(abs(zi)))×1014) (7);
In formula (7), abs is used to obtain the nearest integer of parameter for calculating absolute value, floor;
Step 2.6, it is (m after step 2.5, randomly selecting either element coordinate in flat imagei,ni), coordinate mi With coordinate ni, respectively as shown in formula (8) and formula (9):
mi=S3(2i)modM (8);
ni=S3(2i+1)modN (9);
Wherein, in formula (8) and formula (9):I=1,2 ... k;
Step 2.7, after step 2.6, by coordinate miWith coordinate niIt carries out, such as the transformation of formula (10) and formula (11), obtaining respectively To rotation angle α1With rotation angle α2
Decrypting process specifically includes following steps:
Step 3, according to the ciphertext image obtained in step 2, guess the initial estimate f of QR codes0(x,y);
Step 4, in simulated optical system, by the initial estimate f of the QR codes obtained after step 30(x, y) is being carried out F when kth time iterationk(x, y) is irradiated by coherent parallel lights, and with random phase mask r1(x, y) is multiplied, and is rotated Angle is α1Revolution transformation, later again by the initial estimate f of QR codes0(x, y) and random phase mask r2(x', y') is carried out It is multiplied, and it is α to carry out rotation angle2Revolution transformation, obtain optics product gk(x ", y "), as shown in formula (12):
Step 5, the optics product g that will be obtained after step 4kAmplitude portion in (x ", y ") is replaced with ciphertext image, and It keeps phase bit position constant, obtains optics productAs shown in formula (13):
In formula (13), arg (gk(x ", y ")) it is used for the phase bit position of extracting parameter;
Step 6, by the optics product after step 5Progress rotation angle is α1It is α with rotation angle2Return Transformation is changed, and optics product is obtainedAs shown in formula (14):
In formula (14):It is α for rotation angle1Reverse back transformation change,It is α for rotation angle2Reverse back Transformation is changed;Conj () is the conjugate of return parameters;
Step 7, the optics product that will be obtained after step 6Correlation coefficient value CC between QR codes is as receipts Criterion is held back, as shown in formula (15) and formula (16), using three position detection patterns of QR codes as supporting to constrain, works as correlation coefficient value When CC=0.9978, terminate iteration to get to the QR codes of decryption;
In formula (15), β is adjustment parameter, the convergence rate for adjusting iterative process, β=0.09;γ is adjustment parameter, For ensureing that the denominator in formula (16) is not zero, γ=0.0001;E [] is desired value operator.
Embodiment
The present invention is based on the image encryption methods of high-dimension chaotic system and QR codes in revolution domain, from USC-SIPI image datas The gray level image " baboon " selected in library is as image to be encrypted, as shown in Figure 1, picture size is 512*512;
Ciphering process specifically includes following steps:
Step 1, image to be encrypted is converted into corresponding QR codes f (x, y), as shown in Figure 2;
Step 2, optical analog modulation is carried out to the QR code f (x, y) obtained after step 1, modulated process is as follows:By QR codes f (x, y) and random phase mask r1(x, y) is multiplied, and it is α to carry out rotation angle1Revolution transformation, later again with random phase Position mask r2(x', y') is multiplied, and it is α to carry out rotation angle2Revolution transformation, as shown in Figure 3 to get to ciphertext image, As shown in formula (1):
Wherein, random phase mask r1(x,y)、r2(x', y'), rotation angle α1With rotation angle α2By Chen systems It is random to generate, it is as follows:
Wherein, Chen systems, as shown in formula (2):
In formula (2), control parameter a=35, control parameter b=3, control parameter c ∈ [20,28.4];
Step 2.1, Chen systems are iterated, enable x0=0.25, y0=1.005 and z0=0.35, then generate three not The same random sequence x with aperiodic and non-convergent propertyi、yiAnd zi
Step 2.2, by the random sequence x of the middle generation after step 2.1iAnd yi, retain last m × n iterative value, shape At sequence S1And S2, as shown in formula (3) and formula (4):
S1=2 π × ((abs (xi)-floor(abs(xi)))×1014mod(256))/255 (3);
S2=2 π × ((abs (yi)-floor(abs(yi)))×1014mod(256))/255 (4);
Step 2.3, the sequence S that will be obtained after step 2.21And S2(reshape (S are carried out respectively1, [], m × n)), (reshape(S2, [], m × n)) arrangement, that is, obtain two-dimensional matrix S1' (i, j) and S2' (i, j), such as formula (5) and formula (6) institute Show:
{S1' (i, j) | i=1,2 ..., M;J=1,2 ..., N } (5);
{S2' (i, j) | i=1,2 ..., M;J=1,2 ..., N } (6);
Step 2.4, the two-dimensional matrix S that will be obtained after step 2.31' (i, j) and S2' (i, j) respectively carry out (r1(x,y) =exp (is1' (i, j)) and (r2(x ', y ')=exp (is '2(i, j)) operation, you can obtain random phase mask r1(x, y) and r2(x ', y '), as shown in Figures 4 and 5;
Step 2.5, after step 2.4, retain random sequence ZiIt is last 2K value, formation sequence S3, such as formula (7) institute Show:
S3=floor ((abs (zi)-floor(abs(zi)))×1014) (7);
In formula (7), abs is used to obtain the nearest integer of parameter for calculating absolute value, floor;
Step 2.6, either element coordinate (m after step 2.5, is being randomly selected in flat imagei,ni), coordinate miWith Coordinate ni, respectively as shown in formula (8) and formula (9):
mi=S3(2i)modM (8);
ni=S3(2i+1)modN (9);
Wherein, in formula (8) and formula (9):I=1,2 ... k;
Step 2.7, after step 2.6, by coordinate miWith coordinate niIt carries out advising such as the calculating of formula (10) and formula (11) respectively Then, rotation angle α is obtained1With rotation angle α2
Decrypting process is as follows:
Step 3, according to the ciphertext image obtained in step 2, guess the initial estimate f of QR codes0(x,y);
Step 4, in simulated optical system, by the initial estimate f of the QR codes obtained after step 30(x, y) is being carried out F when kth time iterationk(x, y) is irradiated by coherent parallel lights, and random phase mask r is used in combination1(x, y) and r2(x', y') is modulated, Revolution transformation is carried out, and it is α to turn round transformation angle1, later again by the initial estimate f of QR codes0(x, y) and random phase mask r2(x', y') is modulated, and carries out revolution transformation, and it is α to turn round transformation angle2, obtain optics product gk(x ", y "), such as formula (12) shown in:
Step 5, the optics product g that will be obtained after step 4kAmplitude portion in (x ", y ") is replaced with ciphertext image, and It keeps phase bit position constant, obtains optics productAs shown in formula (13):
Step 6, by the optics product after step 5Progress rotation angle is α1It is α with rotation angle2Return Transformation is changed, and optics product is obtainedAs shown in formula (14):
In formula (14):It is α for rotation angle1Reverse back transformation change,For rotation angle α2Reverse back transformation It changes;Conj () is the conjugate of return parameters;
Step 7, the optics product that will be obtained after step 6Correlation coefficient value CC between QR codes is as receipts Criterion is held back, as shown in formula (15) and formula (16), using three position detection patterns of QR codes as supporting to constrain, as shown in fig. 6, working as When correlation coefficient value CC=0.9978, terminate iteration to get to the QR codes of decryption, as shown in Figure 7;The QR codes of decryption are moved Moved end scanning can be obtained original image, as shown in Figure 8;
In formula (15), β is adjustment parameter, the convergence rate for adjusting iterative process, β=0.09;γ is adjustment parameter, For ensureing that the denominator in formula (16) is not zero, γ=0.0001;E [] is desired value operator.
Verify that the present invention is based on high-dimension chaotic system in revolution domain and QR codes in terms of the convergence rate and robustness two The feasibility of image encryption method.
First, convergence rate:
The calculated CC curve graphs between initial Q R codes and decryption QR codes, as shown in figure 9, from the curve it is found that 200 After secondary iteration, CC values have been above 0.9978.Therefore, this method has preferable performance in convergence rate;
Second, robustness:
Although Chen systems only use three initial values as private key, facilitate key management, due to the height of these keys Sensitivity so that the safety of this method greatly improves.Chen systems are iterated, as three initial value x0、y0And z0In When any one is with little deviation, the calculated CC curve graphs between QR codes and original QR codes are decrypted, respectively such as 10, Figure 11 And shown in Figure 12, as seen from the figure, when arbitrary initial value has little deviation, between decrypted obtained QR codes and original QR codes The equal very little of related coefficient, and its QR code for decrypting, as shown in Figure 13, Figure 14 and Figure 15, decrypted obtained QR codes all cannot Restore artwork, this shows that the key space of this method is very big, it is sufficient to resist brute force attack.
In addition, the occlusion attack to this method is analyzed, when 20% image in ciphertext image to be decrypted is hidden When gear, as shown in figure 16, QR codes still can be recovered by the algorithm, as shown in figure 17, and then scan and obtain original image, such as Shown in Figure 18, which does not have any information loss, this shows that the algorithm has good anti-occlusion attacking ability.
The method of the present invention has very strong robustness, and uses to nasal obstruction attack, attacked by noise, key brute force attack QR codes, maximum feature, which is QR codes, has damage resistance ability, can more simply store transmission, while improving DRPE skills Art, only strength retention information can restore the storage and transfer that original image is more conducive to data, and not have information loss.

Claims (7)

1. the image encryption method based on high-dimension chaotic system and QR codes in revolution domain, which is characterized in that including to original plaintext The encryption and decryption of image, are as follows:
The ciphering process, specifically includes following steps:
Step 1, image to be encrypted is converted into corresponding QR codes f (x, y);
Step 2, optical analog modulation is carried out to the QR code f (x, y) obtained after step 1, modulated process is as follows:By QR code f (x, y) With random phase mask r1(x, y) is multiplied, and it is α to carry out rotation angle1Revolution transformation, covered again with random phase later Film r2(x', y') is multiplied, and it is α to carry out rotation angle2Revolution convert to get to ciphertext image;
The decrypting process, specifically includes following steps:
Step 3, according to the ciphertext image obtained in step 2, guess the initial estimate f of QR codes0(x,y);
Step 4, in simulated optical system, by the initial estimate f of the QR codes obtained after step 30(x, y) is carrying out kth time F when iterationk(x, y) is irradiated by coherent parallel lights, and with random phase mask r1(x, y) is multiplied, and carries out rotation angle and be α1Revolution transformation, later again by the initial estimate f of QR codes0(x, y) and random phase mask r2(x', y') is multiplied, and Progress rotation angle is α2Revolution transformation, obtain optics product gk(x″,y″);
Step 5, the optics product g that will be obtained after step 4kAmplitude portion in (x ", y ") is replaced with ciphertext image, and is kept Phase bit position is constant, obtains optics product
Step 6, by the optics product after step 5Progress rotation angle is α1It is α with rotation angle2Revolution become It changes, obtains optics product
Step 7, the optics product that will be obtained after step 6Correlation coefficient value CC between QR codes is accurate as convergence Then, using three position detection patterns of QR codes as supporting to constrain, as correlation coefficient value CC=0.9978, terminate iteration, i.e., The QR codes decrypted.
2. the encryption method according to claim 1 based on the image encryption of high-dimension chaotic system and QR codes in revolution domain, It is characterized in that, in the step 2, ciphertext image, as shown in formula (1):
It is α for rotation angle1Revolution transformation,It is α for rotation angle2Revolution transformation.
3. the image encryption method according to claim 1 based on high-dimension chaotic system and QR codes in revolution domain, feature It is, in the step 2, random phase mask r1(x,y)、r2(x', y'), rotation angle α1With rotation angle α2By Chen System generates at random, is as follows:
The Chen systems, as shown in formula (2):
In formula (2), control parameter a=35, control parameter b=3, control parameter c ∈ [20,28.4];
Step 2.1, Chen systems are iterated, enable x0=0.25, y0=1.005 and z0=0.35, then generate three it is different Random sequence x with aperiodic and non-convergent propertyi、yiAnd zi
Step 2.2, by the random sequence x of the middle generation after step 2.1iAnd yi, retain last m × n iterative value, shape respectively At sequence S1And S2, as shown in formula (3) and formula (4):
S1=2 π × ((abs (xi)-floor(abs(xi)))×1014mod(256))/255 (3);
S2=2 π × ((abs (yi)-floor(abs(yi)))×1014mod(256))/255 (4);
Step 2.3, the sequence S that will be obtained after step 2.21And S2(reshape (S are carried out respectively1, [], m × n)), (reshape(S2, [], m × n)) arrangement, that is, obtain two-dimensional matrix S1' (i, j) and S2' (i, j), such as formula (5) and formula (6) institute Show:
{S1' (i, j) | i=1,2 ..., M;J=1,2 ..., N } (5);
{S2' (i, j) | i=1,2 ..., M;J=1,2 ..., N } (6);
Step 2.4, the two-dimensional matrix S that will be obtained after step 2.31' (i, j) and S2' (i, j) respectively carry out (r1(x, y)=exp (is′1(i, j)) and (r2(x ', y ')=exp (is '2(i, j)) operation, you can obtain random phase mask r1(x, y) and r2(x′, y′);
Step 2.5, after step 2.4, retain random sequence ZiIt is last 2K value, formation sequence S3, as shown in formula (7):
S3=floor ((abs (zi)-floor(abs(zi)))×1014) (7);
Step 2.6, in the coordinate (m for after step 2.5, randomly selecting either element in flat imagei,ni), coordinate miAnd seat Mark ni, respectively as shown in formula (8) and formula (9):
mi=S3(2i)modM (8);
ni=S3(2i+1)modN (9);
Wherein, in formula (8) and formula (9):I=1,2 ... k;
Step 2.7, after step 2.6, by coordinate miWith coordinate niIt carries out, such as the computation rule of formula (10) and formula (11), obtaining respectively To rotation angle α1With rotation angle α2
4. the image encryption method according to claim 1 based on high-dimension chaotic system and QR codes in revolution domain, the step In rapid 4, optics product gk(x ", y "), as shown in formula (12):
5. the image encryption method according to claim 1 based on high-dimension chaotic system and QR codes in revolution domain, the step In rapid 5, optics productAs shown in formula (13):
In formula (13), arg (gk(x ", y ")) it is used for the phase bit position of extracting parameter.
6. the image encryption method according to claim 1 based on high-dimension chaotic system and QR codes in revolution domain, the step In rapid 6, optics productAs shown in formula (14):
In formula (14):It is α for rotation angle1Reverse back transformation change,For rotation angle α2Reverse back transformation change; Conj () is the conjugate of return parameters.
7. the image encryption method according to claim 1 based on high-dimension chaotic system and QR codes in revolution domain, the step In rapid 7, convergence criterion, as shown in formula (15) and formula (16):
In formula (15), β is adjustment parameter, the convergence rate for adjusting iterative process, β=0.09;γ is adjustment parameter, is used for Ensure that the denominator in formula (16) is not zero, γ=0.0001;E [] is desired value operator.
CN201810430507.9A 2018-05-08 2018-05-08 Image encryption method based on high-dimension chaotic system and QR codes in revolution domain Pending CN108810313A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810430507.9A CN108810313A (en) 2018-05-08 2018-05-08 Image encryption method based on high-dimension chaotic system and QR codes in revolution domain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810430507.9A CN108810313A (en) 2018-05-08 2018-05-08 Image encryption method based on high-dimension chaotic system and QR codes in revolution domain

Publications (1)

Publication Number Publication Date
CN108810313A true CN108810313A (en) 2018-11-13

Family

ID=64092111

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810430507.9A Pending CN108810313A (en) 2018-05-08 2018-05-08 Image encryption method based on high-dimension chaotic system and QR codes in revolution domain

Country Status (1)

Country Link
CN (1) CN108810313A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110536041A (en) * 2019-08-27 2019-12-03 天津大学 Quick response coding and several color image optical encryption methods of CMYK color space

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102833514A (en) * 2012-08-07 2012-12-19 南昌大学 Measurement-matrix-controlled image compressive sensing and image encryption method
CN103077495A (en) * 2013-02-01 2013-05-01 上海理工大学 Digital holography watermarking algorithm based on QR (quick response) code
CN106408498A (en) * 2016-09-10 2017-02-15 天津大学 Two-dimensional hyper-chaotic combining Fresnel transformation single lens optical image encrypting method
US20170104593A1 (en) * 2015-10-12 2017-04-13 Safe Cash Payment Technologies, Inc. Key storage methods

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102833514A (en) * 2012-08-07 2012-12-19 南昌大学 Measurement-matrix-controlled image compressive sensing and image encryption method
CN103077495A (en) * 2013-02-01 2013-05-01 上海理工大学 Digital holography watermarking algorithm based on QR (quick response) code
US20170104593A1 (en) * 2015-10-12 2017-04-13 Safe Cash Payment Technologies, Inc. Key storage methods
CN106408498A (en) * 2016-09-10 2017-02-15 天津大学 Two-dimensional hyper-chaotic combining Fresnel transformation single lens optical image encrypting method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
SUI L, XU M, TIAN A: "Optical noise-free image encryption based on quick response code and high dimension chaotic system in gyrator transform domain", 《OPTICS AND LASERS IN ENGINEERING》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110536041A (en) * 2019-08-27 2019-12-03 天津大学 Quick response coding and several color image optical encryption methods of CMYK color space
CN110536041B (en) * 2019-08-27 2021-11-16 天津大学 Quick response coding and CMYK color space multi-color image optical encryption method

Similar Documents

Publication Publication Date Title
Verma et al. An optical asymmetric encryption scheme with biometric keys
Cayre et al. Watermarking security: theory and practice
Liu et al. A novel image encryption algorithm based on improved 3D chaotic cat map
CN108040191B (en) Image encryption and decryption method based on hash chain compressed sensing
Singh Cascaded unequal modulus decomposition in Fresnel domain based cryptosystem to enhance the image security
CN110519037B (en) Image encryption method of hyperchaotic pseudorandom sequence
CN103023633A (en) Digital image hiding method based on chaotic random phase and coherence stack principle
CN108665964A (en) A kind of medical image wavelet field real-time encryption and decryption algorithm based on multi-chaos system
CN107888370A (en) Image encryption method and device
CN108111710A (en) A kind of more image encryption methods that can reduce ciphertext and key data amount
US20220052851A1 (en) Methods for Optical Image Encryption and Decryption Based on Biological Information
CN105812614B (en) More image encryptions and decryption method based on optical field imaging with digital refocusing technology
Mostaghim et al. CVC: Chaotic visual cryptography to enhance steganography
CN111882477A (en) Self-adaptive zero-watermarking method combining visual password and enhanced singular value decomposition
CN105373739A (en) Hyperchaotic system based quantum image encryption method
CN110136045B (en) Method for hiding and recovering based on mutual scrambling of two images
Islam et al. Denoising and error correction in noisy AES-encrypted images using statistical measures
CN108810313A (en) Image encryption method based on high-dimension chaotic system and QR codes in revolution domain
CN110569945B (en) QR code encryption method based on single-intensity recording phase recovery process
Garg et al. Fingerprint watermarking and steganography for ATM transaction using LSB-RSA and 3-DWT algorithm
CN111444522B (en) Random blocking chaotic image encryption method
Mishra et al. Hybrid image encryption and decryption using cryptography and watermarking technique for high security applications
CN109191538A (en) A kind of more image authentication methods of optics based on revolution domain Phase Retrieve Algorithm
Wang et al. Image encryption scheme based on a Gaussian apertured reality-preserving fractional Mellin transform
CN108898540A (en) Dual image encryption method based on discrete fraction angular transformation and chaology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181113