CN110312053A - Optical encryption method based on hierarchical Fourier spectrum decomposition and mixed random mask - Google Patents

Optical encryption method based on hierarchical Fourier spectrum decomposition and mixed random mask Download PDF

Info

Publication number
CN110312053A
CN110312053A CN201910392392.3A CN201910392392A CN110312053A CN 110312053 A CN110312053 A CN 110312053A CN 201910392392 A CN201910392392 A CN 201910392392A CN 110312053 A CN110312053 A CN 110312053A
Authority
CN
China
Prior art keywords
mask
function
decomposition
optical
phase
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910392392.3A
Other languages
Chinese (zh)
Other versions
CN110312053B (en
Inventor
潘良
温建峰
赵艳春
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NANTONG INSTITUTE OF TECHNOLOGY
Original Assignee
NANTONG INSTITUTE OF TECHNOLOGY
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NANTONG INSTITUTE OF TECHNOLOGY filed Critical NANTONG INSTITUTE OF TECHNOLOGY
Priority to CN201910392392.3A priority Critical patent/CN110312053B/en
Publication of CN110312053A publication Critical patent/CN110312053A/en
Application granted granted Critical
Publication of CN110312053B publication Critical patent/CN110312053B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Power Engineering (AREA)
  • Collating Specific Patterns (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses an optical encryption method based on hierarchical Fourier spectrum decomposition and mixed random mask, which comprises the following steps: constructing a mixed random mask; performing optical modulation on the initial plaintext according to fractional order Fourier transform and a mixed random mask to obtain a Fourier spectrum; and (4) dividing the Fourier spectrum by an equal-film decomposition method to obtain and output a ciphertext and a private key. The invention realizes the encryption of the optical image by fusing the Fresnel wave band, the Hilbert phase and the chaotic mask, has more ideal anti-interference capability and safety, and has more ideal decryption quality under the attacks of noise, shearing and the like.

Description

Optical encryption method based on hierarchical Fourier spectrum decomposition and mixed random mask
Technical Field
The invention relates to the field of optical image encryption, in particular to an optical encryption method based on hierarchical Fourier spectrum decomposition and mixed random mask.
Background
With the development of globalization trend, cross-country and cross-region communication is more common, and meanwhile, the problem of information security is serious, especially the phenomena of stealing and leakage of user information are more prominent due to the popularization and application of the internet [1 ]. The image has rich visual content and is a common medium for communication in various fields, such as medicine, security protection, industrial engineering and the like [2 ]. However, when the image is used across areas, the image is often realized by means of a network, and at the moment, the image is vulnerable to unknown attacks, so that related information is subjected to random attacks, and the authenticity identification of the content is difficult [3 ]. In order to ensure the authenticity of the image information at the receiving end, domestic and foreign scholars design corresponding image encryption technologies, and the encryption schemes widely studied at present mainly include 2 directions: chaotic encryption and optical encryption [4 ]. For example, Zhang et al [5] propose a plaintext related image encryption method based on chaos in order to enhance the plaintext attack resistance of an encryption system, perform one scrambling on a plaintext by iterating a key obtained by piecewise linear mapping by using characteristics of the plaintext, perform two diffusions on a scrambling result by designing a diffusion function, and highly change a pixel value. Liu 6 provides an image encryption method based on a bit plane and improved Logistic mapping for optimizing the security of an encrypted ciphertext, a plaintext is scrambled by utilizing a chaotic sequence output by iterative Logistic mapping, the scrambled ciphertext is decomposed into a high 4-bit matrix and a low 4-bit matrix, the Logistic mapping is iterated by utilizing low 4-bit matrix information, a group of key streams closely related to the plaintext is output, an XOR operator is combined, the high 4-bit matrix information is diffused, and an encrypted result is obtained by combining the encrypted high 4-bit matrix and the initial low 4-bit matrix. Li et al [7] propose a hyperchaotic image encryption method based on pixel-level and bit-level replacement in order to enhance the anti-attack capability of the encryption system, utilize the output sequence of the iterative 5D hyperchaotic system as the key stream, and construct the pixel-level and bit-level replacement method, highly disturb the pixel position of the plaintext, at the same time, define the diffusion scheme, implement encryption on the confusion result.
The methods all belong to the category of chaotic encryption, and the scheme effectively utilizes the complex phase space and randomness of the chaotic system, and can improve the transmission security of the image in an open network to a certain extent, however, the chaotic system has poincare restorability, and the image is encrypted by utilizing the output sequence of the chaotic system, so that the security of the ciphertext is not ideal [3-4 ]. In recent years, optical encryption is researched by broad scholars due to the characteristics of parallelism, high speed and the like, for example, Zhangbo et al [3] designs an optical image encryption method based on coherent superposition and modular equal vector decomposition, generates a chaotic phase mask by utilizing plaintext and Logistic mapping, completes modulation on an initial image through Fourier transformation to obtain a corresponding Fourier spectrum, designs a one-way coding mechanism by combining an equal modular decomposition mechanism and a phase-amplitude truncation coding technology, outputs a coded ciphertext and amplitude information through the correlated superposition of laser beams, and verifies the attack resistance of the encryption technology through experimental results. Wang et al [8] proposed a new asymmetric optical image encryption scheme based on a phase retrieval method, constructed two phase masks through a random sequence of an iterative chaotic system, and encrypted a plaintext through a retrieval technique to obtain a real-valued function, and test data verified the reliability and encryption speed of the scheme. Muhammad et al [97] propose an optical image encryption technology of Hartley transform coupling Gyrator transform in order to improve the external attack resistance of a ciphertext, introduce Hartley transform to preprocess an image, obtain a first ciphertext through a phase-amplitude truncation mechanism, combine a random mask, perform Gyrator transform processing on the ciphertext, output a corresponding Gyrator frequency spectrum, and complete decomposition by using a phase-amplitude truncation method to obtain an encrypted ciphertext.
The optical encryption scheme can enhance the anti-attack capability of a ciphertext, but in the process of modulating the plaintext, a common chaotic phase mask is adopted, and the mask has high randomness.
Reference documents:
[1] xiaoning, Liezarmy. optical image encryption algorithm [ J ] based on circular harmonic component development and Gyrator transform domain phase retrieval, electron survey and instrumental report, 2017, 31 (6): 876-884
Xiao Ning,LiAijun.Optical image encryption algorithm based on circular harmonic component expansion and gyrator transform domain phaseretrieval[J].Journal of Electronic Measurement and Instrument,2017,31(6):876-884
[2] An optical color image lossless encryption algorithm [ J ] based on quick response decomposition and color space conversion, an optical technology, 2018, 44 (5): 576-585
ShiKunquan,WeiWenguo.Optical color image lossless encryption algorithm based on fast response decomposition and color spaceconversion[J].Optical technology,2018,44(5):576-585
[3] Zhangbo, Longhui, Jiangwei, an optical image encryption algorithm [ J ] based on coherent superposition and modulo equal vector decomposition, electronics and informatics, 2018, 40 (2): 438-446
Zhang Bo,Long Hui,JiangFeibo.Optical image encryption algorithm based on coherent superposition and modulus equal vector decomposition[J].Journal of Electronics and Information,2018,40(2):438-446
[4] Multi-image optical encryption algorithm [ J ] based on Gyrator spectral decomposition and chaotic helical phase mask, electron measurement and instrumental report, 2018, 32 (5): 116-125
KangWanjie.Multi-image optical encryption algorithm based on gyrator spectrum decomposition and chaotic spiral phase mask[J].Journal of Electronic Measurement and Instrument,2018,32(5):116-125
[5]ZhangY,TangY J.A plaintext-related image encryption algorithm based on chaos[J].Multimedia Tools and Applications,2017,77(6):6647-6669
[6]LiuJ Y,YangDD,ZhouH B.A digital image encryption algorithm based on bit-planes and an improved logistic map[J].Multimedia Tools and Applications,2018,77(8):10217-10233
[7]LiY P,WangC H,ChenH.A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation[J].Optics and Lasers in Engineering,2017,2017,90(8):238-246
[8]Wang Y,Quan C.Asymmetric optical image encryption based on an improved amplitude-phase retrieval algorithm[J].Optics and Lasers in Engineering,2016,78(10):8-16
[9]MuhammadR A.An asymmetric single-channel color image encryption based on Hartley transform and gyrator transforms[J].Optics&Lasers in Engineering,2016,69(8):49-57
[10]Gao Y,Liu B.Study on the dynamical behaviors of a two-dimensional discrete system[J].Nonlinear Anal,2009,70(12):4209-4216
[11] Yang Hongyu, Wang is Ming.A color two-dimensional code chaotic encryption method [ J ] based on SHA-256 and DNA sequence, university of great connecting theory, 2017, 57 (6): 629-637
YangHongi,Wang Zaiming.Chaotic encryption method of color two-dimensionalcode based on SHA-256and DNA sequences[J].Journal of Dalian University of Technology,2017,57(6):629-637
[12] Color image encryption system based on phase-truncated fresnel transform [ J ] modern electronics, 2016, 39 (2): 73-77
HongYinghong,XiongJianbin.Color image encryption system based on phase truncated fresnel transform[J].Modern Electronic Technology,2016,39(2):73-77
[13]MoralesY,DiazL,TorresC.Radial Hilbert Transform in Terms of the Fourier Transform Applied to Image Encryption[J].Joumal of Physics:Conference Series,2015,582(1)∶012063-012072
[14] Shexingbo, Jiangxi value, two-dimensional discrete fractional order Fourier transform double chaotic image encryption algorithm [ J ] computer engineering and application, 2018, 54(3) to 40-45
XieGuobo,Jiang Xianzhi.Two chaotic image encryption algorithmbased on two dimensional discrete fractional fouriertransform[J].Computer Engineering and Application,2018,54(3):40-45
[15]CAIJJ,SHENX J.Modified optical asymmetric image cryptosystem based on coherent superposition and equal modulus decomposition[J].Optics and Laser Technology,2016,359(15):26-30
[16] Indian azolla image encryption algorithm research of chaotic neuron coupling scrambling neuron [ J ] packaging engineering, 2014, 35 (15): 105-112
TianYuping.Image encryption algorithm based on chaotic neurons coupled with scrambling neurons[J].Packaging Engineering,2014,35(15):105-112
[17] Guo Jingbo. image encryption algorithm [ J ] based on cross-interchange of physical random bit generators with chaotic pixels packaging engineering, 2018, 39 (13): 222-232
GuoJingbo.Image encryption algorithm based on physical random bit generator and chaotic pixel cross swaps[J].Packaging Engineering,2018,39(13):222-232
Disclosure of Invention
In order to solve the technical problems, the invention provides an optical encryption method based on hierarchical Fourier spectrum decomposition and mixed random mask, which has more ideal anti-interference capability and safety and has more ideal decryption quality under attacks such as noise, shearing and the like.
In order to achieve the purpose, the technical scheme of the invention is as follows:
an optical encryption method based on hierarchical Fourier spectrum decomposition and mixed random mask comprises the following steps:
the method comprises the following steps: constructing a mixed random mask;
step two: performing optical modulation on the initial plaintext according to fractional order Fourier transform and a mixed random mask to obtain a Fourier spectrum;
step three: and (4) dividing the Fourier spectrum by an equal-film decomposition method to obtain and output a ciphertext and a private key.
Further, the first step specifically comprises:
step 101: according to SHA-256 Hash method, a 256-bit external key K is formed and divided into 32 sub-keys Ki
Step 102: introducing a two-dimensional Ushiki mapping by said subkey kiCalculating initial conditions of two-dimensional Ushiki mapping, and then outputting a group of random sequences through iteration to obtain a chaotic phase mask CRM;
step 103: introducing an amplitude of a Fresnel wave band and a Hilbert phase function, and fusing the amplitude of the Fresnel wave band and the Hilbert phase function with the chaotic phase mask to obtain a mixed random mask.
Further, the step 102 specifically includes:
step 102-1: introducing a two-dimensional Ushiki mapping to generate a set of random sequences, the two-dimensional Ushiki mapping being a function of:
wherein, yn、xnIs a system variable; a. b and c are chaotic control parameters, b is 0.1, c is 0.2, a belongs to [2.5,3.8 ]];
Step 102-2: computing an initial value x of a two-dimensional Ushiki mapping from a child key ki0And y0The calculation formula is as follows:
step 102-3: according to the initial value x0And y0And performing M multiplied by N iterations on the function of the two-dimensional Ushiki mapping by the chaotic control parameters a, b and c to obtain two random sequences: x ═ X1,x2.....xM×N}、Y={y1,y2.....yM×N};
Step 102-4: according to the sequence { xiAnd { y }iAnd constructing a chaotic phase mask CRM, wherein the calculation formula is as follows:
wherein Z is xnAnd ymA two-dimensional sequence of constructs.
Further, the step 103 specifically includes:
calculating a Fresnel zone function F (r) according to the formula:
wherein r is the radius of the focus ring; f is the focal length; λ is the wavelength of the light wave; j is an imaginary number;
and calculating a Hilbert phase function, wherein the calculation formula is as follows:
H(ρ,θ)=exp(jρθ)
where (ρ, θ) is the polar coordinate, the calculation function is:
ρ=x2+y2,θ=tan-1(y/x)
calculating a hybrid random mask C (x, y) by the formula:
C(x,y)=exp{j{arg[CRM(x,y)]}×{arg[F(r)]}×{arg[H(ρ,θ)]}}
wherein arg () is an argument function.
Further, the fractional order Fourier transform is:
wherein F (u, v) represents a fractional order Fourier transform;is an angle; (x, less) is the spatial domain coordinate; (u, v) are Fourier transform domain coordinates; a is the order of the Fourier transform; a. theaIs a phase factor, depending on the value of a.
Further, the medium membrane decomposition method in the third step specifically comprises the following steps:
step 301: acquiring amplitude A (u, v) and phase information psi (u, v) of a modulation result;
wherein,in order to round the symbol down,
step 302: calculating a function of the rotation angle theta (u, v), wherein the calculation formula is as follows:
θ(u,v)=2πr×rand(u,v)
wherein rand (u, v) is a random function satisfying a uniform distribution;
step 302: performing equimodular decomposition on I (u, v), and outputting two independent components, namely ciphertext P1(u, v) with the private key P2(u, v) the calculation formula is:
P1(u,v)={0.5A(u,v)/cos[ψ(u,v)-θ(u,v)]}×exp{iθ(u,v)} (15)
P2(u,v)={0.5A(u,v)/cos[ψ(u,v)-θ(u,v)]}×exp{i[2ψ(u,v)-θ(u,v)]}。
the invention has the beneficial effects that:
the optical encryption method based on the hierarchical Fourier spectrum decomposition and the mixed random mask realizes the encryption of an optical image by fusing a Fresnel wave band, a Hilbert phase and a chaotic mask, and firstly, a 256-bit external key is formed according to an SHA-256 Hash method and is divided into 32 sub-keys; introducing two-dimensional Ushiki mapping, calculating initial conditions of the two-dimensional Ushiki mapping by using a sub-key, and outputting a group of random sequences through iteration so as to construct a chaotic phase mask; then, introducing a Fresnel wave band amplitude and a Hilbert phase function, and fusing the Fresnel wave band amplitude and the Hilbert phase function with the chaotic phase mask to form a mixed mask, wherein the randomness and the optical axis calibration precision are considered; based on fractional order Fourier transform, combining with a mixed mask to complete optical modulation on an initial plaintext, and acquiring a Fourier spectrum; and finally, the Fourier spectrum is divided by an equimode decomposition method, and a ciphertext and a private key are output, so that the method has more ideal anti-interference capability and safety, and has more ideal decryption quality under attacks such as noise, shearing and the like.
Drawings
FIG. 1 is a flow chart of an encryption method of the present invention; .
FIG. 2 is a diagram of an opto-electric hybrid for the encryption process of the present invention;
FIG. 3 is a schematic diagram of a chaotic attractor in accordance with the present invention;
FIG. 4 is a schematic diagram of hybrid random mask generation of the present invention, wherein (a) is the original plaintext, (b) is the chaotic phase mask, (c) is the Fresnel band mask, (d) is the Hilbert phase mask, and (e) is the hybrid random phase mask;
FIG. 5 is a diagram illustrating the results of the optical encryption of the present invention, wherein (a) is the result of the optical modulation, (b) is the output ciphertext, and (c) is the private key;
FIG. 6 is a schematic diagram of an equi-modal decomposition process of the present invention;
FIG. 7 is a schematic diagram of the decrypting optoelectronic device of the present invention;
FIG. 8 shows the results of different schemes of encryption, where (a) is the original plaintext, (b) is the output ciphertext of the present invention, (c) is the first ciphertext of document [3], (d) is the second ciphertext of document [3], and (e) is the ciphertext of document [9 ];
FIG. 9 is a diagram illustrating the results of the key sensitivity test according to the present invention, wherein (a) is the ciphertext of the wrong key, (b) is the difference between the ciphertexts, and (c) is the histogram corresponding to the difference between the ciphertexts;
FIG. 10 is a schematic diagram of the shear attack resistance test of the present invention, in which (a) is the shear destruction and decryption result of the ciphertext, (b) is the shear destruction and decryption result of the first and second ciphertexts of document [3], and (c) is the shear destruction and decryption result of the ciphertext of document [9 ];
fig. 11 is a schematic diagram of the test of the noise attack resistance capability of the present invention.
Detailed Description
Preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings.
As shown in fig. 1 and fig. 2, the optical encryption method based on hierarchical Fourier spectrum decomposition and mixed random mask provided in this embodiment includes 3 stages: (1) constructing a mixed random mask; (2) initial image modulation by means of fractional order Fourier transform; (3) and outputting the ciphertext based on the equimodular decomposition.
The phase mask is an important element in the optical encryption process, and has a great influence on the security of a ciphertext. Therefore, the problem of randomness and optical axis calibration is considered, and a chaotic phase mask is fused with Fresnel wave band and Hilbert phase functions to construct a mixed mask. First, a two-dimensional Ushiki mapping is introduced to generate a set of random sequences, whose function is:
wherein, yn、xnIs a system variable; a. b and c are control variables of the chaotic system according to the literature [10 ]]It is understood that when b is 0.1, c is 0.2, a is e [2.5,3.8 ]]When the chaotic attractor is used, the expression (1) is in a chaotic state, and a typical chaotic attractor is shown in fig. 3.
The initial condition of the set (1) cannot be improved by simply relying on empirical values, and for this reason, the SHA-256 hashing method is introduced to generate a group of keys K related to the plaintext and decompose the keys K into 32 sub-keys Ki
K=k1,k2····k32 (2)
Then, according to the sub-key kiTo calculate an initial value x of the Ushiki mapping0And y0
Then according to x0And y0And chaotic control parameters a, b and c, and performing iteration on the formula (1) M times by N times to form two random sequences
X={x1,x2.....xM×N}、Y={y1,y2.....yM×N}. Then according to the sequence { xiAnd { y }iConstructing a chaotic Phase mask CRM (chaotic Phase mask):
wherein Z is xnAnd ymA two-dimensional sequence of constructs.
Taking fig. 4(a) as an example, the random mask formed according to equations (1) to (4) is shown in fig. 4(b), where b is 0.1, c is 0.2, and a is 3.72. However, in the optical encryption process, if such a completeness is used alone. The Fresnel wave band [12] and Hilbert phase function [13] are introduced to solve. Wherein the Fresnel axis is aligned, the calculation function is:
wherein r represents the radius of the focus ring; f is the focal length; λ is the wavelength of the light wave; j is an imaginary number; f (r) is a function of the Fresnel bands.
In addition, the opposite halves of any radial line of the Hilbert phase function have a relative bit error of P π radians (where P represents the Hilbert order), which helps align the axis of the optical device, and its function H (ρ, θ) is:
H(ρ,θ)=exp(jρθ) (6)
where (ρ, θ) is the polar coordinate, the calculation function is:
ρ=x2+y2,θ=tan-1{y/x) (7)
according to CRM (x, y), F (r) and H (rho, theta) output by the process, fusing the CRM (x, y), the F (r) and the H (rho, theta) to establish a mixed random mask:
C(x,y)=exp{j{arg[CRM(x,y)]}×{arg[F(r)]}×{arg[H(ρ,θ)]}} (8)
wherein arg () represents the argument function; c (x, y) is a mixed random mask.
Similarly, taking fig. 4(a) as an example, the output 3 masks are shown in fig. 4(c) to 4(e) according to equations (5) to (8), respectively. The graph shows that the mixed random phase mask effectively combines the characteristics of CRM (x, y), F (r) and H (rho, theta) masks, so that the mixed random phase mask not only has good randomness, but also can fully solve the problem of optical axis calibration in a photoelectric mixing device.
The fractional order Fourier transform is an extended version of the classical Fourier transform, and for a digital image f (x, y), its corresponding fractional order Fourier transform:
wherein F (u, v) represents a fractional order Fourier transform;is an angle; cot is the cotangent function; cos is the cosine function; sin is a sine function; (x, y) are spatial coordinates; (u, v) are Fourier transform domain coordinates; a is the order of the Fourier transform; a. theaIs a phase factor, depending on the value of a. Order toThe inverse transform of equation (9)[14]
From document [14], it is known that the optical implementation of the fractional Fourier transform is relatively simple and can be done with a single or two lenses. Optical modulation is applied to the plaintext based on equation (9) using a hybrid random phase mask:
I(u,v)=Fα[f(x,y)exp[i2πC(x,y)] (12)
wherein, FaRepresenting a Fourier transform.
Taking fig. 4(a) as an example, taking a to 0.84, the output modulation result according to the above transformation process is shown in fig. 5 (a).
In order to destroy the linear relation of an encryption system and enhance the security of a ciphertext, an equimode decomposition method is introduced to process a Fourier modulation result of a plaintext. The equimodular decomposition is an asymmetric cryptosystem based on coherent superposition, and can divide an image into two independent components, and the process is shown in fig. 6. Let the modulation result be I (u, v), then the amplitude and phase information is:
wherein A (u, v) is amplitude information; ψ (u, v) is phase information;
is a round-down operation; and | is an absolute value arithmetic sign.
In addition, the rotation angle θ (u, v) function in fig. 6 is[15]
θ(u,v)=2π×rand(u,v) (14)
Where rand (u, v) is a random function that satisfies a uniform distribution.
Then according to fig. 6, I (u, v) is subjected to an equi-modal decomposition, outputting two independent components P1(u, v) and P2(u, v) are:
P1(u,v)={0.5A(u,v)/cos[ψ(u,v)-θ(u,v)]}×exp{iθ(u,v)} (15)
P2(u,v)={0.5A(u,v)/cos[ψ(u,v)-θ(u,v)]}×exp{i[2ψ(u,v)-θ(u,v)]} (16)
calculating by the formula (15) and the formula (16), and converting P into1(u, v) treating as ciphertext; and P is2(u, v) is then used as the private key for decryption. The results of the equi-modal decomposition of the sample shown in FIG. 5(a) are shown in FIG. 5(b) and FIG. 5 (c).
For ciphertext P1The decryption process of (u, v) is simple and mainly depends on the private key P2(u, v) the image is restored by corresponding electro-optical means, the process of which is shown in fig. 7. Using two spatial light modulator pairs P1(u,v)、P2(u, v) modulating, and the two beams interfere with each other in the beam splitter; the beam is then transformed in a fractional Fourier inverse transform. Finally, on the output plane of the optical transform system, the decrypted image can be recorded by an intensity detector. Taking fig. 5(b) as an example, the restored image is output by the decryption apparatus of fig. 7 based on the private key of fig. 5 (c). Discovery from the graphThe decryption quality is ideal, the details are clear and complete, and the distortion degree is low.
In order to verify the effectiveness and the attack resistance of the proposed algorithm, a matlab6.5 platform is adopted for implementation. In addition, reference [3] and reference [9] are used as control groups in the present experiment to reflect the advantages of the proposed protocol. The experimental parameters are set as follows: the chaos control variable b is 0.1, c is 0.2, a is 3.39; the wavelength λ of light wave is 632.8mm, the radius r of the focusing ring is 0.003m, and the focal length f is 40 mm; the order P of Hilbert is 2; the order of the fractional Fourier transform is 0.84.
And (3) encryption effect testing:
taking FIG. 8(a) as an example, with the help of the proposed method, document [3]]And document [9]]The three schemes perform encryption processing on the data, and the output results are shown in fig. 8(b) to 7 (e). It is found from the figure that after the initial plaintext is modulated by three different optical encryption methods, the content information is sufficiently concealed, an attacker can not easily learn any useful clue from the content information, and the original plaintext has ideal visual concealment. However, the three ciphertext output forms are really different, wherein the proposed algorithm is the same as the document [9]]In agreement, both produce a ciphertext, but document [3]]2 ciphertexts are generated. Meanwhile, in order to objectively measure the safety of the three schemes, the test depends on the entropy value[1]The evaluation and the calculation data are shown in Table 1. From the data, it was found that the three schemes all produced ciphertext entropy close to theoretical "8", but the proposed scheme has the largest entropy, about 7.997, as compared to document [3]]Corresponding two ciphertext entropy values are 7.984, 7.981, respectively [9]Has an entropy value of about 7.969. This is explained with respect to document [3]]And document [9]]The encryption security of the proposed scheme has certain advantages. The two-dimensional Ushiki mapping is iterated by the algorithm by using the key acquired by the SHA-256 Hash method, so that the constructed chaotic phase mask gives consideration to randomness and sensitivity, a Fresnel wave band and a Hilbert phase function are fused to form a new mixed mask, the problem of optical axis calibration is effectively solved, the security of a ciphertext can be enhanced, and meanwhile, the ciphertext is acquired by combining fractional order Fourier transform and an equimodular decomposition method, the nonlinearity of the ciphertext is optimized, and the encryption security of the ciphertext is highest. Document [3]Then vector division is equalized by coherent superposition and modulusThe decoding method generates a ciphertext by utilizing Fourier transform and phase-amplitude truncation coding technologies with different orders, and although the technology adopts an equal modulus decomposition and phase-amplitude truncation coding technology, the linear characteristic of the ciphertext can be obviously reduced, and the plaintext attack resistance of the ciphertext is improved, the optical encryption method only utilizes a common chaotic mask during optical encryption, and cannot solve the problem of optical axis calibration in a photoelectric mixing device, so that the safety of the photoelectric mixing device needs to be further improved. Document [9]]The Hartley transform and the phase-amplitude truncation mechanism are utilized to output the ciphertext through the Gyrator transform, the technology can destroy the linear relation of an encryption system, but the plaintext is ignored in the whole optical modulation process, the sensitivity of the ciphertext to the plaintext is reduced, and when the Gyrator transform is carried out, a single chaotic mask is adopted, the defect of optical axis calibration cannot be overcome, and the safety of the ciphertext is not ideal.
As shown in table 1 below:
table 1 test of entropy data
Table 1Entropy data test
Name (R) FIG. 8(b) FIG. 8(c) FIG. 8(d) FIG. 8(e)
Entropy value 7.997 7.984 7.981 7.969
And (3) sensitivity test:
key sensitivity is a common analytical indicator for measuring encryption algorithms, and generally needs to meet the avalanche effect, and when the encryption key is slightly modified, the obtained ciphertext is distinct[16]. To this end, the sensitivity of the chaotic variable a ═ 3.39 was tested herein. First, the deviation Δ is introduced as 10-16To establish an error key a1=3.39+10-16. The remaining keys are unchanged. Using fig. 8(a) as a sample, the set of error keys is used to encrypt the sample, and the result is shown in fig. 9(a) -9 (c). It can be seen from the figure that even if key a occurs 10-16The corresponding ciphertext thereof is visually greatly different from that of fig. 8(b), see fig. 9(b), and the histogram thereof greatly fluctuates in the diagonal direction, see fig. 9 (c). This indicates that the proposed optical encryption scheme satisfies the strict "avalanche effect".
And (3) testing the anti-attack capability:
(1) and (3) testing the anti-chosen plaintext attack capacity:
security analysis model in which plaintext attack is commonly selected[3]. To this end, three protocols were analyzed for their ability to resist such attacks by means of the NPCR (number of Pixel Change Rate) and UACI (unified Average Change intensity) curves as a function of:
wherein, WXH is the size of the plaintext; di printing is binarization operation; i and I' respectively represent corresponding ciphertexts after two different plaintexts are encrypted.
Tampering the pixel value 76 at (201, 87) in fig. 7(a) with 101, thereby generating a new plaintext; then, the two different plaintexts are optically encrypted by means of the proposed scheme, the document [3] and the document [9] to obtain 2 ciphertexts; NPCR and UACI curves corresponding to different algorithms were obtained based on equations (17) to (19), and the data are shown in fig. 9. The graph shows that the algorithm and the document [3] have higher capability of resisting attack of the chosen plaintext, while the document [9] has weaker capability of resisting the attack, and the stable NPCR values of the three are respectively 99.87%, 99.69% and 98.13%. Similarly, the stable UACI values were 35.72%, 35.06%, and 34.61%, respectively. The main reason is that the proposed scheme and the optical encryption process of the document [3] are both related to plaintext, so that the scheme is very sensitive to the change of the initial image content, and the chosen plaintext attack resistance of the scheme and the document [3] is effectively improved, but the proposed scheme considers the Fresnel zone and the Hilbert phase function, so that the optical axis calibration problem in the optical-electrical hybrid device can be solved, and the attack resistance of the scheme is slightly higher than that of the document [3 ]. While the optical encryption process of document [9] ignores the plaintext, making it less resistant to chosen plaintext attacks.
(2) And (3) cutting attack capability test:
the shearing attack is an important index for objectively measuring the security of the encryption method. Therefore, fig. 8(b) to 8(e) are taken as examples, and the same degree of cutting damage is applied to them, as shown in fig. 10(a), 10(b), and 10 (c); the truncated ciphertext is then restored by the proposed scheme, the decryption process of documents [3] and [9], and the result is shown in fig. 10(b), fig. 10(e) and fig. 10 (c). The decryption quality of the proposed scheme is found to be the highest according to the recovered data, and the details are clear and complete, see fig. 10 (a); the decryption quality of document [3] is acceptable, but some details are lost, see fig. 10 (b); the visual effect of decryption of document [9] is poor, see fig. 10 (c).
The image is interfered by noise in network transmission and subsequent processing, so that the encryption scheme can be sufficiently resistant to noise attack[1]. Therefore, in this document, gaussian noise with different intensities is applied to fig. 8(b) to 8(e), and the formed noise image is:
E′=E(1+kN) (20)
wherein E' is the noise-added image; k represents a noise intensity coefficient; n is gaussian noise.
Fig. 11 shows the ciphertext recovery quality of the three algorithms under different strength attacks. The graph shows that when the value of the intensity coefficient k is gradually increased, the value of the MSE (Mean-Square Error) of the restoration result is also increased, and the three optical encryption technologies all present more robust anti-noise capability; however, the noise immunity of the proposed technique is higher, and when the intensity coefficient k is equal to 1, the MSE value of the restored image is about 666, which is smaller than documents [3] and [9], and the MSE of the restored image respectively reaches 857 and 1049. This illustrates that the proposed optical encryption scheme is more robust to noise.
In order to enhance the security of the ciphertext, the embodiment designs an optical image encryption algorithm of a hierarchical Fourier spectrum decomposition and a mixed random mask. Constructing a chaotic mask by combining a plaintext content and an SHA-256 method through two-dimensional Ushiki mapping; in order to solve the problem of optical axis calibration, the characteristics of a focusing ring introduced into a Fresnel wave band, relative error between the focusing ring and a Hilbert phase function and the like are fully utilized, and masks of the focusing ring and the Hilbert phase function are fused with a chaotic mask to form a new phase mask; and then, the fractional Fourier transform is utilized to complete optical modulation on the plaintext. And finally, segmenting the Fourier spectrum by means of an equimode decomposition method to obtain a corresponding ciphertext. The values of various external attack experiments indicate the safety and robustness of the optical encryption scheme.
With respect to the preferred embodiments of the present invention, it should be noted that, for those skilled in the art, various changes and modifications can be made without departing from the inventive concept of the present invention, and these changes and modifications are within the scope of the present invention.

Claims (6)

1. An optical encryption method based on hierarchical Fourier spectrum decomposition and mixed random mask is characterized by comprising the following steps:
the method comprises the following steps: constructing a mixed random mask;
step two: performing optical modulation on the initial plaintext according to fractional order Fourier transform and a mixed random mask to obtain a Fourier spectrum;
step three: and (4) dividing the Fourier spectrum by an equal-film decomposition method to obtain and output a ciphertext and a private key.
2. The method for optical encryption based on hierarchical Fourier spectrum decomposition and mixed random mask as claimed in claim 1, wherein the first step is specifically:
step 101: according to SHA-256 Hash method, a 256-bit external key K is formed and divided into 32 sub-keys Ki
Step 102: introducing a two-dimensional Ushiki mapping by said subkey kiCalculating initial conditions of two-dimensional Ushiki mapping, and then outputting a group of random sequences through iteration to obtain a chaotic phase mask CRM;
step 103: introducing an amplitude of a Fresnel wave band and a Hilbert phase function, and fusing the amplitude of the Fresnel wave band and the Hilbert phase function with the chaotic phase mask to obtain a mixed random mask.
3. The method for optical encryption based on hierarchical Fourier spectrum decomposition and mixed random mask as claimed in claim 2, wherein the step 102 specifically comprises:
step 102-1: introducing a two-dimensional Ushiki mapping to generate a set of random sequences, the two-dimensional Ushiki mapping being a function of:
wherein, yn、xnIs a system variable; a. b and c are chaotic control parameters, b is 0.1, c is 0.2, a belongs to [2.5,3.8 ]];
Step 102-2: according to the subkey kiCalculating an initial value x of a two-dimensional Ushiki mapping0And y0The calculation formula is as follows:
step 102-3: according to the initial value x0And y0Mixing ofChaos control parameters a, b, c perform M × N iterations on the two-dimensional Ushiki mapped function to obtain two random sequences: x ═ X1,x2…..xM×N}、Y={y1,y2…..yM×N};
Step 102-4: according to the sequence { xiAnd { y }iAnd constructing a chaotic phase mask CRM, wherein the calculation formula is as follows:
wherein Z is xnAnd ymA two-dimensional sequence of constructs.
4. The method for optical encryption based on hierarchical Fourier spectrum decomposition and mixed random mask as claimed in claim 2, wherein the step 103 specifically comprises:
calculating a Fresnel zone function F (r) according to the formula:
wherein r is the radius of the focus ring; f is the focal length; λ is the wavelength of the light wave; j is an imaginary number;
and calculating a Hilbert phase function, wherein the calculation formula is as follows:
H(ρ,θ)=exp(jρθ)
where (ρ, θ) is the polar coordinate, the calculation function is:
ρ=x2+y2,θ=tan-1(y/x)
calculating a hybrid random mask C (x, y) by the formula:
C(x,y)=exp{j{arg[CRM(x,y)]}×{arg[F(r)]}×{arg[H(ρ,θ)]}}
wherein arg () is an argument function.
5. The method of claim 1, wherein the fractional Fourier transform is to:
wherein F (u, v) represents a fractional order Fourier transform;is an angle; (x, y) are spatial coordinates; (u, v) are Fourier transform domain coordinates; a is the order of the Fourier transform; a. theaIs a phase factor, depending on the value of a.
6. The method for optical encryption based on hierarchical Fourier spectrum decomposition and mixed random mask as claimed in claim 1 or 4, wherein the third-step medium film decomposition method specifically comprises:
step 301: acquiring amplitude A (u, v) and phase information psi (u, v) of a modulation result;
wherein,in order to round the symbol down,
step 302: calculating a function of the rotation angle theta (u, v), wherein the calculation formula is as follows:
θ(u,v)=2π×rand(u,v)
wherein rand (u, v) is a random function satisfying a uniform distribution;
step 302: performing equimodular decomposition on I (u, v), and outputting two independent components, namely ciphertext P1(u, v) with the private key P2(u, v) the calculation formula is:
P1(u,v)={0.5A(u,v)/cos[ψ(u,v)-θ(u,v)]}×exp{iθ(u,v)}(15)
P2(u,v)={0.5A(u,v)/cos[ψ(u,v)-θ(u,v)]}×exp{i[2ψ(u,v)-θ(u,v)]}。
CN201910392392.3A 2019-05-10 2019-05-10 Optical encryption method based on fractional Fourier spectrum decomposition and mixed random mask Active CN110312053B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910392392.3A CN110312053B (en) 2019-05-10 2019-05-10 Optical encryption method based on fractional Fourier spectrum decomposition and mixed random mask

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910392392.3A CN110312053B (en) 2019-05-10 2019-05-10 Optical encryption method based on fractional Fourier spectrum decomposition and mixed random mask

Publications (2)

Publication Number Publication Date
CN110312053A true CN110312053A (en) 2019-10-08
CN110312053B CN110312053B (en) 2021-05-18

Family

ID=68074664

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910392392.3A Active CN110312053B (en) 2019-05-10 2019-05-10 Optical encryption method based on fractional Fourier spectrum decomposition and mixed random mask

Country Status (1)

Country Link
CN (1) CN110312053B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111259427A (en) * 2020-01-21 2020-06-09 北京安德医智科技有限公司 Image processing method and device based on neural network and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106447589A (en) * 2016-09-30 2017-02-22 天津大学 Double random phase optical image encryption method based on Fourier transform
CN106530362A (en) * 2016-09-30 2017-03-22 天津大学 Calculating integral imaging technology and Fourier transform optical image encryption method
CN107742082A (en) * 2017-10-11 2018-02-27 长沙师范学院 A kind of optical image encryption algorithm
CN108804934A (en) * 2018-05-30 2018-11-13 西安理工大学 The more resume images of optics based on two cascade free-space propagation transformation
CN109086617A (en) * 2018-08-14 2018-12-25 长春理工大学 One-time pad optical image encryption decryption method based on fractional order quantum chaos
CN109560915A (en) * 2018-11-27 2019-04-02 广西师范大学 A kind of non-linear dual image encryption method mutually encoded based on chaos with width

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106447589A (en) * 2016-09-30 2017-02-22 天津大学 Double random phase optical image encryption method based on Fourier transform
CN106530362A (en) * 2016-09-30 2017-03-22 天津大学 Calculating integral imaging technology and Fourier transform optical image encryption method
CN107742082A (en) * 2017-10-11 2018-02-27 长沙师范学院 A kind of optical image encryption algorithm
CN108804934A (en) * 2018-05-30 2018-11-13 西安理工大学 The more resume images of optics based on two cascade free-space propagation transformation
CN109086617A (en) * 2018-08-14 2018-12-25 长春理工大学 One-time pad optical image encryption decryption method based on fractional order quantum chaos
CN109560915A (en) * 2018-11-27 2019-04-02 广西师范大学 A kind of non-linear dual image encryption method mutually encoded based on chaos with width

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
张博,龙慧,江沸菠: "《基于相干叠加与模均等矢量分解的光学图像加密算法》", 《电子与信息学报》 *
陈艳浩,刘中艳,周丽宴: "《基于差异混合掩码与混沌Gyrator变换的光学图像加密算法》", 《电子与信息学报》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111259427A (en) * 2020-01-21 2020-06-09 北京安德医智科技有限公司 Image processing method and device based on neural network and storage medium
CN111259427B (en) * 2020-01-21 2020-11-06 北京安德医智科技有限公司 Image processing method and device based on neural network and storage medium

Also Published As

Publication number Publication date
CN110312053B (en) 2021-05-18

Similar Documents

Publication Publication Date Title
Singh Watermarking image encryption using deterministic phase mask and singular value decomposition in fractional Mellin transform domain
Bansal et al. An innovative image encryption scheme based on chaotic map and Vigenère scheme
Singh Hybrid structured phase mask in frequency plane for optical double image encryption in gyrator transform domain
Abuturab Color information cryptosystem based on optical superposition principle and phase-truncated gyrator transform
Abuturab Asymmetric multiple information cryptosystem based on chaotic spiral phase mask and random spectrum decomposition
Wang et al. Multiple-image encryption system using cascaded phase mask encoding and a modified Gerchberg–Saxton algorithm in gyrator domain
Abuturab Security enhancement of color image cryptosystem by optical interference principle and spiral phase encoding
Kumar et al. An optical Hash function construction based on equal modulus decomposition for authentication verification
Abuturab Single-channel color information security system using LU decomposition in gyrator transform domains
Su et al. Optical color image encryption based on chaotic fingerprint phase mask in various domains and comparative analysis
Panwar et al. Cryptanalysis and improvement of an image encryption scheme using combination of one-dimensional chaotic maps
Wang et al. Multiple-image encryption based on interference principle and phase-only mask multiplexing in Fresnel transform domain
Rakheja et al. Optical asymmetric watermarking using 4D hyperchaotic system and modified equal modulus decomposition in hybrid multi resolution wavelet domain
Agarwal A review of image scrambling technique using chaotic maps
Anshula et al. Security-enrichment of an asymmetric optical image encryption-based devil’s vortex Fresnel lens phase mask and lower upper decomposition with partial pivoting in gyrator transform domain
Chen et al. Optical cryptosystem scheme for hyperspectral image based on random spiral transform in gyrator domains
Yang et al. Securing color image by using bit-level modified integer nonlinear coupled chaos model in Fresnel diffraction domains
Jing et al. Meaningful ciphertext encryption algorithm based on bit scrambling, discrete wavelet transform, and improved chaos
Sachin et al. Nonlinear image authentication algorithm based on double fractional Mellin domain
Abuturab Multiple color image cryptosystem based on coupled-logistic-map-biometric keys, QR decomposition with column pivoting and optical Fresnel transform
Huang et al. Chaotic image encryption based on bidimensional empirical mode decomposition and double random phase encoding
Anshula et al. Ensuring security of cryptosystems with DVFM-, modified equal modulus decomposition in the domain of gyrator wavelet transform
CN110312053B (en) Optical encryption method based on fractional Fourier spectrum decomposition and mixed random mask
Lee et al. Avalanche and bit independence properties of photon-counting double random phase encoding in gyrator domain
Arora et al. Cryptanalysis and enhancement of image encryption scheme based on word-oriented feed back shift register

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant