CN110414247B - Image encryption method and device based on cascade equimodular decomposition - Google Patents

Image encryption method and device based on cascade equimodular decomposition Download PDF

Info

Publication number
CN110414247B
CN110414247B CN201910542186.6A CN201910542186A CN110414247B CN 110414247 B CN110414247 B CN 110414247B CN 201910542186 A CN201910542186 A CN 201910542186A CN 110414247 B CN110414247 B CN 110414247B
Authority
CN
China
Prior art keywords
matrix
quaternion
complex
complex matrix
modulation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910542186.6A
Other languages
Chinese (zh)
Other versions
CN110414247A (en
Inventor
邵珠宏
尚媛园
丁辉
赵晓旭
刘铁
张永祥
苏佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Southern Power Grid Internet Service Co ltd
Dongguan Pengbo Information Technology Co ltd
Original Assignee
Capital Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Capital Normal University filed Critical Capital Normal University
Priority to CN201910542186.6A priority Critical patent/CN110414247B/en
Publication of CN110414247A publication Critical patent/CN110414247A/en
Application granted granted Critical
Publication of CN110414247B publication Critical patent/CN110414247B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T9/00Image coding

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Facsimile Transmission Control (AREA)
  • Compression Or Coding Systems Of Tv Signals (AREA)
  • Compression Of Band Width Or Redundancy In Fax (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The invention discloses an image encryption method and device based on cascade equal-mode decomposition, wherein the method comprises the following steps: s1: encoding an image into a first quaternion matrix; s2: carrying out modulation quaternion Gyrator transformation on the first quaternion matrix; s3: extracting the first to fourth components, combining the first and second components into a first complex matrix, and combining the third and fourth components into a second complex matrix; s4: performing equal-mode decomposition on the second complex matrix to obtain a first matrix and a second matrix; s5: encoding the first complex matrix and the second matrix into a second quaternion matrix, and repeatedly executing S2-S4 to obtain a third complex matrix and a third matrix; s6: encoding the third complex matrix and the third matrix into a fourth complex matrix; s7: and obtaining a ciphertext by performing truncation coding on the fourth complex matrix. The method can greatly improve the capacity of the image to be transmitted, has higher safety and can be applied to the safety protection of the image information.

Description

Image encryption method and device based on cascade equimodular decomposition
Technical Field
The invention relates to the technical field of image encryption, in particular to an image encryption method and device based on cascade equal-mode decomposition.
Background
Because of the characteristics of good intuition, image and the like, the image becomes an important medium for people to communicate. With the rapid development and continuous application of network communication and multimedia technology, a large number of images are transmitted, shared and used in the open internet every day. However, such image information is vulnerable to attack, causing leakage of information or tampering. In order to secure image information, researchers have proposed image encryption techniques.
Currently, with the continuous enhancement of information transmission capability, it is difficult for traditional single image encryption to meet the rapidly increasing demand for large data. Therefore, multi-image encryption algorithms such as a phase recovery-based multi-image encryption algorithm, a compressed sensing-based multi-image encryption algorithm, and the like are successively proposed. The existing multi-image encryption method realizes large-capacity image encryption transmission, but also increases the complexity of the system.
Disclosure of Invention
The present invention is directed to solving, at least to some extent, one of the technical problems in the related art.
Therefore, an object of the present invention is to provide an image encryption method based on cascade equimodular decomposition, which can greatly increase the capacity of an image to be transmitted, has high security, and can be applied to security protection of image information.
Another object of the present invention is to provide an image encryption apparatus based on cascade equal modulus decomposition.
In order to achieve the above object, an embodiment of the present invention provides an image encryption method based on cascade equal-modulus decomposition, including the following steps: step S1: encoding an image into a first quaternion matrix; step S2: carrying out modulation quaternion Gyrator transformation on the first quaternion matrix; step S3: extracting first to fourth components of the first quaternion matrix after modulation and transformation, combining the first component and the second component into a first complex matrix, and combining the third component and the fourth component into a second complex matrix; step S4: performing equal-mode decomposition on the second complex matrix to obtain a first matrix and a second matrix; step S5: encoding the first complex matrix and the second matrix into a second quaternion matrix, and repeatedly executing the steps S2 to S4 to obtain a third complex matrix and a third matrix; step S6: encoding the third complex matrix and the third matrix into a fourth complex matrix; step S7: and obtaining a ciphertext by performing truncation coding on the fourth complex matrix.
The image encryption method based on the cascade equimodular decomposition of the embodiment of the invention uses the quaternion matrix to encode a plurality of channel images, thereby having higher transmission efficiency; the cascade quaternion Gyrator transformation and the equimodular decomposition avoid the iterative process and have lower complexity; through decomposition and recombination of the quaternion matrix, the safety is higher, the multi-channel image is encoded into a whole to be processed by adopting quaternion matrix representation, so that the capacity of the image to be transmitted can be greatly improved, and the safety is higher and can be applied to safety protection of image information.
In addition, the image encryption method based on the cascade equimodular decomposition according to the above embodiment of the present invention may further have the following additional technical features:
further, in an embodiment of the present invention, the quaternion Gyrator transform calculation formula is:
Figure GDA0003059920620000021
wherein, (u, v) represents frequency domain coordinates, (x, y) represents space domain coordinates, α is a rotation angle, and μ is an arbitrary unit pure four-element number.
Further, in an embodiment of the present invention, the first complex matrix and the second complex matrix are calculated by the following formula:
Figure GDA0003059920620000022
wherein operators S (-), X (-), Y (-), and Z (-), represent the first, second, third, and fourth components.
Further, in an embodiment of the present invention, the calculation formula of the first matrix and the second matrix is:
Figure GDA0003059920620000023
wherein A is1
Figure GDA0003059920620000024
Respectively represent a matrix C2Amplitude and phase of (a), theta1A random matrix is represented.
Further, in one embodiment of the present invention, the formula of the truncation coding is:
E=AT[D],
where the operator AT (-) represents amplitude truncation and D is a fourth complex matrix.
In order to achieve the above object, another embodiment of the present invention provides an image encryption apparatus based on cascade equal modulus decomposition, including: a first encoding module for encoding the image into a first quaternion matrix; the modulation conversion module is used for carrying out modulation quaternion Gyrator conversion on the first quaternion matrix; the extraction module is used for extracting first to fourth components of the first quaternion matrix after modulation and transformation, combining the first component and the second component into a first complex matrix, and combining the third component and the fourth component into a second complex matrix; the equal-mode decomposition module is used for performing equal-mode decomposition on the second complex matrix to obtain a first matrix and a second matrix; a repeating module, configured to encode the first complex matrix and the second matrix into a second quaternion matrix, and repeatedly execute the modulation transformation module, the extraction module, and the equal-modulus decomposition module to obtain a third complex matrix and a third matrix; a second encoding module for encoding the third complex matrix and the third matrix into a fourth complex matrix; and the truncation module is used for performing truncation coding on the fourth complex matrix to obtain a ciphertext.
The image encryption device based on the cascade equimodular decomposition of the embodiment of the invention uses the quaternion matrix to encode a plurality of channel images, thereby having higher transmission efficiency; the cascade quaternion Gyrator transformation and the equimodular decomposition avoid the iterative process and have lower complexity; through decomposition and recombination of the quaternion matrix, the safety is higher, the multi-channel image is encoded into a whole to be processed by adopting quaternion matrix representation, so that the capacity of the image to be transmitted can be greatly improved, and the safety is higher and can be applied to safety protection of image information.
In addition, the image encryption device based on the cascade equal modulus decomposition according to the above embodiment of the present invention may further have the following additional technical features:
further, in an embodiment of the present invention, the quaternion Gyrator transform calculation formula is:
Figure GDA0003059920620000031
wherein, (u, v) represents frequency domain coordinates, (x, y) represents space domain coordinates, α is a rotation angle, and μ is an arbitrary unit pure four-element number.
Further, in an embodiment of the present invention, the first complex matrix and the second complex matrix are calculated by the following formula:
Figure GDA0003059920620000032
wherein operators S (-), X (-), Y (-), and Z (-), represent the first, second, third, and fourth components.
Further, in an embodiment of the present invention, the calculation formula of the first matrix and the second matrix is:
Figure GDA0003059920620000033
wherein A is1
Figure GDA0003059920620000034
Respectively represent a matrix C2Amplitude and phase ofBit, theta1A random matrix is represented.
Further, in one embodiment of the present invention, the formula of the truncation coding is:
E=AT[D],
where the operator AT (-) represents amplitude truncation and D is a fourth complex matrix.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The foregoing and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a flowchart of an image encryption method based on cascaded equal modulus decomposition according to an embodiment of the present invention;
FIG. 2 is a flowchart of an image encryption method based on cascaded equal modulus decomposition according to an embodiment of the present invention;
FIG. 3 is a test image according to an embodiment of the present invention;
FIG. 4 is a ciphertext image according to an embodiment of the present invention;
FIG. 5 is a decrypted image according to an embodiment of the invention;
fig. 6 is a schematic structural diagram of an image encryption apparatus based on cascade equal modulus decomposition according to an embodiment of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are illustrative and intended to be illustrative of the invention and are not to be construed as limiting the invention.
The following describes an image encryption method and apparatus based on cascade equal modulus decomposition according to an embodiment of the present invention with reference to the drawings, and first, an image encryption method based on cascade equal modulus decomposition according to an embodiment of the present invention will be described with reference to the drawings.
Fig. 1 is a flowchart of an image encryption method based on cascade equal modulus decomposition according to an embodiment of the present invention.
As shown in fig. 1, the image encryption method based on cascade equal-mode decomposition includes the following steps:
step S1: an image is encoded as a first quaternion matrix.
It should be noted that, the embodiment of the present invention provides an image encryption method based on quaternion Gyrator transformation and equal modulus decomposition, and an encryption flow of the image encryption method is shown in fig. 2. Suppose that the images to be encrypted are respectively f1(x,y)、f2(x,y)、f3(x,y)、f4(x, y) with dimensions of N M, (x, y) representing spatial domain coordinates. The specific process is described as follows:
specifically, in the embodiment of the present invention, four images are first used as four components of a quaternion and encoded into a full quaternion matrix, that is:
G1=f1+if2+jf3+kf4
step S2: and carrying out modulation quaternion Gyrator transformation on the first quaternion matrix.
Specifically, as shown in fig. 2, the modulation quaternion Gyrator transformation is performed on the full quaternion matrix, that is:
Figure GDA0003059920620000041
wherein, the formula for calculating the quaternion Gyrator transformation is as follows,
Figure GDA0003059920620000042
here, (u, v) represents frequency domain coordinates, (x, y) represents spatial domain coordinates, α is a rotation angle, μ is an arbitrary unit pure four-element number, and P represents a randomly generated phase mask.
Step S3: and extracting first to fourth components of the first quaternion matrix after modulation and transformation, combining the first component and the second component into a first complex matrix, and combining the third component and the fourth component into a second complex matrix.
Specifically, as shown in fig. 2, a quaternion matrix Q is extracted1And combine them into two new complex matrices, namely:
Figure GDA0003059920620000051
wherein: operators S (-), X (-), Y (-), and Z (-), represent the extraction of the first, second, third, and fourth components, respectively, of the quaternion matrix.
Step S4: and performing equal modulus decomposition on the second complex matrix to obtain a first matrix and a second matrix.
Specifically, as shown in FIG. 2, for the complex matrix C2Performing equal mode decomposition to obtain a matrix T11、T12That is to say that,
Figure GDA0003059920620000052
A1
Figure GDA0003059920620000053
respectively represent a matrix C2Amplitude and phase of (a), theta1A random matrix is represented.
Step S5: and encoding the first complex matrix and the second matrix into a second quaternion matrix, and repeatedly executing the steps S2 to S4 to obtain a third complex matrix and a third matrix.
Specifically, as shown in FIG. 2, a complex matrix C is formed1、T12The code is a full quaternion matrix, i.e.:
G2=Re(C1)+iIm(C1)+jRe(T12)+kIm(T12),
wherein: the operators Re (·), Im (·) represent the extraction of the real and imaginary components of the complex matrix, respectively.
Repeating the steps S2 to S4 to obtain a complex matrix C3、T22
Step S6: and encoding the third complex matrix and the third matrix into a fourth complex matrix.
Specifically, as shown in FIG. 2, a complex matrix C is formed3、T22The coding is combined to obtain a complex matrix, i.e.:
D=[C3 T22],
the plural matrix D is subjected to Gyrator transformation. Wherein, the calculation formula of the Gyrator conversion is as follows,
Figure GDA0003059920620000061
here, (u, v) represents frequency domain coordinates, (x, y) represents spatial domain coordinates, and β is a rotation angle.
Step S7: and obtaining a ciphertext by performing truncation coding on the fourth complex matrix.
Specifically, as shown in fig. 2, the ciphertext is obtained by truncation coding, that is:
E=AT[D],
wherein: the operator AT (-) represents magnitude truncation.
Further, to verify the effectiveness and feasibility of the method of the present invention, four gray-scale images (as shown in fig. 3) were selected for the experiment, the image size was 256 × 256, the rotation angles of the quaternion Gyrator transformation were 0.5377 and 0.9134, respectively, the rotation angle of the quaternion Gyrator transformation was 0.1548, and the pure quaternion units in the quaternion Gyrator transformation and the phase mask were all pure quaternion units in the phase mask
Figure GDA0003059920620000062
According to the encryption method, the obtained ciphertext image is shown in fig. 4, so that the information of the ciphertext image is disordered and unordered, and any useful information of the original plaintext image cannot be seen visually; the decryption result using the correct key is shown in fig. 5, and the peak snr is 251.9141dB, 251.4627dB, 251.4705dB and 251.4594dB, respectively, and it can be seen that the decrypted image is identical to the original image.
In summary, the invention provides a multi-image encryption method based on quaternion Gyrator transformation and equal modulus decomposition. The specific process comprises the following steps: (1) encoding the image into a quaternion matrix; (2) carrying out Gyrator transformation on the quaternion matrix; (3) an equivalent complex matrix representation; (4) performing equal-mode decomposition; (5) repeating the steps (1) to (4); (6) combining to obtain a plurality of matrixes and carrying out Gyrator transformation; (7) and cutting off the code to obtain a ciphertext.
According to the image encryption method based on the cascade equimodular decomposition, which is provided by the embodiment of the invention, the quaternion matrix is used for coding the multiple channel images, so that the transmission efficiency is higher; the cascade quaternion Gyrator transformation and the equimodular decomposition avoid the iterative process and have lower complexity; through decomposition and recombination of the quaternion matrix, the safety is higher, the multi-channel image is encoded into a whole to be processed by adopting quaternion matrix representation, so that the capacity of the image to be transmitted can be greatly improved, and the safety is higher and can be applied to safety protection of image information.
Next, an image encryption apparatus based on cascade equal modulus decomposition according to an embodiment of the present invention will be described with reference to the drawings.
Fig. 6 is a schematic structural diagram of an image encryption apparatus based on cascade equal modulus decomposition according to an embodiment of the present invention.
As shown in fig. 6, the image encryption apparatus 10 based on the cascade equal modulus decomposition includes: a first encoding module 100, a modulation transform module 200, an extraction module 300, an equal modulus decomposition module 400, a repetition module 500, a second encoding module 600, and a truncation module 700.
The first encoding module 100 is configured to encode an image into a first quaternion matrix. The modulation conversion module 200 is configured to perform modulation quaternion Gyrator conversion on the first quaternion matrix. The extracting module 300 is configured to extract first to fourth components of the first quaternion matrix after modulation transformation, combine the first component and the second component into a first complex matrix, and combine the third component and the fourth component into a second complex matrix. The equimode decomposition module 400 is configured to equimode decompose the second complex matrix to obtain a first matrix and a second matrix. The repeating module 500 is configured to encode the first complex matrix and the second matrix into a second quaternion matrix, and repeatedly perform the modulation transformation module 200, the extraction module 300, and the equal modulus decomposition module 400 to obtain a third complex matrix and a third matrix. The second encoding module 600 is configured to encode the third complex matrix and the third matrix into a fourth complex matrix. The truncation module 700 is configured to truncate and encode the fourth complex matrix to obtain a ciphertext. The device 10 of the embodiment of the invention can encode the multi-channel image into a whole by adopting quaternion matrix representation for processing, greatly improves the capacity of the image to be transmitted, has higher safety at the same time, and can be applied to the safety protection of image information.
Further, in one embodiment of the present invention, the quaternion Gyrator transform calculation formula is:
Figure GDA0003059920620000071
where, (u, v) represents frequency domain coordinates, (x, y) represents spatial domain coordinates, α is a rotation angle, μ is an arbitrary unit pure four-element number, and P represents a randomly generated phase mask.
Further, in one embodiment of the present invention, the first complex matrix and the second complex matrix are calculated by the following formula:
Figure GDA0003059920620000072
wherein operators S (-), X (-), Y (-), and Z (-), represent the first, second, third, and fourth components.
Further, in one embodiment of the present invention, the calculation formula of the first matrix and the second matrix is:
Figure GDA0003059920620000073
wherein A is1
Figure GDA0003059920620000074
Respectively represent a matrix C2Amplitude and phase of (a), theta1A random matrix is represented.
Further, in one embodiment of the present invention, the formula of the truncation coding is:
E=AT[D],
where the operator AT (-) represents amplitude truncation and D is a fourth complex matrix.
It should be noted that the foregoing explanation on the embodiment of the image encryption method based on the cascade equal-modulus decomposition is also applicable to the image encryption apparatus based on the cascade equal-modulus decomposition in this embodiment, and details are not repeated here.
According to the image encryption device based on the cascade equimodular decomposition, which is provided by the embodiment of the invention, the quaternion matrix is used for coding a plurality of channel images, so that the transmission efficiency is higher; the cascade quaternion Gyrator transformation and the equimodular decomposition avoid the iterative process and have lower complexity; through decomposition and recombination of the quaternion matrix, the safety is higher, the multi-channel image is encoded into a whole to be processed by adopting quaternion matrix representation, so that the capacity of the image to be transmitted can be greatly improved, and the safety is higher and can be applied to safety protection of image information.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present invention, "a plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
In the present invention, unless otherwise expressly stated or limited, the first feature "on" or "under" the second feature may be directly contacting the first and second features or indirectly contacting the first and second features through an intermediate. Also, a first feature "on," "over," and "above" a second feature may be directly or diagonally above the second feature, or may simply indicate that the first feature is at a higher level than the second feature. A first feature being "under," "below," and "beneath" a second feature may be directly under or obliquely under the first feature, or may simply mean that the first feature is at a lesser elevation than the second feature.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.

Claims (10)

1. An image encryption method based on cascade equal-mode decomposition is characterized by comprising the following steps:
step S1: encoding an image into a first quaternion matrix;
step S2: carrying out modulation quaternion Gyrator transformation on the first quaternion matrix;
step S3: extracting first to fourth components of the first quaternion matrix after modulation and transformation, combining the first component and the second component into a first complex matrix, and combining the third component and the fourth component into a second complex matrix; wherein the second complex matrix calculation formula is:
C2=Y(Q1)+iZ(Q1),
wherein, C2For the second complex matrix, the operators Y (-) and Z (-) represent the third and fourth components, Q1Is the result of the modulation quaternion Gyrator transformation;
step S4: performing equal-mode decomposition on the second complex matrix to obtain a first matrix and a second matrix; wherein the calculation formula of the second matrix is as follows:
Figure FDA0003208317800000011
wherein A is1
Figure FDA0003208317800000012
Respectively represent a matrix C2Amplitude and phase of (a), theta1Representing a random matrix, T12Is a second matrix;
step S5: encoding the first complex matrix and the second matrix into a second quaternion matrix, and repeatedly executing the steps S2 to S4 to obtain a third complex matrix and a third matrix;
step S6: encoding the third complex matrix and the third matrix into a fourth complex matrix; and
step S7: and obtaining a ciphertext by performing truncation coding on the fourth complex matrix.
2. The method of claim 1, wherein the quaternion Gyrator transform is calculated as:
Figure FDA0003208317800000013
wherein, (u, v) represents frequency domain coordinates, (x, y) represents space domain coordinates, α is a rotation angle, and μ is an arbitrary unit pure four-element number.
3. The method of claim 1, wherein the first complex matrix is calculated by:
C1=S(Q1)+iX(Q1),
wherein, C1For the first complex matrix, the operators S (-) and X (-) represent the first and second components, Q1Is the result of the modulation quaternion Gyrator transform.
4. The method of claim 1, wherein the first matrix and the second matrix are calculated by:
Figure FDA0003208317800000021
wherein A is1
Figure FDA0003208317800000022
Respectively represent a matrix C2Amplitude and phase of (a), theta1Representing a random matrix, T11Is a first matrix.
5. The method of claim 1, wherein the truncation coding is formulated as:
E=AT[D],
where the operator AT (-) represents amplitude truncation and D is a fourth complex matrix.
6. An image encryption device based on cascade equal-mode decomposition is characterized by comprising:
a first encoding module for encoding the image into a first quaternion matrix;
the modulation conversion module is used for carrying out modulation quaternion Gyrator conversion on the first quaternion matrix;
the extraction module is used for extracting first to fourth components of the first quaternion matrix after modulation and transformation, combining the first component and the second component into a first complex matrix, and combining the third component and the fourth component into a second complex matrix; wherein the second complex matrix calculation formula is:
C2=Y(Q1)+iZ(Q1)
wherein, C2For the second complex matrix, the operators Y (-) and Z (-) represent the third and fourth components, Q1Is the result of the modulation quaternion Gyrator transformation;
the equal-mode decomposition module is used for performing equal-mode decomposition on the second complex matrix to obtain a first matrix and a second matrix; wherein the calculation formula of the second matrix is as follows:
Figure FDA0003208317800000023
wherein A is1
Figure FDA0003208317800000024
Respectively represent a matrix C2Amplitude and phase of (a), theta1Representing a random matrix, T12Is a second matrix;
a repeating module, configured to encode the first complex matrix and the second matrix into a second quaternion matrix, and repeatedly execute the modulation transformation module, the extraction module, and the equal-modulus decomposition module to obtain a third complex matrix and a third matrix;
a second encoding module for encoding the third complex matrix and the third matrix into a fourth complex matrix; and
and the truncation module is used for performing truncation coding on the fourth complex matrix to obtain a ciphertext.
7. The apparatus of claim 6, wherein the quaternion Gyrator transform calculation formula is:
Figure FDA0003208317800000025
wherein, (u, v) represents frequency domain coordinates, (x, y) represents space domain coordinates, α is a rotation angle, and μ is an arbitrary unit pure four-element number.
8. The apparatus of claim 6, wherein the first complex matrix is calculated by:
C1=S(Q1)+iX(Q1),
wherein, C1For the first complex matrix, the operators S (-) and X (-) represent the first and second components, Q1Is the result of the modulation quaternion Gyrator transform.
9. The apparatus of claim 6, wherein the first matrix is calculated by:
Figure FDA0003208317800000031
wherein A is1
Figure FDA0003208317800000032
Respectively represent a matrix C2Amplitude and phase of (a), theta1Representing a random matrix, T11Is a first matrix.
10. The apparatus of claim 6, wherein the truncation coding is formulated as:
E=AT[D],
where the operator AT (-) represents amplitude truncation and D is a fourth complex matrix.
CN201910542186.6A 2019-06-21 2019-06-21 Image encryption method and device based on cascade equimodular decomposition Active CN110414247B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910542186.6A CN110414247B (en) 2019-06-21 2019-06-21 Image encryption method and device based on cascade equimodular decomposition

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910542186.6A CN110414247B (en) 2019-06-21 2019-06-21 Image encryption method and device based on cascade equimodular decomposition

Publications (2)

Publication Number Publication Date
CN110414247A CN110414247A (en) 2019-11-05
CN110414247B true CN110414247B (en) 2022-01-18

Family

ID=68359497

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910542186.6A Active CN110414247B (en) 2019-06-21 2019-06-21 Image encryption method and device based on cascade equimodular decomposition

Country Status (1)

Country Link
CN (1) CN110414247B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105913368A (en) * 2016-03-31 2016-08-31 首都师范大学 Multi-image encryption and authentication method based on sparse constraint and system
CN105979116A (en) * 2016-03-31 2016-09-28 首都师范大学 Color image authentication method and system based on hypercomplex number encrypted domain sparse representation
CN109905563A (en) * 2019-03-06 2019-06-18 首都师范大学 A kind of stereo-picture encryption method and device
CN109902261A (en) * 2019-03-06 2019-06-18 首都师范大学 A kind of image encryption method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2964474B1 (en) * 2010-09-08 2013-05-17 Commissariat Energie Atomique CRYPT SYNTHETIC HOLOGRAM AND METHOD FOR READING SUCH A HOLOGRAM

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105913368A (en) * 2016-03-31 2016-08-31 首都师范大学 Multi-image encryption and authentication method based on sparse constraint and system
CN105979116A (en) * 2016-03-31 2016-09-28 首都师范大学 Color image authentication method and system based on hypercomplex number encrypted domain sparse representation
CN109905563A (en) * 2019-03-06 2019-06-18 首都师范大学 A kind of stereo-picture encryption method and device
CN109902261A (en) * 2019-03-06 2019-06-18 首都师范大学 A kind of image encryption method and device

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
"基于四元数变换的彩色图像处理算法研究";邵珠宏;《中国优秀博士学位论文全文数据库 信息科技辑》;20160815(第2016-08期);第I138-123页,正文第5章 *
"基于四元数理论的彩色图像信息隐藏技术";盖琦;《中国优秀博士学位论文全文数据库 信息科技辑》;20100715(第2010-07期);第I138-40页,正文第2,3章 *
"基于四元数的彩色图像部分加密研究及在遥感图像的应用";范晶;《中国优秀硕士学位论文全文数据库 信息科技辑》;20160115(第2016-01期);第I138-42页,正文第3,5章 *

Also Published As

Publication number Publication date
CN110414247A (en) 2019-11-05

Similar Documents

Publication Publication Date Title
Zhou et al. Image encryption algorithm with circle index table scrambling and partition diffusion
Huang et al. Colour image encryption based on logistic mapping and double random‐phase encoding
CN109660696B (en) New image encryption method
CN104680476B (en) The lossless encryption method of coloured image based on two-dimensional discrete wavelet conversion and space-time chaos
Parameshachari et al. Partial image encryption algorithm using pixel position manipulation technique: The smart copyback system
CN109104544B (en) Chaotic image encryption method based on complex network synchronization
CN110135177B (en) Asymmetric image encryption and authentication method and device
CN107392970B (en) Digital image encryption method based on bit plane and high-dimensional chaotic system
Boussif et al. Securing DICOM images by a new encryption algorithm using Arnold transform and Vigenère cipher
CN107292805B (en) Image encryption method based on multi-parameter fractional order discrete Tchebichef transformation
Soleymani et al. A survey on principal aspects of secure image transmission
CN110572252A (en) image encryption and decryption method based on fractional order translation chaotic system
Yang et al. Dual embedding model: a new framework for visually meaningful image encryption
Devi et al. Entropy influenced RNA diffused quantum chaos to conserve medical data privacy
Ravi et al. Optimized wavelet filters and modified huffman encoding-based compression and chaotic encryption for image data
Wang et al. New color image cryptosystem via SHA-512 and hybrid domain
Lingfeng et al. Security analysis of multiple permutation encryption adopt in reversible data hiding
Zhang et al. Color image encryption algorithm based on 3D spiral transform and radial diffusion
Liu et al. Image compression and encryption algorithm based on uniform non-degeneracy chaotic system and fractal coding
Nkandeu et al. Image encryption using the logistic map coupled to a self-synchronizing streaming
CN110414247B (en) Image encryption method and device based on cascade equimodular decomposition
CN110418028B (en) Image encryption method and device based on cascade transformation
CN113344762B (en) Double scrambling image encryption method based on AFD adaptive decomposition
CN109918927B (en) Image encryption method and device
CN109214199B (en) Image encryption method and system and decryption method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20231111

Address after: Room 606-609, Compound Office Complex Building, No. 757, Dongfeng East Road, Yuexiu District, Guangzhou, Guangdong Province, 510699

Patentee after: China Southern Power Grid Internet Service Co.,Ltd.

Address before: Room 1109, No. 31, Nancheng Section, Guantai Road, Nancheng Street, Dongguan City, Guangdong Province, 523000

Patentee before: Dongguan Pengbo Information Technology Co.,Ltd.

Effective date of registration: 20231111

Address after: Room 1109, No. 31, Nancheng Section, Guantai Road, Nancheng Street, Dongguan City, Guangdong Province, 523000

Patentee after: Dongguan Pengbo Information Technology Co.,Ltd.

Address before: 100037 No. 105 West Third Ring Road North, Beijing, Haidian District

Patentee before: Capital Normal University

TR01 Transfer of patent right