CN111709867A - Novel full convolution network-based equal modulus vector decomposition image encryption analysis method - Google Patents

Novel full convolution network-based equal modulus vector decomposition image encryption analysis method Download PDF

Info

Publication number
CN111709867A
CN111709867A CN202010524057.7A CN202010524057A CN111709867A CN 111709867 A CN111709867 A CN 111709867A CN 202010524057 A CN202010524057 A CN 202010524057A CN 111709867 A CN111709867 A CN 111709867A
Authority
CN
China
Prior art keywords
training
encryption
analysis
block
image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010524057.7A
Other languages
Chinese (zh)
Other versions
CN111709867B (en
Inventor
王君
王凡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan University
Original Assignee
Sichuan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan University filed Critical Sichuan University
Priority to CN202010524057.7A priority Critical patent/CN111709867B/en
Publication of CN111709867A publication Critical patent/CN111709867A/en
Application granted granted Critical
Publication of CN111709867B publication Critical patent/CN111709867B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/045Combinations of networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods

Abstract

The invention provides an equal-modulus vector decomposition image encryption analysis method based on a novel full convolution network. The method comprises the following steps: the method comprises four parts of an encryption system based on equimode vector decomposition, a network model of encryption analysis, network training and encryption system analysis. The designed encryption analysis network model is trained by inputting a plaintext-ciphertext pair, and then a ciphertext image is input through the trained encryption analysis network model, so that an attack analysis result, namely a recovered high-quality plaintext image, can be obtained. Compared with the traditional attack method, the provided encryption analysis method can realize effective encryption analysis without knowing an encryption key or a private key and other encryption system parameters and the like, and can recover and recover a high-quality plaintext image; the deep learning method has short training time, and the training speed is improved by 7 times compared with the traditional method; the method has better generalization capability, and can adopt one image library for training and another image library for successful test; finally, the method has better robustness to noise and clipping in transmission.

Description

Novel full convolution network-based equal modulus vector decomposition image encryption analysis method
Technical Field
The invention relates to the technical field of information security and information optics, in particular to an image encryption analysis method.
Background
With the advent of the information age, information security has received more and more attention. Images tend to provide rich information, so image encryption becomes a crucial issue. In 2015, tsai proposes an image encryption method based on equal modulus separation (EMD), in which a two-dimensional vector is decomposed into two-dimensional vectors, and a safe one-way trapdoor function is provided for image encryption, so that the method is widely applied to gray image encryption. Deep learning is also used for image encryption analysis as an effective method for feature extraction, but at present, only an encryption system based on double random phase coding and the like are broken through by a deep learning method, and for an asymmetric encryption method with higher encryption security, such as an image encryption method based on equimode vector decomposition, an encryption analysis method of the deep learning method is not reported. And the deep learning network needs to be redesigned to adapt to the attack analysis method of a new encryption system. Therefore, the deep learning-based isomode vector decomposition image encryption analysis still has great research potential.
Disclosure of Invention
The invention provides an equimode vector decomposition image encryption analysis method based on a novel full convolution network, aiming at the problem that the traditional deep learning network can not attack and analyze the image encryption based on equimode vector decomposition. The method comprises the following steps: the method comprises four parts of an encryption system based on equimode vector decomposition, a network model of encryption analysis, network training and encryption system analysis.
The encryption system based on the equimodular vector decomposition comprises an encryption process and a decryption process, wherein the encryption process is specifically described as follows: the image to be encrypted is first subjected to the complex number and domain transformation, and then an equal modulus vector decomposition method is adopted to obtain a ciphertext and a private key, wherein the encryption process is expressed as [ C, P ]]=EMD{DT[F(I, M)]That is, a decryption process is an inverse process of the encryption process, and may be expressed as I = | IDT (C + P) | gaming2Wherein, I is the image to be encrypted, and M is in the range of [0, 2 pi ]]The random phase plate of (1), F (I, M) is a complex number, and the specific process can be expressed as F (I, M) = sqrt (I) × exp (I × M), DT [.]For domain transformation, EDM is equal modulus vector decomposition, IDT [.]For inverse domain transformation, | - | is modulo operation, C and P represent the ciphertext and the private key, respectively, with the modulo of each pixel being equal.
The network model of the encryption analysis is a novel full convolution network, belongs to a deep learning neural network, and comprises an input layer, a hidden layer and an output layer, wherein the input layer is a ciphertext image of 32 multiplied by 1, and the output layer is an encryption analysis result image of 32 multiplied by 1; the hidden layer comprises 9 layers of networks in total, the first 4 layers are down-sampling layers, the sizes of the down-sampling layers are 16 multiplied by 28, 8 multiplied by 36, 4 multiplied by 38 and 2 multiplied by 42 in sequence, the first 4 layers and the input layer are connected by down-sampling blocks, the second 5 layers are up-sampling layers, the sizes of the up-sampling layers are 2 multiplied by 48, 4 multiplied by 48, 8 multiplied by 46, 16 multiplied by 48 and 32 multiplied by 48, the last 5 layers and the first 4 layers are connected by convolution blocks, the layers of the last 5 layers are connected by up-sampling blocks, and the last 5 layers and the output layer are connected by convolution blocks; the downsampling block comprises 2 continuous convolution blocks, the convolution kernel size of the convolution blocks is 3 multiplied by 3, and the step sizes are 1 and 2 respectively; the convolution block comprises convolution operation, regularization and activation units, the convolution kernel size of the first convolution block is 3 x 3, and the convolution kernel size of the second convolution block is 1 x 1.
The network training is a training process of a deep learning neural network model, firstly, data preprocessing is carried out, the sizes of images to be encrypted are unified to be 32 multiplied by 32, pixel values are normalized to be between-1 and 1, the images of a selected training database are subjected to the constant modulus vector decomposition encryption process to obtain ciphertext and plaintext true value pairs, the ciphertext and plaintext true value pairs are divided into a training set and a testing set, the training set is input into the network model to be trained, and the trained network model is obtained through training.
The encryption system analysis is to input any ciphertext of the test set into the trained network model, so as to obtain a corresponding plaintext, and simultaneously, the ciphertext can be compared with a true value of the corresponding plaintext to test the encryption analysis effect of the novel full convolution network.
The domain transformation includes but is not limited to: the transformation between the spatial domain and the frequency domain can be realized optically, such as Fourier transformation, or Fresnel diffraction transformation corresponding to the optical diffraction process.
The method has the beneficial effects that: compared with the traditional attack method, the provided encryption analysis method can realize effective encryption analysis without knowing an encryption key or a private key and other encryption system parameters and the like, and can recover and recover a high-quality plaintext image; the deep learning method has short training time, and the training speed is improved by 7 times compared with the traditional method; the method has better generalization capability, and can adopt one image library for training and another image library for successful test; finally, the method has better robustness to noise and clipping in transmission.
Drawings
Fig. 1 is a schematic diagram of the structure of the novel full convolution network of the invention.
FIG. 2 is a schematic diagram of an encryption process of the encryption system based on the equimod vector decomposition according to the present invention.
FIG. 3 is a graph of loss function convergence curves and attack analysis test accuracy.
FIG. 4 is a diagram showing the result of the encryption analysis performed by the encryption method of 2 domain transformations according to the present invention.
Detailed Description
An exemplary embodiment of the method for analyzing the image encryption by using the uniform modulus vector decomposition based on the novel full convolution network according to the present invention is described in detail below, and the method is further described in detail. It is to be noted that the following examples are given for the purpose of illustration only and are not to be construed as limiting the scope of the present invention, and that the skilled person will be able to make insubstantial modifications and adaptations of the method based on the teachings of the method described above and still fall within the scope of the invention.
The invention provides an equal modulus vector decomposition image encryption analysis method based on a novel full convolution network, which comprises the following steps: the method comprises four parts of an encryption system based on equimode vector decomposition, a network model of encryption analysis, network training and encryption system analysis.
The specific network structure is shown in fig. 1, and the schematic diagram of the encryption process is shown in fig. 2.
The encryption system based on the equimodular vector decomposition comprises an encryption process and a decryption process, wherein the encryption process is specifically described as follows: the image to be encrypted is first subjected to the complex number and domain transformation, and then an equal modulus vector decomposition method is adopted to obtain a ciphertext and a private key, wherein the encryption process is expressed as [ C, P ]]=EMD{DT[F(I, M)]The decryption process is an encryption processCan be expressed as I = | IDT (C + P) converter2Wherein, I is the image to be encrypted, and M is in the range of [0, 2 pi ]]The random phase plate of (1), F (I, M) is a complex number, and the specific process can be expressed as F (I, M) = sqrt (I) × exp (I × M), DT [.]For domain transformation, EDM is equal modulus vector decomposition, IDT [.]For inverse domain transformation, | - | is modulo operation, C and P represent the ciphertext and the private key, respectively, with the modulo of each pixel being equal.
The network model of the encryption analysis is a novel full convolution network, belongs to a deep learning neural network, and comprises an input layer, a hidden layer and an output layer, wherein the input layer is a ciphertext image of 32 multiplied by 1, and the output layer is an encryption analysis result image of 32 multiplied by 1; the hidden layer comprises 9 layers of networks in total, the first 4 layers are down-sampling layers, the sizes of the down-sampling layers are 16 multiplied by 28, 8 multiplied by 36, 4 multiplied by 38 and 2 multiplied by 42 in sequence, the first 4 layers and the input layer are connected by down-sampling blocks, the second 5 layers are up-sampling layers, the sizes of the up-sampling layers are 2 multiplied by 48, 4 multiplied by 48, 8 multiplied by 46, 16 multiplied by 48 and 32 multiplied by 48, the last 5 layers and the first 4 layers are connected by convolution blocks, the layers of the last 5 layers are connected by up-sampling blocks, and the last 5 layers and the output layer are connected by convolution blocks; the downsampling block comprises 2 continuous convolution blocks, the convolution kernel size of the convolution blocks is 3 multiplied by 3, and the step sizes are 1 and 2 respectively; the convolution block comprises convolution operation, regularization and activation units, the convolution kernel size of the first convolution block is 3 x 3, and the convolution kernel size of the second convolution block is 1 x 1.
The network training is a training process of a deep learning neural network model, firstly, data preprocessing is carried out, the sizes of images to be encrypted are unified to be 32 multiplied by 32, pixel values are normalized to be between-1 and 1, the images of a selected training database are subjected to the constant modulus vector decomposition encryption process to obtain ciphertext and plaintext true value pairs, the ciphertext and plaintext true value pairs are divided into a training set and a testing set, the training set is input into the network model to be trained, and the trained network model is obtained through training.
The encryption system analysis is to input any ciphertext of the test set into the trained network model, so as to obtain a corresponding plaintext, and simultaneously, the ciphertext can be compared with a true value of the corresponding plaintext to test the encryption analysis effect of the novel full convolution network.
The domain transformation includes but is not limited to: the transformation between the spatial domain and the frequency domain can be realized optically, such as Fourier transformation, or Fresnel diffraction transformation corresponding to the optical diffraction process.
In the present example, the image databases used are the MNIST and Fashinon-MNIST databases. In the proposed full convolution network, the activation function of the activation unit is ReLU, and the learning rate is dynamically set: the first 5 rounds were 0.01, the next 5 rounds were 0.005 and the last 5 rounds were 0.001. The implementation environment of the deep learning network is a Baidu fly-plasma framework, Inviad Tesla V100 GPU. The loss function adopts mean square error, and the accuracy adopts the correlation of adjacent pixels. Fig. 3 is a graph showing the loss function convergence curve and the attack analysis test accuracy, fig. 3 (I) is a result of the cryptanalysis of the fourier transform-based domain transform, and fig. 3 (II) is a result of the cryptanalysis of the fresnel diffraction transform-based domain transform. It can be seen from the figure that the encryption analysis of the 2 domain transformation encryption methods has fast convergence rate, i.e. short training time and high accuracy, i.e. high quality of recovered plaintext. Fig. 4 is a diagram showing the result of the cryptanalysis performed by the proposed cryptanalysis network on 2 kinds of domain-transformed cryptanalysis methods, where fig. 4(I) is a cryptanalysis result image of a domain transform based on fourier transform, and fig. 4(II) is a cryptanalysis result image of a domain transform based on fresnel diffraction transform. Fig. 4(i), 4(ii), and 4(iii) are images of plaintext true value, ciphertext, and corresponding attack analysis result, respectively, fig. 4(a) -4(c) are results of MNIST training and MNIST testing, and fig. 4(d) -4(f) are results of MNIST training and fast-MNIST testing. The result shows that the proposed method has better generalization capability to the database.

Claims (2)

1. An equal modulus vector decomposition image encryption analysis method based on a novel full convolution network is characterized by comprising the following steps: four parts of an encryption system based on equimode vector decomposition, a network model of encryption analysis and network training and encryption system analysis; the encryption system based on the equimodular vector decomposition comprises an encryption process and a decryption process, wherein the encryption process is specifically describedThe method comprises the following steps: the image to be encrypted is first subjected to the complex number and domain transformation, and then an equal modulus vector decomposition method is adopted to obtain a ciphertext and a private key, wherein the encryption process is expressed as [ C, P ]]=EMD{DT[F(I, M)]That is, a decryption process is an inverse process of the encryption process, and may be expressed as I = | IDT (C + P) | gaming2Wherein, I is the image to be encrypted, and M is in the range of [0, 2 pi ]]The random phase plate of (1), F (I, M) is a complex number, and the specific process can be expressed as F (I, M) = sqrt (I) × exp (I × M), DT [.]For domain transformation, EDM is equal modulus vector decomposition, IDT [.]The method comprises the steps of carrying out inverse domain transformation, | i.e. modulus operation, | i.e. C and P respectively represent a ciphertext and a private key, the modulus of each pixel of the ciphertext and the private key are respectively equal, the network model for encryption analysis is a novel full convolution network and belongs to a deep learning neural network, the network model comprises an input layer, a hidden layer and an output layer, the input layer is a ciphertext image of 32 × 32 × 1, the output layer is an encryption analysis result image of 32 × 032 ×, the hidden layer totally comprises 9 layers, the front 4 layer is a downsampling layer, the size of the downsampling layer is 16 × ×, 8 × ×, 4 5864 ×, 2 × ×, the layers of the front 4 layer and the input layer are connected by a downsampling block, the last 5 layer is an upsampling layer, the size of the downsampling layer is 2 × 2 049 6868, 4 × ×, 8 × ×, 16 × 6867, 32 36516, 32 and 72, the size of the training block is a training block 72, the training data is obtained by connecting the training block 72, the training process of the training block for training the training block, the ciphertext and the training data are input to be a training data to be a training result image, the convolution data, the training data is obtained by a training process of the training block comprising the training process of the training block 363, the training block 72, the training process of the training block, the training block for training process of the training a training block, the training process of the training block, the training block of the training block, the ciphertext and the training data of the training block, the training data of the training process of the training block 363, the training process of the training block is unified convolution analysis process of the training block, the training process of the training block is a training block, the training process of the training processCorresponding plaintext can be obtained, and meanwhile, the encryption analysis effect of the novel full convolution network can be tested by comparing with the true value of the corresponding plaintext.
2. The novel full convolutional network based encryption analysis method for equimodular vector decomposition images as claimed in claim 1, wherein the domain transformation includes but is not limited to: the transformation between the spatial domain and the frequency domain can be realized optically, such as Fourier transformation, or Fresnel diffraction transformation corresponding to the optical diffraction process.
CN202010524057.7A 2020-06-10 2020-06-10 Novel full convolution network-based equal-modulus vector decomposition image encryption analysis method Active CN111709867B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010524057.7A CN111709867B (en) 2020-06-10 2020-06-10 Novel full convolution network-based equal-modulus vector decomposition image encryption analysis method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010524057.7A CN111709867B (en) 2020-06-10 2020-06-10 Novel full convolution network-based equal-modulus vector decomposition image encryption analysis method

Publications (2)

Publication Number Publication Date
CN111709867A true CN111709867A (en) 2020-09-25
CN111709867B CN111709867B (en) 2022-11-25

Family

ID=72539471

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010524057.7A Active CN111709867B (en) 2020-06-10 2020-06-10 Novel full convolution network-based equal-modulus vector decomposition image encryption analysis method

Country Status (1)

Country Link
CN (1) CN111709867B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112241931A (en) * 2020-10-22 2021-01-19 海南大学 Frequency domain digital veil design method for image easiness
CN112351151A (en) * 2020-11-10 2021-02-09 广东工业大学 FCN-based image information encryption method and device
CN116310719B (en) * 2023-02-10 2024-04-19 中国人民解放军军事科学院国防科技创新研究院 Time-frequency domain-based optical diffraction complex model training method and image processing method

Citations (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002057909A (en) * 2000-06-20 2002-02-22 Ricoh Co Ltd Method and system for processing color medium tone, and recording medium
WO2004023715A1 (en) * 2002-09-03 2004-03-18 The Regents Of The University Of California Block cipher mode of operation for constructing a wide-blocksize block cipher from a conventional block cipher
EP1833237A2 (en) * 2006-03-07 2007-09-12 Kabushiki Kaisha Toshiba Retrieval of information embedded in an image
CN101185122A (en) * 2005-06-03 2008-05-21 皇家飞利浦电子股份有限公司 Homomorphic encryption for secure watermarking
WO2010064333A1 (en) * 2008-12-05 2010-06-10 Kabushiki Kaisha Toshiba Image processing method and image processing apparatus
US20130063550A1 (en) * 2006-02-15 2013-03-14 Kenneth Ira Ritchey Human environment life logging assistant virtual esemplastic network system and method
CN103442156A (en) * 2013-08-20 2013-12-11 宁波大学 Image steganography and secret information extraction method based on intelligent mobile terminal
WO2015052351A1 (en) * 2013-10-11 2015-04-16 Mauna Kea Technologies Method for characterizing images acquired through a video medical device
WO2015054666A1 (en) * 2013-10-10 2015-04-16 Board Of Regents, The University Of Texas System Systems and methods for quantitative analysis of histopathology images using multi-classifier ensemble schemes
CN106600517A (en) * 2016-11-11 2017-04-26 陕西师范大学 Multi-carrier secret image separate storage and reconstruction method based on EMD-3
CN106845339A (en) * 2016-12-13 2017-06-13 电子科技大学 A kind of mobile phone individual discrimination method based on bispectrum and EMD fusion features
EP3242239A1 (en) * 2016-05-02 2017-11-08 Scantrust SA Optimized authentication of graphic authentication code
CN108959478A (en) * 2018-06-21 2018-12-07 中南林业科技大学 Ciphertext image search method and system under a kind of cloud environment
US20190028608A1 (en) * 2017-07-24 2019-01-24 Samsung Electronics Co., Ltd. Electronic device and method for controlling the electronic device
WO2019050994A1 (en) * 2017-09-05 2019-03-14 Gritstone Oncology, Inc. Neoantigen identification for t-cell therapy
US20190113973A1 (en) * 2012-09-14 2019-04-18 Interaxon Inc Systems and methods for collecting, analyzing, and sharing bio-signal and non-bio-signal data
CN109784023A (en) * 2018-11-28 2019-05-21 西安电子科技大学 Stable state vision inducting brain electricity personal identification method and system based on deep learning
CN109858264A (en) * 2019-01-22 2019-06-07 四川大学 A kind of color image encipher-decipher method of the moulds resolutions of vectors such as score stochastic transformation domain
CN110071798A (en) * 2019-03-21 2019-07-30 深圳大学 A kind of equivalent key acquisition methods, device and computer readable storage medium
CN110269625A (en) * 2019-05-31 2019-09-24 杭州电子科技大学 A kind of electrocardio authentication method and system of novel multiple features fusion
CN110334881A (en) * 2019-07-17 2019-10-15 深圳大学 A kind of Financial Time Series Forecasting method based on length memory network and depth data cleaning, device and server
US20190372754A1 (en) * 2017-02-15 2019-12-05 Lg Electronics Inc. Apparatus and method for generating ciphertext data with maintained structure for analytics capability
CN110706144A (en) * 2019-09-17 2020-01-17 四川大学 Optical color image encryption method based on spiral phase transformation and equal-mode decomposition
WO2020103411A1 (en) * 2018-11-22 2020-05-28 九牧厨卫股份有限公司 Fall detection method, device, and system

Patent Citations (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002057909A (en) * 2000-06-20 2002-02-22 Ricoh Co Ltd Method and system for processing color medium tone, and recording medium
WO2004023715A1 (en) * 2002-09-03 2004-03-18 The Regents Of The University Of California Block cipher mode of operation for constructing a wide-blocksize block cipher from a conventional block cipher
CN101185122A (en) * 2005-06-03 2008-05-21 皇家飞利浦电子股份有限公司 Homomorphic encryption for secure watermarking
US20130063550A1 (en) * 2006-02-15 2013-03-14 Kenneth Ira Ritchey Human environment life logging assistant virtual esemplastic network system and method
EP1833237A2 (en) * 2006-03-07 2007-09-12 Kabushiki Kaisha Toshiba Retrieval of information embedded in an image
WO2010064333A1 (en) * 2008-12-05 2010-06-10 Kabushiki Kaisha Toshiba Image processing method and image processing apparatus
US20190113973A1 (en) * 2012-09-14 2019-04-18 Interaxon Inc Systems and methods for collecting, analyzing, and sharing bio-signal and non-bio-signal data
CN103442156A (en) * 2013-08-20 2013-12-11 宁波大学 Image steganography and secret information extraction method based on intelligent mobile terminal
WO2015054666A1 (en) * 2013-10-10 2015-04-16 Board Of Regents, The University Of Texas System Systems and methods for quantitative analysis of histopathology images using multi-classifier ensemble schemes
WO2015052351A1 (en) * 2013-10-11 2015-04-16 Mauna Kea Technologies Method for characterizing images acquired through a video medical device
EP3242239A1 (en) * 2016-05-02 2017-11-08 Scantrust SA Optimized authentication of graphic authentication code
CN106600517A (en) * 2016-11-11 2017-04-26 陕西师范大学 Multi-carrier secret image separate storage and reconstruction method based on EMD-3
CN106845339A (en) * 2016-12-13 2017-06-13 电子科技大学 A kind of mobile phone individual discrimination method based on bispectrum and EMD fusion features
US20190372754A1 (en) * 2017-02-15 2019-12-05 Lg Electronics Inc. Apparatus and method for generating ciphertext data with maintained structure for analytics capability
US20190028608A1 (en) * 2017-07-24 2019-01-24 Samsung Electronics Co., Ltd. Electronic device and method for controlling the electronic device
WO2019050994A1 (en) * 2017-09-05 2019-03-14 Gritstone Oncology, Inc. Neoantigen identification for t-cell therapy
CN108959478A (en) * 2018-06-21 2018-12-07 中南林业科技大学 Ciphertext image search method and system under a kind of cloud environment
WO2020103411A1 (en) * 2018-11-22 2020-05-28 九牧厨卫股份有限公司 Fall detection method, device, and system
CN109784023A (en) * 2018-11-28 2019-05-21 西安电子科技大学 Stable state vision inducting brain electricity personal identification method and system based on deep learning
CN109858264A (en) * 2019-01-22 2019-06-07 四川大学 A kind of color image encipher-decipher method of the moulds resolutions of vectors such as score stochastic transformation domain
CN110071798A (en) * 2019-03-21 2019-07-30 深圳大学 A kind of equivalent key acquisition methods, device and computer readable storage medium
CN110269625A (en) * 2019-05-31 2019-09-24 杭州电子科技大学 A kind of electrocardio authentication method and system of novel multiple features fusion
CN110334881A (en) * 2019-07-17 2019-10-15 深圳大学 A kind of Financial Time Series Forecasting method based on length memory network and depth data cleaning, device and server
CN110706144A (en) * 2019-09-17 2020-01-17 四川大学 Optical color image encryption method based on spiral phase transformation and equal-mode decomposition

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
胡克亚: "基于分块压缩感知和改进幻方变换的图像加密", 《激光技术》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112241931A (en) * 2020-10-22 2021-01-19 海南大学 Frequency domain digital veil design method for image easiness
CN112351151A (en) * 2020-11-10 2021-02-09 广东工业大学 FCN-based image information encryption method and device
CN112351151B (en) * 2020-11-10 2022-09-16 广东工业大学 FCN-based image information encryption method and device
CN116310719B (en) * 2023-02-10 2024-04-19 中国人民解放军军事科学院国防科技创新研究院 Time-frequency domain-based optical diffraction complex model training method and image processing method

Also Published As

Publication number Publication date
CN111709867B (en) 2022-11-25

Similar Documents

Publication Publication Date Title
Wang et al. A novel triple-image encryption and hiding algorithm based on chaos, compressive sensing and 3D DCT
CN110136063B (en) Single image super-resolution reconstruction method based on condition generation countermeasure network
CN111709867B (en) Novel full convolution network-based equal-modulus vector decomposition image encryption analysis method
CN112217825B (en) Asymmetric encryption system attack method based on resolution self-adaptive network
Wei et al. Generative steganography network
Zhang et al. Generative reversible data hiding by image-to-image translation via GANs
Sun et al. Multiple-image encryption based on cascaded gyrator transforms and high-dimensional chaotic system
Bao et al. Image encryption in the wavelet domain
CN112016112A (en) Method for encrypting image by compounding Fourier transform and differential transform
CN113285797B (en) Multi-image encryption method for optical rotation domain based on compressed sensing and deep learning
CN104143174A (en) Image disguising and reconstructing method based on Tangram algorithm and two-dimensional double-scale rectangular mapping
Gopan et al. Video super resolution with generative adversarial network
Singh et al. GIMD-Net: An effective General-purpose Image Manipulation Detection Network, even under anti-forensic attacks
CN116743934A (en) Equal resolution image hiding and encrypting method based on deep learning and ghost imaging
CN116309164A (en) Image processing method and device
Wang et al. A customized deep network based encryption-then-lossy-compression scheme of color images achieving arbitrary compression ratios
Wang et al. Applying deep learning to known-plaintext attack on chaotic image encryption schemes
CN112188030B (en) Gray level image encryption coding and decoding method based on pixel combination and complex number transformation
Zhou et al. Deep learning based attack on phase-truncated optical encoding
Huang et al. Development of a novel hyperchaos-based image encryption algorithm consisting of two scrambling-diffusion operations
Bai et al. Reconstruction of chaotic grayscale image encryption based on deep learning
Ping et al. Image hiding using invertible neural network and similarity of bits pairs
Kaushik et al. A two stage hybrid model for image encryption and compression to enhance security and efficiency
CN113313775B (en) Nonlinear optical encryption system attack method based on deep learning
Narula et al. Implementation of hybrid technique from spatial and frequency domain steganography: Along with cryptography to withstand statistical attacks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant