CN111709867B - Novel full convolution network-based equal-modulus vector decomposition image encryption analysis method - Google Patents
Novel full convolution network-based equal-modulus vector decomposition image encryption analysis method Download PDFInfo
- Publication number
- CN111709867B CN111709867B CN202010524057.7A CN202010524057A CN111709867B CN 111709867 B CN111709867 B CN 111709867B CN 202010524057 A CN202010524057 A CN 202010524057A CN 111709867 B CN111709867 B CN 111709867B
- Authority
- CN
- China
- Prior art keywords
- encryption
- layers
- analysis
- convolution
- image
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/005—Robust watermarking, e.g. average attack or collusion attack resistant
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
- G06N3/045—Combinations of networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/08—Learning methods
Abstract
The invention provides an equal-modulus vector decomposition image encryption analysis method based on a novel full convolution network. The method comprises the following steps: the method comprises four parts of an encryption system based on equimode vector decomposition, a network model of encryption analysis, network training and encryption system analysis. The designed encryption analysis network model is trained by inputting a plaintext-ciphertext pair, and then a ciphertext image is input through the trained encryption analysis network model, so that an attack analysis result, namely a recovered high-quality plaintext image, can be obtained. Compared with the traditional attack method, the provided encryption analysis method can realize effective encryption analysis without knowing an encryption key or a private key and other encryption system parameters and the like, and can recover and recover a high-quality plaintext image; the deep learning method has short training time, and the training speed is improved by 7 times compared with the traditional method; the method has better generalization capability, and can adopt one image library for training and another image library for successful test; finally, the method has better robustness to noise and clipping in transmission.
Description
Technical Field
The invention relates to the technical field of information security and information optics, in particular to an image encryption analysis method.
Background
With the advent of the information age, information security has received more and more attention. Images tend to provide rich information, so image encryption becomes a crucial issue. In 2015, tsai proposes an image encryption method based on equal modulus separation (EMD), in which a two-dimensional vector is decomposed into two-dimensional vectors, and a safe one-way trapdoor function is provided for image encryption, so that the method is widely applied to gray image encryption. Deep learning is also used for image encryption analysis as an effective method for feature extraction, but at present, only an encryption system based on double random phase encoding and the like are broken through by a deep learning method, and for an asymmetric encryption method with higher encryption security, such as an image encryption method based on equimode vector decomposition, an encryption analysis method of the deep learning method is not reported. And the deep learning network needs to be redesigned to adapt to the attack analysis method of a new encryption system. Therefore, the deep learning-based isomode vector decomposition image encryption analysis still has great research potential.
Disclosure of Invention
The invention provides an equimode vector decomposition image encryption analysis method based on a novel full convolution network, aiming at the problem that the traditional deep learning network can not attack and analyze the image encryption based on equimode vector decomposition. The method comprises the following steps: the method comprises four parts of an encryption system based on equimode vector decomposition, a network model of encryption analysis, network training and encryption system analysis.
The encryption system based on the uniform modulus vector decomposition comprises an encryption process and a decryption process, wherein the encryption process is specifically described as follows: the image to be encrypted is first subjected to the complex number and domain transformation, and then an equal modulus vector decomposition method is adopted to obtain a ciphertext and a private key, wherein the encryption process is expressed as [ C, P ]]=EMD{DT[F(I, M)]That is, a decryption process is an inverse process of the encryption process, and may be expressed as I = | IDT (C + P) | gaming 2 Wherein, I is the image to be encrypted, and M is the range of [0, 2 pi ]]The random phase plate of (1), F (I, M) is a complex, and the specific process thereof can be expressed as F (I, M) = sqrt (I) × exp (I × M), DT [.]For domain transformation, EDM is equal modulus vector decomposition, IDT [.]For inverse domain transformation, | - | is modulo operation, C and P represent the ciphertext and the private key, respectively, with the modulo of each pixel being equal.
The network model of the said encryption analysis is a new kind of all convolution networks, belong to the neural network of deep learning, the network model includes input layer, hidden layer and output layer, wherein the input layer is 32 x 1 cipher text picture, the output layer is 32 x 1 encryption analysis result picture; the hidden layer comprises 9 layers of networks in total, the first 4 layers are down sampling layers with the sizes of 16 multiplied by 28,8 multiplied by 36,4 multiplied by 38 and 2 multiplied by 42, the layers of the first 4 layers and the input layer are connected by down sampling blocks, the last 5 layers are up sampling layers, the sizes of the layers are sequentially 2 multiplied by 48,4 multiplied by 48,8 multiplied by 46, 16 multiplied by 48 and 32 multiplied by 48, the rear 5 layers are connected with the front 4 layers by convolution blocks, the rear 5 layers are connected with the output layer by up-sampling blocks, and the rear 5 layers are connected with the output layer by convolution blocks; the downsampling block comprises 2 continuous convolution blocks, the convolution kernel size of the convolution blocks is 3 multiplied by 3, and the step sizes are 1 and 2 respectively; the convolution blocks comprise convolution operation, regularization and activation units, the convolution kernel size of the first convolution block is 3 x 3, and the convolution kernel size of the second convolution block is 1 x 1.
The network training is a training process of a deep learning neural network model, firstly, data preprocessing is carried out, the sizes of images to be encrypted are unified to be 32 multiplied by 32, pixel values are normalized to be between-1 and 1, the images of a selected training database are subjected to the constant modulus vector decomposition encryption process to obtain ciphertext and plaintext true value pairs, the ciphertext and plaintext true value pairs are divided into a training set and a testing set, the training set is input into the network model to be trained, and the trained network model is obtained through training.
The encryption system analysis is to input any ciphertext of the test set into the trained network model, so as to obtain a corresponding plaintext, and simultaneously, the ciphertext can be compared with a true value of the corresponding plaintext to test the encryption analysis effect of the novel full convolution network.
The domain transformation includes but is not limited to: the transformation between the spatial domain and the frequency domain can be realized optically, such as Fourier transformation, or Fresnel diffraction transformation corresponding to the optical diffraction process.
The method has the beneficial effects that: compared with the traditional attack method, the provided encryption analysis method can realize effective encryption analysis without knowing an encryption key or a private key and other encryption system parameters and the like, and can recover and recover a high-quality plaintext image; the deep learning method has short training time, and the training speed is improved by 7 times compared with the traditional method; the method has better generalization capability, and can adopt one image library for training and another image library for successful test; finally, the method has better robustness to noise and clipping in transmission.
Drawings
Fig. 1 is a schematic diagram of a novel full convolution network structure according to the present invention.
FIG. 2 is a schematic diagram of an encryption process of the encryption system based on the equimod vector decomposition according to the present invention.
FIG. 3 is a graph of loss function convergence curves and attack analysis test accuracy.
FIG. 4 is a diagram showing the result of the encryption analysis performed by the encryption method of 2 domain transformations according to the present invention.
Detailed Description
An exemplary embodiment of the method for analyzing the image encryption by using the uniform modulus vector decomposition based on the novel full convolution network according to the present invention is described in detail below, and the method is further described in detail. It is to be noted that the following examples are given for the purpose of illustration only and are not to be construed as limiting the scope of the present invention, and that the skilled person will be able to make insubstantial modifications and adaptations of the method based on the teachings of the method described above and still fall within the scope of the invention.
The invention provides an equal modulus vector decomposition image encryption analysis method based on a novel full convolution network, which comprises the following steps: the method comprises four parts of an encryption system based on equimode vector decomposition, a network model of encryption analysis, network training and encryption system analysis.
The specific network structure is shown in fig. 1, and the schematic diagram of the encryption process is shown in fig. 2.
The encryption system based on the equimodular vector decomposition comprises an encryption process and a decryption process, wherein the encryption process is specifically described as follows: the image to be encrypted is first subjected to the complex number and domain transformation, and then an equal modulus vector decomposition method is adopted to obtain a ciphertext and a private key, wherein the encryption process is expressed as [ C, P ]]=EMD{DT[F(I, M)]}, the decryption process of which is the inverse of the encryption process, which can be expressed as I = | IDT (C + P) > computation 2 Wherein, I is the image to be encrypted, and M is in the range of [0, 2 pi ]]The random phase plate of (1), F (I, M) is a complex number, and the specific process can be expressed as F (I, M) = sqrt (I) × exp (I × M), DT [.]For domain transformation, EDM is equal modulus vector decomposition, IDT [.]For inverse domain transformation, | is modulo operation, C and P represent ciphertext respectivelyAnd the modulus of each pixel of the ciphertext and the private key are respectively equal.
The network model of the encryption analysis is a novel full convolution network, belongs to a deep learning neural network, and comprises an input layer, a hidden layer and an output layer, wherein the input layer is a ciphertext image of 32 multiplied by 1, and the output layer is an encryption analysis result image of 32 multiplied by 1; the hidden layer comprises 9 layers of networks in total, the first 4 layers are down sampling layers with the sizes of 16 multiplied by 28,8 multiplied by 36,4 multiplied by 38 and 2 multiplied by 42, the layers of the first 4 layers and the input layer are connected by down sampling blocks, the last 5 layers are up sampling layers, the sizes of the layers are sequentially 2 multiplied by 48,4 multiplied by 48,8 multiplied by 46, 16 multiplied by 48 and 32 multiplied by 48, the rear 5 layers are connected with the front 4 layers by convolution blocks, the layers of the rear 5 layers are connected by up-sampling blocks, and the rear 5 layers are connected with the output layer by convolution blocks; the down-sampling block comprises 2 continuous convolution blocks, the convolution kernel size is 3 multiplied by 3, and the step length is 1 and 2 respectively; the convolution blocks comprise convolution operation, regularization and activation units, the convolution kernel size of the first convolution block is 3 x 3, and the convolution kernel size of the second convolution block is 1 x 1.
The network training is a training process of a deep learning neural network model, firstly, data preprocessing is carried out, the sizes of images to be encrypted are unified to be 32 multiplied by 32, pixel values are normalized to be between-1 and 1, the images of a selected training database are subjected to the constant modulus vector decomposition encryption process to obtain ciphertext and plaintext true value pairs, the ciphertext and plaintext true value pairs are divided into a training set and a testing set, the training set is input into the network model to be trained, and the trained network model is obtained through training.
The encryption system analysis is to input any ciphertext of the test set into the trained network model, so as to obtain a corresponding plaintext, and simultaneously, the ciphertext can be compared with a true value of the corresponding plaintext to test the encryption analysis effect of the novel full convolution network.
The domain transformation includes, but is not limited to: the transformation between the spatial domain and the frequency domain can be realized optically, such as Fourier transformation, or Fresnel diffraction transformation corresponding to the optical diffraction process, and the like.
In the present example, the image databases used are the MNIST and Fashinon-MNIST databases. In the proposed full convolution network, the activation function of the activation unit is ReLU, and the learning rate is dynamically set: the first 5 rounds were 0.01, the next 5 rounds were 0.005 and the last 5 rounds were 0.001. The implementation environment of the deep learning network is a Baidu fly-plasma framework, inviad Tesla V100 GPU. The loss function adopts mean square error, and the accuracy adopts the correlation of adjacent pixels. Fig. 3 is a graph showing the loss function convergence curve and the attack analysis test accuracy, fig. 3 (I) is a result of the cryptanalysis of the fourier transform-based domain transform, and fig. 3 (II) is a result of the cryptanalysis of the fresnel diffraction transform-based domain transform. It can be seen from the figure that the convergence rate of the encryption analysis of the encryption method for 2 kinds of domain transformation is fast, i.e. the training time is short, the accuracy rate is high, i.e. the quality of the recovered plaintext is high. Fig. 4 is a diagram showing the result of the cryptanalysis performed by the proposed cryptanalysis network on 2 kinds of domain-transformed cryptanalysis methods, where fig. 4 (I) is a cryptanalysis result image of a domain transform based on fourier transform, and fig. 4 (II) is a cryptanalysis result image of a domain transform based on fresnel diffraction transform. Fig. 4 (i), 4 (ii), and 4 (iii) are images of plaintext true value, ciphertext, and corresponding attack analysis result, respectively, fig. 4 (a) -4 (c) are results of MNIST training and MNIST testing, and fig. 4 (d) -4 (f) are results of MNIST training and fast-MNIST testing. The result shows that the proposed method has better generalization capability to the database.
Claims (2)
1. An equal modulus vector decomposition image encryption analysis method based on a novel full convolution network is characterized by comprising the following steps: four parts of an encryption system based on equimode vector decomposition, a network model of encryption analysis and network training and encryption system analysis; the encryption system based on the equimodular vector decomposition comprises an encryption process and a decryption process, wherein the encryption process is specifically described as follows: the image to be encrypted is subjected to the multiplexing and domain transformation, and then an equal modulus vector decomposition method is adopted to obtain a ciphertext and a private key, wherein the encryption process is expressed as [ C, P ]]=EMD{DT[F(I, M)]That is, a decryption process is an inverse process of the encryption process, and may be expressed as I = | IDT (C + P) | gaming 2 Wherein, I is the image to be encrypted, and M is the range of [0, 2 pi ]]The random phase plate of (1), F (I,m) is a complex number, and its concrete process can be expressed as F (I, M) = sqrt (I) × exp (I × M), DT [.]For domain transformation, EDM is equal modulus vector decomposition, IDT [.]For inverse domain transformation, | - | is modulo operation, C and P represent ciphertext and private key, respectively, and the modulus of each pixel of ciphertext and private key is equal, respectively; the network model of the encryption analysis is a novel full convolution network, belongs to a deep learning neural network, and comprises an input layer, a hidden layer and an output layer, wherein the input layer is a ciphertext image of 32 multiplied by 1, and the output layer is an encryption analysis result image of 32 multiplied by 032 multiplied by 11; the hidden layer comprises 9 layers of networks in total, wherein the first 4 layers are down-sampling layers with the sizes of 16 × 216 × 328,8 × 48 × 536,4 × 64 × 738 and 2 × 82 × 942 in sequence, the layers of the first 4 layers and the input layer are connected by down-sampling blocks, the second 5 layers are up-sampling layers with the sizes of 2 × 2 × 048,4 × 14 × 248,8 × 38 × 446, 16 × 516 × 48 and 32 × 32 × 48 in sequence, the layers of the second 5 layers and the first 4 layers are connected by convolution blocks, the layers of the second 5 layers are connected by up-sampling blocks, and the layers of the second 5 layers and the output layer are connected by convolution blocks; the downsampling block comprises 2 continuous convolution blocks, the convolution kernel size of the convolution blocks is 3 multiplied by 3, and the step sizes are 1 and 2 respectively; the convolution block comprises a convolution operation unit, a regularization unit and an activation unit, the convolution kernel size of the first convolution block is 3 multiplied by 3, and the convolution kernel size of the second convolution block is 1 multiplied by 1; the network training is a training process of a deep learning neural network model, firstly, data preprocessing is carried out, the sizes of images to be encrypted are adjusted to be 32 x 32, pixel values are normalized to be between-1 and 1, the images of a selected training database are subjected to the equal-modulus vector decomposition encryption process to obtain true values of a ciphertext and a plaintext, the true values are divided into a training set and a testing set, the training set is input into the network model to be trained, and the trained network model is obtained through training; and the encryption system analysis is to input any ciphertext of the test set into the trained network model to obtain a corresponding plaintext, compare the corresponding plaintext with a corresponding plaintext truth value and test the encryption analysis effect of the novel full convolution network.
2. The novel full convolutional network-based image encryption analysis method based on equi-modal vector decomposition (ISMD) of claim 1, wherein the domain transformation is an optically implemented transformation between a spatial domain and a frequency domain, such as Fourier transformation, or Fresnel diffraction transformation corresponding to an optical diffraction process.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010524057.7A CN111709867B (en) | 2020-06-10 | 2020-06-10 | Novel full convolution network-based equal-modulus vector decomposition image encryption analysis method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010524057.7A CN111709867B (en) | 2020-06-10 | 2020-06-10 | Novel full convolution network-based equal-modulus vector decomposition image encryption analysis method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111709867A CN111709867A (en) | 2020-09-25 |
CN111709867B true CN111709867B (en) | 2022-11-25 |
Family
ID=72539471
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010524057.7A Active CN111709867B (en) | 2020-06-10 | 2020-06-10 | Novel full convolution network-based equal-modulus vector decomposition image encryption analysis method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111709867B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112241931B (en) * | 2020-10-22 | 2021-07-06 | 海南大学 | Frequency domain digital veil design method for image easiness |
CN112351151B (en) * | 2020-11-10 | 2022-09-16 | 广东工业大学 | FCN-based image information encryption method and device |
Citations (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002057909A (en) * | 2000-06-20 | 2002-02-22 | Ricoh Co Ltd | Method and system for processing color medium tone, and recording medium |
WO2004023715A1 (en) * | 2002-09-03 | 2004-03-18 | The Regents Of The University Of California | Block cipher mode of operation for constructing a wide-blocksize block cipher from a conventional block cipher |
EP1833237A2 (en) * | 2006-03-07 | 2007-09-12 | Kabushiki Kaisha Toshiba | Retrieval of information embedded in an image |
CN101185122A (en) * | 2005-06-03 | 2008-05-21 | 皇家飞利浦电子股份有限公司 | Homomorphic encryption for secure watermarking |
WO2010064333A1 (en) * | 2008-12-05 | 2010-06-10 | Kabushiki Kaisha Toshiba | Image processing method and image processing apparatus |
CN103442156A (en) * | 2013-08-20 | 2013-12-11 | 宁波大学 | Image steganography and secret information extraction method based on intelligent mobile terminal |
WO2015052351A1 (en) * | 2013-10-11 | 2015-04-16 | Mauna Kea Technologies | Method for characterizing images acquired through a video medical device |
WO2015054666A1 (en) * | 2013-10-10 | 2015-04-16 | Board Of Regents, The University Of Texas System | Systems and methods for quantitative analysis of histopathology images using multi-classifier ensemble schemes |
CN106600517A (en) * | 2016-11-11 | 2017-04-26 | 陕西师范大学 | Multi-carrier secret image separate storage and reconstruction method based on EMD-3 |
CN106845339A (en) * | 2016-12-13 | 2017-06-13 | 电子科技大学 | A kind of mobile phone individual discrimination method based on bispectrum and EMD fusion features |
EP3242239A1 (en) * | 2016-05-02 | 2017-11-08 | Scantrust SA | Optimized authentication of graphic authentication code |
CN108959478A (en) * | 2018-06-21 | 2018-12-07 | 中南林业科技大学 | Ciphertext image search method and system under a kind of cloud environment |
WO2019050994A1 (en) * | 2017-09-05 | 2019-03-14 | Gritstone Oncology, Inc. | Neoantigen identification for t-cell therapy |
CN109784023A (en) * | 2018-11-28 | 2019-05-21 | 西安电子科技大学 | Stable state vision inducting brain electricity personal identification method and system based on deep learning |
CN109858264A (en) * | 2019-01-22 | 2019-06-07 | 四川大学 | A kind of color image encipher-decipher method of the moulds resolutions of vectors such as score stochastic transformation domain |
CN110071798A (en) * | 2019-03-21 | 2019-07-30 | 深圳大学 | A kind of equivalent key acquisition methods, device and computer readable storage medium |
CN110269625A (en) * | 2019-05-31 | 2019-09-24 | 杭州电子科技大学 | A kind of electrocardio authentication method and system of novel multiple features fusion |
CN110334881A (en) * | 2019-07-17 | 2019-10-15 | 深圳大学 | A kind of Financial Time Series Forecasting method based on length memory network and depth data cleaning, device and server |
CN110706144A (en) * | 2019-09-17 | 2020-01-17 | 四川大学 | Optical color image encryption method based on spiral phase transformation and equal-mode decomposition |
WO2020103411A1 (en) * | 2018-11-22 | 2020-05-28 | 九牧厨卫股份有限公司 | Fall detection method, device, and system |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9101279B2 (en) * | 2006-02-15 | 2015-08-11 | Virtual Video Reality By Ritchey, Llc | Mobile user borne brain activity data and surrounding environment data correlation system |
US10606353B2 (en) * | 2012-09-14 | 2020-03-31 | Interaxon Inc. | Systems and methods for collecting, analyzing, and sharing bio-signal and non-bio-signal data |
US11558176B2 (en) * | 2017-02-15 | 2023-01-17 | Lg Electronics Inc. | Apparatus and method for generating ciphertext data with maintained structure for analytics capability |
US10587776B2 (en) * | 2017-07-24 | 2020-03-10 | Samsung Electronics Co., Ltd. | Electronic device and method for controlling the electronic device |
-
2020
- 2020-06-10 CN CN202010524057.7A patent/CN111709867B/en active Active
Patent Citations (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002057909A (en) * | 2000-06-20 | 2002-02-22 | Ricoh Co Ltd | Method and system for processing color medium tone, and recording medium |
WO2004023715A1 (en) * | 2002-09-03 | 2004-03-18 | The Regents Of The University Of California | Block cipher mode of operation for constructing a wide-blocksize block cipher from a conventional block cipher |
CN101185122A (en) * | 2005-06-03 | 2008-05-21 | 皇家飞利浦电子股份有限公司 | Homomorphic encryption for secure watermarking |
EP1833237A2 (en) * | 2006-03-07 | 2007-09-12 | Kabushiki Kaisha Toshiba | Retrieval of information embedded in an image |
WO2010064333A1 (en) * | 2008-12-05 | 2010-06-10 | Kabushiki Kaisha Toshiba | Image processing method and image processing apparatus |
CN103442156A (en) * | 2013-08-20 | 2013-12-11 | 宁波大学 | Image steganography and secret information extraction method based on intelligent mobile terminal |
WO2015054666A1 (en) * | 2013-10-10 | 2015-04-16 | Board Of Regents, The University Of Texas System | Systems and methods for quantitative analysis of histopathology images using multi-classifier ensemble schemes |
WO2015052351A1 (en) * | 2013-10-11 | 2015-04-16 | Mauna Kea Technologies | Method for characterizing images acquired through a video medical device |
EP3242239A1 (en) * | 2016-05-02 | 2017-11-08 | Scantrust SA | Optimized authentication of graphic authentication code |
CN106600517A (en) * | 2016-11-11 | 2017-04-26 | 陕西师范大学 | Multi-carrier secret image separate storage and reconstruction method based on EMD-3 |
CN106845339A (en) * | 2016-12-13 | 2017-06-13 | 电子科技大学 | A kind of mobile phone individual discrimination method based on bispectrum and EMD fusion features |
WO2019050994A1 (en) * | 2017-09-05 | 2019-03-14 | Gritstone Oncology, Inc. | Neoantigen identification for t-cell therapy |
CN108959478A (en) * | 2018-06-21 | 2018-12-07 | 中南林业科技大学 | Ciphertext image search method and system under a kind of cloud environment |
WO2020103411A1 (en) * | 2018-11-22 | 2020-05-28 | 九牧厨卫股份有限公司 | Fall detection method, device, and system |
CN109784023A (en) * | 2018-11-28 | 2019-05-21 | 西安电子科技大学 | Stable state vision inducting brain electricity personal identification method and system based on deep learning |
CN109858264A (en) * | 2019-01-22 | 2019-06-07 | 四川大学 | A kind of color image encipher-decipher method of the moulds resolutions of vectors such as score stochastic transformation domain |
CN110071798A (en) * | 2019-03-21 | 2019-07-30 | 深圳大学 | A kind of equivalent key acquisition methods, device and computer readable storage medium |
CN110269625A (en) * | 2019-05-31 | 2019-09-24 | 杭州电子科技大学 | A kind of electrocardio authentication method and system of novel multiple features fusion |
CN110334881A (en) * | 2019-07-17 | 2019-10-15 | 深圳大学 | A kind of Financial Time Series Forecasting method based on length memory network and depth data cleaning, device and server |
CN110706144A (en) * | 2019-09-17 | 2020-01-17 | 四川大学 | Optical color image encryption method based on spiral phase transformation and equal-mode decomposition |
Non-Patent Citations (1)
Title |
---|
基于分块压缩感知和改进幻方变换的图像加密;胡克亚;《激光技术》;20190731;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN111709867A (en) | 2020-09-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chai et al. | An efficient visually meaningful image compression and encryption scheme based on compressive sensing and dynamic LSB embedding | |
CN111709867B (en) | Novel full convolution network-based equal-modulus vector decomposition image encryption analysis method | |
CN112217825B (en) | Asymmetric encryption system attack method based on resolution self-adaptive network | |
Zhang et al. | Generative reversible data hiding by image-to-image translation via GANs | |
CN113115053B (en) | Image encryption method based on integer wavelet transform and compressed sensing | |
Pan et al. | A novel image encryption algorithm based on hybrid chaotic mapping and intelligent learning in financial security system | |
Paul et al. | Image encryption using permutation generated by modified Regula-Falsi method | |
CN113285797B (en) | Multi-image encryption method for optical rotation domain based on compressed sensing and deep learning | |
Wang et al. | TPE-ISE: approximate thumbnail preserving encryption based on multilevel DWT information self-embedding | |
Liu et al. | Image compression and encryption algorithm based on uniform non-degeneracy chaotic system and fractal coding | |
Chai et al. | CSENMT: A deep image compressed sensing encryption network via multi-color space and texture feature | |
Darwish et al. | Secure image compression approach based on fusion of 3D chaotic maps and arithmetic coding | |
CN116309164A (en) | Image processing method and device | |
CN116743934A (en) | Equal resolution image hiding and encrypting method based on deep learning and ghost imaging | |
Zhu et al. | Optical color ghost cryptography and steganography based on multi-discriminator generative adversarial network | |
Sun et al. | A new image block encryption method based on chaotic map and DNA encoding | |
Wang et al. | Applying deep learning to known-plaintext attack on chaotic image encryption schemes | |
CN115001654A (en) | Chaos-based thread pool and GPU combined optimization batch image encryption method | |
CN112188030B (en) | Gray level image encryption coding and decoding method based on pixel combination and complex number transformation | |
CN114615392A (en) | Image encryption method based on bit linkage | |
Huang et al. | Development of a novel hyperchaos-based image encryption algorithm consisting of two scrambling-diffusion operations | |
Bai et al. | Reconstruction of chaotic grayscale image encryption based on deep learning | |
Wang et al. | A deep learning based known plaintext attack method for chaotic cryptosystem | |
Ping et al. | Image hiding using invertible neural network and similarity of bits pairs | |
Kaushik et al. | A two stage hybrid model for image encryption and compression to enhance security and efficiency |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |