CN115051844B - Ghost imaging encryption method for hiding illumination light field information - Google Patents

Ghost imaging encryption method for hiding illumination light field information Download PDF

Info

Publication number
CN115051844B
CN115051844B CN202210637566.XA CN202210637566A CN115051844B CN 115051844 B CN115051844 B CN 115051844B CN 202210637566 A CN202210637566 A CN 202210637566A CN 115051844 B CN115051844 B CN 115051844B
Authority
CN
China
Prior art keywords
light field
illumination light
key
target
sender
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210637566.XA
Other languages
Chinese (zh)
Other versions
CN115051844A (en
Inventor
郭忠义
徐陈祥
郭凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hefei University of Technology
Original Assignee
Hefei University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hefei University of Technology filed Critical Hefei University of Technology
Priority to CN202210637566.XA priority Critical patent/CN115051844B/en
Publication of CN115051844A publication Critical patent/CN115051844A/en
Application granted granted Critical
Publication of CN115051844B publication Critical patent/CN115051844B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Optical Communication System (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The invention discloses a ghost imaging encryption method for hiding illumination light field information, which comprises the following steps: 1. encrypting the illumination light field by using the key light field to achieve the effect of encrypting the information of the target, and transmitting a key sequence of the key light field to a receiver through a private channel; 2. the sender uses the encrypted light field to illuminate the target so as to extract target information, and a group of barrel detector values are obtained; 3. and the receiver decrypts the fake illumination light field acquired by the public channel through the key sequence of the key light field acquired by the private channel. 4. Orthonormal is carried out on the real illumination light field obtained through decryption and the barrel detector value of the public channel; 5. the target information is restored using a restoration algorithm of ghost imaging. The method encrypts the target by hiding the ghost imaging illumination light field, has simple encryption and decryption modes, and the private channel transmits data simply and efficiently and is difficult to crack, thereby having certain reference and reference significance for information transmission and encryption.

Description

Ghost imaging encryption method for hiding illumination light field information
Technical Field
The invention relates to a ghost image encryption method for hiding illumination light field information, and belongs to the field of secret communication.
Background
In the information age, the information is a double-edged sword, which brings benefits to the production and life of people on one hand, and brings great threat to people due to information leakage on the other hand. Therefore, a powerful security measure is objectively necessary to prevent the theft or tampering of confidential data. Data transmission and encryption have been in a significant position in business development, national confidentiality, and military industries. Data encryption has been developed to date, and easy transmission, simple encryption and decryption methods and difficult decryption have been pursued.
The development of ghost imaging has been developed for imaging purposes until now, and in 2009, the silberg team in israel proposed to recover the target image using an illumination pattern that obeys a random gaussian distribution and a conventional correlation reconstruction algorithm. The ghost imaging often needs a large amount of illumination light fields to acquire target information to obtain a barrel detector value, and finally, a second-order correlation algorithm is carried out to recover the target information. Because of the imaging specificity of ghost imaging, the target is not directly imaged, but the data is acquired, and then the target information is recovered through mathematical operation. This has a good effect on the transmission and encryption of the target information.
But if the illumination light field and the barrel detector value are directly transmitted in the transmission process, the illumination light field and the barrel detector value are easy to intercept, and therefore, a good encryption effect is difficult to achieve. And in the transmission process, the encrypted light field is directly transmitted, and the transmitted data volume is huge because of the large amount of sampling required by ghost imaging.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides the ghost imaging encryption method for hiding the information of the illumination light field, so that the target information can be encrypted by effectively utilizing the ghost imaging technology, the purposes of easiness in encryption and difficulty in cracking are achieved, and the method has certain reference and reference significance for information transmission and encryption.
In order to achieve the aim of the invention, the invention adopts the following technical scheme:
the invention discloses a ghost image encryption method for hiding illumination light field information, which is characterized by comprising the following steps:
step 1, a sender randomly selects a group of key light fields from a key light field database, records a key sequence of the selected key light fields, and sends the key sequence to a receiver through a private channel;
step 2, the sender utilizes the obtained key light field to carry out data hiding on the illumination light field:
step 2.1, defining an illumination light field as a false illumination light field, and performing point multiplication operation on the obtained key light field and the false illumination light field to obtain a group of real illumination light field A;
step 2.2, irradiating the real illumination light field A onto a target through an optical principle of ghost imaging, so as to obtain a group of barrel detector values B;
step 2.3, the sender sends the false illumination light field and the barrel detector value B to the receiver in a public channel, and an eavesdropper can acquire the false illumination light field and the barrel detector value B at the moment;
step 3, the receiving side obtains the key sequence through a private channel, and obtains a key light field identical to the sending side from the key light field database according to the key sequence; performing point multiplication operation on the key light field and the false illumination light field acquired by the public channel to obtain a real illumination light field A for target illumination by the sender;
and 4, the receiver carries out orthogonal normalization processing on the true illumination light field A and the barrel detector value B acquired by the public channel to obtain a processed true illumination light field A 'and a barrel detector value B', and then carries out target image recovery on the processed new true illumination light field A 'and the barrel detector value B' by using a ghost imaging recovery algorithm, so that a target illuminated by the sender under the true illumination light field A is obtained.
Compared with the prior art, the invention has the beneficial effects that:
1. the invention only needs to send a group of key sequences in the private channel, and the key sequences are only one-dimensional vectors formed by numbers. The data sent by the private channel is simple and efficient, in each encryption process, the key sequence of the key light field selected by the sender is random, the key sequence of the key light field in the key light field database is changeable and irregular and can be circulated, and then a mode that the key light field is difficult to crack is achieved;
2. the invention uses the principle of ghost imaging, and the false illumination light field and the barrel detector value are sent in the public channel, so that the invention has a certain confusing effect for an eavesdropper because the eavesdropper acquires all data required by the ghost imaging algorithm for recovering the target. The eavesdropper does not know that the two communication parties are in a data hiding mode of the illumination light field, so that the effect of encrypting the target information is achieved;
3. the invention utilizes the Schmidt orthogonal normalization algorithm, and the receiver obtains the real illumination light field and the barrel detector value, so that the target information can be clearly and accurately recovered. Because the step of Schmidt orthogonalization is needed, the data of the real illumination light field is needed, and therefore an eavesdropper cannot obtain the real illumination light field and cannot recover the target information at all;
4. the ghost imaging principle used in the invention can completely acquire data through computer simulation without truly illuminating the target, so the whole encryption system is extremely convenient and efficient.
Drawings
FIG. 1 is a step diagram of a ghost image encryption method for hiding illumination light field information in the present invention;
FIG. 2 is a schematic diagram of an optical device for a sender to illuminate a target through a true illumination field to obtain bin detector values;
FIG. 3a is a graph of target information for an eavesdropper performing a second order correlation algorithm recovery of false illumination light fields and bucket detector values acquired through a common channel;
FIG. 3b is a graph of target information recovered by an eavesdropper through a Schmidt orthogonal normalization algorithm and a second-order correlation algorithm on the false illumination light field and the barrel detector value acquired by the eavesdropper through a public channel;
fig. 3c is a target information diagram of the receiver acquired through the private channel and the public channel, wherein the receiver firstly acquires a true illumination light field, then carries out an orthogonal normalization algorithm, and finally recovers through a second-order correlation algorithm.
Detailed Description
In this embodiment, a ghost image encryption method for hiding information of an illumination light field is a method for hiding data of the illumination light field through a key light field and further encrypting target information through ghost image. Prior to data transmission. Both the sender and the receiver have a set of identical key light field databases. Each key light field in the database is labeled. The key light field refers to a light field with random irregular brightness and darkness distribution, a sender selects part of key light fields from a key light field database and respectively performs point multiplication with the illumination light field, a key sequence of the key light field is sent to a receiver through a private channel, the receiver can decrypt public data, and finally target information is recovered. The eavesdropper simply gets the information through the public channel without recovering the target information at all. Specifically, referring to fig. 1, the steps are as follows:
step 1, both the sender and the receiver have a set of total key light field databases in advance, and the total key light field databases are used for hiding data of the lighting light field. The sender randomly selects N key fields (pattern keys) from the key field database. And recording the marks of the N key light fields in a key light field database to form a group of key sequences, and transmitting the key sequences to a receiver through a private channel. The key field is randomly selected every time data is transmitted, so that the key sequences are different, and the sender can send the key sequence of the corresponding key field to the receiver through the private channel every time the data is transmitted.
Step 2, the sender utilizes the obtained key light field to carry out data hiding on the illumination light field;
and 2.1, defining the illumination light field as a false illumination light field, and performing point multiplication operation on the selected N pattern keys and the false illumination light field to obtain a group of real illumination light field A. In this embodiment, if the number of pixels of the selected target and light field is m, the total sampling frequency is m times, and m illumination light fields are totally divided into m/N groups according to the sequence, each group is N illumination light fields, and each group performs point multiplication operation with the selected N key light fields. The step conceals the data information of the illumination light field to obtain a group of new illumination light field R 1 ,R 2 ,R 3 ,···,R m (true illumination field A), m represents the mth true illumination field, and the original illumination field becomes the false illumination field.
Step 2.2, irradiating the real illumination light field A onto a target, thereby obtaining a group of barrel detector values B;
the sender samples the target using the principle of ghost imaging, see fig. 2. The light beam emitted by the laser reaches a Digital Micromirror Device (DMD) through a polaroid, and the DMD is controlled by a computer to respectively modulate a real illumination light field R 1 ,R 2 ,R 3 ,···,R m The method comprises the steps of illuminating a target, dividing the target into horizontal polarized light and vertical polarized light through a polarization beam splitter after the target is reflected, respectively receiving the horizontal polarized light and the vertical polarized light by two barrel detectors, recording a numerical value of each light field, and finally obtaining two groups of barrel detector values, namely I and I respectively Then the polarization component bin detector value b=i is obtained || -I
Step 2.3, the sender sends the false illumination light field and the bin detector value B to the receiver via a common channel.
Step 3, the receiving party obtains the false illumination light fields through the public channel, obtains the corresponding N pattern keys from the key light field database by utilizing the pattern keys key sequence obtained by the private channel, divides the m false illumination light fields into m/N groups, carries out point multiplication on each group of false illumination light fields and the N key light fields respectively, and finally combines the false illumination light fields to obtain the real illumination light field R which is the same as the transmitting party 1 ,R 2 ,R 3 ,···,R m
And 4, in order to restore the target information more accurately, the receiver carries out a Schmidt orthogonal normalization algorithm on the obtained true illumination light field and the barrel detector value. Using equations (1) and (2) to illuminate the real illumination field R 1 ,R 2 ,R 3 ,···,R m Schmitt orthogonalization with bin detector value B, followed by normalization using equation (3).
In the formula (1), C mn Is the projection coefficient, and after this operation, a set of R is obtained 1 ′,R 2 ′,R 3 ′,···,R m 'the (new true illumination light field a') true illumination light field.
And (3) carrying out corresponding operation on the corresponding barrel detector value B obtained by the public channel, and obtaining a new set of barrel detector values B' by the formula (4).
And 5, recovering the transmitted target information by using a ghost imaging second-order correlation algorithm shown in the formula (5), so as to obtain a target which is illuminated by the sender under the real illumination light field A:
G(x,y)=<I(x,y)B> m -<I(x,y)> m <B> m (5)
in equation (5), I (x, y) represents the illumination light field and B represents the bin detector value. Where the receiver is to illuminate the light fields R1, R2, R 3 ,···,R m And carrying out a second-order correlation algorithm on the barrel detector value B after the Schmidt orthogonal normalization, and then recovering the target illuminated by the sender. The false illumination light field and the barrel detector value obtained by the public channel are directly used for imaging, and no matter whether the schmitt orthogonal normalization algorithm is adopted or not, the target information cannot be recovered.
The eavesdropper does not acquire the key sequence of the key light field through the private channel, and can only use the fake illumination light field acquired by public to carry out ghost image restoration algorithm to restore the target.
As shown in fig. 3a, the eavesdropper uses the false illumination light field acquired by the public channel to directly perform a second-order correlation algorithm with the barrel detector value, so that the target information can not be recovered.
As shown in fig. 3b, the eavesdropper uses the false illumination light field and the barrel detector value acquired by the public channel to perform schmidt orthogonal normalization and then directly perform the second-order correlation algorithm, and still can not recover the target information completely.
As shown in fig. 3c, the receiver has a real illumination light field, and first performs schmidt orthogonal normalization and then performs a second-order correlation algorithm to clearly recover the target information.

Claims (1)

1. A ghost imaging encryption method for hiding illumination light field information is characterized by comprising the following steps:
step 1, a sender randomly selects a group of key light fields from a key light field database, records a key sequence of the selected key light fields, and sends the key sequence to a receiver through a private channel;
step 2, the sender utilizes the obtained key light field to carry out data hiding on the illumination light field:
step 2.1, defining an illumination light field as a false illumination light field, and performing point multiplication operation on the obtained key light field and the false illumination light field to obtain a group of real illumination light field A;
step 2.2, irradiating the real illumination light field A onto a target through an optical principle of ghost imaging, so as to obtain a group of barrel detector values B;
step 2.3, the sender sends the false illumination light field and the barrel detector value B to the receiver in a public channel, and an eavesdropper can acquire the false illumination light field and the barrel detector value B at the moment;
step 3, the receiving side obtains the key sequence through a private channel, and obtains a key light field identical to the sending side from the key light field database according to the key sequence; performing point multiplication operation on the key light field and the false illumination light field acquired by the public channel to obtain a real illumination light field A for target illumination by the sender;
and 4, the receiver carries out orthogonal normalization processing on the true illumination light field A and the barrel detector value B acquired by the public channel to obtain a processed true illumination light field A 'and a barrel detector value B', and then carries out target image recovery on the processed new true illumination light field A 'and the barrel detector value B' by using a ghost imaging recovery algorithm, so that a target illuminated by the sender under the true illumination light field A is obtained.
CN202210637566.XA 2022-06-07 2022-06-07 Ghost imaging encryption method for hiding illumination light field information Active CN115051844B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210637566.XA CN115051844B (en) 2022-06-07 2022-06-07 Ghost imaging encryption method for hiding illumination light field information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210637566.XA CN115051844B (en) 2022-06-07 2022-06-07 Ghost imaging encryption method for hiding illumination light field information

Publications (2)

Publication Number Publication Date
CN115051844A CN115051844A (en) 2022-09-13
CN115051844B true CN115051844B (en) 2023-11-03

Family

ID=83161310

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210637566.XA Active CN115051844B (en) 2022-06-07 2022-06-07 Ghost imaging encryption method for hiding illumination light field information

Country Status (1)

Country Link
CN (1) CN115051844B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110599392A (en) * 2019-08-16 2019-12-20 西安理工大学 Optical image hiding method based on calculation ghost imaging
AU2020100261A4 (en) * 2020-01-10 2020-03-26 Chengdu University Of Information Technology The quantum secret information direct communication method with mutual authentication
CN113938208A (en) * 2021-10-20 2022-01-14 东莞理工学院 Decryption method of associated imaging encryption communication system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7403623B2 (en) * 2002-07-05 2008-07-22 Universite Libre De Bruxelles High-rate quantum key distribution scheme relying on continuously phase and amplitude-modulated coherent light pulses

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110599392A (en) * 2019-08-16 2019-12-20 西安理工大学 Optical image hiding method based on calculation ghost imaging
AU2020100261A4 (en) * 2020-01-10 2020-03-26 Chengdu University Of Information Technology The quantum secret information direct communication method with mutual authentication
CN113938208A (en) * 2021-10-20 2022-01-14 东莞理工学院 Decryption method of associated imaging encryption communication system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
J. Schaad ; Soaring Hawk Consulting ; R. Housley ; RSA Laboratories ; .Use of the Advanced Encryption Algorithm in CMS.IETF .2001,全文. *
基于计算鬼成像的双密钥光学加密方案;曹非;赵生妹;;光学学报(第01期);全文 *

Also Published As

Publication number Publication date
CN115051844A (en) 2022-09-13

Similar Documents

Publication Publication Date Title
US9054871B2 (en) Physical key-protected one time pad
Razzaq et al. Digital image security: Fusion of encryption, steganography and watermarking
CN103402040B (en) Based on the dual image encryption method of spatial domain and Fourier domain double-encryption
Jiao et al. Known-plaintext attack and ciphertext-only attack for encrypted single-pixel imaging
Yi et al. Optical encryption based on ghost imaging and public key cryptography
Ghanbari-Ghalehjoughi et al. Multiple layer encryption and steganography via multi-channel ghost imaging
CN103279916A (en) Image encryption method based on double random phase encoding and interference principle
Chen et al. Generalized optical encryption framework based on Shearlets for medical image
US20220052851A1 (en) Methods for Optical Image Encryption and Decryption Based on Biological Information
CN107426172A (en) The matching method for pushing and device of a kind of identity information
Tang et al. Robust multiple color images encryption using discrete Fourier transforms and chaotic map
Yu et al. Multi-party interactive cryptographic key distribution protocol over a public network based on computational ghost imaging
Abdelfattah et al. Optical cryptosystem for visually meaningful encrypted images based on gyrator transform and Hénon map
Yi et al. Camouflaged optical encryption based on compressive ghost imaging
CN111738897A (en) Multi-image multi-encryption method based on speckle decorrelation
Guan et al. Multi-images encryption and watermarking with small number of keys via computational ghost imaging
CN115051844B (en) Ghost imaging encryption method for hiding illumination light field information
Li et al. A one-time pad encryption method combining full-phase image encryption and hiding
Lin et al. Analysis and design of impulse attack free generalized joint transform correlator optical encryption scheme
CN101751658B (en) Image visual separate-management method with minimum pixel expansion and optimal contrast
Vishnoi et al. Image Encryption Using Homomorphic Transform
Mohamed et al. A new image encryption scheme based on the hybridization of Lorenz Chaotic map and Fibonacci Q-matrix
Duran et al. Optical encryption with compressive ghost imaging
Nagy et al. Quantum Steganography by Harnessing Entanglement as a Degree of Freedom
Mosso An optical-cryptographic encryption scheme using a keystream synthesizer based on chaotic speckle nature

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant