CN115102690A - Speckle encryption and decryption technology based on transmission matrix - Google Patents

Speckle encryption and decryption technology based on transmission matrix Download PDF

Info

Publication number
CN115102690A
CN115102690A CN202210573222.7A CN202210573222A CN115102690A CN 115102690 A CN115102690 A CN 115102690A CN 202210573222 A CN202210573222 A CN 202210573222A CN 115102690 A CN115102690 A CN 115102690A
Authority
CN
China
Prior art keywords
speckle
encryption
image
transmission matrix
matrix
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210573222.7A
Other languages
Chinese (zh)
Inventor
宋彬彬
马秀浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin University of Technology
Original Assignee
Tianjin University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin University of Technology filed Critical Tianjin University of Technology
Priority to CN202210573222.7A priority Critical patent/CN115102690A/en
Publication of CN115102690A publication Critical patent/CN115102690A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B10/00Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
    • H04B10/80Optical aspects relating to the use of optical transmission for specific applications, not provided for in groups H04B10/03 - H04B10/70, e.g. optical power feeding or optical transmission through water
    • H04B10/85Protection from unauthorised access, e.g. eavesdrop protection

Abstract

The invention relates to a speckle encryption and decryption technology based on a transmission matrix, which comprises the steps of firstly carrying out gray level preprocessing on an original picture to be encrypted and generating a transmission matrix data set corresponding to a gray level image; when the image is encrypted, a key matrix sequence is generated according to different states of scrambling inside the optical fiber speckle encryption system, an original image and a transmission matrix data set are loaded and modulated by an SLM (spatial light Modem) in the system, and a corresponding speckle encryption image and a corresponding speckle matrix are generated at the output end of the multimode optical fiber. When in decryption, only the speckle images and the speckle matrixes of the corresponding key sequences are needed to be subjected to correlation operation, and the original images can be restored in high definition.

Description

Speckle encryption and decryption technology based on transmission matrix
Technical Field
The invention relates to a speckle encryption and decryption technology based on a transmission matrix, which utilizes a set of optical fiber speckle encryption system to encrypt an original image to generate a speckle image ciphertext and utilizes a numerical calculation mode to decrypt the speckle ciphertext, and relates to the field of optical fiber and image processing.
Background
With the development of modern communication technology, people pay more and more attention to the fields of information security, information protection and the like. Optical image encryption technology has attracted much attention because of its advantages such as multi-dimensional, high-speed parallel processing. The optical image encryption technology is to scramble information of digital images in a space-frequency domain by using physical parameters such as orbital angular momentum, polarization, light intensity, phase and the like of coherent light or incoherent light during propagation so as to achieve the purpose of information encryption.
Nowadays, optical image encryption technologies applied to the field of information security are endless. For example, the first proposed dual random phase encryption technique (DRPE) and the later developed triple random phase encryption Technique (TRPE) place masks on the input and fourier planes of a 4-f imaging system (TRPE adds a mask on the output plane), and both TRPE and DRPE encrypt the original image into a smooth white noise image through the 4-f imaging system. However, the DRPE (or TRPE) uses two (or three) masks as the encryption key of the system, which results in small key space and conjugate decryption key and decryption key in DRPE, and is very vulnerable to attack, and there is a risk of being cracked by an adversary. The optical image encryption technology based on interference directly encrypts an original image into one or more phase plates, the encryption process does not need any iterative algorithm, the encryption process of the whole system is greatly simplified, and the phase plates with original image information can be decrypted in a digital or optical mode during decryption. Although the encryption and decryption processes of the interference-based optical image encryption technology are relatively simple and easy to implement, the contour of the original pattern can be obtained by only one phase plate (key) during the decryption process, and the contour reproduction problem reduces the security of the whole system. The optical image encryption technology based on the super surface (Metasurface) encrypts an original image by taking the super surface (Metasurface) as a key, so that the key transmission process can be simplified, and the single key can be repeatedly utilized in different encryption processes. But the super surface (metassurface) as the key is complex in manufacturing process, and the encryption process of the technology is cumbersome and not beneficial to the simple implementation of the system.
When light waves pass through the scattering medium, the light intensity of the light waves is influenced by the scattering of molecules or atoms in the scattering medium, so that speckles are generated, and the speckles can be regarded as ciphertext obtained by encrypting an original image. Multimode Fibers (MMFs) are used as a scattering transmission medium, and coherent light is affected by various factors when propagating in the optical fiber, and the coherent light generates random speckle patterns-speckles with disorder when being transmitted by the optical fiber due to problems of fiber bending, mode coupling, dispersion among modes and the like. Although the amplitudes and the phases in the speckle light fields are distributed in a disordered manner, the optical fiber input images correspond to the output speckles one by one, when certain disturbance is applied to the optical fiber, the correlation between the speckles at the output end and the input images is weakened, the speckles after scrambling increase the uncertainty of speckle image recovery, and the scrambled input images cannot be recovered by using the traditional speckle reconstruction method. However, an optical system consisting of an optical fiber and a fixed optical device has certainty. If the speckle fields corresponding to each area of the original image are calibrated in advance, the recovery of the scrambled speckle image can be realized by calculating the correlation coefficient of the same position by utilizing the position correlation, namely the process of scrambling encryption and correlation decryption is realized.
Disclosure of Invention
The invention aims to realize the encryption and decryption of the gray level image by using a transmission matrix and an optical fiber speckle encryption system. The invention is based on speckle encryption and decryption technology of a transmission matrix, and a key series is generated by an optical fiber speckle encryption system and an original image is encrypted into a speckle-pattern ciphertext. When decrypting, the image can be decrypted by carrying out numerical operation on the transmission matrix corresponding to the ciphertext and the key sequence thereof.
The invention provides an optical encryption technology, which has the advantages that:
the speckle encryption and decryption technology based on the transmission matrix can process data in parallel at high speed during encryption, and the optical fiber speckle encryption system can realize multidimensional encryption of multidimensional optical encryption by scrambling and artificially setting a key.
Secondly, the encryption and decryption technology based on the transmission matrix adopted by the invention is not limited to the encryption and decryption of a specific picture, and the method is suitable for the encryption and decryption of any gray picture with the same pixel size.
And (III) an optical fiber speckle encryption system adopted by the speckle encryption and decryption technology based on the transmission matrix has high requirement on environmental stability, is influenced by various environmental factors when encrypting the original image, has high complexity and is not easy to crack by an attacker. If the unauthorized party intercepts the transmission matrix and the ciphertext information through an extraordinary way, if the key sequence corresponding to the ciphertext is not obtained, the plaintext information corresponding to the speckle (ciphertext) still cannot be obtained.
Of course, it is not necessary for any product or method of practicing the invention to achieve all of the above-described advantages at the same time.
The technical scheme adopted by the invention comprises the following steps:
step 1: designing and building an optical fiber speckle encryption system experimental device.
Step 2: and generating a corresponding transmission matrix according to the pixel size of the original image.
And step 3: and the SLM loads and modulates the original image, sets a disturbance state to generate a corresponding key sequence and a speckle matrix, and completes image encryption.
And 4, step 4: and carrying out numerical operation on the speckles and the speckle matrix of the key sequence corresponding to the speckles to restore the image, and finishing image decryption.
In step 1, the fiber optic speckle encryption system that implements the encryption of the original image in MMF includes, but is not limited to: 1. laser 2, Spatial Light Modulator (SLM)3, beam splitter 4, CCD camera 5, scrambling device 6, MMF.
In step 2, a transmission matrix data set is generated using an n × n pixel division method according to the pixel size of the original image.
In step 3, a key sequence and a speckle matrix of the encryption system are generated by setting a disturbance state, wherein the disturbance state includes but is not limited to interference in force, heat, light, electricity, magnetism and the like.
In step 4, image decryption is achieved using a position-dependent algorithm.
Drawings
In order to more clearly illustrate the technical solution of the present invention, the drawings required for the present invention will be briefly described as follows:
FIG. 1 is a schematic diagram of a fiber speckle encryption system.
Fig. 2 is a schematic diagram of transmission matrix generation.
Fig. 3 is a schematic flow chart of a speckle encryption and decryption technique based on a transmission matrix.
In the schematic diagram of the optical speckle encryption system of fig. 1: 1. laser 2, Spatial Light Modulator (SLM)3, beam splitter 4, CCD camera 5, scrambling device 6, MMF.
Detailed Description
The invention will be further explained with reference to the drawings and technical solutions.
1. Designing and building an optical fiber speckle encryption system experimental device.
Fig. 1 shows a schematic diagram of an optical path for implementing an optical fiber speckle encryption system, where the optical fiber speckle encryption system used in the present invention includes optical elements, which may include, but are not limited to: 1. laser 2, SLM3, beam splitter 4, CCD camera 5, scrambling device 6, MMF. Wherein the laser generates continuous light for converting the image into a recognizable light signal; the original image is input into the encryption system from the SLM, so that the original image from the computer is converted into an optical signal by an electric signal to be transmitted; the beam splitter at 3 reflects and refracts the beam according to a ratio of 1: 1 is divided into two beams, one beam irradiates on the CCD at the position of 4, and the other beam irradiates on the front end face of the optical fiber; the first (in left-to-right order) 4 CCD camera acquires image information at the MMF input; the scrambling device generates different scrambling states through disturbance (not limited to disturbance in force, heat, light, electricity, magnetism and the like) to change optical parameters (not limited to polarization, amplitude, frequency, orbital angular momentum and the like) of an output optical field; the last (in left-to-right order) 4 CCD cameras collect the speckle images (ciphertext) at the MMF output.
2. And generating a corresponding transmission matrix according to the pixel size of the original image.
Fig. 2 shows a schematic diagram of generating a transmission matrix of an n × n pixel size picture, and fig. 2 shows a schematic diagram of generating a transmission matrix of an n × n pixel size picture. Corresponding to the original picture of size n x n pixels is n x n pieces of transfer matrix data set of size n x n pixels. Each picture in the transmission matrix data set only has one pixel with a specific position with a value of 255 and the values of the other pixels are all 0, and the arrangement of the pixels with a pixel value of 255 in each picture in the data set is different according to a specific sequence. And inputting the transmission matrix data set generated after division into a speckle encryption system to generate a speckle pattern picture, wherein the speckle patterns form a transmission matrix of the picture with the specific pixel size.
3. Inputting an original image into an optical fiber speckle encryption system, setting a disturbance state to generate a corresponding key sequence and generate a speckle pattern, and completing image encryption.
The scrambling device switch is set to generate different scrambling states, so that optical parameters (not limited to polarization, amplitude, frequency, orbital angular momentum and the like) of the output light field are changed, and the finally generated speckle image (ciphertext) presents random change. Speckle, while having a seemingly random nature, is deterministic in an optical system consisting of an optical fiber and a fixed optical device. Each different combination of switches will produce a different key sequence, which will result in a different transmission matrix. The original image is input from the SLM, and the scrambling device is manually changed to generate different key sequences to correspondingly generate different transmission matrixes. The original image is encrypted by a scrambling device with a specific switch state, and finally an encrypted image is generated at the rear end of the MMF.
4. And carrying out numerical operation on the speckles and the transmission matrix of the key sequence corresponding to the speckles to decrypt the image.
And in the decryption process, the data is post-processed by the computer to realize decryption of the ciphertext. And performing numerical operation on the ciphertext generated by encryption and the transmission matrix of the specific key sequence, and sequentially calculating the correlation coefficient of the image matrix of the ciphertext to be decrypted and the transmission matrix to realize image decryption.
The Correlation coefficient (Correlation) is used to examine the degree of Correlation between two variables. The invention calculates the degree of correlation using the following formula based on the data characteristics of the transmission matrix and the ciphertext image.
The correlation coefficient calculation formula is as follows:
Figure RE-GSB0000200076240000031
wherein r represents a correlation coefficient of the signal,
Figure RE-GSB0000200076240000041
is the average value of the pixels of the matrix a,
Figure RE-GSB0000200076240000042
is the pixel average of the matrix B.
The larger the absolute value of the correlation coefficient is, the stronger the correlation between the transmission matrix and the ciphertext is, the closer the correlation coefficient is to 1 or-1, the stronger the correlation is, the closer the correlation coefficient is to 0, and the weaker the correlation is.

Claims (5)

1. A transmission matrix based speckle encryption technique, the method comprising the steps of:
step 1: designing and building an optical fiber speckle encryption system experimental device;
step 2: preprocessing an original image, and generating a corresponding transmission matrix according to the pixel size of the original image;
and step 3: the SLM loads and modulates the original image, sets a disturbance state to generate a corresponding key sequence and a speckle matrix, and completes image encryption;
and 4, step 4: and carrying out numerical operation on the speckles and the speckle matrix of the key sequence corresponding to the speckles to restore the image, and finishing image decryption.
2. The transmission matrix-based speckle encryption technique of claim 1, wherein: in step 1, the fiber speckle encryption system that implements the encryption of the original image in MMF includes, but is not limited to: 1. laser 2, Spatial Light Modulator (SLM)3, beam splitter 4, CCD camera 5, scrambling device 6, MMF.
3. The transmission matrix-based speckle encryption technique of claim 1, wherein: in step 2, a transmission matrix data set is generated using an n × n pixel division method according to the pixel size of the original image.
4. The transmission matrix-based speckle encryption technique of claim 1, wherein: in step 3, a key sequence and a speckle matrix of the encryption system are generated by setting a disturbance state, wherein the disturbance state includes but is not limited to interference in force, heat, light, electricity, magnetism and the like.
5. The transmission matrix-based speckle encryption technique of claim 1, wherein: image decryption is achieved in step 4 using a position dependent algorithm.
CN202210573222.7A 2022-05-25 2022-05-25 Speckle encryption and decryption technology based on transmission matrix Pending CN115102690A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210573222.7A CN115102690A (en) 2022-05-25 2022-05-25 Speckle encryption and decryption technology based on transmission matrix

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210573222.7A CN115102690A (en) 2022-05-25 2022-05-25 Speckle encryption and decryption technology based on transmission matrix

Publications (1)

Publication Number Publication Date
CN115102690A true CN115102690A (en) 2022-09-23

Family

ID=83288024

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210573222.7A Pending CN115102690A (en) 2022-05-25 2022-05-25 Speckle encryption and decryption technology based on transmission matrix

Country Status (1)

Country Link
CN (1) CN115102690A (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113762460A (en) * 2021-04-01 2021-12-07 天津理工大学 Multimode optical fiber transmission image migration and reconstruction algorithm based on numerical speckle
CN113785187A (en) * 2019-03-22 2021-12-10 贝克顿·迪金森公司 Spectral unmixing for fluorescence imaging using radio frequency multiplexed excitation data

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113785187A (en) * 2019-03-22 2021-12-10 贝克顿·迪金森公司 Spectral unmixing for fluorescence imaging using radio frequency multiplexed excitation data
CN113762460A (en) * 2021-04-01 2021-12-07 天津理工大学 Multimode optical fiber transmission image migration and reconstruction algorithm based on numerical speckle

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
朱磊;邵晓鹏;: "散射成像技术的研究进展", 光学学报, no. 01 *
王玲;: "混沌理论应用于数字档案图像安全探析", 兰台世界, no. 09, 6 September 2020 (2020-09-06) *
胡耀华: "基于多模光纤散斑的压缩感知 在光学图像加密中的应用", 《物理学报》, 31 December 2020 (2020-12-31), pages 034203 - 1 *

Similar Documents

Publication Publication Date Title
Chen et al. Color image encryption based on the affine transform and gyrator transform
Qu et al. Optical color image encryption based on Hadamard single-pixel imaging and Arnold transformation
Verma et al. An optical asymmetric encryption scheme with biometric keys
Abuturab Securing color information using Arnold transform in gyrator transform domain
Wang Optical image encryption with silhouette removal based on interference and phase blend processing
Liu et al. Optical color image hiding scheme based on chaotic mapping and Hartley transform
Xie et al. Exploiting optics chaos for image encryption-then-transmission
Singh Nonlinear optical double image encryption using random-optical vortex in fractional Hartley transform domain
Huo et al. Image encryption using exclusive-OR with DNA complementary rules and double random phase encoding
CN106791266B (en) Color image encryption transmission method and system based on optical chaos
CN101242265A (en) Stream password and pseudorandom number generation method in secure system
Chen et al. Optical single-channel color image asymmetric cryptosystem based on hyperchaotic system and random modulus decomposition in Gyrator domains
Abdelfattah et al. Compact optical asymmetric cryptosystem based on unequal modulus decomposition of multiple color images
Xiong et al. Security analysis on an optical encryption and authentication scheme based on phase-truncation and phase-retrieval algorithm
Abuturab Securing multiple information using chaotic spiral phase encoding with simultaneous interference and superposition methods
Faragallah Optical double color image encryption scheme in the Fresnel-based Hartley domain using Arnold transform and chaotic logistic adjusted sine phase masks
Khurana et al. A spiral-phase rear mounted triple masking for secure optical image encryption based on gyrator transform
Yang et al. Securing color image by using bit-level modified integer nonlinear coupled chaos model in Fresnel diffraction domains
Abdelfattah et al. Optical cryptosystem for visually meaningful encrypted images based on gyrator transform and Hénon map
Liu et al. Optical multilevel authentication based on singular value decomposition ghost imaging and secret sharing cryptography
Dou et al. Security-enhanced optical nonlinear cryptosystem based on double random phase encoding
Wang et al. Asymmetric cryptosystem using improved equal modulus decomposition in cylindrical diffraction domain
Lu et al. Experimental optical secret sharing via an iterative phase retrieval algorithm
Li et al. A one-time pad encryption method combining full-phase image encryption and hiding
Wang et al. Security enhancement of image encryption method based on Fresnel diffraction with chaotic phase

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination