CN115314602B - Multi-image encryption method based on image scaling and associated imaging - Google Patents

Multi-image encryption method based on image scaling and associated imaging Download PDF

Info

Publication number
CN115314602B
CN115314602B CN202210921755.XA CN202210921755A CN115314602B CN 115314602 B CN115314602 B CN 115314602B CN 202210921755 A CN202210921755 A CN 202210921755A CN 115314602 B CN115314602 B CN 115314602B
Authority
CN
China
Prior art keywords
image
ciphertext
stage
camouflage
images
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210921755.XA
Other languages
Chinese (zh)
Other versions
CN115314602A (en
Inventor
张雷洪
苏亚慧
徐润初
张大伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Shanghai for Science and Technology
Original Assignee
University of Shanghai for Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Shanghai for Science and Technology filed Critical University of Shanghai for Science and Technology
Priority to CN202210921755.XA priority Critical patent/CN115314602B/en
Publication of CN115314602A publication Critical patent/CN115314602A/en
Application granted granted Critical
Publication of CN115314602B publication Critical patent/CN115314602B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T3/00Geometric image transformation in the plane of the image
    • G06T3/40Scaling the whole image or part thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Abstract

The invention discloses a multi-image encryption method based on image scaling and associated imaging, which comprises the following steps: s1, primarily encrypting a single plaintext image through an image scaling algorithm; s2, repeating the operation on each plaintext image to obtain a plurality of camouflage first-stage ciphertext images; s3, modulating one of the ciphertext images in the step S1 by a series of random modes to obtain a series of barrel detector values, and obtaining a final ciphertext; s4, using the ciphertext as a constraint to generate a modulation pattern of the ciphertext image, wherein the modulation pattern is used as a second stage key of the corresponding image; s5, each pixel point in the camouflage image is corresponding to the specific weight, the kernel size and a series of modulation modes of each image, and the specific weight, the kernel size and the series of modulation modes are used as keys to be transmitted to a receiving party to finish encryption. According to the invention, the method has good security, can resist attacks such as noise and clipping, has good encryption capacity, and solves the potential risk of sharing the public key.

Description

Multi-image encryption method based on image scaling and associated imaging
Technical Field
The invention relates to the technical field of image encryption, in particular to a multi-image encryption method based on image scaling and associated imaging.
Background
With the development of global economy and informatization, information exchange is more frequent, and demands of people for information transmission and processing in daily life are continuously improved. In order to ensure the safety, the authenticity and the integrity of the information, the information safety technology is continuously expanded and deepened along with the development of the information technology, and plays an indispensable role in the aspects of personal information safety, enterprise development, national safety, social stability and the like. Conventional information security technologies are mainly implemented by means of computers or digital signal processors, but these means are limited by processing speed, so that a rapid and safe means is urgently needed as a supplement and replacement. Optical information security technology has received a great deal of attention as an emerging technology means in recent years. The optical information security technology uses light as the carrier of information, has the characteristics of high speed and parallelism, has short wavelength of light and large information capacity, and can realize information hiding in multiple dimensions (such as wavelength, amplitude, phase, orbital angular momentum and the like).
The image is used as an information carrier, has the advantages of large information transmission quantity, concrete, vivid image and the like, the time-varying signal can show the fluctuation of information in time, the amplitude and the frequency can represent different contents, and compared with the image, the image has more real-time performance, and is an important form of optical information security technology. With the increasing demands of people for information security, optical information security technology is favored by researchers due to the advantages of high speed, large capacity and the like.
Disclosure of Invention
Aiming at the defects existing in the prior art, the invention aims to provide a multi-image encryption method based on image scaling and associated imaging, which not only has better security, but also can resist attacks such as noise, clipping and the like, has better encryption capacity, and solves the potential risk of sharing public keys. To achieve the above objects and other advantages and in accordance with the purpose of the invention, there is provided a multi-image encryption method based on image scaling and associated imaging, comprising:
s1, primarily encrypting a single plaintext image through an image scaling algorithm;
s2, repeating the operation on each plaintext image to obtain a plurality of camouflage first-stage ciphertext images; in the step S1, n plaintext images are hidden in n camouflage images through an image scaling algorithm to obtain n ciphertext images, and each pixel point in the camouflage images corresponds to a specific weight and kernel size and is stored as a first stage key;
s3, modulating one of the ciphertext images in the step S2 by using a series of random modes to obtain a series of barrel detector values, and obtaining a final ciphertext;
s4, generating a modulation pattern of the first-stage ciphertext image by using the final ciphertext as a constraint, wherein a mode corresponding to the modulation pattern is used as a second-stage key of the corresponding image;
s5, the first-stage ciphertext and the second-stage secret key are transmitted to the receiver as secret keys to complete encryption.
Preferably, in step S3, a series of random patterns K 1 For encrypting a single ciphertext image T obtained by a first stage encryption, a series of bucket detector values D are obtained and stored as ciphertext for transmission and storage.
Preferably, a proper scaling step length is set according to the characteristics of the source image and the plaintext image, plaintext information is embedded into the camouflage image, and simultaneously, the dimension of the plaintext image is changed along with the process of embedding the plaintext image, so that the hiding of the plaintext image information and the dimension change of the plaintext image are realized.
Preferably, after the associated imaging encryption, the modulation mode of the ciphertext image of the first stage is obtained through iteration according to the generated final ciphertext, so that one code and one key are realized.
Preferably, each image has a main public key and an auxiliary private key, and different keys can be sent to different authorized users, so that the potential risk of sharing the public key is solved.
Multiple images are encrypted, the encryption capacity is large, the transmission efficiency is high, and the information quantity is rich. The method provides a multi-image encryption method based on phase iteration and associated imaging. In the encryption system, the encryption capacity of the system is increased, and the security of the encryption system is ensured. Firstly, realizing disguised encryption through image scaling; secondly, the ciphertext is convenient to transmit and store by using the associated imaging; finally, generating a modulation mode of the image through an iterative algorithm, so that plaintext is associated with ciphertext, and the encryption capacity of the system is ensured. The method is verified from three aspects of feasibility, safety and robustness through simulation experiments, and experimental results show that the method is safe, effective and good in encryption performance.
Compared with the prior art, the invention has the beneficial effects that: by means of the image scaling algorithm,
(1) Firstly hiding a plaintext image into a camouflage image according to a specific weight and kernel size by utilizing an image scaling algorithm, so as to realize the hiding of plaintext image information and the change of the dimension of the plaintext image.
(2) One of the ciphertext images in the first stage is modulated by a series of random modes to obtain a series of barrel detector values, and the barrel detector values are obtained to serve as final ciphertext, so that the ciphertext is convenient to transmit and store.
(3) Generating a modulation pattern of the ciphertext image by taking the ciphertext as a constraint; the plaintext and the ciphertext are related, so that a code-key is realized, each image has a main public key and an auxiliary private key, the potential risk of sharing the public key is solved, and the safety, the authenticity and the integrity of the image information are ensured.
Drawings
FIG. 1 is an image scaling encryption flow for a multi-image encryption method based on image scaling and associated imaging in accordance with the present invention;
FIG. 2 is a decryption flow of associated imaging based on a multi-image encryption method of image scaling and associated imaging in accordance with the present invention;
FIG. 3 is a simplified flow chart of image scaling and associated imaging encryption and decryption according to the image scaling and associated imaging based multi-image encryption method of the present invention;
FIG. 4 is an encryption flow chart of image scaling and associated imaging based multi-image encryption method of image scaling and associated imaging in accordance with the present invention;
fig. 5 is a decryption flow chart of image scaling and associated imaging based on the image scaling and associated imaging multi-image encryption method of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1-5, a multi-image encryption method based on image scaling and associated imaging, comprising:
s1, primarily encrypting a single plaintext image through an image scaling algorithm;
s2, repeating the operation on each plaintext image to obtain a plurality of camouflage first-stage ciphertext images; in the step S1, n plaintext images are hidden in n camouflage images through an image scaling algorithm to obtain n ciphertext images, and each pixel point in the camouflage images corresponds to a specific weight and kernel size and is stored as a first stage key;
s3, modulating one of the ciphertext images in the step S2 by using a series of random modes to obtain a series of barrel detector values, and obtaining a final ciphertext;
s4, generating a modulation pattern of the first-stage ciphertext image by using the final ciphertext as a constraint, wherein a mode corresponding to the modulation pattern is used as a second-stage key of the corresponding image;
s5, the first-stage ciphertext and the second-stage secret key are transmitted to the receiver as secret keys to complete encryption.
In the proposed encryption system, not only the security of the encryption system is ensured, but also the plaintext and the ciphertext are associated, and the encryption capacity of the encryption system is improved. Firstly, plain text image information is inserted on one or a plurality of pixel points of a camouflage image by using an image scaling algorithm according to different weights, and the pixel point position and the weight of the camouflage image corresponding to each pixel point of the plain text image are stored as a first key, so that the hiding of the plain text image information and the change of the dimension of the plain text image are realized; then encrypting one of the camouflage character images by using a series of illumination speckles generated by the coherent light modulator to obtain a series of barrel detector values as ciphertext, so that the ciphertext is convenient to transmit and store; the rest camouflage images take the ciphertext as constraint conditions to generate respective modulation modes, and the modulation modes are taken as respective secret keys, so that the whole encryption process is completed, the plaintext and the ciphertext are related, one code and one key are realized, each image has a main public key and an auxiliary private key, the potential risk of sharing the public key is solved, and the safety, the authenticity and the integrity of image information are ensured.
Further, in step S3, a series of random patterns K 1 For encrypting a single ciphertext image T obtained by a first stage encryption, a series of bucket detector values D are obtained and stored as ciphertext.
Further, a proper scaling step length is set according to the characteristics of the source image and the plaintext image, plaintext information is embedded into the camouflage image, and the dimension of the plaintext image is changed along with the process of embedding the plaintext image into the camouflage image.
Furthermore, after the associated imaging encryption, the modulation mode of the ciphertext image of the first stage is obtained through iteration according to the generated final ciphertext, so that one code and one key are realized.
Further, each image has a primary public key and a secondary private key, and different keys may be sent to different authorized users.
Example 1
Step S1, hiding image information into n camouflage images through an image scaling algorithm by the n Zhang Mingwen images to obtain n ciphertext images. Each pixel point in the camouflage image corresponds to a specific weight and kernel size, and the specific weight and kernel size are stored as a first-stage key;
step S2, a series of random patterns K 1 For encrypting a single ciphertext image T obtained by a first stage encryption, obtaining a series of bucket detector values D that are stored as ciphertext;
step S3, using the ciphertext as a constraint to generate a modulation pattern of the ciphertext image; these modulation patterns are used as second phase keys for the respective images. The method comprises the steps of carrying out a first treatment on the surface of the
And S4, transmitting each pixel point in the n camouflage images with specific weight, kernel size and a series of modulation modes to a receiver to complete encryption.
Decryption flow:
step S1, a receiver can obtain different camouflage images from the received ciphertext and the secret key, and the decryption method is shown in the formula:
T CS (x,y)=<B i I i (x,y)>-<B i ><I i (x,y)>
step S2, after obtaining the camouflage image, a decryptor decrypts the corresponding plaintext image according to the kernel and the weight in the scaling algorithm, wherein the decryption method is as follows:
d p =(s*w)(g(p)),p=0,1,...,n'
in summary, in the encryption system, the encryption capacity is increased, and the security of the encryption system is ensured. Firstly, realizing disguised encryption by utilizing image scaling; secondly, compressed sensing associated imaging is utilized, so that the transmission quantity of ciphertext is reduced; finally, the modulation modes of different images are generated through an iterative algorithm to serve as the second-stage image encryption key, so that one code and one key are realized, and the safety of the whole encryption system is further improved. The encryption system not only has good security, but also can resist attacks such as noise and clipping, and has good encryption capacity, more importantly, each image has a main public key and an auxiliary private key by the method disclosed by the invention, and the potential risk of sharing the public key is solved.
To sum up: the invention provides a multi-image optical password system based on image scaling attack and associated imaging. Compared with other multi-image optical encryption schemes, the method mainly comprises the steps of performing disguised encryption on plaintext images to be encrypted by using an image scaling algorithm, and constructing different keys to achieve encryption transmission of the multi-images after disguising. In the encryption process, the plaintext image is moved over the camouflage image by the filter, and the plaintext image information is inserted at one or more pixels of the camouflage image with different weights. The pixel point position and the weight of the camouflage image corresponding to each pixel point of the plaintext image are stored as the key at the stage; and selecting an image from the camouflage encrypted image, and encrypting the single selected plaintext image by using a series of illumination speckles generated by the coherent light modulator to obtain a series of barrel detector values as ciphertext. The remaining images are subject to ciphertext constraints, and modulation patterns of the different images are generated and stored as respective keys. In the decryption process, the receiver decrypts the ciphertext by using the corresponding key to obtain different images. In the scheme, the size of each image is changed before and after encryption, the images are camouflaged and encrypted, the secret key is related to the images, and the problem of aliasing of decryption information can be solved while various attack modes are effectively resisted. Simulations and experiments indicate the effectiveness, safety and robustness of this scheme. The scheme provides a new concept for encryption and information processing of the optical image.
The number of devices and the scale of processing described herein are intended to simplify the description of the invention, and applications, modifications and variations of the invention will be apparent to those skilled in the art.
Although embodiments of the present invention have been disclosed above, it is not limited to the details and embodiments shown and described, it is well suited to various fields of use for which the invention would be readily apparent to those skilled in the art, and accordingly, the invention is not limited to the specific details and illustrations shown and described herein, without departing from the general concepts defined in the claims and their equivalents.

Claims (5)

1. A multi-image encryption method based on image scaling and associated imaging, comprising the steps of:
s1, primarily encrypting a single plaintext image through an image scaling algorithm;
s2, repeating the operation on each plaintext image to obtain a plurality of camouflage first-stage ciphertext images; in the steps S1-S2, the image information is hidden into n camouflage images through an image scaling algorithm to obtain n ciphertext images, each pixel point in the camouflage images corresponds to a specific weight and kernel size, and the n ciphertext images are stored as a first stage key;
s3, modulating one of the ciphertext images in the step S2 by a series of random modes to obtain a series of barrel detector values as a final ciphertext;
s4, generating a modulation pattern of the first-stage ciphertext image by using the final ciphertext as a constraint, wherein a modulation mode corresponding to the modulation pattern is used as a second-stage key of the corresponding image;
s5, the first-stage secret key and the second-stage secret key are used as secret keys to be transmitted to a receiving party to complete encryption.
2. The multi-image encryption method based on image scaling and associated imaging as claimed in claim 1, wherein in step S3 a series of random patterns K 1 For encrypting a single ciphertext image T obtained by a first stage encryption, a series of bucket detector values D are obtained and stored as ciphertext.
3. A multi-image encryption method based on image scaling and associated imaging as claimed in claim 1, wherein a suitable scaling step is set according to the features of the camouflage image and the plaintext image, the plaintext image is embedded in the camouflage image, and the dimension of the plaintext image is changed with the embedding process of the camouflage image.
4. A multi-image encryption method based on image scaling and associated imaging as claimed in claim 3, wherein the modulation mode of the first stage ciphertext image is obtained by iteration based on the final ciphertext generated after the associated imaging is encrypted.
5. A multi-image encryption method based on image scaling and associated imaging as claimed in claim 4, wherein each image has a primary public key and a secondary private key, different keys being sent to different authorized users.
CN202210921755.XA 2022-08-02 2022-08-02 Multi-image encryption method based on image scaling and associated imaging Active CN115314602B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210921755.XA CN115314602B (en) 2022-08-02 2022-08-02 Multi-image encryption method based on image scaling and associated imaging

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210921755.XA CN115314602B (en) 2022-08-02 2022-08-02 Multi-image encryption method based on image scaling and associated imaging

Publications (2)

Publication Number Publication Date
CN115314602A CN115314602A (en) 2022-11-08
CN115314602B true CN115314602B (en) 2023-05-09

Family

ID=83859103

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210921755.XA Active CN115314602B (en) 2022-08-02 2022-08-02 Multi-image encryption method based on image scaling and associated imaging

Country Status (1)

Country Link
CN (1) CN115314602B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107563949A (en) * 2017-08-31 2018-01-09 湖北工程学院 Image guard method and device, image restoring method and device
CN107564074A (en) * 2017-09-12 2018-01-09 山东大学 Optical image encryption method based on the imaging of row multiplexed compressed ghost with XOR
CN107835333A (en) * 2017-11-21 2018-03-23 上海理工大学 More image encryption methods based on compressed sensing relevance imaging
CN110766596A (en) * 2019-10-21 2020-02-07 上海理工大学 Optical encryption method based on correlated imaging
CN111738897A (en) * 2020-05-29 2020-10-02 南京航空航天大学 Multi-image multi-encryption method based on speckle decorrelation
CN114708341A (en) * 2021-12-21 2022-07-05 上海理工大学 Fresnel domain algorithm and multiplexing and multi-image encryption method for associated imaging

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107563949A (en) * 2017-08-31 2018-01-09 湖北工程学院 Image guard method and device, image restoring method and device
CN107564074A (en) * 2017-09-12 2018-01-09 山东大学 Optical image encryption method based on the imaging of row multiplexed compressed ghost with XOR
CN107835333A (en) * 2017-11-21 2018-03-23 上海理工大学 More image encryption methods based on compressed sensing relevance imaging
CN110766596A (en) * 2019-10-21 2020-02-07 上海理工大学 Optical encryption method based on correlated imaging
CN111738897A (en) * 2020-05-29 2020-10-02 南京航空航天大学 Multi-image multi-encryption method based on speckle decorrelation
CN114708341A (en) * 2021-12-21 2022-07-05 上海理工大学 Fresnel domain algorithm and multiplexing and multi-image encryption method for associated imaging

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Multiple-Image Encryption Mechanism Based on Ghost Imaging and Public Key Cryptography;L. Zhang等;《 IEEE Photonics Journal》;第11卷(第4期);1-14 *
Study on the Key Technology of Image Transmission Mechanism Based on Channel Coding Ghost Imaging;L. Zhang等;《IEEE Photonics Journal,》;第10卷(第4期);1-13 *
基于QR码的多图像关联成像算法光学加密机理研究;张雷洪等;《包装工程》;第39卷(第17期);228-235 *

Also Published As

Publication number Publication date
CN115314602A (en) 2022-11-08

Similar Documents

Publication Publication Date Title
Patel et al. Image encryption using different techniques: A review
Tsai et al. Sharing multiple secrets in digital images
Yousif et al. A new image encryption based on bit replacing, chaos and DNA coding techniques
Girdhar et al. A novel grayscale image encryption approach based on chaotic maps and image blocks
Chen et al. Security enhancement of double random phase encoding using rear-mounted phase masking
Iqbal et al. DNA strands level scrambling based color image encryption scheme
Nashat et al. An efficient steganographic technique for hiding data
Man et al. A novel image encryption algorithm based on least squares generative adversarial network random number generator
CN104881838B (en) One kind is based on GF (23) (K, N) significant point deposited without expansion image and reconstructing method
Wang et al. Cross-plane multi-image encryption using chaos and blurred pixels
Farschi et al. A novel chaotic approach for information hiding in image
Abdul-Hussein et al. Secured Transfer and Storage Image Data for Cloud Communications.
Alzubi et al. A novel chaotic map encryption methodology for image cryptography and secret communication with steganography
Guo et al. Improved reverse zigzag transform and DNA diffusion chaotic image encryption method
Dong et al. Self-adaptive image encryption algorithm based on quantum logistic map
CN101582170B (en) Remote sensing image encryption method based on elliptic curve cryptosystem
CN115314602B (en) Multi-image encryption method based on image scaling and associated imaging
Al-Husainy et al. Image encryption technique based on the entropy value of a random block
Aparna et al. Combined image encryption and steganography technique for enhanced security using multiple chaotic maps
CN115765963A (en) Text image audit information recording and extracting method based on reversible steganography of ciphertext domain
MEHDI A novel steganography method based on 4 dominations standard chaotic map in spatial domain
Jassbi et al. A new method for image encryption using chaotic permutation
Fadhil et al. Visual Cryptography Techniques: Short Survey
Yadav et al. Hybrid image encryption technique to improve the security level by using (n, k, p) gray code and xor operation
Shang et al. Research on a double image security transmission algorithm of image encryption and hiding

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant