CN116389651A - A secure image transmission method based on ACO-OFDM visible light communication - Google Patents

A secure image transmission method based on ACO-OFDM visible light communication Download PDF

Info

Publication number
CN116389651A
CN116389651A CN202310453091.3A CN202310453091A CN116389651A CN 116389651 A CN116389651 A CN 116389651A CN 202310453091 A CN202310453091 A CN 202310453091A CN 116389651 A CN116389651 A CN 116389651A
Authority
CN
China
Prior art keywords
aco
encrypted
image
ofdm
chaotic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310453091.3A
Other languages
Chinese (zh)
Inventor
贾鑫雨
席思星
于娜娜
王晓雷
朗利影
岳苏航
朱巧芬
张雷
韩海燕
刘秀红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hebei University of Engineering
Original Assignee
Hebei University of Engineering
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hebei University of Engineering filed Critical Hebei University of Engineering
Priority to CN202310453091.3A priority Critical patent/CN116389651A/en
Publication of CN116389651A publication Critical patent/CN116389651A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B10/00Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
    • H04B10/11Arrangements specific to free-space transmission, i.e. transmission through air or vacuum
    • H04B10/114Indoor or close-range type systems
    • H04B10/116Visible light communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Optical Communication System (AREA)

Abstract

The invention discloses an ACO-OFDM visible light communication-based image safety transmission method, which is characterized by comprising the following steps of: the encryption is combined with the physical layer at the upper layer of the ACO-OFDM system. The specific process is as follows: encrypting an original image on the upper layer of the ACO-OFDM system based on a Fresnel diffraction double random phase encryption technology, and performing code conversion to obtain a calculation hologram; and then, mixing the SHA-256 values of the original image with an external key to determine initial values of two-dimensional hyperchaotic systems, generating four chaotic sequences, carrying out bit exclusive OR on odd bits and even bits of the transmitted binary bit stream by using the two sequences, carrying out chaotic scrambling on real parts and imaginary parts of the QAM symbol stream by using the other two sequences, and realizing encryption of a physical layer. The invention adopts the upper layer and physical layer of ACO-OFDM system to encrypt, further enhances the security of image transmission. In addition, the upper layer encrypts and converts the original image into a binary real-value calculation hologram, so that the anti-noise performance of the ACO-OFDM system is improved. The invention is suitable for the safe transmission of the image data between the visible light receiving and transmitting devices.

Description

一种基于ACO-OFDM可见光通信的图像安全传输方法A secure image transmission method based on ACO-OFDM visible light communication

技术领域technical field

本发明涉及可见光通信和图像传输领域,具体而言,尤其涉及一种基于ACO-OFDM可见光通信的图像安全传输方法。The present invention relates to the field of visible light communication and image transmission, in particular, to an image security transmission method based on ACO-OFDM visible light communication.

背景技术Background technique

目前无线网络中的信息传输是通过在无线电频段运行的技术完成的,例如:Wi-Fi、蓝牙、NFC、蜂窝网络、卫星网络等,这些技术中的每一个都有其自身的性能特征,并根据应用程序类型使用。然而,随着物联网(Internet ofThings,IoT)和工业4.0的兴起,连接到网络的应用程序和设备的数量每天都在增加,因此对无线接入、容量和安全性的要求呈指数增长,大量信息需要新技术来支持宽带服务并适应现有流量。Information transmission in current wireless networks is done by technologies operating in the radio frequency band, such as: Wi-Fi, Bluetooth, NFC, cellular networks, satellite networks, etc., each of these technologies has its own performance characteristics, and Use according to application type. However, with the rise of the Internet of Things (IoT) and Industry 4.0, the number of applications and devices connected to the network is increasing every day, so the requirements for wireless access, capacity and security are increasing exponentially, and large amounts of information New technologies are needed to support broadband services and accommodate existing traffic.

为了解决上述问题和无线电频谱的严重拥塞,研究人员开发了一种称为可见光通信(Visible Light Communication,VLC)的新技术,它利用可见光波段进行数据传输,具有频谱资源丰富、无电磁污染、安全性高等优点。此外,可见光通信是用目前使用最为广泛的LED作为发射源,兼具照明与通信,这使其被认为是未来通信具有巨大潜力的技术。In order to solve the above problems and the severe congestion of the radio spectrum, researchers have developed a new technology called Visible Light Communication (VLC), which uses the visible light band for data transmission, and has the advantages of rich spectrum resources, no electromagnetic pollution, and safe Advantages of high sex. In addition, visible light communication uses the most widely used LED as the emission source, which combines lighting and communication, which makes it considered a technology with great potential for future communication.

为了保证高数据速率传输并降低实现复杂度,VLC可以借鉴射频的正交频分复用(Orthogonal Frequency Division Multiplexing,OFDM)多载波调制方案。OFDM的显著特点是利用计算高效、简单的一维频域均衡技术,将通信信道的频率选择性衰落转化为平坦衰落信道。此外,OFDM保证高数据速率通信的同时能够有效地利用频谱资源。OFDM多载波调制格式在基于射频的无线通信情况下调制载波信号的幅度和相位信息。可见光通信链路利用LED来实现,而LED产生非相干光的事实使OFDM时域信号可以调制光源的强度,而人眼无法察觉。因此,VLC通常采用强度调制/直接检测(Intensity modulation/directdetection,IM/DD)这一特殊的调制解调格式,这迫使OFDM时域信号在本质上既是实值的又是单极的(即,正极的)。因此,为了获得实值信号,对IFFT模块的输入帧结构进行厄尔米特对称性约束,使IFFT输出的时域信号保证其实值性质。为了产生正信号,人们提出了多种光OFDM技术,如直流偏置光OFDM(DCO-OFDM)、非对称限幅光OFDM(ACO-OFDM)、翻转OFDM(Flip-OFDM)等等。OFDM的每一种变体在频谱效率、功率效率、计算复杂度和误码率性能等方面都有一定的权衡。基于ACO-OFDM的VLC是VLC应用的潜在候选解决方案,在不失通用性的前提下,本发明基于ACO-OFDM的VLC系统。In order to ensure high data rate transmission and reduce implementation complexity, VLC can learn from the Orthogonal Frequency Division Multiplexing (OFDM) multi-carrier modulation scheme of radio frequency. The salient feature of OFDM is to convert the frequency-selective fading of the communication channel into a flat fading channel by using a computationally efficient and simple one-dimensional frequency domain equalization technique. In addition, OFDM can effectively utilize spectrum resources while ensuring high data rate communication. The OFDM multicarrier modulation format modulates the amplitude and phase information of a carrier signal in the case of radio frequency based wireless communications. Visible light communication links are implemented using LEDs, and the fact that LEDs produce incoherent light allows OFDM time-domain signals to modulate the intensity of the light source without being perceived by the human eye. Therefore, VLC usually adopts a special modulation and demodulation format of intensity modulation/direct detection (IM/DD), which forces the OFDM time-domain signal to be both real-valued and unipolar in nature (i.e., positive). Therefore, in order to obtain a real-valued signal, the Hermitian symmetry constraint is imposed on the input frame structure of the IFFT module, so that the time-domain signal output by the IFFT can guarantee its real-valued property. In order to generate positive signals, various optical OFDM technologies have been proposed, such as DC offset optical OFDM (DCO-OFDM), asymmetrically limited optical OFDM (ACO-OFDM), flipped OFDM (Flip-OFDM) and so on. Each variant of OFDM has certain tradeoffs in terms of spectral efficiency, power efficiency, computational complexity, and bit error rate performance. The VLC based on ACO-OFDM is a potential candidate solution for VLC application. On the premise of not losing the generality, the present invention provides the VLC system based on ACO-OFDM.

随着大数据时代的到来,图像在数据传输中扮演着越来越重要的角色。然而,在图像传输过程中,保障图像的安全性也显得尤为重要。在图像传输过程中,如果没有良好的安全措施,黑客或者恶意攻击者可以轻松获取图像中的重要信息,从而导致数据泄露。这不仅会对企业或个人的利益造成损失,同时也会影响企业或个人在市场中的形象和声誉。With the advent of the era of big data, images play an increasingly important role in data transmission. However, in the image transmission process, it is particularly important to ensure the security of the image. In the process of image transmission, if there are no good security measures, hackers or malicious attackers can easily obtain important information in the image, resulting in data leakage. This will not only cause losses to the interests of enterprises or individuals, but also affect the image and reputation of enterprises or individuals in the market.

综上,有必要对基于ACO-OFDM可见光通信系统的图像传输加以必要保护,保证信息安全。To sum up, it is necessary to protect the image transmission based on the ACO-OFDM visible light communication system to ensure information security.

发明内容Contents of the invention

本发明的目的在于,提供一种基于ACO-OFDM可见光通信的图像安全传输方法。The purpose of the present invention is to provide an image security transmission method based on ACO-OFDM visible light communication.

本发明是一种基于ACO-OFDM可见光通信的图像安全传输方法,包括以下步骤:The present invention is an image security transmission method based on ACO-OFDM visible light communication, comprising the following steps:

发送端:sender:

步骤(1)基于菲涅耳衍射系统双随机相位加密技术对原始图像进行加密,并编码转换成二元实值计算全息图;Step (1) Encrypt the original image based on the double random phase encryption technology of the Fresnel diffraction system, and encode and convert it into a binary real-valued computational hologram;

步骤(2)由原始图像的SHA-256值与外部密钥混合确定两个二维超混沌系统的初始值,产生四个混沌序列,用于二进制比特流以及QAM符号流的加密;Step (2) determines the initial value of two two-dimensional hyperchaotic systems by mixing the SHA-256 value of the original image with the external key, produces four chaotic sequences, and is used for the encryption of the binary bit stream and the QAM symbol stream;

步骤(3)将二元实值计算全息图并串转换为二进制比特流,应用四个混沌序列中的两个对二进制比特流的奇数位与偶数位分别进行比特异或,得到加密的二进制比特流;Step (3) The binary real-valued calculation hologram is converted into a binary bit stream in parallel, and two of the four chaotic sequences are used to perform bit XOR on the odd and even bits of the binary bit stream to obtain encrypted binary bits flow;

步骤(4)对加密的二进制比特流进行m-QAM正交幅度调制得到QAM符号流,应用四个混沌序列中的另外两个对QAM符号流的实部与虚部分别混沌置乱,得到加密的QAM符号流;Step (4) Carry out m-QAM quadrature amplitude modulation to the encrypted binary bit stream to obtain the QAM symbol stream, apply the other two of the four chaotic sequences to chaotically scramble the real and imaginary parts of the QAM symbol stream respectively, and obtain the encrypted The QAM symbol stream;

步骤(5)将加密后的QAM符号流进行串并转换以及厄尔米特映射,根据ACO-OFDM数据特征要求构成ACO-OFDM信号矩阵,再对ACO-OFDM信号矩阵进行逆快速傅里叶变换IFFT,生成实值的时域ACO-OFDM信号;Step (5) Perform serial-to-parallel conversion and Hermitian mapping on the encrypted QAM symbol stream, form an ACO-OFDM signal matrix according to the ACO-OFDM data characteristic requirements, and then perform inverse fast Fourier transform on the ACO-OFDM signal matrix IFFT, generating real-valued time-domain ACO-OFDM signals;

步骤(6)将时域ACO-OFDM信号依次进行添加循环前缀CP、并串转换、裁剪限幅削负波处理后,经数模转换加载到LED上,通过可见光进行发送,所发出的可见光信号通过空间信道传播到接收端;Step (6) The time-domain ACO-OFDM signal is sequentially processed by adding cyclic prefix CP, parallel-to-serial conversion, clipping, clipping and clipping, and loading it on the LED through digital-to-analog conversion, and sending it through visible light. Propagate to the receiving end through the spatial channel;

接收端:Receiving end:

步骤(1)接收端光电检测器PD将接收到的光信号转换为电信号,再依次进行模数转换、串并转换、去除循环前缀CP,得到接收的时域ACO-OFDM信号;Step (1) The photodetector PD at the receiving end converts the received optical signal into an electrical signal, and then sequentially performs analog-to-digital conversion, serial-to-parallel conversion, and removes the cyclic prefix CP to obtain the received time-domain ACO-OFDM signal;

步骤(2)对接收的时域ACO-OFDM信号依次进行快速傅里叶变换FFT、反厄尔米特对称变换、并串转换,得到加密QAM符号流;Step (2) performing fast Fourier transform FFT, anti-Hermitian symmetric transform, and parallel-serial conversion to the received time-domain ACO-OFDM signal successively to obtain an encrypted QAM symbol stream;

步骤(3)采用发送端相同的混沌序列密钥对接收到的加密QAM符号流解密;Step (3) adopts the same chaotic sequence key of the sending end to decrypt the encrypted QAM symbol stream received;

步骤(4)对解密后的QAM符号流进行解调得到加密二进制比特流,再采用与发送端相同的混沌序列密钥进行解密,之后串并转换为加密的二元实值计算全息图;Step (4) Demodulate the decrypted QAM symbol stream to obtain an encrypted binary bit stream, then use the same chaotic sequence key as the sender to decrypt, and then serially convert it into an encrypted binary real-valued calculation hologram;

步骤(5)基于菲涅耳衍射系统双随机相位解密技术对加密的二元实值计算全息图进行解密,得到原始图像。Step (5) Decrypt the encrypted binary real-valued calculation hologram based on the double random phase decryption technology of the Fresnel diffraction system to obtain the original image.

与现有技术相比,本发明具有以下优点:Compared with the prior art, the present invention has the following advantages:

本发明提出了一种基于ACO-OFDM可见光通信系统的上层和物理层联合加密的图像安全传输方法,实现了图像级、比特级、以及符号级多级加密,提高了图像信息传输的安全性。The present invention proposes an image security transmission method based on joint encryption of the upper layer and the physical layer of the ACO-OFDM visible light communication system, which realizes image-level, bit-level, and symbol-level multi-level encryption, and improves the security of image information transmission.

本发明利用菲涅耳衍射双随机相位加密技术对原始图像进行加密,并编码转换成二元实值计算全息图,提高了系统的抗噪声性能。The invention utilizes the Fresnel diffraction double random phase encryption technology to encrypt the original image, and encodes and converts it into a binary real value calculation hologram, thereby improving the anti-noise performance of the system.

在各种类型的混沌系统中,二维超混沌系统具有迭代速度快、鲁棒性强等优点。本发明应用两个二维超混沌系统产生的混沌序列对二进制比特流以及QAM符号流进行混沌置乱,利用混沌密钥对初值的敏感性,增大了密钥的破解难度。Among various types of chaotic systems, the two-dimensional hyperchaotic system has the advantages of fast iteration speed and strong robustness. The invention uses the chaotic sequences generated by two two-dimensional hyperchaotic systems to perform chaotic scrambling on the binary bit stream and the QAM symbol stream, and utilizes the sensitivity of the chaotic key to the initial value to increase the difficulty of deciphering the key.

附图说明Description of drawings

图1为本发明的系统结构框图;Fig. 1 is a system structure block diagram of the present invention;

图2为基于菲涅耳衍射双随机相位加密以及全息编码的图像加密原理图;Figure 2 is a schematic diagram of image encryption based on Fresnel diffraction double random phase encryption and holographic encoding;

图3为基于菲涅耳衍射双随机相位加密以及全息编码的图像解密原理图。Fig. 3 is a schematic diagram of image decryption based on Fresnel diffraction double random phase encryption and holographic encoding.

具体实施方式Detailed ways

为了使本发明所要解决的技术问题、技术方案及有益效果更加清楚、明白,以下结合附图和实施例,对本发明进行进一步详细说明。此处所描述的具体实施例仅用以解释本发明,并不用于限定本发明。In order to make the technical problems, technical solutions and beneficial effects to be solved by the present invention clearer and clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. The specific embodiments described here are only used to explain the present invention, not to limit the present invention.

如图1所示,本发明一种基于ACO-OFDM可见光通信的图像安全传输方法,其包括以下步骤:As shown in Figure 1, the present invention is an image security transmission method based on ACO-OFDM visible light communication, which includes the following steps:

发送端:sender:

步骤(1)基于菲涅耳衍射系统双随机相位加密技术对原始图像进行加密,并编码转换成二元实值计算全息图;Step (1) Encrypt the original image based on the double random phase encryption technology of the Fresnel diffraction system, and encode and convert it into a binary real-valued computational hologram;

步骤(2)由原始图像的SHA-256值与外部密钥混合确定两个二维超混沌系统的初始值,产生四个混沌序列,用于二进制比特流以及QAM符号流的加密;Step (2) determines the initial value of two two-dimensional hyperchaotic systems by mixing the SHA-256 value of the original image with the external key, produces four chaotic sequences, and is used for the encryption of the binary bit stream and the QAM symbol stream;

步骤(3)将二元实值计算全息图并串转换为二进制比特流,应用四个混沌序列中的两个对二进制比特流的奇数位与偶数位分别进行比特异或,得到加密的二进制比特流;Step (3) The binary real-valued calculation hologram is converted into a binary bit stream in parallel, and two of the four chaotic sequences are used to perform bit XOR on the odd and even bits of the binary bit stream to obtain encrypted binary bits flow;

步骤(4)对加密的二进制比特流进行m-QAM正交幅度调制得到QAM符号流,应用四个混沌序列中的另外两个对QAM符号流的实部与虚部分别混沌置乱,得到加密的QAM符号流;Step (4) Carry out m-QAM quadrature amplitude modulation to the encrypted binary bit stream to obtain the QAM symbol stream, apply the other two of the four chaotic sequences to chaotically scramble the real and imaginary parts of the QAM symbol stream respectively, and obtain the encrypted The QAM symbol stream;

步骤(5)将加密后的QAM符号流进行串并转换以及厄尔米特映射,根据ACO-OFDM数据特征要求构成ACO-OFDM信号矩阵,再对ACO-OFDM信号矩阵进行逆快速傅里叶变换IFFT,生成实值的时域ACO-OFDM信号;Step (5) Perform serial-to-parallel conversion and Hermitian mapping on the encrypted QAM symbol stream, form an ACO-OFDM signal matrix according to the ACO-OFDM data characteristic requirements, and then perform inverse fast Fourier transform on the ACO-OFDM signal matrix IFFT, generating real-valued time-domain ACO-OFDM signals;

步骤(6)将时域ACO-OFDM信号依次进行添加循环前缀CP、并串转换、裁剪限幅削负波处理后,经数模转换加载到LED上,通过可见光进行发送,所发出的可见光信号通过空间信道传播到接收端;Step (6) The time-domain ACO-OFDM signal is sequentially processed by adding cyclic prefix CP, parallel-to-serial conversion, clipping, clipping and clipping, and loading it on the LED through digital-to-analog conversion, and sending it through visible light. Propagate to the receiving end through the spatial channel;

接收端:Receiving end:

步骤(1)接收端光电检测器PD将接收到的光信号转换为电信号,再依次进行模数转换、串并转换、去除循环前缀CP,得到接收的时域ACO-OFDM信号;Step (1) The photodetector PD at the receiving end converts the received optical signal into an electrical signal, and then sequentially performs analog-to-digital conversion, serial-to-parallel conversion, and removes the cyclic prefix CP to obtain the received time-domain ACO-OFDM signal;

步骤(2)对接收的时域ACO-OFDM信号依次进行快速傅里叶变换FFT、反厄尔米特对称变换、并串转换,得到加密QAM符号流;Step (2) performing fast Fourier transform FFT, anti-Hermitian symmetric transform, and parallel-serial conversion to the received time-domain ACO-OFDM signal successively to obtain an encrypted QAM symbol stream;

步骤(3)采用发送端相同的混沌序列密钥对接收到的加密QAM符号流解密;Step (3) adopts the same chaotic sequence key of the sending end to decrypt the encrypted QAM symbol stream received;

步骤(4)对解密后的QAM符号流进行解调得到加密二进制比特流,再采用与发送端相同的混沌序列密钥进行解密,之后串并转换为加密的二元实值计算全息图;Step (4) Demodulate the decrypted QAM symbol stream to obtain an encrypted binary bit stream, then use the same chaotic sequence key as the sender to decrypt, and then serially convert it into an encrypted binary real-valued calculation hologram;

步骤(5)基于菲涅耳衍射系统双随机相位解密技术对加密的二元实值计算全息图进行解密,得到原始图像。Step (5) Decrypt the encrypted binary real-valued calculation hologram based on the double random phase decryption technology of the Fresnel diffraction system to obtain the original image.

以上所述的方法,发送端步骤(1)基于菲涅耳衍射系统双随机相位加密技术对原始图像进行加密,并编码转换成二元实值计算全息图,其原理图如图2所示,具体包括以下步骤:In the method described above, the sending end step (1) encrypts the original image based on the double random phase encryption technology of the Fresnel diffraction system, and encodes and converts it into a binary real-valued calculation hologram. The schematic diagram is shown in Figure 2. Specifically include the following steps:

(1.1)对原始图像进行加密,将原始图像I(x,y)放置于物平面Σ,在物平面Σ上紧贴原始图像放置一个白噪声随机相位板p1(x,y)=exp(j2πα(x,y)),在频谱面Σ1上放置第二个白噪声随机相位板p2(x,y)=exp(j2πβ(ξ,η)),其中α,β∈[0,1];z1和z2分别是两次菲涅耳衍射的距离;假设波长为λ的平面光波垂直照射物平面Σ,原始图像经过第一块随机相位板p1的调制以及距离为z1的菲涅耳衍射后到达第二块随机相位板p2;在菲涅耳近似的条件下,第二块随机相位板处的复振幅分布为:(1.1) Encrypt the original image, place the original image I(x, y) on the object plane Σ, and place a white noise random phase plate p 1 (x, y)=exp( j2πα(x,y)), place a second white noise random phase plate p 2 (x,y)=exp(j2πβ(ξ,η)) on the spectral plane Σ 1 , where α,β∈[0,1 ]; z 1 and z 2 are the distances of two Fresnel diffractions respectively; assuming that the plane light wave with wavelength λ illuminates the object plane Σ vertically, the original image is modulated by the first random phase plate p 1 and the distance is z 1 After Fresnel diffraction, it reaches the second random phase plate p 2 ; under the condition of Fresnel approximation, the complex amplitude distribution at the second random phase plate is:

q(ξ,η)=FF{I(x,y)exp[j2πα(x,y)];z1}q(ξ,η)=F F {I(x,y)exp[j2πα(x,y)]; z 1 }

其中FF表示菲涅耳变换,然后经过距离z2的菲涅耳衍射到达输出平面Σ2,得到的加密图像的复振幅分布为:Where FF represents the Fresnel transformation, and then reaches the output plane Σ 2 through Fresnel diffraction at a distance z 2 , and the complex amplitude distribution of the obtained encrypted image is:

E(x,y)=FF{q(ξ,η)exp[j2πβ(ξ,η)];z2}E(x,y)=F F {q(ξ,η)exp[j2πβ(ξ,η)]; z 2 }

(1.2)采用罗曼编码方式记录加密图像,将加密图像E(x,y)转化为一二元实值的计算全息图E(m,n)。(1.2) Record the encrypted image by means of Roman encoding, and convert the encrypted image E(x,y) into a binary real-valued computational hologram E(m,n).

以上所述的方法,发送端步骤(2),由原始图像的SHA-256值与外部密钥混合确定两个二维超混沌系统的初始值,产生四个混沌序列,用于二进制比特流以及QAM符号流的加密;In the method described above, the sender step (2) determines the initial values of the two two-dimensional hyperchaotic systems by mixing the SHA-256 value of the original image with the external key, and generates four chaotic sequences for binary bit streams and Encryption of QAM symbol streams;

本发明采用混沌模型之一是交叉二维超混沌系统(Cross two dimensionalhyperchaotic system,CTDHCS)模型,其迭代公式如下:One of the chaotic models adopted in the present invention is a cross two-dimensional hyperchaotic system (Cross two dimensional hyperchaotic system, CTDHCS) model, and its iteration formula is as follows:

Figure BDA0004198202570000061
Figure BDA0004198202570000061

其中α,β为CTDHCS的两个控制参数,当α=2和β=1时,CTDHCS表现出超混沌性质;Among them, α and β are two control parameters of CTDHCS. When α=2 and β=1, CTDHCS exhibits hyperchaotic properties;

另一个混沌模型是高氏二维超混沌系统(Gao’s two dimensional hyperchaoticsystem,GTDHCS)模型,其迭代公式如下:Another chaotic model is Gao’s two dimensional hyperchaotic system (GTDHCS) model, and its iteration formula is as follows:

Figure BDA0004198202570000062
Figure BDA0004198202570000062

其中μ,γ是GTDHCS的两个控制参数,当μ=5和γ=5时,GTDHCS表现出超混沌性质;Among them, μ and γ are two control parameters of GTDHCS. When μ=5 and γ=5, GTDHCS exhibits hyperchaotic properties;

生成四个混沌序列具体步骤如下:The specific steps to generate four chaotic sequences are as follows:

(2.1)将原始图像输入SHA-256函数,生成其哈希值H,即长度为64的十六进制序列;(2.1) Input the original image into the SHA-256 function to generate its hash value H, which is a hexadecimal sequence with a length of 64;

(2.2)使用SK=bitxor(H,EK)将哈希值H与外部密钥EK(它由64个真正的随机十六进制数组成)进行混合,得到会话密钥SK,进一步提升机密性,其中bitxor(a,b)表示a和b的按位异或操作;(2.2) Use SK=bitxor(H,EK) to mix the hash value H with the external key EK (which consists of 64 truly random hexadecimal numbers) to obtain the session key SK to further improve confidentiality , where bitxor(a,b) represents the bitwise XOR operation of a and b;

(2.3)从会话密钥SK中提取混沌系统的初始值,表示如下:(2.3) Extract the initial value of the chaotic system from the session key SK, expressed as follows:

Figure BDA0004198202570000063
Figure BDA0004198202570000063

其中hex2dec操作可以将十六进制数的字符串转换为十进制整数,A(1)和B(1)为提取出的CTDHCS的初始值,U(1)和V(1)为提取出的GTDHCS的初始值;Among them, the hex2dec operation can convert the string of hexadecimal numbers into decimal integers, A(1) and B(1) are the initial values of the extracted CTDHCS, U(1) and V(1) are the extracted GTDHCS initial value;

(2.4)遵从提取出的初始值根据两个二维超混沌系统迭代得到A,B,U,V四个混沌序列;首先,利用两个二维超混沌系统迭代公式迭代初值(n+l)次,从而产生4个长度为(n+l)的序列:A(i),B(i),U(i),V(i),i=1,2,…,n+l,其中l为预迭代时间,以消除混沌系统的暂态过程带来的负面影响;然后将混沌序列A和B应用于二进制比特流的加密,混沌序列U和V应用于QAM符号流的加密。(2.4) Obtain four chaotic sequences of A, B, U, and V according to the two-dimensional hyperchaotic system iteration according to the extracted initial value; first, use the two-dimensional hyperchaotic system iteration formula to iterate the initial value (n+l ) times, resulting in 4 sequences of length (n+l): A(i), B(i), U(i), V(i), i=1, 2,...,n+l, where l is the pre-iteration time to eliminate the negative impact of the transient process of the chaotic system; then the chaotic sequences A and B are applied to the encryption of the binary bit stream, and the chaotic sequences U and V are applied to the encryption of the QAM symbol stream.

以上所述的方法,发送端步骤(3),将二元实值计算全息图并串转换为二进制比特流,应用四个混沌序列中的两个对二进制比特流的奇数位与偶数位分别进行比特异或,得到加密的二进制比特流,具体包括以下步骤:In the method described above, step (3) at the sending end converts the binary real-valued calculation hologram into a binary bit stream in parallel, and applies two of the four chaotic sequences to the odd bits and even bits of the binary bit stream respectively. Bit XOR to obtain an encrypted binary bit stream, which specifically includes the following steps:

(3.1)二元实值计算全息图并串转换为二进制比特流;(3.1) Parallel-serial conversion of binary real-valued computing holograms into binary bit streams;

(3.2)对混沌序列A和B进行预处理,如下所示:(3.2) Preprocess the chaotic sequence A and B, as follows:

Figure BDA0004198202570000071
Figure BDA0004198202570000071

其中floor函数返回不大于给定值的最大整数,abs函数返回给定值的绝对值,mod(a,b)返回a除以b的余数,处理后的混沌序列中只包含0和1,即a(i),b(i)∈{0,1};Among them, the floor function returns the largest integer not greater than the given value, the abs function returns the absolute value of the given value, mod(a,b) returns the remainder of dividing a by b, and the processed chaotic sequence only contains 0 and 1, that is a(i), b(i)∈{0,1};

(3.3)将预处理后得到的混沌序列a(i)和b(i)与并串转换后的二进制比特流x的奇数位与偶数位分别进行比特异或,得到加密的二进制比特流

Figure BDA0004198202570000072
表示如下:(3.3) Exclusively OR the chaotic sequences a(i) and b(i) obtained after preprocessing with the odd and even bits of the binary bit stream x after the parallel-serial conversion to obtain the encrypted binary bit stream
Figure BDA0004198202570000072
Expressed as follows:

Figure BDA0004198202570000073
Figure BDA0004198202570000073

其中bitxor(a,b)表示a和b的按位异或操作。Where bitxor(a,b) represents the bitwise XOR operation of a and b.

以上所述的方法,发送端步骤(4),对加密的二进制比特流进行m-QAM正交幅度调制得到QAM符号流,应用四个混沌序列中的另外两个对QAM符号流的实部与虚部分别混沌置乱,得到加密的QAM符号流,具体包括以下步骤:In the method described above, the sending end step (4) carries out m-QAM quadrature amplitude modulation to the encrypted binary bit stream to obtain the QAM symbol stream, and uses the other two of the four chaotic sequences to the real part of the QAM symbol stream and The imaginary part is chaotically scrambled respectively to obtain the encrypted QAM symbol stream, which specifically includes the following steps:

(4.1)对加密的二进制比特流进行m-QAM正交幅度调制得到QAM符号流;(4.1) m-QAM quadrature amplitude modulation is carried out to the encrypted binary bit stream to obtain the QAM symbol stream;

(4.2)对混沌序列U和V进行预处理,如下所示:(4.2) Preprocess the chaotic sequences U and V as follows:

Figure BDA0004198202570000074
Figure BDA0004198202570000074

其中floor函数返回不大于给定值的最大整数,abs函数返回给定值的绝对值,mod(a,b)返回a除以b的余数,处理后的混沌序列中只包含-1和1,即u(i),v(i)∈{-1,1};Among them, the floor function returns the largest integer not greater than the given value, the abs function returns the absolute value of the given value, mod(a,b) returns the remainder of dividing a by b, and the processed chaotic sequence only contains -1 and 1, That is, u(i), v(i)∈{-1,1};

(4.3)QAM符号流由S=[S1,S2,...,Sl]T表示,其中[]T指矩阵转置,l指QAM符号流的长度;将预处理后的混沌序列u(i)和v(i)与QAM符号流S的实部与虚部分别进行相乘处理,加密后的QAM符号流

Figure BDA0004198202570000081
表示为:(4.3) The QAM symbol flow is represented by S=[S 1 , S 2 ,...,S l ] T , where [] T refers to the matrix transposition, and l refers to the length of the QAM symbol flow; the preprocessed chaotic sequence u(i) and v(i) are multiplied with the real and imaginary parts of the QAM symbol stream S respectively, and the encrypted QAM symbol stream
Figure BDA0004198202570000081
Expressed as:

Figure BDA0004198202570000082
Figure BDA0004198202570000082

其中real(a)返回a的实部,imag(a)返回a的虚部。Where real(a) returns the real part of a, and imag(a) returns the imaginary part of a.

以上所述的方法,发送端步骤(5)和(6)以及接收端步骤(1)和(2),实现ACO-OFDM信号的生成以及发送与接收;The method described above, the sending end steps (5) and (6) and the receiving end steps (1) and (2), realize the generation and sending and receiving of the ACO-OFDM signal;

发送端步骤(5)将加密后的QAM符号流

Figure BDA0004198202570000083
进行串并转换,得到ACO-OFDM信号的有效数据矩阵,表示为:Step (5) at the sending end sends the encrypted QAM symbol stream
Figure BDA0004198202570000083
Perform serial-to-parallel conversion to obtain the effective data matrix of the ACO-OFDM signal, expressed as:

Figure BDA0004198202570000084
Figure BDA0004198202570000084

其中Q和M分别为OFDM有效数据子载波数和OFDM符号的总数,本发明基于ACO-OFDM可见光通信系统,只有奇数子载波被调制并被分配厄米对称性,而偶数子载波被分配为零,因此Q为OFDM子载波数N的四分之一,即Q=N/4;对ACO-OFDM信号的有效数据矩阵进行厄尔米特映射,根据ACO-OFDM数据特征要求,即调制奇数子载波并分配厄米对称性,偶数子载波置零,构成ACO-OFDM信号矩阵

Figure BDA0004198202570000085
表示为:Where Q and M are the number of effective data subcarriers of OFDM and the total number of OFDM symbols respectively, the present invention is based on the ACO-OFDM visible light communication system, only odd subcarriers are modulated and assigned Hermitian symmetry, while even subcarriers are assigned zero , so Q is a quarter of the number N of OFDM subcarriers, that is, Q=N/4; Hermitian mapping is performed on the effective data matrix of the ACO-OFDM signal. Carriers are assigned Hermitian symmetry, and even subcarriers are set to zero to form an ACO-OFDM signal matrix
Figure BDA0004198202570000085
Expressed as:

Figure BDA0004198202570000086
Figure BDA0004198202570000086

对ACO-OFDM信号矩阵

Figure BDA0004198202570000091
进行逆快速傅里叶变换IFFT,生成实值的时域ACO-OFDM信号;For ACO-OFDM signal matrix
Figure BDA0004198202570000091
Perform inverse fast Fourier transform IFFT to generate real-valued time-domain ACO-OFDM signals;

发送端步骤(6)将时域ACO-OFDM信号依次进行添加循环前缀CP、并串转换、裁剪限幅削负波处理后,经数模转换加载到LED上,通过可见光进行发送,所发出的可见光信号通过空间信道传播到接收端;Step (6) at the sending end adds the cyclic prefix CP to the ACO-OFDM signal in the time domain, parallel-to-serial conversion, clipping, limiting, and negative wave processing, and then loads it on the LED through digital-to-analog conversion, and sends it through visible light. The visible light signal propagates to the receiving end through the spatial channel;

接收端步骤(1)接收端光电检测器PD将接收到的光信号转换为电信号,再依次进行模数转换、串并转换、去除循环前缀CP,得到接收的时域ACO-OFDM信号;Step at the receiving end (1) The photodetector PD at the receiving end converts the received optical signal into an electrical signal, and then sequentially performs analog-to-digital conversion, serial-to-parallel conversion, and removes the cyclic prefix CP to obtain the received time-domain ACO-OFDM signal;

接收端步骤(2)对接收的时域ACO-OFDM信号依次进行快速傅里叶变换FFT、反厄尔米特对称变换、并串转换,得到加密QAM符号流;The receiving end step (2) performs fast Fourier transform FFT, anti-Hermitian symmetric transform, and parallel-serial conversion on the received time-domain ACO-OFDM signal in sequence to obtain an encrypted QAM symbol stream;

以上所述的方法,接收端对应的解密方法具体包括:For the method described above, the decryption method corresponding to the receiving end specifically includes:

所述接收端步骤(3)对应于发送端步骤(4)加密QAM符号流的解密,采用发送端步骤(4)相同的混沌序列密钥对接收到的加密QAM符号流进行解密;The receiver step (3) corresponds to the decryption of the transmitter step (4) encrypted QAM symbol flow, and adopts the same chaotic sequence key of the transmitter step (4) to decrypt the received encrypted QAM symbol stream;

所述接收端步骤(4)对应于发送端步骤(3)加密二进制比特流的解密,采用发送端步骤(3)相同的混沌序列密钥对接收到的加密二进制比特流进行解密;The receiving end step (4) corresponds to the decryption of the sending end step (3) encrypted binary bit stream, and adopts the same chaotic sequence key of the sending end step (3) to decrypt the received encrypted binary bit stream;

所述接收端步骤(5)对应于发送端步骤(1)加密图像的解密,图像解密原理图如图3所示,解密过程中,将接收到的二元实值计算全息图E'(m,n)放置在输入平面,单色垂直入射光照射,然后做一次标准傅里叶变换,计算全息图再现得到加密图像E'(x,y)及其共轭;取加密图像E'(x,y)的共轭来实现解密,将-1级再现共轭像引入菲涅耳衍射双随机相位解密系统,分别经过两次距离为z3和z4的菲涅耳衍射以及两个随机相位板p3和p4的调制解密,在输出平面Σ'获得解密原始图像I'(x,y):The receiving end step (5) corresponds to the decryption of the encrypted image in the sending end step (1), and the image decryption principle diagram is shown in Figure 3. During the decryption process, the received binary real value calculation hologram E'(m ,n) Placed on the input plane, irradiated with monochromatic vertical incident light, and then do a standard Fourier transform, calculate the hologram reproduction to obtain the encrypted image E'(x,y) and its conjugate; take the encrypted image E'(x , y) to achieve decryption, the -1-level reconstructed conjugate image is introduced into the Fresnel diffraction double random phase decryption system, and it undergoes two Fresnel diffractions with distances of z 3 and z 4 and two random phases respectively The modulation decryption of plates p 3 and p 4 obtains the decrypted original image I'(x,y) at the output plane Σ':

I'(x,y)exp[-j2πα(ξ,η)]=FF{FF[E'*(x,y);z3]exp[j2πβ(ξ,η)];z4}I'(x,y)exp[-j2πα(ξ,η)]=F F {F F [E'*(x,y); z 3 ] exp[j2πβ(ξ,η)]; z 4 }

其中*表示共轭,z3=z2,z4=z1,p3=p2,p4=p1Wherein * represents conjugation, z 3 =z 2 , z 4 =z 1 , p 3 =p 2 , p 4 =p 1 .

上述实施例为本发明较佳的实施方式,但本发明的实施方式并不受上述实施例的限制,其他的任何未背离本发明的精神实质与原理下所作的改变、修饰、替代、组合、简化,均应为等效的置换方式,都包含在本发明的保护范围之内。The above-mentioned embodiment is a preferred embodiment of the present invention, but the embodiment of the present invention is not limited by the above-mentioned embodiment, and any other changes, modifications, substitutions, combinations, Simplifications should be equivalent replacement methods, and all are included in the protection scope of the present invention.

Claims (6)

1. An ACO-OFDM visible light communication-based image security transmission method is characterized by comprising the following steps:
and the transmitting end:
encrypting an original image based on a double random phase encryption technology of a Fresnel diffraction system, and performing code conversion to obtain a binary real value calculation hologram;
step (2) mixing SHA-256 values of an original image with an external key to determine initial values of two-dimensional hyperchaotic systems, and generating four chaotic sequences for encrypting binary bit streams and QAM symbol streams;
converting binary real value calculation holograms into binary bit streams in parallel and serial, and performing bit exclusive OR on odd bits and even bits of the binary bit streams respectively by using two of four chaotic sequences to obtain encrypted binary bit streams;
performing m-QAM quadrature amplitude modulation on the encrypted binary bit stream to obtain a QAM symbol stream, and performing chaotic scrambling on the real part and the imaginary part of the QAM symbol stream respectively by using the other two of the four chaotic sequences to obtain the encrypted QAM symbol stream;
step (5) serial-parallel conversion and hermitian mapping are carried out on the encrypted QAM symbol stream, an ACO-OFDM signal matrix is formed according to the ACO-OFDM data characteristic requirement, inverse Fast Fourier Transform (IFFT) is carried out on the ACO-OFDM signal matrix, and a real-valued time domain ACO-OFDM signal is generated;
sequentially adding a cyclic prefix CP, parallel-to-serial converting, clipping and negating wave treatment to the time domain ACO-OFDM signal, loading the time domain ACO-OFDM signal onto an LED through digital-to-analog conversion, transmitting the time domain ACO-OFDM signal through visible light, and transmitting the transmitted visible light signal to a receiving end through a spatial channel;
the receiving end:
the photoelectric detector PD at the receiving end converts the received optical signal into an electric signal, and then sequentially performs analog-digital conversion, serial-parallel conversion and cyclic prefix CP removal to obtain a received time domain ACO-OFDM signal;
step (2) carrying out fast Fourier transform FFT, inverse hermitian symmetric transform and parallel-serial conversion on the received time domain ACO-OFDM signal in sequence to obtain an encrypted QAM symbol stream;
step (3) adopting the same chaotic sequence key of the transmitting end to decrypt the received encrypted QAM symbol stream;
demodulating the decrypted QAM symbol stream to obtain an encrypted binary bit stream, decrypting by adopting a chaotic sequence key which is the same as that of a transmitting end, and then converting the encrypted binary real value into a binary real value calculation hologram in a serial-parallel manner;
and (5) decrypting the encrypted binary real value calculation hologram based on the double random phase decryption technology of the Fresnel diffraction system to obtain an original image.
2. The method for safely transmitting an image based on ACO-OFDM visible light communication according to claim 1, wherein the transmitting-side step (1) specifically comprises:
the method comprises the steps of (1.1) encrypting an original image, obtaining an encrypted image after the original image is modulated and encrypted by two Fresnel diffractions and two random phase plates, and performing standard Fourier transform on the encrypted image;
(1.2) recording the encrypted image by using a Roman coding mode, and converting the encrypted image into a binary real-valued calculation hologram.
3. The method for safely transmitting an image based on ACO-OFDM visible light communication according to claim 1, wherein the transmitting-side step (2) specifically comprises:
(2.1) inputting the original image into an SHA-256 function to generate a hash value H, namely a hexadecimal sequence with the length of 64;
(2.2) mixing the hash value H with an external key EK (which consists of 64 truly random hexadecimal numbers) using sk=bitxor (H, EK), where bitxor (a, b) represents a bitwise exclusive-or operation of a and b, to obtain the session key SK, further improving confidentiality;
(2.3) extracting an initial value of the chaotic system from the session key SK;
and (2.4) iterating according to the extracted initial values according to the two-dimensional hyper-chaotic systems to obtain four chaotic sequences.
4. The method for safely transmitting an image based on ACO-OFDM visible light communication according to claim 1, wherein the transmitting-side step (3) specifically comprises:
(3.1) binary real-valued computed holograms are converted into binary bit streams in parallel-serial;
(3.2) preprocessing two of the four chaotic sequences, wherein the processed chaotic sequences only comprise 0 and 1;
and (3.3) respectively carrying out bit exclusive OR on the preprocessed chaotic sequence and the odd-numbered bits and the even-numbered bits of the binary bit stream subjected to parallel-serial conversion to obtain an encrypted binary bit stream.
5. The method for safely transmitting an image based on ACO-OFDM visible light communication according to claim 1, wherein the transmitting-side step (4) specifically comprises:
(4.1) performing m-QAM quadrature amplitude modulation on the encrypted binary bit stream to obtain a QAM symbol stream;
(4.2) preprocessing the other two of the four chaotic sequences, wherein the processed chaotic sequences only comprise-1 and-1;
and (4.3) multiplying the preprocessed chaotic sequence by the real part and the imaginary part of the QAM symbol stream respectively.
6. The image security transmission method based on ACO-OFDM visible light communication according to claims 1 to 5, wherein the decryption method corresponding to the receiving end specifically comprises:
the receiving end step (3) corresponds to the decryption of the encrypted QAM symbol stream in the transmitting end step (4), and the same chaotic sequence key in the transmitting end step (4) is adopted to decrypt the received encrypted QAM symbol stream;
the step (4) of the receiving end corresponds to the step (3) of decrypting the encrypted binary bit stream of the transmitting end, and the same chaotic sequence key of the step (3) of the transmitting end is adopted to decrypt the received encrypted binary bit stream;
the receiving end step (5) corresponds to the decryption of the encrypted image in the transmitting end step (1), the received binary real value calculation hologram is subjected to primary standard Fourier transform to obtain the encrypted image and conjugate thereof, and the-1-level reproduction conjugate image is subjected to two Fresnel diffraction and modulation decryption of two random phase plates to recover the original image.
CN202310453091.3A 2023-04-25 2023-04-25 A secure image transmission method based on ACO-OFDM visible light communication Pending CN116389651A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310453091.3A CN116389651A (en) 2023-04-25 2023-04-25 A secure image transmission method based on ACO-OFDM visible light communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310453091.3A CN116389651A (en) 2023-04-25 2023-04-25 A secure image transmission method based on ACO-OFDM visible light communication

Publications (1)

Publication Number Publication Date
CN116389651A true CN116389651A (en) 2023-07-04

Family

ID=86969354

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310453091.3A Pending CN116389651A (en) 2023-04-25 2023-04-25 A secure image transmission method based on ACO-OFDM visible light communication

Country Status (1)

Country Link
CN (1) CN116389651A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117375876A (en) * 2023-08-24 2024-01-09 南京信息工程大学 High-safety communication method based on dynamic aliasing of time domain spectrum on digital domain

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117375876A (en) * 2023-08-24 2024-01-09 南京信息工程大学 High-safety communication method based on dynamic aliasing of time domain spectrum on digital domain

Similar Documents

Publication Publication Date Title
Zhang et al. Experimental demonstration of security-enhanced OFDMA-PON using chaotic constellation transformation and pilot-aided secure key agreement
CN105577359B (en) A kind of OOFDM encryption systems based on the mapping of chaos sequence pilot tone
CN111342957B (en) Method and device for distributing CO-OFDM (CO-orthogonal frequency division multiplexing) key based on Y-00 protocol
CN111786771B (en) A polarization, phase and mode dynamic perturbation method
Wang et al. A two layer chaotic encryption scheme of secure image transmission for DCT precoded OFDM-VLC transmission
CN111525998A (en) A Highly Reliable Optical Transmission Method Based on Mode, Slot and Frequency Composite Vector
Zhou et al. Physical layer dynamic key encryption in OFDM-PON system based on cellular neural network
Li et al. Secure key distribution strategy in OFDM-PON by utilizing the redundancy of training symbol and digital chaos technique
Wang et al. Physical layer encryption in DMT based on digital multi-scroll chaotic system
Wu et al. Joint security enhancement and PAPR mitigation for OFDM-NOMA VLC systems
CN110336657B (en) Optical OFDM dynamic key generation method based on channel characteristics
CN112188483A (en) Physical layer label signal embedding authentication method and system based on WFRFT
CN108574574A (en) Physical layer encryption method based on multi-dimensional constellation rotation
CN114302270A (en) OFDM-PON physical layer encryption method and system based on multi-chaotic system and layered scrambling
CN116389651A (en) A secure image transmission method based on ACO-OFDM visible light communication
Huang et al. Secure OFDM-PON using chaotic constellation mapping and probabilistic shaping
Dharavathu et al. Efficient transmission of an encrypted image through a MIMO–OFDM system with different encryption schemes
Deng et al. Security enhancement for OFDM-UWOC system using three-layer chaotic encryption and chaotic DFT precoding
Xu et al. Diffusion-assisted quantum noise stream cipher for physical layer security in UFMC
Wang et al. Data center secure communication via DNA hyperchaotic encryption
Arumugam et al. An efficient machine learning based image encryption scheme for medical image security
CN113490206A (en) Random number encrypted multi-address passive optical network in 5G network
Wang et al. Multi-bit mapping based on constellation rotation in Quantum Noise Stream Cipher
Wang et al. Secure image transmission in orthogonal frequency division multiplexing visible light communication systems
Zhuo et al. Secure scheme for OFDM-PON system using TR based on modified Henon chaos

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination