CN116389651A - Image safe transmission method based on ACO-OFDM visible light communication - Google Patents

Image safe transmission method based on ACO-OFDM visible light communication Download PDF

Info

Publication number
CN116389651A
CN116389651A CN202310453091.3A CN202310453091A CN116389651A CN 116389651 A CN116389651 A CN 116389651A CN 202310453091 A CN202310453091 A CN 202310453091A CN 116389651 A CN116389651 A CN 116389651A
Authority
CN
China
Prior art keywords
aco
encrypted
image
ofdm
chaotic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310453091.3A
Other languages
Chinese (zh)
Inventor
贾鑫雨
席思星
于娜娜
王晓雷
朗利影
岳苏航
朱巧芬
张雷
韩海燕
刘秀红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hebei University of Engineering
Original Assignee
Hebei University of Engineering
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hebei University of Engineering filed Critical Hebei University of Engineering
Priority to CN202310453091.3A priority Critical patent/CN116389651A/en
Publication of CN116389651A publication Critical patent/CN116389651A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B10/00Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
    • H04B10/11Arrangements specific to free-space transmission, i.e. transmission through air or vacuum
    • H04B10/114Indoor or close-range type systems
    • H04B10/116Visible light communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Optical Communication System (AREA)

Abstract

The invention discloses an ACO-OFDM visible light communication-based image safety transmission method, which is characterized by comprising the following steps of: the encryption is combined with the physical layer at the upper layer of the ACO-OFDM system. The specific process is as follows: encrypting an original image on the upper layer of the ACO-OFDM system based on a Fresnel diffraction double random phase encryption technology, and performing code conversion to obtain a calculation hologram; and then, mixing the SHA-256 values of the original image with an external key to determine initial values of two-dimensional hyperchaotic systems, generating four chaotic sequences, carrying out bit exclusive OR on odd bits and even bits of the transmitted binary bit stream by using the two sequences, carrying out chaotic scrambling on real parts and imaginary parts of the QAM symbol stream by using the other two sequences, and realizing encryption of a physical layer. The invention adopts the upper layer and physical layer of ACO-OFDM system to encrypt, further enhances the security of image transmission. In addition, the upper layer encrypts and converts the original image into a binary real-value calculation hologram, so that the anti-noise performance of the ACO-OFDM system is improved. The invention is suitable for the safe transmission of the image data between the visible light receiving and transmitting devices.

Description

Image safe transmission method based on ACO-OFDM visible light communication
Technical Field
The invention relates to the field of visible light communication and image transmission, in particular to an ACO-OFDM visible light communication-based image security transmission method.
Background
Information transmission in wireless networks is currently accomplished through techniques operating in the radio frequency band, such as: wi-Fi, bluetooth, NFC, cellular networks, satellite networks, and so on, each of which has its own performance characteristics and is used in accordance with the type of application. However, with the rise of the internet of things (Internet ofThings, ioT) and industry 4.0, the number of applications and devices connected to the network is increasing every day, and thus the demands on wireless access, capacity and security are exponentially increasing, and a great amount of information requires new technologies to support broadband services and accommodate existing traffic.
In order to solve the above problems and serious congestion of radio spectrum, researchers have developed a new technology called visible light communication (Visible Light Communication, VLC), which uses the visible light band for data transmission, and has the advantages of abundant spectrum resources, no electromagnetic pollution, high security, etc. In addition, visible light communication is a technology that uses the most widely used LED as an emission source at present, and has both illumination and communication, which makes it considered as a future communication with great potential.
To guarantee high data rate transmission and reduce implementation complexity, VLC may leverage orthogonal frequency division multiplexing (Orthogonal Frequency Division Multiplexing, OFDM) multi-carrier modulation schemes for radio frequencies. The OFDM is characterized in that the frequency selective fading of a communication channel is converted into a flat fading channel by using a one-dimensional frequency domain equalization technology with high efficiency and simplicity in calculation. Furthermore, OFDM ensures high data rate communication while enabling efficient use of spectrum resources. The OFDM multicarrier modulation format modulates amplitude and phase information of a carrier signal in the case of radio frequency based wireless communication. The visible light communication link is implemented with LEDs, and the fact that the LEDs produce incoherent light allows the OFDM time domain signal to modulate the intensity of the light source without being noticeable to the human eye. Therefore, VLC typically employs a special modem format of intensity modulation/direct detection (IM/DD), which forces the OFDM time domain signal to be both real-valued and unipolar in nature (i.e., positive). Therefore, in order to obtain the real-valued signal, hermitian symmetry constraint is performed on the input frame structure of the IFFT module, so that the real-valued property of the time-domain signal output by the IFFT is ensured. In order to generate a positive signal, various optical OFDM techniques have been proposed, such as direct offset optical OFDM (DCO-OFDM), asymmetric limited optical OFDM (ACO-OFDM), flip OFDM (Flip-OFDM), etc. Each variant of OFDM has a trade-off in terms of spectral efficiency, power efficiency, computational complexity, and bit error rate performance. ACO-OFDM based VLC is a potential candidate solution for VLC application, and the VLC system based on ACO-OFDM is provided without losing generality.
With the advent of the large data age, images play an increasingly important role in data transmission. However, in the image transmission process, it is also important to ensure the safety of the image. In the image transmission process, if no good security measures are available, a hacker or a malicious attacker can easily acquire important information in the image, thereby causing data leakage. This not only results in a loss of interest to the business or individual, but also affects the business's or individual's image and reputation in the marketplace.
In summary, it is necessary to protect the image transmission based on the ACO-OFDM visible light communication system, so as to ensure the information security.
Disclosure of Invention
The invention aims to provide an ACO-OFDM visible light communication-based image security transmission method.
The invention relates to an ACO-OFDM visible light communication-based image safety transmission method, which comprises the following steps:
and the transmitting end:
encrypting an original image based on a double random phase encryption technology of a Fresnel diffraction system, and performing code conversion to obtain a binary real value calculation hologram;
step (2) mixing SHA-256 values of an original image with an external key to determine initial values of two-dimensional hyperchaotic systems, and generating four chaotic sequences for encrypting binary bit streams and QAM symbol streams;
converting binary real value calculation holograms into binary bit streams in parallel and serial, and performing bit exclusive OR on odd bits and even bits of the binary bit streams respectively by using two of four chaotic sequences to obtain encrypted binary bit streams;
performing m-QAM quadrature amplitude modulation on the encrypted binary bit stream to obtain a QAM symbol stream, and performing chaotic scrambling on the real part and the imaginary part of the QAM symbol stream respectively by using the other two of the four chaotic sequences to obtain the encrypted QAM symbol stream;
step (5) serial-parallel conversion and hermitian mapping are carried out on the encrypted QAM symbol stream, an ACO-OFDM signal matrix is formed according to the ACO-OFDM data characteristic requirement, inverse Fast Fourier Transform (IFFT) is carried out on the ACO-OFDM signal matrix, and a real-valued time domain ACO-OFDM signal is generated;
sequentially adding a cyclic prefix CP, parallel-to-serial converting, clipping and negating wave treatment to the time domain ACO-OFDM signal, loading the time domain ACO-OFDM signal onto an LED through digital-to-analog conversion, transmitting the time domain ACO-OFDM signal through visible light, and transmitting the transmitted visible light signal to a receiving end through a spatial channel;
the receiving end:
the photoelectric detector PD at the receiving end converts the received optical signal into an electric signal, and then sequentially performs analog-digital conversion, serial-parallel conversion and cyclic prefix CP removal to obtain a received time domain ACO-OFDM signal;
step (2) carrying out fast Fourier transform FFT, inverse hermitian symmetric transform and parallel-serial conversion on the received time domain ACO-OFDM signal in sequence to obtain an encrypted QAM symbol stream;
step (3) adopting the same chaotic sequence key of the transmitting end to decrypt the received encrypted QAM symbol stream;
demodulating the decrypted QAM symbol stream to obtain an encrypted binary bit stream, decrypting by adopting a chaotic sequence key which is the same as that of a transmitting end, and then converting the encrypted binary real value into a binary real value calculation hologram in a serial-parallel manner;
and (5) decrypting the encrypted binary real value calculation hologram based on the double random phase decryption technology of the Fresnel diffraction system to obtain an original image.
Compared with the prior art, the invention has the following advantages:
the invention provides an image security transmission method based on the joint encryption of an upper layer and a physical layer of an ACO-OFDM visible light communication system, which realizes the multi-stage encryption of an image level, a bit level and a symbol level and improves the security of image information transmission.
The invention encrypts the original image by utilizing the Fresnel diffraction double random phase encryption technology, and codes and converts the original image into the binary real value calculation hologram, thereby improving the noise resistance of the system.
Among various chaotic systems, the two-dimensional hyper-chaotic system has the advantages of high iteration speed, strong robustness and the like. According to the invention, the binary bit stream and the QAM symbol stream are chaotic scrambled by using the chaotic sequences generated by the two-dimensional hyperchaotic systems, and the sensitivity of a chaotic key to an initial value is utilized, so that the cracking difficulty of the key is increased.
Drawings
FIG. 1 is a block diagram of a system architecture of the present invention;
FIG. 2 is a schematic diagram of image encryption based on Fresnel diffraction dual random phase encryption and holographic encoding;
fig. 3 is a schematic diagram of image decryption based on fresnel diffraction double random phase encryption and holographic encoding.
Detailed Description
In order to make the technical problems, technical schemes and beneficial effects to be solved more clear and obvious, the invention is further described in detail below with reference to the accompanying drawings and embodiments. The specific embodiments described herein are to be considered in an illustrative sense only and are not intended to limit the invention.
As shown in fig. 1, the image security transmission method based on ACO-OFDM visible light communication of the present invention includes the following steps:
and the transmitting end:
encrypting an original image based on a double random phase encryption technology of a Fresnel diffraction system, and performing code conversion to obtain a binary real value calculation hologram;
step (2) mixing SHA-256 values of an original image with an external key to determine initial values of two-dimensional hyperchaotic systems, and generating four chaotic sequences for encrypting binary bit streams and QAM symbol streams;
converting binary real value calculation holograms into binary bit streams in parallel and serial, and performing bit exclusive OR on odd bits and even bits of the binary bit streams respectively by using two of four chaotic sequences to obtain encrypted binary bit streams;
performing m-QAM quadrature amplitude modulation on the encrypted binary bit stream to obtain a QAM symbol stream, and performing chaotic scrambling on the real part and the imaginary part of the QAM symbol stream respectively by using the other two of the four chaotic sequences to obtain the encrypted QAM symbol stream;
step (5) serial-parallel conversion and hermitian mapping are carried out on the encrypted QAM symbol stream, an ACO-OFDM signal matrix is formed according to the ACO-OFDM data characteristic requirement, inverse Fast Fourier Transform (IFFT) is carried out on the ACO-OFDM signal matrix, and a real-valued time domain ACO-OFDM signal is generated;
sequentially adding a cyclic prefix CP, parallel-to-serial converting, clipping and negating wave treatment to the time domain ACO-OFDM signal, loading the time domain ACO-OFDM signal onto an LED through digital-to-analog conversion, transmitting the time domain ACO-OFDM signal through visible light, and transmitting the transmitted visible light signal to a receiving end through a spatial channel;
the receiving end:
the photoelectric detector PD at the receiving end converts the received optical signal into an electric signal, and then sequentially performs analog-digital conversion, serial-parallel conversion and cyclic prefix CP removal to obtain a received time domain ACO-OFDM signal;
step (2) carrying out fast Fourier transform FFT, inverse hermitian symmetric transform and parallel-serial conversion on the received time domain ACO-OFDM signal in sequence to obtain an encrypted QAM symbol stream;
step (3) adopting the same chaotic sequence key of the transmitting end to decrypt the received encrypted QAM symbol stream;
demodulating the decrypted QAM symbol stream to obtain an encrypted binary bit stream, decrypting by adopting a chaotic sequence key which is the same as that of a transmitting end, and then converting the encrypted binary real value into a binary real value calculation hologram in a serial-parallel manner;
and (5) decrypting the encrypted binary real value calculation hologram based on the double random phase decryption technology of the Fresnel diffraction system to obtain an original image.
In the method, the transmitting end step (1) encrypts the original image based on the double random phase encryption technology of the fresnel diffraction system, and encodes and converts the original image into a binary real value calculation hologram, and the schematic diagram is shown in fig. 2, and specifically includes the following steps:
(1.1) encrypting the original image, placing the original image I (x, y) on the object plane Sigma, and placing a white noise random phase plate p on the object plane Sigma and close to the original image 1 (x, y) =exp (j2pi α (x, y)), at spectral plane Σ 1 On which is placed a second white noise random phase plate p 2 (x, y) =exp (j 2 pi beta (ζ, eta)), where α, beta e [0,1 ]];z 1 And z 2 The distances of two Fresnel diffractions are respectively; assuming that the planar lightwave with wavelength lambda perpendicularly irradiates the object plane sigma, the original image passes through a first random phase plate p 1 Is z 1 After Fresnel diffraction reaching the second random phase plate p 2 The method comprises the steps of carrying out a first treatment on the surface of the Under fresnel approximation conditions, the complex amplitude distribution at the second random phase plate is:
q(ξ,η)=F F {I(x,y)exp[j2πα(x,y)];z 1 }
wherein F is F Representing fresnel transformations and then passing through the distance z 2 Fresnel diffraction of (c) reaches the output plane Σ 2 The complex amplitude distribution of the resulting encrypted image is:
E(x,y)=F F {q(ξ,η)exp[j2πβ(ξ,η)];z 2 }
(1.2) recording the encrypted image by the roman coding method, and converting the encrypted image E (x, y) into a binary real-valued calculation hologram E (m, n).
The method comprises the steps of (2) at a transmitting end, mixing SHA-256 values of an original image with an external key to determine initial values of two-dimensional hyperchaotic systems, and generating four chaotic sequences for encrypting binary bit streams and QAM symbol streams;
one of the chaotic models adopted by the invention is a cross two-dimensional hyper-chaotic system (Cross two dimensional hyperchaotic system, CTDHCS) model, and the iteration formula is as follows:
Figure BDA0004198202570000061
where α, β are two control parameters of CTDHCS, which exhibits hyperchaotic properties when α=2 and β=1;
another chaotic model is a Gao's two dimensional hyperchaotic system, GTDHCS model, whose iterative formula is as follows:
Figure BDA0004198202570000062
where μ, γ is two control parameters of GTDHCS, which exhibits hyperchaotic properties when μ=5 and γ=5;
the specific steps for generating four chaotic sequences are as follows:
(2.1) inputting the original image into an SHA-256 function to generate a hash value H, namely a hexadecimal sequence with the length of 64;
(2.2) mixing the hash value H with an external key EK (which consists of 64 truly random hexadecimal numbers) using sk=bitxor (H, EK), where bitxor (a, b) represents a bitwise exclusive-or operation of a and b, to obtain the session key SK, further improving confidentiality;
(2.3) extracting an initial value of the chaotic system from the session key SK, expressed as follows:
Figure BDA0004198202570000063
wherein, the hex2dec operation can convert the character string of hexadecimal number into decimal integer, A (1) and B (1) are initial values of extracted CTDHCS, U (1) and V (1) are initial values of extracted GTDHCS;
(2.4) iterating the extracted initial values according to the two-dimensional hyper-chaotic systems to obtain four chaotic sequences A, B, U and V; firstly, iterating an initial value (n+l) times by using two-dimensional hyper-chaotic system iteration formulas, thereby generating 4 sequences with the length of (n+l): a (i), B (i), U (i), V (i), i=1, 2, …, n+l, where l is a pre-iteration time to eliminate negative effects caused by transient processes of the chaotic system; the chaotic sequences a and B are then applied to encryption of the binary bit stream and the chaotic sequences U and V are applied to encryption of the QAM symbol stream.
The method, the transmitting end step (3), converts binary real value calculation hologram parallel-serial into binary bit stream, applies two of four chaos sequences to respectively carry out bit exclusive OR on odd bit and even bit of the binary bit stream to obtain encrypted binary bit stream, and specifically comprises the following steps:
(3.1) binary real-valued computed holograms are converted into binary bit streams in parallel-serial;
(3.2) preprocessing the chaotic sequences A and B as follows:
Figure BDA0004198202570000071
wherein the floor function returns a maximum integer not greater than a given value, the abs function returns an absolute value of the given value, mod (a, b) returns a remainder of a divided by b, and the processed chaotic sequence only contains 0 and 1, namely a (i), b (i) epsilon {0,1};
(3.3) performing bit exclusive OR on the chaos sequences a (i) and b (i) obtained after pretreatment and the odd bit and the even bit of the binary bit stream x after parallel-serial conversion respectively to obtain an encrypted binary bit stream
Figure BDA0004198202570000072
The expression is as follows:
Figure BDA0004198202570000073
where bitxor (a, b) represents a bitwise exclusive or operation of a and b.
The method, the transmitting end step (4), carries out m-QAM quadrature amplitude modulation on the encrypted binary bit stream to obtain a QAM symbol stream, and carries out chaotic scrambling on the real part and the imaginary part of the QAM symbol stream by using the other two of four chaotic sequences to obtain the encrypted QAM symbol stream, which comprises the following steps:
(4.1) performing m-QAM quadrature amplitude modulation on the encrypted binary bit stream to obtain a QAM symbol stream;
(4.2) preprocessing the chaotic sequences U and V as follows:
Figure BDA0004198202570000074
wherein the floor function returns a maximum integer not greater than a given value, the abs function returns an absolute value of the given value, mod (a, b) returns a remainder of a divided by b, and the processed chaotic sequence only comprises-1 and 1, namely u (i), v (i) epsilon-1, 1;
(4.3) QAM symbol stream is composed of s= [ S ] 1 ,S 2 ,...,S l ] T Representation of [ wherein ]] T Referring to matrix transposition, l refers to the length of the QAM symbol stream; multiplying the preprocessed chaos sequences u (i) and v (i) with the real part and the imaginary part of the QAM symbol stream S respectively, and encrypting QAM symbol stream
Figure BDA0004198202570000081
Expressed as:
Figure BDA0004198202570000082
where real (a) returns the real part of a and imag (a) returns the imaginary part of a.
The method comprises the steps (5) and (6) at the transmitting end and the steps (1) and (2) at the receiving end, so that ACO-OFDM signals are generated, transmitted and received;
transmitting end step (5) encrypts the QAM symbol stream
Figure BDA0004198202570000083
Serial-parallel conversion is carried out to obtain an effective data matrix of ACO-OFDM signals, which is expressed as follows:
Figure BDA0004198202570000084
wherein Q and M are the number of OFDM effective data subcarriers and the total number of OFDM symbols, respectively, the invention is based on an ACO-OFDM visible light communication system, only odd subcarriers are modulated and allocated hermitian symmetry, and even subcarriers are allocated to zero, so Q is one fourth of the number N of OFDM subcarriers, i.e., q=n/4; performing hermitian mapping on effective data matrix of ACO-OFDM signal, modulating odd sub-carrier and distributing hermitian symmetry, and setting even sub-carrier to zero to form ACO-OFDM signal matrix according to ACO-OFDM data characteristic requirement
Figure BDA0004198202570000085
Expressed as:
Figure BDA0004198202570000086
for ACO-OFDM signal matrix
Figure BDA0004198202570000091
Performing Inverse Fast Fourier Transform (IFFT) to generate real-valued time domain ACO-OFDM signals;
a transmitting end step (6) sequentially adds a cyclic prefix CP, performs parallel-to-serial conversion, cuts out amplitude limiting and cutting negative wave treatment on a time domain ACO-OFDM signal, loads the signal onto an LED through digital-to-analog conversion, transmits the signal through visible light, and transmits the transmitted visible light signal to a receiving end through a space channel;
the receiving end step (1) is that the receiving end photoelectric detector PD converts the received optical signal into an electric signal, and then analog-digital conversion, serial-parallel conversion and cyclic prefix CP removal are sequentially carried out, so that a received time domain ACO-OFDM signal is obtained;
the receiving end step (2) sequentially carries out fast Fourier transform FFT, inverse Hermite symmetric transform and parallel-serial conversion on the received time domain ACO-OFDM signal to obtain an encrypted QAM symbol stream;
the decryption method corresponding to the receiving end specifically comprises the following steps:
the receiving end step (3) corresponds to the decryption of the encrypted QAM symbol stream in the transmitting end step (4), and the same chaotic sequence key in the transmitting end step (4) is adopted to decrypt the received encrypted QAM symbol stream;
the step (4) of the receiving end corresponds to the step (3) of decrypting the encrypted binary bit stream of the transmitting end, and the same chaotic sequence key of the step (3) of the transmitting end is adopted to decrypt the received encrypted binary bit stream;
the receiving end step (5) corresponds to the decryption of the encrypted image in the transmitting end step (1), the image decryption schematic diagram is shown in fig. 3, in the decryption process, the received binary real value calculation hologram E '(m, n) is placed on an input plane, monochromatic light is vertically incident, then standard Fourier transform is carried out, and the calculation hologram is reproduced to obtain an encrypted image E' (x, y) and conjugate thereof; taking conjugate of the encrypted image E' (x, y) to realize decryption, introducing the-1-level reproduction conjugate image into a Fresnel diffraction double-random-phase decryption system, and respectively carrying out twice distance z 3 And z 4 Fresnel diffraction of (c) and two random phase plates p 3 And p 4 Modulation of (2)Decryption, obtaining a decrypted original image I '(x, y) at an output plane Σ':
I'(x,y)exp[-j2πα(ξ,η)]=F F {F F [E'*(x,y);z 3 ]exp[j2πβ(ξ,η)];z 4 }
wherein is represents conjugation, z 3 =z 2 ,z 4 =z 1 ,p 3 =p 2 ,p 4 =p 1
The above examples are preferred embodiments of the present invention, but the embodiments of the present invention are not limited to the above examples, and any other changes, modifications, substitutions, combinations, and simplifications that do not depart from the spirit and principle of the present invention should be made in the equivalent manner, and the embodiments are included in the protection scope of the present invention.

Claims (6)

1. An ACO-OFDM visible light communication-based image security transmission method is characterized by comprising the following steps:
and the transmitting end:
encrypting an original image based on a double random phase encryption technology of a Fresnel diffraction system, and performing code conversion to obtain a binary real value calculation hologram;
step (2) mixing SHA-256 values of an original image with an external key to determine initial values of two-dimensional hyperchaotic systems, and generating four chaotic sequences for encrypting binary bit streams and QAM symbol streams;
converting binary real value calculation holograms into binary bit streams in parallel and serial, and performing bit exclusive OR on odd bits and even bits of the binary bit streams respectively by using two of four chaotic sequences to obtain encrypted binary bit streams;
performing m-QAM quadrature amplitude modulation on the encrypted binary bit stream to obtain a QAM symbol stream, and performing chaotic scrambling on the real part and the imaginary part of the QAM symbol stream respectively by using the other two of the four chaotic sequences to obtain the encrypted QAM symbol stream;
step (5) serial-parallel conversion and hermitian mapping are carried out on the encrypted QAM symbol stream, an ACO-OFDM signal matrix is formed according to the ACO-OFDM data characteristic requirement, inverse Fast Fourier Transform (IFFT) is carried out on the ACO-OFDM signal matrix, and a real-valued time domain ACO-OFDM signal is generated;
sequentially adding a cyclic prefix CP, parallel-to-serial converting, clipping and negating wave treatment to the time domain ACO-OFDM signal, loading the time domain ACO-OFDM signal onto an LED through digital-to-analog conversion, transmitting the time domain ACO-OFDM signal through visible light, and transmitting the transmitted visible light signal to a receiving end through a spatial channel;
the receiving end:
the photoelectric detector PD at the receiving end converts the received optical signal into an electric signal, and then sequentially performs analog-digital conversion, serial-parallel conversion and cyclic prefix CP removal to obtain a received time domain ACO-OFDM signal;
step (2) carrying out fast Fourier transform FFT, inverse hermitian symmetric transform and parallel-serial conversion on the received time domain ACO-OFDM signal in sequence to obtain an encrypted QAM symbol stream;
step (3) adopting the same chaotic sequence key of the transmitting end to decrypt the received encrypted QAM symbol stream;
demodulating the decrypted QAM symbol stream to obtain an encrypted binary bit stream, decrypting by adopting a chaotic sequence key which is the same as that of a transmitting end, and then converting the encrypted binary real value into a binary real value calculation hologram in a serial-parallel manner;
and (5) decrypting the encrypted binary real value calculation hologram based on the double random phase decryption technology of the Fresnel diffraction system to obtain an original image.
2. The method for safely transmitting an image based on ACO-OFDM visible light communication according to claim 1, wherein the transmitting-side step (1) specifically comprises:
the method comprises the steps of (1.1) encrypting an original image, obtaining an encrypted image after the original image is modulated and encrypted by two Fresnel diffractions and two random phase plates, and performing standard Fourier transform on the encrypted image;
(1.2) recording the encrypted image by using a Roman coding mode, and converting the encrypted image into a binary real-valued calculation hologram.
3. The method for safely transmitting an image based on ACO-OFDM visible light communication according to claim 1, wherein the transmitting-side step (2) specifically comprises:
(2.1) inputting the original image into an SHA-256 function to generate a hash value H, namely a hexadecimal sequence with the length of 64;
(2.2) mixing the hash value H with an external key EK (which consists of 64 truly random hexadecimal numbers) using sk=bitxor (H, EK), where bitxor (a, b) represents a bitwise exclusive-or operation of a and b, to obtain the session key SK, further improving confidentiality;
(2.3) extracting an initial value of the chaotic system from the session key SK;
and (2.4) iterating according to the extracted initial values according to the two-dimensional hyper-chaotic systems to obtain four chaotic sequences.
4. The method for safely transmitting an image based on ACO-OFDM visible light communication according to claim 1, wherein the transmitting-side step (3) specifically comprises:
(3.1) binary real-valued computed holograms are converted into binary bit streams in parallel-serial;
(3.2) preprocessing two of the four chaotic sequences, wherein the processed chaotic sequences only comprise 0 and 1;
and (3.3) respectively carrying out bit exclusive OR on the preprocessed chaotic sequence and the odd-numbered bits and the even-numbered bits of the binary bit stream subjected to parallel-serial conversion to obtain an encrypted binary bit stream.
5. The method for safely transmitting an image based on ACO-OFDM visible light communication according to claim 1, wherein the transmitting-side step (4) specifically comprises:
(4.1) performing m-QAM quadrature amplitude modulation on the encrypted binary bit stream to obtain a QAM symbol stream;
(4.2) preprocessing the other two of the four chaotic sequences, wherein the processed chaotic sequences only comprise-1 and-1;
and (4.3) multiplying the preprocessed chaotic sequence by the real part and the imaginary part of the QAM symbol stream respectively.
6. The image security transmission method based on ACO-OFDM visible light communication according to claims 1 to 5, wherein the decryption method corresponding to the receiving end specifically comprises:
the receiving end step (3) corresponds to the decryption of the encrypted QAM symbol stream in the transmitting end step (4), and the same chaotic sequence key in the transmitting end step (4) is adopted to decrypt the received encrypted QAM symbol stream;
the step (4) of the receiving end corresponds to the step (3) of decrypting the encrypted binary bit stream of the transmitting end, and the same chaotic sequence key of the step (3) of the transmitting end is adopted to decrypt the received encrypted binary bit stream;
the receiving end step (5) corresponds to the decryption of the encrypted image in the transmitting end step (1), the received binary real value calculation hologram is subjected to primary standard Fourier transform to obtain the encrypted image and conjugate thereof, and the-1-level reproduction conjugate image is subjected to two Fresnel diffraction and modulation decryption of two random phase plates to recover the original image.
CN202310453091.3A 2023-04-25 2023-04-25 Image safe transmission method based on ACO-OFDM visible light communication Pending CN116389651A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310453091.3A CN116389651A (en) 2023-04-25 2023-04-25 Image safe transmission method based on ACO-OFDM visible light communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310453091.3A CN116389651A (en) 2023-04-25 2023-04-25 Image safe transmission method based on ACO-OFDM visible light communication

Publications (1)

Publication Number Publication Date
CN116389651A true CN116389651A (en) 2023-07-04

Family

ID=86969354

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310453091.3A Pending CN116389651A (en) 2023-04-25 2023-04-25 Image safe transmission method based on ACO-OFDM visible light communication

Country Status (1)

Country Link
CN (1) CN116389651A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117375876A (en) * 2023-08-24 2024-01-09 南京信息工程大学 High-safety communication method based on dynamic aliasing of time domain spectrum on digital domain

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117375876A (en) * 2023-08-24 2024-01-09 南京信息工程大学 High-safety communication method based on dynamic aliasing of time domain spectrum on digital domain

Similar Documents

Publication Publication Date Title
CN111525998B (en) High-reliability optical transmission method based on mode, time slot and frequency composite vector
CN111934848B (en) Intelligent optimized four-dimensional chaotic vector encryption orthogonal transmission method
CN112019321B (en) Five-dimensional optical probability shaping encryption method based on high-dimensional chaotic system
CN112165378B (en) Low-PAPR high-safety optical access method with high resource utilization rate
CN105577360B (en) A kind of OOFDM encryption systems based on chaos sequence mapping
CN111342957B (en) Method and device for distributing CO-OFDM (CO-orthogonal frequency division multiplexing) key based on Y-00 protocol
Padmapriya et al. ECC joins first time with SC-FDMA for Mission “security”
Zhou et al. Physical layer dynamic key encryption in OFDM-PON system based on cellular neural network
Li et al. Secure key distribution strategy in OFDM-PON by utilizing the redundancy of training symbol and digital chaos technique
CN111786771B (en) Polarization, phase and mode dynamic disturbance method
CN116389651A (en) Image safe transmission method based on ACO-OFDM visible light communication
Wang et al. Physical layer encryption in DMT based on digital multi-scroll chaotic system
Wu et al. Joint security enhancement and PAPR mitigation for OFDM-NOMA VLC systems
Liu et al. A novel chaos-based physical layer security transmission scheme for Internet of Things
CN117749278A (en) NOMA transmission system based on constellation diagram transformation and chaos enhancement
Ni et al. PHY‐Aided Secure Communication via Weighted Fractional Fourier Transform
Wang et al. Data Center Secure Communication via DNA Hyperchaotic Encryption
Wang et al. Multi-Gbit/s real-time modems for chaotic optical OFDM data encryption and decryption
Tran et al. Performance evaluation of 802.11 ah physical layer phase encryption for IoT applications
CN114257368B (en) OFDM transmission method and device based on floating probability and bubble sequencing encryption
Tang et al. FBMC/OQAM security strategy based on diversity DNA encryption
Wang et al. Secure image transmission in orthogonal frequency division multiplexing visible light communication systems
Ameen et al. Hyperchaotic based encrypted audio transmission via massive MIMO-GFDM system using DNA coding in the antenna index of PSM
Xu et al. Diffusion-assisted quantum noise stream cipher for physical layer security in UFMC
Yang et al. Physical layer signal encryption using digital chaos in OFDM-PON

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination