CN116633524A - Incoherent optical phase disturbance encryption method, device, storage medium and equipment - Google Patents

Incoherent optical phase disturbance encryption method, device, storage medium and equipment Download PDF

Info

Publication number
CN116633524A
CN116633524A CN202310714004.5A CN202310714004A CN116633524A CN 116633524 A CN116633524 A CN 116633524A CN 202310714004 A CN202310714004 A CN 202310714004A CN 116633524 A CN116633524 A CN 116633524A
Authority
CN
China
Prior art keywords
image
encryption
plaintext
chaotic
random
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310714004.5A
Other languages
Chinese (zh)
Inventor
刘博�
任建新
毛雅亚
查永鹏
吴翔宇
吴泳锋
孙婷婷
赵立龙
戚志鹏
李莹
王凤
哈特
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing University of Information Science and Technology
Original Assignee
Nanjing University of Information Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing University of Information Science and Technology filed Critical Nanjing University of Information Science and Technology
Priority to CN202310714004.5A priority Critical patent/CN116633524A/en
Publication of CN116633524A publication Critical patent/CN116633524A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
    • H04L9/0662Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
    • H04L9/0668Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator producing a non-linear pseudorandom sequence
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Abstract

The application discloses a incoherent optical phase disturbance encryption method, a device, a storage medium and equipment, belonging to the technical field of optical communication, wherein the method comprises the following steps: acquiring a first plaintext image and a second plaintext image; carrying out chaotic encryption on the first plaintext image through a chaotic system to obtain a first ciphertext image, and storing a key in a chaotic encryption process into the second plaintext image; mapping the gray value of the first ciphertext image into a pseudo-random phase map; using the pseudo-random phase map as a phase map in a phase-only disturbed incoherent image encryption process to carry out incoherent image encryption on the second plaintext image to obtain a second ciphertext image; the application can improve the transmission safety.

Description

Incoherent optical phase disturbance encryption method, device, storage medium and equipment
Technical Field
The application relates to a non-coherent optical phase disturbance encryption method, a device, a storage medium and equipment, belonging to the technical field of optical communication.
Background
Light waves act as an information carrier and can be used for information transfer, information encoding and information encryption. With the acceleration of globalization and informatization processes in recent years, communication plays an increasingly important role in our daily lives. And the importance of information security is increasingly highlighted, so research on information encryption technology is getting hotter, and this is a good method for encoding and encrypting information with an optical wavefront.
In the conventional optical hologram technology, there are several unavoidable problems that prevent the optical hologram technology from being widely used in real life. First, a laser source with a relatively good coherence length is required both during recording and during reconstruction, but laser development has been very mature over the years and this problem has been solved. Secondly, since the holographic recording process is a recording process of two-beam light interference process, the relative change of the optical path length of the object light and the reference light is required to be smaller than one wavelength in the recorded exposure time, otherwise, the clear and sharp interference fringes become blurred to influence the recording effect of the hologram. The requirements of the condition on the experimental environment are very strict, and external vibration and defects of elements can greatly influence the recording process. It is also the dynamic range of the recording medium and its non-linear response to the exposure light intensity that limits the quality of the recorded holograms. It is not difficult to find that the limiting factor of optical holography is almost all focused on the recording process, and if a method can replace the recording process, the application range of the holography is greatly expanded. As early as 1995, javidi et al proposed a dual random phase image encryption method. Image encryption systems using a dual random phase fractional fourier transform and a fresnel transform have been proposed. With the development of image encryption research, other methods such as a phase recovery method, an interferometry image encryption method and a ghost image encryption method have been proposed. However, these methods all use laser with better coherence as a light source, and have the disadvantages of high system cost, poor external interference resistance, relatively complex system construction and the like. In order to solve these problems, tajahuerce et al in 2001 have proposed a method of encrypting an image with incoherent light illumination, but have not attracted much attention because of its relatively complex system design.
In summary, the following drawbacks exist in the prior art: the problem of low system security caused by the structural design of a traditional incoherent phase disturbance encryption system.
Disclosure of Invention
The application aims to provide a non-coherent optical phase disturbance encryption method, a device, a storage medium and equipment, which solve the problem of low security in the prior art.
In order to achieve the above purpose, the application is realized by adopting the following technical scheme:
in a first aspect, the present application provides a method for encrypting incoherent optical phase disturbances, comprising:
acquiring a first plaintext image and a second plaintext image;
carrying out chaotic encryption on the first plaintext image through a chaotic system to obtain a first ciphertext image, and storing a key in a chaotic encryption process into the second plaintext image;
mapping the gray value of the first ciphertext image into a pseudo-random phase map;
and taking the pseudo-random phase map as a phase map in a phase-only disturbed incoherent image encryption process to carry out incoherent image encryption on the second plaintext image so as to obtain a second ciphertext image.
With reference to the first aspect, further, the performing, by the chaotic system, chaotic encryption on the first plaintext image to obtain a first ciphertext image includes:
s001, generating a pseudo-random sequence by adopting an LSS chaotic system;
s002, inserting externally generated random pixels to the periphery of the first plaintext image through MIE-BX;
s003, constructing a scrambling matrix with the same data type and size as the first plaintext image after random pixel insertion through two chaotic sequences, and scrambling the first plaintext image according to the scrambling matrix to obtain a scrambled image;
s004, performing pixel adaptive diffusion on the scrambled image to obtain a diffusion image;
s005, replacing the diffusion image with the first plaintext image, and repeating the steps S003 and S004 to obtain a first ciphertext image.
With reference to the first aspect, further, the generating a pseudo random sequence by using the LSS chaotic system includes:
acquiring a 256-bit security key;
respectively calculating and generating 4 floating point numbers by using the first 4 52 long bit streams of the security key, and respectively calculating and generating 2 integers by using the last 2 24 long bit streams of the security key;
generating initial values and parameters of the LSS chaotic system through the following calculation:
wherein i=1 or 2,is the initial value of the LSS chaotic system, r i Is a parameter of an LSS chaotic system, x 0 Is a first floating point number, R is a second floating point number, R i Is a third floating point number or a fourth floating point number, d i Is said integer;
based on the initial value and the parameter, a pseudo-random generator in the LSS chaotic system generates a pseudo-random sequence.
With reference to the first aspect, further, the inserting, by MIE-BX, externally generated random pixels around the first plaintext image includes:
inserting row vectors with the size of 2 XN to the highest end and the lowest end of the first plaintext image respectively through MIE-BX;
column vectors having a size of (m+2) ×2 are inserted to the leftmost end and the rightmost end of the first plain image, respectively, by MIE-BX.
With reference to the first aspect, further, the scrambling the first plaintext image according to the scrambling matrix to obtain a scrambled image includes:
let the column index number j be 1, then the column index will be set at position (1, S 1,j ),(2,S 2,j ),...,(M,S M,j ) The pixels are connected end to end and cyclically shifted upward S 1,j A unit, then, repeatedly performing the above process until j=n, where M and N are determined during the process of inserting random pixels, and finally obtaining a scrambled image, where is an S scrambling matrix, S 1,j Represents the 1 st row, the j th column, S of the scrambling matrix 2,j Represents the 2 nd row, the j th column, S of the scrambling matrix M,j Representing the mth row and the jth column of the scrambling matrix.
With reference to the first aspect, further, the performing pixel adaptive diffusion on the scrambled image to obtain a diffused image includes:
pixel-adaptive diffusion is performed on the scrambled image by:
wherein C is i,j Is the pixel of the ith row and jth column of the diffusion image, T i,j Is to scramble the pixels of the ith row and jth column of the image,representing exclusive OR, T M,N 、T M,(j-1) And T (i-1),j Pixels respectively representing the nth column of the M-th row, the jth-1 column of the M-th row and the jth column of the i-1 th row of the scrambled image, Q i,j The pixels representing the ith row and jth column of the random pixel matrix are generated by a pseudo-random generator in the LSS chaotic system according to different initial values and parameters, i=1, 2.
In a second aspect, the present application also provides an incoherent optical phase disturbance encryption device, including:
an image acquisition module for: acquiring a first plaintext image and a second plaintext image;
the chaotic encryption module is used for: carrying out chaotic encryption on the first plaintext image through a chaotic system to obtain a first ciphertext image, and storing a key in a chaotic encryption process into the second plaintext image;
an image mapping module for: mapping the gray value of the first ciphertext image into a pseudo-random phase map;
a non-coherent image encryption module for: and taking the pseudo-random phase map as a phase map in a phase-only disturbed incoherent image encryption process to carry out incoherent image encryption on the second plaintext image so as to obtain a second ciphertext image.
With reference to the second aspect, further, the chaotic encryption module performs chaotic encryption on the first plaintext image through a chaotic system to obtain a first ciphertext image, and the chaotic encryption method includes:
generating a pseudo-random sequence by adopting an LSS chaotic system;
inserting externally generated random pixels to the periphery of the first plaintext image through MIE-BX;
constructing a scrambling matrix with the same data type and size as the first plaintext image after random pixel insertion through two chaotic sequences, and scrambling the first plaintext image according to the scrambling matrix to obtain a scrambled image;
performing pixel adaptive diffusion on the scrambled image to obtain a diffusion image;
and replacing the diffusion image with the first plaintext image, and repeating the steps to obtain the first ciphertext image.
In a third aspect, the present application also provides a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the incoherent optical phase disturbance encryption method according to any one of the first aspects.
In a fourth aspect, the present application also provides an apparatus comprising:
a memory for storing instructions;
a processor configured to execute the instructions, causing the apparatus to perform implementing the incoherent optical phase perturbation encryption method according to any one of the first aspect.
Compared with the prior art, the application has the following beneficial effects:
according to the incoherent optical phase disturbance encryption method, the device, the storage medium and the equipment provided by the application, a random phase plate in an incoherent phase disturbance encryption system is replaced by a pseudo-random phase plate generated by mapping after chaotic encryption of a first plaintext image, another second plaintext image loaded with a chaotic encryption key is encrypted, and then the first plaintext image is decrypted by utilizing key information stored in the second plaintext image, so that the quality of the decrypted image is improved, and the security is increased; the phase plate information is obtained by using the chaotic encryption method, and incoherent image encryption and chaotic encryption are combined, so that the key space of an encryption system is obviously improved, the possibility of cracking two images at the same time is reduced, and the safety is improved.
Drawings
FIG. 1 is a flow chart of a method for encrypting incoherent optical phase disturbance provided by an embodiment of the present application;
fig. 2 is a transmission flow chart of an incoherent optical phase disturbance encryption method applied in optical transmission according to an embodiment of the present application;
fig. 3 is a schematic diagram of a transmission process of an incoherent optical phase disturbance encryption method applied in an optical transmission system according to an embodiment of the present application;
fig. 4 is a schematic diagram of chaotic encryption provided in an embodiment of the present application;
fig. 5 is a schematic diagram of a incoherent optical encryption system with random phase scrambling according to an embodiment of the present application.
Detailed Description
The present application will be further described with reference to the accompanying drawings, and the following examples are only for more clearly illustrating the technical aspects of the present application, and are not to be construed as limiting the scope of the present application.
Example 1
As shown in fig. 1, an embodiment of the present application provides an incoherent optical phase disturbance encryption method applied to a transmitting end in fig. 2, including the following steps:
s1, acquiring a first plaintext image and a second plaintext image.
The first plaintext image corresponds to the plaintext image a in fig. 2 and 3, the second plaintext image corresponds to the plaintext image B in fig. 2 and 3, and in step S1, the transmitting end acquires the first plaintext image and the second plaintext image.
S2, performing chaotic encryption on the first plaintext image through a chaotic system to obtain a first ciphertext image, and storing a secret key in a chaotic encryption process into the second plaintext image.
The sensitivity of the chaotic system to the initial value is extremely high, which makes the chaotic system and cryptography have an indispensible relation. In recent years, with the rapid development of chaotic cryptography, chaos has been applied to image encryption. The chaos-based image encryption method is similar to the traditional image encryption method, and the basic principle is still scrambling and diffusion. The purpose of scrambling is to change the pixel position in the image, destroy the correlation between adjacent pixels, make it difficult for an attacker to get the key; diffusion is to scatter redundancy in the plaintext to hide the plaintext features and improve the sensitivity of the plaintext to ciphertext, and enhance the resistance to differential attack.
The chaotic encryption process based on the chaotic system is shown in fig. 4, and comprises the following steps:
s001, key distribution: in the two-round scrambling-diffusion encryption process, a Logistic-Sine system (LSS) chaotic system is adopted to generate a pseudo-random sequence; the initial conditions and system parameters of the LSS chaotic system are generated by a 256-bit long security key K, and first, 4 floating point numbers (x 0 、r、R 1 、R 2 ) Integer d 1 And d 2 Then the last 2 24 long bitstreams of key K are used for generation;
generating initial values and parameters of the LSS chaotic system through the following calculation
Wherein i=1 or 2,is the initial value of the LSS chaotic system, r i Is a parameter of an LSS chaotic system, x 0 Is a first floating point number, R is a second floating point number, R i Is a third floating point number or a fourth floating point number, d i Is an integer;
finally, using the generated initial values and parameters, a pseudo-random sequence is generated by a pseudo-random generator LSS-PRNG in the original algorithm, and the generated sequence is further used to construct a key correlation matrix at the high speed scrambling and pixel spreading stage.
S002, random pixel insertion: inserting externally generated random pixels around the first plaintext image by MIE-BX before performing two rounds of scrambling-spreading operations on the first plaintext image; specifically, row vectors having a size of 2×n are inserted into the highest and lowest ends of the first plain image, respectively, by MIE-BX, and column vectors having a size of (m+2) ×2 are inserted into the leftmost and rightmost ends of the first plain image, respectively, by MIE-BX.
S003, high-speed scrambling: using chaos sequences C and D to construct a scrambling matrix S with the same data type and size as the first plaintext image after inserting random pixels, making the column index number j 1, then locating the scrambling matrix S at the positions (1, S 1,j ),(2,S 2,j ),...,(M,S M,j ) The pixels are connected end to end and cyclically shifted upward S 1,j A unit, then, repeatedly performing the above process until j=n, where M and N are determined during the process of inserting random pixels, and finally obtaining a scrambled image T, where is an S scrambling matrix, S 1,j Represents the 1 st row, the j th column, S of the scrambling matrix 2,j Represents the 2 nd row, the j th column, S of the scrambling matrix M,j Representing the mth row and the jth column of the scrambling matrix.
S004, pixel adaptive diffusion: the random pixel matrix Q and the previous pixel of the current position pixel ciphertext are used to encrypt the pixel value of T, while for different numbers of rounds, Q is generated by a pseudo-random generator LSS-PRNG with different initial values and parameters, the result C of the last 1 round of encryption i,j Can be obtained by the following formula:
wherein C is i,j Is the pixel of the ith row and jth column of the diffusion image, T i,j Is to scramble the pixels of the ith row and jth column of the image,representing exclusive OR, T M,N 、T M,(j-1) And T (i-1),j Pixels respectively representing the nth column of the M-th row, the jth-1 column of the M-th row and the jth column of the i-1 th row of the scrambled image, Q i,j The pixels representing the ith row and jth column of the random pixel matrix are generated by a pseudo-random generator in the LSS chaotic system according to different initial values and parameters, i=1, 2.
S005, the steps S003-S003 of scrambling-diffusion are iterated once to obtain a final encryption result: a first ciphertext image.
And S3, mapping the gray value of the first ciphertext image into a pseudo-random phase map.
The gray value of the encrypted first ciphertext image is mapped into a phase map of 0-2pi, and since the chaotic encrypted image approximates white noise, the phase map generated from the chaotic encrypted image is hereinafter referred to as a pseudo-random phase map.
S4, using the pseudo-random phase map as a phase map in a phase-only disturbing incoherent image encryption process to carry out incoherent image encryption on the second plaintext image, and obtaining a second ciphertext image.
Taking the pseudo-random phase diagram generated in the step S3 as a phase diagram in a phase-only disturbing incoherent image encryption process, and carrying out incoherent image encryption on a second plaintext image, wherein a system schematic diagram of the encryption process is shown in FIG. 5:
the original image on the input plane is illuminated by the space incoherent light, then disturbed by the random phase plate, finally imaged on the output plane by the lens, and then the encrypted image is directly shot by the CCD. This encryption system is relatively simple and efficient. And a spatially incoherent image encryption system can be regarded as a linear superposition system of intensity point spread functions. Thus, the light intensity distribution on the final output plane can be expressed as a convolution of the input light intensity with the system point spread function:
wherein I is out Is the light intensity of the output plane, I in Is the light intensity of the input plane, I psf Is the point spread function of the system,is a convolution operator.
Writing equation (3) as a standard convolution integral form is:
I out (ξ,η)=∫∫I in (x,y)I psf (ξ-x,η-y)dxdy (4)。
from equation (3) we can see that if the point spread function of a system is already given, we can get the input light intensity distribution by deconvolution of the output light intensity and the system point spread function. Therefore, the numerical decryption process of the incoherent encryption system is actually a process of deconvolution operation. It is thus clear that the key to analyzing this encryption system is its point spread function. When the input is an infinitely small point source, we can consider the encryption system as a coherent optical system, and as a coherent optical system, its system transfer function can be calculated by fresnel diffraction, and we analyze the point spread function of the system as follows.
With one pixel loading on the spatial light modulator as a point source, then the light field distribution at the front surface of the random phase plate can be expressed by the expression fresnel diffraction as follows:
where lambda is the center wavelength of the incoherent light source, k is the spatial wavenumber,f is the focal length of the LENS, d is the distance between RPM and LENS in FIG. 5, LED is commonly referred to as a light emitting diode, SLM is commonly referred to as a spatial light modulator, RPM is commonly referred to as a random phase plate, LENS is commonly referred to as a LENS, and CCD is commonly referred to as a CCD camera (Charge Coupled Device Camera).
It is assumed that the phase modulation of the random phase plate (RPM) can be expressed by:
where A (x, y) is the pupil function of the random phase plate,is the phase modulation function of the random phase plate;
the square distribution after passing through the lens can be expressed as:
after propagation over a distance 2f, the final complex amplitude distribution in the output plane can be expressed as follows:
the light intensity distribution recorded at the CCD plane can be expressed as:
in the formula (9), C is a constant, and the finally recorded light intensity distribution is the point spread function I of the incoherent encryption system psf . For the decryption process, we can express as follows by a deconvolution formula:
wherein F is a Fourier transform, F -1 Is an inverse fourier transform.
As shown in fig. 2 and 3, the transmission process of the two images in the whole system includes:
step 1: and carrying out chaotic encryption on the plaintext image A by adopting a proper chaotic system, and storing a secret key of the chaotic encryption into the plaintext image B.
Step 2: and transmitting the encrypted ciphertext image A in the system, and temporarily storing the ciphertext image A by a receiving end.
Step 3: the same mapping mode is used at the transmitting end and the output end, the gray value of the encrypted ciphertext image A is mapped into a phase diagram of 0-2pi, and the phase diagram generated from the chaotic encrypted image is hereinafter referred to as a pseudo-random phase diagram because the chaotic encrypted image approximates white noise.
Step 4: and (3) encrypting and transmitting the plaintext image B by taking the pseudo-random phase map generated in the step (3) as a phase map in incoherent image encryption with pure phase scrambling.
Step 5: and (3) decrypting the encrypted ciphertext image B by using the pseudo-random phase map generated in the step (3) at the receiving end to obtain the key information of the plaintext image B and the chaotic encrypted ciphertext image A.
Step 6: and decrypting the ciphertext image A by using the key information to obtain a plaintext image A.
Example 2
The embodiment of the application also provides a noncoherent optical phase disturbance encryption device, which comprises:
an image acquisition module for: acquiring a first plaintext image and a second plaintext image;
the chaotic encryption module is used for: carrying out chaotic encryption on the first plaintext image through a chaotic system to obtain a first ciphertext image, and storing a key in a chaotic encryption process into the second plaintext image;
an image mapping module for: mapping the gray value of the first ciphertext image into a pseudo-random phase map;
a non-coherent image encryption module for: and taking the pseudo-random phase map as a phase map in a phase-only disturbed incoherent image encryption process to carry out incoherent image encryption on the second plaintext image so as to obtain a second ciphertext image.
The chaotic encryption module performs chaotic encryption on the first plaintext image through a chaotic system to obtain a first ciphertext image, and the chaotic encryption module comprises the following steps:
s001, generating a pseudo-random sequence by adopting an LSS chaotic system;
s002, inserting externally generated random pixels to the periphery of the first plaintext image through MIE-BX;
s003, constructing a scrambling matrix with the same data type and size as the first plaintext image after random pixel insertion through two chaotic sequences, and scrambling the first plaintext image according to the scrambling matrix to obtain a scrambled image;
s004, performing pixel adaptive diffusion on the scrambled image to obtain a diffusion image;
s005, replacing the diffusion image with the first plaintext image, and repeating the steps S003 and S004 to obtain a first ciphertext image.
Example 3
The embodiment of the present application also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the incoherent optical phase disturbance encryption method as provided in embodiment 1:
acquiring a first plaintext image and a second plaintext image;
carrying out chaotic encryption on the first plaintext image through a chaotic system to obtain a first ciphertext image, and storing a key in a chaotic encryption process into the second plaintext image;
mapping the gray value of the first ciphertext image into a pseudo-random phase map;
and taking the pseudo-random phase map as a phase map in a phase-only disturbed incoherent image encryption process to carry out incoherent image encryption on the second plaintext image so as to obtain a second ciphertext image.
Example 4
The embodiment of the application also provides equipment, which comprises:
a memory for storing instructions;
a processor configured to execute the instructions, cause the apparatus to perform implementing an incoherent optical phase perturbation encryption method as provided in embodiment 1:
acquiring a first plaintext image and a second plaintext image;
carrying out chaotic encryption on the first plaintext image through a chaotic system to obtain a first ciphertext image, and storing a key in a chaotic encryption process into the second plaintext image;
mapping the gray value of the first ciphertext image into a pseudo-random phase map;
and taking the pseudo-random phase map as a phase map in a phase-only disturbed incoherent image encryption process to carry out incoherent image encryption on the second plaintext image so as to obtain a second ciphertext image.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The foregoing is merely a preferred embodiment of the present application, and it should be noted that modifications and variations could be made by those skilled in the art without departing from the technical principles of the present application, and such modifications and variations should also be regarded as being within the scope of the application.

Claims (10)

1. A method of incoherent optical phase disturbance encryption, comprising:
acquiring a first plaintext image and a second plaintext image;
carrying out chaotic encryption on the first plaintext image through a chaotic system to obtain a first ciphertext image, and storing a key in a chaotic encryption process into the second plaintext image;
mapping the gray value of the first ciphertext image into a pseudo-random phase map;
and taking the pseudo-random phase map as a phase map in a phase-only disturbed incoherent image encryption process to carry out incoherent image encryption on the second plaintext image so as to obtain a second ciphertext image.
2. The incoherent optical phase disturbance encryption method according to claim 1, wherein the performing chaotic encryption on the first plaintext image by using a chaotic system to obtain a first ciphertext image includes:
s001, generating a pseudo-random sequence by adopting an LSS chaotic system;
s002, inserting externally generated random pixels to the periphery of the first plaintext image through MIE-BX;
s003, constructing a scrambling matrix with the same data type and size as the first plaintext image after random pixel insertion through two chaotic sequences, and scrambling the first plaintext image according to the scrambling matrix to obtain a scrambled image;
s004, performing pixel adaptive diffusion on the scrambled image to obtain a diffusion image;
s005, replacing the diffusion image with the first plaintext image, and repeating the steps S003 and S004 to obtain a first ciphertext image.
3. The method of encrypting incoherent optical phase disturbance according to claim 2, wherein said generating a pseudo-random sequence using an LSS chaotic system includes:
acquiring a 256-bit security key;
respectively calculating and generating 4 floating point numbers by using the first 4 52 long bit streams of the security key, and respectively calculating and generating 2 integers by using the last 2 24 long bit streams of the security key;
generating initial values and parameters of the LSS chaotic system through the following calculation:
wherein i=1 or 2,is the initial value of the LSS chaotic system, r i Is a parameter of an LSS chaotic system, x 0 Is a first floating point number, R is a second floating point number, R i Is a third floating point number or a fourth floating point number, d i Is said integer;
based on the initial value and the parameter, a pseudo-random generator in the LSS chaotic system generates a pseudo-random sequence.
4. The incoherent optical phase disturbance encryption method according to claim 2, wherein the inserting externally generated random pixels around the first plaintext image by MIE-BX includes:
inserting row vectors with the size of 2 XN to the highest end and the lowest end of the first plaintext image respectively through MIE-BX;
column vectors having a size of (m+2) ×2 are inserted to the leftmost end and the rightmost end of the first plain image, respectively, by MIE-BX.
5. The method of encrypting a non-coherent optical phase disturbance according to claim 2, wherein said scrambling the first plaintext image according to the scrambling matrix to obtain a scrambled image includes:
let the column index number j be 1, then the column index will be set at position (1, S 1,j ),(2,S 2,j ),...,(M,S M,j ) The pixels are connected end to end and cyclically shifted upward S 1,j A unit, then, repeatedly performing the above process until j=n, where M and N are determined during the process of inserting random pixels, and finally obtaining a scrambled image, where is an S scrambling matrix, S 1,j Represents the 1 st row, the j th column, S of the scrambling matrix 2,j Represents the 2 nd row, the j th column, S of the scrambling matrix M,j Representing the mth row and the jth column of the scrambling matrix.
6. The method of encrypting incoherent optical phase disturbance according to claim 2, wherein performing pixel-adaptive diffusion on the scrambled image to obtain a diffused image includes:
pixel-adaptive diffusion is performed on the scrambled image by:
wherein C is i,j Is the pixel of the ith row and jth column of the diffusion image, T i,j Is to scramble the pixels of the ith row and jth column of the image,representing exclusive OR, T M,N 、T M,(j-1) And T (i-1),j Pixels respectively representing the nth column of the M-th row, the jth-1 column of the M-th row and the jth column of the i-1 th row of the scrambled image, Q i,j Pixels representing the ith row and jth column of a random pixel matrix, the random pixel matrix being based on a pseudorandom generator in the LSS chaotic systemDifferent initial values and parameter generation, i=1, 2, M, j=1, 2,..n.
7. An incoherent optical phase disturbance encryption device, comprising:
an image acquisition module for: acquiring a first plaintext image and a second plaintext image;
the chaotic encryption module is used for: carrying out chaotic encryption on the first plaintext image through a chaotic system to obtain a first ciphertext image, and storing a key in a chaotic encryption process into the second plaintext image;
an image mapping module for: mapping the gray value of the first ciphertext image into a pseudo-random phase map;
a non-coherent image encryption module for: and taking the pseudo-random phase map as a phase map in a phase-only disturbed incoherent image encryption process to carry out incoherent image encryption on the second plaintext image so as to obtain a second ciphertext image.
8. The incoherent optical phase disturbance encryption device according to claim 7, wherein the chaotic encryption module performs chaotic encryption on the first plaintext image through a chaotic system to obtain a first ciphertext image, and the method comprises:
s001, generating a pseudo-random sequence by adopting an LSS chaotic system;
s002, inserting externally generated random pixels to the periphery of the first plaintext image through MIE-BX;
s003, constructing a scrambling matrix with the same data type and size as the first plaintext image after random pixel insertion through two chaotic sequences, and scrambling the first plaintext image according to the scrambling matrix to obtain a scrambled image;
s004, performing pixel adaptive diffusion on the scrambled image to obtain a diffusion image;
s005, replacing the diffusion image with the first plaintext image, and repeating the steps S003 and S004 to obtain a first ciphertext image.
9. A computer readable storage medium having stored thereon a computer program, which when executed by a processor, implements the incoherent optical phase disturbance encryption method according to any one of claims 1 to 6.
10. An apparatus, comprising:
a memory for storing instructions;
a processor for executing the instructions to cause the apparatus to perform implementing the incoherent optical phase perturbation encryption method according to any one of claims 1-6.
CN202310714004.5A 2023-06-15 2023-06-15 Incoherent optical phase disturbance encryption method, device, storage medium and equipment Pending CN116633524A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310714004.5A CN116633524A (en) 2023-06-15 2023-06-15 Incoherent optical phase disturbance encryption method, device, storage medium and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310714004.5A CN116633524A (en) 2023-06-15 2023-06-15 Incoherent optical phase disturbance encryption method, device, storage medium and equipment

Publications (1)

Publication Number Publication Date
CN116633524A true CN116633524A (en) 2023-08-22

Family

ID=87613447

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310714004.5A Pending CN116633524A (en) 2023-06-15 2023-06-15 Incoherent optical phase disturbance encryption method, device, storage medium and equipment

Country Status (1)

Country Link
CN (1) CN116633524A (en)

Similar Documents

Publication Publication Date Title
Li et al. Error-free holographic frames encryption with CA pixel-permutation encoding algorithm
Liu et al. Securing color image by using phase-only encoding in Fresnel domains
CN104007649B (en) Color image encryption system and encryption and decryption method based on compression holography
Abuturab Multiple color-image fusion and watermarking based on optical interference and wavelet transform
Faragallah Optical double color image encryption scheme in the Fresnel-based Hartley domain using Arnold transform and chaotic logistic adjusted sine phase masks
CN111241554A (en) Digital image encryption and decryption system based on visual password
Palevicius et al. Image communication scheme based on dynamic visual cryptography and computer generated holography
Du et al. High-efficiency optical image authentication scheme based on ghost imaging and block processing
Liu et al. Optical multilevel authentication based on singular value decomposition ghost imaging and secret sharing cryptography
Zhang et al. Single exposure phase-only optical image encryption and hiding method via deep learning
Tsang et al. Asymmetrical and biometric encrypted optical scanning holography (ABE-OSH)
Wang et al. Invertible encryption network for optical image cryptosystem
Zhong et al. Real-time high-quality computer-generated hologram using complex-valued convolutional neural network
CN116633524A (en) Incoherent optical phase disturbance encryption method, device, storage medium and equipment
Sui et al. Double-image encryption based on Yang-Gu mixture amplitude-phase retrieval algorithm and high dimension chaotic system in gyrator domain
CN113704774B (en) Optical image encryption method based on coded aperture correlation holography
Verma et al. Securing multiple information using bio-chaotic keys
Mosso An optical-cryptographic encryption scheme using a keystream synthesizer based on chaotic speckle nature
Jeon et al. Optical asymmetric cryptography modifying the RSA public-key protocol
Kong et al. Holographic lensless interference encryption based on single spatial light modulator
Yang et al. Optical 3D information encryption and rapid decryption via interferenceless coded aperture correlation holography
Vithayathil et al. Pixel-based image encryption approaches: a review
Qin et al. Optical encryption in a JTC encrypting architecture without the use of an external reference wave
Wang et al. Research on multiple-image encryption method using modified Gerchberg–Saxton algorithm and chaotic systems
Moncada et al. Experimental optical encryption with full complex modulation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination