基于相干疊加與模均等矢量分解的光學(xué)圖像加密算法
doi: 10.11999/JEIT170489
-
1.
(長沙師范學(xué)院信息與工程系 長沙 410100)
基金項目:
國家自然科學(xué)基金(41604117),湖南省科技計劃資助項目(2015JC3067)
Optical Image Encryption Algorithm Based on Coherent Superposition and Equal Modulus Vector Decomposition
-
1.
(Department of Information and Engineering, Changsha Normal University, Changsha 410100, China)
Funds:
The National Natural Science Foundation of China (41604117), The Hunan Science and Technology Plan (2015JC3067)
-
摘要: 為了解決光學(xué)圖像加密技術(shù)將密文相位信息主要集中在純相位掩碼中,使其存在輪廓顯現(xiàn)問題,該文提出相干疊加與模均等矢量分解的光學(xué)圖像加密算法。首先,對輸入圖像進(jìn)行歸一化處理;基于映射,利用輸入圖像的像素特性,生成其初值,通過迭代映射,輸出混沌相位掩碼;借助相位掩碼,對圖像完成調(diào)制,并結(jié)合Fourier變換,對調(diào)制圖像進(jìn)行處理,輸出其Fourier頻譜;再對該頻譜分別進(jìn)行等模分解,獲得兩個掩碼;再基于不同分?jǐn)?shù)階的Fourier機(jī)制,對兩個掩碼進(jìn)行變換;最后,引入相位-幅度截斷編碼技術(shù),設(shè)計單向編碼機(jī)制,通過激光束的相干疊加,輸出編碼密文的幅度與相位信息,將相位部分視為編碼密文,把幅度信息作為解密密鑰。通過等模分解技術(shù),將輸入明文演變?yōu)?個不同的相位與幅度信息,有效解決了輪廓顯現(xiàn)問題。實驗結(jié)果顯示:與當(dāng)前基于干涉原理的圖像加密機(jī)制相比,所提算法的安全性更高,有效消除了輪廓顯現(xiàn)問題。Abstract: In order to overcome the defects such as contour emerging induced by the cipher phase information mainly concentrated in the pure phase mask and difficult to resist the amplitude phase retrieval attack in current optical image encryption technology, the optical image encryption algorithm based on coherent superposition and equal modulus vector decomposition is proposed in this paper. Firstly, the optical image is normalized, and the initial value of Logistic map is generated using the pixel characteristics of plaintext, and the random phase mask is outputted by iterative the logistic map. Then the image is modulated by random phase function, and the modulated image is processed based on Fourier transform to output the Fourier spectrum. Then, the Fourier spectrum is decomposed equal module to obtain two masks. Each mask is transformed based on Fourier mechanism with different fractional order. Finally, a one-way coding scheme is designed based on phase - amplitude truncation coding technique to get the amplitude and phase information of each Fourier spectrum, which regards the phase part as coding cipher, and the amplitude information as the decryption key. The input plaintext is transformed into 4 different information of phases and amplitudes using the equal modulus vector decomposition technique to solve effectively the problem of contour representation. The experimental results show that the proposed algorithm has higher security for effectively solving the contour appearance problem compared with current image encryption schemes based on the interference theory.
-
李凱佳, 俞銳剛, 袁凌云. 基于DNA-記憶元胞自動機(jī)與Hash函數(shù)的圖像加密算法[J]. 計算機(jī)工程與設(shè)計, 2017, 38(2): 470-477. doi: 10.16208/j.issn1000-7024.2017.02.036. LIU Xingbin, MEI Wenbo, and DU Huiqian. Optical image encryption based on compressive sensing and chaos in the fractional Fourier domain[J]. Journal of Modern Optics, 2014, 61(19): 1570-1577. doi: 10.1080/09500340.2014.946565. LI Kaijia, YU Ruigang, and YUAN Linyun. Image encryption algorithm based on DNA-cellular automata and Hash function[J]. Computer Engineering and Design, 2017, 38(2): 470-477. doi: 10.16208/j.issn1000-7024.2017.02.036. 沈?qū)W舉, 劉旭敏, 蔡寧. 非線性JTC光學(xué)圖像加密系統(tǒng)及其消噪音和抗攻擊特性研究[J]. 中國激光, 2015, 42(7): 284-290. doi: 10.3788/CJL201542.0709003. SHEN Xueju, LIU Xumin, and CAI Ning. Nonlinear JTC optical image encryption system and its characteristics of noise reduction and anti attack[J]. Chinese Journal of Laser, 2015, 42(7): 284-290. doi: 10.3788/CJL201542.0709003. 朱薇, 楊庚, 陳蕾. 基于混沌的改進(jìn)雙隨機(jī)相位編碼圖像加密算法[J]. 光子學(xué)報, 2014, 34(6): 58-68. doi: 10.3788/AOS 201434.0607001. ZHU Wei, YANG Geng, and CHEN Lei. Improved double random phase coded image encryption algorithm based on chaos[J]. Journal of Photonics, 2014, 34(6): 58-68. doi: 10.3788/AOS201434.0607001. DENG Xiaopeng. Optical multiple-image encryption based on fully phase encoding and interference[J]. Optik- International Journal for Light and Electron Optics, 2015, 126(21): 3210-3214. doi: 10.1016/j.ijleo.2015.07.148. CHEN Linfei, LIU Jingyu, and WEN Jisen. A new optical image encryption method based on multi-beams interference and vector composition[J]. Optics Laser Technology, 2015, 69(18): 70-86. doi: 10.1016/j.optlastec.2014.12.007. 曾大奎, 馬利紅, 劉健. 基于兩步正交相移干涉的振幅圖像光學(xué)加密技術(shù)[J]. 光子學(xué)報, 2012, 41(1): 72-76. doi: 10.3788/ gzxb20124101.0072. ZENG Dakui, MA Hongli, and LIU Jian. Optical image encryption based on two step quadrature phase shifting interferometry[J]. Journal of Photonics, 2012, 41(1): 72-76. doi: 10.3788/gzxb20124101.0072. ADELADE Nicole Kengnou Telem. A simple and robust gray image encryption scheme using chaotic logistic map and artificial neural network[J]. Advances in Multimedia, 2014, 77(1): 1201-1213. doi: 10.1155/2014.602921. ZHAO Tieyu, RAN Qiwen, and YUAN Lin. Securities of image encryption scheme based on multi-parameter fractional Fourier transform[J]. Optics Communications, 2016, 376(19): 47-51. doi: 10.1016/j.optcom.2016.05.016. SUN Qiudong, ZUO Jiancun, and SHAO Yufeng. A dual image scrambling method based on discrete cosine transform [J]. Applied Mechanics and Materials, 2016, 556(110): 4722-4725. doi: 10.4028/www.scientific.net/AMM.556-562. 4722. WAN Qin and XIANG Penng. Asymmetric cryptosystem based on phase-truncated Fourier transforms[J]. Optics Letters, 2010, 35(2): 118-125. doi: 10.1364/OL.35.000118. WANG Qu, GUO Qing, and LEI Liang. Optical interference- based image encryption using circular harmonic expansion and spherical illumination in gyrator transform domain[J]. Optics Communications, 2015, 346(19): 124-132. doi: 10.1016 /j.optcom.2015.02.040. 王帥, 孫偉, 郭一楠. 一種多混沌快速圖像加密算法的設(shè)計與分析[J]. 計算機(jī)應(yīng)用研究, 2015, 32(2): 512-515. doi: 10.3969 /j.issn.1001-3695.2015.02.042. WANG Shuai, SUN Wei, and GUO Yinan. Design and analysis of a fast image encryption algorithm based on chaos [J]. Computer Application Research, 2015, 32(2): 512-515. doi: 10.3969/j.issn.1001-3695.2015.02.042. 侯俊峰, 黃素娟, 司徒國海. 非線性光學(xué)圖像加密[J]. 光學(xué)學(xué)報, 2015, 35(8): 85-90. doi: 10.3788/AOS201535.0807001. HOU Junfeng, HUANG Sujuan, and SITU Guohai. Nonlinear optical image encryption[J]. Acta Optical Sinica, 2015, 35(8): 85-90. doi: 10.3788/AOS201535.0807001. CHEN Linfei, HE Bingyu, and CHEN Xudong. Optical image encryption based on multi-beam interference and common vector decomposition[J]. Optics Communications, 2016, 361(15): 6-12. doi: 10.1016/j.optcom.2015.10.037. 汪小剛. 基于雙隨機(jī)相位編碼和干涉原理的圖像加密技術(shù)的研究[D]. 浙江大學(xué), 2013, 76-79. WANG Xiaogang. Research on image encryption based on double random phase encoding and interference theory[D]. Zhejiang University, 2013, 76-79. 任曉霞, 廖曉峰, 熊永紅. 基于細(xì)胞神經(jīng)網(wǎng)絡(luò)超混沌特性的圖像加密新算法[J]. 計算機(jī)應(yīng)用研究, 2011, 31(6): 1528-1531. doi: 10.3724/SP.J.1087.2011.01528. REN Xiaoxia, LIAO Xiaofeng, and XIONG Yonghong. New algorithm of image encryption based on hyperchaos of cellular neural networks[J]. Computer Application Research, 2011, 31(6): 1528-1531. doi: 10.3724/SP.J.1087.2011.01528. CARNICER A, MONTES-USATEGUI M, ARCOS S, et al. Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys[J]. Optical Letters, 2005, 30(13): 1644-1646. doi: 10.1364/OL.30. 001644. LI Chengqing. Cracking a hierarchical chaotic image encryption algorithm based on permutation[J]. Signal Processing, 2016, 118(19): 203-211. doi: 10.1016/j.sigpro. 2015.07.008. XIANG Peng, PAN Zhang, HUANG Wei, et al. Known- plaintext attack on optical encryption based on double random phase keys[J]. Optical Letters, 2006, 31(8): 1044-1046. doi: 10.1109/SOPO.2010.5504346. -
計量
- 文章訪問數(shù): 1387
- HTML全文瀏覽量: 125
- PDF下載量: 186
- 被引次數(shù): 0