期刊文献+

一种基于迭代振幅-相位恢复算法和非线性双随机相位编码的图像加密方法 被引量:8

Image Encryption Based on Iterative Amplitude-Phase Retrieval and Nonlinear Double Random Phase Encoding
原文传递
导出
摘要 提出了一种基于迭代振幅-相位恢复算法和非线性双随机相位编码的图像加密方法。该方法利用两个公开密钥和一幅"假图像"在非线性双随机相位加密系统中生成密文,接着利用迭代非线性双随机相位编码生成两个私有密钥。待加密图像和密文作为迭代加密方法中的两个限定值。解密过程则可以在经典的基于4f系统的线性的光学双随机相位编码系统中完成。该加密方法具有迭代收敛速度快、安全性高的优点。迭代该图像加密方法能够抵御最近提出的基于改进的振幅-相位恢复算法的攻击。理论分析和仿真实验都证明了此方法的有效性和可靠性。 A novel image encryption method based on iterative amplitude-phase retrieval and nonlinear double random phase encoding is proposed. In this method, a fake image is first used to generate the cipher text with the help of two public keys in the nonlinear double random phase encoding scheme. Two private keys are generated in the encryption process, where the original image to be encoded and the cipher text are applied as two constraints in the fast iterative amplitude-phase retrieval algorithm. The decryption processes can be finished in linear doubled random- phase encoding system based on 4f system. This encryption method has the advantages of fast convergence speed and high security. The proposed image encryption method has a resistance against on the amplitude-phase retrieval-based attack. The theoretical analysis and simulation experiments scheme. both validate the feasibility and security of the proposed
出处 《光学学报》 EI CAS CSCD 北大核心 2014年第8期119-124,共6页 Acta Optica Sinica
基金 国家自然科学基金(61205006) 浙江省高等学校访问学者专业发展项目(FX2013103) 浙江传媒学院校级科研项目(ZC12XJY003)
关键词 傅里叶光学 双随机相位编码 振幅-相位恢复算法 非线性加密 Fourier optics double random phase encoding amplitude-phase retrieval nonlinear encryption
  • 相关文献

参考文献21

  • 1P Refregier, B Javidi.Optical image encryption based on input plane and Fourier plane random encoding [J].Opt Lett, 1995, 20(7): 767-769.
  • 2G Unnikrishnan, J Joseph, K Singh.Optical encryption by double-random phase encoding in the fractional Fourier domain [J].Opt Lett, 2000, 25(12): 887-889.
  • 3Banghe Zhu, Shutian Liu, Qiwen Ran.Optical image encryption based on multifractional Fourier transforms [J].Opt Lett, 2000, 25(16): 1159-1161.
  • 4Guohai Situ, Jingjuan Zhang.Double random-phase encoding in the Fresnel domain [J].Opt Lett, 2004, 29(14): 1584-1586.
  • 5Guohai Situ, Jingjuan Zhang.Multiple-image encryption by wavelength multiplexing [J].Opt Lett, 2005, 30(11): 1306-1308.
  • 6Ran Tao, Yi Xin, Yue Wang.Double image encryption based on random phase encoding in the fractional Fourier domain [J].Opt Express, 2007, 15(24): 16067-16079.
  • 7Ran Tao, Jun Lang, Yue Wang.Optical image encryption based on the multiple-parameter fractional Fourier transform [J].Opt Lett, 2008, 33(6): 581-583.
  • 8Zhengjun Liu, Lie Xu, Chuang Lin, et al..Image encryption by encoding with a nonuniform optical beam in gyrator transform domains [J].Appl Opt, 2010, 49(29): 5632-5637.
  • 9Zhengjun Liu, Qing Guo, Lie Xu, et al..Double image encryption by using iterative random binary encoding in gyrator domains [J].Opt Express, 2010, 18(11): 12033-12043.
  • 10史祎诗,张静娟.相位恢复算法用于分区复用多图像加密的研究[J].光学学报,2009,29(10):2705-2708. 被引量:9

二级参考文献61

共引文献43

同被引文献54

  • 1王兴元.混沌系统的同步及在保密通信中的应用[M].北京:科学出版社,2011.
  • 2Kong Dezhao, Zhao Yan, Cao Liangcai, et al.. Three-dimensional object encryption and reconstruction based on computer generated hologram[C]. International Workshop on Holography and Related Technologies, 2014: 84-85.
  • 3Kong Dezhao, Shen Xueju, Shen Yaqin, et al.. Multi-image encryption based on interference of computer generated hologram[J]. Optik, 2014, 125(10): 2365-2368.
  • 4Tsang P W M, Poon T C. Novel method for converting digital Fresnel hologram to phase-only hologram based on bidirectional error diffusion[J]. Opt Express, 2013, 21(20): 680-685.
  • 5Donoho D L. Compressed sensing[J]. IEEE Transactions on Information Theory, 2006, 52(4): 1289-1306.
  • 6Pareek N K,Patidar V,Sud K K.Image encryption using chaotic logistic map[J].Image and Vision Computing,2006,24(9):926-934.
  • 7Kanso A,Ghebleh M.A novel image encryption algorithm based on a 3D chaotic map[J].Commun Nonlinear Sci Numer Simulat,2012,17(7):2943-2959.
  • 8Adleman L M.Molecular computation of solutions to combinatorial problems[J].Science,1994,266(11):1021-1024.
  • 9Gehani A,LaBean T H,Reif J H.DNA-based cryptography[M].Cambridge:Springer,2000,2950:167-188.
  • 10Celland C T,Risca V,Bancroft C.Hiding messages in DNA microdots[J].Nature,1999,399(6736):533-534.

引证文献8

二级引证文献66

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部