期刊文献+

基于QR码的多图像关联成像算法光学加密机理研究 被引量:3

Optical Encryption Mechanism of Multi-image Correlated Imaging Algorithm Based on QR Code
下载PDF
导出
摘要 目的研究解决多图像的关联成像加密问题。方法采用双重QR编码处理,将多图像的关联成像加密问题转变为单个QR码图像的关联成像问题。结果 QR码作为关联成像的成像物体,能在远低于传统关联成像采样率的条件下重构出清晰的图像,实现信息的高质量恢复。结论在保证图像质量的情况下,该算法的安全性较高,能有效抵抗一定的噪声攻击和统计分析攻击,并极大地减少了加密系统对多图像的加密成本。 The work aims to study and solve the problem of multi-image correlated imaging encryption. Double-QR coding was used to transform the multi-image correlated imaging encryption problem into the problem of a single QR code correlated imaging encryption. As imaging objects of correlated imaging, QR code could reconstruct clear images under the condition of being far lower than the sampling rate of traditional correlated imaging, and achieve the high quality information recovery. Under the condition of ensuring the image quality, the algorithm has higher security, can effectively resist the attacks of certain noise and statistical analysis, and greatly reduces the encryption cost of the encryption system for multiple images.
作者 张雷洪 占文杰 曾茜 康祎 樊丽萍 曾黎旺 ZHANG Lei-hong;ZHAN Wen-jie;ZENG Xi;KANG Yi;FAN Li-ping;ZENG Li-wang(University of Shanghai for Science and Technology, Shanghai 200093, China)
机构地区 上海理工大学
出处 《包装工程》 CAS 北大核心 2018年第17期228-235,共8页 Packaging Engineering
关键词 关联成像 QR码 信息熵 correlated imaging QR code information entropy
  • 相关文献

参考文献4

二级参考文献68

  • 1郭建胜,金晨辉.对基于广义猫映射的一个图像加密系统的已知图像攻击[J].通信学报,2005,26(2):131-135. 被引量:29
  • 2朱从旭,李力,陈志刚.基于多维混沌系统组合的图像加密新算法[J].计算机工程,2007,33(2):142-144. 被引量:31
  • 3Fridrich I. Symmetric ciphers based on two-dimensional chaotic maps, Int J Bif Chaos, 1998, 8(6): 1259-1284
  • 4Wang S H, Xiao I H, Wang X G, et al. Spatial orders appearing at instabilities of synchronous chaos of spatiotemporal systems. Eur Phys JB, 2002, 30(4): 571-575
  • 5Feistel H. Cryptography and computer privacy. Sci American, 1973, 228(5): 15-23
  • 6Webster A E Tavares S E, On the design of S-boxes. In: Advances in Cryptology: Proceedings of CRYPTO'85. Berlin:Springer, 1985. 523-534
  • 7Ogorzatek M J, Dedieu H, Some tools for attacking secure communication systems employing chaotic carriers. In: Proceedings of 1998 IEEE Symposium on Circuits and Systems, 1998.4:522-525
  • 8Alvarez G, Montoya F, Romera M, et al. Breaking two secure communication systems based on chaotic masking. IEEE Trans Circuits Syst, 2004, 51(10): 505-506
  • 9Hu G J, Feng Z j, Meng R L. Chosen ciphertext attack on chaos communication based on chaotic synchronization. IEEE Trans Circuits Syst, 2003, 50(20): 275-279
  • 10Chen G, Mao Y, Chui C K. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solit Fract, 2004,21(3): 749-761

共引文献95

同被引文献28

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部