首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到18条相似文献,搜索用时 156 毫秒
1.
几种光学图象相位加密方法的比较   总被引:3,自引:1,他引:2  
本文分析比较了多种实现光学图象相位加密的方法,发现不同方法获得的加密图象有不同类型的噪音分布.无论加密相位是随机相位模板、浑沌序列的相位列阵,还是用相位重构迭代算法计算的结果,它们都能起到加密图象的功能.解密图象的质量或被相关识别的能力与解密过程中所使用正确解密相位的不同部分以及高低频分量多少有关,且其依赖程度是由不同的加密方法自身决定.  相似文献   

2.
噪音对光学图象浑沌相位列阵加密和解密的影响   总被引:1,自引:0,他引:1  
张培琨  刘家英 《光子学报》1998,27(7):593-597
本文提出了一种用浑沌相位列阵对光学图象加密和解密的方法,并重点分析了加法高斯白噪音对光学图象浑沌相位列阵加密和解密的影响.通过计算机模拟发现加密后的图象与原图象相比,抗振幅噪音的能力增强,而抗相位噪音的能力下降.在一定信噪比范围内,相位噪音是影响解密图象质量的主要因素.  相似文献   

3.
为了解决解密图像之间的串扰噪声,在基于干涉原理的多图像加密系统中引入了快速响应矩阵(QR)码。该光学加密系统加密过程使用计算机进行数字运算实现,而解密过程可以使用数字实现,也可以使用光学方法实现。加密时多组原始信息首先被转换为相应的QR码,然后多组QR码被解析地隐藏于两个纯相位板中。解密时,使用相干光照射两个纯相位板,并通过分束镜使二者的衍射光场进行叠加,再经不同的衍射距离后所得的衍射强度即为解密图像,把得到的几组解密图像直接用智能手机进行扫描,即可完全恢复原始信息。相较于原来的基于干涉原理的多图像加密方法,该加密方法成功地解决了串扰噪声问题,实现了信息的高质量恢复。计算机模拟结果证实了该方法的有效性,也分析了对裁剪和噪音攻击的稳健性。  相似文献   

4.
在传统的双随机相位光学加密系统的基础上,提出一种新的单强度记录光学加密技术。在加密时,将原始图像置于4-f系统的输入平面上进行双随机相位光学加密,利用CCD等感光器件记录输出平面上的光强分布作为密文,该光学加密过程只需一次曝光,在解密时,利用相位恢复算法进行迭代计算就可以由密文恢复原始图像。由于解密过程采用数字方式,因此可以在解密过程中引入各种数字图像处理技术来抑制散斑噪声,进一步改善解密图像质量。通过一系列仿真实验,证明该光学加密系统可以实现对二值图像和灰度图像的光学加密,并且能够很好地抵御已知明文攻击、选择明文攻击等方法的攻击。理论分析和计算机仿真表明,该光学加密技术系统结构简单,实现方便,并且不易受到各种攻击,安全性较高。  相似文献   

5.
基于相息图迭代的随机相位加密   总被引:3,自引:2,他引:3       下载免费PDF全文
刘福民  翟宏琛  杨晓苹 《物理学报》2003,52(10):2462-2465
提出了一种将随机相位加密和相位恢复算法中的求解附加相位分布分二步实施的加密方法. 由于该方法的实质是通过在随机谱和相息图之间进行相位恢复迭代以确定相息图和密钥的相 位分布,因而能够减小图像的解密误差.在相息图相位离散化的迭代过程中,采用增大设计 冗余度的方法,降低了由相位离散化所带来的解密误差.最后,通过计算机模拟实验验证了 该方法在减小图像解密误差方面的有效性. 关键词: 随机相位 光学图像加密 相息图 二元光学 离散化误差 相位恢复算法  相似文献   

6.
基于光学4f级联系统,采用前向迭代算法和通过产生多个随机相位板对图像进行了加密和解密。给出了该方法的原理和迭代实现的过程。对该方法在收敛速度、解密图像质量、相位板数目和相位量化阶数对解密图像质量的影响以及保密和安全性能等方面进行了分析和研究。模拟结果表明,该方法收敛速度快,解密图像质量好,可以降低相位板相位量化阶数有限所引起的误差对解密图像质量的影响,图像的安全和保密性能也得到了很大的提高。  相似文献   

7.
基于干涉原理的虚拟光学加密系统   总被引:2,自引:0,他引:2  
秦怡  张帅  巩琼  李根全  吕晓东 《光学学报》2012,32(10):1007001-85
提出了一种虚拟光学加密系统。该光学加密系统采用了同轴全息技术的基本架构,将被加密图像作为被记录物体,而在参考光波及干涉场光路中分别引入两个独立的随机相位板,全息面上的输出即为加密结果,这两个随机相位板即为加密及解密所用密钥。理论分析表明,在恰当设置物光波与参考光波衍射场比例的情况下,任意一灰度图像均可被加密为平稳的复随机白噪声,可以抵御盲反卷积攻击。采用计算机模拟,证实了该系统的加密效果及对抗暴力攻击的能力。研究了解密时附加参数及噪音攻击对解密结果的影响,结果表明本系统抗噪音攻击能力一般,但对附加参数有极高的敏感性。  相似文献   

8.
提出了一种基于双随机相位编码技术的非线性双图像加密方法,并分析了其安全性。在该方法中,加密过程和解密过程以及加密密钥和解密密钥均不相同。加密过程具有非线性,解密过程则是线性的。将两幅待加密图像复合为复振幅图像,并利用双随机相位编码技术和切相傅里叶变换进行加密,加密过程中生成两个解密密钥,解密过程则在经典的基于4f系统的双随机相位编码系统中完成。相比经典的双随机相位加密技术和基于切相傅里叶变换的单图像加密技术,该加密方法的安全性更高,它能够抵御最近提出的基于两步振幅相位恢复算法的特定攻击。理论分析和仿真实验结果都证明了此加密方法的可行性和安全性。  相似文献   

9.
一种基于随机相位板复用的光学多二值图像加密系统   总被引:1,自引:0,他引:1  
利用随机相位板复用提出了一种基于干涉原理的光学多二值图像加密系统。该系统加密过程采用数字方法,解密过程既可以采用数字方法也可以采用光学方法。利用该方法可将多幅图像信息解析地隐藏于两个纯相位板中。解密时,通过分束镜将两个随机相位板的衍射场进行相干叠加形成干涉场,利用专用密钥对此干涉场进行调制,即可在输出平面上恢复出与该专用密钥对应的原始图像,此图像可以采用CCD等图像传感器件直接记录。该方法加密过程无需迭代,非常省时,且解密系统易于物理实现。利用相关系数评估了系统的加密容量,计算机模拟结果证实了该方法的有效性。  相似文献   

10.
基于级联相位恢复算法的光学图像加密   总被引:12,自引:4,他引:8  
于斌  彭翔 《光学学报》2005,25(7):81-884
在虚拟光学数据加密理论模型的基础上,提出了一种光学图像加密的可视化密码构造算法。该加密算法基于自由空间传播的光学系统,利用级联迭代角谱相位恢复算法把待加密图像分别编码到两块相位模板之中,从而实现图像的加密。该加密技术不但可通过同时调整两块相位模板的相位分布的搜索策略来扩大搜索空间,提高安全强度,而且扩大了系统密钥空间,使系统获得更高的安全性,且能通过简单的数值运算或光学实验装置得到质量非常高的解密图像,还从理论上分析了该算法的时间复杂度。计算机模拟结果表明,该加密算法的收敛速度快,能迅速找到非常好的近似解,解密图像质量高且系统安全性良好。  相似文献   

11.
In this paper, aiming to solve the problem of vital information security as well as neural network application in optical encryption system, we propose an optical image encryption method by using the Hopfield neural network. The algorithm uses a fuzzy single neuronal dynamic system and a chaotic Hopfield neural network for chaotic sequence generation and then obtains chaotic random phase masks. Initially, the original images are decomposed into sub-signals through wavelet packet transform, and the sub-signals are divided into two layers by adaptive classification after scrambling. The double random-phase encoding in 4f system and Fresnel domain is implemented on two layers, respectively. The sub-signals are performed with different conversions according to their standard deviation to assure that the local information’s security is guaranteed. Meanwhile, the parameters such as wavelength and diffraction distance are considered as additional keys, which can enhance the overall security. Then, inverse wavelet packet transform is applied to reconstruct the image, and a second scrambling is implemented. In order to handle and manage the parameters used in the scheme, the public key cryptosystem is applied. Finally, experiments and security analysis are presented to demonstrate the feasibility and robustness of the proposed scheme.  相似文献   

12.
图像加密作为信息加密领域的重要一支,其对于信息安全的重要性显得愈发重要,能够有效地对目标图像信息进行加解密逐步成为了人们的研究热点。为了提高图像加密的安全性,以混沌系统所具有的初值敏感性以及类似随机为基础,提出了采用“混沌变换”方法对图像进行置乱操作的算法,随后以此为基础结合小波理论设计一种图像加密算法。在图像的预处理阶段首先对图像采用小波变换得到四幅小波子图;随后基于混沌置换将四幅子图置乱处理;最后通过小波逆变换恢复出目标加密图像。通过数值仿真实验表明通过该方法解密获得的图像具有与原图像非常高的一致性,并且获得了较高的安全性。  相似文献   

13.
孙杰 《光学技术》2017,43(3):279-283
为了扩展双图像光学加密算法的密钥空间,克服双随机相位加密系统中随机相位掩模作为密钥难于存储、传输和重构的问题,突破传统图像加密的研究思路,提出了一种基于多混沌系统的双图像加密算法,构造了光学加密系统。系统增加混沌系统参数作为密钥,利用混沌加密密钥空间大和图像置乱隐藏性好的特点,构建基于Logistic混沌映射的图像置乱算法,利用Kent混沌映射生成的伪随机序列构造出一对随机相位掩模,分别放置在分数傅里叶变换光学装置的两端,图像经加密系统变换后得到密文。数值仿真结果表明,算法的密钥敏感性极高,能够有效地对抗统计攻击,具有较高的安全性。  相似文献   

14.
提出一种利用变形分数傅里叶变换和双随机相位编码对图像加密的方法.对要加密的图像分别进行两次变形分数傅里叶变换和两次随机相位函数调制,使加密图像的密钥由原来两重增加到六重.利用全息元件,可以用光学系统实现这种加密和解密变换.计算机模拟结果表明,只有当六重密钥都完全正确时,才能准确地重建原图像,这种六重密钥加密方法提高了图像信息的安全保密性.  相似文献   

15.
We propose an image encryption scheme using chaotic phase masks and cascaded Fresnel transform holography based on a constrained optimization algorithm. In the proposed encryption scheme, the chaotic phase masks are generated by Henon map, and the initial conditions and parameters of Henon map serve as the main secret keys during the encryption and decryption process. With the help of multiple chaotic phase masks, the original image can be encrypted into the form of a hologram. The constrained optimization algorithm makes it possible to retrieve the original image from only single frame hologram. The use of chaotic phase masks makes the key management and transmission become very convenient. In addition, the geometric parameters of optical system serve as the additional keys, which can improve the security level of the proposed scheme. Comprehensive security analysis performed on the proposed encryption scheme demonstrates that the scheme has high resistance against various potential attacks. Moreover, the proposed encryption scheme can be used to encrypt video information. And simulations performed on a video in AVI format have also verified the feasibility of the scheme for video encryption.  相似文献   

16.
In this paper, a hyperchaotic four-dimensional fractional discrete Hopfield neural network system (4D-FDHNN) with four positive Lyapunov exponents is proposed. Firstly, the chaotic dynamics’ characteristics of the system are verified by analyzing and comparing the iterative trajectory diagram, phase diagram, attractor diagram, 0-1 test, sample entropy, and Lyapunov exponent. Furthermore, a novel image encryption scheme is designed to use the chaotic system as a pseudo-random number generator. In the scenario, the confusion phase using the fractal idea proposes a fractal-like model scrambling method, effectively enhancing the complexity and security of the confusion. For the advanced diffusion phase, we proposed a kind of Hilbert dynamic random diffusion method, synchronously changing the size and location of the pixel values, which improves the efficiency of the encryption algorithm. Finally, simulation results and security analysis experiments show that the proposed encryption algorithm has good efficiency and high security, and can resist common types of attacks.  相似文献   

17.
刘树波  孙婧  徐正全  刘金硕 《中国物理 B》2009,18(12):5219-5227
Chaotic systems perform well as a new rich source of cryptography and pseudo-random coding. Unfortunately their digital dynamical properties would degrade due to the finite computing precision. Proposed in this paper is a modified digital chaotic sequence generator based on chaotic logistic systems with a coupling structure where one chaotic subsystem generates perturbation signals to disturb the control parameter of the other one. The numerical simulations show that the length of chaotic orbits, the output distribution of chaotic system, and the security of chaotic sequences have been greatly improved. Moreover the chaotic sequence period can be extended at least by one order of magnitude longer than that of the uncoupled logistic system and the difficulty in decrypting increases 2128*2128 times indicating that the dynamical degradation of digital chaos is effectively improved. A field programmable gate array (FPGA) implementation of an algorithm is given and the corresponding experiment shows that the output speed of the generated chaotic sequences can reach 571.4~Mbps indicating that the designed generator can be applied to the real-time video image encryption.  相似文献   

18.
The design of the new compound two-dimensional chaotic function is presented by exploiting two one-dimensional chaotic functions which switch randomly, and the design is used as a chaotic sequence generator which is proved by Devaney’s definition proof of chaos. The properties of compound chaotic functions are also proved rigorously. In order to improve the robustness against difference cryptanalysis and produce avalanche effect, a new feedback image encryption scheme is proposed using the new compound chaos by selecting one of the two one-dimensional chaotic functions randomly and a new image pixels method of permutation and substitution is designed in detail by array row and column random controlling based on the compound chaos. The results from entropy analysis, difference analysis, statistical analysis, sequence randomness analysis, cipher sensitivity analysis depending on key and plaintext have proven that the compound chaotic sequence cipher can resist cryptanalytic, statistical and brute-force attacks, and especially it accelerates encryption speed, and achieves higher level of security. By the dynamical compound chaos and perturbation technology, the paper solves the problem of computer low precision of one-dimensional chaotic function.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号