共查询到18条相似文献,搜索用时 70 毫秒
1.
为了提高图像加密的安全性, 提出了一种多参数加权类分数傅里叶变换。此类多参数加权类分数傅里叶变换是C.C.Shih提出的四项加权类分数傅里叶变换的一种扩展, 除了分数阶数, 还有四个在四项加权系数之中的自由参数, 称其为向量参数。同时给出此多参数加权类分数傅里叶变换的离散形式, 并把这种算法应用到光学图像加密中。此算法在应用一次二维分数傅里叶变换可以有十个密键:一类为阶数参数; 另一类为向量参数, 因此这种加密算法在增加了安全性的同时, 加密过程的复杂度降低。数值仿真验证了此算法的有效性和可靠性。 相似文献
2.
3.
4.
针对光学图像加密的轮廓显现问题,提出了一种基于稀疏相位和可调傅里叶变换的图像加密方法。将可调傅里叶变换引入光学图像加密程序中,运用二维可调傅里叶变换实现像素混淆处理,相比基于复数或实数的变换域方案,计算复杂度较低;从加密函数提取相位值并获得加密数据的相位函数,再提取相位加密函数的稀疏数据,从而避免将密文相位信息主要集中在纯相位掩码内,以解决轮廓显现问题;完成了单图像加密实验和双图像加密实验,结果表明实现了较好的安全性,解决了光学图像加密的轮廓显现问题。 相似文献
5.
6.
基于随机分数傅里叶变换的双图像加密算法 总被引:1,自引:2,他引:1
利用光学随机分数傅里叶变换设计了一种双图像加密算法,并给出了相应的光学实现.加密算法中,将两幅原始图像分别作为加密系统输入复函数的振幅和位相分布函数,利用随机分数傅里叶变换进行加密,所得复函数的振幅即为加密图像,而位相部分是变换的输出相位,随机位相作为加密算法的密码.在数值模拟中,二值文本图像和灰度图像分别被作为原始图像用于加密结果分析和加密安全测试,结果表明该加密算法具有很好的安全性. 相似文献
7.
8.
大多数光学加密系统都是对称加密系统,在光学图像加密中明文和密文之间具有线性关系,其系统的安全性有待加强.而基于相位截断傅里叶变换(phase-truncated Fourier transform, PTFT)的非对称加密系统,其非线性的相位截断操作使加密系统的安全性得到了极大提升.本文提出使用深度学习方法攻击PTFT加密系统,通过PTFT加密系统构造出明密文对图像数据集,然后将其输入残差网络(residual network, Res Net)中进行训练, Res Net自动学习该加密系统的解密特性.最后应用测试集对训练好的模型进行解密性能测试,数据表明该模型能够较好地恢复图像并且该模型具有一定的抗噪声能力.与两步迭代振幅恢复算法相比,本文所提出方法恢复的图像质量更好. 相似文献
9.
10.
为了扩展双图像光学加密算法的密钥空间,克服双随机相位加密系统中随机相位掩模作为密钥难于存储、传输和重构的问题,突破传统图像加密的研究思路,提出了一种基于多混沌系统的双图像加密算法,构造了光学加密系统。系统增加混沌系统参数作为密钥,利用混沌加密密钥空间大和图像置乱隐藏性好的特点,构建基于Logistic混沌映射的图像置乱算法,利用Kent混沌映射生成的伪随机序列构造出一对随机相位掩模,分别放置在分数傅里叶变换光学装置的两端,图像经加密系统变换后得到密文。数值仿真结果表明,算法的密钥敏感性极高,能够有效地对抗统计攻击,具有较高的安全性。 相似文献
11.
12.
Optical image encryption based on multichannel fractional Fourier transform and double random phase encoding technique 总被引:3,自引:0,他引:3
The optical image encryption based on multichannel fractional Fourier transform (FRT) and double random phase encoding technique is proposed. Optical principles of encoding and decoding are analyzed in detail. With this method, one can encrypt different parts of input image, respectively. The system security can be improved to some extent, not only because fractional orders and random phase masks in every channel can be set with freedom, but also because the system parameters among all channels are independent. Numerical simulation results of optical image encryption based on four channel FRT and double random phase encoding are given to verify the feasibility of the method. 相似文献
13.
14.
An asymmetric single-channel color image encryption based on Hartley transform and gyrator transform
A novel asymmetric single-channel color image encryption using Hartley transform and gyrator transform is proposed. A color image is segregated into R, G, and B channels and then each channel is independently Hartley transformed. The three transformed channels are multiplied and then phase- and amplitude truncated to obtain first encrypted image and first decryption key. The encoded image is modulated with a conjugate of random phase mask. The modulated image is gyrator transformed and then phase- and amplitude truncated to get second encrypted image and second decryption key. The asymmetric (decryption) keys, random phase mask, and transformation angle of gyrator transform serve as main keys. The optoelectronic encryption and decryption systems are suggested. Numerical simulation results have been demonstrated to verify the performance and security of the proposed security system. 相似文献
15.
Novel single-channel color image encryption algorithm based on chaos and fractional Fourier transform 总被引:4,自引:0,他引:4
A new color image encryption algorithm based on fractional Fourier transform (FrFT) and chaos is proposed. The colors of the original color image are converted to HSI (hue-saturation-intensity), and the S component is transformed by the random-phase encoding based on FrFT to obtain a new random phase. The I component is transformed by double random-phase encoding based on FrFT using the H component and the new random phase as two phase plates. Then chaos scrambling technology is used to encrypt the image, which makes the resulting image nonlinear and disorder both in spatial domain and frequency domain. Additionally, the ciphertext is not a color image but a combination of a gray image and a phase matrix, so the ciphertext has camouflage property to some extent. The results of numerical simulations demonstrate the effectiveness and the security of this algorithm. 相似文献
16.
A new method for double image encryption is proposed that is based on amplitude-phase hybrid encoding and iterative random phase encoding in fractional Fourier transform (FrFT) domains. In the iterative random phase encoding operation, a binary random matrix is defined to encode two original images to a single complex-valued image, which is then converted into a stationary white noise image by the iterative phase encoding with FrFTs. Compared with the previous schemes that uses fully phase encoding, the proposed method reduces the difference between two original images in key space and sensitivity to the FrFT orders. The primitive images can be retrieved exactly by applying correct keys with initial conditions of chaotic system, the pixel scrambling operation and the FrFT orders. Computer simulations demonstrate that the encryption method has impressively high security level and certain robustness against data loss and noise interference. 相似文献
17.
We propose a new method for image encryption using fractional Fourier transform and chaos theory. Random phase masks are generated using iterative chaos functions. The input image is combined with the first random phase mask at the object plane and is then transformed using the fractional Fourier transform. After the first fractional Fourier transform, the second random phase mask, again generated by using the chaos functions, is used at the fractional plane. The second fractional Fourier transform operation is then carried out to obtain the encrypted image. Three types of chaos functions have been used: the logistic map, the tent map and the Kaplan–Yorke map. The mean square error and the signal-to-noise ratio between the decrypted image and the input image for the correct order and the incorrect order of the fractional Fourier transform have been calculated. The computer simulations are presented to verify the validity of the proposed technique. 相似文献