搜索

x

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

基于gyrator变换和矢量分解的非对称图像加密方法

姚丽莉 袁操今 强俊杰 冯少彤 聂守平

引用本文:
Citation:

基于gyrator变换和矢量分解的非对称图像加密方法

姚丽莉, 袁操今, 强俊杰, 冯少彤, 聂守平

Asymmetric image encryption method based on gyrator transform and vector operation

Yao Li-Li, Yuan Cao-Jin, Qiang Jun-Jie, Feng Shao-Tong, Nie Shou-Ping
PDF
导出引用
  • 本文结合矢量分解和gyrator变换的数学实现得到了一种新的非对称图像加密算法,它将待加密图像先通过矢量分解加密到两块纯相位板中,然后利用从gyrator变换的数学实现中推导出来的加密算法加密其中一块相位板,获得最终的实值密文.另一块相位板作为解密密钥.算法的解密密钥不同于加密密钥,实现了非对称加密,加密过程中产生的两个私钥增大了算法的安全性.数值模拟结果验证了该算法的可行性和有效性.
    With the rapid development of computer network technology, information security has attracted increasing attention. Due to the characteristics of multi-dimensional operation and parallel processing capability, optical image encryption techniques have been receiving more and more attention. Since the well-known double random phase encoding technique was proposed, many other methods based on optical information processing means such as the use of optical transform, interference, and polarized light encoding, have been proposed for optical image encryption. However, recent researches have demonstrated that traditional optical encryption techniques are symmetric cryptosystems, in which decryption keys are identical to encryption keys and they have been found to be vulnerable to different types of attacks, such as known plaintext and chosen plaintext attacks. To overcome this shortcoming, asymmetric cryptosystems based on nonlinear phase-truncation techniques and phase retrieval algorithm have been proposed. Asymmetric cryptosystem is a cryptographic system in which encryption keys are different from decryption keys. The encryption keys are used as public keys which are disseminated widely, and the decryption keys are used as private keys which are known only to the authorized users. So, asymmetric cryptosystem can offer a higher-level security than symmetric cryptosystem. However, asymmetric cryptosystems based on phase retrieval algorithms require a lot of computational time, and asymmetric cryptosystems based on phase-truncated Fourier transforms have been found to be vulnerable to special attack. Therefore, in this paper, a novel asymmetric image encryption method is proposed by using the gyrator transform and vector operation. The original image is encrypted into two phase masks with vector operation. One is a random phase mask and the other is a phase mask related to the original image. In the encryption process, the random phase mask is used as a phase key and the other phase mask is transformed by gyrator transform. The transform result is performed by Fourier transform after being modulated by a phase distribution. The ciphertext is the amplitude of the above result. Compared with previous encryption schemes, the suggested method has two advantages. Firstly, we have proposed a new asymmetric encryption method based on the gyrator transform and vector operation. The decryption process is different from the encryption process. The gyrator transform and Fourier transform are used in the encryption process, while only the inverse operation of Fourier transform is employed in the decryption process. In addition, the decryption keys produced in the encryption process are different from the encryption keys. Therefore, the proposed scheme has high resistance against the conventional attacks. Secondly, the encrypted result is real-valued, which is convenient for display, transmission and storage.Numerical simulations illustrate the feasibility and effectiveness of the proposed encryption scheme.
      通信作者: 袁操今, optyuan@163.com
    • 基金项目: 国家自然科学基金(批准号:61377003)、南京师范大学高层次人才科研启动项目(批准号:184080H20162)、南京师范大学青年领军人才培养项目(批准号:184080H20178)和江苏省高校自然科学研究重大项目(批准号:14KJA140001)资助的课题.
      Corresponding author: Yuan Cao-Jin, optyuan@163.com
    • Funds: Project supported by the National Natural Science Foundation of China(Grant No. 61377003), the Scientific Research Foundation for Advanced Talents, Nanjing Normal University, China(Grant No. 184080H20162), the Training Program Foundation for Youth Leader Talents by Nanjing Normal University, China(Grant No. 184080H20178), and the Major Natural Science Research Project for Universities of Jiangsu Province, China(Grant No. 14KJA140001).
    [1]

    Refregier P, Javidi B 1995 Opt. Lett. 20 767

    [2]

    Deng X P, Zhao D M 2012 Opt. Lasers Technol. 44 136

    [3]

    Abuturab M R 2015 Opt. Lasers Eng. 69 49

    [4]

    Liu Z J, Guo C, Tan J B, Liu W, Wu J J, Wu Q, Pan L Q, Liu S T 2015 Opt. Lasers Eng. 68 87

    [5]

    Sui L S, Xin M T, Tian A L, Jin H Y 2013 Opt. Lasers Eng. 51 1297

    [6]

    Chen W, Chen X 2012 Appl. Opt. 51 6076

    [7]

    Rajput S K, Nishchal N K 2013 Appl. Opt. 52 4343

    [8]

    Peng X, Zhang P, Wei H Z, Yu B 2006 Acta Phys. Sin. 55 1130(in Chinese)[彭翔, 张鹏, 位恒政, 于斌2006 55 1130]

    [9]

    Peng X, Wei H Z, Zhang P 2007 Acta Phys. Sin. 56 3924(in Chinese)[彭翔, 位恒政, 张鹏2007 56 3924]

    [10]

    Frauel Y, Castro A, Naughton T J, Javidid B 2007 Opt. Express 15 10253

    [11]

    Qin W, Peng X 2010 Opt. Lett. 35 118

    [12]

    Rajput S K, Nishchal N K 2012 Appl. Opt. 51 5377

    [13]

    Rajput S K, Nishchal N K 2014 J. Opt. Soc. Am. A 31 1233

    [14]

    Mehra I, Nishchal N K 2015 Opt. Commun. 354 344

    [15]

    Abuturab M R 2014 Opt. Lasers Eng. 58 39

    [16]

    Abuturab M R 2014 Opt. Commun. 323 100

    [17]

    Abuturab M R 2015 Opt. Lasers Eng. 69 49

    [18]

    Rajput S K, Nishchal N K 2014 Appl. Opt. 53 418

    [19]

    Wang Y, Quan C, Tay C J 2016 Opt. Lasers Eng. 78 8

    [20]

    Wang X G, Zhao D M 2011 Opt. Commun. 284 945

    [21]

    Joshi M, Shakher C, Singh K 2009 Opt. Lasers Eng. 47 721

    [22]

    Zhou N R, Wang Y X, Gong L H 2011 Opt. Commun. 284 3234

    [23]

    Rodrigo J A, Alieva T, Calvo M L 2007 Opt. Express 15 2190

    [24]

    Liu Z, Chen D, Ma J, Wei S, Zhang Y, Dai J 2011 Optik 122 864

    [25]

    Zhang Y, Xiao D 2013 Opt. Lasers Eng. 51 472

  • [1]

    Refregier P, Javidi B 1995 Opt. Lett. 20 767

    [2]

    Deng X P, Zhao D M 2012 Opt. Lasers Technol. 44 136

    [3]

    Abuturab M R 2015 Opt. Lasers Eng. 69 49

    [4]

    Liu Z J, Guo C, Tan J B, Liu W, Wu J J, Wu Q, Pan L Q, Liu S T 2015 Opt. Lasers Eng. 68 87

    [5]

    Sui L S, Xin M T, Tian A L, Jin H Y 2013 Opt. Lasers Eng. 51 1297

    [6]

    Chen W, Chen X 2012 Appl. Opt. 51 6076

    [7]

    Rajput S K, Nishchal N K 2013 Appl. Opt. 52 4343

    [8]

    Peng X, Zhang P, Wei H Z, Yu B 2006 Acta Phys. Sin. 55 1130(in Chinese)[彭翔, 张鹏, 位恒政, 于斌2006 55 1130]

    [9]

    Peng X, Wei H Z, Zhang P 2007 Acta Phys. Sin. 56 3924(in Chinese)[彭翔, 位恒政, 张鹏2007 56 3924]

    [10]

    Frauel Y, Castro A, Naughton T J, Javidid B 2007 Opt. Express 15 10253

    [11]

    Qin W, Peng X 2010 Opt. Lett. 35 118

    [12]

    Rajput S K, Nishchal N K 2012 Appl. Opt. 51 5377

    [13]

    Rajput S K, Nishchal N K 2014 J. Opt. Soc. Am. A 31 1233

    [14]

    Mehra I, Nishchal N K 2015 Opt. Commun. 354 344

    [15]

    Abuturab M R 2014 Opt. Lasers Eng. 58 39

    [16]

    Abuturab M R 2014 Opt. Commun. 323 100

    [17]

    Abuturab M R 2015 Opt. Lasers Eng. 69 49

    [18]

    Rajput S K, Nishchal N K 2014 Appl. Opt. 53 418

    [19]

    Wang Y, Quan C, Tay C J 2016 Opt. Lasers Eng. 78 8

    [20]

    Wang X G, Zhao D M 2011 Opt. Commun. 284 945

    [21]

    Joshi M, Shakher C, Singh K 2009 Opt. Lasers Eng. 47 721

    [22]

    Zhou N R, Wang Y X, Gong L H 2011 Opt. Commun. 284 3234

    [23]

    Rodrigo J A, Alieva T, Calvo M L 2007 Opt. Express 15 2190

    [24]

    Liu Z, Chen D, Ma J, Wei S, Zhang Y, Dai J 2011 Optik 122 864

    [25]

    Zhang Y, Xiao D 2013 Opt. Lasers Eng. 51 472

  • [1] 李尉, 代京京, 温丛阳, 宗梦雅, 李胜南, 王智勇. 利用Gyrator正则变换实现环形激光阵列的Talbot效应.  , 2023, 72(5): 054208. doi: 10.7498/aps.72.20222412
    [2] 方洁, 姜明浩, 安小宇, 孙军伟. 基于混沌加密和DNA编码的“一图一密”图像加密算法.  , 2021, 70(7): 070501. doi: 10.7498/aps.70.20201642
    [3] 徐昭, 周昕, 白星, 李聪, 陈洁, 倪洋. 基于深度学习的相位截断傅里叶变换非对称加密系统攻击方法.  , 2021, 70(14): 144202. doi: 10.7498/aps.70.20202075
    [4] 席思星, 于娜娜, 王晓雷, 朱巧芬, 董昭, 王微, 刘秀红, 王华英. 基于计算全息和θ调制的彩色图像加密方法.  , 2019, 68(11): 110502. doi: 10.7498/aps.68.20182264
    [5] 绪其军, 李德林, 常琛亮, 袁操今, 冯少彤, 聂守平. 基于Q-plate的双图像非对称偏振加密.  , 2019, 68(8): 084202. doi: 10.7498/aps.68.20181902
    [6] 龚宁, 朱开成, 夏辉. 四瓣高斯光束的Gyrator变换性质和矩形空心光束的产生.  , 2016, 65(12): 124204. doi: 10.7498/aps.65.124204
    [7] 梁国龙, 陶凯, 王晋晋, 范展. 声矢量阵宽带目标波束域变换广义似然比检测算法.  , 2015, 64(9): 094303. doi: 10.7498/aps.64.094303
    [8] 朱良明, 李风华, 孙梅, 陈德胜. 基于频带分解和距离加权的单矢量水听器浅海被动测距方法研究.  , 2015, 64(15): 154303. doi: 10.7498/aps.64.154303
    [9] 罗朝明, 陈世祯, 凌晓辉, 张进, 罗海陆. 高阶邦加球上柱矢量光束的变换.  , 2014, 63(15): 154203. doi: 10.7498/aps.63.154203
    [10] 朱开成, 唐慧琴, 郑小娟, 唐英. 广义双曲正弦-高斯光束的Gyrator变换性质和暗空心光束产生.  , 2014, 63(10): 104210. doi: 10.7498/aps.63.104210
    [11] 尹柏强, 何怡刚, 吴先明. 心磁信号广义S变换域奇异值分解滤波方法.  , 2013, 62(14): 148702. doi: 10.7498/aps.62.148702
    [12] 周国华, 许建平, 包伯成. 峰值/谷值电流型控制开关DC-DC变换器的对称动力学现象分析.  , 2010, 59(4): 2272-2280. doi: 10.7498/aps.59.2272
    [13] 郭成豹, 肖昌汉, 刘大明. 基于积分方程法和奇异值分解的磁性目标磁场延拓技术研究.  , 2008, 57(7): 4182-4188. doi: 10.7498/aps.57.4182
    [14] 曹 洁, 高守亭, 周玉淑. 从流场分解角度改进Q矢量分析方法及其在暴雨动力识别中的应用.  , 2008, 57(4): 2600-2606. doi: 10.7498/aps.57.2600
    [15] 黄群星, 刘 冬, 王 飞, 严建华, 池 涌, 岑可法. 基于截断奇异值分解的三维火焰温度场重建研究.  , 2007, 56(11): 6742-6748. doi: 10.7498/aps.56.6742
    [16] 彭 翔, 汤红乔, 田劲东. 双随机相位编码光学加密系统的唯密文攻击.  , 2007, 56(5): 2629-2636. doi: 10.7498/aps.56.2629
    [17] 王 宁. Gelfand-Dickey算子分解,B?cklund-Darboux变换及对称.  , 1999, 48(8): 1394-1398. doi: 10.7498/aps.48.1394
    [18] 张历宁. 超Killing方程与超对称变换.  , 1981, 30(1): 28-34. doi: 10.7498/aps.30.28
    [19] 李子平. 约束系统的对称变换.  , 1981, 30(12): 1699-1706. doi: 10.7498/aps.30.1699
    [20] 李华宗. 量子力学中特性值问题之因子分解方法.  , 1944, 5(2): 89-104. doi: 10.7498/aps.5.89
计量
  • 文章访问数:  5791
  • PDF下载量:  220
  • 被引次数: 0
出版历程
  • 收稿日期:  2016-06-15
  • 修回日期:  2016-07-06
  • 刊出日期:  2016-11-05

/

返回文章
返回
Baidu
map