Advanced Search
Volume 40 Issue 2
Feb.  2018
Turn off MathJax
Article Contents
ZHANG Bo, LONG Hui, JIANG Feibo. Optical Image Encryption Algorithm Based on Coherent Superposition and Equal Modulus Vector Decomposition[J]. Journal of Electronics & Information Technology, 2018, 40(2): 438-446. doi: 10.11999/JEIT170489
Citation: ZHANG Bo, LONG Hui, JIANG Feibo. Optical Image Encryption Algorithm Based on Coherent Superposition and Equal Modulus Vector Decomposition[J]. Journal of Electronics & Information Technology, 2018, 40(2): 438-446. doi: 10.11999/JEIT170489

Optical Image Encryption Algorithm Based on Coherent Superposition and Equal Modulus Vector Decomposition

doi: 10.11999/JEIT170489
Funds:

The National Natural Science Foundation of China (41604117), The Hunan Science and Technology Plan (2015JC3067)

  • Received Date: 2017-05-22
  • Rev Recd Date: 2017-09-29
  • Publish Date: 2018-02-19
  • In order to overcome the defects such as contour emerging induced by the cipher phase information mainly concentrated in the pure phase mask and difficult to resist the amplitude phase retrieval attack in current optical image encryption technology, the optical image encryption algorithm based on coherent superposition and equal modulus vector decomposition is proposed in this paper. Firstly, the optical image is normalized, and the initial value of Logistic map is generated using the pixel characteristics of plaintext, and the random phase mask is outputted by iterative the logistic map. Then the image is modulated by random phase function, and the modulated image is processed based on Fourier transform to output the Fourier spectrum. Then, the Fourier spectrum is decomposed equal module to obtain two masks. Each mask is transformed based on Fourier mechanism with different fractional order. Finally, a one-way coding scheme is designed based on phase - amplitude truncation coding technique to get the amplitude and phase information of each Fourier spectrum, which regards the phase part as coding cipher, and the amplitude information as the decryption key. The input plaintext is transformed into 4 different information of phases and amplitudes using the equal modulus vector decomposition technique to solve effectively the problem of contour representation. The experimental results show that the proposed algorithm has higher security for effectively solving the contour appearance problem compared with current image encryption schemes based on the interference theory.
  • loading
  • 李凯佳, 俞锐刚, 袁凌云. 基于DNA-记忆元胞自动机与Hash函数的图像加密算法[J]. 计算机工程与设计, 2017, 38(2): 470-477. doi: 10.16208/j.issn1000-7024.2017.02.036.
    LIU Xingbin, MEI Wenbo, and DU Huiqian. Optical image encryption based on compressive sensing and chaos in the fractional Fourier domain[J]. Journal of Modern Optics, 2014, 61(19): 1570-1577. doi: 10.1080/09500340.2014.946565.
    LI Kaijia, YU Ruigang, and YUAN Linyun. Image encryption algorithm based on DNA-cellular automata and Hash function[J]. Computer Engineering and Design, 2017, 38(2): 470-477. doi: 10.16208/j.issn1000-7024.2017.02.036.
    沈学举, 刘旭敏, 蔡宁. 非线性JTC光学图像加密系统及其消噪音和抗攻击特性研究[J]. 中国激光, 2015, 42(7): 284-290. doi: 10.3788/CJL201542.0709003.
    SHEN Xueju, LIU Xumin, and CAI Ning. Nonlinear JTC optical image encryption system and its characteristics of noise reduction and anti attack[J]. Chinese Journal of Laser, 2015, 42(7): 284-290. doi: 10.3788/CJL201542.0709003.
    朱薇, 杨庚, 陈蕾. 基于混沌的改进双随机相位编码图像加密算法[J]. 光子学报, 2014, 34(6): 58-68. doi: 10.3788/AOS 201434.0607001.
    ZHU Wei, YANG Geng, and CHEN Lei. Improved double random phase coded image encryption algorithm based on chaos[J]. Journal of Photonics, 2014, 34(6): 58-68. doi: 10.3788/AOS201434.0607001.
    DENG Xiaopeng. Optical multiple-image encryption based on fully phase encoding and interference[J]. Optik- International Journal for Light and Electron Optics, 2015, 126(21): 3210-3214. doi: 10.1016/j.ijleo.2015.07.148.
    CHEN Linfei, LIU Jingyu, and WEN Jisen. A new optical image encryption method based on multi-beams interference and vector composition[J]. Optics Laser Technology, 2015, 69(18): 70-86. doi: 10.1016/j.optlastec.2014.12.007.
    曾大奎, 马利红, 刘健. 基于两步正交相移干涉的振幅图像光学加密技术[J]. 光子学报, 2012, 41(1): 72-76. doi: 10.3788/ gzxb20124101.0072.
    ZENG Dakui, MA Hongli, and LIU Jian. Optical image encryption based on two step quadrature phase shifting interferometry[J]. Journal of Photonics, 2012, 41(1): 72-76. doi: 10.3788/gzxb20124101.0072.
    ADELADE Nicole Kengnou Telem. A simple and robust gray image encryption scheme using chaotic logistic map and artificial neural network[J]. Advances in Multimedia, 2014, 77(1): 1201-1213. doi: 10.1155/2014.602921.
    ZHAO Tieyu, RAN Qiwen, and YUAN Lin. Securities of image encryption scheme based on multi-parameter fractional Fourier transform[J]. Optics Communications, 2016, 376(19): 47-51. doi: 10.1016/j.optcom.2016.05.016.
    SUN Qiudong, ZUO Jiancun, and SHAO Yufeng. A dual image scrambling method based on discrete cosine transform [J]. Applied Mechanics and Materials, 2016, 556(110): 4722-4725. doi: 10.4028/www.scientific.net/AMM.556-562. 4722.
    WAN Qin and XIANG Penng. Asymmetric cryptosystem based on phase-truncated Fourier transforms[J]. Optics Letters, 2010, 35(2): 118-125. doi: 10.1364/OL.35.000118.
    WANG Qu, GUO Qing, and LEI Liang. Optical interference- based image encryption using circular harmonic expansion and spherical illumination in gyrator transform domain[J]. Optics Communications, 2015, 346(19): 124-132. doi: 10.1016 /j.optcom.2015.02.040.
    王帅, 孙伟, 郭一楠. 一种多混沌快速图像加密算法的设计与分析[J]. 计算机应用研究, 2015, 32(2): 512-515. doi: 10.3969 /j.issn.1001-3695.2015.02.042.
    WANG Shuai, SUN Wei, and GUO Yinan. Design and analysis of a fast image encryption algorithm based on chaos [J]. Computer Application Research, 2015, 32(2): 512-515. doi: 10.3969/j.issn.1001-3695.2015.02.042.
    侯俊峰, 黄素娟, 司徒国海. 非线性光学图像加密[J]. 光学学报, 2015, 35(8): 85-90. doi: 10.3788/AOS201535.0807001.
    HOU Junfeng, HUANG Sujuan, and SITU Guohai. Nonlinear optical image encryption[J]. Acta Optical Sinica, 2015, 35(8): 85-90. doi: 10.3788/AOS201535.0807001.
    CHEN Linfei, HE Bingyu, and CHEN Xudong. Optical image encryption based on multi-beam interference and common vector decomposition[J]. Optics Communications, 2016, 361(15): 6-12. doi: 10.1016/j.optcom.2015.10.037.
    汪小刚. 基于双随机相位编码和干涉原理的图像加密技术的研究[D]. 浙江大学, 2013, 76-79.
    WANG Xiaogang. Research on image encryption based on double random phase encoding and interference theory[D]. Zhejiang University, 2013, 76-79.
    任晓霞, 廖晓峰, 熊永红. 基于细胞神经网络超混沌特性的图像加密新算法[J]. 计算机应用研究, 2011, 31(6): 1528-1531. doi: 10.3724/SP.J.1087.2011.01528.
    REN Xiaoxia, LIAO Xiaofeng, and XIONG Yonghong. New algorithm of image encryption based on hyperchaos of cellular neural networks[J]. Computer Application Research, 2011, 31(6): 1528-1531. doi: 10.3724/SP.J.1087.2011.01528.
    CARNICER A, MONTES-USATEGUI M, ARCOS S, et al. Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys[J]. Optical Letters, 2005, 30(13): 1644-1646. doi: 10.1364/OL.30. 001644.
    LI Chengqing. Cracking a hierarchical chaotic image encryption algorithm based on permutation[J]. Signal Processing, 2016, 118(19): 203-211. doi: 10.1016/j.sigpro. 2015.07.008.
    XIANG Peng, PAN Zhang, HUANG Wei, et al. Known- plaintext attack on optical encryption based on double random phase keys[J]. Optical Letters, 2006, 31(8): 1044-1046. doi: 10.1109/SOPO.2010.5504346.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1315) PDF downloads(186) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return