[go: up one dir, main page]

CN111241554A - Digital image encryption and decryption system based on visual cipher - Google Patents

Digital image encryption and decryption system based on visual cipher Download PDF

Info

Publication number
CN111241554A
CN111241554A CN201811436714.1A CN201811436714A CN111241554A CN 111241554 A CN111241554 A CN 111241554A CN 201811436714 A CN201811436714 A CN 201811436714A CN 111241554 A CN111241554 A CN 111241554A
Authority
CN
China
Prior art keywords
image
sharing
hologram
encryption
graph
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811436714.1A
Other languages
Chinese (zh)
Inventor
马金戈
于韬
李桂林
马锐
杨栋宇
史祎诗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Chinese Academy of Sciences
Original Assignee
University of Chinese Academy of Sciences
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Chinese Academy of Sciences filed Critical University of Chinese Academy of Sciences
Priority to CN201811436714.1A priority Critical patent/CN111241554A/en
Publication of CN111241554A publication Critical patent/CN111241554A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T9/00Image coding
    • G06T9/007Transform coding, e.g. discrete cosine transform

Landscapes

  • Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Discrete Mathematics (AREA)
  • Multimedia (AREA)
  • Image Processing (AREA)

Abstract

本发明公开了一种基于视觉密码(Visual Code)、采用博奇(Burch)编码修正型离轴参考光计算全息图原理(简称CGH)的图像加密、解密方法及其系统。其中,原始图像采用视觉密码技术进行加密,使用原始图像产生两张加密分享图,解密时使用CGH得到两张分享图对应的全息图,对两张全息图分别重建光场并叠加得到解密图像。本发明采用新型的秘密共享技术,针对于秘密信息为图像的情况,增强了加密的安全性和解密的可靠性;同时,与传统视觉密码方法不同,采用CGH生成的全息图无法直接通过叠加得到原图,进一步增强了保密性;实验证明,本发明加密解密的安全性能极佳。The invention discloses an image encryption and decryption method and a system based on visual code (Visual Code) and adopting the Burch coding modified off-axis reference light computational hologram principle (CGH for short). Among them, the original image is encrypted by visual cryptography, and the original image is used to generate two encrypted shared images. During decryption, CGH is used to obtain the holograms corresponding to the two shared images. The light fields of the two holograms are reconstructed and superimposed to obtain the decrypted images. The invention adopts a new type of secret sharing technology, which enhances the security of encryption and the reliability of decryption for the situation that the secret information is an image; at the same time, different from the traditional visual encryption method, the hologram generated by using CGH cannot be directly obtained by superposition The original image further enhances the confidentiality; the experiment proves that the encryption and decryption of the present invention has excellent security performance.

Description

基于视觉密码的数字图像加密解密系统Digital image encryption and decryption system based on visual cipher

技术领域technical field

本发明涉及数字图像加密技术领域,尤其涉及空域图像加密技术领域。The invention relates to the technical field of digital image encryption, in particular to the technical field of airspace image encryption.

背景技术Background technique

数字图像是一种应用广泛信息载体形式,对国防、工业、科技、经济等领域有着深刻的影响。某些特殊领域,如军事、商业和航空,数字图像还有较高的保密需求。面对解密技术的迅速发展,传统一维数据加密算法面临着严峻挑战。图像加密技术的概念是:利用数字图像的特性设计加密算法,以提高加密的安全性和运算效率的一种技术。为了实际应用的需要,数字图像加密技术需要具有难以破译、性能可靠的特点,以抵抗各种破译手段的攻击。Digital image is a widely used form of information carrier, which has a profound impact on national defense, industry, science and technology, economy and other fields. In some special fields, such as military, commercial and aviation, digital images also have higher security requirements. Facing the rapid development of decryption technology, traditional one-dimensional data encryption algorithms are facing severe challenges. The concept of image encryption technology is: a technology that uses the characteristics of digital images to design encryption algorithms to improve encryption security and operational efficiency. For the needs of practical application, digital image encryption technology needs to have the characteristics of being difficult to decipher and reliable in performance, so as to resist the attacks of various deciphering methods.

图像加密技术可分为两类,即空域图像加密技术和压缩图像加密技术。空域图像加密技术在未压缩的图像上进行加密,其特征是将图像看作二维数据进行操作。视觉密码方案(Visual Cryptography Scheme)简称VCS,是一种新型的空域图像加密技术,由Naor和Shamir在1994年在欧洲密码学会议上提出,它是将秘密图像分享在若干称为分享份的透明胶片中,每一张分享份都不会泄露秘密的任何信息。解密时只需将满足条件的胶片叠合在一起,可在没有计算机的环境和秘密所有者不具备任何数学知识的情况下,由人类视觉系统直接恢复出秘密。与传统的秘密共享方法不同的是,视觉密码主要针对于秘密信息为图像的情况,在分享结构为(k,n)时,其中2≤k≤n,将秘密图像加密到n幅分享图像(shareimages)中,然后将分享图像分发给n位不同的秘密共享参与者。在恢复秘密图像时,至少需要k幅分享图像叠加才能恢复出秘密。Image encryption technology can be divided into two categories, namely, spatial image encryption technology and compressed image encryption technology. Spatial image encryption technology encrypts an uncompressed image, which is characterized by operating the image as two-dimensional data. Visual Cryptography Scheme (VCS) for short is a new type of airspace image encryption technology, which was proposed by Naor and Shamir at the European Cryptography Conference in 1994. In the film, each share will not reveal any secret information. When decrypting, it is only necessary to superimpose the films that meet the conditions, and the secret can be directly recovered by the human visual system in the absence of a computer environment and the secret owner does not have any mathematical knowledge. Different from the traditional secret sharing method, visual cryptography is mainly aimed at the case where the secret information is an image. When the sharing structure is (k,n), where 2≤k≤n, the secret image is encrypted into n shared images ( shareimages), and then distribute the shared images to n different secret sharing participants. When recovering a secret image, at least k shared images need to be superimposed to recover the secret.

一般而言,视觉密码技术对数字图像进行加密和解密的过程如图1所示。Generally speaking, the process of encrypting and decrypting digital images by visual cryptography is shown in Figure 1.

现有的视觉密码技术能够做到隐蔽性,由于分享图像上的像素点是随机分布的,隐藏的秘密不能被常人所看见;其次,视觉密码技术具有安全性:对单张分享图像进行分析不能得到任何关于秘密的有用信息。The existing visual cryptography technology can achieve concealment, because the pixels on the shared image are randomly distributed, the hidden secrets cannot be seen by ordinary people; secondly, the visual cryptography technology has security: it is impossible to analyze a single shared image. Get any useful information about the secret.

然而,现有的大多数视觉密码技术在解密时无需任何数学计算,破译者不需要任何数学知识,只要将分享图像简单地叠加就能恢复出秘密图像,增加了分享图像的保存过程中被拍摄窃取的危险性,进而降低了传统视觉密码技术的安全性。However, most of the existing visual cryptographic techniques do not require any mathematical calculation during decryption, and the decipherer does not need any mathematical knowledge. The secret image can be recovered by simply superimposing the shared image, which increases the preservation process of the shared image. The danger of stealing, thereby reducing the security of traditional visual password technology.

发明内容SUMMARY OF THE INVENTION

为了克服上述现有技术的不足,本发明提供了一种基于视觉密码与计算机制全息图的数字图像加密解密系统,以提高数字图像加密的安全性。In order to overcome the above-mentioned deficiencies of the prior art, the present invention provides a digital image encryption and decryption system based on visual cipher and computer-made hologram, so as to improve the security of digital image encryption.

一方面,本发明公开了一种基于视觉密码与计算机制全息图的数字图像加密解密系统,包括以下步骤:分享图生成步骤:通过视觉密码算法对原始图像进行处理,生成原始图像对应的两张分享图;全息图生成步骤:通过博奇编码的修正型离轴参考光计算全息图方法,生成两张分享图对应的两张计算全息图,即两张加密图;图像重建步骤:通过激光对两张全息图重建光场,在屏幕上重叠后得到重建图像;或对两张全息图分别作二维快速逆傅立叶变换,重叠后得到重建图像,即解密图。In one aspect, the present invention discloses a digital image encryption and decryption system based on visual cipher and computer-made hologram, comprising the following steps: a step of generating a shared image: processing an original image through a visual cipher algorithm, and generating two corresponding images of the original image Sharing image; hologram generation step: through the modified off-axis reference light computational hologram method encoded by Boqi, generate two computational holograms corresponding to the two shared images, that is, two encrypted images; image reconstruction step: through laser alignment The light field is reconstructed from two holograms, and the reconstructed image is obtained after overlapping on the screen;

上述数字图像加密解密系统,所述分享图生成步骤进一步包括:图像二值化步骤,分享图A生成步骤和分享图B生成步骤。其中,图像二值化步骤,将原始RGB数字图像变为灰度图像,再将灰度图像根据图像均值变为二值化图像。分享图A生成步骤,将原始图像的二值化图像矩阵中的每一个像素点用分享图A中的一组四个像素点表征,使用伪随机数列对每组四个像素点进行二值化赋值,一共分为六种组合情况,每一组的每种情况都有两个像素点为1,两个像素点为0。分享图B生成步骤,分享图B与分享图A图像尺寸相同。根据原始图像的二值化图像矩阵每个像素点的取值,使分享图B中的每组2×2四个像素点的值与分享图A对应每组2×2四个像素点取值分别相同或者分别和为1。In the above-mentioned digital image encryption and decryption system, the step of generating a shared image further includes: an image binarization step, a step of generating a shared image A and a step of generating a shared image B. Among them, in the image binarization step, the original RGB digital image is converted into a grayscale image, and then the grayscale image is converted into a binarized image according to the average value of the image. In the step of generating the shared image A, each pixel in the binarized image matrix of the original image is represented by a group of four pixels in the shared image A, and the pseudo-random number sequence is used to binarize each group of four pixels. Assignment is divided into six combination cases, and each case in each group has two pixels as 1 and two pixels as 0. Steps for generating shared picture B. Shared picture B and shared picture A have the same image size. According to the value of each pixel of the binary image matrix of the original image, the value of each group of 2 × 2 four pixels in the shared image B and the corresponding value of each group of 2 × 2 four pixels in the shared image A respectively the same or respectively and sum to 1.

上述数字图像加密解密系统,所述全息图生成步骤进一步包括:随机相位因子添 加步骤,博奇编码修正离轴参考光步骤和全息图归一化步骤。其中,随机相位因子添加步 骤,对复数矩阵A1进行赋值,A1中的每个元素的模与分享图A对应像素点的值相等,相位用 伪随机数矩阵赋值,用以平滑函数的傅里叶变换谱;博奇编码修正离轴参考光步骤,对复数 矩阵A1进行二维快速傅立叶变换并移频到中心得到二维频域矩阵A2,将A2中每个复数元素 与离轴参考光对应的频域矩阵R中每个复数元素进行博奇编码,编码的具体操作为:去掉直 流偏置项

Figure DEST_PATH_IMAGE001
,重新构成全息函数: In the above-mentioned digital image encryption and decryption system, the hologram generation step further includes: a random phase factor adding step, a Boqi coding correction off-axis reference light step, and a hologram normalization step. Among them, the random phase factor addition step is to assign a value to the complex matrix A1. The modulus of each element in A1 is equal to the value of the corresponding pixel point of the shared image A, and the phase is assigned by a pseudo-random number matrix to smooth the Fourier transform of the function. Transform spectrum; Boqi coding corrects the off-axis reference light step, performs two-dimensional fast Fourier transform on the complex matrix A1 and shifts the frequency to the center to obtain a two-dimensional frequency domain matrix A2, and compares each complex element in A2 with the off-axis reference light. Each complex element in the frequency domain matrix R is subjected to Boqi coding. The specific operation of the coding is: remove the DC offset term
Figure DEST_PATH_IMAGE001
, reconstruct the holographic function:

Figure DEST_PATH_IMAGE002
Figure DEST_PATH_IMAGE002
;

全息图归一化步骤,对全息函数进行归一化,得到分享图A的博奇编码的修正型离轴参考光计算全息图A3,重复上述操作,得到分享图B的博奇编码的修正型离轴参考光计算全息图B3,A3与B3即为两张加密图。In the hologram normalization step, the holographic function is normalized to obtain the modified off-axis reference light computational hologram A3 of the Boqi encoding shared in Figure A, and the above operations are repeated to obtain the modified Boqi encoding of the shared Figure B. The off-axis reference light computational hologram B3, A3 and B3 are two encrypted images.

上述数字图像加密解密系统,所述图像重建步骤进一步包括:分享图全息图重建步骤和重建图像叠加步骤。其中,分享图全息图重建步骤,计算全息图A3各元素的傅里叶变换谱的幅角与模,并对各点的模归一化,将频谱的低频成分移到中心,以避免再现时像分散在边缘,得到分享图A的重建图像A4。重复上述步骤,得到得到分享图B的重建图像B4;重建图像叠加步骤,将重建图像A4与B4中的元素相加,并对得到的矩阵做归一化,得到原始图片的重建图像。In the above digital image encryption and decryption system, the image reconstruction step further includes: a shared image hologram reconstruction step and a reconstructed image overlay step. Among them, in the step of sharing the hologram reconstruction, the argument and modulus of the Fourier transform spectrum of each element of the hologram A3 are calculated, and the modulus of each point is normalized, and the low-frequency components of the spectrum are moved to the center to avoid the reproduction of The image is scattered around the edges, resulting in a reconstructed image A4 of the shared image A. The above steps are repeated to obtain the reconstructed image B4 of the shared image B; the reconstructed image overlay step is to add the elements in the reconstructed images A4 and B4, and normalize the obtained matrix to obtain the reconstructed image of the original image.

与现有技术相比,本发明具有如下优点:Compared with the prior art, the present invention has the following advantages:

(1)隐蔽性:由于加密图上的像素点与原图在空间上无关,隐藏的秘密图像不可能被看见或者通过简单的重叠破解,降低了对分享图像的保密要求;(1) Concealment: Since the pixels on the encrypted image are not spatially related to the original image, the hidden secret image cannot be seen or cracked by simple overlapping, which reduces the confidentiality requirements for shared images;

(2)绝对安全性:用任何方法,任何手段对单张加密图进行分析都不能得到任何关于秘密的有用信息;(2) Absolute security: no useful information about the secret can be obtained by analyzing a single encrypted graph by any method or any means;

(3)秘密恢复的可靠性:不同于其他任何一种传统的图像加密技术,本发明在解密时可以选择计算机辅助或者物理实现两种途径,计算机辅助即对两张加密图进行傅立叶变换并叠加得到重建图像,物理实现即使用激光照射加密图以重建光场,在屏幕上重叠解密得到重建图像;(3) Reliability of secret recovery: Unlike any other traditional image encryption technology, the present invention can choose computer-aided or physical implementation in decryption. Computer-aided means that two encrypted images are Fourier transformed and superimposed Obtain the reconstructed image, the physical realization is to use the laser to irradiate the encrypted image to reconstruct the light field, and overlap and decrypt on the screen to obtain the reconstructed image;

(4)通用性:使用者无需密码学的知识,任何人都可以使用该技术。这也是与其他密码技术不同的一个重要方面;(4) Universality: Users do not need cryptography knowledge, and anyone can use the technology. This is also an important aspect that is different from other cryptographic techniques;

(5)快捷性:由于采用了博奇编码修正型离轴参考光全息图,取代了计算全息图的直流分量,频率域中的自相关成分就不再出现,为了避免频率平面上各分量之间的重叠,透过率函数在二维方向的最高频率在x与y方向都变为原来的二分之一,抽样间距在x与y方向变为原来的两倍,总抽样点数降为无编码时的25%,从而提高了全息图(加密图)生成的速率。(5) Fastness: Due to the use of the Boqi coding modified off-axis reference light hologram, which replaces the DC component of the calculated hologram, the autocorrelation component in the frequency domain no longer appears. The maximum frequency of the transmittance function in the two-dimensional direction becomes half of the original in the x and y directions, the sampling interval becomes twice the original in the x and y directions, and the total number of sampling points is reduced to no 25% when encoding, thereby increasing the rate at which holograms (encrypted images) are generated.

附图说明Description of drawings

图1为现有技术中,视觉密码加密解密的流程图。FIG. 1 is a flow chart of encryption and decryption of a visual password in the prior art.

图2为本发明中,基于视觉密码的加密、解密系统的流程图。FIG. 2 is a flow chart of the encryption and decryption system based on the visual password in the present invention.

图3为本发明中需要加密的原始图像。FIG. 3 is the original image that needs to be encrypted in the present invention.

图4为本发明中经过视觉密码算法得到的两张分享图。FIG. 4 is two shared images obtained through a visual cryptographic algorithm in the present invention.

图5为本发明中经过博奇编码修正离轴参考光CGH后两张分享图对应的两张全息图(加密图)。FIG. 5 shows two holograms (encrypted images) corresponding to the two shared images after the off-axis reference light CGH is corrected by Boqi coding in the present invention.

图6为本发明中两张全息图(加密图)经过傅立叶变换和移频后得到的两张分享图重建图。FIG. 6 is a reconstructed image of two shared images obtained after Fourier transform and frequency shifting of two holograms (encrypted images) in the present invention.

图7为本发明中两张分享图重建图叠加后得到的原始图像重建图(解密图)。FIG. 7 is an original image reconstruction image (decryption image) obtained by superimposing two shared image reconstruction images in the present invention.

图8为本发明加密解密过程的结构框图。FIG. 8 is a structural block diagram of the encryption and decryption process of the present invention.

图9图10为视觉密码原理示意图。FIG. 9 and FIG. 10 are schematic diagrams of the principle of visual password.

具体实施方式Detailed ways

下面结合附图和具体实施方式对本发明的目的、特征与优点做进一步说明。The objects, features and advantages of the present invention will be further described below with reference to the accompanying drawings and specific embodiments.

本发明基于对安全性能的考虑,在现有技术基础上,对传统的视觉密码技术进行了改进和创新,即采用博奇编码修正型离轴参考光计算全息图技术,在视觉密码加密的基础上提升安全性与反破译能力。Based on the consideration of security performance, the present invention improves and innovates the traditional visual cryptography technology on the basis of the prior art, that is, adopts the Boqi coding modified off-axis reference light computational hologram technology, on the basis of visual cryptography encryption Improve security and anti-deciphering capabilities.

参照图2,图2为本发明基于视觉密码的加密、解密系统的流程图,,包括以下三个步骤:分享图生成步骤:通过视觉密码算法对原始图像进行处理,生成原始图像对应的两张分享图。全息图生成步骤:通过博奇编码的修正型离轴参考光计算全息图方法,生成两张分享图对应的两张计算全息图,即两张加密图。图像重建步骤:通过激光对两张全息图重建光场,在屏幕上重叠后得到重建图像;或对两张全息图分别作二维快速逆傅立叶变换,重叠后得到重建图像,即解密图。Referring to Fig. 2, Fig. 2 is a flow chart of the encryption and decryption system based on visual cipher of the present invention, comprising the following three steps: a step of generating a shared graph: processing the original image by a visual cipher algorithm, and generating two corresponding images of the original image. Share pictures. The hologram generation step: through the modified off-axis reference light computational hologram method encoded by Boqi, two computational holograms corresponding to the two shared images are generated, that is, two encrypted images. Image reconstruction steps: Reconstruct the light field of the two holograms by laser, and obtain the reconstructed image after overlapping on the screen; or perform two-dimensional fast inverse Fourier transform on the two holograms respectively, and overlap to obtain the reconstructed image, that is, the decryption map.

下面结合图4,图9和图10,对视觉密码技术生成二值化原图的两张分享图像的步骤进行详细的说明。The steps of generating two shared images of the binarized original image by the visual cryptography technology will be described in detail below with reference to FIG. 4 , FIG. 9 and FIG. 10 .

视觉密码加密问题最简单的模型就是假设秘密信息是一系列黑白像素的组合,每 个像素均被单独处理。每个原始的像素被分到n个分享中(一个分享对应于一个透明胶片), 其中每个分享都包含有m个子像素,这些打印在透明胶片上的黑白子像素彼此极为相似,从 而人类视觉系统把它们特有的黑或白的贡献平均化。一个原始像素经过上述处理后所得到 的结构可以描述为一个n×m布尔矩阵

Figure DEST_PATH_IMAGE003
,当且仅当第i个透明胶片上第j个子像素是 黑色,即
Figure DEST_PATH_IMAGE004
时。当把这些透明胶片以恰当地对齐子像素的方式重叠起来,我们就可以 看到一个结合的分享,这个结合分享中的黑色子像素是由所构成的m个列向量各自经过布 尔或运算得到的结果表示的。这个结合分享的灰度级与基于“或”运算的m维矢量的汉明权 重H(V)成比例。对满足固定阈值1≤d≤m的和满足相对差
Figure DEST_PATH_IMAGE005
的情况来说,如果H(V)≥d, 灰度级被人类视觉系统理解为黑色,如果
Figure DEST_PATH_IMAGE006
则被解读为白色。 The simplest model of the visual cryptographic problem is to assume that the secret information is a combination of a series of black and white pixels, each of which is processed individually. Each original pixel is divided into n shares (one share corresponds to a transparencies), where each share contains m sub-pixels, these black and white sub-pixels printed on the transparencies are very similar to each other, so that human vision The system averages out their characteristic black or white contributions. The structure of a raw pixel after the above processing can be described as an n×m Boolean matrix
Figure DEST_PATH_IMAGE003
, if and only if the jth subpixel on the ith transparency is black, i.e.
Figure DEST_PATH_IMAGE004
Time. When these transparencies are overlapped in such a way that the sub-pixels are properly aligned, we can see a combined share where the black sub-pixels in the combined share are formed by the boolean OR operation of each of the m column vectors. results indicated. The gray level shared by this combination is proportional to the Hamming weight H(V) of the OR-based m-dimensional vector. Satisfy the relative difference for the sum that satisfies the fixed threshold 1≤d≤m
Figure DEST_PATH_IMAGE005
In the case of , if H(V)≥d, the gray level is understood as black by the human visual system, if
Figure DEST_PATH_IMAGE006
is interpreted as white.

是一个分享中像素的数量。它代表了从原始图片到这个分享图份的分辨率的损失。我们希望越小越好。是来自于原始图像中一个白色像素和一个黑色像素在结合分享之间权重的相对差。它代表了对比度的损失。我们希望越大越好。是集合和(二者不需要大小相同,但在我们所有方案中二者都是相同的)的大小。代表了产生结合分享所需要的随机字节的数量,它不影响图像的质量。is the number of pixels in a share. It represents the loss of resolution from the original image to this shared image. We want the smaller the better. is the relative difference in weight between the combined share of a white pixel and a black pixel in the original image. It represents the loss of contrast. We hope the bigger the better. is the size of the set and (the two do not need to be the same size, but both are the same in all our scenarios). Represents the number of random bytes required to generate a combined share, it does not affect the quality of the image.

特别地,在某一个分享中的一个黑色子像素所产生的视觉效果不能通过这个像素 在其他已经解开的分享中的颜色来解密。与普通加密技术不同的是,这种单一性在加密过 程中对明文增加了随机噪声,并且在解密过程中又从密文中去掉了这些随机噪声。这个模 型也区别于更自然的模型。通常,更自然的模型是一个白色像素完全是由白色子像素的集 合来代表,黑像素完全由黑色子像素的集合来表示。因此,我们必须使用一个阈值d和

Figure 462261DEST_PATH_IMAGE005
的相对差来区别颜色。 In particular, the visual effect produced by a black sub-pixel in a certain share cannot be deciphered by the color of that pixel in other shares that have been untangled. Unlike ordinary encryption techniques, this singularity adds random noise to the plaintext during encryption and removes this random noise from the ciphertext during decryption. This model also differs from the more natural model. Usually, a more natural model is that a white pixel is represented entirely by a set of white subpixels, and a black pixel is entirely represented by a set of black subpixels. Therefore, we must use a threshold d and
Figure 462261DEST_PATH_IMAGE005
relative difference to distinguish colors.

(k,n)视觉秘密共享方案的解包含两个集合

Figure DEST_PATH_IMAGE007
Figure DEST_PATH_IMAGE008
,这两个集合都是由n×m布 尔矩阵组成的。要分享一个白色像素,我们就从集合
Figure 238456DEST_PATH_IMAGE007
中随机选择一个矩阵;要分享一个黑 色像素,就从集合
Figure 752614DEST_PATH_IMAGE008
中随机选择一个矩阵。选择的矩阵决定了n个透明胶片中所有子像素的 颜色。这个解只有满足以下三个条件时才是有效的。 The solution of the (k,n) visual secret sharing scheme contains two sets
Figure DEST_PATH_IMAGE007
and
Figure DEST_PATH_IMAGE008
, both sets consist of n×m Boolean matrices. To share a white pixel, we start with the collection
Figure 238456DEST_PATH_IMAGE007
A matrix is randomly selected from ; to share a black pixel,
Figure 752614DEST_PATH_IMAGE008
Choose a matrix at random. The chosen matrix determines the colors of all subpixels in the n transparencies. This solution is valid only if the following three conditions are met.

对于集合

Figure 147824DEST_PATH_IMAGE007
中的任意矩阵S,n行中的任意k行经过“或”运算得到的矢量均满足
Figure 431037DEST_PATH_IMAGE006
。 for collection
Figure 147824DEST_PATH_IMAGE007
Any matrix S in , the vector obtained by any k rows in n rows after the OR operation satisfies the
Figure 431037DEST_PATH_IMAGE006
.

对于集合

Figure 253500DEST_PATH_IMAGE008
中的任意矩阵S,n行中的任意k行经过“或”运算得到的矢量均满足H (V)≥d。更具体普适的视觉密码算法记载在【M.Naor and A. Shamir, Visual cryptography [C], Advances in Cryptology ,Eurocrypt, Lecture Notes in Computer Science, 1995, Vol.950:1-12】的文献中。 for collection
Figure 253500DEST_PATH_IMAGE008
For any matrix S in , the vector obtained by any k rows in n rows after the OR operation satisfies H (V)≥d. More specific and general visual cryptography algorithms are described in [M.Naor and A. Shamir, Visual cryptography [C], Advances in Cryptology ,Eurocrypt, Lecture Notes in Computer Science, 1995, Vol.950:1-12]. .

参见图5,对博奇编码修正型离轴参考光计算全息图的原理进行详细说明。对于传统光学离轴修正参考光全息图,其透过率函数为:Referring to FIG. 5 , the principle of the Boqi-encoded modified off-axis reference light computational hologram will be described in detail. For the traditional optical off-axis corrected reference light hologram, the transmittance function is:

Figure DEST_PATH_IMAGE009
Figure DEST_PATH_IMAGE009

式中前两项作为直流偏置,而第三项包含了全息图的全部信息。因此前两项是完全不 必要的,但其存在却增加了全息图的带宽要求,因此人工加直流偏置来代替前两项,重新构 成全息函数:

Figure DEST_PATH_IMAGE010
。 The first two terms in the formula are used as DC bias, and the third term contains all the information of the hologram. Therefore, the first two items are completely unnecessary, but their existence increases the bandwidth requirement of the hologram. Therefore, artificial DC bias is added to replace the first two items to reconstruct the holographic function:
Figure DEST_PATH_IMAGE010
.

其中K为常数,且使得对于所有x,y值,h(x,y)均为非负实数,归一化后max(|A(x, y)|)=1 且 R=1,全息函数变为:

Figure DEST_PATH_IMAGE011
。 where K is a constant such that h(x, y) is a non-negative real number for all x, y values, after normalization max(|A(x, y)|)=1 and R=1, the holographic function becomes:
Figure DEST_PATH_IMAGE011
.

取代了计算全息图的直流分量后,频率域中的自相关成分就不再出现,为了避免频率平面上各分量之间的重叠,透过率函数在二维方向的最高频率在x与y方向都变为原来的二分之一,抽样间距在x与y方向变为原来的两倍,总抽样点数降为无编码时的25%,为了降低全息图的动态范围,分享图像在作变换前需要先乘以随机相位因子,这种做法平滑了傅里叶变换谱,但在输出像平面的衍射图像中引入了散斑噪声。After replacing the DC component of the calculated hologram, the autocorrelation component in the frequency domain no longer appears. In order to avoid the overlap between the components on the frequency plane, the highest frequency of the transmittance function in the two-dimensional direction is in the x and y directions. All of them become half of the original, the sampling interval in the x and y directions becomes twice the original, and the total number of sampling points is reduced to 25% of that without coding. A random phase factor needs to be multiplied first, which smoothes the Fourier transform spectrum but introduces speckle noise in the diffracted image at the output image plane.

另外,如果对两张分享图片作博奇编码修正型离轴参考光CGH时,乘以的随机相位因子相同,那么可以先重叠得到的分享图全息图,再进行傅立叶变换或者激光照射,同样可以得到原始图像的重建图像。In addition, if the random phase factor multiplied by the same random phase factor is the same when the two shared pictures are used for the Boqi coding correction type off-axis reference light CGH, then the shared picture hologram obtained can be overlapped first, and then the Fourier transform or laser irradiation can be performed. Get a reconstructed image of the original image.

Claims (4)

1. A digital image encryption and decryption system based on visual passwords is characterized by comprising the following steps:
a sharing graph generation step: processing the original image through a visual password algorithm to generate two sharing images corresponding to the original image;
a hologram generation step: generating two computed holograms corresponding to the two sharing images, namely two encrypted images, by a correction type off-axis reference light computed hologram method of Boqi coding;
an image reconstruction step: reconstructing a light field of the two holograms by laser, and overlapping the light field on a screen to obtain a reconstructed image; or two holograms are respectively subjected to two-dimensional fast inverse Fourier transform and overlapped to obtain a reconstructed image, namely a decryption image.
2. The digital image encryption and decryption system according to claim 1, wherein the sharing map generation step further comprises:
an image binarization step: the method comprises the steps of changing an original RGB digital image into a gray image, and changing the gray image into a binary image according to an image mean value;
a sharing graph A generation step: representing each pixel point in a binarization image matrix of an original image by using a group of four pixel points in a sharing graph A, and performing binarization assignment on each group of four pixel points by using a pseudo random number column, wherein the combination is divided into six combination conditions, two pixel points are 1 and two pixel points are 0 in each condition of each group;
a sharing graph B generation step: the image size of the sharing image B is the same as that of the sharing image A;
according to the value of each pixel point of the binary image matrix of the original image, the values of each group of 2 × 2 four pixel points in the sharing graph B are respectively the same as or respectively 1 with the values of each group of 2 × 2 four pixel points corresponding to the sharing graph A.
3. The digital image encryption and decryption system of claim 1 wherein the hologram generation step is further characterized by:
random phase factor adding step: assigning a complex matrix A1, wherein the modulus of each element in A1 is equal to the value of a corresponding pixel point of a sharing graph A, and the phase is assigned by a pseudo-random number matrix and is used for smoothing the Fourier transform spectrum of a function;
performing two-dimensional fast Fourier transform on a complex matrix A1 and shifting the frequency to the center to obtain a two-dimensional frequency domain matrix A2, and performing Bosch coding on each complex element in A2 and each complex element in a frequency domain matrix R corresponding to the off-axis reference light, wherein the specific operation of the coding is that a direct current bias item is removed and a holographic function is reconstructed by h1(x, y) = K +2RA1(x, y) cos [2 pi α x-phi (x, y) ];
and (3) hologram normalization: and normalizing the holographic function to obtain a modified off-axis reference light calculation hologram A3 of the Bosch code of the shared graph A, and repeating the operation to obtain a modified off-axis reference light calculation hologram B3 of the Bosch code of the shared graph B, wherein A3 and B3 are two ciphers.
4. The digital image encryption and decryption system of claim 1 wherein the image reconstruction step further comprises:
reconstruction of a shared graph hologram: calculating the argument and the modulus of the Fourier transform spectrum of each element of the hologram A3, normalizing the modulus of each point, and moving the low-frequency component of the spectrum to the center to avoid the dispersion of the image at the edge during reproduction, thereby obtaining a reconstructed image A4 of the shared image A;
repeating the steps to obtain a reconstructed image B4 of the sharing image B;
and a reconstructed image superposition step: adding the elements in the reconstructed image A4 and the B4, and normalizing the obtained matrix to obtain a reconstructed image of the original picture, namely a decryption graph.
CN201811436714.1A 2018-11-28 2018-11-28 Digital image encryption and decryption system based on visual cipher Pending CN111241554A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811436714.1A CN111241554A (en) 2018-11-28 2018-11-28 Digital image encryption and decryption system based on visual cipher

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811436714.1A CN111241554A (en) 2018-11-28 2018-11-28 Digital image encryption and decryption system based on visual cipher

Publications (1)

Publication Number Publication Date
CN111241554A true CN111241554A (en) 2020-06-05

Family

ID=70863757

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811436714.1A Pending CN111241554A (en) 2018-11-28 2018-11-28 Digital image encryption and decryption system based on visual cipher

Country Status (1)

Country Link
CN (1) CN111241554A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111882477A (en) * 2020-07-28 2020-11-03 辽宁工程技术大学 An Adaptive Zero-Watermarking Method Combining Visual Cryptography and Enhanced Singular Value Decomposition
CN111897196A (en) * 2020-08-13 2020-11-06 中国科学院大学 A method and system for hiding and extracting digital holographic information
CN112669068A (en) * 2020-12-28 2021-04-16 河南省启研科技评价研究院有限公司 Market research data transmission method and system based on big data
CN113156792A (en) * 2021-02-09 2021-07-23 北京理工大学 Translation holographic multiplexing method based on cascade metasurfaces
CN113486365A (en) * 2021-05-31 2021-10-08 桂林电子科技大学 Color image optical encryption method
CN114398920A (en) * 2021-12-20 2022-04-26 深圳市光科全息技术有限公司 Code reading method, coding method and code reading device
CN115085824A (en) * 2022-05-23 2022-09-20 佛山科学技术学院 Information hiding method and device
CN116320193A (en) * 2022-07-07 2023-06-23 广州大学 Safe and computing equipment-dependence-free industrial drawing transmission method and system

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111882477A (en) * 2020-07-28 2020-11-03 辽宁工程技术大学 An Adaptive Zero-Watermarking Method Combining Visual Cryptography and Enhanced Singular Value Decomposition
CN111897196A (en) * 2020-08-13 2020-11-06 中国科学院大学 A method and system for hiding and extracting digital holographic information
CN112669068A (en) * 2020-12-28 2021-04-16 河南省启研科技评价研究院有限公司 Market research data transmission method and system based on big data
CN112669068B (en) * 2020-12-28 2024-05-14 深圳前海用友力合科技服务有限公司 Market research data transmission method and system based on big data
CN113156792A (en) * 2021-02-09 2021-07-23 北京理工大学 Translation holographic multiplexing method based on cascade metasurfaces
CN113156792B (en) * 2021-02-09 2022-03-18 北京理工大学 Translation holographic multiplexing method based on cascade metasurfaces
CN113486365A (en) * 2021-05-31 2021-10-08 桂林电子科技大学 Color image optical encryption method
CN114398920A (en) * 2021-12-20 2022-04-26 深圳市光科全息技术有限公司 Code reading method, coding method and code reading device
CN115085824A (en) * 2022-05-23 2022-09-20 佛山科学技术学院 Information hiding method and device
CN115085824B (en) * 2022-05-23 2024-03-15 佛山科学技术学院 Information hiding method and device
CN116320193A (en) * 2022-07-07 2023-06-23 广州大学 Safe and computing equipment-dependence-free industrial drawing transmission method and system

Similar Documents

Publication Publication Date Title
CN111241554A (en) Digital image encryption and decryption system based on visual cipher
CN108322622B (en) Color digital image encryption method based on 2D-VMD and eight-dimensional hyper-chaotic system
CN102800042B (en) Multi-image encryption method based on log-polar transform
Siahaan RC4 Technique in Visual Cryptography RGB Image Encryption
Panwar et al. Towards deep learning for efficient image encryption
Madhu et al. An overview of image security techiques
Hodeish et al. An optimal (k, n) visual secret sharing scheme for information security
Soleymani et al. A survey on principal aspects of secure image transmission
Sharma et al. A new image encryption using modified aes algorithm and its comparision with aes
Sirichotedumrong et al. Visual security evaluation of learnable image encryption methods against ciphertext-only attacks
CN113674365B (en) An image block encryption method and system based on chaos and computational holography
Kamal et al. A Novel Remedy for Image Encryption and Data Hiding
Shiny et al. An efficient tagged visual cryptography for color images
Dawood et al. A comprehensive review of color image encryption technology
CN109657484B (en) Multi-channel image coding and decoding method based on gamma function and ciphertext splicing
Saini et al. An intelligent and efficient CNN-AES framework for image block encryption with a multi-key approach
CN117200989A (en) Reversible image secret sharing method based on transform domain and application thereof
CN111159747B (en) A Method of Image Encryption and Restoration Using Sinusoidal Folding and Translation
CN115391796A (en) Image encryption method, image encryption system, image decryption method and image decryption system
Bal et al. An efficient safe and secured video steganography using shadow derivation
Talal et al. Steganographic Data Hiding using Quantum Behaved Particle Swarm Optimization and an enhanced AES algorithm
CN109214199B (en) An image encryption method and system and decryption method and system
Yu et al. Efficient Object-grained Video Inpainting with Personalized Recovery and Permission Control
Yu et al. Optical image encryption vulnerability detection by using generative adversarial networks
Shrivas et al. Visual cryptography in the video using halftone technique

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20200605

WD01 Invention patent application deemed withdrawn after publication