WO2017004790A1 - Cryptographic decoding method of image coding system based on double random phase and device utilizing same - Google Patents
Cryptographic decoding method of image coding system based on double random phase and device utilizing same Download PDFInfo
- Publication number
- WO2017004790A1 WO2017004790A1 PCT/CN2015/083449 CN2015083449W WO2017004790A1 WO 2017004790 A1 WO2017004790 A1 WO 2017004790A1 CN 2015083449 W CN2015083449 W CN 2015083449W WO 2017004790 A1 WO2017004790 A1 WO 2017004790A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- plaintext
- recovery
- preset
- support
- iterations
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T9/00—Image coding
- G06T9/007—Transform coding, e.g. discrete cosine transform
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/10—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols with particular housing, physical features or manual controls
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2207/00—Indexing scheme for image analysis or image enhancement
- G06T2207/20—Special algorithmic details
- G06T2207/20048—Transform domain processing
- G06T2207/20056—Discrete and fast Fourier transform, [DFT, FFT]
Definitions
- the present invention relates to the field of optical information processing, and in particular to a cryptographic cracking method and apparatus based on a dual random phase image encoding system.
- Parallel data processing is an inherent capability of an optical system, as each pixel in a two-dimensional image in an optical system can be propagated and processed simultaneously.
- the parallel processing capability of the optical system clearly has an absolute advantage.
- the optical encryption device has more degrees of freedom than the electronic encryption device. Information can be hidden in multiple degrees of freedom space.
- the wavelength, focal length, amplitude, light intensity, phase, polarization state and parameters of the optical components can be calculated by calculating the interference, diffraction, filtering, imaging, holography, etc. of the light. Perform multidimensional coding. Compared with traditional mathematics-based computer cryptography and information security technology, it has many advantages such as multi-dimensional, large capacity, high degree of freedom, high robustness, and natural parallelism.
- the dual random phase encoding encryption scheme is implemented by a standard 4-F system.
- the plaintext image is placed on the input surface of the 4-F system, and two independent (ie, statistically independent) random phase plates (as the key of the 4-F system) ) respectively placed on the input plane and the spectrum plane (also called the Fourier plane) of the 4-F system, so that the plaintext information is randomly disturbed in the spatial domain and the frequency domain, respectively, thereby whitening the spectral density distribution to reach
- a stationary white noise encrypted image whose statistical characteristics are shifted with time is obtained on the output surface of the 4-F system.
- the entire encryption process can be expressed by:
- ⁇ (x,y) FT -1 ⁇ FT ⁇ f(x,y)exp[i2 ⁇ n(x,y)] ⁇ exp[i2 ⁇ b(u,v)] ⁇
- f(x, y) is the plaintext image to be encrypted
- ⁇ (x, y) is the encrypted ciphertext
- exp[i2 ⁇ n(x, y)] is the spatial domain key
- exp[i2 ⁇ b(u, v )] is the frequency domain key
- FT ⁇ represents the Fourier transform
- FT -1 ⁇ represents the inverse Fourier transform.
- ciphertext ⁇ (x, y) is placed on the input side of the 4-F system. After Fourier transform, the conjugate exp[-i2 ⁇ b(x,y)] of the frequency domain key is used on the spectrum plane. (decryption key) filtering, the decryption process is the inverse transformation of the encryption process, which can be expressed as:
- f(x, y) represents the plaintext obtained after decryption.
- the embodiment of the invention provides a cryptographic cracking method and a cryptographic cracking device based on a double random phase image encoding system, which are used for cracking only by using ciphertext, and reducing the difficulty of cracking implementation.
- An embodiment of the present invention provides a cryptographic cracking method based on a dual random phase image encoding system, where the method includes:
- the supporting recovery processing is performed on the basis of the input function, including:
- the K pixel position at which the amplitude value of the intermediate function is the largest is taken as the support S of the current iteration, and the pixel value of each pixel is updated according to the first formula, and then returned to the pair g in the process of performing the support recovery process ( x, y) performing a Fourier transform step and subsequent steps until a preset support recovery iteration stop condition is satisfied, the initial value of K being a preset value greater than 2;
- the first formula is
- ⁇ is a preset coefficient
- the clear text recovery process is performed on the basis of the support recovery process, including:
- Step S1 is a Fourier transform on g(x, y) to obtain G(u, v)
- step S2 is to replace the amplitude value of G(u, v) with the ciphertext of the image to be decrypted.
- Performing an inverse Fourier transform to obtain g'(x, y); the step S3 is to update the input function according to the first formula;
- the accurate recovery processing is performed on the basis of the plaintext recovery processing, including:
- the NMSE reaches the preset precision, performing the step of determining the plaintext, the spatial domain key, and the frequency domain key on the basis of the accurate recovery process, if the NMSE does not reach the preset precision, Clearing the cumulative number of iterations in the exact recovery process, and returning to perform the iterative processing of the step S1, the step S2, and the step S3 based on the S and g(x, y) obtained at the time. Until the plaintext recovery iteration stop condition is satisfied;
- the step S4 is performing Fourier transform on g(x, y) to obtain G(u, v)
- the step S5 is to replace the amplitude value of G(u, v) with the image to be decrypted.
- the ciphertext is subjected to inverse Fourier transform after the amplitude
- the pixel position is used as the support S of the current iteration, and the input function is updated according to the second formula;
- the second formula is:
- the third formula is: M and N in the third formula are respectively the total number of rows and the total number of columns of pixels in the image to be decrypted;
- the determining the plaintext, the spatial domain key, and the frequency domain key on the basis of the accurate recovery process including:
- Another aspect of the embodiments of the present invention provides a cryptographic cracking apparatus based on a dual random phase image encoding system, including:
- An initialization unit configured to initialize a random number as an input function for each pixel in the image to be decrypted
- a plaintext recovery processing unit configured to perform plaintext recovery processing on the basis of the support recovery processing
- An accurate recovery processing unit configured to perform an accurate recovery process on the basis of the plaintext recovery process
- a determining unit configured to determine a plaintext, a spatial domain key, and a frequency domain key on the basis of the accurate recovery process
- the support recovery processing unit is specifically configured to:
- An iterative process is performed on an input function of each pixel, wherein an iterative process for any pixel (x, y) in the image to be decrypted includes:
- the K pixel position where the amplitude value of the intermediate function is the largest is taken as the support S of the current iteration, and the input function is updated according to the first formula, and then returns to the pair g(x, y) in the process of performing the support recovery process.
- the first formula is
- ⁇ is a preset coefficient
- the plaintext recovery processing unit is specifically configured to:
- step S1 is a Fourier transform on g(x, y) to obtain G(u, v)
- step S2 is to replace the amplitude value of G(u, v) with the ciphertext of the image to be decrypted.
- step S3 is to update the input function according to the first formula;
- the precision recovery processing unit is specifically configured to:
- step S1 If the NMSE reaches a preset accuracy, performing the accurate recovery process Determining a plaintext, a spatial domain key, and a frequency domain key, if the NMSE does not reach the preset precision, clearing the cumulative number of iterations in the exact recovery process, and obtaining the S obtained at the time And returning to perform the iterative process of step S1, step S2, and step S3 on the basis of g(x, y) until the plaintext recovery iteration stop condition is satisfied;
- the step S4 is performing Fourier transform on g(x, y) to obtain G(u, v)
- the step S5 is to replace the amplitude value of G(u, v) with the image to be decrypted.
- the ciphertext is subjected to inverse Fourier transform after the amplitude
- the pixel position is used as the support S of the current iteration, and the input function is updated according to the second formula;
- the second formula is:
- the third formula is: M and N in the third formula are respectively the total number of rows and the total number of columns of pixels in the image to be decrypted;
- the determining unit is specifically configured to:
- the ciphertext attack problem in which the ciphertext recovers only the plaintext the spatial domain key and the frequency domain key is converted into a standard phase recovery problem, that is,
- the amplitude of the input surface (ie, plaintext) and phase (ie, spatial domain key) can be recovered by the phase recovery algorithm, and then the frequency domain key can be calculated.
- a hybrid adaptive iterative phase recovery algorithm is used.
- no other prior information is needed in the cracking process, thereby effectively reducing the difficulty of cracking.
- FIG. 1 is a schematic diagram of a principle of a dual random phase image coding system
- FIG. 2 is a schematic flowchart of an embodiment of a cryptography cracking method based on a dual random phase image encoding system according to an embodiment of the present invention
- 3a and 3b are schematic diagrams illustrating a specific application scenario for determining S and ⁇ by K according to an embodiment of the present invention
- FIG. 4 is a schematic flowchart of a hybrid adaptive iterative algorithm in an application scenario according to an embodiment of the present invention
- FIG. 5-a is an original image to be encrypted (8-bit grayscale image) according to an embodiment of the present invention.
- Figure 5-b is a result of encrypting the original image to be encrypted shown in Figure 5-a by a dual random phase image encoding system
- FIG. 5-c is a support recovered by the support recovery process of FIG. 5-c by using the cryptographic cracking method in the embodiment of the present invention
- FIG. 5-d is an original image obtained by recovering FIG. 5-c by using a cryptographic cracking method in the embodiment of the present invention
- 6-a is an original image to be encrypted (binary graph) according to an embodiment of the present invention.
- 6-b is a result of encrypting the original image to be encrypted shown in FIG. 6-a by a dual random phase image encoding system
- Figure 6-c is a support recovered by the support recovery process of Figure 6-c by using the cryptographic cracking method in the embodiment of the present invention
- FIG. 6-d is an original image obtained by recovering FIG. 6-c by using a cryptographic cracking method in the embodiment of the present invention.
- FIG. 7 is a schematic structural diagram of an embodiment of a cryptography cracking apparatus based on a dual random phase image encoding system according to an embodiment of the present invention.
- FIG. 1 is a schematic diagram of the principle of the dual random phase image encoding system.
- the dual random phase image coding system is implemented using a standard 4-F system, 103, 104 are two Fourier lenses, and two statistically independent random phase plates 102 and 105 are placed in the input plane and spectrum of the 4-F system, respectively.
- the spatial information and the spectral information of the original image 101 (represented by f(x, y)) are randomly disturbed, thereby whitening the spectral density distribution to achieve the purpose of encrypting the image, and the statistical characteristics are obtained on the output plane.
- a constant stationary white noise image 106 (represented by ⁇ (u,v)).
- the entire encryption process can be expressed by:
- ⁇ (x,y) FT -1 ⁇ FT ⁇ f(x,y)exp[i2 ⁇ n(x,y)] ⁇ exp[i2 ⁇ b(u,v)] ⁇ ;
- f(x, y) is the plaintext image to be encrypted
- ⁇ (x, y) is the encrypted ciphertext
- exp[i2 ⁇ n(x, y)] is the spatial domain key
- FT ⁇ represents the Fourier transform
- FT -1 ⁇ represents the inverse Fourier transform.
- ciphertext x(x, y) is placed on the input side of the 4-F system. After Fourier transform, the conjugate exp[-i2 ⁇ b(x,y)] of the frequency domain key is used on the spectrum surface. (decryption key) filtering, the decryption process is the inverse transformation of the encryption process, which can be expressed as:
- ⁇ (x,y) FT -1 ⁇ FT ⁇ g(x,y) ⁇ exp[i2 ⁇ b(u,v)] ⁇ ;
- ⁇ (u,v) FT ⁇ g(x,y) ⁇ exp[i2 ⁇ b(u,v)];
- the cracker can obtain the ciphertext ⁇ (x, y) corresponding to the plaintext f(x, y)
- the input plane that is, the plaintext f(x, y) ⁇ exp[ with the phase key] can be obtained. I2 ⁇ n(x, y)]
- the intensity in the frequency domain is converted into a standard.
- the phase recovery problem that is, in the case of the known input plane frequency domain strength, the phase recovery algorithm can recover the amplitude (ie, plaintext) and phase (ie, spatial domain key) of the input plane, and then calculate the frequency domain. Key.
- the cryptographic cracking method in the embodiment of the present invention includes:
- the cryptographic cracking device initializes a random number as an input function for each pixel in the image to be decrypted, and the random number initialized by each pixel corresponds to a random value in the gray range, for example, gray.
- the degree range is 0 to 255, and the value of the random number initialized at each pixel (ie, the pixel value) is a value randomly selected from 0 to 255.
- the cryptographic cracking device iteratively processes the input function g(x, y) in the support recovery processing phase, wherein each iterative processing includes:
- the K pixel position where the amplitude value of the intermediate function is the largest is taken as the support S of the current iteration, and the input function is updated according to the first formula, and then returns to the pair g(x, y) in the process of performing the support recovery process. Perform the Fourier transform step and subsequent steps until the preset support is restored
- the initial value of the K is a preset value greater than 2, and optionally, the initial value of K may take 1% of the total number of pixels in the image to be decrypted;
- the first formula is
- ⁇ is a preset coefficient, and generally, ⁇ is 0.9, or ⁇ can be summarized according to actual conditions or experience, and is not limited herein.
- the first formula above indicates that if the pixel point is in the S range, the input function (ie, the pixel value) of the pixel point remains unchanged. If the pixel point is outside the S range, the new input function of the pixel point is this time.
- An iterative linear combination of input and output. This algorithm can be called the Dynamic Hybrid Input-Output (DH) algorithm.
- DH Dynamic Hybrid Input-Output
- the K pixel points with the largest amplitude value of the intermediate function are used as the support S of the current iteration, and the input function is updated according to the first formula, and then includes:
- the cryptographic cracking device determines whether the cumulative number of iterations in the support recovery process reaches T4, wherein the T4 is a preset value greater than 2, and specifically, T4 may take 200.
- the threshold determined by K is less than a preset threshold, wherein the threshold determined by K is equal to the current g'(x, y).
- the amplitude value of the Kth g'(x, y) whose amplitude value is arranged from large to small;
- step 202 is specifically performed as follows: 200 times per iteration in the support recovery process, and observing a threshold determined by K (for convenience of description, the threshold value determined by K is described as ⁇ ) ⁇ is not less than the preset threshold (for convenience of description, the threshold value determined by ⁇ is described as c 1 ), indicating that the black background area should still have a value, and the support area is not large enough, then the K value is increased to be decrypted.
- the following examples illustrate the support S and ⁇ determined by K.
- the size of the picture to be decrypted is 5*5 pixels as shown in Figure 3-a.
- the pixel value of each pixel is marked on Figure 3-a.
- the 6 pixel points whose amplitude value of the intermediate function (that is, the pixel value of the sub-pixel point) is the largest is taken as the support S of the current iteration, and the support determined according to the K value is supported.
- S is the pixel portion of the white bottom in Figure 3-b.
- the amplitude value of the sixth g'(x, y) when the amplitude value of the secondary function is arranged from large to small is the threshold value determined by K, ⁇ .
- the plaintext recovery processing process is similar to the above-described support recovery processing process, and the only difference is that the S obtained when the support recovery iteration stops is kept unchanged during the plaintext recovery processing, that is, the standard mixed input-output is used ( HIO, Hybrid Input-Output algorithm.
- the cryptographic cracking device performs plaintext recovery processing on the basis of the foregoing support recovery processing, including:
- step S1 is a Fourier transform on g(x, y) to obtain G(u, v)
- step S2 is to replace the amplitude value of G(u, v) with the ciphertext of the image to be decrypted at the frequency.
- is then inverse Fourier transformed to obtain g'(x, y);
- step S3 is to update the input function according to the first formula;
- the following includes:
- the step S1 is performed (ie, a new iteration is performed).
- the number of iterations may be preset to a value of about 600 or 600.
- the number of iterations may be increased or decreased as appropriate.
- CF English full name Change Flipping
- the main function of the CF algorithm is to further accurately support the boundary, and can effectively improve the pixel distribution inside and outside, thereby reducing the error in the frequency domain.
- the HIO algorithm and the CF algorithm are alternately used. The specific process is as follows:
- NMSE mean squared error
- the NMSE reaches the preset precision, performing the step of determining the plaintext, the spatial domain key, and the frequency domain key on the basis of the accurate recovery process, if the NMSE does not reach the preset precision, Clearing the cumulative number of iterations in the exact recovery process, and returning to perform the iterative processing of the step S1, the step S2, and the step S3 based on the S and g(x, y) obtained at the time. (ie, returning to the plaintext recovery process based on the S and g(x, y) obtained at the time) until the plaintext recovery iteration stop condition is satisfied.
- the step S4 is performing Fourier transform on g(x, y) to obtain G(u, v)
- the step S5 is to replace the amplitude value of G(u, v) with the image to be decrypted.
- the ciphertext is subjected to inverse Fourier transform after the amplitude
- the pixel is used as the support S of the current iteration, and the input function is updated according to the second formula described above;
- the third formula is: M and N in the third formula are the total number of rows and the total number of columns of pixels in the image to be decrypted, respectively.
- the above T1 is equal to 10
- the above T2 is equal to 10
- the above T3 is equal to 200.
- the cryptographic cracking device determines the amplitude value of g(x, y) obtained after the accurate recovery process as the to-be-decrypted a plaintext of the image, the phase portion of g(x, y) obtained after the accurate restoration processing is determined as a spatial domain key of the image to be decrypted;
- * represents the complex conjugate of the original function. Since the original plaintext is not known in the actual situation, it cannot be judged whether the restored plaintext is inverted, so it can be passed separately. with Two frequency domain keys are solved, and the subsequent ciphertexts are respectively decrypted by using the two frequency domain keys, and the frequency domain key capable of decrypting the meaningful image is the correct frequency domain key.
- the recovered plaintext may be shifted or flipped compared with the original plaintext. This is unavoidable, but it does not affect the cracker's understanding of the plaintext information, so it can be regarded as a successful recovery.
- T4 is set above 200, the number of iterations of step 203 to restore the plaintext pre-processing 600, T3 is above 200, in step 204 the predetermined accuracy of C 2, the embodiment of the present invention hybrid adaptive iterative algorithm implemented
- the flow diagram can be as shown in Figure 4.
- g(x, y) in the embodiment of the present invention is a binary function, and the physical meaning representation is an image.
- g(x, y) corresponds to a coordinate (x). , pixel value at y).
- FIG. 5-a the original image to be encrypted (8-bit grayscale image) is shown in FIG. 5.
- -b is the result of encrypting the original image to be encrypted shown in FIG. 5-a by the dual random phase image encoding system, as shown in FIG. 5-c
- the cryptographic cracking method in the embodiment of the present invention is used to perform FIG. 5-c.
- the support recovered by the support recovery process, as shown in FIG. 5-d is an original image obtained by restoring FIG. 5-c by using the cryptographic cracking method in the embodiment of the present invention.
- Figure 6-a the original image to be encrypted (binary image) is shown.
- Figure 6-b shows the original image to be encrypted shown in Figure 6-a encrypted by the dual random phase image encoding system.
- the support recovered by the support recovery process of FIG. 6-c is performed by using the cryptographic cracking method in the embodiment of the present invention
- FIG. 6-d is a cryptographic crack in the embodiment of the present invention. Method The original image obtained by restoring Fig. 6-c is performed.
- the solution of the present invention converts the ciphertext attack problem of only the plaintext, the spatial domain key and the frequency domain key from the ciphertext into a standard phase recovery problem, that is, the known input.
- a standard phase recovery problem that is, the known input.
- the amplitude of the input surface (ie, plaintext) and phase (ie, the spatial domain key) can be recovered by the phase recovery algorithm, and then the frequency domain key can be calculated.
- a hybrid adaptive iterative phase recovery algorithm is used.
- no other prior information is needed in the cracking process, thereby effectively reducing the difficulty of cracking.
- the embodiment of the present invention further provides a cryptographic cracking apparatus based on a dual random phase image encoding system.
- the cryptographic cracking apparatus 700 in the embodiment of the present invention includes:
- the initializing unit 701 is configured to initialize a random number as an input function for each pixel in the image to be decrypted;
- Support recovery processing unit 702 configured to perform support recovery processing on the basis of the input function
- the plaintext recovery processing unit 703 is configured to perform plaintext recovery processing on the basis of the support recovery process
- the accurate recovery processing unit 704 is configured to perform an accurate recovery process on the basis of the plaintext recovery process
- a determining unit 705 configured to determine a plaintext, a spatial domain key, and a frequency domain key on the basis of the exact recovery process
- the support recovery processing unit 702 is specifically configured to:
- the K pixel position where the amplitude value of the intermediate function is the largest is taken as the support S of the current iteration, and the input function is updated according to the first formula, and then returns to the pair g(x, y) in the process of performing the support recovery process.
- the first formula is
- ⁇ is a preset coefficient
- the plaintext recovery processing unit 703 is specifically configured to:
- step S1 is a Fourier transform on g(x, y) to obtain G(u, v)
- step S2 is to replace the amplitude value of G(u, v) with the ciphertext of the image to be decrypted.
- step S3 is to update the input function according to the first formula;
- the exact recovery processing unit 704 is specifically configured to:
- the NMSE reaches the preset precision, performing the step of determining the plaintext, the spatial domain key, and the frequency domain key on the basis of the accurate recovery process, if the NMSE does not reach the preset precision, Clearing the cumulative number of iterations in the exact recovery process, and returning to perform the iterative processing of the step S1, the step S2, and the step S3 based on the S and g(x, y) obtained at the time. Until the plaintext recovery iteration stop condition is satisfied;
- the step S4 is performing Fourier transform on g(x, y) to obtain G(u, v)
- the step S5 is to replace the amplitude value of G(u, v) with the image to be decrypted.
- the ciphertext is subjected to inverse Fourier transform after the amplitude
- the pixel is used as the support S of the current iteration, and the input function is updated according to the second formula;
- the second formula is:
- the third formula is: M and N in the third formula are respectively the total number of rows and the total number of columns of pixels in the image to be decrypted;
- the determining unit 705 is specifically configured to:
- the support recovery processing unit 702 is specifically configured to:
- the K pixel points having the largest amplitude value of the intermediate function are used as the support S of the current iteration, and After updating the input function according to the first formula, determining whether the cumulative number of iterations in the support recovery process reaches T4, wherein the T4 is a preset value greater than 2;
- the threshold determined by K is less than a preset threshold, wherein the threshold determined by K is equal to the current g'(x, y).
- the amplitude value of the Kth g'(x, y) whose amplitude value is arranged from large to small;
- the plaintext recovery processing unit 703 is specifically configured to:
- step S1 If the cumulative number of iterations in the plaintext recovery process does not reach the preset number of iterations, the process returns to step S1.
- the cryptographic cracking device in the embodiment of the present invention may be used as the cryptographic cracking device mentioned in the foregoing method embodiments, and may be used to implement all the technical solutions in the foregoing method embodiments, each of which is
- the function of the function module may be specifically implemented according to the method in the foregoing method embodiment.
- the solution of the present invention converts the ciphertext attack problem of only the plaintext, the spatial domain key and the frequency domain key from the ciphertext into a standard phase recovery problem, that is, the known input.
- a standard phase recovery problem that is, the known input.
- the amplitude of the input surface (ie, plaintext) and phase (ie, the spatial domain key) can be recovered by the phase recovery algorithm, and then the frequency domain key can be calculated.
- a hybrid adaptive iterative phase recovery algorithm is used.
- no other prior information is needed in the cracking process, thereby effectively reducing the difficulty of cracking.
- the disclosed apparatus and method may be implemented in other manners.
- the device embodiments described above are merely illustrative.
- the division of the above units is only a logical function division.
- there may be another division manner for example, multiple units or components may be combined or may be Integrate into another system, or some features can be ignored or not executed.
- the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
- the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
- each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
- the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
- the integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable storage medium.
- the technical solution of the present invention which is essential or contributes to the prior art, or all or part of the technical solution, may be embodied in the form of a software product stored in a storage medium.
- a number of instructions are included to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present invention.
- the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like. .
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Image Analysis (AREA)
- Discrete Mathematics (AREA)
- Multimedia (AREA)
- Facsimile Transmission Control (AREA)
- Image Processing (AREA)
Abstract
Description
本发明涉及光学信息处理领域,具体涉及一种基于双随机相位图像编码系统的密码学破解方法和装置。The present invention relates to the field of optical information processing, and in particular to a cryptographic cracking method and apparatus based on a dual random phase image encoding system.
基于光学理论与方法的数据加密和信息隐藏是近年来国际上开始起步发展的新一代信息安全技术。并行数据处理是光学系统的固有能力,如在光学系统中一副二维图像中每一个像素都可以同时得被传播和处理。当进行大量信息处理时,光学系统的并行处理能力很明显占有绝对的优势。并且,所处理的图像越复杂,信息量越大,这种优势就越明显。同时光学加密装置比电子加密装置具有更多的自由度。信息可以被隐藏在多个自由度空间中。在完成数据加密或信息隐藏的过程中,可以通过计算光的干涉、衍射、滤波、成像、全息等过程,对涉及的波长、焦距、振幅、光强、相位、偏振态及光学元件的参数等进行多维编码。与传统基于数学的计算机密码学和信息安全技术相比,具有多维度、大容量、高自由度、高鲁棒性、天然并行性等诸多优势。Data encryption and information hiding based on optical theory and method are a new generation of information security technology that has begun to develop in the world in recent years. Parallel data processing is an inherent capability of an optical system, as each pixel in a two-dimensional image in an optical system can be propagated and processed simultaneously. When a large amount of information processing is performed, the parallel processing capability of the optical system clearly has an absolute advantage. Moreover, the more complex the processed image, the greater the amount of information, the more obvious this advantage. At the same time, the optical encryption device has more degrees of freedom than the electronic encryption device. Information can be hidden in multiple degrees of freedom space. In the process of data encryption or information hiding, the wavelength, focal length, amplitude, light intensity, phase, polarization state and parameters of the optical components can be calculated by calculating the interference, diffraction, filtering, imaging, holography, etc. of the light. Perform multidimensional coding. Compared with traditional mathematics-based computer cryptography and information security technology, it has many advantages such as multi-dimensional, large capacity, high degree of freedom, high robustness, and natural parallelism.
在众多光学加密方案中,美国B.Javidi的研究成果最具代表性。Javidi等人于1995年首次提出可由光学器件实现的双随机相位图像编码加密方案,并成功将一幅明文图像加密成噪声图像,该技术已获美国专利保护。此后,其它基于双随机相位图像编码系统的加密方案相继被提出。Among the many optical encryption schemes, the research results of B.Javidi in the United States are the most representative. In 1995, Javidi et al. first proposed a dual random phase image encoding and encryption scheme that can be implemented by optical devices, and successfully encrypted a plaintext image into a noise image. This technology has been protected by US patents. Thereafter, other encryption schemes based on dual random phase image coding systems have been proposed.
双随机相位编码加密方案采用标准4-F系统来实现,明文图像置于4-F系统的输入面上,两块相互独立(即统计无关)的随机相位板(作为4-F系统的密钥)分别置于4-F系统的输入平面和频谱平面(也称为傅里叶平面)上,使得明文信息分别在空间域和频率域受到随机扰乱,从而白化谱密度分布,达到 加密图像的目的,最后在4-F系统的输出面上得到统计特性随时间平移不变的平稳白噪声加密图像。整个加密过程可以由下式表达:The dual random phase encoding encryption scheme is implemented by a standard 4-F system. The plaintext image is placed on the input surface of the 4-F system, and two independent (ie, statistically independent) random phase plates (as the key of the 4-F system) ) respectively placed on the input plane and the spectrum plane (also called the Fourier plane) of the 4-F system, so that the plaintext information is randomly disturbed in the spatial domain and the frequency domain, respectively, thereby whitening the spectral density distribution to reach For the purpose of encrypting the image, finally, a stationary white noise encrypted image whose statistical characteristics are shifted with time is obtained on the output surface of the 4-F system. The entire encryption process can be expressed by:
ψ(x,y)=FT-1{FT{f(x,y)exp[i2πn(x,y)]}·exp[i2πb(u,v)]}ψ(x,y)=FT -1 {FT{f(x,y)exp[i2πn(x,y)]}·exp[i2πb(u,v)]}
其中,f(x,y)为待加密的明文图像,ψ(x,y)为加密得到的密文,exp[i2πn(x,y)]为空间域密钥,exp[i2πb(u,v)]为频率域密钥,FT{·}代表傅里叶变换,FT-1{·}代表逆傅里叶变换。Where f(x, y) is the plaintext image to be encrypted, ψ(x, y) is the encrypted ciphertext, exp[i2πn(x, y)] is the spatial domain key, exp[i2πb(u, v )] is the frequency domain key, FT{·} represents the Fourier transform, and FT -1 {·} represents the inverse Fourier transform.
解密时,密文ψ(x,y)置于4-F系统的输入面,经傅里叶变换后,在频谱平面上用频率域密钥的共轭exp[-i2πb(x,y)](解密密钥)滤波,解密过程则是加密过程的逆变换,可以表示为下式:When decrypting, ciphertext ψ(x, y) is placed on the input side of the 4-F system. After Fourier transform, the conjugate exp[-i2πb(x,y)] of the frequency domain key is used on the spectrum plane. (decryption key) filtering, the decryption process is the inverse transformation of the encryption process, which can be expressed as:
其中,f(x,y)代表解密后得到的明文。Where f(x, y) represents the plaintext obtained after decryption.
在与密码编码学领域相对立而又相互促进的密码分析学领域,西班牙的A.Carnicer等人首次发现,通过“选择密文攻击”的方法可以分析得到双随机相位图像编码系统的频谱平面密钥,然而,上述方法一方面需要攻击者选择大量的精心设计的密文,实施难度较大且复杂,另一方面需要获取的资源较多,如需要事先获取密文ψ(x,y)及其相应的明文f(x,y),即,需要事先获取明文-密文对。In the field of cryptanalysis, which is opposite and mutually reinforcing in the field of cryptography, Spain's A. Carnicer et al. first discovered that the spectrum plane density of the double random phase image coding system can be analyzed by the method of "choose ciphertext attack". Key, however, the above method requires the attacker to select a large number of well-designed ciphertexts on the one hand, which is difficult and complicated to implement, and on the other hand, there are many resources to be acquired, such as obtaining ciphertext (x, y) in advance and The corresponding plaintext f(x, y), that is, the plaintext-ciphertext pair needs to be obtained in advance.
本发明实施例提供了一种基于双随机相位图像编码系统的密码学破解方法和密码学破解装置,用于仅利用密文进行破解,降低破解实施难度。The embodiment of the invention provides a cryptographic cracking method and a cryptographic cracking device based on a double random phase image encoding system, which are used for cracking only by using ciphertext, and reducing the difficulty of cracking implementation.
本发明实施例一方面提供一种基于双随机相位图像编码系统的密码学破解方法,所述方法包括:An embodiment of the present invention provides a cryptographic cracking method based on a dual random phase image encoding system, where the method includes:
针对待解密图像中的每个像素点初始化一随机数作为输入函数;Initializing a random number as an input function for each pixel in the image to be decrypted;
在所述输入函数的基础上进行支撑恢复处理;Performing support recovery processing on the basis of the input function;
在所述支撑恢复处理的基础上进行明文恢复处理;Performing plaintext recovery processing on the basis of the support recovery processing;
在所述明文恢复处理的基础上进行精确恢复处理;Performing accurate recovery processing on the basis of the plaintext recovery processing;
在所述精确恢复处理的基础上确定明文、空间域密钥和频率域密钥;Determining a plaintext, a spatial domain key, and a frequency domain key on the basis of the exact recovery process;
其中,所述在所述输入函数的基础上进行支撑恢复处理,包括:Wherein, the supporting recovery processing is performed on the basis of the input function, including:
对输入函数g(x,y)进行迭代处理,其中,每一次的迭代处理包括:Iterative processing of the input function g(x, y), wherein each iterative processing includes:
对g(x,y)进行傅里叶变换,得到G(u,v),其中,g(x,y)表示所述待解密图像中第x行第y列的像素点当次的像素值;Performing a Fourier transform on g(x, y) to obtain G(u, v), where g(x, y) represents the pixel value of the pixel of the xth row and the yth column in the image to be decrypted. ;
将G(u,v)的振幅值替换为所述待解密图像的密文在频率域的振幅|ψ(u,v)|后进行逆傅里叶变换,得到中间函数g'(x,y);Substituting the amplitude value of G(u,v) with the amplitude of the ciphertext of the image to be decrypted in the frequency domain |ψ(u,v)|, and performing an inverse Fourier transform to obtain an intermediate function g'(x,y) );
将中间函数的振幅值最大的K个像素点位置作为当次迭代的支撑S,并根据第一公式更新各像素点的像素值,之后返回执行所述支撑恢复处理过程中的所述对g(x,y)进行傅里叶变换的步骤以及后续步骤,直至满足预设的支撑恢复迭代停止条件,所述K的初始值为大于2的预设值;The K pixel position at which the amplitude value of the intermediate function is the largest is taken as the support S of the current iteration, and the pixel value of each pixel is updated according to the first formula, and then returned to the pair g in the process of performing the support recovery process ( x, y) performing a Fourier transform step and subsequent steps until a preset support recovery iteration stop condition is satisfied, the initial value of K being a preset value greater than 2;
所述第一公式为
在上述第一公式中,β为预设系数;In the above first formula, β is a preset coefficient;
其中,所述在所述支撑恢复处理的基础上进行明文恢复处理,包括:The clear text recovery process is performed on the basis of the support recovery process, including:
在所述支撑恢复迭代停止时得到的S和g(x,y)的基础上,执行步骤S1、步骤S2和步骤S3的迭代处理,直至满足预设的明文恢复迭代停止条件,其中,所述步骤S1为对g(x,y)进行傅里叶变换,得到G(u,v),所述步骤S2为将G(u,v)的振幅值替换为所述待解密图像的密文在频率域的振幅|ψ(u,v)|后 进行逆傅里叶变换,得到g'(x,y);所述步骤S3为根据所述第一公式更新输入函数;Performing the iterative process of step S1, step S2, and step S3 on the basis of S and g(x, y) obtained when the support resumes the iteration stop, until the preset plaintext recovery iteration stop condition is satisfied, wherein Step S1 is a Fourier transform on g(x, y) to obtain G(u, v), and step S2 is to replace the amplitude value of G(u, v) with the ciphertext of the image to be decrypted. The amplitude of the frequency domain |ψ(u,v)| Performing an inverse Fourier transform to obtain g'(x, y); the step S3 is to update the input function according to the first formula;
其中,所述在所述明文恢复处理的基础上进行精确恢复处理,包括:The accurate recovery processing is performed on the basis of the plaintext recovery processing, including:
在明文恢复处理停止时得到的S和g(x,y)的基础上,迭代执行T1次所述步骤S1、S2和S3,接着迭代执行T2次步骤S4、S5和S6,交替进行直至所述精确恢复处理过程中的累计迭代次数达到T3,其中,所述T1、T2和T3为大于2的预设值,且所述T3大于所述T1和所述T2的和;On the basis of S and g(x, y) obtained when the plaintext recovery processing is stopped, iteratively performs steps S1, S2, and S3 of T1 times, and then iteratively performs steps S4, S5, and S6 of T2, alternately until the said The cumulative number of iterations in the exact recovery process reaches T3, wherein the T1, T2, and T3 are preset values greater than 2, and the T3 is greater than the sum of the T1 and the T2;
当在所述精确恢复处理过程中的累计迭代次数达到所述T3时,根据第三公式计算均方误差NMSE;When the cumulative number of iterations in the precise recovery process reaches the T3, the mean square error NMSE is calculated according to the third formula;
若所述NMSE达到预设精度,则执行所述在所述精确恢复处理的基础上确定明文、空间域密钥和频率域密钥的步骤,若所述NMSE未达到所述预设精度,则将所述精确恢复处理过程中的累计迭代次数清零,并以当次得到的S和g(x,y)为基础返回执行所述步骤S1、所述步骤S2和所述步骤S3的迭代处理,直至满足所述明文恢复迭代停止条件;If the NMSE reaches the preset precision, performing the step of determining the plaintext, the spatial domain key, and the frequency domain key on the basis of the accurate recovery process, if the NMSE does not reach the preset precision, Clearing the cumulative number of iterations in the exact recovery process, and returning to perform the iterative processing of the step S1, the step S2, and the step S3 based on the S and g(x, y) obtained at the time. Until the plaintext recovery iteration stop condition is satisfied;
其中,所述步骤S4为对g(x,y)进行傅里叶变换,得到G(u,v),所述步骤S5为将G(u,v)的振幅值替换为所述待解密图像的密文在频率域的振幅|ψ(u,v)|后进行逆傅里叶变换,得到中间函数g'(x,y),所述步骤S6为将中间函数的振幅值最大的K个像素点位置作为当次迭代的支撑S,并根据第二公式更新输入函数;Wherein, the step S4 is performing Fourier transform on g(x, y) to obtain G(u, v), and the step S5 is to replace the amplitude value of G(u, v) with the image to be decrypted. The ciphertext is subjected to inverse Fourier transform after the amplitude |ψ(u,v)| in the frequency domain to obtain an intermediate function g'(x, y), and the step S6 is K which maximizes the amplitude value of the intermediate function. The pixel position is used as the support S of the current iteration, and the input function is updated according to the second formula;
所述第二公式为:
所述第三公式为:
其中,所述在所述精确恢复处理的基础上确定明文、空间域密钥和频率域密钥,包括:The determining the plaintext, the spatial domain key, and the frequency domain key on the basis of the accurate recovery process, including:
将所述精确恢复处理后得到的g(x,y)的振幅值确定为所述待解密图像的明文,将所述精确恢复处理后得到的g(x,y)的相位部分确定为所述待解密图像的空间域密钥;Determining an amplitude value of g(x, y) obtained by the accurate restoration processing as a plaintext of the image to be decrypted, and determining a phase portion of g(x, y) obtained by the accurate restoration processing as the The spatial domain key of the image to be decrypted;
根据第四公式确定所述待解密图像的频率域密钥exp[i2πb(u,v)],Determining a frequency domain key exp[i2πb(u,v)] of the image to be decrypted according to a fourth formula,
其中,所述第四公式为:Wherein the fourth formula is:
本发明实施例另一方面提供一种基于双随机相位图像编码系统的密码学破解装置,包括:Another aspect of the embodiments of the present invention provides a cryptographic cracking apparatus based on a dual random phase image encoding system, including:
初始化单元,用于针对待解密图像中的每个像素点初始化一随机数作为输入函数;An initialization unit, configured to initialize a random number as an input function for each pixel in the image to be decrypted;
支撑恢复处理单元,用于在所述输入函数的基础上进行支撑恢复处理;Supporting a recovery processing unit for performing support recovery processing on the basis of the input function;
明文恢复处理单元,用于在所述支撑恢复处理的基础上进行明文恢复处理;a plaintext recovery processing unit, configured to perform plaintext recovery processing on the basis of the support recovery processing;
精确恢复处理单元,用于在所述明文恢复处理的基础上进行精确恢复处理;An accurate recovery processing unit, configured to perform an accurate recovery process on the basis of the plaintext recovery process;
确定单元,用于在所述精确恢复处理的基础上确定明文、空间域密钥和频率域密钥;a determining unit, configured to determine a plaintext, a spatial domain key, and a frequency domain key on the basis of the accurate recovery process;
其中,所述支撑恢复处理单元具体用于:The support recovery processing unit is specifically configured to:
对各个像素点的输入函数进行迭代处理,其中,对于所述待解密图像中的任一像素点(x,y)的迭代处理包括:An iterative process is performed on an input function of each pixel, wherein an iterative process for any pixel (x, y) in the image to be decrypted includes:
对g(x,y)进行傅里叶变换,得到G(u,v),其中,g(x,y)表示所述 待解密图像中第x行第y列的像素点当次的像素值;Performing a Fourier transform on g(x, y) to obtain G(u, v), where g(x, y) represents the The pixel value of the pixel of the xth row and the yth column in the image to be decrypted;
将G(u,v)的振幅值替换为所述待解密图像的密文在频率域的振幅|ψ(u,v)|后进行逆傅里叶变换,得到中间函数g'(x,y);Substituting the amplitude value of G(u,v) with the amplitude of the ciphertext of the image to be decrypted in the frequency domain |ψ(u,v)|, and performing an inverse Fourier transform to obtain an intermediate function g'(x,y) );
将中间函数的振幅值最大的K个像素点位置作为当次迭代的支撑S,并根据第一公式更新输入函数,之后返回执行所述支撑恢复处理过程中的所述对g(x,y)进行傅里叶变换的步骤以及后续步骤,直至满足预设的支撑恢复迭代停止条件,所述K的初始值为大于2的预设值;The K pixel position where the amplitude value of the intermediate function is the largest is taken as the support S of the current iteration, and the input function is updated according to the first formula, and then returns to the pair g(x, y) in the process of performing the support recovery process. Performing a Fourier transform step and a subsequent step until a preset support recovery iteration stop condition is satisfied, and the initial value of the K is a preset value greater than 2;
所述第一公式为
在上述第一公式中,β为预设系数;In the above first formula, β is a preset coefficient;
其中,所述明文恢复处理单元具体用于:The plaintext recovery processing unit is specifically configured to:
在所述支撑恢复迭代停止时得到的S和g(x,y)的基础上,进执行步骤S1、步骤S2和步骤S3的迭代处理,直至满足预设的明文恢复迭代停止条件,其中,所述步骤S1为对g(x,y)进行傅里叶变换,得到G(u,v),所述步骤S2为将G(u,v)的振幅值替换为所述待解密图像的密文在频率域的振幅|ψ(u,v)|后进行逆傅里叶变换,得到g'(x,y);所述步骤S3为根据所述第一公式更新输入函数;On the basis of S and g(x, y) obtained when the support recovery is iteratively stopped, the iterative process of step S1, step S2 and step S3 is performed until the preset plaintext recovery iteration stop condition is satisfied, wherein Step S1 is a Fourier transform on g(x, y) to obtain G(u, v), and step S2 is to replace the amplitude value of G(u, v) with the ciphertext of the image to be decrypted. Performing an inverse Fourier transform on the amplitude |ψ(u,v)| of the frequency domain to obtain g'(x, y); the step S3 is to update the input function according to the first formula;
其中,所述精确恢复处理单元具体用于:The precision recovery processing unit is specifically configured to:
在所述明文恢复迭代停止时得到的S和g(x,y)的基础上,迭代执行T1次所述步骤S1、S2和S3,接着迭代执行T2次步骤S4、S5和S6,交替进行直至所述精确恢复处理过程中的累计迭代次数达到T3,其中,所述T1、T2和T3为大于2的预设值,且所述T3大于所述T1和所述T2的和;On the basis of S and g(x, y) obtained when the plaintext recovery iteration is stopped, iteratively performs steps S1, S2 and S3 of T1 times, and then iteratively performs steps T4, S5 and S6 of T2, and alternates until The cumulative number of iterations in the exact recovery process reaches T3, wherein the T1, T2, and T3 are preset values greater than 2, and the T3 is greater than the sum of the T1 and the T2;
当在所述精确恢复处理过程中的累计迭代次数达到所述T3时,根据第三公式计算均方误差NMSE;When the cumulative number of iterations in the precise recovery process reaches the T3, the mean square error NMSE is calculated according to the third formula;
若所述NMSE达到预设精度,则执行所述在所述精确恢复处理的基础上 确定明文、空间域密钥和频率域密钥的步骤,若所述NMSE未达到所述预设精度,则将所述精确恢复处理过程中的累计迭代次数清零,并以当次得到的S和g(x,y)为基础返回执行所述步骤S1、所述步骤S2和所述步骤S3的迭代处理,直至满足所述明文恢复迭代停止条件;If the NMSE reaches a preset accuracy, performing the accurate recovery process Determining a plaintext, a spatial domain key, and a frequency domain key, if the NMSE does not reach the preset precision, clearing the cumulative number of iterations in the exact recovery process, and obtaining the S obtained at the time And returning to perform the iterative process of step S1, step S2, and step S3 on the basis of g(x, y) until the plaintext recovery iteration stop condition is satisfied;
其中,所述步骤S4为对g(x,y)进行傅里叶变换,得到G(u,v),所述步骤S5为将G(u,v)的振幅值替换为所述待解密图像的密文在频率域的振幅|ψ(u,v)|后进行逆傅里叶变换,得到中间函数g'(x,y),所述步骤S6为将中间函数的振幅值最大的K个像素点位置作为当次迭代的支撑S,并根据第二公式更新输入函数;Wherein, the step S4 is performing Fourier transform on g(x, y) to obtain G(u, v), and the step S5 is to replace the amplitude value of G(u, v) with the image to be decrypted. The ciphertext is subjected to inverse Fourier transform after the amplitude |ψ(u,v)| in the frequency domain to obtain an intermediate function g'(x, y), and the step S6 is K which maximizes the amplitude value of the intermediate function. The pixel position is used as the support S of the current iteration, and the input function is updated according to the second formula;
所述第二公式为:
所述第三公式为:
其中,所述确定单元具体用于:Wherein, the determining unit is specifically configured to:
将所述精确恢复处理后得到的g(x,y)的振幅值确定为所述待解密图像的明文,将所述精确恢复处理后得到的g(x,y)的相位部分确定为所述待解密图像的空间域密钥;Determining an amplitude value of g(x, y) obtained by the accurate restoration processing as a plaintext of the image to be decrypted, and determining a phase portion of g(x, y) obtained by the accurate restoration processing as the The spatial domain key of the image to be decrypted;
根据第四公式确定所述待解密图像的频率域密钥exp[i2πb(u,v)],Determining a frequency domain key exp[i2πb(u,v)] of the image to be decrypted according to a fourth formula,
其中,所述第四公式为:Wherein the fourth formula is:
从以上技术方案可以看出,本发明方案将仅由密文恢复相应明文、空间域密钥和频率域密钥的唯密文攻击问题便转化为一个标准的相位恢复问题,即在 已知输入面频率域强度的情况下,通过相位恢复算法就能够恢复输入面的振幅(即明文)及相位(即空间域密钥),随后还可计算出频率域密钥。本方案方案中运用了混合自适应迭代相位恢复算法,破解过程中除了待解密图像的密文,无需任何其它先验信息,从而有效降低了破解实施难度。It can be seen from the above technical solution that the ciphertext attack problem in which the ciphertext recovers only the plaintext, the spatial domain key and the frequency domain key is converted into a standard phase recovery problem, that is, When the input surface frequency domain strength is known, the amplitude of the input surface (ie, plaintext) and phase (ie, spatial domain key) can be recovered by the phase recovery algorithm, and then the frequency domain key can be calculated. In this scheme, a hybrid adaptive iterative phase recovery algorithm is used. In addition to the ciphertext of the image to be decrypted, no other prior information is needed in the cracking process, thereby effectively reducing the difficulty of cracking.
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the embodiments or the description of the prior art will be briefly described below. Obviously, the drawings in the following description are only It is a certain embodiment of the present invention, and other drawings can be obtained from those skilled in the art without any inventive labor.
图1为双随机相位图像编码系统原理示意图;1 is a schematic diagram of a principle of a dual random phase image coding system;
图2为本发明实施例提供的基于双随机相位图像编码系统的密码学破解方法一个实施例流程示意图;2 is a schematic flowchart of an embodiment of a cryptography cracking method based on a dual random phase image encoding system according to an embodiment of the present invention;
图3-a和图3-b为本发明实施例提供的用于说明由K确定S和δ的具体应用场景下的示意图;3a and 3b are schematic diagrams illustrating a specific application scenario for determining S and δ by K according to an embodiment of the present invention;
图4为本发明实施例提供的一应用场景下的混合自适应迭代算法的流程示意图;4 is a schematic flowchart of a hybrid adaptive iterative algorithm in an application scenario according to an embodiment of the present invention;
图5-a为本发明实施例提供的一待加密原图像(8比特灰度图);FIG. 5-a is an original image to be encrypted (8-bit grayscale image) according to an embodiment of the present invention;
图5-b为通过双随机相位图像编码系统对图5-a所示的待加密原图像进行加密的结果;Figure 5-b is a result of encrypting the original image to be encrypted shown in Figure 5-a by a dual random phase image encoding system;
图5-c为采用本发明实施例中的密码学破解方法对图5-c进行支撑恢复处理所恢复的支撑;FIG. 5-c is a support recovered by the support recovery process of FIG. 5-c by using the cryptographic cracking method in the embodiment of the present invention;
图5-d为采用本发明实施例中的密码学破解方法对图5-c进行恢复得到的原图像; FIG. 5-d is an original image obtained by recovering FIG. 5-c by using a cryptographic cracking method in the embodiment of the present invention;
图6-a为本发明实施例提供的一待加密原图像(二值图);6-a is an original image to be encrypted (binary graph) according to an embodiment of the present invention;
图6-b为通过双随机相位图像编码系统对图6-a所示的待加密原图像进行加密的结果;6-b is a result of encrypting the original image to be encrypted shown in FIG. 6-a by a dual random phase image encoding system;
图6-c为采用本发明实施例中的密码学破解方法对图6-c进行支撑恢复处理所恢复的支撑;Figure 6-c is a support recovered by the support recovery process of Figure 6-c by using the cryptographic cracking method in the embodiment of the present invention;
图6-d为采用本发明实施例中的密码学破解方法对图6-c进行恢复得到的原图像;FIG. 6-d is an original image obtained by recovering FIG. 6-c by using a cryptographic cracking method in the embodiment of the present invention;
图7为本发明实施例提供的基于双随机相位图像编码系统的密码学破解装置一个实施例结构示意图。FIG. 7 is a schematic structural diagram of an embodiment of a cryptography cracking apparatus based on a dual random phase image encoding system according to an embodiment of the present invention.
为使本发明实施例的目的、技术方案和优点更加清楚,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The technical solutions in the embodiments of the present invention will be clearly and completely described in conjunction with the drawings in the embodiments of the present invention. It is a partial embodiment of the invention, and not all of the embodiments. All other embodiments obtained by those skilled in the art based on the embodiments of the present invention without creative efforts are within the scope of the present invention.
首先对本发明实施例中的密码学破解方法的发明构思进行说明,如图1所示为双随机相位图像编码系统原理示意图。双随机相位图像编码系统采用标准4-F系统来实现,103、104是两个傅里叶透镜,将两块统计无关的随机相位板102和105分别置于4-F系统的输入平面和频谱平面上,分别对原始图像101(用f(x,y)表示)的空间信息和频谱信息做随机扰乱,从而白化谱密度分布,达到加密图像的目的,在输出平面上得到统计特性随时间平移不变的平稳白噪声图像106(用ψ(u,v)表示)。First, the inventive concept of the cryptographic cracking method in the embodiment of the present invention is explained. FIG. 1 is a schematic diagram of the principle of the dual random phase image encoding system. The dual random phase image coding system is implemented using a standard 4-F system, 103, 104 are two Fourier lenses, and two statistically independent
整个加密过程可以由下式表达: The entire encryption process can be expressed by:
ψ(x,y)=FT-1{FT{f(x,y)exp[i2πn(x,y)]}·exp[i2πb(u,v)]};ψ(x,y)=FT -1 {FT{f(x,y)exp[i2πn(x,y)]}·exp[i2πb(u,v)]};
f(x,y)为待加密的明文图像,ψ(x,y)为加密得到的密文,exp[i2πn(x,y)]为空间域密钥,exp[i2πb(u,v)]为频率域密钥,FT{·}代表傅里叶变换,FT-1{·}代表逆傅里叶变换。f(x, y) is the plaintext image to be encrypted, ψ(x, y) is the encrypted ciphertext, exp[i2πn(x, y)] is the spatial domain key, exp[i2πb(u,v)] For the frequency domain key, FT{·} represents the Fourier transform, and FT -1 {·} represents the inverse Fourier transform.
解密时,密文ψ(x,y)置于4-F系统的输入面,经傅里叶变换后,在频谱面上用频率域密钥的共轭exp[-i2πb(x,y)](解密密钥)滤波,解密过程则是加密过程的逆变换,可以表示为下式:When decrypting, ciphertext x(x, y) is placed on the input side of the 4-F system. After Fourier transform, the conjugate exp[-i2πb(x,y)] of the frequency domain key is used on the spectrum surface. (decryption key) filtering, the decryption process is the inverse transformation of the encryption process, which can be expressed as:
代表解密的明文。 Represents the plaintext of decryption.
破解者若能获取到的密文ψ(x,y),将其做傅里叶变换得到Ψ(u,v),If the cracker can obtain the ciphertext (x, y), it will be Fourier transformed to get Ψ(u,v),
Ψ(u,v)=FT{ψ(x,y)}Ψ(u,v)=FT{ψ(x,y)}
令4-F系统的输入平面信号为g(x,y)(即g(x,y)=f(x,y)·exp[i2πn(x,y)]),则加密方程可以写成Let the 4-F system input plane signal be g(x,y) (ie g(x,y)=f(x,y)·exp[i2πn(x,y)]), then the encryption equation can be written as
ψ(x,y)=FT-1{FT{g(x,y)}·exp[i2πb(u,v)]};ψ(x,y)=FT -1 {FT{g(x,y)}·exp[i2πb(u,v)]};
将上述方程改写一下,可得:Rewrite the above equation to get:
FT{ψ(x,y)}=FT{g(x,y)}·exp[i2πb(u,v)]FT{ψ(x,y)}=FT{g(x,y)}·exp[i2πb(u,v)]
Ψ(u,v)=FT{g(x,y)}·exp[i2πb(u,v)];Ψ(u,v)=FT{g(x,y)}·exp[i2πb(u,v)];
若将g(x,y)的傅里叶变换写成G(u,v),即G(u,v)=FT{g(x,y)};If the Fourier transform of g(x, y) is written as G(u,v), that is, G(u,v)=FT{g(x,y)};
由上可得:From the above:
Ψ(u,v)=G(u,v)·exp[i2πb(u,v)];Ψ(u,v)=G(u,v)·exp[i2πb(u,v)];
对上式两端取模得|Ψ(u,v)|=|G(u,v)|;For the two ends of the above formula, Ψ(u,v)|=|G(u,v)|;
由此可见,破解者若能得到明文f(x,y)对应的密文ψ(x,y),即可以得到输入平面(即带有相位密钥的明文f(x,y)·exp[i2πn(x,y)])在频率域的强度。至此,仅由密文恢复相应明文及系统密钥的唯密文攻击问题便转化为一个标准 的相位恢复问题,即在已知输入面频域强度的情况下,通过相位恢复算法就能够恢复输入平面的振幅(即明文)及相位(即空间域密钥),随后还可计算出频域密钥。由于唯密文攻击能利用的资源极为有限(仅知道密文信息),针对这一特点,我们设计了一种混合自适应迭代相位恢复算法,该算法的优点在于:(1)无需任何先验信息,破解难度大为降低;(2)通过有效的结合各种相位恢复算法,恢复效果十分理想,恢复结果与原始图像的相关系数通常能在0.9以上。It can be seen that if the cracker can obtain the ciphertext ψ(x, y) corresponding to the plaintext f(x, y), the input plane (that is, the plaintext f(x, y)·exp[ with the phase key] can be obtained. I2πn(x, y)]) The intensity in the frequency domain. At this point, the ciphertext attack problem that only restores the corresponding plaintext and system keys from ciphertext is converted into a standard. The phase recovery problem, that is, in the case of the known input plane frequency domain strength, the phase recovery algorithm can recover the amplitude (ie, plaintext) and phase (ie, spatial domain key) of the input plane, and then calculate the frequency domain. Key. Because the resources available for ciphertext attacks are extremely limited (only ciphertext information is known), we design a hybrid adaptive iterative phase recovery algorithm. The advantages of this algorithm are: (1) no priors are needed. Information, the difficulty of cracking is greatly reduced; (2) By effectively combining various phase recovery algorithms, the recovery effect is very satisfactory, and the correlation coefficient between the recovery result and the original image can usually be above 0.9.
下面对本发明实施例中的基于双随机相位图像编码系统的密码学破解方法进行描述,请参照图2,本发明实施例中的密码学破解方法包括:The cryptographic cracking method based on the dual random phase image encoding system in the embodiment of the present invention is described below. Referring to FIG. 2, the cryptographic cracking method in the embodiment of the present invention includes:
201、针对待解密图像中的每个像素点初始化一随机数作为输入函数;201. Initialize a random number as an input function for each pixel in the image to be decrypted;
本发明实施例中,密码学破解装置针对待解密图像中的每个像素点初始化一随机数作为输入函数,每个像素点初始化的随机数对应的是灰度范围内的随机值,比如说灰度范围是0~255,那么每一像素点初始化的随机数的值(即像素值)都是从0到255内随机选取的一个值。In the embodiment of the present invention, the cryptographic cracking device initializes a random number as an input function for each pixel in the image to be decrypted, and the random number initialized by each pixel corresponds to a random value in the gray range, for example, gray. The degree range is 0 to 255, and the value of the random number initialized at each pixel (ie, the pixel value) is a value randomly selected from 0 to 255.
202、在上述输入函数的基础上进行支撑恢复处理;202. Perform support recovery processing on the basis of the above input function;
本发明实施例中,密码学破解装置在支撑恢复处理阶段对输入函数g(x,y)进行迭代处理,其中,每一次的迭代处理包括:In the embodiment of the present invention, the cryptographic cracking device iteratively processes the input function g(x, y) in the support recovery processing phase, wherein each iterative processing includes:
对g(x,y)进行傅里叶变换,得到G(u,v),其中,g(x,y)表示所述待解密图像中第x行第y列的像素点当次的像素值;Performing a Fourier transform on g(x, y) to obtain G(u, v), where g(x, y) represents the pixel value of the pixel of the xth row and the yth column in the image to be decrypted. ;
将G(u,v)的振幅值替换为所述待解密图像的密文在频率域的振幅|ψ(u,v)|后进行逆傅里叶变换,得到中间函数g'(x,y);Substituting the amplitude value of G(u,v) with the amplitude of the ciphertext of the image to be decrypted in the frequency domain |ψ(u,v)|, and performing an inverse Fourier transform to obtain an intermediate function g'(x,y) );
将中间函数的振幅值最大的K个像素点位置作为当次迭代的支撑S,并根据第一公式更新输入函数,之后返回执行所述支撑恢复处理过程中的所述对g(x,y)进行傅里叶变换的步骤以及后续步骤,直至满足预设的支撑恢复迭 代停止条件,所述K的初始值为大于2的预设值,可选的,K的初始值可以取所述待解密图像中的像素点总数的1%;The K pixel position where the amplitude value of the intermediate function is the largest is taken as the support S of the current iteration, and the input function is updated according to the first formula, and then returns to the pair g(x, y) in the process of performing the support recovery process. Perform the Fourier transform step and subsequent steps until the preset support is restored The initial value of the K is a preset value greater than 2, and optionally, the initial value of K may take 1% of the total number of pixels in the image to be decrypted;
所述第一公式为
在上述第一公式中,β为预设系数,通常,β取0.9,或者,β也可以根据实际情况或经验总结取其它值,此处不作限定。上述第一公式表明,若像素点位于S范围内,则该像素点的输入函数(即像素值)保持不变,若像素点位于S范围之外,则像素点的新的输入函数是本次迭代的输入与输出的线性组合,该算法可被称为动态混合输入-输出(DHIO,Dynamic Hybrid Input-Output)算法。In the above first formula, β is a preset coefficient, and generally, β is 0.9, or β can be summarized according to actual conditions or experience, and is not limited herein. The first formula above indicates that if the pixel point is in the S range, the input function (ie, the pixel value) of the pixel point remains unchanged. If the pixel point is outside the S range, the new input function of the pixel point is this time. An iterative linear combination of input and output. This algorithm can be called the Dynamic Hybrid Input-Output (DH) algorithm.
可选的,上述将中间函数的振幅值最大的K个像素点作为当次迭代的支撑S,并根据第一公式更新输入函数,之后包括:Optionally, the K pixel points with the largest amplitude value of the intermediate function are used as the support S of the current iteration, and the input function is updated according to the first formula, and then includes:
密码学破解装置判断在所述支撑恢复处理过程中的累计迭代次数是否达到T4,其中,所述T4为大于2的预设值,具体地,T4可以取200。The cryptographic cracking device determines whether the cumulative number of iterations in the support recovery process reaches T4, wherein the T4 is a preset value greater than 2, and specifically, T4 may take 200.
若在所述支撑恢复处理过程中的累计迭代次数未达到T4,则返回执行所述支撑恢复处理过程中的所述对g(x,y)进行傅里叶变换的步骤以及后续步骤;If the number of accumulated iterations in the support recovery process does not reach T4, returning to performing the Fourier transform on the g(x, y) in the support recovery process and subsequent steps;
若所述支撑恢复处理过程中的累计迭代次数达到T4,则判断当次由K确定的阈值是否小于预设的阈值,其中,当次由K确定的阈值等于当次g'(x,y)的振幅值由大到小排列的第K个g'(x,y)的振幅值;If the cumulative number of iterations in the support recovery process reaches T4, it is determined whether the threshold determined by K is less than a preset threshold, wherein the threshold determined by K is equal to the current g'(x, y). The amplitude value of the Kth g'(x, y) whose amplitude value is arranged from large to small;
若当次由K确定的阈值小于所述预设的阈值,则判定满足预设的支撑恢复迭代停止条件;If the threshold determined by K is less than the preset threshold, determining that the preset support recovery iteration stop condition is satisfied;
若当次由K确定的阈值不小于所述预设的阈值,则密码学破解装置将所述支撑恢复处理过程中的累计迭代次数清零,并令K=K+a%*M*N,之后返回执行所述支撑恢复处理过程中的所述对g(x,y)进行傅里叶变换的步骤以及 后续步骤,其中,M和N分别为所述待解密图像中像素点的总行数和总列数,a为预设的不小于1的值,例如,令a等于1。If the threshold determined by K is not less than the preset threshold, the cryptographic cracking device clears the cumulative number of iterations in the support recovery process, and makes K=K+a%*M*N, Returning to the step of performing Fourier transform on g(x, y) in performing the support recovery process and a subsequent step, wherein M and N are respectively a total number of rows and a total number of columns of pixels in the image to be decrypted, and a is a preset value not less than 1, for example, a is equal to 1.
以T4等于200为例,则步骤202具体表现为:在支撑恢复处理过程中每迭代200次,观察一次由K所确定的阈值(为便于描述,后续将由K确定的阈值描述为δ),若δ不小于所述预设的阈值(为便于描述,后续将由δ确定的阈值描述为c1),表明本应为黑色背景区域仍有值,支撑区域还不够大,则将K值增加待解密图像中总像素点的a%,并将本次迭代的输出g(x,y)作为下一次迭代的输入,继续迭代至后200次再观察;若δ小于c1,则表明明文物体与背景已能够区别开,此时停止支撑恢复处理,将最后一次迭代的支撑作为恢复的支撑进入下一阶段(即步骤203)。Taking T4 equal to 200 as an example,
下面举例对由K确定的支撑S和δ进行说明,假设如图3-a所示,待解密图片的大小是5*5像素,每个像素点的像素值在图3-a上已标出,当次迭代的K的值为6,那么将中间函数的振幅值(也即当次像素点的像素值)最大的6个像素点作为当次迭代的支撑S,则根据K值确定的支撑S就是图3-b中白色显底的像素部分,当次中间函数的振幅值由大到小排列的第6个g'(x,y)的振幅值即为由K确定的阈值为δ,也就是图3-b中的20。实际情况也类似,只不过图片更大,像素个数更多,而且每个像素值是复数,需要取模(或者说取振幅部分)再比较大小即可确定出S和δ。The following examples illustrate the support S and δ determined by K. Assume that the size of the picture to be decrypted is 5*5 pixels as shown in Figure 3-a. The pixel value of each pixel is marked on Figure 3-a. When the value of K of the iteration is 6, then the 6 pixel points whose amplitude value of the intermediate function (that is, the pixel value of the sub-pixel point) is the largest is taken as the support S of the current iteration, and the support determined according to the K value is supported. S is the pixel portion of the white bottom in Figure 3-b. The amplitude value of the sixth g'(x, y) when the amplitude value of the secondary function is arranged from large to small is the threshold value determined by K, δ. That is 20 in Figure 3-b. The actual situation is similar, except that the picture is larger, the number of pixels is more, and each pixel value is a complex number. You need to take the modulo (or take the amplitude part) and compare the size to determine S and δ.
203、在上述支撑恢复处理的基础上进行明文恢复处理;203. Perform plaintext recovery processing on the basis of the foregoing support recovery processing;
本发明实施例中,明文恢复处理过程与上述支撑恢复处理过程类似,唯一不同在于在上述支撑恢复迭代停止时得到的S在明文恢复处理过程中保持不变,即使用标准的混合输入-输出(HIO,Hybrid Input-Output)算法。In the embodiment of the present invention, the plaintext recovery processing process is similar to the above-described support recovery processing process, and the only difference is that the S obtained when the support recovery iteration stops is kept unchanged during the plaintext recovery processing, that is, the standard mixed input-output is used ( HIO, Hybrid Input-Output algorithm.
具体地,密码学破解装置在上述支撑恢复处理的基础上进行明文恢复处理,包括: Specifically, the cryptographic cracking device performs plaintext recovery processing on the basis of the foregoing support recovery processing, including:
在上述支撑恢复迭代停止时得到的S和g(x,y)的基础上,执行步骤S1、步骤S2和步骤S3的迭代处理,直至满足预设的明文恢复迭代停止条件,其中,所述步骤S1为对g(x,y)进行傅里叶变换,得到G(u,v),所述步骤S2为将G(u,v)的振幅值替换为所述待解密图像的密文在频率域的振幅|ψ(u,v)|后进行逆傅里叶变换,得到g'(x,y);所述步骤S3为根据所述第一公式更新输入函数;On the basis of S and g(x, y) obtained when the support recovery is iteratively stopped, the iterative process of step S1, step S2 and step S3 is performed until the preset plaintext recovery iteration stop condition is satisfied, wherein the step S1 is a Fourier transform on g(x, y) to obtain G(u, v), and step S2 is to replace the amplitude value of G(u, v) with the ciphertext of the image to be decrypted at the frequency. The amplitude of the domain |ψ(u,v)| is then inverse Fourier transformed to obtain g'(x, y); the step S3 is to update the input function according to the first formula;
可选的,在上述明文恢复处理中,上述步骤S3之后包括:Optionally, in the foregoing plaintext recovery process, after the step S3, the following includes:
判断在所述明文恢复处理中的累计迭代次数是否达到预设的迭代次数;Determining whether the cumulative number of iterations in the plaintext recovery process reaches a preset number of iterations;
若在所述明文恢复处理中的累计迭代次数达到预设的迭代次数,则判定满足预设的明文恢复迭代停止条件;If the cumulative number of iterations in the plaintext recovery process reaches a preset number of iterations, it is determined that the preset plaintext recovery iteration stop condition is satisfied;
若在所述明文恢复处理中的累计迭代次数未达到预设的迭代次数,则返回执行所述步骤S1(即执行新一次的迭代)。具体地,对于256*256像素的待解密图像,该迭代次数可以预设为600或600左右的值,当然,对于其它尺寸的待解密图像,该迭代次数可以酌情增减。If the cumulative number of iterations in the plaintext recovery process does not reach the preset number of iterations, then the step S1 is performed (ie, a new iteration is performed). Specifically, for an image to be decrypted of 256*256 pixels, the number of iterations may be preset to a value of about 600 or 600. Of course, for other sizes of images to be decrypted, the number of iterations may be increased or decreased as appropriate.
204、在上述明文恢复处理的基础上进行精确恢复处理;204. Perform accurate recovery processing on the basis of the above plaintext recovery processing;
本发明实施例中,在精确恢复处理过程中引入CF(英文全称为Change Flipping)算法,该算法与DHIO算法类似,只是将DHIO算法中的第一公式替换为第二公式:
CF算法的主要作用是进一步精确支撑的边界,并能有效地改善内外的像素分布,从而降低频域的误差,在步骤204中将交替使用HIO算法和CF算法,具体过程如下:The main function of the CF algorithm is to further accurately support the boundary, and can effectively improve the pixel distribution inside and outside, thereby reducing the error in the frequency domain. In
在明文恢复处理停止时得到的S和g(x,y)的基础上,迭代执行T1次所述步骤S1、S2和S3,接着迭代执行T2次步骤S4、S5和S6,交替进行直至所述精确恢复处理过程中的累计迭代次数达到T3,其中,所述T1、T2和T3 为大于2的预设值,且所述T3大于所述T1和所述T2的和;On the basis of S and g(x, y) obtained when the plaintext recovery processing is stopped, iteratively performs steps S1, S2, and S3 of T1 times, and then iteratively performs steps S4, S5, and S6 of T2, alternately until the said The cumulative number of iterations during the exact recovery process reaches T3, wherein the T1, T2, and T3 Is a preset value greater than 2, and the T3 is greater than a sum of the T1 and the T2;
当在所述精确恢复处理过程中的累计迭代次数达到所述T3时,根据第三公式计算均方误差(NMSE,Normalized Mean Squared Error);When the cumulative number of iterations in the accurate recovery process reaches the T3, a mean squared error (NMSE) is calculated according to the third formula;
若所述NMSE达到预设精度,则执行所述在所述精确恢复处理的基础上确定明文、空间域密钥和频率域密钥的步骤,若所述NMSE未达到所述预设精度,则将所述精确恢复处理过程中的累计迭代次数清零,并以当次得到的S和g(x,y)为基础返回执行所述步骤S1、所述步骤S2和所述步骤S3的迭代处理(即以当次得到的S和g(x,y)为基础,返回明文恢复处理过程),直至满足所述明文恢复迭代停止条件。If the NMSE reaches the preset precision, performing the step of determining the plaintext, the spatial domain key, and the frequency domain key on the basis of the accurate recovery process, if the NMSE does not reach the preset precision, Clearing the cumulative number of iterations in the exact recovery process, and returning to perform the iterative processing of the step S1, the step S2, and the step S3 based on the S and g(x, y) obtained at the time. (ie, returning to the plaintext recovery process based on the S and g(x, y) obtained at the time) until the plaintext recovery iteration stop condition is satisfied.
其中,所述步骤S4为对g(x,y)进行傅里叶变换,得到G(u,v),所述步骤S5为将G(u,v)的振幅值替换为所述待解密图像的密文在频率域的振幅|ψ(u,v)|后进行逆傅里叶变换,得到中间函数g'(x,y),所述步骤S6为将中间函数的振幅值最大的K个像素点作为当次迭代的支撑S,并根据上述第二公式更新输入函数;Wherein, the step S4 is performing Fourier transform on g(x, y) to obtain G(u, v), and the step S5 is to replace the amplitude value of G(u, v) with the image to be decrypted. The ciphertext is subjected to inverse Fourier transform after the amplitude |ψ(u,v)| in the frequency domain to obtain an intermediate function g'(x, y), and the step S6 is K which maximizes the amplitude value of the intermediate function. The pixel is used as the support S of the current iteration, and the input function is updated according to the second formula described above;
所述第三公式为:
具体的,上述T1等于10,上述T2等于10,上述T3等于200。Specifically, the above T1 is equal to 10, the above T2 is equal to 10, and the above T3 is equal to 200.
205、在上述精确恢复处理的基础上确定明文、空间域密钥和频率域密钥;205. Determine a plaintext, a spatial domain key, and a frequency domain key on the basis of the foregoing accurate recovery processing;
本发明实施例中,在精确恢复阶段结束(即上述NMSE达到预设精度)时,密码学破解装置将所述精确恢复处理后得到的g(x,y)的振幅值确定为所述待解密图像的明文,将所述精确恢复处理后得到的g(x,y)的相位部分确定为所述待解密图像的空间域密钥;In the embodiment of the present invention, when the accurate recovery phase ends (that is, the NMSE reaches the preset precision), the cryptographic cracking device determines the amplitude value of g(x, y) obtained after the accurate recovery process as the to-be-decrypted a plaintext of the image, the phase portion of g(x, y) obtained after the accurate restoration processing is determined as a spatial domain key of the image to be decrypted;
根据第四公式确定所述待解密图像的频率域密钥exp[i2πb(u,v)], Determining a frequency domain key exp[i2πb(u,v)] of the image to be decrypted according to a fourth formula,
其中,所述第四公式为:Wherein the fourth formula is:
*代表原函数的复共轭,由于在实际情况中不知道原始明文而无法判断恢复的明文是否翻转,因此可分别通过和求解出两种频域密钥,用这两种频域密钥分别解密后续密文,能够解密出有意义图像的频域密钥则是正确的频域密钥。* represents the complex conjugate of the original function. Since the original plaintext is not known in the actual situation, it cannot be judged whether the restored plaintext is inverted, so it can be passed separately. with Two frequency domain keys are solved, and the subsequent ciphertexts are respectively decrypted by using the two frequency domain keys, and the frequency domain key capable of decrypting the meaningful image is the correct frequency domain key.
需要注意的是,恢复的明文与原始明文相比会发生移位或者翻转,这是无法避免的,但是不影响破解者对明文信息的理解,所以均可视为成功恢复。It should be noted that the recovered plaintext may be shifted or flipped compared with the original plaintext. This is unavoidable, but it does not affect the cracker's understanding of the plaintext information, so it can be regarded as a successful recovery.
设上述T4为200,步骤203的明文恢复处理中预设的迭代次数为600,上述T3为200,步骤204中预设的精度为C2,则本发明实施例中的混合自适应迭代算法的流程示意图可以如图4所示。T4 is set above 200, the number of iterations of
需要说明的是,本发明实施例中的g(x,y)是二元函数,物理意义表示是一幅图像,针对具体的x,y值,g(x,y)对应的是坐标(x,y)处的像素值。It should be noted that g(x, y) in the embodiment of the present invention is a binary function, and the physical meaning representation is an image. For a specific x, y value, g(x, y) corresponds to a coordinate (x). , pixel value at y).
下面通过计算机模拟的结果进一步说明使用本发明实施例中的密码学破解方法对密文进行破解的效果,如图5-a所示为待加密原图像(8比特灰度图),如图5-b为通过双随机相位图像编码系统对图5-a所示的待加密原图像进行加密的结果,如图5-c为采用本发明实施例中的密码学破解方法对图5-c进行支撑恢复处理所恢复的支撑,如图5-d为采用本发明实施例中的密码学破解方法对图5-c进行恢复得到的原图像。如图6-a所示为待加密原图像(二值图),如图6-b为通过双随机相位图像编码系统对图6-a所示的待加密原图像进行加密 的结果,如图6-c为采用本发明实施例中的密码学破解方法对图6-c进行支撑恢复处理所恢复的支撑,如图6-d为采用本发明实施例中的密码学破解方法对图6-c进行恢复得到的原图像。The effect of cracking the ciphertext using the cryptographic cracking method in the embodiment of the present invention is further illustrated by the result of the computer simulation. As shown in FIG. 5-a, the original image to be encrypted (8-bit grayscale image) is shown in FIG. 5. -b is the result of encrypting the original image to be encrypted shown in FIG. 5-a by the dual random phase image encoding system, as shown in FIG. 5-c, the cryptographic cracking method in the embodiment of the present invention is used to perform FIG. 5-c. The support recovered by the support recovery process, as shown in FIG. 5-d, is an original image obtained by restoring FIG. 5-c by using the cryptographic cracking method in the embodiment of the present invention. As shown in Figure 6-a, the original image to be encrypted (binary image) is shown. Figure 6-b shows the original image to be encrypted shown in Figure 6-a encrypted by the dual random phase image encoding system. As shown in FIG. 6-c, the support recovered by the support recovery process of FIG. 6-c is performed by using the cryptographic cracking method in the embodiment of the present invention, and FIG. 6-d is a cryptographic crack in the embodiment of the present invention. Method The original image obtained by restoring Fig. 6-c is performed.
从以上技术方案可以看出,本发明方案将仅由密文恢复相应明文、空间域密钥和频率域密钥的唯密文攻击问题便转化为一个标准的相位恢复问题,即在已知输入面频率域强度的情况下,通过相位恢复算法就能够恢复输入面的振幅(即明文)及相位(即空间域密钥),随后还可计算出频率域密钥。本方案方案中运用了混合自适应迭代相位恢复算法,破解过程中除了待解密图像的密文,无需任何其它先验信息,从而有效降低了破解实施难度。It can be seen from the above technical solution that the solution of the present invention converts the ciphertext attack problem of only the plaintext, the spatial domain key and the frequency domain key from the ciphertext into a standard phase recovery problem, that is, the known input. In the case of the surface frequency domain strength, the amplitude of the input surface (ie, plaintext) and phase (ie, the spatial domain key) can be recovered by the phase recovery algorithm, and then the frequency domain key can be calculated. In this scheme, a hybrid adaptive iterative phase recovery algorithm is used. In addition to the ciphertext of the image to be decrypted, no other prior information is needed in the cracking process, thereby effectively reducing the difficulty of cracking.
本发明实施例还提供一种基于双随机相位图像编码系统的密码学破解装置,如图7所示,本发明实施例中的密码学破解装置700包括:The embodiment of the present invention further provides a cryptographic cracking apparatus based on a dual random phase image encoding system. As shown in FIG. 7, the cryptographic cracking
初始化单元701,用于针对待解密图像中的每个像素点初始化一随机数作为输入函数;The initializing
支撑恢复处理单元702,用于在所述输入函数的基础上进行支撑恢复处理;Support
明文恢复处理单元703,用于在所述支撑恢复处理的基础上进行明文恢复处理;The plaintext
精确恢复处理单元704,用于在所述明文恢复处理的基础上进行精确恢复处理;The accurate
确定单元705,用于在所述精确恢复处理的基础上确定明文、空间域密钥和频率域密钥;a determining
其中,支撑恢复处理单元702具体用于:The support
对输入函数g(x,y)进行迭代处理,其中,每一次的迭代处理包括: Iterative processing of the input function g(x, y), wherein each iterative processing includes:
对g(x,y)进行傅里叶变换,得到G(u,v),其中,g(x,y)表示所述待解密图像中第x行第y列的像素点当次的像素值;Performing a Fourier transform on g(x, y) to obtain G(u, v), where g(x, y) represents the pixel value of the pixel of the xth row and the yth column in the image to be decrypted. ;
将G(u,v)的振幅值替换为所述待解密图像的密文在频率域的振幅|ψ(u,v)|后进行逆傅里叶变换,得到中间函数g'(x,y);Substituting the amplitude value of G(u,v) with the amplitude of the ciphertext of the image to be decrypted in the frequency domain |ψ(u,v)|, and performing an inverse Fourier transform to obtain an intermediate function g'(x,y) );
将中间函数的振幅值最大的K个像素点位置作为当次迭代的支撑S,并根据第一公式更新输入函数,之后返回执行所述支撑恢复处理过程中的所述对g(x,y)进行傅里叶变换的步骤以及后续步骤,直至满足预设的支撑恢复迭代停止条件,所述K的初始值为大于2的预设值;The K pixel position where the amplitude value of the intermediate function is the largest is taken as the support S of the current iteration, and the input function is updated according to the first formula, and then returns to the pair g(x, y) in the process of performing the support recovery process. Performing a Fourier transform step and a subsequent step until a preset support recovery iteration stop condition is satisfied, and the initial value of the K is a preset value greater than 2;
所述第一公式为
在上述第一公式中,β为预设系数;In the above first formula, β is a preset coefficient;
其中,明文恢复处理单元703具体用于:The plaintext recovery processing unit 703 is specifically configured to:
在所述支撑恢复迭代停止时得到的S和g(x,y)的基础上,进执行步骤S1、步骤S2和步骤S3的迭代处理,直至满足预设的明文恢复迭代停止条件,其中,所述步骤S1为对g(x,y)进行傅里叶变换,得到G(u,v),所述步骤S2为将G(u,v)的振幅值替换为所述待解密图像的密文在频率域的振幅|ψ(u,v)|后进行逆傅里叶变换,得到g'(x,y);所述步骤S3为根据所述第一公式更新输入函数;On the basis of S and g(x, y) obtained when the support recovery is iteratively stopped, the iterative process of step S1, step S2 and step S3 is performed until the preset plaintext recovery iteration stop condition is satisfied, wherein Step S1 is a Fourier transform on g(x, y) to obtain G(u, v), and step S2 is to replace the amplitude value of G(u, v) with the ciphertext of the image to be decrypted. Performing an inverse Fourier transform on the amplitude |ψ(u,v)| of the frequency domain to obtain g'(x, y); the step S3 is to update the input function according to the first formula;
其中,精确恢复处理单元704具体用于:The exact recovery processing unit 704 is specifically configured to:
在所述明文恢复迭代停止时得到的S和g(x,y)的基础上,迭代执行T1次所述步骤S1、S2和S3,接着迭代执行T2次步骤S4、S5和S6,交替进行直至所述精确恢复处理过程中的累计迭代次数达到T3,其中,所述T1、T2和T3为大于2的预设值,且所述T3大于所述T1和所述T2的和;On the basis of S and g(x, y) obtained when the plaintext recovery iteration is stopped, iteratively performs steps S1, S2 and S3 of T1 times, and then iteratively performs steps T4, S5 and S6 of T2, and alternates until The cumulative number of iterations in the exact recovery process reaches T3, wherein the T1, T2, and T3 are preset values greater than 2, and the T3 is greater than the sum of the T1 and the T2;
当在所述精确恢复处理过程中的累计迭代次数达到所述T3时,根据第三公式计算均方误差NMSE; When the cumulative number of iterations in the precise recovery process reaches the T3, the mean square error NMSE is calculated according to the third formula;
若所述NMSE达到预设精度,则执行所述在所述精确恢复处理的基础上确定明文、空间域密钥和频率域密钥的步骤,若所述NMSE未达到所述预设精度,则将所述精确恢复处理过程中的累计迭代次数清零,并以当次得到的S和g(x,y)为基础返回执行所述步骤S1、所述步骤S2和所述步骤S3的迭代处理,直至满足所述明文恢复迭代停止条件;If the NMSE reaches the preset precision, performing the step of determining the plaintext, the spatial domain key, and the frequency domain key on the basis of the accurate recovery process, if the NMSE does not reach the preset precision, Clearing the cumulative number of iterations in the exact recovery process, and returning to perform the iterative processing of the step S1, the step S2, and the step S3 based on the S and g(x, y) obtained at the time. Until the plaintext recovery iteration stop condition is satisfied;
其中,所述步骤S4为对g(x,y)进行傅里叶变换,得到G(u,v),所述步骤S5为将G(u,v)的振幅值替换为所述待解密图像的密文在频率域的振幅|ψ(u,v)|后进行逆傅里叶变换,得到中间函数g'(x,y),所述步骤S6为将中间函数的振幅值最大的K个像素点作为当次迭代的支撑S,并根据第二公式更新输入函数;Wherein, the step S4 is performing Fourier transform on g(x, y) to obtain G(u, v), and the step S5 is to replace the amplitude value of G(u, v) with the image to be decrypted. The ciphertext is subjected to inverse Fourier transform after the amplitude |ψ(u,v)| in the frequency domain to obtain an intermediate function g'(x, y), and the step S6 is K which maximizes the amplitude value of the intermediate function. The pixel is used as the support S of the current iteration, and the input function is updated according to the second formula;
所述第二公式为:
所述第三公式为:
其中,确定单元705具体用于:The determining unit 705 is specifically configured to:
将所述精确恢复处理后得到的g(x,y)的振幅值确定为所述待解密图像的明文,将所述精确恢复处理后得到的g(x,y)的相位部分确定为所述待解密图像的空间域密钥;Determining an amplitude value of g(x, y) obtained by the accurate restoration processing as a plaintext of the image to be decrypted, and determining a phase portion of g(x, y) obtained by the accurate restoration processing as the The spatial domain key of the image to be decrypted;
根据第四公式确定所述待解密图像的频率域密钥exp[i2πb(u,v)],Determining a frequency domain key exp[i2πb(u,v)] of the image to be decrypted according to a fourth formula,
其中,所述第四公式为:Wherein the fourth formula is:
可选的,支撑恢复处理单元702具体用于:Optionally, the support
在所述将中间函数的振幅值最大的K个像素点作为当次迭代的支撑S,并 根据第一公式更新输入函数之后,判断在所述支撑恢复处理过程中的累计迭代次数是否达到T4,其中,所述T4为大于2的预设值;The K pixel points having the largest amplitude value of the intermediate function are used as the support S of the current iteration, and After updating the input function according to the first formula, determining whether the cumulative number of iterations in the support recovery process reaches T4, wherein the T4 is a preset value greater than 2;
若在所述支撑恢复处理过程中的累计迭代次数未达到T4,则返回执行所述支撑恢复处理过程中的所述对g(x,y)进行傅里叶变换的步骤以及后续步骤;If the number of accumulated iterations in the support recovery process does not reach T4, returning to performing the Fourier transform on the g(x, y) in the support recovery process and subsequent steps;
若所述支撑恢复处理过程中的累计迭代次数达到T4,则判断当次由K确定的阈值是否小于预设的阈值,其中,当次由K确定的阈值等于当次g'(x,y)的振幅值由大到小排列的第K个g'(x,y)的振幅值;If the cumulative number of iterations in the support recovery process reaches T4, it is determined whether the threshold determined by K is less than a preset threshold, wherein the threshold determined by K is equal to the current g'(x, y). The amplitude value of the Kth g'(x, y) whose amplitude value is arranged from large to small;
若当次由K确定的阈值小于所述预设的阈值,则判定满足预设的支撑恢复迭代停止条件;If the threshold determined by K is less than the preset threshold, determining that the preset support recovery iteration stop condition is satisfied;
若当次由K确定的阈值不小于所述预设的阈值,则将所述支撑恢复处理过程中的累计迭代次数清零,并令K=K+a%*M*N,之后返回执行所述支撑恢复处理过程中的所述对g(x,y)进行傅里叶变换的步骤以及后续步骤,其中,a为预设的不小于1的值。If the threshold determined by K is not less than the preset threshold, the cumulative number of iterations in the support recovery process is cleared, and K=K+a%*M*N is returned, and then returned to the execution center. The step of performing Fourier transform on g(x, y) in the support recovery process and the subsequent steps, wherein a is a preset value not less than 1.
可选的,明文恢复处理单元703具体用于:Optionally, the plaintext
在所述根据所述第一公式更新输入函数之后,判断在所述明文恢复处理中的累计迭代次数是否达到预设的迭代次数;After updating the input function according to the first formula, determining whether the cumulative number of iterations in the plaintext recovery process reaches a preset number of iterations;
若在所述明文恢复处理中的累计迭代次数达到预设的迭代次数,则判定满足预设的明文恢复迭代停止条件;If the cumulative number of iterations in the plaintext recovery process reaches a preset number of iterations, it is determined that the preset plaintext recovery iteration stop condition is satisfied;
若在所述明文恢复处理中的累计迭代次数未达到预设的迭代次数,则返回执行所述步骤S1。If the cumulative number of iterations in the plaintext recovery process does not reach the preset number of iterations, the process returns to step S1.
应理解,本发明实施例中的密码学破解装置可以如上述方法实施例中提及的密码学破解装置,可以用于实现上述方法实施例中的全部技术方案,其各个 功能模块的功能可以根据上述方法实施例中的方法具体实现,其具体实现过程可参照上述实施例中的相关描述,此处不再赘述。It should be understood that the cryptographic cracking device in the embodiment of the present invention may be used as the cryptographic cracking device mentioned in the foregoing method embodiments, and may be used to implement all the technical solutions in the foregoing method embodiments, each of which is The function of the function module may be specifically implemented according to the method in the foregoing method embodiment. For the specific implementation process, refer to the related description in the foregoing embodiment, and details are not described herein again.
从以上技术方案可以看出,本发明方案将仅由密文恢复相应明文、空间域密钥和频率域密钥的唯密文攻击问题便转化为一个标准的相位恢复问题,即在已知输入面频率域强度的情况下,通过相位恢复算法就能够恢复输入面的振幅(即明文)及相位(即空间域密钥),随后还可计算出频率域密钥。本方案方案中运用了混合自适应迭代相位恢复算法,破解过程中除了待解密图像的密文,无需任何其它先验信息,从而有效降低了破解实施难度。It can be seen from the above technical solution that the solution of the present invention converts the ciphertext attack problem of only the plaintext, the spatial domain key and the frequency domain key from the ciphertext into a standard phase recovery problem, that is, the known input. In the case of the surface frequency domain strength, the amplitude of the input surface (ie, plaintext) and phase (ie, the spatial domain key) can be recovered by the phase recovery algorithm, and then the frequency domain key can be calculated. In this scheme, a hybrid adaptive iterative phase recovery algorithm is used. In addition to the ciphertext of the image to be decrypted, no other prior information is needed in the cracking process, thereby effectively reducing the difficulty of cracking.
在本申请所提供的几个实施例中,应该理解到,所揭露的装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,上述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided by the present application, it should be understood that the disclosed apparatus and method may be implemented in other manners. For example, the device embodiments described above are merely illustrative. For example, the division of the above units is only a logical function division. In actual implementation, there may be another division manner, for example, multiple units or components may be combined or may be Integrate into another system, or some features can be ignored or not executed. In addition, the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
另外,在本发明各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。 In addition, each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit. The above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本发明各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。The integrated unit, if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention, which is essential or contributes to the prior art, or all or part of the technical solution, may be embodied in the form of a software product stored in a storage medium. A number of instructions are included to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present invention. The foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like. .
需要说明的是,对于前述的各方法实施例,为了简便描述,故将其都表述为一系列的动作组合,但是本领域技术人员应该知悉,本发明并不受所描述的动作顺序的限制,因为依据本发明,某些步骤可以采用其它顺序或者同时进行。其次,本领域技术人员也应该知悉,说明书中所描述的实施例均属于优选实施例,所涉及的动作和模块并不一定都是本发明所必须的。It should be noted that, for the foregoing method embodiments, for the sake of brevity, they are all described as a series of action combinations, but those skilled in the art should understand that the present invention is not limited by the described action sequence. Because certain steps may be performed in other sequences or concurrently in accordance with the present invention. In the following, those skilled in the art should also understand that the embodiments described in the specification are all preferred embodiments, and the actions and modules involved are not necessarily required by the present invention.
在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述的部分,可以参见其它实施例的相关描述。In the above embodiments, the descriptions of the various embodiments are all focused, and the parts that are not detailed in a certain embodiment can be referred to the related descriptions of other embodiments.
以上为对本发明所提供的一种基于双随机相位图像编码系统的密码学破解方法和装置的描述,对于本领域的一般技术人员,依据本发明实施例的思想,在具体实施方式及应用范围上均会有改变之处,综上,本说明书内容不应理解为对本发明的限制。 The above is a description of a cryptographic cracking method and apparatus based on the dual random phase image encoding system provided by the present invention. For those skilled in the art, according to the idea of the embodiment of the present invention, in the specific implementation manner and application scope There are variations, and in summary, the description should not be construed as limiting the invention.
Claims (9)
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/CN2015/083449 WO2017004790A1 (en) | 2015-07-07 | 2015-07-07 | Cryptographic decoding method of image coding system based on double random phase and device utilizing same |
| CN201580003956.XA CN105917381B (en) | 2015-07-07 | 2015-07-07 | Cryptography cracking method and device based on double random phase image coding system |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/CN2015/083449 WO2017004790A1 (en) | 2015-07-07 | 2015-07-07 | Cryptographic decoding method of image coding system based on double random phase and device utilizing same |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2017004790A1 true WO2017004790A1 (en) | 2017-01-12 |
Family
ID=56744021
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2015/083449 Ceased WO2017004790A1 (en) | 2015-07-07 | 2015-07-07 | Cryptographic decoding method of image coding system based on double random phase and device utilizing same |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN105917381B (en) |
| WO (1) | WO2017004790A1 (en) |
Cited By (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110413945A (en) * | 2019-08-05 | 2019-11-05 | 西安石油大学 | Phase recovery method of chirp signal based on fractional short-time Fourier transform |
| CN110569945A (en) * | 2019-08-14 | 2019-12-13 | 西安理工大学 | QR code encryption method based on single-intensity recording phase recovery process |
| CN110708282A (en) * | 2019-08-21 | 2020-01-17 | 苏州科技大学 | Chosen plaintext attack for double random polarization encoding encryption system |
| CN111177745A (en) * | 2019-12-12 | 2020-05-19 | 湖南科技大学 | Nonlinear phase truncation double-image encryption and decryption method |
| CN111583395A (en) * | 2020-05-07 | 2020-08-25 | 福建师范大学 | Multiple complex three-dimensional scene encryption and decryption method |
| CN112188028A (en) * | 2020-09-17 | 2021-01-05 | 苏州科技大学 | Color image encryption coding and decoding technology of spherical polar transformation |
| CN115880382A (en) * | 2021-09-29 | 2023-03-31 | 中国联合网络通信集团有限公司 | Image reconstruction method and device, computer equipment and computer storage medium |
Families Citing this family (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN107968705B (en) * | 2017-11-28 | 2021-02-02 | 深圳大学 | An encryption/decryption method, an encryption/decryption terminal and a double random phase encryption and decryption system |
| CN108332673B (en) * | 2018-01-29 | 2020-10-23 | 广东工业大学 | Method, device, device and storage medium for encoding and decoding stereoscopic images |
| CN109190392B (en) * | 2018-08-11 | 2021-05-14 | 苏州科技大学 | An Image Encryption and Decryption Method for Random Size Segmentation of Structured Phase Plates |
| CN115277181B (en) * | 2022-07-26 | 2024-07-26 | 安徽大学 | A verification system cracking method based on adaptive whale optimization algorithm |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5903648A (en) * | 1996-02-06 | 1999-05-11 | The University Of Connecticut | Method and apparatus for encryption |
| CN1900969A (en) * | 2006-07-25 | 2007-01-24 | 深圳大学 | Cryptology deciphering method of double random phase image coding system |
| CN103402040A (en) * | 2013-08-06 | 2013-11-20 | 浙江农林大学 | Spatial domain and Fourier frequency domain double encryption-based dual image encryption method |
| CN103745427A (en) * | 2014-01-16 | 2014-04-23 | 浙江传媒学院 | Image encryption method based on iterative amplitude-phase retrieval algorithm |
| CN103955883A (en) * | 2014-04-23 | 2014-07-30 | 西安理工大学 | Asymmetric double-image encryption method based on fractional Fourier domain phase recovery procedure |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| ES2342995B1 (en) * | 2008-02-20 | 2011-09-30 | Universidad De Vigo | DOCUMENT INTEGRITY VERIFICATION PROCEDURE. |
| CN102087503B (en) * | 2011-01-11 | 2012-07-04 | 浙江师范大学 | Double-random-phase optical color image encryption device and method |
| CN104517261B (en) * | 2015-01-08 | 2017-06-23 | 浙江农林大学 | Safety certifying method based on phase recovery and sparse double random-phase encoding |
-
2015
- 2015-07-07 WO PCT/CN2015/083449 patent/WO2017004790A1/en not_active Ceased
- 2015-07-07 CN CN201580003956.XA patent/CN105917381B/en active Active
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5903648A (en) * | 1996-02-06 | 1999-05-11 | The University Of Connecticut | Method and apparatus for encryption |
| CN1900969A (en) * | 2006-07-25 | 2007-01-24 | 深圳大学 | Cryptology deciphering method of double random phase image coding system |
| CN103402040A (en) * | 2013-08-06 | 2013-11-20 | 浙江农林大学 | Spatial domain and Fourier frequency domain double encryption-based dual image encryption method |
| CN103745427A (en) * | 2014-01-16 | 2014-04-23 | 浙江传媒学院 | Image encryption method based on iterative amplitude-phase retrieval algorithm |
| CN103955883A (en) * | 2014-04-23 | 2014-07-30 | 西安理工大学 | Asymmetric double-image encryption method based on fractional Fourier domain phase recovery procedure |
Cited By (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110413945A (en) * | 2019-08-05 | 2019-11-05 | 西安石油大学 | Phase recovery method of chirp signal based on fractional short-time Fourier transform |
| CN110413945B (en) * | 2019-08-05 | 2023-05-16 | 西安石油大学 | Linear frequency modulation signal phase recovery method based on fractional order short-time Fourier transform |
| CN110569945A (en) * | 2019-08-14 | 2019-12-13 | 西安理工大学 | QR code encryption method based on single-intensity recording phase recovery process |
| CN110708282A (en) * | 2019-08-21 | 2020-01-17 | 苏州科技大学 | Chosen plaintext attack for double random polarization encoding encryption system |
| CN110708282B (en) * | 2019-08-21 | 2023-06-02 | 苏州科技大学 | An Encryption Key Acquisition Method for Double Random Polarization Encoding Encryption System |
| CN111177745A (en) * | 2019-12-12 | 2020-05-19 | 湖南科技大学 | Nonlinear phase truncation double-image encryption and decryption method |
| CN111177745B (en) * | 2019-12-12 | 2023-06-27 | 湖南科技大学 | A Double Image Encryption and Decryption Method with Nonlinear Phase Truncation |
| CN111583395A (en) * | 2020-05-07 | 2020-08-25 | 福建师范大学 | Multiple complex three-dimensional scene encryption and decryption method |
| CN111583395B (en) * | 2020-05-07 | 2023-02-10 | 福建师范大学 | A Method for Encryption and Decryption of Multiple Complex 3D Scenes |
| CN112188028A (en) * | 2020-09-17 | 2021-01-05 | 苏州科技大学 | Color image encryption coding and decoding technology of spherical polar transformation |
| CN115880382A (en) * | 2021-09-29 | 2023-03-31 | 中国联合网络通信集团有限公司 | Image reconstruction method and device, computer equipment and computer storage medium |
Also Published As
| Publication number | Publication date |
|---|---|
| CN105917381B (en) | 2019-05-07 |
| CN105917381A (en) | 2016-08-31 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2017004790A1 (en) | Cryptographic decoding method of image coding system based on double random phase and device utilizing same | |
| Mirzaei et al. | A new image encryption method: parallel sub-image encryption with hyper chaos | |
| CN108322622B (en) | Color digital image encryption method based on 2D-VMD and eight-dimensional hyper-chaotic system | |
| CN103455971B (en) | Image Encryption Method Combining 3D Arnold Transform and Chaotic Sequence | |
| CN107220923B (en) | Digital picture feedback encryption method based on image network | |
| CN105404817B (en) | It is based on(k, n)The user-friendly visual secret sharing scheme method of thresholding | |
| CN103810664A (en) | Information hiding method and device | |
| CN105447396A (en) | Fractional domain image encryption method based on Arnold transformation and compound chaos | |
| CN105513002A (en) | Novel image encryption method based on correlation between chaos and plaintext | |
| CN103501400A (en) | Invertible information hiding method based on parabolic interpolation image | |
| CN108846816B (en) | A method for image inpainting in ciphertext domain | |
| John et al. | 2d lorentz chaotic model coupled with logistic chaotic model for medical image encryption: Towards ensuring security for teleradiology | |
| CN106373082A (en) | Cellular automata and chaotic mapping-based digital image encryption method and decryption method thereof | |
| Kadhim et al. | A new multiple-chaos image encryption algorithm based on block compressive sensing, swin transformer, and wild horse optimization | |
| CN103971320B (en) | A kind of image scrambling and restoration methods based on Henon mappings | |
| CN106530197A (en) | Image encryption method based on Kent mapping and generalized Gray codes | |
| Guo et al. | Learning-based super-resolution method with a combining of both global and local constraints | |
| Wu et al. | A data mapping method for steganography and its application to images | |
| CN110136045A (en) | A method of hiding and restoring based on mutual scrambling of two images | |
| Gavini et al. | Lossless watermarking technique for copyright protection of high resolution images | |
| CN112330551A (en) | Remote sensing image outsourcing noise reduction method based on secret sharing | |
| Liu | Comparative evaluations of image encryption algorithms | |
| CN109920015B (en) | Image visual meaningful encryption method based on fractal graph generation | |
| Ye et al. | Research on Reversible Information Hiding Algorithm in Encrypted Domain Based on Histogram Translation | |
| Bhardwaj et al. | two level encryption of grey scale image through 2d cellular automata |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15897446 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 15897446 Country of ref document: EP Kind code of ref document: A1 |