Research on optical image encryption technique with compressed sensing

被引:0
作者
机构
[1] Opto-Electronics Department, Sichuan University, Chengdu
[2] Key Laboratory of Ecophysics and Department of Physics, Shihezi University, Shihezi
[3] College of Information Science and Technology, Shihezi University, Shihezi
[4] Institute of Optics and Electronics, Chinese Academy of Sciences, Chengdu
来源
Cao, Y. (ypcao@scu.edu.cn) | 1600年 / Chinese Optical Society卷 / 34期
关键词
Arnold transformation; Compressed sensing; Double random phase encoding technique; Key; Signal processing;
D O I
10.3788/AOS201434.0307002
中图分类号
学科分类号
摘要
A new digital image optical encryption method based on compressed sensing is proposed. With the advantage of the characteristics of compressed sensing as well as double random phase encoding technique, multi-encryption of digital image is realized. Compressed sensing is utilized to compress and encrypt a digital image with the random measurement matrix as secret key. Arnold transformation is used to scramble the encryption image with low data volume. The encryption image is encrypted again by double random phase encoding technique to realize the multiple encryption of image. Security overall process is taken into account in the scheme. The multi-encrypted information is embedded into the host image and transmitted. At the receiver, original image information is reconstructed. The experimental results show that the encryption scheme has such features as low data volume, strong robustness, high key sensitivity, and can resistance brute force attack.
引用
收藏
相关论文
共 37 条
  • [1] Zhang X., Wang M., Zhu G., Research on the new development of image encryption algorithms, Computer Engineering & Science, 34, 5, pp. 1-6, (2012)
  • [2] Piao Y.-R., Shin D.-H., Kim E.-S., Et al., Robust image encryption by combined use of integral imaging and pixel scrambling techniques, Opt Laser Eng, 47, 11, pp. 1273-1281, (2009)
  • [3] Zhao J., Lu H., Song X., Et al., Optical image encryption based on multistage fractional Fourier transforms and pixel scrambling technique, Opt Comm, 249, 4-6, pp. 493-499, (2005)
  • [4] Izmerly O., Mor T., Chosen ciphertext attacks on lattice-based public key encryption and modern (non-quantum) cryptography in a quantum environment, Theoretical Computer Science, 367, 3, pp. 308-323, (2006)
  • [5] Fridrich J., Image encryption based on chaotic maps, IEEE International Conference on Systems, Man, and Cybernetics, 2, pp. 1105-1110, (1997)
  • [6] Li J., Feng Y., Yang X., 3D chaotic encryption scheme for compressed image, Acta Optica Sinica, 30, 2, pp. 399-404, (2010)
  • [7] Panduranga H.T., Naveen Kumar S.K., Hybrid approach for image encryption using SCAN patterns and carrier images, International Journal on Computer Science and Engineering, 2, 2, pp. 297-300, (2010)
  • [8] Zhang Q., Guo L., Wei X., Image encryption using DNA addition combining with chaotic maps, Mathematical and Computer Modelling, 52, 11-12, pp. 2028-2035, (2010)
  • [9] Shang Y., Research on Digital Image Encryption Technology, pp. 6-17, (2005)
  • [10] Zhou N., Wang Y., Gong L., Et al., Novel single channel color image encryption algorithm based on chaos and fractional Fourier transform, Opt Commun, 284, 12, pp. 2789-2796, (2011)