CN101739660A - Method for encrypting and decrypting image based on multi-order fractional Fourier transform - Google Patents

Method for encrypting and decrypting image based on multi-order fractional Fourier transform Download PDF

Info

Publication number
CN101739660A
CN101739660A CN 200910238479 CN200910238479A CN101739660A CN 101739660 A CN101739660 A CN 101739660A CN 200910238479 CN200910238479 CN 200910238479 CN 200910238479 A CN200910238479 A CN 200910238479A CN 101739660 A CN101739660 A CN 101739660A
Authority
CN
China
Prior art keywords
centerdot
fourier transform
image
rank
encrypting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200910238479
Other languages
Chinese (zh)
Other versions
CN101739660B (en
Inventor
陶然
孟祥意
王越
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Technology BIT
Original Assignee
Beijing Institute of Technology BIT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Technology BIT filed Critical Beijing Institute of Technology BIT
Priority to CN 200910238479 priority Critical patent/CN101739660B/en
Publication of CN101739660A publication Critical patent/CN101739660A/en
Application granted granted Critical
Publication of CN101739660B publication Critical patent/CN101739660B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Complex Calculations (AREA)

Abstract

The invention relates to a method for encrypting and decrypting an image based on multi-order fractional Fourier transform, which belongs to the technical field of information security. The method selects discrete sampling-type discrete fractional Fourier transform as a basic tool; at an encryption end of a system, an original image is equally divided into a plurality of sub-images with the same size; interpolation and discrete fractional Fourier transform of different orders are respectively performed on the row and the column of each sub-image; and the transformed images are superposed to obtain an encrypted image; and at the decryption end of the system, the original image is recovered effectively by establishing a linear equation. The method makes full use of the characteristics of the order change of the fractional Fourier transform, and can be combined with other encrypting methods, thereby expanding key space and improving the security of the system relative to the conventional image encrypting technology on the basis of the fractional Fourier transform. The method of the invention also can be used for encrypting double images or a plurality of images, which provides a new way for the design of future image encryption technology.

Description

A kind of image encryption and decryption method based on multi-order fractional Fourier transform
Technical field
The present invention relates to a kind of image encryption and decryption method, belong to field of information security technology based on multi-order fractional Fourier transform.
Background technology
Image information is vivid, is one of important means of people's expressing information.At present, along with the fast development of network technology, digital image information has been widely used in every field such as military affairs, medical science, finance.But network technology has more inevitably been brought the hidden danger of information security in the information transmission of making.At present, the image information unauthorized theft, alter, propagate and be becoming increasingly rampant, therefore, the technology of protection digital image content safety is arisen at the historic moment.
The notion of Fourier Transform of Fractional Order promptly was suggested as far back as nineteen twenty-nine, was applied to optical field in the eighties in 20th century, became one of the research focus in signal Processing field from the nineties.Fourier Transform of Fractional Order is the generalized form of Fourier transform, it carries out signal Processing on unified time-frequency domain, with respect to traditional Fourier transform, the Fourier Transform of Fractional Order dirigibility is stronger, by being selected by 0 to 2 order, Fourier Transform of Fractional Order can provide signal is transformed to time domain again to frequency domain by spatial transform whole features.Therefore, Fourier Transform of Fractional Order has obtained using widely at information security field, many scholars adopt the kernel function of Fourier Transform of Fractional Order to replace the kernel function of Fourier transform in the information safety system, image encryption technology based on Fourier Transform of Fractional Order has been proposed, the conversion order that utilizes Fourier Transform of Fractional Order is as the key that increases, enlarged the difficulty of key space and illegal stealer's deciphering, the security that has improved system.
But, the just traditional simple extension of existing digital image encryption system based on the Fourier transform secret signalling based on Fourier Transform of Fractional Order, promptly adopt Fourier transform or Fourier in the alternative legacy system of Fourier Transform of Fractional Order or fractional number order Fourier, the order of Fourier Transform of Fractional Order is not fully utilized.
Summary of the invention
A kind of image encryption and decryption method based on multi-order fractional Fourier transform of the present invention is that selection discrete sampling type discrete fraction rank Fourier transform is a basic tool, the conversion order that utilizes a plurality of discrete fractions rank Fourier transform is as the image encryption key, remedied the existing shortcoming that can't make full use of fraction order Fourier transform order based on the image encryption system of Fourier Transform of Fractional Order, enlarge key space, improved the security of system.
The objective of the invention is to be achieved through the following technical solutions.
A kind of image encryption and decryption method based on multi-order fractional Fourier transform of the present invention are divided into image encryption and image deciphering two parts;
The step that realizes image encryption is as follows:
Step 1, will be of a size of the wide and long M and the N equal portions of being divided into respectively of the original image of A * B, obtain the subimage S that size such as M * N is of a size of (A/M) * (B/N) (a-1) N+b, a=1,2 ..., M, b=1,2 ..., N;
Step 2, each subimage S that the information encryption step 1 is obtained (a-1) N+bEach column vector carry out M times of interpolation and p 2[(a-1) N+b]-1Contrary discrete fraction rank, rank Fourier transform is carried out N times of interpolation and p to its row vector again 2[(a-1) N+b]Contrary discrete fraction rank, rank Fourier transform obtains Y thus (a-1) N+b, its mathematic(al) representation as the formula (1)
Y ( a - 1 ) N + b = D p 2 [ ( a - 1 ) N + b ] - 1 , 0 D p 2 [ ( a - 1 ) N + b ] - 1 , 1 · · · D p 2 [ ( a - 1 ) N + b ] - 1 , M - 1 · X ( a - 1 ) N + b · D p 2 [ ( a - 1 ) N + b ] , 0 D p 2 [ ( a - 1 ) N + b ] , 1 · · · D p 2 [ ( a - 1 ) N + b ] , N - 1 - - - ( 1 )
Wherein, X (a-1) N+bFor to S (a-1) N+bColumn vector be p 2[(a-1) N+b]-1Contrary discrete fraction rank, rank Fourier transform, row vector are p 2[(a-1) N+b]The contrary discrete fraction rank Fourier transform gained result in rank, diagonal matrix
Figure G2009102384791D00022
Figure G2009102384791D00023
L wherein 1=0,1 ..., M-1, l 2=0,1 ..., N-1 is defined as
[ D p 2 [ ( a - 1 ) N + b ] , l 1 ] k , k = e j · 1 2 · cot ( p 2 [ ( a - 1 ) N + b ] · π 2 ) · [ 2 k ( l 1 · N ) + ( l 1 · N ) 2 ] · Δ t 2
[ D p 2 [ ( a - 1 ) N + b ] - 1 , l 2 ] k , k = e j · 1 2 · cot ( p 2 [ ( a - 1 ) N + b ] - 1 · π 2 ) · [ 2 k ( l 2 · N ) + ( l 2 · N ) 2 ] · Δ t 2
Step 3, the Y that the image encryption step 2 is obtained (a-1) N+bAddition successively obtains encrypted image Y, and mathematic(al) representation as the formula (2)
Y = Σ a = 1 M Σ b = 1 N Y ( a - 1 ) N + b - - - ( 2 )
The step that realizes the image deciphering is as follows:
Step 1, by l in the encrypted image 1(A/M)+l during m is capable 2(B/N)+and a n element, m=1 wherein, 2 ..., A/M, n=1,2 ..., B/N, the unknown number of setting up as the formula (3) is [X (a-1) N+b] M, n, M * N linear equation, a=1 wherein, 2 ..., M, b=1,2 ..., N
Σ a = 1 M Σ b = 1 N [ D p 2 [ ( a - 1 ) N + b ] - 1 , l 1 ] n , n · [ X ( a - 1 ) N + b ] m , n · [ D p 2 [ ( a - 1 ) N + b ] , l 2 ] m , m = [ Y ] l 1 ( A / M ) + m , l 2 ( B / N ) + n - - - ( 3 )
Step 2, obtain formula (4), solve X by the formula in the image decryption step one (3) (a-1) N+bIn m capable in the numerical value of n element
X ^ → = D - 1 · r → - - - ( 4 )
Wherein,
Figure G2009102384791D00033
With
Figure G2009102384791D00034
Be defined as
[ X ^ → ] ( a - 1 ) N + b = [ X ( a - 1 ) N + b ] m , n
[ r → ] ( a - 1 ) N + b = [ Y ] ( a - 1 ) ( A / M ) + m , ( b - 1 ) ( B / N ) + n
[ D ] l 2 M + l 1 , [ ( a - 1 ) N + b ] = [ D p 2 [ ( a - 1 ) N + b ] - 1 , l 2 ] n , n · [ D p 2 [ ( a - 1 ) N + b ] , l 1 ] m , m
Step 3, the X that image decryption step two is obtained (a-1) N+bColumn vector and the row vector be p respectively 2[(a-1) N+b]-1Rank discrete fraction rank Fourier transform and p 2[(a-1) N+b]Discrete fraction rank, rank Fourier transform splices original image.
Beneficial effect
1. the image encryption technology that proposes of the present invention has made full use of the order conversion characteristics of Fourier Transform of Fractional Order with respect to existing image encryption technology based on Fourier Transform of Fractional Order, has enlarged key space, has improved the susceptibility of deciphering error to key;
2. the image encryption technology that proposes of the present invention can combine with image encryption method such as double random phase coding, further enlarges the key space of encrypted image;
3. the image encryption and the decryption method of the present invention's proposition can also be applied to digraph and many figure encrypt and decrypt.
Description of drawings
Fig. 1-encrypt the end system structural drawing based on the multi-order fractional Fourier transform image encryption system;
Fig. 2-based on multi-order fractional Fourier transform image encryption system decrypting end system construction drawing;
Fig. 3 (a)-original image, (b)-encrypted image;
Decrypted image under Fig. 4-false key;
Fig. 5 (a)-decrypted image square error is with dp 1, dp 2, dp 3, dp 4Change curve, (b)-decrypted image square error are with dp 5, dp 6, dp 7, dp 8Change curve;
Embodiment
A kind of image encryption and decryption method based on multi-order fractional Fourier transform that the present invention proposes comprises image encryption (as shown in Figure 1) and image deciphering (as shown in Figure 2), and the specific implementation step is as follows:
One, encrypting step
(1) row, column of original image is carried out N times and M times of five equilibrium respectively, obtain M * N subimage S that waits size (a-1) N+b, a=1,2 ..., M, b=1,2 ..., N;
(2) the subimage S that will obtain by step () (a-1) N+bColumn vector be M times of interpolation and p 2[(a-1) N+b]-1Contrary discrete fraction rank, rank Fourier transform, row vector are N times of interpolation and p 2[(a-1) N+b]Contrary discrete fraction rank, rank Fourier transform obtains Y (a-1) N+b
(3) according to formula (2), the Y that obtains by step (two) (a-1) N+bAddition obtains encrypted image successively.
Two, decryption step
(1) extract k (B/N)+n element during l in the encrypted image (A/M)+m is capable, l=0 wherein, 1 ..., M-1, k=0,1 ..., N-1, structure linear equation as the formula (3);
(2) solve subimage S according to formula (4) (a-1) N+bColumn vector and row vector are p respectively 2[(a-1) N+b]-1Rank discrete fraction rank Fourier transform and p 2[(a-1) N+b]The corresponding matrix X of rank discrete fraction rank Fourier transform (a-1) N+bCapable n the element numerical value of m, and then obtain X (a-1) N+bIn all numerical value;
(3) X that image decryption step two is obtained (a-1) N+bColumn vector and the row vector be p respectively 2[(a-1) N+b]-1Rank discrete fraction rank Fourier transform and p 2[(a-1) N+b]Discrete fraction rank, rank Fourier transform splices original image.
Ultimate principle below in conjunction with the conversion of fractional number order Fourier signal sampling rate is done detailed theoretical validation to embodiment.
For the original image S that is of a size of A * B, to its row row carry out respectively N doubly and M times of five equilibrium be of a size of the subimage S of (A/M) * (B/N) (a-1) N+b, a=1,2 ..., M, b=1,2 ..., N is to subimage S (a-1) N+bThe row, column vector carry out N respectively doubly and after M times the interpolation, again interpolation result's row, column is carried out p respectively 2[(a-1) N+b]And p 2[(a-1) N+b]-1Contrary discrete fraction rank, rank Fourier transform, the gained result can be expressed as so
Y ( a - 1 ) N + b = F - p 2 [ ( a - 1 ) N + b ] - 1 · θ M · S ( a - 1 ) N + b · θ N T · F - p 2 [ ( a - 1 ) N + b ] T
= D p 2 [ ( a - 1 ) N + b ] - 1 , 0 D p 2 [ ( a - 1 ) N + b ] - 1 , 1 · · · D p 2 [ ( a - 1 ) N + b ] - 1 , M - 1 · X ( a - 1 ) N + b · D p 2 [ ( a - 1 ) N + b ] , 0 D p 2 [ ( a - 1 ) N + b ] , 1 · · · D p 2 [ ( a - 1 ) N + b ] , N - 1 - - - ( 5 )
In formula (5),
X ( a - 1 ) N + b = F - p 2 [ ( a - 1 ) N + b ] - 1 · S ( a - 1 ) N + b · F - p 2 [ ( a - 1 ) N + b ] T
Figure G2009102384791D00054
With
Figure G2009102384791D00055
P is represented in expression respectively 2[(a-1) N+b]-1Rank and p 2[(a-1) N+b]Contrary discrete fraction rank Fourier transform matrix, promptly
[ F - p 2 [ ( a - 1 ) N + b ] - 1 ] m , n = sin ( p 2 [ ( a - 1 ) N + b ] - 1 π / 2 ) - j · cos ( p 2 [ ( a - 1 ) N + b ] - 1 π / 2 ) A ×
e j 1 2 · cot ( p 2 [ ( a - 1 ) N + b ] - 1 π 2 ) · m 2 Δ t 2 + j 2 π A mn + j 1 2 · cot ( p 2 [ ( a - 1 ) N + b ] - 1 π 2 ) · n 2 Δ u p 2 [ ( a - 1 ) N + b ] - 1 2
[ F - p 2 [ ( a - 1 ) N + b ] ] m , n = sin ( p 2 [ ( a - 1 ) N + b ] π / 2 ) - j · cos ( p 2 [ ( a - 1 ) N + b ] π / 2 ) B ×
e j 1 2 · cot ( p 2 [ ( a - 1 ) N + b ] π 2 ) · m 2 Δ t 2 + j 2 π B mn + j 1 2 · cot ( p 2 [ ( a - 1 ) N + b ] π 2 ) · n 2 Δ u p 2 [ ( a - 1 ) N + b ] 2
Wherein, Δ t is the time-domain sampling interval,
Δ u p 2 [ ( a - 1 ) N + b ] - 1 = 2 π · sin ( p 2 [ ( a - 1 ) N + b ] - 1 π 2 ) / ( A · Δt )
Δ u p 2 [ ( a - 1 ) N + b ] = 2 π · sin ( p 2 [ ( a - 1 ) N + b ] π 2 ) / ( B · Δt )
θ MAnd θ NRepresent M times and N times of interpolation operation respectively, it can be expressed as
Figure G2009102384791D000512
Figure G2009102384791D000513
Diagonal matrix
Figure G2009102384791D000514
L wherein 1=0,1 ..., M-1, l 2=0,1 ..., N-1 is defined as
[ D p 2 [ ( a - 1 ) N + b ] , l 1 ] k , k = e j · 1 2 · cot ( p 2 [ ( a - 1 ) N + b ] · π 2 ) · [ 2 k ( l 1 · N ) + ( l 1 · N ) 2 ] · Δ t 2
[ D p 2 [ ( a - 1 ) N + b ] - 1 , l 2 ] k , k = e j · 1 2 · cot ( p 2 [ ( a - 1 ) N + b ] - 1 · π 2 ) · [ 2 k ( l 2 · N ) + ( l 2 · N ) 2 ] · Δ t 2
If with the Y shown in the formula (5) (a-1) N+bAddition can obtain successively
Y = Σ a = 1 M Σ b = 1 N Y ( a - 1 ) N + b
= Σ a = 1 M Σ b = 1 N D p 2 [ ( a - 1 ) N + b ] - 1 , 0 D p 2 [ ( a - 1 ) N + b ] - 1 , 1 · · · D p 2 [ ( a - 1 ) N + b ] - 1 , M - 1 · X ( a - 1 ) N + b · D p 2 [ ( a - 1 ) N + b ] , 0 D p 2 [ ( a - 1 ) N + b ] , 1 · · · D p 2 [ ( a - 1 ) N + b ] , N - 1 - - - ( 6 )
Therefore, by X (a-1) N+bIn capable, the n column element of m can obtain M * N linear equation as the formula (7)
Σ a = 1 M Σ b = 1 N [ D p 2 [ ( a - 1 ) N + b ] - 1 , l 1 ] n , n · [ X ( a - 1 ) N + b ] m , n · [ D p 2 [ ( a - 1 ) N + b ] , l 2 ] m , m = [ Y ] l 1 ( A / M ) + m , l 2 ( B / N ) + n - - - ( 7 )
Therefore, in the system of linear equations that linear equation constitutes as the formula (7) by M * N, suppose
Figure G2009102384791D00066
For by unknown parameter [X (a-1) N+b] M, nThe vector that constitutes, so
X ^ → = D - 1 · r →
Wherein,
Figure G2009102384791D00068
With
Figure G2009102384791D00069
Be defined as
[ r → ] ( a - 1 ) N + b = [ Y ] ( a - 1 ) ( A / M ) + m , ( b - 1 ) ( B / N ) + n
[ D ] l 2 M + l 1 , [ ( a - 1 ) N + b ] = [ D p 2 [ ( a - 1 ) N + b ] - 1 , l 2 ] n , n · [ D p 2 [ ( a - 1 ) N + b ] , l 1 ] m , m
Below in conjunction with drawings and Examples the present invention is elaborated:
In this emulation experiment, adopt shown in Fig. 3 (a), to be of a size of 256 * 256 Lena image, the row and column of image carries out the twice five equilibrium respectively and obtains 4 width of cloth subimages, after the column vector of every width of cloth subimage is carried out 2 times of interpolations, carries out p respectively 1=0.41, p 3=0.43, p 5=0.45 and p 7Contrary discrete fraction rank ,=0.47 rank Fourier transform after the capable vector of every width of cloth subimage carries out 2 times of interpolations, is carried out p respectively 2=0.42, p 4=0.44, p 6=0.46 and p 8Contrary discrete fraction rank ,=0.48 rank Fourier transform, system encryption end output encrypted image is shown in Fig. 3 (b).
At the system decrypts end, if the fraction order Fourier transform order that deciphering the is adopted fraction order Fourier transform order multiplexing with encrypting end do not wait, deciphering will make a mistake so.Fig. 4 has provided and has worked as p 1(p when making a mistake 1=0.4) decrypted image.Fig. 5 (a) has provided the decrypted image square error respectively with p 1, p 2, p 3, p 4Error (dp 1, dp 2, dp 3, dp 4) curve map that changes.Fig. 5 (b) has provided the decrypted image square error respectively with p 5, p 6, p 7, p 8Error (dp 5, dp 6, dp 7, dp 8) curve map that changes.
Can find by above simulation result, based on multi-order fractional Fourier transform image encryption system system, each fraction order Fourier transform order can be as the key of image encryption, and when each key produces 0.01 error, the capital causes decrypted image to occur and the bigger error of original image, therefore, the image encryption technology that the present invention proposes has enlarged key space with existing image encryption technology based on Fourier Transform of Fractional Order relatively, has very high security.

Claims (1)

1. image encryption and decryption method based on a multi-order fractional Fourier transform is characterized in that: be divided into image encryption and image deciphering two parts;
The step that realizes image encryption is as follows:
Step 1, will be of a size of the wide and long M and the N equal portions of being divided into respectively of the original image of A * B, obtain the subimage S that size such as M * N is of a size of (A/M) * (B/N) (a-1) N+b, a=1,2 ..., M, b=1,2 ..., N;
Step 2, each subimage S that the information encryption step 1 is obtained (a-1) N+bEach column vector carry out M times of interpolation and p 2[(a-1) N+b]-1Contrary discrete fraction rank, rank Fourier transform is carried out N times of interpolation and p to its row vector again 2[(a-1) N+b]Contrary discrete fraction rank, rank Fourier transform obtains Y thus (a-1) N+b, its mathematic(al) representation as the formula (1)
Y ( a - 1 ) N + b = D p 2 [ ( a - 1 ) N + b ] - 1 , 0 D p 2 [ ( a - 1 ) N + b ] - 1 , 1 · · · D p 2 [ ( a - 1 ) N + b ] - 1 , M - 1 · X ( a - 1 ) N + b · D p 2 [ ( a - 1 ) N + b ] , 0 D p 2 [ ( a - 1 ) N + b ] , 1 · · · D p 2 [ ( a - 1 ) N + b ] , N - 1 - - - ( 1 )
Wherein, X (a-1) N+bFor to S (a-1) N+bColumn vector be p 2[(a-1) N+b]-1Contrary discrete fraction rank, rank Fourier transform, row vector are p 2[(a-1) N+b]The contrary discrete fraction rank Fourier transform gained result in rank, diagonal matrix
Figure F2009102384791C00012
L wherein 1=0,1 ..., M-1, l 2=0,1 ..., N-1 is defined as
[ D p 2 [ ( a - 1 ) N + b ] , l 1 ] k , k = e j · 1 2 · cot ( p 2 [ ( a - 1 ) N + b ] · π 2 ) · [ 2 k ( l 1 · N ) + ( l 1 · N ) 2 ] · Δt 2
[ D p 2 [ ( a - 1 ) N + b ] - 1 , l 2 ] k , k = e j · 1 2 · cot ( p 2 [ ( a - 1 ) N + b ] - 1 · π 2 ) · [ 2 k ( l 2 · N ) + ( l 2 · N ) 2 ] · Δt 2
Step 3, the Y that the image encryption step 2 is obtained (a-1) N+bAddition successively obtains encrypted image Y, and mathematic(al) representation as the formula (2)
Y = Σ a = 1 M Σ b = 1 N Y ( a - 1 ) N + b - - - ( 2 )
The step that realizes the image deciphering is as follows:
Step 1, by l in the encrypted image 1(A/M)+l during m is capable 2(B/N)+and a n element, m=1 wherein, 2 ..., A/M, n=1,2 ..., B/N, the unknown number of setting up as the formula (3) is [X (a-1) N+b] M, n, M * N linear equation, a=1 wherein, 2 ..., M, b=1,2 ..., N
Σ a = 1 M Σ b = 1 N [ D p 2 [ ( a - 1 ) N + b ] - 1 , l 1 ] n , n · [ X ( a - 1 ) N + b ] m , n · [ D p 2 [ ( a - 1 ) N + b ] , l 2 ] m , m = [ Y ] l 1 ( A / M ) + m , l 2 ( B / N ) + n - - - ( 3 )
Step 2, obtain formula (4), solve X by the formula in the image decryption step one (3) (a-1) N+bIn m capable in the numerical value of n element
X ^ → = D - 1 · r → - - - ( 4 )
Wherein,
Figure F2009102384791C00023
With
Figure F2009102384791C00024
Be defined as
[ X ^ → ] ( a - 1 ) N + b = [ X ( a - 1 ) N + b ] m , n
[ r → ] ( a - 1 ) N + b = [ Y ] ( a - 1 ) ( A / M ) + m , ( b - 1 ) ( B / N ) + n
[ D ] l 2 M + l 1 , [ ( a - 1 ) N + b ] = [ D p 2 [ ( a - 1 ) N + b ] - 1 , l 2 ] n , n · [ D p 2 [ ( a - 1 ) N + b ] , l 1 ] m , m
Step 3, the X that image decryption step two is obtained (a-1) N+bColumn vector and the row vector be p respectively 2[(a-1) N+b]-1Rank discrete fraction rank Fourier transform and p 2[(a-1) N+b]Discrete fraction rank, rank Fourier transform splices original image.
CN 200910238479 2009-11-20 2009-11-20 Method for encrypting and decrypting image based on multi-order fractional Fourier transform Expired - Fee Related CN101739660B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200910238479 CN101739660B (en) 2009-11-20 2009-11-20 Method for encrypting and decrypting image based on multi-order fractional Fourier transform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200910238479 CN101739660B (en) 2009-11-20 2009-11-20 Method for encrypting and decrypting image based on multi-order fractional Fourier transform

Publications (2)

Publication Number Publication Date
CN101739660A true CN101739660A (en) 2010-06-16
CN101739660B CN101739660B (en) 2013-02-13

Family

ID=42463112

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200910238479 Expired - Fee Related CN101739660B (en) 2009-11-20 2009-11-20 Method for encrypting and decrypting image based on multi-order fractional Fourier transform

Country Status (1)

Country Link
CN (1) CN101739660B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102073979A (en) * 2010-12-31 2011-05-25 南昌大学 Score Mellin transform-based optical image encryption method
CN103078817A (en) * 2013-01-30 2013-05-01 哈尔滨工业大学 Weighted score Fourier transform-based variable parameter spread spectrum sequence low-detection probability signal emitting and receiving method
CN103593819A (en) * 2013-11-12 2014-02-19 南昌大学 Multi-image encryption method based on fractional mellin transform
CN104361570A (en) * 2014-11-19 2015-02-18 深圳市富视康实业发展有限公司 Image fusing method based on fractional Fourier transformation
CN104463766A (en) * 2014-11-18 2015-03-25 哈尔滨理工大学 QR code encrypting and decrypting method based on ECA state ring
CN106102045A (en) * 2016-05-25 2016-11-09 赵京磊 A kind of secret communication method using Fourier Transform of Fractional Order

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102073979A (en) * 2010-12-31 2011-05-25 南昌大学 Score Mellin transform-based optical image encryption method
CN102073979B (en) * 2010-12-31 2012-05-02 南昌大学 Score Mellin transform-based optical image encryption method
CN103078817A (en) * 2013-01-30 2013-05-01 哈尔滨工业大学 Weighted score Fourier transform-based variable parameter spread spectrum sequence low-detection probability signal emitting and receiving method
CN103078817B (en) * 2013-01-30 2015-09-16 哈尔滨工业大学 Based on the variable element frequency expansion sequence low detection probability signal launching and receiving method of weight score Fourier conversion
CN103593819A (en) * 2013-11-12 2014-02-19 南昌大学 Multi-image encryption method based on fractional mellin transform
CN103593819B (en) * 2013-11-12 2016-05-11 南昌大学 Based on many image encryption methods of mark Mellin transform
CN104463766A (en) * 2014-11-18 2015-03-25 哈尔滨理工大学 QR code encrypting and decrypting method based on ECA state ring
CN104361570A (en) * 2014-11-19 2015-02-18 深圳市富视康实业发展有限公司 Image fusing method based on fractional Fourier transformation
CN106102045A (en) * 2016-05-25 2016-11-09 赵京磊 A kind of secret communication method using Fourier Transform of Fractional Order

Also Published As

Publication number Publication date
CN101739660B (en) 2013-02-13

Similar Documents

Publication Publication Date Title
CN101739660B (en) Method for encrypting and decrypting image based on multi-order fractional Fourier transform
CN103279916B (en) Based on the image encryption method of Double random phase and principle of interference
CN101013938B (en) Encryption method of block cipher
CN102567943B (en) Asymmetric double image encryption method based on joint of fourier transformation and phase cutting
CN103679625A (en) Single-channel color image encryption method based on chaos and phase retrieval process
CN107239708A (en) It is a kind of that the image encryption method converted with score field is mapped based on quantum chaos
CN101626289A (en) Design method of AES encryption chip and computer encryptor
Belazi et al. Algebraic analysis of a RGB image encryption algorithm based on DNA encoding and chaotic map
Liu et al. Image hiding scheme by use of rotating squared sub-image in the gyrator transform domains
CN104751065A (en) Encryption method for geographic information product file
CN103258315B (en) Based on the dual image encryption method of cut fractional Fourier transform
CN105447396A (en) Fractional domain image encryption method based on Arnold transformation and compound chaos
US9544277B1 (en) KAFKA: A cellular automation / complex Fibonacci sequences-based technique for encrypting and decrypting audio, video and text messages
CN103117847A (en) Optical encryption method based on chaos and computer-generated holography
Bibi et al. A novel encryption scheme for high-contrast image data in the Fresnelet domain
CN103716502B (en) Encryption method based on iteration FrFT and chaotic single-channel color images
CN105373739A (en) Hyperchaotic system based quantum image encryption method
Chen et al. Information authentication using sparse representation of double random phase encoding in fractional Fourier transform domain
CN105553639B (en) The compressed sensing based more image encryptions of one kind and decryption method
CN104376525B (en) Image encryption method based on iterative nonlinear Double random phase
CN104240177B (en) A kind of color image encrypting method based on chaos system and fraction Fourier conversion
CN109657484B (en) Multi-channel image coding and decoding method based on gamma function and ciphertext splicing
CN103871016A (en) Image encryption method based on on-ring two particle one-dimensional discrete quantum walk
CN103593819A (en) Multi-image encryption method based on fractional mellin transform
CN101667911A (en) Secret communication method based on fraction order Fourier transform order-multiplexing

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20130213

Termination date: 20131120