• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于光学相位截断的双图像加密,采用等模分解和随机掩码。

Optical phase-truncation-based double-image encryption using equal modulus decomposition and random masks.

作者信息

Luan Guangyu, Quan Chenggen

机构信息

College of Electrical and Information, Heilongjiang Bayi Agricultural University, Daqing, 163319, Heilongjiang, China.

Department of Mechanical Engineering, National University of Singapore, 9 Engineering Drive 1, Singapore, 117576, Singapore.

出版信息

Sci Rep. 2024 Mar 26;14(1):7155. doi: 10.1038/s41598-024-57790-9.

DOI:10.1038/s41598-024-57790-9
PMID:38531920
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10966007/
Abstract

This work reports an optical double-image crosstalk free encryption scheme that employs equal modulus decomposition and random masks. For the encryption, two plaintexts by a random amplitude mask and a random phase mask have been encrypted into a single ciphertext mask and two private key masks. Owing to the two random masks introduced, the functional relation between the plaintext pair and the ciphertext indirectly cause the paucity of constraints employed for the specific attack. Unlike the traditional phase-truncation-based techniques, this scheme is immune to the information leakage and different types of attacks. Furthermore, the three different diffraction distances and the illuminating wavelength also function as four additional keys to significantly reinforce the security. Simulation results demonstrate the feasibility and validity of the proposal.

摘要

这项工作报告了一种采用等模分解和随机掩码的无光学双图像串扰加密方案。对于加密,通过随机幅度掩码和随机相位掩码将两个明文加密为单个密文掩码和两个私钥掩码。由于引入了两个随机掩码,明文对与密文之间的函数关系间接导致了用于特定攻击的约束条件匮乏。与传统的基于相位截断的技术不同,该方案能够抵御信息泄露和不同类型的攻击。此外,三个不同的衍射距离和照明波长还充当四个额外的密钥,显著增强了安全性。仿真结果证明了该方案的可行性和有效性。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4693/10966007/0e771ab2a66f/41598_2024_57790_Fig16_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4693/10966007/9877310cef32/41598_2024_57790_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4693/10966007/27cde3ace94d/41598_2024_57790_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4693/10966007/a6da038de678/41598_2024_57790_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4693/10966007/973fa0f3e186/41598_2024_57790_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4693/10966007/52c73eebf794/41598_2024_57790_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4693/10966007/098765cd06a3/41598_2024_57790_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4693/10966007/538e2daf7980/41598_2024_57790_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4693/10966007/665422f7bf3f/41598_2024_57790_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4693/10966007/a3577129ba82/41598_2024_57790_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4693/10966007/c2aeb4d938a9/41598_2024_57790_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4693/10966007/f1590a59144e/41598_2024_57790_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4693/10966007/a3f08b566711/41598_2024_57790_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4693/10966007/b62a6ac7b440/41598_2024_57790_Fig13_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4693/10966007/9f2660a06042/41598_2024_57790_Fig14_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4693/10966007/4b86721034ac/41598_2024_57790_Fig15_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4693/10966007/0e771ab2a66f/41598_2024_57790_Fig16_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4693/10966007/9877310cef32/41598_2024_57790_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4693/10966007/27cde3ace94d/41598_2024_57790_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4693/10966007/a6da038de678/41598_2024_57790_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4693/10966007/973fa0f3e186/41598_2024_57790_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4693/10966007/52c73eebf794/41598_2024_57790_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4693/10966007/098765cd06a3/41598_2024_57790_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4693/10966007/538e2daf7980/41598_2024_57790_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4693/10966007/665422f7bf3f/41598_2024_57790_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4693/10966007/a3577129ba82/41598_2024_57790_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4693/10966007/c2aeb4d938a9/41598_2024_57790_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4693/10966007/f1590a59144e/41598_2024_57790_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4693/10966007/a3f08b566711/41598_2024_57790_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4693/10966007/b62a6ac7b440/41598_2024_57790_Fig13_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4693/10966007/9f2660a06042/41598_2024_57790_Fig14_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4693/10966007/4b86721034ac/41598_2024_57790_Fig15_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4693/10966007/0e771ab2a66f/41598_2024_57790_Fig16_HTML.jpg

相似文献

1
Optical phase-truncation-based double-image encryption using equal modulus decomposition and random masks.基于光学相位截断的双图像加密,采用等模分解和随机掩码。
Sci Rep. 2024 Mar 26;14(1):7155. doi: 10.1038/s41598-024-57790-9.
2
Collision in double-image encryption scheme based on spatial encoding and phase-truncation Fourier transforms.基于空间编码和相位截断傅里叶变换的双图像加密方案中的碰撞
Appl Opt. 2023 Nov 1;62(31):8416-8425. doi: 10.1364/AO.501672.
3
Hybrid attack on an optical cryptosystem based on phase-truncated Fourier transforms and a random amplitude mask.基于相位截断傅里叶变换和随机幅度掩模的光学密码系统的混合攻击
Appl Opt. 2018 Jul 20;57(21):6010-6016. doi: 10.1364/AO.57.006010.
4
Cryptoanalysis and enhancement of a binary image encryption system based on interference.基于干涉的二值图像加密系统的密码分析与增强
Appl Opt. 2021 Sep 10;60(26):8038-8045. doi: 10.1364/AO.432858.
5
Double-image encryption without information disclosure using phase-truncation Fourier transforms and a random amplitude mask.使用相位截断傅里叶变换和随机幅度掩模的无信息泄露双图像加密
Appl Opt. 2014 Aug 10;53(23):5100-8. doi: 10.1364/AO.53.005100.
6
Cryptoanalysis on the optical image encryption scheme based on full phase encoding and equal modulus decomposition.基于全相位编码和等模分解的光学图像加密方案的密码分析
Appl Opt. 2022 Apr 1;61(10):2743-2749. doi: 10.1364/AO.455250.
7
Optical single-channel color image encryption based on chaotic fingerprint phase mask and diffractive imaging.基于混沌指纹相位掩模和衍射成像的光学单通道彩色图像加密。
Appl Opt. 2023 Feb 1;62(4):1009-1018. doi: 10.1364/AO.479983.
8
Cryptoanalysis on optical image encryption systems based on the vector decomposition technique in the Fourier domain.基于傅里叶域向量分解技术的光学图像加密系统的密码分析
Appl Opt. 2019 Apr 20;58(12):3301-3309. doi: 10.1364/AO.58.003301.
9
Security analysis on an interference-based optical image encryption scheme.基于干扰的光学图像加密方案的安全性分析
Appl Opt. 2022 Oct 20;61(30):9045-9051. doi: 10.1364/AO.470234.
10
Learning-based attacks for detecting the vulnerability of computer-generated hologram based optical encryption.基于学习的攻击方法用于检测基于计算机生成全息图的光学加密的漏洞。
Opt Express. 2020 Jan 20;28(2):2499-2510. doi: 10.1364/OE.380004.

引用本文的文献

1
A cryptosystem for face recognition based on optical interference and phase truncation theory.一种基于光学干涉和相位截断理论的人脸识别密码系统。
Sci Rep. 2025 Jul 14;15(1):25371. doi: 10.1038/s41598-025-06990-y.

本文引用的文献

1
Image encryption using binary polarization states of light beam.利用光束的二元偏振态进行图像加密。
Sci Rep. 2023 Aug 28;13(1):14028. doi: 10.1038/s41598-023-41251-w.
2
Efficient asymmetric image authentication schemes based on photon counting-double random phase encoding and RSA algorithms.基于光子计数-双随机相位编码和RSA算法的高效非对称图像认证方案。
Appl Opt. 2016 Jun 1;55(16):4328-35. doi: 10.1364/AO.55.004328.
3
Binary-tree encryption strategy for optical multiple-image encryption.用于光学多图像加密的二叉树加密策略。
Appl Opt. 2016 Jul 10;55(20):5280-91. doi: 10.1364/AO.55.005280.
4
Optical encryption using photon-counting polarimetric imaging.使用光子计数偏振成像的光学加密
Opt Express. 2015 Jan 26;23(2):655-66. doi: 10.1364/OE.23.000655.
5
Asymmetric optical cryptosystem based on coherent superposition and equal modulus decomposition.基于相干叠加和等模分解的非对称光学密码系统。
Opt Lett. 2015 Feb 15;40(4):475-8. doi: 10.1364/OL.40.000475.
6
Security authentication using phase-encoded nanoparticle structures and polarized light.使用相位编码纳米颗粒结构和偏振光的安全认证
Opt Lett. 2015 Jan 15;40(2):135-8. doi: 10.1364/OL.40.000135.
7
Fractional Fourier domain optical image hiding using phase retrieval algorithm based on iterative nonlinear double random phase encoding.基于迭代非线性双随机相位编码的相位恢复算法的分数傅里叶域光学图像隐藏
Opt Express. 2014 Sep 22;22(19):22981-95. doi: 10.1364/OE.22.022981.
8
Double-image encryption without information disclosure using phase-truncation Fourier transforms and a random amplitude mask.使用相位截断傅里叶变换和随机幅度掩模的无信息泄露双图像加密
Appl Opt. 2014 Aug 10;53(23):5100-8. doi: 10.1364/AO.53.005100.
9
Asymmetric double-image encryption based on cascaded discrete fractional random transform and logistic maps.基于级联离散分数阶随机变换和逻辑斯谛映射的非对称双图像加密
Opt Express. 2014 May 5;22(9):10605-21. doi: 10.1364/OE.22.010605.
10
A novel double-image encryption scheme based on cross-image pixel scrambling in gyrator domains.一种基于旋转器域中交叉图像像素置乱的新型双图像加密方案。
Opt Express. 2014 Mar 24;22(6):7349-61. doi: 10.1364/OE.22.007349.