Font Size: a A A

Real Vector Power Weighted Unitary Transformation Encryption Algorithm Of Optical Image

Posted on:2013-10-25Degree:MasterType:Thesis
Country:ChinaCandidate:T Y ZhaoFull Text:PDF
GTID:2268330392968570Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
This paper presents a weighted unitary transformation with a real vector as itsorder and accordingly a high-security optical image encryption method. This imageencryption method based on real vector power weighted unitary transformation, withoutincreasing the computational complexity and cost of optical systems hardware, hasovercome the security risks of many fractional Fourier transform image encryptionmethod mentioned in a variety of literature and also significantly improved the safety ofthe optical image encryption method. The numerical results verify the efficacy andsafety of this optical image encryption method. The real vector power weighted unitarytransformation presented in this paper is generalized form of the classical fractionalFourier transform with all previous fractional Fourier transform as its special cases andhas important theoretical significance in the field of optical information processing andinformation security.We make use of the weighted unitary transformation operator as a special caseand analyze the validity and the security of this encryption method in the optical imageencryption. This encryption method achieves that a single transformation can have morethan one secret key if we used the order as the secret key, the order can be expandedfrom the real numbers to real vector. The security of image encryption algorithm can beenhanced also. By carrying out numerical simulation we test the sensitivity is muchhigher than the free parameters. So this method has a good effect of encrypt. Finally,with the help of probability statistics, we get the decipher time when the imageinformation is intercepted partial by an illegal listener-in.
Keywords/Search Tags:Image encryption, Weighted unitary transformation, Information security, Information processing, Fractional Fourier transform
PDF Full Text Request
Related items