Information encryption technology based on digital watermarkingand iteration algorithm

被引:0
|
作者
Xie Q. [1 ,2 ]
Jiang Y. [1 ,2 ]
Zhang W. [1 ,2 ]
Wang J. [1 ,2 ]
Qu E. [1 ]
机构
[1] Research Department of Information Photonic, Xi'an Institute of Optics and Precision Mechanic, Academy of Chinese Sciences, Xi'an, 710119, Shaanxi
[2] University of Academy of Chinese Sciences, Beijing
来源
Qu, Enshi (quenshi@163.com) | 1600年 / Chinese Optical Society卷 / 36期
关键词
Fourier optics; Image encryption; Iteration algorithm; Watermarking;
D O I
10.3788/AOS201636.0607001
中图分类号
学科分类号
摘要
The digital watermarking technology is a new information encryption technology. It has a good capacity in camouflage. However, it is limited by the phase detection errors, and the traditional retrieval algorithms are unpractical by means of calculating phase first and then deducing the original images in the process of restoring signal. The iteration algorithm can efficiently reconstruct these weak signals by applying some constrains in frequency domain and spatial domain. A new technology of information encryption and reconstruction is proposed combining with the theory of digital watermarking and iteration algorithm. This technology can overcome the limitation of phase detection errors. Furthermore, it can effectively hide and recover the embedded information, and the information can hardly be deciphered, which depends on the accuracy of phase information. Theoretical analysis and simulation results demonstrate that mean square error of the proposed algorithm can accomplish convergence by only several iterations within few seconds, which shows high robustness. It has a good performance in camouflage and fast-convergence, and could be widely applied in personal identity camouflage and information identity. © 2016, Chinese Lasers Press. All right reserved.
引用
收藏
页数:8
相关论文
共 18 条
  • [1] Gabor D., A new microscope principle, Nature, 161, 4098, (1948)
  • [2] Javidi B., Nomura T., Securing information by use of digital holography, Optics Letters, 25, 1, pp. 28-30, (2000)
  • [3] Ma Z., Hua W., Li X., Et al., Image hiding method based on double random phase encryption technology, Optical Instruments, 34, 4, pp. 21-25, (2012)
  • [4] Wei H., Peng X., Zhang P., Et al., Chosen-plaintext attack on double phase encoding encryption technology, Acta Optica Sinica, 27, 5, pp. 824-829, (2007)
  • [5] Javidi B., Optical and digital Techniques for Information Security, (2006)
  • [6] Zhuang S., Sun L., Anti-fake technique by double random phase encrypted holographic mark, Acta Optica Sinica, 27, 1, pp. 31-34, (2007)
  • [7] Zhuang S., Sun L., Forgery prevention based on in-line fourier holographic watermark with double random phase encryption, Acta Optica Sinica, 27, 4, pp. 621-624, (2007)
  • [8] Liu X., Cao Y., Lu P., Research on optical image encryption technique with compressed sensing, Acta Optica Sinica, 34, 3, (2014)
  • [9] Hou J., Huang S., Situ G., Nonlinear optical image encryption, Acta Optica Sinica, 35, 8, (2015)
  • [10] Shen X., Liu X., Cai N., Et al., Nonlinear image encryption system based on JTC and its removing noise and resisting attack properties research, Chinese J Lasers, 42, 7, (2015)