Neural network-based computational holographic encryption image reconstruction scheme for chaotic iris phase mask
نویسندگان
چکیده
ä¸ºäºæå±å¯¹è®¡ç®å ¨æ¯å å¯å¾åçè§£å¯æ¹æ³ï¼é坹鿳æ»å»é¾åº¦å¤§ç对称-é对称混åå å¯ç³»ç»ï¼æåºäºä¸ç§å©ç¨ç¥ç»ç½ç»æ¢å¤æ··æ²è¹èç¸ä½æ©æ¨¡è®¡ç®å å¯å¾åçæ¹æ¡ã对ææå¾åè¿è¡å å¯ï¼çæè®¡ç®å ¨æ¯ç坿å¾åï¼å¶ä½å¤§éç坿ææå¾å对ä½ä¸ºæ°æ®éãéè¿æå»ºç¥ç»ç½ç»ä¸æå°è®ç»åæµè¯ï¼è®ç»å®æåçç¥ç»ç½ç»å¯ä»¥æååºå¯æå¾åå°ææå¾åçæ å°å ³ç³»ï¼è§£å¯æ¶ä¸å使ç¨å ¬é¥åç§é¥å¯¹å¯æå¾åè¿è¡è§£å¯ãå®éªç»æè¡¨æï¼éè¿ç¥ç»ç½ç»æ¢å¤åºçå¾å䏿æå¾åç¸æ¯ï¼å¹³åäºç¸å ³ç³»æ°ä¸º0.984ï¼å¹³åå³°å¼ä¿¡åªæ¯ä¸º61.0 dBï¼å¹³åç»æç¸ä¼¼æ§ä¸º0.77ï¼å¯¹å¯æå¾åè¿è¡åªå£°æ±¡æï¼ä¹å¯ä»¥æ¢å¤åºè¾é«è´¨éçå¾åï¼å®ç°äºéè¿ç¥ç»ç½ç»å¯¹å¯æå¾åè§£å¯çç®çï¼æ¹æ¡æ¯å¯è¡çå¹¶å ·æè¾å¥½ç鲿£æ§ã
منابع مشابه
Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme
Recently, Yen and Guo proposed a chaotic neural network (CNN) for signal encryption, which was suggested as a solution for protection of digital images and videos. The present paper evaluates the security of this CNN-based encryption scheme, and points out that it is not secure from the cryptographical point of view: 1) it can be easily broken by known/chosen-plaintext attacks; 2) its security ...
متن کاملEfficient neural chaotic generator for image encryption
In this paper, we propose a new implementation of chaotic generator using artificial neural network. Neural network can act as an efficient source of perturbation in the chaotic generator which increases the cycle’s length, and thus avoid the dynamical degradation due to the used finite dimensional space. On the other hand, the use of neural network enlarges the key space of the chaotic generat...
متن کاملA Fast Image Encryption Scheme based on Chaotic Standard Map
In recent years, a variety of effective chaos-based image encryption schemes have been proposed. The typical structure of these schemes has the permutation and the diffusion stages performed alternatively. The confusion and diffusion effect is solely contributed by the permutation and the diffusion stage, respectively. As a result, more overall rounds than necessary are required to achieve a ce...
متن کاملCryptanalysis of Image Encryption Scheme Based on Chaotic Tent Map
With the development of chaos theory, many image encryption algorithmshave been designed using the properties associated withthechaotic map. The chaotic map shows high sensitivity to initial conditions and the sequence generated using chaotic map are unpredictable making it a good choice for performing encryption operation. But, without proper encryption algorithm design, encryption scheme desi...
متن کاملA Secure Iris Image Encryption Technique Using Bio-Chaotic Algorithm
Due to dramatic enhancement in computers and communications and due to huge use of electronic media, security gains more and more importance especially in those organizations where information is more critical and more important. The older techniques such as conventional cryptography use encryption keys, which are long bit strings and are very hard to memorize such a long random numbers. Also i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Guangxue jingmi gongcheng
سال: 2023
ISSN: ['1004-924X']
DOI: https://doi.org/10.37188/ope.20233103.0417