Neural network-based computational holographic encryption image reconstruction scheme for chaotic iris phase mask

نویسندگان

چکیده

ä¸ºäº†æ‹“å±•å¯¹è®¡ç®—å ¨æ¯åŠ å¯†å›¾åƒçš„è§£å¯†æ–¹æ³•ï¼Œé’ˆå¯¹éžæ³•æ”»å‡»éš¾åº¦å¤§çš„å¯¹ç§°-éžå¯¹ç§°æ··åˆåŠ å¯†ç³»ç»Ÿï¼Œæå‡ºäº†ä¸€ç§åˆ©ç”¨ç¥žç»ç½‘ç»œæ¢å¤æ··æ²Œè™¹è†œç›¸ä½æŽ©æ¨¡è®¡ç®—å å¯†å›¾åƒçš„æ–¹æ¡ˆã€‚å¯¹æ˜Žæ–‡å›¾åƒè¿›è¡ŒåŠ å¯†ï¼Œç”Ÿæˆè®¡ç®—å ¨æ¯çš„å¯†æ–‡å›¾åƒï¼Œåˆ¶ä½œå¤§é‡çš„å¯†æ–‡æ˜Žæ–‡å›¾åƒå¯¹ä½œä¸ºæ•°æ®é›†ã€‚é€šè¿‡æ­å»ºç¥žç»ç½‘ç»œä¸æ–­åœ°è®­ç»ƒå’Œæµ‹è¯•ï¼Œè®­ç»ƒå®ŒæˆåŽçš„ç¥žç»ç½‘ç»œå¯ä»¥æ‹Ÿåˆå‡ºå¯†æ–‡å›¾åƒåˆ°æ˜Žæ–‡å›¾åƒçš„æ˜ å°„å ³ç³»ï¼Œè§£å¯†æ—¶ä¸å†ä½¿ç”¨å ¬é’¥å’Œç§é’¥å¯¹å¯†æ–‡å›¾åƒè¿›è¡Œè§£å¯†ã€‚å®žéªŒç»“æžœè¡¨æ˜Žï¼šé€šè¿‡ç¥žç»ç½‘ç»œæ¢å¤å‡ºçš„å›¾åƒä¸Žæ˜Žæ–‡å›¾åƒç›¸æ¯”ï¼Œå¹³å‡äº’ç›¸å ³ç³»æ•°ä¸º0.984,平均峰值信噪比为61.0 dB,平均结构相似性为0.77ï¼›å¯¹å¯†æ–‡å›¾åƒè¿›è¡Œå™ªå£°æ±¡æŸ“ï¼Œä¹Ÿå¯ä»¥æ¢å¤å‡ºè¾ƒé«˜è´¨é‡çš„å›¾åƒï¼Œå®žçŽ°äº†é€šè¿‡ç¥žç»ç½‘ç»œå¯¹å¯†æ–‡å›¾åƒè§£å¯†çš„ç›®çš„ï¼Œæ–¹æ¡ˆæ˜¯å¯è¡Œçš„å¹¶å ·æœ‰è¾ƒå¥½çš„é²æ£’æ€§ã€‚

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme

Recently, Yen and Guo proposed a chaotic neural network (CNN) for signal encryption, which was suggested as a solution for protection of digital images and videos. The present paper evaluates the security of this CNN-based encryption scheme, and points out that it is not secure from the cryptographical point of view: 1) it can be easily broken by known/chosen-plaintext attacks; 2) its security ...

متن کامل

Efficient neural chaotic generator for image encryption

In this paper, we propose a new implementation of chaotic generator using artificial neural network. Neural network can act as an efficient source of perturbation in the chaotic generator which increases the cycle’s length, and thus avoid the dynamical degradation due to the used finite dimensional space. On the other hand, the use of neural network enlarges the key space of the chaotic generat...

متن کامل

A Fast Image Encryption Scheme based on Chaotic Standard Map

In recent years, a variety of effective chaos-based image encryption schemes have been proposed. The typical structure of these schemes has the permutation and the diffusion stages performed alternatively. The confusion and diffusion effect is solely contributed by the permutation and the diffusion stage, respectively. As a result, more overall rounds than necessary are required to achieve a ce...

متن کامل

Cryptanalysis of Image Encryption Scheme Based on Chaotic Tent Map

With the development of chaos theory, many image encryption algorithmshave been designed using the properties associated withthechaotic map. The chaotic map shows high sensitivity to initial conditions and the sequence generated using chaotic map are unpredictable making it a good choice for performing encryption operation. But, without proper encryption algorithm design, encryption scheme desi...

متن کامل

A Secure Iris Image Encryption Technique Using Bio-Chaotic Algorithm

Due to dramatic enhancement in computers and communications and due to huge use of electronic media, security gains more and more importance especially in those organizations where information is more critical and more important. The older techniques such as conventional cryptography use encryption keys, which are long bit strings and are very hard to memorize such a long random numbers. Also i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Guangxue jingmi gongcheng

سال: 2023

ISSN: ['1004-924X']

DOI: https://doi.org/10.37188/ope.20233103.0417