• Acta Photonica Sinica
  • Vol. 49, Issue 3, 0310002 (2020)
Si-min HAN, Wei ZHANG*, Xiang ZHANG, Xiao-xiao WEI, and Xin-jun WAN
Author Affiliations
  • Shanghai Key Lab of Modern Optical System, Engineering Research Center of Optical Instrument and System, Ministry of Education, School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology, Shanghai 200093, China
  • show less
    DOI: 10.3788/gzxb20204903.0310002 Cite this Article
    Si-min HAN, Wei ZHANG, Xiang ZHANG, Xiao-xiao WEI, Xin-jun WAN. Multiple Image Encryption Method Based on Light Field Imaging Theory and Chaotic System[J]. Acta Photonica Sinica, 2020, 49(3): 0310002 Copy Citation Text show less
    Basic structure diagram of a focused light field imaging system including a microlens array
    Fig. 1. Basic structure diagram of a focused light field imaging system including a microlens array
    Schematic of sub-aperture image and macro pixel
    Fig. 2. Schematic of sub-aperture image and macro pixel
    Image encryption process
    Fig. 3. Image encryption process
    Original images
    Fig. 4. Original images
    Encrypted image
    Fig. 5. Encrypted image
    Decrypted image
    Fig. 6. Decrypted image
    Horizontal pixel adjacent pixel correlation of original images after stitching
    Fig. 7. Horizontal pixel adjacent pixel correlation of original images after stitching
    Horizontal pixel adjacent pixel correlation of encrypted images
    Fig. 8. Horizontal pixel adjacent pixel correlation of encrypted images
    Key sensitivity test of the algorithm
    Fig. 9. Key sensitivity test of the algorithm
    Decrypted images with noise attack
    Fig. 10. Decrypted images with noise attack
    Original image in algorithm comparison experiment
    Fig. 11. Original image in algorithm comparison experiment
    Encrypted images using two algorithms
    Fig. 12. Encrypted images using two algorithms
    ImageHorizontalVerticalDiagonal
    Fig. 4(a)0.958 10.951 50.914 6
    Fig. 4(b)0.917 20.910 50.849 6
    Fig. 4(c)0.955 60.961 60.919 5
    Fig. 4(d)0.956 20.952 50.916 2
    Fig. 4(e)0.960 30.967 30.940 7
    Fig. 4(f)0.962 20.939 80.912 4
    Fig. 4(g)0.964 60.940 90.916 6
    Fig. 4(h)0.879 30.881 30.809 3
    Fig. 4(i)0.793 60.848 20.729 5
    Stitched image0.931 90.935 40.882 1
    Encrypted image0.077 90.028 00.046 2
    Table 1. Adjacent pixel correlation of original image and encrypted image
    ImageInformation entropy
    Fig. 4(a)7.681 6
    Fig. 4(b)1.960 3
    Fig. 4(c)7.249 2
    Fig. 4(d)7.136 7
    Fig. 4(e)7.509 8
    Fig. 4(f)7.517 3
    Fig. 4(g)7.142 5
    Fig. 4(h)2.609 0
    Fig. 4(i)7.592 4
    Stitched image7.378 1
    Encrypted image7.875 4
    Table 2. Information entropy of original image and encrypted image
    AlgorithmsCalculation time/s
    TANG17.288
    Proposed1.853
    Table 3. The calculation time of two algorithms
    Si-min HAN, Wei ZHANG, Xiang ZHANG, Xiao-xiao WEI, Xin-jun WAN. Multiple Image Encryption Method Based on Light Field Imaging Theory and Chaotic System[J]. Acta Photonica Sinica, 2020, 49(3): 0310002
    Download Citation