Research on double camouflage encryption mechanism of QR code based on UAV landing scenario

Usually, the landing area of the drone is presented with QR code images, so it is crucial to ensure the information security of the landing area and prevent it from being occupied by other users. This paper proposes a double camouflage encryption method of QR code based on UAV landing scenario. For the QR code image required for UAV landing, the private key and carrier image are used to complete double camouflage encryption, and then the public key is modulated according to the principle of ghost imaging to obtain the ciphertext. After receiving the ciphertext, the receiver first decrypts the camouflage image according to the public key, and then decrypts the QR code image using the private key. The UAV receives ciphertext information through the detector, for non-users, the correct QR code image cannot be decrypted through the wrong key. Even if the eavesdropper obtains the public key information, they can only decrypt the camouflage image and cannot land. For our users, the public key and the double private key can decrypt the correct QR code image for landing. This encryption method can effectively decrypt the image at non-full sampling rate, while also resisting the external noise attack, and has high security.


Research on double camouflage encryption mechanism of QR code based on UAV landing scenario Hualong Ye * & Tongxu Xu
Usually, the landing area of the drone is presented with QR code images, so it is crucial to ensure the information security of the landing area and prevent it from being occupied by other users.This paper proposes a double camouflage encryption method of QR code based on UAV landing scenario.For the QR code image required for UAV landing, the private key and carrier image are used to complete double camouflage encryption, and then the public key is modulated according to the principle of ghost imaging to obtain the ciphertext.After receiving the ciphertext, the receiver first decrypts the camouflage image according to the public key, and then decrypts the QR code image using the private key.The UAV receives ciphertext information through the detector, for non-users, the correct QR code image cannot be decrypted through the wrong key.Even if the eavesdropper obtains the public key information, they can only decrypt the camouflage image and cannot land.For our users, the public key and the double private key can decrypt the correct QR code image for landing.This encryption method can effectively decrypt the image at non-full sampling rate, while also resisting the external noise attack, and has high security.
With the development of science and technology, an important measure to ensure the security of information transmission is to adopt information encryption technology.Information encryption is the use of some technical means to encode encrypted plaintext information to generate an unrecognizable ciphertext (encryption process).If the recipient holds the correct key, the ciphertext message can be restored (decryption process).No one can restore the ciphertext message without the correct key.Optical encryption is one of the mainstream information encryption technologies.Compared with traditional encryption methods, optical encryption has attracted more and more attention due to its advantages of high speed, parallelism and low cost.
In the optical field, Ghost Imaging (GI) technology can generate the image of an object on the optical path that does not contain an object, which can solve problems of conventional imaging failure or difficulty in solving.Moreover, the ghost imaging optical path is simple and requires low equipment requirements, making it easy to combine with other image systems, making it a promising application scenario and capable of playing a unique role in fields such as medical, military, remote sensing, encryption, radar, etc. 1,2 .With the in-depth research and exploration of ghost imaging, GI technology is gradually mature and gradually applied to the field of image encryption.For optical image encryption, the ghost imaging encryption scheme has been developed rapidly since it was proposed.In 2013, Kong et al. used the associated position of the object signal and the reference signal as the key to achieve optical encryption 3 .In 2015, Zhao et al. proposed an encryption scheme based on fast response code and ghost imaging, plaintext information is first encoded into fast response code and then encrypted by ghost imaging technology, this scheme has good anti-eavesdropping performance 4 .In 2016, Yuan et al. analyzed the vulnerabilities of ghost imaging encryption schemes and proposed a supply scheme for ghost imaging 5 .In 2019, Sui et al. introduced custom data containers into the computational ghost imaging encryption scheme, thus solving the problem of the inherent linearity of computational ghost imaging and the fuzzy reconstructed image caused by the imaging mechanism 6 .In order to further increase the amount of information in encryption and improve the efficiency of the ghost imaging encryption scheme, in 2016, Wu et al. took the lead in implementing a multi-image encryption scheme based on ghost imaging by using the location multiplexing method 7 .In the same year, Meng et al. introduced Logistic mapping and coordinate sampling into the ghost imaging encryption scheme, which realized multi-image encryption while reducing the amount of ciphertext data 8 .In 2018, Xu et al. studied a compressed sensing ghost imaging multi-image encryption scheme based on threshold secret sharing and line scanning 9 .In 2019, Zhang et al. performed Fourier transform on the image and extracted the central part to realize information compression, and then realized multi-image encryption by www.nature.com/scientificreports/means of spatial multiplexing 10 .In 2020, Quan et al. proposed a novel ghost imaging authentication method, which transforms into a one-dimensional vector through block operation and transmits it together as a public key and ciphertext 11 .In 2022, Patra A et al. proposed a new method using phase grating to multiplex as well as encrypting 32 cross-sectional CT scan images (slices) in a single canvas for optimization of storage space and improvement of security 12 .In 2023, Yuan et al. proposed a multi-user optical encryption scheme based on ghost imaging, in which a common ciphertext is disclosed to all users, this scheme not only reduces the transmission amount of key data, but also improves the quality of decrypted images 13 .With the continuous progress of society, the research of ghost imaging in the field of optical encryption is becoming more and more mature 14,15 .
In recent years, UAV remote sensing has many advantages, such as low cost, high spatio-temporal resolution, little impact by weather environment, etc., so that it has a unique advantage in ground object recognition ability, and information acquisition is more rapid and detailed, which greatly improves the efficiency of information acquisition.It effectively makes up for the constraints of satellite aerial remote sensing system due to low image resolution, large impact of weather environment, long revisit period and other factors, and has become one of the research hotspots of medium and small-scale remote sensing application 16 .Autonomous landing 17 has always been one of the most important aspects of UAV flight.Due to the problems of low precision, large error and high cost in traditional navigation methods, while autonomous landing methods with higher accuracy and smaller error are required in plant protection, logistics, military and other fields, the combination of image processing technology 18 and UAV technology has become a new trend.In the field of UAV landing technology, there are relatively complete schemes for static landing sites, and the technology is also becoming mature [19][20][21] .In 2020, Yang et al. 22 designed a machine vision system to assist the automatic landing of UAV and detect the landing site on the horizontal ground.In 2021, Lin et al. 23 realized the hovering and landing of the UAV on the mobile platform by combining the artificial ground identification April Tag with the visual guidance and tracking algorithm of the UAV.In the UAV landing scene, the selection of landing area sign image is very important.QR codes are most commonly used in drone landing areas.QR codes have the characteristics of high data storage capacity, strong fault tolerance, multi-angle high-speed recognition, etc., and have been extensively studied by relevant workers in recent years [24][25][26] .However, in the field of UAV landing, the landing point identification image is highly likely to be cracked by eavesdropping drones, thus occupying the landing area of the correct receiver.
Based on this, this paper proposes a double camouflage encryption method of QR code based on the UAV landing scenario.The QR code image is taken as the original target (the image to be encrypted), the encrypted image is encoded according to the principle of sequential coding, and the position of each pixel before sequential coding is taken as the index matrix (private key 1) to complete the first-level encryption; Select the carrier image, hide the first-level encrypted image into the carrier image according to the SURF matching principle (private key 2), obtain the camouflage image, and complete the camouflage encryption.According to the ghost imaging algorithm, the camouflage image is modulated by the preset Hadamard matrix modulation mode (public key), and the ciphertext is obtained.The UAV receives ciphertext information through the detector, for non-users, the correct QR code image cannot be decrypted through the error key.Even if the eavesdropper gets the public key information, it can only decrypt the camouflage image, so it cannot land.For our users, after receiving the ciphertext, first decrypt the camouflage image according to the public key, then decrypt the carrier image and the first-level encrypted image according to the private key 2, and finally use the private key 1 for the final decryption of the first-level encrypted image to get the correct QR code image, so as to land.The feasibility and anti-noise attack performance of the algorithm are analyzed, and the encryption method can decrypt the image well and resist some noise attacks from the outside world, so it also has a high security.

Theoretical basis QR code
Two-dimensional code is a graphic distributed in two-dimensional space according to specific rules, which contains a number of information.The information is converted into the two-dimensional code format by encoding, and the two-dimensional code can be decoded to restore the contained information.There are many types of two-dimensional code, and in the UAV landing scenario, the most commonly used is QR code 27 .QR code is short for quick response and belongs to matrix 2D barcode 28 .The QR code is a square array, which is composed of a coding area and functional graphics including delimiters, positioning graphics, correction graphics and image finding graphics.Among them, functional graphics are not available for data encoding.The symbol is surrounded by a blank area, which has no actual coding and functional function.The QR code structure is shown in Fig. 1.QR code has three characteristics: high data storage; Strong fault tolerance; Multi-angle high-speed recognition.There is a unique position detection graph on the three corners of the QR code to determine the specific position, direction and size of the QR code, so that the QR code has 360° rapid all-round reading ability.

The principle of QR code encryption based on ghost imaging
The specific process of QR code encryption based on ghost imaging is shown in Fig. 2a.The encrypter wants to transmit the encrypted QR code information to the decrypter.A series of random phase information ϕ i (x, y)(i = 1, 2, • • • , N) is introduced into SLM by using the ghost imaging experimental device diagram shown in Fig. 2b.The phase value is evenly distributed between [0, 2π ] .The light field I i x, y generated by modula- tion is irradiated onto the object image, and the transmitted or reflected light is collected by the bucket detector.
Here the QR code image is used as the plaintext object.The operation is repeated N times for N different phase information, and the obtained N bucket detector value B i is transmitted to the decrypter through the public channel as the ciphertext.The phase information ϕ i x, y (N × N) is converted into a one-dimensional vector as a key ϕ 1 × N 2 and transmitted to the decrypter through secure channel.Whenever a phase message ϕ i x, y is loaded in SLM, the bucket detector obtains a detector value B i .After receiving the transmitted ciphertext and key, the decrypter calculates the corresponding light field information I i x, y according to the Fresnel diffraction theorem for each phase information in the key: h z x, y is the Fresnel diffraction function propagated over a distance z, and ⊗ represents the convolution opera- tion.According to the obtained light field information and ciphertext, the decrypter performs correlation calculation to obtain the plaintext information.The decryption process calculation formula is as follows: B represents the average light intensity value and N represents the acquisition frequency.

Double camouflage encryption method of QR code based on UAV landing scenario
This paper proposes a double camouflage encryption method of QR code based on the UAV landing scenario, the principle of which is shown in Fig. 3.In this scheme, the QR code image needed for UAV landing is first double camouflage encrypted by private key and carrier image, and then modulated by public key according to (1)  the principle of ghost imaging to obtain ciphertext.After receiving the ciphertext, the receiver first decrypts the camouflage image according to the public key, and then decrypts the QR code image using the private key.The specific process includes two stages: encryption stage and decryption stage.

Encryption stage
(1) Taking the QR code image as the original target (image to be encrypted), the encrypted image is first encoded according to the sequential coding principle, which is first-level encryption, and the position of each pixel before the sequential encoding is used as the index matrix, that is, the private key 1.Since the image size of the QR code used in the experiment is 64 × 64 , the matrix form of this private key is . Where, QR(i, j) represents the corresponding position of each pixel in the QR code image; (2) Select the carrier image, hide the first-level encrypted image into the carrier image according to the SURF matching principle, and obtain the camouflage image.This is second-level encryption, also known as camouflage encryption.This matching principle is used as the second-level key, namely the private key 2; (3) The camouflage image is modulated according to the preset modulation matrix mode to obtain ciphertext information.Here, a series of Hadamard matrices are used as the preset modulation mode, namely, the public key H , The process of generating the public key is Where, Decryption stage (4) The receiver (UAV) receives the ciphertext image information through the detector.For ordinary users, under normal circumstances, it will not land if it recognizes the landing area that is not its own.Even if it is forced to decrypt, the correct QR code image cannot be decrypted through the wrong key, so it cannot land; (5) For enemy users (eavesdroppers), the purpose is to crack the encryption system and get the correct key information.However, in this encryption scheme, even if the eavesdrover gets the public key information, it can only decrypt the camouflage image according to the ciphertext, and without the correct private key, it still cannot decrypt the position of the QR code, so it cannot land.(6) For our users, after receiving the ciphertext information, first decrypt the camouflage image according to the public key, then decrypt the first-level encrypted image according to the private key 2, and then use the index matrix for the final decryption of the first-level encrypted image, get the correct QR code image, and finally land.www.nature.com/scientificreports/ the condition of incomplete sampling rates of the ghost imaging, as long as the error correction ability of the QR code is not exceeded, the error correction algorithms can recover data to a certain extent.

Anti-noise attack
Noise attack is inevitable in the process of information transmission, and noise will affect the image quality and destroy the image information transmission.Here, pepper and salt noise (noise intensity 0.01, 0.02 and 0.04, respectively) is selected to simulate the attack.Objective evaluation index structure similarity (SSIM) and bit error rate (BER) are used to evaluate the anti-noise performance of the scheme.Structural similarity (SSIM) is a method to measure the similarity between the reconstructed image and the ideal image, which is consistent with the subjective perception of human eyes.The structure information is defined as brightness l, contrast c and structure attribute s.It is measured by mean µ x , µ y , standard deviation δ x , δ y and covariance δ xy .C 1 , C 2 , C 3 represents a small positive number.The calculation formula is: In the process of image information transmission, due to the existence of various factors, errors often occur, resulting in error codes.The Bit Error Rate (BER) is generally expressed in scientific notation, and the lower the BER, the better.The calculation formula is shown in Eq. ( 6): (5)  2 show the change of SSIM curve and numerical comparison of the decryption imaging results of QR code image at different sampling rates in the process of simulated noise attack.In Fig. 6, red represents the noise attack intensity of 0.01, green represents the noise attack intensity of 0.02, and blue represents the noise attack intensity of 0.04.It can be seen from the curve change trend that: (1) With the increase of the sampling rate, the SSIM value becomes larger and larger, that is, the decryption image quality becomes closer and closer to the ideal image; (2) Under a certain intensity noise attack, when the sampling rate is 75%, 85%, 95%, the SSIM value of the decryption effect of the reconstructed image can reach above 0.9, indicating that the quality of the reconstructed image can be guaranteed.
Figure 7 and Table 3 show the change of BER value curve of the decryption imaging results of QR code images under different sampling rates in the process of simulated noise attack.In Fig. 7, red represents the noise attack intensity of 0.01, green represents the noise attack intensity of 0.02, and blue represents the noise attack intensity of 0.04.It can be seen from the curve change trend that: (1) With the increase of sampling rate, the BER value becomes smaller and smaller, that is, the decrypted image quality becomes higher and higher; (2) Under a certain intensity noise attack, the decryption imaging based on the encryption scheme in this paper can still guarantee a small enough BER value, which proves that the scheme has a good anti-noise attack ability.

Conclusion
In the UAV landing scenario, the identification image of the landing point is very likely to be cracked by eavesdropping drones, so it is crucial to ensure the information security of the landing area and prevent it from being occupied by other users.Under normal circumstances, the landing area of the UAV is presented in QR code images, and the information security of the landing area can be ensured by using information encryption technology.In this paper, a double camouflage encryption method of QR code based on UAV landing scenario is proposed.The QR code image is taken as the original target, the encrypted image is encoded according to the sequential coding principle, and the first level encryption is completed, and the index matrix of the pixel before the sequential encoding is taken as the private key 1; Select the carrier image, and hide the first-level encrypted image into the carrier image according to the private key 2 to obtain the camouflage image and complete the camouflage encryption; According to the ghost imaging algorithm, the camouflage image is modulated by the preset Hadamard matrix modulation mode (public key), and the ciphertext is obtained.The drone receives the ciphertext information through the detector.For non-users, the correct QR code image cannot be decrypted through the error key.Even if the eavesdrover gets the public key information, it can only decrypt the camouflage image and cannot land.For our users, after receiving the ciphertext, first decrypt the camouflage image according to the public key, then decrypt the carrier image and the first-level encrypted image according to the private key

Figure 1 .
Figure 1.Diagram of QR code structure.

Figure 2 .
Figure 2. QR code encryption principle based on ghost imaging.

Figure 3 .
Figure 3. Double camouflage encryption principle of QR code in UAV landing scenario.

Figure 6 .
Figure 6.Changes of SSIM curves of QR code reconstruction under different intensity noise attacks.

Table 1 .
PSNR values of images decrypted by different algorithm at different sampling rates.Decrypted QR code images at different sampling rates.

Table 2 .
SSIM values reconstructed by QR code under different intensity noise attacks.Changes of BER curves of QR code reconstruction under different intensity noise attacks.

Table 3 .
BER values reconstructed by QR code under different intensity noise attacks.