首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Applications of gyrator transform for image processing   总被引:1,自引:0,他引:1  
Gyrator transform is a new tool for manipulation of two-dimensional signals such as images or laser beam profiles. Here we demonstrate various applications of the gyrator transform for image processing. Several aspects such as noise reduction, filtering and encryption in the gyrator domains are discussed. These operations can be performed by numerical calculations or by an appropriate optical set up.  相似文献   

2.
A novel information security system based on multiple-phase retrieval by an iterative gyrator transform algorithm is proposed. In this method, a series of phase masks are designed and located in the input plane and the gyrator planes, and the phase distributions of all the masks are adjusted simultaneously in each iteration. It can achieve fast convergence and high quality of the recovered image and can provide a higher degree of freedom in key space with more parameters as supplementary keys. Furthermore, the security level of this method is greatly improved by the sensitivity of recovered images with the angles of gyrator transform. Numerical simulations are presented to verify its validity and efficiency.  相似文献   

3.
A novel optical image encryption method is proposed, based on gyrator transform and phase-shifting interferometry. The input two-dimensional image to be encrypted is gyrator transformed two times, and two random phase masks are placed at the input plane and the output plane of the first gyrator transform. Two-step phase-shifting interferometry is used to record the digital holograms of the input image encrypted by use of double-random phase encoding technique in gyrator transform domain. The rotation angles of gyrator transform, the random phase mask in the gyrator plane and the arbitrary phase shift used for recording form the keys for decryption of the input image. Numerical simulations are presented to verify its validity and efficiency.  相似文献   

4.
Optical color image encryption with redefined fractional Hartley transform   总被引:1,自引:0,他引:1  
Xinxin Li 《Optik》2010,121(7):673-3242
We propose a new method for color image encryption by wavelength multiplexing on the basis of two-dimensional (2-D) generalization of 1-D fractional Hartley transform that has been redefined recently in search of its inverse transform. A color image can be considered as three monochromatic images and then divided into three components and each component is encrypted independently with different wavelength corresponding to red, green or blue light. The system parameters of fractional Hartley transform and random phase masks are keys in the color image encryption and decryption. Only when all of these keys are correct, can the image be well decrypted. The optical realization is then proposed and computer simulations are also performed to confirm the possibility of the proposed method.  相似文献   

5.
Fast algorithm of discrete gyrator transform based on convolution operation   总被引:2,自引:0,他引:2  
The expression of gyrator transform (GT) is rewritten by using convolution operation, from which GT can be composed of phase-only filtering, Fourier transform and inverse Fourier transform. Therefore, fast Fourier transform (FFT) algorithm can be introduced into the calculation of convolution format of GT in the discrete case. Some simulations are presented in order to demonstrate the validity of the algorithm.  相似文献   

6.
A novel digital image watermarking system based on an iterative phase retrieval algorithm and sine-cosine modulation in the discrete-cosine-transform (DCT) domain is proposed. The original hidden image is first encrypted into two phase masks. Then the cosine and sine functions of one of the phase masks are introduced as a watermark to be embedded into an enlarged host image in the DCT domain. By extracting the watermark of the enlarged superposed image and decryption we can retrieve the hidden image. The feasibility of this method and its robustness against some attacks, such as occlusion, noise attacks, quantization have been verified by computer simulations. This approach can avoid the cross-talk noise due to direct information superposition and enhance the imperceptibility of hidden data.  相似文献   

7.
Fully-phase image encryption is considered more secure as compared to an amplitude image encryption. In the present paper, an encryption scheme is proposed for double phase-images. The phase-images are bonded with random phase masks and then gyrator transformed. The two resulting images are then added and subtracted to give intermediate images which are bonded with a structured phase mask (SPM) based on devil’s vortex Fresnel lens (DVFL) in the frequency plane. Thereafter, the images are once again transformed using a gyrator transform (GT) to give the corresponding encrypted images. The use of a structured phase mask enhances the key space for encryption and also overcomes the problem of axis alignment associated with an optical set-up. The decryption process is the reverse of encryption. The validity of the proposed scheme is established from the computer simulation results using MATLAB 7.1 platform. The performance of the scheme is evaluated in terms of mean-squared-error (MSE) between the input-, and the decrypted images. In addition, the sensitivity to encryption keys such as SPM parameters, and transform angles of GT is investigated. The technique is likely to provide enhanced security in view of the increased number of encryption parameters. Robustness of the system against occlusion and noise attacks has also been investigated.  相似文献   

8.
Double image encryption based on iterative fractional Fourier transform   总被引:1,自引:0,他引:1  
We present an image encryption algorithm to simultaneously encrypt two images into a single one as the amplitudes of fractional Fourier transform with different orders. From the encrypted image we can get two original images independently by fractional Fourier transforms with two different fractional orders. This algorithm can be independent of additional random phases as the encryption/decryption keys. Numerical results are given to analyze the capability of this proposed method. A possible extension to multi-image encryption with a fractional order multiplexing scheme has also been given.  相似文献   

9.
We propose a method for image encryption by multiple-step random phase encoding with an undercover multiplexing operation. The true image is stored in a multiple record we call encodegram; and then we can reconstruct it by the use of the appropriate random phase masks and a retrieval protocol. To increase the security of the true hidden image and confuse unauthorized receivers, we add to the encodegram an encoded fake image with different content. This fake image has only a small effect on the retrieval of the true hidden image, owing to the specific property of this protocol. In the decryption step, we can reveal the true image by applying the inverse protocol to two cyphertexts, one the encodegram containing the true image along with the fake image; and the other helping to get the random phase key to achieve the true image. Computer simulations verify the validity of this method for image encryption. Digital implementation of the method makes it particularly suitable for the remote transmission of information.  相似文献   

10.
Noise reduction is one of the most exciting problems in electronic speckle pattern interferometry. We present a new anisotropic partial differential equation noise-reduction algorithm based on fringe orientation for interferometric fringe patterns. The proposed equation performs diffusion along the two directions of fringe gradient and isophote line, which are extracted accurately according to fringe feature. By restriction of diffusion in the gradient direction of fringe patterns, this method can provide optimal results in denoising but does not destroy fringe edges. The experimental results show that this technique is more capable of significantly improving the quality of the fringe patterns than the classical anisotropic diffusion equation proposed by Perona and Malik. Based on our filtered fringe patterns, the phase map obtained by phase-shifting technique can be extracted more accurately. It is an effective pre-processing method for electronic speckle pattern interferometry.  相似文献   

11.
12.
Based on 1-D fractional Fourier transform, we proposed an image encryption algorithm in order to hide two images simultaneously. When the fractional order is closed to 1, most energy in frequency domain is centralized in the center part of spectrum. The image can be recovered acceptable by using a half of spectrum, which locates in the middle part at x-direction or y-direction. Cutting operation is employed in order to combine two spectra. Double random phase encoding is employed for image encryption. The corresponding numerical simulations are performed to demonstrate the validity and efficiency of the algorithm.  相似文献   

13.
A novel double-image encryption algorithm is proposed by using chaos-based local pixel scrambling technique and gyrator transform. Two original images are first regarded as the amplitude and phase of a complex function. Arnold transform is used to scramble pixels at a local area of the complex function, where the position of the scrambled area and the Arnold transform frequency are generated by the standard map and logistic map respectively. Then the changed complex function is converted by gyrator transform. The two operations mentioned will be implemented iteratively. The system parameters in local pixel scrambling and gyrator transform serve as the keys of this encryption algorithm. Numerical simulation has been performed to test the validity and the security of the proposed encryption algorithm.  相似文献   

14.
In this work, a numerical study on the pattern correlation using wavelet filters is reported. A comparative study of the correlation using the Mexican hat and Coiflets filters is presented. A Coiflet filter acts not only as a band-pass filter but as a high-pass or low-pass filter. Therefore, unlike the Mexican hat-based filter which acts only as a pass-band filter, the Coiflet-based filters allow selecting horizontal, vertical or diagonals details of the original image. Each one of the original images can be discomposed in an average image and several detail images at different levels of multiresolution. We study the numerical correlation between binary patterns using the Mexican hat filter and the first and second multiresolution level obtained by Coiflet filtering. Additionally, an analysis about the noise immunity for the Mexican hat and Coiflet filters is realized. The results show that Coiflet filters are better to identify special characteristics but perform the worst when they are used with noisy images. On the other side, the Mexican filter presents a better noise immunity but performs the worst when is used to compare special characteristics.  相似文献   

15.
A novel multiple information encryption by user-image-based gyrator transform hologram is proposed. In encryption process, each channel of the user image is phase encoded, modulated by random phase function and then gyrator transformed to get the gyrator spectrum of user image. Subsequently, each channel of the secret image is normalized, phase encoded, multiplied by modulated user image, and then gyrator transformed to obtain the gyrator spectrum of secret image. The encrypted digital hologram is recorded by the interference between the gyrator spectrum of user image and the spherical wave function. Similarly, the digital hologram for decryption is recorded by the interference between the gyrator spectrum of secret image and the spherical wave function. The multiple encrypted digital holograms are multiplexed into a final encoded hologram and the corresponding digital holograms for decryption are multiplexed into a final hologram for decryption. The wavelength and radius of the spherical wave function, and angle of gyrator transform are all essential keys for decryption. The proposed system has two main features. First, the encrypted hologram has no information about secret image. Second, the hologram for decryption used as identification key. Consequently the two marked security layers of information protection are achieved. The proposal can be realized by optoelectronic system. Numerical simulation results demonstrate the feasibility and security of the proposed technique.  相似文献   

16.
We present a new way to demodulate complicated fringe patterns containing closed fringes using a genetic algorithm (GA). The entire fringe pattern is divided into a set of partially overlapping smaller sub-image windows. Each of these has a lower dimensionality and as a consequence is faster and can be demodulated more reliably. The demodulation process proceeds row-by-row way passing from one sub-image in a neighborhood until the whole interferogram is processed. The modulating phase of each sub-image is modeled as a parametric analytic function whose parameters are optimized using a GA. The technique is demonstrated demodulating some normalized fringe patterns that have two main difficulties: closed fringes within the interferogram and regions of under-sampled fringes. These fringe images cannot be demodulated by techniques such as the regularized phase tracker (RPT).  相似文献   

17.
By means of manipulating the phase information of the object beam in an off-axis digital holographic setup, we show that it is possible to fully eliminate the zero-order diffraction (ZOD) from numerically reconstructed holograms. Two different approaches are presented. In the first method, we introduce a ground glass on the object path beam to provide a random phase illumination. The subtraction between two holograms recorded with different positions of the ground glass yields a ZOD free hologram. In the second approach, a piece of window glass inserted on the path of the object beam produces a constant phase shift. The subtraction of two holograms, one recorded with and one without window glass generates a new hologram whose numerical reconstruction is ZOD free. Theoretical models and experimental results are shown to validate our proposals. They show that the proposed methods totally remove the ZOD without ruining the object information.  相似文献   

18.
Triple image encryption scheme in fractional Fourier transform domains   总被引:1,自引:0,他引:1  
We proposed a triple image encryption scheme by use of fractional Fourier transform. In this algorithm, an original image is encoded in amplitude part and other two images are encoded into phase information. The key of encryption algorithm is obtained from the difference between the third image and the output phase of transform. In general case, random phase encoding technology is not required in the proposed algorithm. Moreover, all information of images is preserved in theory when image are decrypted with correct key. The optical implementation of the algorithm is presented with an electro-optical hybrid structure. Numerical simulations have demonstrated the efficiency and the security of this algorithm. Based on this scheme a multiple image algorithm is expanded and designed.  相似文献   

19.
We propose a novel ghost imaging scheme which is especially served to a pure phase object. A spatially incoherent beam is mixed with a coherent beam of the same frequency field by a beamsplitter. Then we perform the ghost imaging scheme using the mixed beam. Our theoretical result shows that this approach is capable of reconstructing a pure phase object in joint-intensity measurement. The visibility of the images is also analysed for two pure phase objects, an optical wedge and a phase grating.  相似文献   

20.
Narendra Singh 《Optik》2010,121(15):1427-1437
We propose a new method for digital image watermarking using gyrator transform and chaotic maps. Four chaotic maps have been used in the proposed technique. The four chaotic maps that have been used are the logistic map, the tent map, the Kaplan-Yorke map and the Ikeda map. These chaotic maps are used to generate the random phase masks and these random phase masks are known as chaotic random phase masks. A new technique has been proposed to generate the single chaotic random phase mask by using two chaotic maps together with different seed values. The watermark encoding method in the proposed technique is based on the double random phase encoding method. The gyrator transform and two chaotic random phase masks are used to encode the input image. The mean square error, the peak signal-to-noise ratio and the bit error rate have been calculated. Robustness of the proposed technique has been evaluated in terms of the chaotic maps, the number of the chaotic maps used to generate the CRPM, the rotation angle of the gyrator transform and the seed values of the chaotic random phase masks. Optical implementation of the technique has been proposed. The computer simulations are presented to verify the validity of the proposed technique.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号