首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 859 毫秒
1.
This study describes optical encryption based on joint transform correlator architectures using a binary phase difference key mask, designed by discrete sinc function interpolation. The key mask has the required properties of space-limited and phase-mostly spectrum for accurate image recovery. Gray-level image encryption and decryption performance measures are discussed as well.  相似文献   

2.
We propose a triple encrypted holographic memory containing a digital holographic system. The original image is encrypted using double random phase encryption and stored in a LiNbO3:Fe crystal with shift-multiplexing. Both the reference beams of the memory and the digital holographic system are random phase encoded. We theoretically and experimentally demonstrate the encryption and decryption of multiple images and the results show high quality and good fault tolerance. The total key length of this system is larger than 4.7×10^33.  相似文献   

3.
窦帅风  雷鸣  沈学举  林超 《应用光学》2016,37(5):693-699
为提高光学图像加密系统的安全性,利用双光楔联合菲涅耳变换相关器和矢量分解设计了一种非线性光学图像加密系统。通过矢量分解将原始图像分解为两个相位模板,其中一个相位模板f1(x)放置于双光楔联合菲涅耳变换相关器物窗口实现图像加密;携带另一相位模板f2(x)信息的光束与解密系统输出的携带f1(x)信息的光束相干叠加得到解密图像。数值模拟了加密系统的加、解密过程,对于灰度图像和二值图像,当光楔楔角为1.8°和相位模板f1(x)与密钥k(x)的中心间距为18 mm时,解密图像与原始图像的相关系数分别为0.812 7和0.810 9;分析了密钥模板相位分布错误对解密效果的影响,验证了加密方法的可行性。模拟分析表明,密钥k(x)的位置和光楔楔角作为附加的密钥参量,有效扩展了加密系统密钥空间,并能抵御唯密文攻击、已知明文攻击和选择明文攻击。  相似文献   

4.
An encrypted holographic scheme with a compact alignment system for a phase key is proposed. Alignment for a phase key is performed by a holographic correlator. A filter in the correlator system contains the phase information used for encryption. Thus, it can be used to check the authorization of the phase key. Owing to the shift-invariant property of the holographic correlator, the location of the correlation peak is highly related to the alignment of the phase key. Therefore, the phase key can be repositioned on the desired location by searching for the specific position of the correlation peak. With the help of the correlator, alignment of the phase key can be done in 1 min. Experimental results using a correlator system in support of our proposed idea are demonstrated as well.  相似文献   

5.
In some technological applications, optical systems that produce a high depth of focus and superresolving transversal responses are required. In this paper we present a pupil design consisting in a phase pupil with binary amplitude, that added to a conventional optical system, can accomplish these goals. The pupil function is characterized by a complex amplitude that consists basically in combining two annular lenses with different focal length. Meanwhile the central portion of the pupil has an amplitude equal to 0, the external portion is modulated with two quadratic phases each one covering an annular zone. One of the phases corresponds to a convergent lens and the other to a divergent lens. The effect on the incident wavefront is to redirect the light in front of and behind the best image plane (BIP) producing a widened focus. The evolution of the transverse gain for the extended focus is also studied. Experimental results are given, and they confirm the extended focus and the superresolving behavior of the proposed pupil function.  相似文献   

6.
Multiple image encryption using an aperture-modulated optical system   总被引:2,自引:0,他引:2  
A multiple image cryptosystem based on different apertures in an optical set-up under a holographic arrangement is proposed. The system is a security architecture that uses different pupil aperture mask in the encoding lens to encrypt different images. Based on this approach multiple encryption is achieved by changing the pupil aperture arrangement of the optical system among exposures. In addition to the classical speckle phase mask, the geometrical parameters characterizing the apertures are introduced to increase the system security. Even when an illegal user steals the speckle phase mask, the system cannot be broken into without the correct pupil geometrical parameters. The experimental set-up is based on a volume photorefractive BSO crystal as storing device. Information retrieval is done via a phase conjugation operation. We also have to stress that the multiple storage under this scheme, is only possible with the help of the aperture mask. Simulation and experimental results are further introduced to verify the proposed method.  相似文献   

7.
Optical color image encryption with redefined fractional Hartley transform   总被引:1,自引:0,他引:1  
Xinxin Li 《Optik》2010,121(7):673-3242
We propose a new method for color image encryption by wavelength multiplexing on the basis of two-dimensional (2-D) generalization of 1-D fractional Hartley transform that has been redefined recently in search of its inverse transform. A color image can be considered as three monochromatic images and then divided into three components and each component is encrypted independently with different wavelength corresponding to red, green or blue light. The system parameters of fractional Hartley transform and random phase masks are keys in the color image encryption and decryption. Only when all of these keys are correct, can the image be well decrypted. The optical realization is then proposed and computer simulations are also performed to confirm the possibility of the proposed method.  相似文献   

8.
为比较光学图像加密中随机模板的特性,分别利用随机相位模板和随机振幅模板对几种典型的光学图像加密系统进行了光学图像加密的数值模拟和加密效果分析。模拟结果表明,将随机振幅模板用于基于光学傅里叶变换的双随机模板图像加密系统时,原始图像和加密图像的相关系数大于0.5,不能有效加密原始图。但将其用于基于菲涅耳变换全息的光学图像加密系统时,原始图像和加密图像的相关系数趋于0,可获得与使用随机相位模板时非常接近的加密效果。  相似文献   

9.
Triple image encryption scheme in fractional Fourier transform domains   总被引:1,自引:0,他引:1  
We proposed a triple image encryption scheme by use of fractional Fourier transform. In this algorithm, an original image is encoded in amplitude part and other two images are encoded into phase information. The key of encryption algorithm is obtained from the difference between the third image and the output phase of transform. In general case, random phase encoding technology is not required in the proposed algorithm. Moreover, all information of images is preserved in theory when image are decrypted with correct key. The optical implementation of the algorithm is presented with an electro-optical hybrid structure. Numerical simulations have demonstrated the efficiency and the security of this algorithm. Based on this scheme a multiple image algorithm is expanded and designed.  相似文献   

10.
Through the one-dimensional analysis of the diffraction of a phase grating, we calculated the optical transfer function (OTF) of a phase grating. By a 0th-order approximation of the optical transfer function, we analyzed the feasibility of using it as a spatial frequency filter and obtained the structure of a grating for the optimum-filtering characteristics. The OTF of a phase grating as an optical low-pass filter is optimal when the incoming light is equally divided into three beams. The distance of those beams must be equal to the pixel size. The theoretical development was verified through an experiment. Received: 21 May 2001 / Revised version: 16 July 2001 / Published online: 15 October 2001  相似文献   

11.
We studied the characteristics of a two-dimensional grating optical low-pass filter (GOLF) theoretically and experimentally. The modulation transfer function (MTF) of an optical system that consists of a lens and a GOLF is theoretically derived by taking all orders of diffracted beams into consideration. The MTFs of a two-phase chess-board-type GOLF and a three-phase GOLF were calculated for various phase differences and compared with that of a birefringent low-pass filter (BLF). The three-phase GOLF with nine center beams of equal strength removes most moiré fringes, but the resolution degradation is severe compared to the BLF. The two-phase GOLF with a phase difference of 180°, which is similar to the BLF in term of beam distribution, has a medium characteristic somewhere between those of the three-phase GOLF and the BLF. Samples of two GOLFs are made and experimented on by attaching them to a digital camera. The experimental result coincides with the theoretical development. Received: 31 October 2001 / Revised version: 4 March 2002 / Published online: 2 May 2002  相似文献   

12.
We propose a method for image encryption by multiple-step random phase encoding with an undercover multiplexing operation. The true image is stored in a multiple record we call encodegram; and then we can reconstruct it by the use of the appropriate random phase masks and a retrieval protocol. To increase the security of the true hidden image and confuse unauthorized receivers, we add to the encodegram an encoded fake image with different content. This fake image has only a small effect on the retrieval of the true hidden image, owing to the specific property of this protocol. In the decryption step, we can reveal the true image by applying the inverse protocol to two cyphertexts, one the encodegram containing the true image along with the fake image; and the other helping to get the random phase key to achieve the true image. Computer simulations verify the validity of this method for image encryption. Digital implementation of the method makes it particularly suitable for the remote transmission of information.  相似文献   

13.
A novel double-image encryption algorithm is proposed, which can simultaneously encrypt two images into a single one as the amplitude of gyrator transform with two different groups of angles. The two original images can be retrieved independently by gyrator transforms with two different groups of angles, one common phase mask, and two different private phase masks. The proposed approach can enlarge the key space, achieve faster convergence in iterative process, and avoid cross-talk between two images in reconstruction. Numerical simulations are presented to verify its validity and efficiency.  相似文献   

14.
We analyse the diffraction result of optical field after Cosine zone plate, and theoretically deduce its transform matrix. Under some conditions, its diffraction distribution is a mixture of fractional Fourier spectra. Then we use Cosine zone plate and its diffraction result to image encryption. Possible optical image encryption and decryption implementations are proposed, and some numerical simulation results are also provided.  相似文献   

15.
In order to increase data security transmission we propose a multichanneled puzzle-like encryption method. The basic principle relies on the input information decomposition, in the same way as the pieces of a puzzle. Each decomposed part of the input object is encrypted separately in a 4f double random phase mask architecture, by setting the optical parameters in a determined status. Each parameter set defines a channel. In order to retrieve the whole information it is necessary to properly decrypt and compose all channels. Computer simulations that confirm our proposal are presented.  相似文献   

16.
孙杰 《光学技术》2017,43(3):279-283
为了扩展双图像光学加密算法的密钥空间,克服双随机相位加密系统中随机相位掩模作为密钥难于存储、传输和重构的问题,突破传统图像加密的研究思路,提出了一种基于多混沌系统的双图像加密算法,构造了光学加密系统。系统增加混沌系统参数作为密钥,利用混沌加密密钥空间大和图像置乱隐藏性好的特点,构建基于Logistic混沌映射的图像置乱算法,利用Kent混沌映射生成的伪随机序列构造出一对随机相位掩模,分别放置在分数傅里叶变换光学装置的两端,图像经加密系统变换后得到密文。数值仿真结果表明,算法的密钥敏感性极高,能够有效地对抗统计攻击,具有较高的安全性。  相似文献   

17.
For the optical spectrum region, we describe a novel phase-coded aperture imaging system that can be used in a computational imaging camera. The optical design includes a phase-only screen followed by a detector array. A specific diffraction pattern forms at the detector array when the wavefront from a point source object passes through the phase screen. Since diffraction effects cannot be ignored in the optical regime, an iterative phase retrieval method is used to calculate the phase coded screen. Correlation type processing can be applied for the image recovery. Computer simulation results are presented to illustrate the excellent imaging performance of this camera.  相似文献   

18.
基于gyrator变换和矢量分解的非对称图像加密方法   总被引:1,自引:0,他引:1       下载免费PDF全文
姚丽莉  袁操今  强俊杰  冯少彤  聂守平 《物理学报》2016,65(21):214203-214203
本文结合矢量分解和gyrator变换的数学实现得到了一种新的非对称图像加密算法,它将待加密图像先通过矢量分解加密到两块纯相位板中,然后利用从gyrator变换的数学实现中推导出来的加密算法加密其中一块相位板,获得最终的实值密文.另一块相位板作为解密密钥.算法的解密密钥不同于加密密钥,实现了非对称加密,加密过程中产生的两个私钥增大了算法的安全性.数值模拟结果验证了该算法的可行性和有效性.  相似文献   

19.
Variable resolution with pupil masks   总被引:1,自引:0,他引:1  
There are many applications in which pupil-plane masks are useful for point-spread-function (PSF) apodization or superresolution. A limitation of this technique is that once a mask is fabricated, the corresponding PSF characteristics are fixed. To overcome this drawback we introduce a technique for easily varying the performance of pupil-plane masks. This technique is based on the modification of the transmittance of each of the mask zones and, thus, can be implemented using a spatial light modulator or linear polarizers, e.g., we apply the technique to binary phase-only masks and we check that the figures of merit that characterize the PSF can be easily controlled. We study different configurations that allow us to modify resolution or peak intensity in a continuous way and we derive analytical expressions for these figures of merit.  相似文献   

20.
双随机相位图像加密的实值编码研究   总被引:7,自引:5,他引:2  
李榕  李萍 《光子学报》2005,34(6):952-955
提出了一种基于双随机相位的图像实值编码方法,该方法可应用于光学图像加密.要编码的纯相位图像分别在空间域和频域加入随机相位掩膜,其中在频域将编码范围扩大4倍,经过光学系统的变换,将生成的图像取实部作为编码图像.实值编码的图像利用与编码过程类似的方法进行解码,可以准确地重建原图像.该编译码方法简单,编码图像是一个近似随机噪声的实值图像,便于数字图像的传输与输出.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号