首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.
相位恢复算法用于分区复用多图像加密的研究   总被引:1,自引:0,他引:1  
衍射投影效应明显降低了基于双相位编码的多图像加密系统的性能.提出分区复用技术来解决这一问题.待加密的多个图像被放置于各个输出平面的不同区域,于是相邻两个输出平面的秘密图像区域将错落开来,因而有效抑制了衍射投影所产生的噪声.在此基础上,重点研究了用于该系统的相位恢复算法.在完整的顺序迭代之后,对解密质量最差的图像进行逐一补偿,从而寻找到了更加符合多幅秘密图像客观特点的子循环次序.根据这一次序,用完整迭代后附加调节性迭代的方法或者完全更换迭代次序的方法,都能够在保留基本算法快速收敛优势的前提下,使多幅解密图像质量以及系统地复用容量得以整体提高.  相似文献   

2.
提出了一种基于迭代振幅-相位恢复算法和非线性双随机相位编码的图像加密方法。该方法利用两个公开密钥和一幅"假图像"在非线性双随机相位加密系统中生成密文,接着利用迭代非线性双随机相位编码生成两个私有密钥。待加密图像和密文作为迭代加密方法中的两个限定值。解密过程则可以在经典的基于4f系统的线性的光学双随机相位编码系统中完成。该加密方法具有迭代收敛速度快、安全性高的优点。迭代该图像加密方法能够抵御最近提出的基于改进的振幅-相位恢复算法的攻击。理论分析和仿真实验都证明了此方法的有效性和可靠性。  相似文献   

3.
一种基于随机相位板复用的光学多二值图像加密系统   总被引:1,自引:0,他引:1  
利用随机相位板复用提出了一种基于干涉原理的光学多二值图像加密系统。该系统加密过程采用数字方法,解密过程既可以采用数字方法也可以采用光学方法。利用该方法可将多幅图像信息解析地隐藏于两个纯相位板中。解密时,通过分束镜将两个随机相位板的衍射场进行相干叠加形成干涉场,利用专用密钥对此干涉场进行调制,即可在输出平面上恢复出与该专用密钥对应的原始图像,此图像可以采用CCD等图像传感器件直接记录。该方法加密过程无需迭代,非常省时,且解密系统易于物理实现。利用相关系数评估了系统的加密容量,计算机模拟结果证实了该方法的有效性。  相似文献   

4.
双随机相位加密中相息图的优化设计   总被引:2,自引:0,他引:2       下载免费PDF全文
杨晓苹  翟宏琛 《物理学报》2005,54(4):1578-1582
采用基于记忆的模拟退火法对双随机相位加密中的相息图进行优化设计,并用该法分别对一 个二元图像和一个灰度图像进行了模拟实验.实验结果表明,在不增大设计冗余度的情况下 ,运用该方法可降低相息图和密钥的相位量化带来的误差,得到与原加密图像质量几乎相同 的解密图像. 关键词: 基于记忆的模拟退火法 双随机相位加密 优化设计  相似文献   

5.
在传统的双随机相位光学加密系统的基础上,提出一种新的单强度记录光学加密技术。在加密时,将原始图像置于4-f系统的输入平面上进行双随机相位光学加密,利用CCD等感光器件记录输出平面上的光强分布作为密文,该光学加密过程只需一次曝光,在解密时,利用相位恢复算法进行迭代计算就可以由密文恢复原始图像。由于解密过程采用数字方式,因此可以在解密过程中引入各种数字图像处理技术来抑制散斑噪声,进一步改善解密图像质量。通过一系列仿真实验,证明该光学加密系统可以实现对二值图像和灰度图像的光学加密,并且能够很好地抵御已知明文攻击、选择明文攻击等方法的攻击。理论分析和计算机仿真表明,该光学加密技术系统结构简单,实现方便,并且不易受到各种攻击,安全性较高。  相似文献   

6.
基于级联相位恢复算法的光学图像加密   总被引:12,自引:4,他引:8  
于斌  彭翔 《光学学报》2005,25(7):81-884
在虚拟光学数据加密理论模型的基础上,提出了一种光学图像加密的可视化密码构造算法。该加密算法基于自由空间传播的光学系统,利用级联迭代角谱相位恢复算法把待加密图像分别编码到两块相位模板之中,从而实现图像的加密。该加密技术不但可通过同时调整两块相位模板的相位分布的搜索策略来扩大搜索空间,提高安全强度,而且扩大了系统密钥空间,使系统获得更高的安全性,且能通过简单的数值运算或光学实验装置得到质量非常高的解密图像,还从理论上分析了该算法的时间复杂度。计算机模拟结果表明,该加密算法的收敛速度快,能迅速找到非常好的近似解,解密图像质量高且系统安全性良好。  相似文献   

7.
基于相息图迭代的随机相位加密   总被引:5,自引:2,他引:3       下载免费PDF全文
刘福民  翟宏琛  杨晓苹 《物理学报》2003,52(10):2462-2465
提出了一种将随机相位加密和相位恢复算法中的求解附加相位分布分二步实施的加密方法. 由于该方法的实质是通过在随机谱和相息图之间进行相位恢复迭代以确定相息图和密钥的相 位分布,因而能够减小图像的解密误差.在相息图相位离散化的迭代过程中,采用增大设计 冗余度的方法,降低了由相位离散化所带来的解密误差.最后,通过计算机模拟实验验证了 该方法在减小图像解密误差方面的有效性. 关键词: 随机相位 光学图像加密 相息图 二元光学 离散化误差 相位恢复算法  相似文献   

8.
《光学技术》2021,47(2):223-230
提出了一种基于深度学习的光学水印重建方法,通过双随机相位加密的方法实现水印的加密,并将加密图像嵌入到宿主图像中,然后利用原水印图像与含水印宿主图像之间的物理关系,训练改进的神经网络FC-DenseNets-BC,得到可以重建原水印图像的网络模型。在传统光学水印技术中,含水印宿主图像质量和解密水印图像质量依赖于嵌入强度的选取(当嵌入强度较大时,含水印宿主图像质量低,解密水印图像质量高;当嵌入强度较小时,含水印宿主图像质量高,解密水印图像质量低),然而使用深度学习重建水印图像可以摆脱该依赖关系。研究结果表明,在嵌入强度低至0.05的情况下,所提方法仍能够重建出峰值信噪比在35dB以上的高质量水印图像,且具有一定的泛化性、安全性和抵抗噪声、剪切的能力。并进一步通过光学系统实验验证了方法的可行性和高效性。  相似文献   

9.
提出了一种基于双随机相位编码技术的非线性双图像加密方法,并分析了其安全性。在该方法中,加密过程和解密过程以及加密密钥和解密密钥均不相同。加密过程具有非线性,解密过程则是线性的。将两幅待加密图像复合为复振幅图像,并利用双随机相位编码技术和切相傅里叶变换进行加密,加密过程中生成两个解密密钥,解密过程则在经典的基于4f系统的双随机相位编码系统中完成。相比经典的双随机相位加密技术和基于切相傅里叶变换的单图像加密技术,该加密方法的安全性更高,它能够抵御最近提出的基于两步振幅相位恢复算法的特定攻击。理论分析和仿真实验结果都证明了此加密方法的可行性和安全性。  相似文献   

10.
纯相位型计算全息图舍弃全息面上的振幅信息,降低了全息显示的图像质量.迭代法通过多次正、逆向的波前传播计算,优化了纯相位型计算全息图的相位轮廓,提升了全息再现的图像质量.然而,传统迭代法可能存在迭代发散、收敛速度偏慢以及再现质量受限等问题.本文提出了一种基于角谱传播模型的自适应混合约束迭代算法,通过在迭代中加入自适应的反馈机制和频带约束策略,增加了迭代优化的自由度,提升了迭代的收敛性和全息再现的图像质量.仿真和实验结果表明,提出的算法能够在较短的计算时间内获得更高重建质量的纯相位型计算全息图,对于高质量的全息显示具有重要应用价值.  相似文献   

11.
Narendra Singh 《Optik》2010,121(15):1427-1437
We propose a new method for digital image watermarking using gyrator transform and chaotic maps. Four chaotic maps have been used in the proposed technique. The four chaotic maps that have been used are the logistic map, the tent map, the Kaplan-Yorke map and the Ikeda map. These chaotic maps are used to generate the random phase masks and these random phase masks are known as chaotic random phase masks. A new technique has been proposed to generate the single chaotic random phase mask by using two chaotic maps together with different seed values. The watermark encoding method in the proposed technique is based on the double random phase encoding method. The gyrator transform and two chaotic random phase masks are used to encode the input image. The mean square error, the peak signal-to-noise ratio and the bit error rate have been calculated. Robustness of the proposed technique has been evaluated in terms of the chaotic maps, the number of the chaotic maps used to generate the CRPM, the rotation angle of the gyrator transform and the seed values of the chaotic random phase masks. Optical implementation of the technique has been proposed. The computer simulations are presented to verify the validity of the proposed technique.  相似文献   

12.
We propose a new method for image encryption, using gyrator transform and chaos theory. Random phase masks are generated using chaos functions and are called as chaotic random phase masks. In the proposed technique, the image is encrypted using gyrator transform and two chaotic random phase masks. Three types of chaos functions have been used to generate the chaotic random phase masks. These chaos functions are the logistic map, the tent map and the Kaplan-Yorke map. The computer simulations are presented to verify the validity of the proposed technique. The mean square errors have been calculated. The robustness of the proposed technique to blind decryption in terms of rotation angle and the seed values of the chaotic random phase mask have been evaluated. The optical implementation of the encryption and the decryption technique has been proposed.  相似文献   

13.
A new method for image encryption based on optical coherent superposition and basic vector operations is proposed in this paper. In this encryption, the original image can be directly separated into two phase masks (PMs). One is a random phase mask (RPM) and the other is a modulation of the RPM by the original image. The mathematical calculation for obtaining the two PMs is quite simple and direct resulting from the simple principle of optical coherent superposition. The arbitrarily selected RPM can be treated as the encrypted result while the PM can be taken as the key for decryption. With this technique, the same encrypted result can be obtained for different images with the same size while the keys for decryption are different. The encryption can be performed digitally and the decryption can be performed optically or digitally. The security of the proposed method is discussed and computer simulation results are presented to verify the validity of proposed method.  相似文献   

14.
We propose a multiple-image hiding scheme based on the amplitude- and phase-truncation approach, and phase retrieval iterative algorithm in the fractional Fourier domain. The proposed scheme offers multiple levels of security with asymmetric keys. Multiple input images multiplied with random phase masks are independently fractional Fourier transformed with different orders. The individual keys and common keys are generated by using phase and amplitude truncation of fractional spectrum. After using two fractional Fourier transform, the resultant encrypted image is hided in a host image with phase retrieval iterative algorithm. Using the correct universal keys, individual keys, and fractional orders, one can recover the original image successfully. Computer simulation results with four gray-scale images support the proposed method. To measure the validity of the scheme, we calculated the mean square error between the original and the decrypted images. In this scheme, the encryption process and generation of decryption keys are complicated and should be realized using computer. For decryption, an optoelectronic setup has been suggested.  相似文献   

15.
A novel digital image watermarking system based on an iterative phase retrieval algorithm and sine-cosine modulation in the discrete-cosine-transform (DCT) domain is proposed. The original hidden image is first encrypted into two phase masks. Then the cosine and sine functions of one of the phase masks are introduced as a watermark to be embedded into an enlarged host image in the DCT domain. By extracting the watermark of the enlarged superposed image and decryption we can retrieve the hidden image. The feasibility of this method and its robustness against some attacks, such as occlusion, noise attacks, quantization have been verified by computer simulations. This approach can avoid the cross-talk noise due to direct information superposition and enhance the imperceptibility of hidden data.  相似文献   

16.
W. Chen  C.J. Tay 《Optics Communications》2009,282(18):3680-691
In this paper, we propose a novel method to encrypt a color image based on Arnold transform (ART) and interference method. A color image is decomposed into three independent channels, i.e., red, green and blue, and each channel is then encrypted into two random phase masks based on the ART and interference method. Light sources with corresponding wavelengths are used to illuminate the retrieved phase-only masks during image decryption. The influence of security parameters on decrypted images is also analyzed. Numerical simulation results are presented to illustrate the feasibility and effectiveness of the proposed method.  相似文献   

17.
We proposed a method for optical image encryption on the basis of interference theory. An optical image can be produced by the interference of two beams passed two different masks. One of the masks can only modulate the phase of the beam and another can only modulate the amplitude of the beam. The encryption method is quite simple and does not need iterative algorithm. The results of simulation coincide with our method and demonstrate the feasibility of this method.  相似文献   

18.
A novel digital image synthesis and multiple-image encryption technique based on parameter multiplexing and phase-shifting interferometry by discrete Fresnel transform is proposed. Both the image synthesis and the multiple-image encryption can be realized with the same system arrangement and similar principles, while the former is achieved by using different sets of parameters (wavelength and distance) and the same set of random phase masks, and the latter with different sets of random phase masks. The feasibility of this method and its robustness against occlusion and additional noise attacks are verified by computer simulations. The encryption capacity of the system is analyzed in term of the correlation coefficient. This technique is simple with a lensless setup, highly secure, and particularly suitable for the image transmission via Internet.  相似文献   

19.
Narendra Singh 《Optik》2010,121(10):918-925
We propose a new method for image encryption using improper Hartley transform and chaos theory. Improper Hartley transform is a Hartley transform in which the phase between the two Fourier transforms is a fractional multiple of π/2. This fractional order is called fractional parameter and serves as a key in the image encryption and decryption process. Four types of chaos functions have been used. These functions are the logistic map, the tent map, the Kaplan-Yorke map and the Ikeda map. Random intensity masks have been generated using these chaotic functions and are called chaotic random intensity masks. The image is encrypted by using improper Hartley transform and two chaotic random intensity masks. The mean square error has been calculated. The robustness of the proposed technique in terms of blind decryption has been tested. The computer simulations are presented to verify the validity of the proposed technique.  相似文献   

20.
Optical color image encryption with redefined fractional Hartley transform   总被引:1,自引:0,他引:1  
Xinxin Li 《Optik》2010,121(7):673-3242
We propose a new method for color image encryption by wavelength multiplexing on the basis of two-dimensional (2-D) generalization of 1-D fractional Hartley transform that has been redefined recently in search of its inverse transform. A color image can be considered as three monochromatic images and then divided into three components and each component is encrypted independently with different wavelength corresponding to red, green or blue light. The system parameters of fractional Hartley transform and random phase masks are keys in the color image encryption and decryption. Only when all of these keys are correct, can the image be well decrypted. The optical realization is then proposed and computer simulations are also performed to confirm the possibility of the proposed method.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号