首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 492 毫秒
1.
陈家祯  郑子华  叶锋  连桂仁  许力 《物理学报》2017,66(23):234202-234202
提出了一种基于三维物体的多重菲涅耳计算全息水印方法.将水印信号作为虚拟三维物体的层面,首先结合分区复用层析法和菲涅耳双随机相位编码方法产生复噪声形式的水印信号;然后对水印信号的频谱作共轭对称处理实现实值编码;为减小对宿主全息图数字重建的影响,将水印信号的频谱设置于对宿主数字重建影响小的频谱非感兴趣区域;编码后的信号以一定强度叠加于宿主全息图,水印信号恢复无需原始宿主全息图信息,可实现盲提取,对宿主全息图重建像面的二维码可扫描识别.仿真测试结果表明,所提出的方法具有较好的透明性和稳健性,在宿主全息图遭受滤波、JPEG(联合图像专家小组)压缩、高斯噪声、剪切、旋转等各种攻击的情况下,不论对宿主还是水印信号仍具有良好的数字重建质量,对重建像面的二维码仍可扫描识别;而重建像面水印信号的无干扰可控重建后处理操作解决了不同层面水印信号之间的衍射干扰问题,提高了水印信号的重建质量.虚拟光学手段的应用丰富了水印信号设计方法并提升了算法的安全性.  相似文献   

2.
利用部分相干光理论对多色光源照明下光栅的菲涅耳衍射进行了理论分析,得到了适用于任意发光类型(脉冲或连续发光)的多色光源的衍射光强的一般公式,理论结果表明菲涅耳衍射区的平均衍射光强的形式只与光源的频谱分布有关,这对借助于连续发光光源来研究脉冲光源照明下光栅的塔尔博特效应以及用来确定脉冲光源的性能参量提供了有力的参考依据。此外,详细讨论了光源的频谱分布对光栅塔尔博特效应的影响并进行了相应的数值计算。实验中通过选用不同频率的激光分别照明光栅,拍摄到对应于不同频率的衍射光强分布图像,从而间接获得多色光同时照明光栅时总的衍射光强分布。实验结果表明,理论和实验符合较好。  相似文献   

3.
Banghe Zhu  Haifa Zhao  Shutian Liu 《Optik》2003,114(2):95-99
We propose a novel image encryption method that combines the pure intensity random encoding and the digital holography technique. A phase-shifting interferometer records both phase and amplitude information of a complex object with a CCD sensor array. The encryption is performed by placing two pure intensity random masks between the image to be encrypted and an intensity recording device. Electronic decryption can be performed with fast Fresnel reconstruction procedure. Numerical simulation results show the validity of the algorithm and an optoelectronic implementation setup is also presented.  相似文献   

4.
A method for hiding multiple images into one image is presented. The method is based on interference principle and double random phase mask method. A uniform plane wave interferes with two beams of light wave carrying information of two encrypted images on an output plane. The obtained interference distribution image contains information of two encrypted images. By using frequency spectrum center shift technique, the two encrypted images can be recovered successfully. Then, the interference distribution is encoded into an index matrix through a host image. The optical encryption system parameters and the host image can all be used as encryption keys, which make encrypted image information safer. Numerical simulation indicates that the method can encrypt more information into one image and reconstruct the encryption image information successfully.  相似文献   

5.
基于两步正交相移干涉的振幅图像光学加密技术   总被引:2,自引:1,他引:1  
提出一种基于两步正交相移干涉的光学图像加密技术.这种相移干涉数字全息只要记录两幅干涉图,不需要记录物光波和参考光波的强度信息,就可以再现没有零级像和共轭像的再现像.物光波对应的光路经过两次菲涅尔变换,并结合双随机相位编码.参考光分别引入0和π/2相位,用数字化记录介质记录两幅数字全息图作为加密图像.解密时只要获得正确的密钥,经过简单的计算就可以重建清晰的原始图像.模拟实验验证了它的可行性和有效性,分析了抗裁剪和噪音的鲁棒性.  相似文献   

6.
基于全息技术的光学加密系统实值编码   总被引:2,自引:1,他引:1  
李萍  李榕 《光子学报》2008,37(5):957-959
提出一种基于全息技术用于光学图像加密的实值编码方法.待编码的数字图像与一个大小相同、灰度值为零的图像组成一幅新的图像,然后与一个随机相位掩膜一起通过光学透镜作傅里叶变换,取变换结果的实部作为编码输出图像.利用全息记录的方法解码,即编码输出图像和随机相位掩膜的傅里叶变换相加通过光学透镜作傅里叶反变换,记录反变换的光强分布,再通过非线性变换或灰度变换的方法可以恢复原图像.  相似文献   

7.
基于随机相位实值编码的光学图像加密   总被引:7,自引:7,他引:0  
李榕  李萍 《光子学报》2004,33(5):605-608
提出了一种用于图像加密的随机相位实值编码方法,待编码的纯相位图像与一个随机相位掩膜一起作傅里叶变换,取其实部作为编码图像.已编码的图像和随机相位掩膜的傅里叶变换相加作傅里叶反变换,反变换的光强可以准确地重建原图像.该编译码方法简单,编码图像是一个实值图像,便于计算机打印或显示输出.  相似文献   

8.
During the reconstruction of a digital hologram, the reconstructed image is usually degraded by speckle noise, which makes it hard to observe the original object pattern. In this paper, a new reconstructed image enhancement method is proposed, which first reduces the speckle noise using an adaptive Gaussian filter, then calculates the high frequencies that belong to the object pattern based on a frequency extrapolation strategy. The proposed frequency extrapolation first calculates the frequency spectrum of the Fourier-filtered image, which is originally reconstructed from the +1 order of the hologram, and then gives the initial parameters for an iterative solution. The analytic iteration is implemented by continuous gradient threshold convergence to estimate the image level and vertical gradient information. The predicted spectrum is acquired through the analytical iteration of the original spectrum and gradient spectrum analysis. Finally, the reconstructed spectrum of the restoration image is acquired from the synthetic correction of the original spectrum using the predicted gradient spectrum. We conducted our experiment very close to the diffraction limit and used low-quality equipment to prove the feasibility of our method. Detailed analysis and figure demonstrations are presented in the paper.  相似文献   

9.
彩色全息图的计算机产生和数字再现   总被引:3,自引:0,他引:3  
提出了一种基于色彩合成以及菲涅尔衍射原理,用计算机产生全息图并用数字方法再现彩色全息图的方法。该方法的第一步是将物体的彩色RGB图像分离为三基色强度图,再利用博奇编码的方法制成修正离轴参考光分色计算机全息图;第二步是分别对分色全息图在频域进行调制以实现用原参考光真实再现原始物光波。通过滤波消除零级衍射及共轭像的影响,获得了所需要的实像并提高了像质。提供的实验是选用一幅RGB图像作为原始物体,给出了用博奇编码法制成的全息图以及最后经色彩合成获得的再现像。结果表明,该方法能使各分色全息图的再现像准确重合,解决了在色彩合成时容易出现的色串扰问题。  相似文献   

10.
In this paper, an optical encryption system is proposed based on tricolor principle, Fresnel diffraction, and phase iterative algorithms. Different from the traditional encryption system, the encrypted image of this system is a color image and the plaintext of it is a gray image, which can achieve the combination of a color image and a gray image and the conversion of one image to another image. Phase masks can be generated by using the phase iterative algorithms in this paper. The six phase masks and the six diffracting distances are all essential keys in the process of decryption, which can greatly enhance the system security. Numerical simulations are shown to prove the possibility and safety of the method.  相似文献   

11.
基于分频域和菲涅耳域的光学图像加密方法   总被引:1,自引:1,他引:0  
结合分数傅里叶变换及菲涅耳变换,在光学图像加密系统中分别具有多密钥性和无透镜性的优点,提出了基于分频域和菲涅耳域的光学图像加密方法。基于分数傅里叶变换的光学加密系统,引入菲涅耳变换及全息技术,使原有的加密系统在不增加光学元件的基础上提高了系统的安全性。理论分析和计算机仿真模拟证明了这种方法的可行性。  相似文献   

12.
The shift-tolerance property of the encrypted image or the Fourier decrypting key in the Fourier space is proposed based on a phase-encoded virtual image. The encrypted data is obtained by the Fourier transform of the product of a phase-encoded virtual image to camouflage the original one and a random phase image. Therefore, even if unauthorized users analyze the encrypted image, they cannot reconstruct the required image. This virtual image protects the original one from being counterfeited and from unauthorized access. We demonstrate the robustness to data loss and shift of the encrypted data or the Fourier decrypting key in the proposed decryption technique using an interferometer.  相似文献   

13.
A new method for image encryption based on optical coherent superposition and basic vector operations is proposed in this paper. In this encryption, the original image can be directly separated into two phase masks (PMs). One is a random phase mask (RPM) and the other is a modulation of the RPM by the original image. The mathematical calculation for obtaining the two PMs is quite simple and direct resulting from the simple principle of optical coherent superposition. The arbitrarily selected RPM can be treated as the encrypted result while the PM can be taken as the key for decryption. With this technique, the same encrypted result can be obtained for different images with the same size while the keys for decryption are different. The encryption can be performed digitally and the decryption can be performed optically or digitally. The security of the proposed method is discussed and computer simulation results are presented to verify the validity of proposed method.  相似文献   

14.
基于双随机相位编码的彩色图像加密技术   总被引:4,自引:1,他引:3  
秦怡  郑长波 《光子学报》2012,41(3):326-329
为了实现仅用两个密钥对彩色图像进行加密,提出了一种基于光栅调制的彩色图像加密方法.该方法首先把彩色图像分成三基色分量:红,绿,兰.然后,把这三帧灰度图像分别用空间频率不同正弦振幅光栅调制,之后,再把调制结果进行叠加而形成一个实值目标图像,该目标图像包含了原始彩色图像的全部信息.对此目标图像进行双随机相位加密系统的加密,即实现了彩色图像的加密隐藏.由于正弦光栅的调制作用,R、G、B灰度图像的频谱在实值目标图像的频谱中分离开来,通过选取合适的滤波窗口,就可以对他们的频谱分别提取并予以重建,并最终实现重构原始彩色图像.本文给出了理论分析和计算机模拟,实验结果证实了该方法的可行性.  相似文献   

15.
Matoba O  Javidi B 《Optics letters》1999,24(11):762-764
An encrypted optical memory system using double random phase codes in the Fresnel domain is proposed. In this system, two random phase codes and their positions form three-dimensional keys for encryption of images and are used as keys to recover the original data. The third dimension is the positions of the codes, which can have as many as three degrees of freedom. Original images encrypted by use of the two phase codes located in the Fresnel domain are stored holographically in a photorefractive material. We demonstrate in preliminary experiments encryption and decryption of optical memory in a LiNbO(3) :Fe photorefractive crystal by use of angular multiplexing.  相似文献   

16.
基于非对称密码系统的彩色图像加密技术   总被引:1,自引:1,他引:0       下载免费PDF全文
为了实现对彩色图像的加密,提出一种基于傅里叶变换和非对称密钥加密系统的加密方法。把彩色图像分成三基色分量:红,绿,蓝。然后对这3帧灰度图像的傅里叶频谱进行截取,合成一个目标图像,该目标图像包含了原始彩色图像的大部分信息。对此目标图像的幅度和相位分别用非对称密钥加密系统加密,即实现了彩色图像的加密。 给出了理论分析和计算机模拟结果,实验结果证实了该方法的可行性。  相似文献   

17.
In this paper, key components of a digital hologram were tracked using discrete wavelet packet transform to propose an encryption. Information needed to handle digital holograms were obtained by analyzing the characteristic of digital holograms in the Fresnel and frequency domains. By integrating the information that was experimentally obtained, an encryption method that uses the wavelet transform and subband packetization was proposed. Thus it is possible to change the encryption strength by changing the level of wavelet transform and the energy value of the coefficients to be encrypted. Optimal parameters can be found by analyzing the encryption effect numerically and visually. Therefore, it is possible to execute the encryption efficiently using the parameters presented in this paper without a separate analysis process. The experimental results showed that encrypting only 0.032% of the entire data was enough to hide the contents of the hologram. Here, we regarded the key to encrypt the subband packetization information as the overall encryption key.  相似文献   

18.
In a secret communication system using chaotic synchronization, the communication information is embedded in a signal that behaves as chaos and is sent to the receiver to retrieve the information. In a previous study, a chaotic synchronous system was developed by integrating the wave equation with the van der Pol boundary condition, of which the number of the parameters are only three, which is not enough for security. In this study, we replace the nonlinear boundary condition with an artificial neural network, thereby making the transmitted information difficult to leak. The neural network is divided into two parts; the first half is used as the left boundary condition of the wave equation and the second half is used as that on the right boundary, thus replacing the original nonlinear boundary condition. We also show the results for both monochrome and color images and evaluate the security performance. In particular, it is shown that the encrypted images are almost identical regardless of the input images. The learning performance of the neural network is also investigated. The calculated Lyapunov exponent shows that the learned neural network causes some chaotic vibration effect. The information in the original image is completely invisible when viewed through the image obtained after being concealed by the proposed system. Some security tests are also performed. The proposed method is designed in such a way that the transmitted images are encrypted into almost identical images of waves, thereby preventing the retrieval of information from the original image. The numerical results show that the encrypted images are certainly almost identical, which supports the security of the proposed method. Some security tests are also performed. The proposed method is designed in such a way that the transmitted images are encrypted into almost identical images of waves, thereby preventing the retrieval of information from the original image. The numerical results show that the encrypted images are certainly almost identical, which supports the security of the proposed method.  相似文献   

19.
We solve the problem of diffraction of fluctuating radiation by an optically thin irregular layer (phase screen) with developed turbulent structure. It is shown that in the case of diffraction of radiation with saturated fluctuations and a narrow-band frequency spectrum by a weakly turbulent moving phase screen, the measured frequency spectrum of intensity fluctuations in the observation plane allows one to obtain information on the form of the spectrum of irregularities of an optically thin irregular layer in a wide size range significantly exceeding the size of the first Fresnel zone. Similarly to the well-known phase method of diagnostics of randomly irregular media, the conventional scintillation method modified in such a way yields undistorted information on the form of the irregularity spectrum. However, in contrast to the phase method, it also allows one to obtain data on the drift velocity of irregularities in the studied irregular layer.  相似文献   

20.
A novel method of the optical multiple-image encryption based on the modified Gerchberg–Saxton algorithm (MGSA) is presented. This proposed method with an architecture of two adjacent phase only functions (POFs) in the Fresnel transform (FrT) domain that can extremely increase capacity of system for completely avoiding the crosstalk between the decrypted images. Each encrypted target image is separately encoded into a POF by using the MGSA which is with constraining the encrypted target image. Each created POF is then added to a prescribed fixed POF composed of a proposed MGSA-based phase encoding algorithm. Not only the wavelength and multiple-position parameters in the FrT domain as keys to increase system security, the created POFs are also served mutually as the encryption keys to decrypt target image based on cascading two POFs scheme. Compared with prior methods [23], [24], the main advantages of this proposed encryption system is that it does not need any transformative lenses and that makes it very efficient and easy to implement optically. Simulation results show that this proposed encryption system can successfully achieve the multiple-image encryption with multiple-position keys, which is more advantageous in security than previous work [24] for its decryption process with only two POFs keys to accomplish this task.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号