首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
The magic-matrix scrambling method and the binary encoding method are combined to form a hybrid encoding method for hiding digital covert images. For this hybrid encoding method, a covert image is encoded into a host image to form an overt image. First, the magic-matrix scrambling method is used to rearrange all the pixels of the covert image by using a specified magic matrix modified from a magic square to form a scrambled matrix. Then, all the pixels of the scrambled matrix are denoted by binary data. Finally, the binary data are encoded into the host image to form the overt image. The pixels of the overt image contain nine groups of codes used for decoding the covert image, i.e. identification codes, covert-image dimension codes, scrambling-time codes, magic-square dimension codes, corner codes, shifting codes, arrangement codes, graylevel codes, and information codes. The overt image and the host image look almost the same for eyes. Furthermore, the covert image can be decoded directly from the overt image without using the host image. The most important feature is that the decoded covert image is identical to the original covert image, i.e. there is no distortion in the decoding work.  相似文献   

2.
An encoding method is used to encrypt the Fourier-transformed information of a hidden (covert) digital image in an overt image, while the Fourier-transformed information must be encoded with binary codes. All of the pixels in an overt image are classified into five groups that are called identification, type, tracing, dimension, and information codes. Identification codes are used to judge if the overt image contains codes that belong to the proposed encoding method or not; type codes are used to judge the encoding type; tracing codes are used to judge the encoding trace; dimension codes are used to judge the size of the hidden information; and information codes are used to decode the hidden information. Applying the proposed encoding method is rather easy, and host images corresponding to overt images are not needed for decoding work. The experiment has demonstrated four types of encoding for the proposed encoding method to reconstruct covert images without any distortion or only with a little distortion.  相似文献   

3.
This paper proposes a new type of encoding methods to encrypt hidden (covert) information in host images. The encrypted information can be plot, fax, word, or network data, and it must be encoded with binary codes. All the pixels in an encoded (overt) image modulated from a host image are classified into three groups. The first group of pixels is called identification codes, used to judge whether the overt image is encoded by a method proposed in this paper or not. The second group of pixels is called type codes, used to judge the encoding type. The third group of pixels is called information codes, used to decode the encoded information. Applying the proposed encoding methods is quite convenient, and host images are not needed for decoding. Decoding covert information from overt images is rather difficult for un-authorized persons, whereas it is very easy for designers or authorized persons. Therefore, the proposed methods are very useful.  相似文献   

4.
张奎  陈兆学 《光学技术》2017,43(4):364-368
在考察多种二值图像连通区域标记方法的基础上,提出了一种新的基于图像填充和游程码的二值图像孔洞连通域的标记和表达方法。对二值图像进行一次扫描,得到所有可能构成孔洞的游程码,并将游程对应的区域基于特定标记值进行填充。通过判断每个游程与图像上一行像素点标记值的对应关系完成新连通域的建立、游程数据存储和连通区域的合并,判断每个游程与图像下一行像素点标记值的对应关系完成孔洞的筛选。由于仅需扫描图像一次,且对每个游程只须进行单独处理,标记算法的效率较高、复杂度较低。结果表明,可以快速有效地完成二值图像孔洞连通域的标记。同时,它还给出孔洞之间的包含关系,能够有效地实现二值图像的拓扑结构表达。  相似文献   

5.
介绍了一种基于空间二进制编码的非接触3 D 形貌测量方法。它用一台LCD 投影仪对被测物体表面进行空间编码,再用一台CCD 摄像机获取物体编码信息,最后用三角法原理从摄像机图像中获取三维形貌数据。提出了基于三角法的空间二进制码的重要特性,描述了高效编码的构造方法。用这个构造方法构造出一个完全数字化的7 位字长的二进制编码。基于这种编码的3 D 形貌测量方法在被测物体表面非常不连续和非构造的环境下取得了良好的测量结果。  相似文献   

6.
周昕  陈建国 《光学技术》2005,31(1):114-116
双随机位相编码解码技术是应用于图像隐藏领域的一种重要方法。在已编码信息的记录及传递过程中,由于复制、修饰、图像压缩等人为或非人为因素不可避免地会引入各种偏差,这些数据偏差最终反映为重构图像的噪声。分析并数值模拟了满足均匀分布、正态分布的随机偏差及因数据取舍而引入的偏差所导致的重构图像噪声分布。研究表明,这几种类型的数据偏差在重构图像中均会导致灰度值概率分布为高斯型函数的噪声。从理论分析和数值模拟结果来看,实施双随机位相解码运算不会降低图像信噪比,因此重构图像的噪声特性是由已编码信息在记录及传递过程中的信噪比决定的。  相似文献   

7.
Kinoform synthesis by an electro-optic hybrid system using an interpolation method is proposed. A programmable liquid crystal spatial light modulator is used as a kinoform. The phase distribution of the kinoform is optimized using the simulated annealing. The cost function is represented by the mean square error between a desired image stored in a computer and a reconstructed image detected by a charge coupled device camera. The interpolation method enables one to reduce the random noise effect in the reconstructed image. Some experimental results are presented. Presented at 1996 International Topical Meeting on Optical Computing (OC’96), April 21–25, Sendai, Japan.  相似文献   

8.
赵录建  高隽  毕冉  范之国 《应用光学》2017,38(3):415-420
相对于传统光学探测技术,偏振探测在目标探测、识别方面有着独特的优势。针对雾、霾等天气下图像退化的问题,提出一种利用偏振信息的图像去雾方法,通过获取3个角度下目标的偏振图像,求解出场景目标的斯托克斯矢量,从斯托克斯矢量与穆勒矩阵的关系出发,分析偏振图像光强随着偏振角度的变化规律,获取最大和最小光强下的正交偏振图像,利用偏振滤波和亮通道先验方法分别估算大气光偏振度和其无穷远处大气光强值,最终重构出无雾图像。实验结果表明,在雾霾天气下,利用获取的正交偏振图像能够重构出清晰的图像,且重构图像的平均梯度和边缘强度均提升了约3倍,灰度标准差提升了约88%。  相似文献   

9.
A method for hiding information is proposed. Firstly, the image to be hidden is encoded by the doubled-random phase-encoding technique. Then, the real part of the encoded data, together with the imaginary part, is embedded into a sufficiently large host image, which has been enlarged according to some rules. The superposition weighting is adjusted to a proper value such that the composed image will not be subject to severe degradation compared to the original host image. When decryption is needed, the reconstructed hidden image can be extracted directly from the composed image without using original host image, with the result being quite satisfactory. The quality of the reconstructed hidden image and of the composed image has been analyzed as the superposition weight varies, allowing the determination of the optimum superposition weight. The optimum superposition weight is related to the average gray level value of the hiding image.  相似文献   

10.
Yoshikawa N  Itoh M  Yatagai T 《Optics letters》1998,23(18):1483-1485
We have developed a new multiplexing method for producing binary computer-generated holograms (CGH's) for security applications. This method is based on double recording of two types of coding method upon binary CGH's. The CGH synthesized by the proposed method can have multiple image planes from the region close to the hologram (image region) to infinity (Fraunhofer region) without severe degradation of reconstructed images in the image region. A CGH containing simultaneous image- and Fourier-type holograms is fabricated by electron-beam lithography. Some experimental results are presented.  相似文献   

11.
基于标量衍射理论,二元光学器件的衍射效率,微结构误差对衍射效率的影响,提出了一种准连续编码方法,并给出了加工非2n台阶所需掩模板的具体形式。在一定的加工条件和工艺水平下,采用这种编码方法,可以不增加加工成本和工序,仅通过新颖的掩模板设计方法充分利用现有加工条件和设备,使二元光学器件的衍射效率得到很大程度的提高。从而不仅能使一般混合系统的效率得到提高,更能充分发挥混合光学系统的成像能力。此编码方法的采用有利于推进二元光学器件的实用化。  相似文献   

12.
Rate-compatible non binary LDPC codes are used as coding scheme for data transmission in fifth generation new radio. In this paper, we have presented a method for construction of exponent matrix. We first discuss about the types of the cycles and analyze the cycles that are responsible for the degradation of the error performance of the LDPC codes. At low SNR and higher code rates the occurrence of errors will be high, as the parity bits are less at higher code rates. This becomes a challenge while constructing the exponent matrix. In order to fulfill the challenge, we propose a simple and practical algorithm to construct the exponent matrix. The constructed matrix can be used for various code rates and information lengths. The constructed matrix is based on second lifting size set of 5G standard. Simulation results show that the proposed algorithm is effective and exhibits that the constructed LDPC codes can even perform well at low SNR and at higher code rate.  相似文献   

13.
An improved method of using a selective spatial-domain mask to reduce speckle noise in digital holography is proposed.The sub-holograms are obtained from the original hologram filtered by the binary masks including a shifting aperture for being reconstructed. Normally, the speckle patterns of these sub-reconstructed images are different. The speckle intensity of the final reconstructed image is suppressed by averaging the favorable sub-reconstructed images which are selected based on the most optimal pixel intensity sub-range in the sub-holograms. Compared with the conventional spatial-domain mask method, the proposed method not only reduces the speckle noise more effectively with fewer sub-reconstructed images,but also reduces the redundant information used in the reconstruction process.  相似文献   

14.
传统正则化超分辨重建得到的图像往往存在过度平滑或伪信息残留的问题,结合超分辨重建模型对重建图像伪信息的产生进行了分析,针对传统方法的不足提出了基于图像区域信息自适应的正则化方法,通过图像的区域信息将图像划分为平滑区与非平滑区域,对不同区域选用不同的先验模型进行约束。同时考虑人眼的视觉感知特性,结合区域信息实现正则化参数的自适应选取。实验结果表明该方法在抑制重建图像伪信息的同时能有效保护细节,效果要优于传统方法与单一的先验模型约束,对于红外与可见光图像重建效果的提升提供了一定的理论参考。  相似文献   

15.
周昕  陈建国 《光学技术》2004,30(5):580-582
利用具有高度保密性的双随机位相编码技术,通过灰度迭加方法将编码信息的实部和虚部同时隐藏在一幅足够大的宿主图像中。在提取隐藏图像过程中直接对携带隐藏信息的融合图像进行处理,不需要利用原始宿主图像,且重构图像的质量较好,不受宿主图像的影响。在此基础上进一步对影响融合和重构图像质量的因素进行了讨论,结果表明,对于确定的宿主图像和隐藏图像可通过调整迭加权重得到最佳效果。  相似文献   

16.
针对多光谱滤光片阵列成像采样率低,原始(Raw)数据稀疏所导致的重建图像模糊,高频信息丢失等问题,提出了一种新八谱段滤光片阵列分布方案,利用基于邻域梯度延伸方法对光谱Raw图像进行重建.首先基于二叉树生成法,在重复排列的4×4阵列中设计了一种等空间概率比的八谱段滤光片分布方案;然后针对传感器直接获取的稀疏Raw图像,计算各谱段采样点的梯度信息,在保持图像结构特征和纹理信息的基础上,利用邻域采样点的像素值和梯度值对未采样点进行重建,从而获得完整的光谱图像信息;最后,基于已重建的八谱段光谱图像,采用伪逆矩阵法重构各像素位置的31波段光谱值.结果表明,相对于主流图像重建方法,本文算法提高了重建八谱段光谱图像的峰值信噪比、复合峰值信噪比,降低了光谱均方差,更好地保留了图像的纹理和边缘,有效降低了多光谱滤光片阵列成像中的颜色伪影和图像模糊等现象.  相似文献   

17.
We propose a method to encrypt two covert images into an overt image based on phase-truncated Fourier transforms and phase retrieval. In this method, the two original images are self-encoded in the manner that one of the two images is directly separated into two phase masks (PMs) and used as keys for encryption, and then multiplied by a PM which is generated by using phase retrieval algorithm. At last, the whole encryption process is completed by a Fourier transform operation. In the decryption process, the image without a separation and the two PMs used as keys for encryption are all treated as encoded data. The cryptosystem is asymmetric which means the keys for encryption are different from those for decryption. Numerical simulations are presented to show the viability and good performance of the proposed method.  相似文献   

18.
The security of an information hiding method using the double-random phase-encoding technique is analyzed and improved. The method encodes the hidden image with the double-random phase-encoding technique, and then embeds the real and imaginary parts of the encoded image to an enlarged host image. Recovering the hidden image from the composed image does not need the original host image, while the quality of the reconstructed image is satisfying. However, the original method is insecure in the sense of information hiding, since the composed image can be detected easily with some technical metrics. The security is improved by adding random perturbation on the encoded data. The validity of the improved method is demonstrated by numerical simulation experiments.  相似文献   

19.
高压计量仪表识别过程中需要对图像进行二值化操作,然而拍摄的仪表图像多出现光照不均和数字重影现象,导致传统方法对仪表图像的二值化困难。为此,提出一种基于卷积神经网络的二值化方法,用于对复杂光照下含数字重影的仪表图像二值化。该网络使用的数据集为真实环境下的仪表图像,首先对输入的图像进行降维提取特征,然后反卷积重建图像前景,最后输出二值图。将设计的网络与传统的二值化方法进行对比,实验结果表明,经该网络训练得到的二值图数字清晰且无重影,且测得的交并比(IoU)平均值为95.12,与样本标签图像的相似度最高,能够有效解决复杂环境下有重影的仪表图像二值化问题。  相似文献   

20.
A method for hiding multiple images into one image is presented. The method is based on interference principle and double random phase mask method. A uniform plane wave interferes with two beams of light wave carrying information of two encrypted images on an output plane. The obtained interference distribution image contains information of two encrypted images. By using frequency spectrum center shift technique, the two encrypted images can be recovered successfully. Then, the interference distribution is encoded into an index matrix through a host image. The optical encryption system parameters and the host image can all be used as encryption keys, which make encrypted image information safer. Numerical simulation indicates that the method can encrypt more information into one image and reconstruct the encryption image information successfully.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号