首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 843 毫秒
1.
基于gyrator变换和矢量分解的非对称图像加密方法   总被引:1,自引:0,他引:1       下载免费PDF全文
姚丽莉  袁操今  强俊杰  冯少彤  聂守平 《物理学报》2016,65(21):214203-214203
本文结合矢量分解和gyrator变换的数学实现得到了一种新的非对称图像加密算法,它将待加密图像先通过矢量分解加密到两块纯相位板中,然后利用从gyrator变换的数学实现中推导出来的加密算法加密其中一块相位板,获得最终的实值密文.另一块相位板作为解密密钥.算法的解密密钥不同于加密密钥,实现了非对称加密,加密过程中产生的两个私钥增大了算法的安全性.数值模拟结果验证了该算法的可行性和有效性.  相似文献   

2.
一种消除数字离轴全息零级像的实验方法   总被引:4,自引:2,他引:2  
吕且妮  葛宝臻  张以谟 《光子学报》2004,33(8):1014-1017
提出一种消除数字离轴全息零级像的实验方法.这种方法是将全息衍射光栅作为分光元件,形成数字离轴全息记录系统,通过调节记录光路系统中平面镜,改变物光波到达CCD的入射方向而引入相移,从而得到不同记录参数的全息图.再通过对不同记录参数全息图的数字处理,即可达到零级像消除的目的,并对这种方法进行了理论分析和实验验证.给出了利用这种方法获得的实验结果.实验结果证明了该方案的可行性,并且具有光路系统简单、操作和处理容易等特点.  相似文献   

3.
王华英  于梦杰  刘飞飞  江亚男  宋修法  高亚飞 《物理学报》2013,62(23):234207-234207
为了提高数字全息图的重建速度和精度,本文提出了一种基于同态信号处理的数字全息广义线性重建算法. 首先利用预放大数字全息显微系统并结合同态信号处理原理进行了理论分析,得到了广义线性重建算法的实现条件及重建步骤,并对该算法的优点进行了分析;然后利用计算机模拟和实验相结合的方法对理论分析进行了验证. 结果表明:数字全息广义线性重建算法不仅可以有效的消除全息图频谱中零级项的干扰,实现高精度再现,而且由于采用一个完整象限的固定区域滤波,避免了常规线性算法的手动滤波操作,极大地提高了重建速度,同时最大限度地保留了原始像中的高频成分,实现全息图的高分辨重建. 关键词: 数字全息显微术 同态信号处理 傅里叶变换 分辨率  相似文献   

4.
基于联合变换相关和相移干涉的图像加密   总被引:1,自引:1,他引:0  
沈丽娜  李军  常鸿森 《光子学报》2008,37(10):2114-2117
提出了一种在联合变换相关器结构中引入三步相移干涉和二元置乱技术的图像加密方法.用纯相位空间光调制器同时调制原始图像和两个随机相位掩模,利用三步相移技术分别将图像信息和主密钥加密为全息图,并用CCD在输出面上接收,再利用二元置乱技术置乱图像信息的全息图.在获得置乱密钥和附加密钥的情况下,可以通过一定的算法快速、清晰的重建原始图像.用计算机仿真验证了它的可行性和有效性.  相似文献   

5.
基于数字全息及离散余弦变换的图像数字水印技术   总被引:30,自引:9,他引:21  
尉迟亮  顾济华  刘薇  陶智 《光学学报》2006,26(3):55-361
提出了一种以数字全息和离散余弦变换为基础的数字水印技术,实现了在原始图像中嵌入数字全息水印。考虑到数字全息图的不可撕毁性,使得数字全息水印本身就具有良好的抗剪切能力,并且与传统的二维灰度水印相比嵌入的信息更多。数字全息图通过傅里叶变换全息的方法获得,为了提高抗有损压缩能力,在数字全息水印嵌入过程中采用了基于(JPEG模型和分解离散余弦变换(DCT)系数的方法。实验表明,通过该算法获得的数字全息水印对JPEG有损压缩和剪切等图像处理操作均有很好的稳健性,并且采用密钥加强了水印的安全性。因此该算法能成为数字多媒体产品版权保护的有效方案。  相似文献   

6.
为实现仅用一幅离轴数字全息图便能直接恢复相位,提出一种利用空间载波相移技术(spatial carrier phase shift, SCPS)和线性回归相结合的离轴数字全息去载波相位恢复算法.首先,利用SCPS将一幅离轴数字全息图分为四幅含有载波相移的全息图,其中载波相移由沿行、列两个方向的正交载波所引入;然后,将四幅载波相移全息图作为输入,将所求物体相位和两个正交的载波作为未知量,结合最小二乘法和线性回归同时求出载波和相位信息.相较于已有的去载波技术,本算法无需背景全息图作为参考,便可准确地去除载波,实现高质量的相位重建.本文结合数值仿真和具体实验结果验证本算法的有效性和优越性.  相似文献   

7.
基于Matlab的计算全息图的制作与数字再现的研究   总被引:3,自引:0,他引:3       下载免费PDF全文
 应用Matlab语言,结合博奇型计算全息的编码方法,利用计算机分别绘制了菲涅耳全息图和傅里叶变换全息图,实现了计算全息图的快速制作,讨论了制作计算全息图的原理、方法和步骤。利用CGH技术和数字全息技术所生成的全息图再现出原始图像,完成了全息图的数字重现,实现了整个全息记录和再现过程的计算机模拟。与传统的编程语言和绘图方法相比较,该算法在实现上更加简单和快捷,并且带有一系列提高计算全息图质量的措施,有效地消除了零级像和孪生像的影响,获得了清晰的数字再现图像。  相似文献   

8.
光纤光栅传输矩阵研究   总被引:5,自引:0,他引:5  
张自嘉  王昌明 《光子学报》2007,36(6):1073-1077
利用模耦合理论给出并分析了一般坐标系下相移布喇格光纤光栅中的传输矩阵及其特性,所给出的传输矩阵具有分段不变性,而且不能被分解为一个矩阵和一个相移矩阵的乘积.利用该传输矩阵可以研究均匀、相移、啁啾、超结构等光纤光栅及光栅的级联等.计算了相移光栅的反射谱和相移量的关系,以及两个光栅级联时的反射谱.结果表明,同样相移量时的反射谱和已有文献不同,两个光栅级联时,也不同于已有文献,各自的谐振波长与光栅的级联没有关系.  相似文献   

9.
基于有限脉冲响应滤波器的数字全息零级像消除   总被引:9,自引:3,他引:6  
针对数字全息中零级像的存在影响数字再现像的质量,分析数字全息图的记录、再现原理及频谱特性,提出了一种利用有限脉冲响应滤波器消除全息图数字再现中零级像的方法.该方法只需记录一幅数字全息图,不需要相移器材或其他辅助设备,直接利用数字图像处理对数字全息图在空域进行预处理,消除全息再现时的零级像干扰.对比了数字模拟和实验拍摄到的全息图在应用有限脉冲响应滤波器消除零级像前后的再现结果,表明该方法可消除零级衍射像,改善重建像质量,并且算法简单.  相似文献   

10.
邓丽军  王辉  马利红 《光子学报》2014,39(12):2168-2173
为提高数字全息再现像视角,提出一种基于滤波成像的数字全息技术来实现大视角的三维物体面型测量.利用离轴像面数字全息技术,通过在4F相干图像处理系统的空间频谱面处放置可移动的低通滤波器,使满足CCD分辨率的物光波与参考光波干涉形成全息图,并控制低通滤波及成像区域分别记录不同谱段的子全息图.再现时,首先对子全息图进行数字傅里叶变换,重构对应频谱段,并对频谱段进行拼接形成完整的物光频谱|而后通过数字再现获得大视角的数字全息再现像.利用该方法测量了圆柱形表面(光滑的缝纫针)的三维形貌,并取得了较好的实验结果.  相似文献   

11.
A novel multiple information encryption by user-image-based gyrator transform hologram is proposed. In encryption process, each channel of the user image is phase encoded, modulated by random phase function and then gyrator transformed to get the gyrator spectrum of user image. Subsequently, each channel of the secret image is normalized, phase encoded, multiplied by modulated user image, and then gyrator transformed to obtain the gyrator spectrum of secret image. The encrypted digital hologram is recorded by the interference between the gyrator spectrum of user image and the spherical wave function. Similarly, the digital hologram for decryption is recorded by the interference between the gyrator spectrum of secret image and the spherical wave function. The multiple encrypted digital holograms are multiplexed into a final encoded hologram and the corresponding digital holograms for decryption are multiplexed into a final hologram for decryption. The wavelength and radius of the spherical wave function, and angle of gyrator transform are all essential keys for decryption. The proposed system has two main features. First, the encrypted hologram has no information about secret image. Second, the hologram for decryption used as identification key. Consequently the two marked security layers of information protection are achieved. The proposal can be realized by optoelectronic system. Numerical simulation results demonstrate the feasibility and security of the proposed technique.  相似文献   

12.
A novel optical image encryption method is proposed, based on gyrator transform and phase-shifting interferometry. The input two-dimensional image to be encrypted is gyrator transformed two times, and two random phase masks are placed at the input plane and the output plane of the first gyrator transform. Two-step phase-shifting interferometry is used to record the digital holograms of the input image encrypted by use of double-random phase encoding technique in gyrator transform domain. The rotation angles of gyrator transform, the random phase mask in the gyrator plane and the arbitrary phase shift used for recording form the keys for decryption of the input image. Numerical simulations are presented to verify its validity and efficiency.  相似文献   

13.
A novel asymmetric single-channel color image encryption using Hartley transform and gyrator transform is proposed. A color image is segregated into R, G, and B channels and then each channel is independently Hartley transformed. The three transformed channels are multiplied and then phase- and amplitude truncated to obtain first encrypted image and first decryption key. The encoded image is modulated with a conjugate of random phase mask. The modulated image is gyrator transformed and then phase- and amplitude truncated to get second encrypted image and second decryption key. The asymmetric (decryption) keys, random phase mask, and transformation angle of gyrator transform serve as main keys. The optoelectronic encryption and decryption systems are suggested. Numerical simulation results have been demonstrated to verify the performance and security of the proposed security system.  相似文献   

14.
An image encryption is discussed based on the random phase encoding method in gyrator domains. An iterative structure of image encryption is designed for introducing more random phases to encrypt image. These random phase functions are generated by a two-dimensional chaotic mapping with the help of computer. The random phases are utilized for increasing the security of this encryption algorithm. In the chaotic mapping relation, the initial value and expression can serve as the key of algorithm. The mapping relation is considered secretly for storage and transmission in practical application in comparison to traditional algorithms. The angle parameter of gyrator transform is an additional key. Some numerical simulations have been given to validate the performance of the encryption scheme.  相似文献   

15.
Qu Wang  Qing Guo  Liang Lei  Jinyun Zhou 《Optik》2013,124(24):6707-6712
We present an optical method for double image encryption by using linear exchanging operation and double random phase encoding (DRPE) in the gyrator transform (GT) domain. In the linear exchanging operation, two primitive images are linearly recombined via a random orthogonal transform matrix. The resultant blended images are employed to constitute a complex-valued image, which is then encoded into a noise-like encrypted image by a DRPE structure in the GT domain. One can recover the primitive images exactly with all decryption keys correctly applied, including the transform orders, the random phase masks and random angle function used for linear exchanging operation. Computer simulations have been given to demonstrate that the proposed scheme eliminates the difference in key spaces between the phase-based image and the amplitude-based image encountered in the previous schemes. Moreover, our scheme has considerably high security level and certain robustness against data loss and noise disturbance.  相似文献   

16.
A novel double-image encryption algorithm is proposed by using chaos-based local pixel scrambling technique and gyrator transform. Two original images are first regarded as the amplitude and phase of a complex function. Arnold transform is used to scramble pixels at a local area of the complex function, where the position of the scrambled area and the Arnold transform frequency are generated by the standard map and logistic map respectively. Then the changed complex function is converted by gyrator transform. The two operations mentioned will be implemented iteratively. The system parameters in local pixel scrambling and gyrator transform serve as the keys of this encryption algorithm. Numerical simulation has been performed to test the validity and the security of the proposed encryption algorithm.  相似文献   

17.
A novel optical image encryption scheme is proposed based on quick response code and high dimension chaotic system, where only the intensity distribution of encoded information is recorded as ciphertext. Initially, the quick response code is engendered from the plain image and placed in the input plane of the double random phase encoding architecture. Then, the code is encrypted to the ciphertext with noise-like distribution by using two cascaded gyrator transforms. In the process of encryption, the parameters such as rotation angles and random phase masks are generated as interim variables and functions based on Chen system. A new phase retrieval algorithm is designed to reconstruct the initial quick response code in the process of decryption, in which a priori information such as three position detection patterns is used as the support constraint. The original image can be obtained without any energy loss by scanning the decrypted code with mobile devices. The ciphertext image is the real-valued function which is more convenient for storing and transmitting. Meanwhile, the security of the proposed scheme is enhanced greatly due to high sensitivity of initial values of Chen system. Extensive cryptanalysis and simulation have performed to demonstrate the feasibility and effectiveness of the proposed scheme.  相似文献   

18.
Fully-phase image encryption is considered more secure as compared to an amplitude image encryption. In the present paper, an encryption scheme is proposed for double phase-images. The phase-images are bonded with random phase masks and then gyrator transformed. The two resulting images are then added and subtracted to give intermediate images which are bonded with a structured phase mask (SPM) based on devil’s vortex Fresnel lens (DVFL) in the frequency plane. Thereafter, the images are once again transformed using a gyrator transform (GT) to give the corresponding encrypted images. The use of a structured phase mask enhances the key space for encryption and also overcomes the problem of axis alignment associated with an optical set-up. The decryption process is the reverse of encryption. The validity of the proposed scheme is established from the computer simulation results using MATLAB 7.1 platform. The performance of the scheme is evaluated in terms of mean-squared-error (MSE) between the input-, and the decrypted images. In addition, the sensitivity to encryption keys such as SPM parameters, and transform angles of GT is investigated. The technique is likely to provide enhanced security in view of the increased number of encryption parameters. Robustness of the system against occlusion and noise attacks has also been investigated.  相似文献   

19.
A novel nonlinear image encryption scheme based on a fully phase nonzero-order joint transform correlator architecture (JTC) in the Gyrator domain (GD) is proposed. In this encryption scheme, the two non-overlapping data distributions of the input plane of the JTC are fully encoded in phase and this input plane is transformed using the Gyrator transform (GT); the intensity distribution captured in the GD represents a new definition of the joint Gyrator power distribution (JGPD). The JGPD is modified by two nonlinear operations with the purpose of retrieving the encrypted image, with enhancement of the decrypted signal quality and improvement of the overall security. There are three keys used in the encryption scheme, two random phase masks and the rotation angle of the GT, which are all necessary for a proper decryption. Decryption is highly sensitivity to changes of the rotation angle of the GT as well as to little changes in other parameters or keys. The proposed encryption scheme in the GD still preserves the shift-invariance properties originated in the JTC-based encryption in the Fourier domain. The proposed encryption scheme is more resistant to brute force attacks, chosen-plaintext attacks, known-plaintext attacks, and ciphertext-only attacks, as they have been introduced in the cryptanalysis of the JTC-based encryption system. Numerical results are presented and discussed in order to verify and analyze the feasibility and validity of the novel encryption–decryption scheme.  相似文献   

20.
A novel information security system based on multiple-phase retrieval by an iterative gyrator transform algorithm is proposed. In this method, a series of phase masks are designed and located in the input plane and the gyrator planes, and the phase distributions of all the masks are adjusted simultaneously in each iteration. It can achieve fast convergence and high quality of the recovered image and can provide a higher degree of freedom in key space with more parameters as supplementary keys. Furthermore, the security level of this method is greatly improved by the sensitivity of recovered images with the angles of gyrator transform. Numerical simulations are presented to verify its validity and efficiency.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号