首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
A novel digital image watermarking system based on an iterative phase retrieval algorithm and sine-cosine modulation in the discrete-cosine-transform (DCT) domain is proposed. The original hidden image is first encrypted into two phase masks. Then the cosine and sine functions of one of the phase masks are introduced as a watermark to be embedded into an enlarged host image in the DCT domain. By extracting the watermark of the enlarged superposed image and decryption we can retrieve the hidden image. The feasibility of this method and its robustness against some attacks, such as occlusion, noise attacks, quantization have been verified by computer simulations. This approach can avoid the cross-talk noise due to direct information superposition and enhance the imperceptibility of hidden data.  相似文献   

2.
We investigate quality of images decrypted from in-line holograms recorded with a random phase mask placed behind an input image. High- and low-contrast fingerprint images are used as test scenes. The simulation results show that due to multiple convolution processes and a limitation of the CCD sensor resolution, quality of decrypted images is sensitive to spatial separations between the input image, the phase mask and the hologram. We propose a new method for improving quality of decrypted images by using background noise removal. It is found that in comparison with high-contrast input, the low-contrast image is more robust to distortion caused by the encryption–decryption process.  相似文献   

3.
Double image encryption based on iterative fractional Fourier transform   总被引:1,自引:0,他引:1  
We present an image encryption algorithm to simultaneously encrypt two images into a single one as the amplitudes of fractional Fourier transform with different orders. From the encrypted image we can get two original images independently by fractional Fourier transforms with two different fractional orders. This algorithm can be independent of additional random phases as the encryption/decryption keys. Numerical results are given to analyze the capability of this proposed method. A possible extension to multi-image encryption with a fractional order multiplexing scheme has also been given.  相似文献   

4.
A novel multiple information encryption by user-image-based gyrator transform hologram is proposed. In encryption process, each channel of the user image is phase encoded, modulated by random phase function and then gyrator transformed to get the gyrator spectrum of user image. Subsequently, each channel of the secret image is normalized, phase encoded, multiplied by modulated user image, and then gyrator transformed to obtain the gyrator spectrum of secret image. The encrypted digital hologram is recorded by the interference between the gyrator spectrum of user image and the spherical wave function. Similarly, the digital hologram for decryption is recorded by the interference between the gyrator spectrum of secret image and the spherical wave function. The multiple encrypted digital holograms are multiplexed into a final encoded hologram and the corresponding digital holograms for decryption are multiplexed into a final hologram for decryption. The wavelength and radius of the spherical wave function, and angle of gyrator transform are all essential keys for decryption. The proposed system has two main features. First, the encrypted hologram has no information about secret image. Second, the hologram for decryption used as identification key. Consequently the two marked security layers of information protection are achieved. The proposal can be realized by optoelectronic system. Numerical simulation results demonstrate the feasibility and security of the proposed technique.  相似文献   

5.
An image encryption method combining the joint transform correlator (JTC) architecture with phaseshifting interferometry to realize double random-phase encoding is proposed. The encrypted field and the decrypting key are registered as holograms by phase-shifting interferometry. This method can encrypt two images simultaneously to improve the encryption efficiency of the methods based on JTC architecture, and eliminate the system alignment constraint of the methods based on Mach-Zehnder interferometer (MZI)architecture. Its feasibility and validity are verified by computer simulations. Moreover, image encryption and decryption can be achieved at high speed optically or digitally. The encrypted data are suitable for Internet transmission.  相似文献   

6.
Qu Wang  Qing Guo  Liang Lei  Jinyun Zhou 《Optik》2013,124(24):6707-6712
We present an optical method for double image encryption by using linear exchanging operation and double random phase encoding (DRPE) in the gyrator transform (GT) domain. In the linear exchanging operation, two primitive images are linearly recombined via a random orthogonal transform matrix. The resultant blended images are employed to constitute a complex-valued image, which is then encoded into a noise-like encrypted image by a DRPE structure in the GT domain. One can recover the primitive images exactly with all decryption keys correctly applied, including the transform orders, the random phase masks and random angle function used for linear exchanging operation. Computer simulations have been given to demonstrate that the proposed scheme eliminates the difference in key spaces between the phase-based image and the amplitude-based image encountered in the previous schemes. Moreover, our scheme has considerably high security level and certain robustness against data loss and noise disturbance.  相似文献   

7.
W. Chen  C.J. Tay 《Optics Communications》2009,282(18):3680-691
In this paper, we propose a novel method to encrypt a color image based on Arnold transform (ART) and interference method. A color image is decomposed into three independent channels, i.e., red, green and blue, and each channel is then encrypted into two random phase masks based on the ART and interference method. Light sources with corresponding wavelengths are used to illuminate the retrieved phase-only masks during image decryption. The influence of security parameters on decrypted images is also analyzed. Numerical simulation results are presented to illustrate the feasibility and effectiveness of the proposed method.  相似文献   

8.
A novel double image encryption method is proposed by utilizing double pixel scrambling technique and random fractional Fourier domain encoding. One of the two original images is encoded into the phase of a complex signal after being scrambled by one matrix, and the other original image encoded into its amplitude after being scrambled by another matrix. The complex signal is then encrypted into stationary white noise by utilizing double random phase encoding in fractional Fourier domain. By applying the correct keys with fractional orders, the random phase masks and the pixel scrambling operation, the two original images can be retrieved without cross-talk. Numerical simulations have been done to prove the validity and the security of the proposed encryption method.  相似文献   

9.
基于两步正交相移干涉的振幅图像光学加密技术   总被引:2,自引:1,他引:1  
提出一种基于两步正交相移干涉的光学图像加密技术.这种相移干涉数字全息只要记录两幅干涉图,不需要记录物光波和参考光波的强度信息,就可以再现没有零级像和共轭像的再现像.物光波对应的光路经过两次菲涅尔变换,并结合双随机相位编码.参考光分别引入0和π/2相位,用数字化记录介质记录两幅数字全息图作为加密图像.解密时只要获得正确的密钥,经过简单的计算就可以重建清晰的原始图像.模拟实验验证了它的可行性和有效性,分析了抗裁剪和噪音的鲁棒性.  相似文献   

10.
We propose and demonstrate a method which constructs large size multicolor images using a holographic technique in limited spaces, i.e., tunnels. A traffic sign image of the same size and color as an actual traffic sign board is displayed using many comparative small holograms. Each hologram is composed of a single computer generated hologram (CGH). Though it was necessary to make many CGHs, we have shortened the hologram production time by putting a reconstructed image on long distance, and using many reconstruction sources. Moreover, though cross-talk images are caused in a color reconstruction, by adjusting the optical system it is possible to make sure that drivers see only the appropriate image. Many holograms function as one big hologram, and it has been confirmed that a large reconstructed image can be displayed in a limited space.  相似文献   

11.
In this paper we propose an encryption/decryption technique of gray-level image information using an on-axis 2-f digital holographic optical encrypting system with two-step phase-shifting method. This technique reduces the number of holograms in phase-shifting digital holography and minimizes the setup of the encryption system more than multistep phase-shifting technique. We are able to get the complete decrypted image by controlling the K-ratio which is defined as the reference beam intensity versus the object beam intensity. We remove the DC-term of the phase-shifting digital hologram to reconstruct and decrypt the original image information. Simulation results show that the proposed method can be used for encryption and decryption of a 256 gray-level image. Also, the result shows some errors of the decrypted image according to K-ratio.  相似文献   

12.
Matoba O  Javidi B 《Optics letters》2002,27(5):321-323
Secure data transmission by use of encrypted digital holograms and an optical retrieval system for secure real-time display are proposed. Original images are encrypted by a double-random phase encryption technique and then are recorded as digital holograms in a CCD, together with a reference plane wave. This digital hologram of the encrypted image can be transmitted to receivers via any conventional electronic or digital communication channels. The decryption key is also recorded as a digital hologram. At the receiver, the original image can be retrieved by an optical correlation-based reconstruction process. Both encryption and retrieval can be performed by all-optical means, and thus a real-time secure display can be implemented. We demonstrate the proposed system numerically and experimentally.  相似文献   

13.
A new method for image encryption based on optical coherent superposition and basic vector operations is proposed in this paper. In this encryption, the original image can be directly separated into two phase masks (PMs). One is a random phase mask (RPM) and the other is a modulation of the RPM by the original image. The mathematical calculation for obtaining the two PMs is quite simple and direct resulting from the simple principle of optical coherent superposition. The arbitrarily selected RPM can be treated as the encrypted result while the PM can be taken as the key for decryption. With this technique, the same encrypted result can be obtained for different images with the same size while the keys for decryption are different. The encryption can be performed digitally and the decryption can be performed optically or digitally. The security of the proposed method is discussed and computer simulation results are presented to verify the validity of proposed method.  相似文献   

14.
A digital holographic information system can process complex three-dimensional (3-D) object information. We demonstrate a scheme for securing complex and 3-D information in the context of in-line digital holography. Double random phase encoding in the free-space propagation domain of light is used to secure the complex information. Encrypted in-line digital holograms are recorded using the position-phase-shifting method. The encrypted complex image at the CCD recording plane is retrieved from the real-valued digital holograms, and is used for decryption. The robustness of the method has also been studied for various securing keys used in the method against blind decryption. A layer-by-layer information retrieval from the encrypted digital hologram is also discussed. The method can also be used to secure digital complex information in a virtual optics modality using holographic principles.  相似文献   

15.
长工作距离显微成像数字全息合成孔径方法(英文)   总被引:1,自引:1,他引:0  
提出了一种用于长工作距离下显微成像的数字全息合成孔径方法。首先,在不同斜入射照明条件下记录多幅包含不同物光频谱范围的数字全息图。然后,利用每一幅全息图通过数字方法重构并放大物体强度像。最后,通过非相干叠加这些强度像得到分辨力提高且散斑噪声减小的合成物体强度像。理论分析和实验结果表明,此方法可应用于长工作距离下的原位显微观测。  相似文献   

16.
We propose a method to encrypt two covert images into an overt image based on phase-truncated Fourier transforms and phase retrieval. In this method, the two original images are self-encoded in the manner that one of the two images is directly separated into two phase masks (PMs) and used as keys for encryption, and then multiplied by a PM which is generated by using phase retrieval algorithm. At last, the whole encryption process is completed by a Fourier transform operation. In the decryption process, the image without a separation and the two PMs used as keys for encryption are all treated as encoded data. The cryptosystem is asymmetric which means the keys for encryption are different from those for decryption. Numerical simulations are presented to show the viability and good performance of the proposed method.  相似文献   

17.
According to encrypting principles of digital images, integrating the characteristic of JPEG image, and using discrete chaotic sequence, this paper has studied encryption and decryption of JPEG image, and has compared and analyzed the corresponding relations between the encryption and decryption effects and their security of two different encrypting schemes of the JPEG image chaotic encryption studied by this paper. In a basic unit of an 8 × 8 data block, image encryption and decryption not only are fast, but also match with JPEG format. The JPEG image encryption can meet the security requirement of the storage and transmission of JPEG images in some common application occasions, and provides an effective and feasible way of encrypting JPEG images.  相似文献   

18.
噪音对光学图象浑沌相位列阵加密和解密的影响   总被引:1,自引:0,他引:1  
张培琨  刘家英 《光子学报》1998,27(7):593-597
本文提出了一种用浑沌相位列阵对光学图象加密和解密的方法,并重点分析了加法高斯白噪音对光学图象浑沌相位列阵加密和解密的影响.通过计算机模拟发现加密后的图象与原图象相比,抗振幅噪音的能力增强,而抗相位噪音的能力下降.在一定信噪比范围内,相位噪音是影响解密图象质量的主要因素.  相似文献   

19.
A multiple-image encryption scheme is proposed based on the asymmetric technique, in which the encryption keys are not identical to the decryption ones. First, each plain image is scrambled based on a sequence of chaotic pairs generated with a system of two symmetrically coupled identical logistic maps. Then, the phase-only function of each scrambled image is retrieved with an iterative phase retrieval process in the fractional Fourier transform domain. Second, all phase-only functions are modulated into an interim, which is encrypted into the ciphertext with stationary white noise distribution by using the fractional Fourier transform and chaotic diffusion. In the encryption process, three random phase functions are used as encryption keys to retrieve the phase-only functions of plain images. Simultaneously, three decryption keys are generated in the encryption process, which make the proposed encryption scheme has high security against various attacks, such as chosen plaintext attack. The peak signal-to-noise is used to evaluate the quality of the decrypted image, which shows that the encryption capacity of the proposed scheme is enhanced considerably. Numerical simulations demonstrate the validity and efficiency of the proposed method.  相似文献   

20.
Optical color image encryption with redefined fractional Hartley transform   总被引:1,自引:0,他引:1  
Xinxin Li 《Optik》2010,121(7):673-3242
We propose a new method for color image encryption by wavelength multiplexing on the basis of two-dimensional (2-D) generalization of 1-D fractional Hartley transform that has been redefined recently in search of its inverse transform. A color image can be considered as three monochromatic images and then divided into three components and each component is encrypted independently with different wavelength corresponding to red, green or blue light. The system parameters of fractional Hartley transform and random phase masks are keys in the color image encryption and decryption. Only when all of these keys are correct, can the image be well decrypted. The optical realization is then proposed and computer simulations are also performed to confirm the possibility of the proposed method.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号