首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
We proposed an optical color image hiding algorithm based on Gerchberg–Saxton retrieval algorithm in fractional Fourier domain. The RGB components of the color image are converted into a scrambled image by using 3D Arnold transform before the hiding operation simultaneously and these changed images are regarded as the amplitude of fractional Fourier spectrum. Subsequently the unknown phase functions in fractional Fourier domain are calculated by the retrieval algorithm, in which the host RBG components are the part of amplitude of the input functions. The 3D Arnold transform is performed with different parameters to enhance the security of the hiding and extracting algorithm. Some numerical simulations are made to test the validity and capability of the proposed color hiding encryption algorithm.  相似文献   

2.
We propose an image watermarking scheme based on the phase retrieval algorithm in gyrator domain. The watermark is converted into a noise-like image by Arnold transform. The scrambled image is regarded as the amplitude of gyrator spectrum. The Gerchberg-Saxton algorithm is employed to obtain the unknown phase function in gyrator pair, in which the host image is the amplitude of input function. The phase information and the parameters of the two transforms serve as the key of watermarking algorithm. The numerical simulation has demonstrated the performance of the proposed algorithm.  相似文献   

3.
A novel double-image encryption algorithm is proposed by using chaos-based local pixel scrambling technique and gyrator transform. Two original images are first regarded as the amplitude and phase of a complex function. Arnold transform is used to scramble pixels at a local area of the complex function, where the position of the scrambled area and the Arnold transform frequency are generated by the standard map and logistic map respectively. Then the changed complex function is converted by gyrator transform. The two operations mentioned will be implemented iteratively. The system parameters in local pixel scrambling and gyrator transform serve as the keys of this encryption algorithm. Numerical simulation has been performed to test the validity and the security of the proposed encryption algorithm.  相似文献   

4.
According to the imaging principle and characteristic of LASIS (Large Aperture Static Interference Imaging Spectrometer), we discovered that the 3D (three dimensional) image sequences formed by different interference pattern frames, which were formed in the imaging process of LASIS Interference hyperspectral image, had much stronger correlation than the original interference hyperspectral image sequences, either in 2D (two dimensional) spatial domain or in the spectral domain. We put this characteristic into image compression and proposed an adaptive OPD (optical path difference) and dislocation prediction algorithm for interference hyperspectral image compression. Compared the new algorithm proposed in this paper with Dual-Direction Prediction [1] proposed in 2009, lots of experimental results showed that the prediction error entropy of the new algorithm was much smaller. In the prediction step of lifting wavelet transform, this characteristic would also reduce the entropy of coefficients in high frequency significantly, which would be more advantageous for quantification coding [2].  相似文献   

5.
离散Arnold变换改进及其在图像置乱加密中的应用   总被引:2,自引:0,他引:2       下载免费PDF全文
吴成茂 《物理学报》2014,63(9):90504-090504
为了改善传统二维Arnold变换用于图像置乱加密的效果,提出了离散Arnold变换的改进方法,并将其用于图像置乱加密测试研究.该方法利用现有离散标准映射的构造思想,将传统离散二维Arnold变换表达式中第一个变换表达式所对应变换结果非线性融入第二个变换表达式,实现经典离散二维Arnold变换的非线性去拟仿射化修改,以便快速改善图像置乱加密效果.数学证明改进方法不再保持现有离散二维Arnold变换所具有的拟仿射不变性,但是改进变换仍是一种具有周期性的可逆映射,将其用于图像置乱加密时,利用其周期性或逆变换能恢复置乱前原图像.大量实验结果表明,本文所建议的改进方法是有效的,相比现有的离散Arnold变换更具有实用价值意义.  相似文献   

6.
Gyrator变换全息图及其在图像加密中的应用   总被引:3,自引:0,他引:3  
林睿 《光子学报》2013,42(2):245-252
提出了gyrator变换全息图,利用gyrator变换快速算法模拟实现了gyrator变换全息图的产生和再现,并研究了基于相移数字全息的gyrator变换全息图.在此基础上提出了采用正弦相位光栅实现光学图像加密的新方法.该方法利用gyrator变换在相空间的旋转特性,将gyrator变换的角度、光栅的频率及光栅的旋转角度作为加密密钥,并利用两个或两个以上的gyrator变换系统的级联实现图像加密,增加了系统的安全性.依据相移数字全息进行的两个gyrator变换系统级联的仿真实验验证了该方法的可行性、有效性及其良好的安全性能.  相似文献   

7.
A novel multiple information encryption by user-image-based gyrator transform hologram is proposed. In encryption process, each channel of the user image is phase encoded, modulated by random phase function and then gyrator transformed to get the gyrator spectrum of user image. Subsequently, each channel of the secret image is normalized, phase encoded, multiplied by modulated user image, and then gyrator transformed to obtain the gyrator spectrum of secret image. The encrypted digital hologram is recorded by the interference between the gyrator spectrum of user image and the spherical wave function. Similarly, the digital hologram for decryption is recorded by the interference between the gyrator spectrum of secret image and the spherical wave function. The multiple encrypted digital holograms are multiplexed into a final encoded hologram and the corresponding digital holograms for decryption are multiplexed into a final hologram for decryption. The wavelength and radius of the spherical wave function, and angle of gyrator transform are all essential keys for decryption. The proposed system has two main features. First, the encrypted hologram has no information about secret image. Second, the hologram for decryption used as identification key. Consequently the two marked security layers of information protection are achieved. The proposal can be realized by optoelectronic system. Numerical simulation results demonstrate the feasibility and security of the proposed technique.  相似文献   

8.
A novel scheme for image encryption of phase images is proposed, using fractional Hartley transform followed by Arnold transform and singular value decomposition in the frequency domain. Since the plaintext is a phase image, the mask used in the spatial domain is a random amplitude mask. The proposed scheme has been validated for grayscale images and is sensitive to the encryption parameters such as the order of the Arnold transform and the fractional orders of the Hartley transform. We have also evaluated the scheme's resistance to the well-known noise and occlusion attacks.  相似文献   

9.
A novel asymmetric single-channel color image encryption using Hartley transform and gyrator transform is proposed. A color image is segregated into R, G, and B channels and then each channel is independently Hartley transformed. The three transformed channels are multiplied and then phase- and amplitude truncated to obtain first encrypted image and first decryption key. The encoded image is modulated with a conjugate of random phase mask. The modulated image is gyrator transformed and then phase- and amplitude truncated to get second encrypted image and second decryption key. The asymmetric (decryption) keys, random phase mask, and transformation angle of gyrator transform serve as main keys. The optoelectronic encryption and decryption systems are suggested. Numerical simulation results have been demonstrated to verify the performance and security of the proposed security system.  相似文献   

10.
A color image encryption algorithm is designed by use of Arnold transform and discrete cosine transform (DCT). The RGB components of the color image are scrambled by Arnold transform at the aspect of pixel sequence. The scrambled RGB components are exchanged and mixed randomly under the control of a matrix defined by random angle. DCT is employed for changing the pixel values of color image. In this encryption scheme the operations mentioned above are performed twice continuously. The parameters of Arnold transform and the random angle serve as the key of the color image encryption method. Some numerical simulations are made to test the validity and capability of the color encryption algorithm.  相似文献   

11.
A novel quantum multi-image encryption algorithm based on iteration Arnold transform with parameters and image correlation decomposition is proposed, and a quantum realization of the iteration Arnold transform with parameters is designed. The corresponding low frequency images are obtained by performing 2-D discrete wavelet transform on each image respectively, and then the corresponding low frequency images are spliced randomly to one image. The new image is scrambled by the iteration Arnold transform with parameters, and the gray-level information of the scrambled image is encoded by quantum image correlation decomposition. For the encryption algorithm, the keys are iterative times, added parameters, classical binary and orthonormal basis states. The key space, the security and the computational complexity are analyzed, and all of the analyses show that the proposed encryption algorithm could encrypt multiple images simultaneously with lower computational complexity compared with its classical counterparts.  相似文献   

12.
A novel optical image encryption method is proposed, based on gyrator transform and phase-shifting interferometry. The input two-dimensional image to be encrypted is gyrator transformed two times, and two random phase masks are placed at the input plane and the output plane of the first gyrator transform. Two-step phase-shifting interferometry is used to record the digital holograms of the input image encrypted by use of double-random phase encoding technique in gyrator transform domain. The rotation angles of gyrator transform, the random phase mask in the gyrator plane and the arbitrary phase shift used for recording form the keys for decryption of the input image. Numerical simulations are presented to verify its validity and efficiency.  相似文献   

13.
An enhanced asymmetric cryptosystem for color image is proposed by using equal modulus decomposition (EMD) in the gyrator transform domains. In this scheme, the EMD is performed to create the effective trapdoor one-way function. Moreover, to enhance the security of the cryptosystem, the Baker mapping is considered and utilized for scrambling the RGB components of the color image. The parameters in the Baker mapping and gyrator transform can be served as the extra keys of the entire cryptosystem. Various types of attacks are considered in the robustness analysis experiments. Some numerical simulations are made to verify the validity and capability of the proposed color encryption algorithm.  相似文献   

14.
随着数据量的不断增长,如何有效压缩高光谱图像成为影响其普及应用的一个关键问题。近年来,小波压缩技术已经被证明是高光谱图像压缩方法中很有发展前景的一个,但由于其对高光谱图像特性的利用较为有限而使其性能的进一步提升受到了限制。文章根据高光谱图像的光谱特征,提出了一种基于光谱去相关的高光谱图像小波压缩方法,设计了分块预测方法来同时去除光谱间相关性和空间相关性,并将其应用于小波压缩方法之中。首先,将高光谱图像分为几个具有高谱间相关性的图像块。然后推导出各块中波段的近似成比例的特性,并在各块分别进行基于这一特性和超光谱图像其他特性设计波段预测编码。最后,将预测用的参考波段和预测后获得的偏差数据,通过小波编码技术进行压缩。实验结果表明,所设计的方法与目前先进的超光谱压缩技术相比其性能有显著的提升。与AT-3DSPIHT算法比较,最高PSNR或SNR提升幅度均能达到4.2 dB左右。此外,此方法在低比特率下的优势也十分突出。  相似文献   

15.
基于gyrator变换和矢量分解的非对称图像加密方法   总被引:1,自引:0,他引:1       下载免费PDF全文
姚丽莉  袁操今  强俊杰  冯少彤  聂守平 《物理学报》2016,65(21):214203-214203
本文结合矢量分解和gyrator变换的数学实现得到了一种新的非对称图像加密算法,它将待加密图像先通过矢量分解加密到两块纯相位板中,然后利用从gyrator变换的数学实现中推导出来的加密算法加密其中一块相位板,获得最终的实值密文.另一块相位板作为解密密钥.算法的解密密钥不同于加密密钥,实现了非对称加密,加密过程中产生的两个私钥增大了算法的安全性.数值模拟结果验证了该算法的可行性和有效性.  相似文献   

16.
Remote-sensing technology plays an important role in military and industrial fields. Remote-sensing image is the main means of acquiring information from satellites, which always contain some confidential information. To securely transmit and store remote-sensing images, we propose a new image encryption algorithm in hybrid domains. This algorithm makes full use of the advantages of image encryption in both spatial domain and transform domain. First, the low-pass subband coefficients of image DWT (discrete wavelet transform) decomposition are sorted by a PWLCM system in transform domain. Second, the image after IDWT (inverse discrete wavelet transform) reconstruction is diffused with 2D (two-dimensional) Logistic map and XOR operation in spatial domain. The experiment results and algorithm analyses show that the new algorithm possesses a large key space and can resist brute-force, statistical and differential attacks. Meanwhile, the proposed algorithm has the desirable encryption efficiency to satisfy requirements in practice.  相似文献   

17.
A single-channel color image encryption is proposed based on a phase retrieve algorithm and a two-coupled logistic map. Firstly, a gray scale image is constituted with three channels of the color image, and then permuted by a sequence of chaotic pairs generated by the two-coupled logistic map. Secondly, the permutation image is decomposed into three new components, where each component is encoded into a phase-only function in the fractional Fourier domain with a phase retrieve algorithm that is proposed based on the iterative fractional Fourier transform. Finally, an interim image is formed by the combination of these phase-only functions and encrypted into the final gray scale ciphertext with stationary white noise distribution by using chaotic diffusion, which has camouflage property to some extent. In the process of encryption and decryption, chaotic permutation and diffusion makes the resultant image nonlinear and disorder both in spatial domain and frequency domain, and the proposed phase iterative algorithm has faster convergent speed. Additionally, the encryption scheme enlarges the key space of the cryptosystem. Simulation results and security analysis verify the feasibility and effectiveness of this method.  相似文献   

18.
A novel three-dimensional (3D) image encryption approach by using the computer-generated integral imaging and cellular automata transform (CAT) is proposed, in which, the two-dimensional (2D) elemental image array (EIA) digitally recorded by light rays coming from the 3D image is mapped inversely through the virtual pinhole array according to the ray-tracing theory. Next, the encrypted image is generated by using the 2D CAT scrambling transform for the 2D EIA. The reconstructed process is carried out by using the modified computational integral-imaging reconstruction (CIIR) technique; the depth-dependent plane images are reconstructed on the output plane. The reconstructed 3D image quality of the proposed scheme can be greatly improved, because the proposed encryption scheme carries out in a computer which can avoid the light diffraction caused by optical device CIIR, and solves blur problem caused by CIIR by using the pixel-averaging algorithm. Furthermore, the CAT-based encryption algorithm is an error-free encryption method; CAT as an orthogonal transformation offers considerable simplicity in the calculation of the transform coefficient, that is, it can improve the quality of the reconstructed image by reducing energy loss compared with the traditional complicated transform process. To show the effectiveness of the proposed scheme, we perform computational experiments. Experimental results show that the proposed scheme outperforms conventional encryption methods.  相似文献   

19.
赵春晖  李彤  冯收 《光子学报》2021,50(3):148-158
针对常规的高光谱图像分类算法不能很好地解决不同图像中的频谱偏移的问题,提出了一种基于密集卷积和域自适应的高光谱图像分类算法,首先在源域中使用密集卷积进行深度特征学习,然后应用域自适应技术转移到目标域。目前的域自适应高光谱图像分类框架中常用卷积神经网络进行特征学习,但是当深度增加时会出现因梯度消失而导致分类精度下降的情况,因此本文通过引入密集卷积进行深度特征学习,提高域自适应高光谱图像分类的精度。在Indiana高光谱数据集和Pavia高光谱数据集上验证所提算法的有效性,整体分类精度分别为61.06%和89.63%,与其他域自适应高光谱图像分类方法对比,所提方法具有更好的分类精度。  相似文献   

20.
针对单一的滤波器提取高光谱图像空间纹理信息时不能获得完整的图像特征的不足,提出一种结合双边滤波和域转换标准卷积滤波的高光谱图像分类算法.该方法采用空间信息自适应融合的分类寻优,先对高光谱波段进行抽样分组,再用双边滤波和域转换标准卷积滤波对分组后的波段进行滤波,两种空间信息进行线性融合后交由支持向量机完成分类.实验表明,相比使用光谱信息、高光谱降维、空谱结合的支持向量机分类方法和边缘保持滤波以及递归滤波的方法,本文所提算法对高光谱图像的分类精度有较大提高,在训练样本仅为5%和3%的情况下,对印第安农林和帕维亚大学图像的总体分类精度分别达到了96.95%和97.89%,比其他算法高出213个百分点,验证了该方法在高光谱图像分类的有效性.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号