首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 125 毫秒
1.
不对称离散分数傅里叶变换实现数字图像的加密变换   总被引:8,自引:1,他引:7  
利用不对称分数傅里叶变换的特性,提出了一种图像加密变换的新方法。对图像的x,y方向分别实施不同级次的一维分数傅里叶变换,得到加密图像。解密方法就是对变换后的图像实施对应级次的分数傅里叶逆变换,只有当x,y方向的逆变换级次分别与原变换级次都相同或者满足周期条件时,才能恢复原图像。加密变换有效地提高了图像加密和防伪力度。数值计算验证了方法的正确性和可行性。  相似文献   

2.
提出一种利用变形分数傅里叶变换和双随机相位编码对图像加密的方法.对要加密的图像分别进行两次变形分数傅里叶变换和两次随机相位函数调制,使加密图像的密钥由原来两重增加到六重.利用全息元件,可以用光学系统实现这种加密和解密变换.计算机模拟结果表明,只有当六重密钥都完全正确时,才能准确地重建原图像,这种六重密钥加密方法提高了图像信息的安全保密性.  相似文献   

3.
利用分数傅里叶变换相关实现散斑相关测量   总被引:7,自引:7,他引:0  
提出了一种在匹配滤波相关中利用分数傅里叶变换代替傅里叶变换实现散斑相关测量的方法.利用分数傅里叶变换的指数性质,采用把移变后的散斑图像先进行相位调制,再进行分数傅里叶变换的方法,有效地解决了分数傅里叶变换的移变性带来的谱移问题.编程模拟和拉伸试件位移场测量的结果表明,只要选择合适的分数傅里叶变换级次和相位调制函数,可以得到优于傅里叶变换相关的理想输出.  相似文献   

4.
基于随机分数傅里叶变换的双图像加密算法   总被引:3,自引:2,他引:1  
贾丽娟  刘正君 《光子学报》2009,38(4):1020-1024
利用光学随机分数傅里叶变换设计了一种双图像加密算法,并给出了相应的光学实现.加密算法中,将两幅原始图像分别作为加密系统输入复函数的振幅和位相分布函数,利用随机分数傅里叶变换进行加密,所得复函数的振幅即为加密图像,而位相部分是变换的输出相位,随机位相作为加密算法的密码.在数值模拟中,二值文本图像和灰度图像分别被作为原始图像用于加密结果分析和加密安全测试,结果表明该加密算法具有很好的安全性.  相似文献   

5.
针对光学图像加密的轮廓显现问题,提出了一种基于稀疏相位和可调傅里叶变换的图像加密方法。将可调傅里叶变换引入光学图像加密程序中,运用二维可调傅里叶变换实现像素混淆处理,相比基于复数或实数的变换域方案,计算复杂度较低;从加密函数提取相位值并获得加密数据的相位函数,再提取相位加密函数的稀疏数据,从而避免将密文相位信息主要集中在纯相位掩码内,以解决轮廓显现问题;完成了单图像加密实验和双图像加密实验,结果表明实现了较好的安全性,解决了光学图像加密的轮廓显现问题。  相似文献   

6.
基于全息技术的光学加密系统实值编码   总被引:2,自引:1,他引:1  
李萍  李榕 《光子学报》2008,37(5):957-959
提出一种基于全息技术用于光学图像加密的实值编码方法.待编码的数字图像与一个大小相同、灰度值为零的图像组成一幅新的图像,然后与一个随机相位掩膜一起通过光学透镜作傅里叶变换,取变换结果的实部作为编码输出图像.利用全息记录的方法解码,即编码输出图像和随机相位掩膜的傅里叶变换相加通过光学透镜作傅里叶反变换,记录反变换的光强分布,再通过非线性变换或灰度变换的方法可以恢复原图像.  相似文献   

7.
利用一发散点光源和一束倾斜平行光制作出在两个垂直方向上具有不同焦距的变形全息透镜,且用此全息元件实现了变形分数傅里叶变换。变形全息透镜两个方向上的焦距随全息记录条件和再现条件而变化,分析了用这种全息透镜实现变形分数傅里叶变换的条件。实验表明,用该元件能够方便地实现任意级次的变形分数傅里叶变换。  相似文献   

8.
基于级联分数傅里叶变换系统的数字水印技术   总被引:1,自引:0,他引:1  
提出一种基于分数傅里叶变换和随机相位编码的光学加密数字水印技术,可成为一种信息隐藏及保护的有效方案.该数字水印技术对于噪音叠加和常见的图像处理操作具有较强的稳健性.该技术根据光学级联分数傅里叶变换系统,利用两个随机相位分布函数对水印信息编码并经过迭代分数傅里叶变换嵌入到变换域的载体图像中.在水印检测和提取过程中,两个相位分布函数作为密钥.随机相位编码技术的引入,进一步提高了数字水印系统的密钥空间.增强了系统的安全性.该数字水印技术基于光学分数傅里叶变换原理,可以利用光学变换系统方便地实现.  相似文献   

9.
双随机相位加密同轴傅里叶全息水印防伪技术   总被引:32,自引:0,他引:32  
孙刘杰  庄松林 《光学学报》2007,27(4):21-624
提出了一种制作加密的傅里叶变换全息图像的方法,通过光学系统或计算机系统将原始数字图像经过双随机相位模板调制并与参考光干涉生成加密的傅里叶变换全息图像.将加密的傅里叶变换全息图像作为水印可以叠加隐藏在载体数字图像中,用于证明载体数字图像的版权.通过打印和扫描实验证明了含水印数字图像,可以通过普通的印刷技术印制在证件中;印刷品中的含水印载体数字图像,可以通过扫描输入计算机变换生成数字图像,通过盲检测技术可以从中提取所含数字水印,从而证明印刷品的真实性,提高了防伪能力.  相似文献   

10.
基于不对称非标准傅里叶变换的光学图像加密   总被引:1,自引:0,他引:1       下载免费PDF全文
邓晓鹏 《应用光学》2007,28(3):262-264
针对以往光学图像加密系统中输入面和频谱面对称性的缺点,在不增加系统元件的基础上,利用球面波照射不对称非标准傅里叶变换系统进行图像加密。通过把相位掩模置于该系统的傅里叶变换平面,利用不对称非标准傅里叶变换系统的输入面和频谱面的不对称性以及频谱面对于点光源相关参数的依赖性,克服了以前光学加密系统中输入面和频谱面的对称性所带来的安全隐患,并且获得了除相位掩模以外的另外四重密匙。理论分析和模拟实验表明:该方法不仅可行,而且多增加了几重密匙,增强了系统的安全性能。  相似文献   

11.
双重分数傅里叶变换计算全息   总被引:5,自引:3,他引:2  
提出了双重分数傅里叶变换计算全息,在这种方法中,将两个图像的信息分别经不同阶的分数傅里叶变换后,记录在同一张分数傅里叶变换计算全息图上,它需要两个特定的分数傅里叶变换系统才能再现出所记录的图像信息,利用其再现方式的特殊性,可制成一种新的安全认证系统。  相似文献   

12.
We present a new optical image encryption algorithm that is based on extended fractional Fourier transform (FRT) and digital holography technique. We can perform the encryption and decryption with more parameters compared with earlier similar methods in FRT domain. In the extended FRT encryption system, the input data to be encrypted is extended fractional Fourier transformed two times and random phase mask is placed at the output plane of the first extended FRT. By use of an interference with a wave from another random phase mask, the encrypted data is stored as a digital hologram. The data retrieval is operated by all-digital means. Computer simulations are presented to verify its validity and efficiency.  相似文献   

13.
Weimin Jin  Caijie Yan 《Optik》2007,118(1):38-41
The optical image encryption based on multichannel fractional Fourier transform (FRT) and double random phase encoding technique is proposed. Optical principles of encoding and decoding are analyzed in detail. With this method, one can encrypt different parts of input image, respectively. The system security can be improved to some extent, not only because fractional orders and random phase masks in every channel can be set with freedom, but also because the system parameters among all channels are independent. Numerical simulation results of optical image encryption based on four channel FRT and double random phase encoding are given to verify the feasibility of the method.  相似文献   

14.
A fast holographic wavefront sensor is proposed using a computer-generated hologram (CGH). This CGH is a multiplexed hologram of different Zernike mode–amplitude combinations, and is designed in such a manner as to get the corresponding spots on the detector according to the presence and strength of a particular aberration. Interference between the aberrated wavefront (with a single mode–amplitude combination) and the Fourier transform of an image with single bright pixel (defined as dot image) is numerically calculated for one hologram. Different mode–amplitude combination and corresponding different positions of bright pixels (dots) are taken to compute various holograms and then all the holograms are multiplexed to get the final hologram. When the aberrated wavefront with a particular mode–amplitude combination is incident onto the multiplexed hologram, the corresponding dot is generated in the Fourier plane. A lens performs the Fourier transform in optical domain and provides the instant detection of amplitude of the respective Zernike mode. The main advantage of the scheme is to avoid the need of any computations, which makes it really fast. The simulation results are presented with the cross-talk analysis for few Zernike terms.  相似文献   

15.
彭翔  白伟东  田劲东 《光学学报》2007,27(6):011-1017
提出一种新的基于信息光学的数字水印方法。该方法将水印信息隐藏于半色调编码的计算全息图之中。通过相位复原技术将需隐藏的水印信息编码为相位函数嵌入在复波前中,其振幅定义为宿主图像,通过计算全息记录复波前并对全息图进行半色调编码完成水印信息的嵌入。水印的提取过程只需对含有水印信息的半色调图像进行光学或数字的傅里叶变换即可完成。并给出了算法有效性的理论分析和仿真实验结果。结果证明这种水印技术对于各种数字图像处理操作具有很高的稳健性,且半色调编码图的二值特性使嵌入水印具有很强的抗打印、抗复印、抗扫描的能力。  相似文献   

16.
1 Introduction  FRT(FractionalFourierTransform )wasfirstlyintroducedbyNamiasin 1 980asamathematictoolinquantummechanics[1] .In1 993,MendlovicandOzaktasimplementedtheFRTatopticalfieldwhentheystudiedgradientindex (GRIN )fiber[2 ] andappliedthepuremathematicformulatio…  相似文献   

17.
FRTH(fractional Fourier transform hologram) is a new kind of hologram that differs from common Fresnel holograms and Fourier transform holograms. Due to the flexibility of zone plate. A method that uses the -1 order diffraction wave of zone plate as the object wave and the 0 order diffraction wave as the reference wave to record FRTH is presented. It provides a new simple way to record FRTH. In this paper, the theory of achieving FRT and recording FRTH using holographic zone plate is presented and experimental results are given.  相似文献   

18.
夏心怡  夏军 《中国物理 B》2016,25(9):94204-094204
A phase-only computer-generated holography(CGH) calculation method for stereoscopic holography is proposed in this paper.The two-dimensional(2D) perspective projection views of the three-dimensional(3D) object are generated by the computer graphics rendering techniques.Based on these views,a phase-only hologram is calculated by using the Gerchberg–Saxton(GS) iterative algorithm.Comparing with the non-iterative algorithm in the conventional stereoscopic holography,the proposed method improves the holographic image quality,especially for the phase-only hologram encoded from the complex distribution.Both simulation and optical experiment results demonstrate that our proposed method can give higher quality reconstruction comparing with the traditional method.  相似文献   

19.
A new method for image encryption using integral order radial Hilbert transform (RHT) filter in the fractional Fourier transform (FRT) domain has been proposed. The technique is implemented using the popular double random phase encoding method in the fractional Fourier domain. The random phase masks (RPMs), integral orders of the RHT, fractional orders of FRT, and indices of the Jigsaw transform (JT) have been used as keys for encryption and decryption. Simulation results have been presented and the schematic representation for optical implementation has been proposed. The mean-square-error and signal-to-noise ratio between the decrypted image and the input image have been calculated for the correct as well as incorrect orders of the RHT. Effect of occlusion and noise on the performance of the proposed scheme has also been studied. The robustness of the technique has been verified against attack using partial windows of the correct random phase masks. Similar investigations have also been carried out for the chosen-, and the known-plain-text attacks.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号