首页 | 本学科首页   官方微博 | 高级检索  
     检索      


Information verification and encryption based on phase retrieval with sparsity constraints and optical inference
Institution:1. Department of Electronic and Computer Engineering, University of Pittsburgh, Pittsburgh, PA 15261, United States;2. School of Computer and Information Engineering, Institute of Image Processing and Pattern Recognition, Henan University, Kaifeng 475004, China;1. Department of Electronic Engineering, Beijing Institute of Technology, Beijing 100081, China;2. Beijing Key Laboratory of Fractional Signals and Systems, China;1. College of Mechanical and Electrical Engineering, Nanyang Normal University, Nanyang, Henan 473061, China;2. College of Physics and Electrical Engineering, Nanyang Normal University, Nanyang, Henan 473061, China;1. State Key Laboratory of Tunable Laser Technology Research, Institute of Optic-Electronics, Harbin Institute of Technology, Harbin, 150001 China;2. College of Mathematics, Physics and Information Engineering, Zhejiang Normal University, Jinhua, 321004 China;3. Nature Science Research Center of Science and Technology, Harbin Institute of Technology, Harbin, 150001 China;1. The School of Science, Hangzhou Dianzi University, Hangzhou, 310018 China;2. Department of Physics, Zhejiang University, Hangzhou, 310027 China
Abstract:A novel optical information verification and encryption method is proposed based on inference principle and phase retrieval with sparsity constraints. In this method, a target image is encrypted into two phase-only masks (POMs), which comprise sparse phase data used for verification. Both of the two POMs need to be authenticated before being applied for decrypting. The target image can be optically reconstructed when the two authenticated POMs are Fourier transformed and convolved by the correct decryption key, which is also generated in encryption process. No holographic scheme is involved in the proposed optical verification and encryption system and there is also no problem of information disclosure in the two authenticable POMs. Numerical simulation results demonstrate the validity and good performance of this new proposed method.
Keywords:Optical encryption  Information authentication  Phase retrieval  Phase encoding
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号