首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 8 毫秒
1.
Optical color image encryption with redefined fractional Hartley transform   总被引:1,自引:0,他引:1  
Xinxin Li 《Optik》2010,121(7):673-3242
We propose a new method for color image encryption by wavelength multiplexing on the basis of two-dimensional (2-D) generalization of 1-D fractional Hartley transform that has been redefined recently in search of its inverse transform. A color image can be considered as three monochromatic images and then divided into three components and each component is encrypted independently with different wavelength corresponding to red, green or blue light. The system parameters of fractional Hartley transform and random phase masks are keys in the color image encryption and decryption. Only when all of these keys are correct, can the image be well decrypted. The optical realization is then proposed and computer simulations are also performed to confirm the possibility of the proposed method.  相似文献   

2.
Based on 1-D fractional Fourier transform, we proposed an image encryption algorithm in order to hide two images simultaneously. When the fractional order is closed to 1, most energy in frequency domain is centralized in the center part of spectrum. The image can be recovered acceptable by using a half of spectrum, which locates in the middle part at x-direction or y-direction. Cutting operation is employed in order to combine two spectra. Double random phase encoding is employed for image encryption. The corresponding numerical simulations are performed to demonstrate the validity and efficiency of the algorithm.  相似文献   

3.
Triple image encryption scheme in fractional Fourier transform domains   总被引:1,自引:0,他引:1  
We proposed a triple image encryption scheme by use of fractional Fourier transform. In this algorithm, an original image is encoded in amplitude part and other two images are encoded into phase information. The key of encryption algorithm is obtained from the difference between the third image and the output phase of transform. In general case, random phase encoding technology is not required in the proposed algorithm. Moreover, all information of images is preserved in theory when image are decrypted with correct key. The optical implementation of the algorithm is presented with an electro-optical hybrid structure. Numerical simulations have demonstrated the efficiency and the security of this algorithm. Based on this scheme a multiple image algorithm is expanded and designed.  相似文献   

4.
A new cryptology in dual fractional Fourier-wavelet domain is proposed in this paper, which is calculated by discrete fractional Fourier transform and wavelet decomposition. Different random phases are used in different wavelet subbands in encryption. A new color image encoding method is also presented with basic color decomposition and encryption respectively. All the keys, including random phases and fractional orders in R, G and B three channels, should be correctly used in decryption, otherwise people cannot obtain the totally correct information. Some numerical simulations are presented to demonstrate the possibility of the method. It would have widely potential applications in digital color image processing and protection.  相似文献   

5.
A new discrete fractional transform defined by two parameters (angle and fractional order) is presented. All eigenvectors of the transform are obtained by an angle using recursion method. This transform is named as discrete fractional angular transform (DFAT). The computational load of kernel matrix of the DFAT is minimum than all other transforms with fractional order. This characteristics has very important practical applications in signal and image processing. Numerical results and the mathematical properties of this transform are also given. As fractional Fourier transform, this transform can be applied in one and two dimensional signal processing.  相似文献   

6.
Double image encryption based on iterative fractional Fourier transform   总被引:1,自引:0,他引:1  
We present an image encryption algorithm to simultaneously encrypt two images into a single one as the amplitudes of fractional Fourier transform with different orders. From the encrypted image we can get two original images independently by fractional Fourier transforms with two different fractional orders. This algorithm can be independent of additional random phases as the encryption/decryption keys. Numerical results are given to analyze the capability of this proposed method. A possible extension to multi-image encryption with a fractional order multiplexing scheme has also been given.  相似文献   

7.
In order to increase data security transmission we propose a multichanneled puzzle-like encryption method. The basic principle relies on the input information decomposition, in the same way as the pieces of a puzzle. Each decomposed part of the input object is encrypted separately in a 4f double random phase mask architecture, by setting the optical parameters in a determined status. Each parameter set defines a channel. In order to retrieve the whole information it is necessary to properly decrypt and compose all channels. Computer simulations that confirm our proposal are presented.  相似文献   

8.
A novel double-image encryption algorithm is proposed, which can simultaneously encrypt two images into a single one as the amplitude of gyrator transform with two different groups of angles. The two original images can be retrieved independently by gyrator transforms with two different groups of angles, one common phase mask, and two different private phase masks. The proposed approach can enlarge the key space, achieve faster convergence in iterative process, and avoid cross-talk between two images in reconstruction. Numerical simulations are presented to verify its validity and efficiency.  相似文献   

9.
In this work we introduce a digital holographic configuration in a Joint Transform Correlator (JTC) architecture for encryption purposes. Conceptually, it is a Mach-Zender interferometer, with a JTC in one arm and a reference wave in the other. We describe the practical implementation of this architecture, along with experimental results that support the proposal. We analyze the noise influence caused by intensity saturation during image capture, and this information allows us a filtering process to reduce the information to be handled, with a consequent increase in the speed of the total procedure.  相似文献   

10.
The electromagnetic field transfer by diffraction from a spherical emitter to a spherical receiver is expressed by a fractional Fourier transform whose order depends on the distance between the emitter and the receiver and their curvature radii. Special attention is paid to complex order transforms: scaled variables and scaled field amplitudes are defined by complying with mathematical consistency. For a given distance of observation, a simple geometrical condition is set up to determine whether the corresponding transform order is a real or a complex number. The result is applied to check the stability of optical resonators.  相似文献   

11.
The nonlinear absorption can produce a nonlinear image very similar with the one created by the nonlinear refraction when using the nonlinear-imaging technique with phase object to measure the third-order nonlinearity of materials, but the principles of them are different. The formation of the nonlinear absorption image is explained, and the condition that the highest sensitivity of the nonlinear absorption measurement can be reached is deduced. For the materials with both nonlinear absorption and refraction, we find a proper phase shift of the phase object where the effect of the nonlinear refraction to the measured signal can be eliminated. The nonlinear absorption and refraction are numerically simulated when the phase shift of phase object to be π/2 that is normally used. The qualitative tendency of the signal variation is presented.  相似文献   

12.
Multiple image encryption using an aperture-modulated optical system   总被引:2,自引:0,他引:2  
A multiple image cryptosystem based on different apertures in an optical set-up under a holographic arrangement is proposed. The system is a security architecture that uses different pupil aperture mask in the encoding lens to encrypt different images. Based on this approach multiple encryption is achieved by changing the pupil aperture arrangement of the optical system among exposures. In addition to the classical speckle phase mask, the geometrical parameters characterizing the apertures are introduced to increase the system security. Even when an illegal user steals the speckle phase mask, the system cannot be broken into without the correct pupil geometrical parameters. The experimental set-up is based on a volume photorefractive BSO crystal as storing device. Information retrieval is done via a phase conjugation operation. We also have to stress that the multiple storage under this scheme, is only possible with the help of the aperture mask. Simulation and experimental results are further introduced to verify the proposed method.  相似文献   

13.
We propose a method for image encryption by multiple-step random phase encoding with an undercover multiplexing operation. The true image is stored in a multiple record we call encodegram; and then we can reconstruct it by the use of the appropriate random phase masks and a retrieval protocol. To increase the security of the true hidden image and confuse unauthorized receivers, we add to the encodegram an encoded fake image with different content. This fake image has only a small effect on the retrieval of the true hidden image, owing to the specific property of this protocol. In the decryption step, we can reveal the true image by applying the inverse protocol to two cyphertexts, one the encodegram containing the true image along with the fake image; and the other helping to get the random phase key to achieve the true image. Computer simulations verify the validity of this method for image encryption. Digital implementation of the method makes it particularly suitable for the remote transmission of information.  相似文献   

14.
Fast algorithm of discrete gyrator transform based on convolution operation   总被引:2,自引:0,他引:2  
The expression of gyrator transform (GT) is rewritten by using convolution operation, from which GT can be composed of phase-only filtering, Fourier transform and inverse Fourier transform. Therefore, fast Fourier transform (FFT) algorithm can be introduced into the calculation of convolution format of GT in the discrete case. Some simulations are presented in order to demonstrate the validity of the algorithm.  相似文献   

15.
In this paper, the mathematical expressions and the particularities of the joint fractional Fourier transform correlator (JFRTC) are detailedly analyzed. In a JFRTC, the distance between the two fractional correlation peaks can be adjusted flexibly by shifting the fractional orders. However, the intensity of the fractional correlation peaks decreases rapidly as the first fractional order p1 drops. The former property is very useful in a practical recognition system, but the latter one seriously reduces the recognition sensitivity of a JFRTC. For this reason, phase masks should be added at the input plane of the JFRTC to enhance the intensities of the fractional correlation peaks and effectively overcome the default. Compared with the existing JFRTC with single phase modulation, a JFRTC with double phase modulation is suggested to more flexibly improve the performance of a JFRTC.  相似文献   

16.
Experiment of coincidence fractional Fourier transform with spontaneous parametric down-conversion photon pairs is described in this work. Results agree well with theoretical calculations with Gaussian beams. Visibilities of the results are much greater than those obtained with partially coherent beam.  相似文献   

17.
We present a new method for image encryption on the basis of simplifed fractional Hartley transform (SFRHT). SFRHT is a real transform as Hartley transform (HT) and furthermore, superior to HT in virtue of the advantage that it can also append fractional orders as additional keys for the purpose of improving the system security to some extent. With this method, one can encrypt an image with an intensity-only medium such as a photographic film or a CCD camera by spatially incoherent or coherent illumination. The optical realization is then proposed and computer simulations are also performed to verify the feasibility of this method.  相似文献   

18.
We analyse the diffraction result of optical field after Cosine zone plate, and theoretically deduce its transform matrix. Under some conditions, its diffraction distribution is a mixture of fractional Fourier spectra. Then we use Cosine zone plate and its diffraction result to image encryption. Possible optical image encryption and decryption implementations are proposed, and some numerical simulation results are also provided.  相似文献   

19.
Applications of gyrator transform for image processing   总被引:1,自引:0,他引:1  
Gyrator transform is a new tool for manipulation of two-dimensional signals such as images or laser beam profiles. Here we demonstrate various applications of the gyrator transform for image processing. Several aspects such as noise reduction, filtering and encryption in the gyrator domains are discussed. These operations can be performed by numerical calculations or by an appropriate optical set up.  相似文献   

20.
We address the problem of degree of polarization (DOP) estimation in images limited by additive Gaussian detector noise. We derive and analyze the probability density function (PDF) of the pixelwise DOP estimate, which is shown to have significantly different statistical properties than when noise is Gamma distributed (speckle). We then determine the Cramer-Rao Lower Bound and the maximum likelihood estimator of the DOP. We deduce from this study practical solutions for characterizing and reducing the noise in these images.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号