首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Based on 1-D fractional Fourier transform, we proposed an image encryption algorithm in order to hide two images simultaneously. When the fractional order is closed to 1, most energy in frequency domain is centralized in the center part of spectrum. The image can be recovered acceptable by using a half of spectrum, which locates in the middle part at x-direction or y-direction. Cutting operation is employed in order to combine two spectra. Double random phase encoding is employed for image encryption. The corresponding numerical simulations are performed to demonstrate the validity and efficiency of the algorithm.  相似文献   

2.
Triple image encryption scheme in fractional Fourier transform domains   总被引:1,自引:0,他引:1  
We proposed a triple image encryption scheme by use of fractional Fourier transform. In this algorithm, an original image is encoded in amplitude part and other two images are encoded into phase information. The key of encryption algorithm is obtained from the difference between the third image and the output phase of transform. In general case, random phase encoding technology is not required in the proposed algorithm. Moreover, all information of images is preserved in theory when image are decrypted with correct key. The optical implementation of the algorithm is presented with an electro-optical hybrid structure. Numerical simulations have demonstrated the efficiency and the security of this algorithm. Based on this scheme a multiple image algorithm is expanded and designed.  相似文献   

3.
Double image encryption based on iterative fractional Fourier transform   总被引:1,自引:0,他引:1  
We present an image encryption algorithm to simultaneously encrypt two images into a single one as the amplitudes of fractional Fourier transform with different orders. From the encrypted image we can get two original images independently by fractional Fourier transforms with two different fractional orders. This algorithm can be independent of additional random phases as the encryption/decryption keys. Numerical results are given to analyze the capability of this proposed method. A possible extension to multi-image encryption with a fractional order multiplexing scheme has also been given.  相似文献   

4.
We present an holographic memory optical arrangement based on the successive shifting of a random pure-phase mask to achieve encrypted images multiplexing. The input images are encrypted to a stationary white noise using the usual double random encoding in the Fresnel domain. The encrypted information is imaged in a photorefractive crystal where also a reference beam impinges. In the holographic memory, a BSO crystal is used to provide both a recording medium and a phase conjugate mirror. The combination of these two features supplies at the same time the necessary exact cancellation of the random pure-phase mask as well as allows a real-time decryption process. Successive images are encrypted and position-encoded by speckle patterns arising from the random pure-phase mask in-plane shifting between exposures. We include experimental results to corroborate the multiplexing capability and the read-out fidelity of the proposed arrangement.  相似文献   

5.
In this work we introduce a digital holographic configuration in a Joint Transform Correlator (JTC) architecture for encryption purposes. Conceptually, it is a Mach-Zender interferometer, with a JTC in one arm and a reference wave in the other. We describe the practical implementation of this architecture, along with experimental results that support the proposal. We analyze the noise influence caused by intensity saturation during image capture, and this information allows us a filtering process to reduce the information to be handled, with a consequent increase in the speed of the total procedure.  相似文献   

6.
We have proposed a new technique for digital image encryption and hiding based on fractional Fourier transforms with double random phases. An original hidden image is encrypted two times and the keys are increased to strengthen information protection. Color image hiding and encryption with wavelength multiplexing is proposed by embedding and encryption in R, G and B three channels. The robustness against occlusion attacks and noise attacks are analyzed. And computer simulations are presented with the corresponding results.  相似文献   

7.
In order to increase data security transmission we propose a multichanneled puzzle-like encryption method. The basic principle relies on the input information decomposition, in the same way as the pieces of a puzzle. Each decomposed part of the input object is encrypted separately in a 4f double random phase mask architecture, by setting the optical parameters in a determined status. Each parameter set defines a channel. In order to retrieve the whole information it is necessary to properly decrypt and compose all channels. Computer simulations that confirm our proposal are presented.  相似文献   

8.
We propose and numerically demonstrate a simple method for measuring waveforms of optical pulses that have spectral bandwidths much larger than the passband of the measuring system, thus enabling a kind of temporal superresolution. The technique is based on pulse intensity modulation that contains high-order harmonics. Parts of the pulse intensity spectrum that are shifted as a result of the modulation, are moved over (“umklapped”) to the center of the passband, transmitted and then recorded by an oscilloscope. The pulse intensity spectrum is restored by parts from the Fourier transform of a few oscillograms, measured after performing the temporal shifts between the pulse train and the modulation. A similar approach is applied for achieving subwavelength spatial resolution in far -field microscopy. The spatial modulation is performed by a diffraction grating. The method allows one to restore a subwavelength object in a single measurement.  相似文献   

9.
An optical signal processing scheme using time lenses in a 4-f configuration for optical communication systems is proposed. The first time-lens combined with a dispersive element such as an optical fiber produces the Fourier transform of the input signal and the second time lens combined with an optical fiber placed after the temporal filter produces the inverse Fourier transformation. Typically, in an optical signal processing scheme based on space/time-lens, the signal at the output is space/time-reversed because of the direct Fourier transformation after the spatial/temporal filter, which is undesirable for a practical optical communication system. Here, we propose a technique to implement both direct and inverse Fourier transformation using time lenses which has no spatial analogue. As a result, the bit sequence at the output is not time-reversed. Two applications of the proposed scheme, a demultiplexer for wavelength division multiplexing (WDM) systems and a higher-order dispersion compensator, have been discussed and numerically implemented.  相似文献   

10.
Based on Gaussian model for reflector antenna, the effects of localized wave-front deformation on received power are researched. It is shown that the received power depends on the deepness h, the radius a, and the distance d of the Gaussian distortion and changes regularly as they increase. Localized deformation has the greatest influence on the received power at the deepness of h ≈ 0.38λ, which does not depend on other distortion parameters. To reduce the impact of localized deformation on the received power, the machining precision of mirrors should be much better than 0.38λ. The maximum power penalty due to the localized distortion with different radii a is given. We hope the results can be used in the design of inter-satellite laser communication systems.  相似文献   

11.
Based on the discrete fractional random transform (DFRNT), we present the discrete fractional random cosine and sine transforms (DFRNCT and DFRNST). We demonstrate that the DFRNCT and DFRNST can be regarded as special kinds of DFRNT and thus their mathematical properties are inherited from the DFRNT. Numerical results of DFRNCT and DFRNST for one and two-dimensional functions have been given.  相似文献   

12.
Instead of Zernike polynomials, truncated Gaussian function is proposed to express localized wave-front deformation in studying mutual alignment errors in free-space laser communication links, which simplifies the calculation. Mutual alignment errors include pointing and tracking errors which depend on transmitting and receiving optical system, respectively. It is shown that both pointing and tracking errors depend on three parameters (the center value A, the radius a and the distance d) of Gaussian localized distortion and change regularly as they increase. The maximum pointing and tracking errors always appear around A = 0.4λ (rms = π). Moreover, pointing error is more sensitive to localized wave-front deformation than tracking error. Beam truncation ratio has great influence on pointing error, and obscuration ratio has less influence on pointing and tracking errors except that antenna secondary mirror shelters parts of the localized deformation. To reduce the influence of localized aberrations, the principles how to choose the optical devices with large aperture are given, and a method that aligns the pointing direction to compensate pointing and tracking errors is suggested. The work will contribute to the design of free-space laser communication systems.  相似文献   

13.
A novel double-image encryption algorithm is proposed, which can simultaneously encrypt two images into a single one as the amplitude of gyrator transform with two different groups of angles. The two original images can be retrieved independently by gyrator transforms with two different groups of angles, one common phase mask, and two different private phase masks. The proposed approach can enlarge the key space, achieve faster convergence in iterative process, and avoid cross-talk between two images in reconstruction. Numerical simulations are presented to verify its validity and efficiency.  相似文献   

14.
We propose a method for image encryption by multiple-step random phase encoding with an undercover multiplexing operation. The true image is stored in a multiple record we call encodegram; and then we can reconstruct it by the use of the appropriate random phase masks and a retrieval protocol. To increase the security of the true hidden image and confuse unauthorized receivers, we add to the encodegram an encoded fake image with different content. This fake image has only a small effect on the retrieval of the true hidden image, owing to the specific property of this protocol. In the decryption step, we can reveal the true image by applying the inverse protocol to two cyphertexts, one the encodegram containing the true image along with the fake image; and the other helping to get the random phase key to achieve the true image. Computer simulations verify the validity of this method for image encryption. Digital implementation of the method makes it particularly suitable for the remote transmission of information.  相似文献   

15.
By means of manipulating the phase information of the object beam in an off-axis digital holographic setup, we show that it is possible to fully eliminate the zero-order diffraction (ZOD) from numerically reconstructed holograms. Two different approaches are presented. In the first method, we introduce a ground glass on the object path beam to provide a random phase illumination. The subtraction between two holograms recorded with different positions of the ground glass yields a ZOD free hologram. In the second approach, a piece of window glass inserted on the path of the object beam produces a constant phase shift. The subtraction of two holograms, one recorded with and one without window glass generates a new hologram whose numerical reconstruction is ZOD free. Theoretical models and experimental results are shown to validate our proposals. They show that the proposed methods totally remove the ZOD without ruining the object information.  相似文献   

16.
Applications of gyrator transform for image processing   总被引:1,自引:0,他引:1  
Gyrator transform is a new tool for manipulation of two-dimensional signals such as images or laser beam profiles. Here we demonstrate various applications of the gyrator transform for image processing. Several aspects such as noise reduction, filtering and encryption in the gyrator domains are discussed. These operations can be performed by numerical calculations or by an appropriate optical set up.  相似文献   

17.
Controllable experimental features such as wavelength, camera’s specifications and reconstruction distance, determine the theoretical limit for lateral resolution in digital holography; however, due to the speckle noise associated to any coherent imaging system it is not possible to reach this theoretical limit. In this paper, a quantitative study the lateral resolution for digital holography under the effect the speckle noise is carried out. It is shown that by reducing the contrast of the speckle noise the resolution capabilities of digital holography are improved; the signal-to-noise ratio of the reconstructed holograms is the metric use to quantitatively assess the reached resolution in the holographic experiments.  相似文献   

18.
An optical filter, that remarkably increases the efficiency of fiber wavelength converters is proposed. Simulations show that required input powers are reduced by 50% and the maximum output powers are increased by a factor of three, when compared with equivalent systems. It is also shown that the proposed filter leads to back-to-back power penalties of 2 dB, increasing the dispersion tolerance of the converted signal by 25%. The filter’s practical implementation aspects of are assessed, showing that the main limitation results from highly demanding spectral characteristics.  相似文献   

19.
For the optical spectrum region, we describe a novel phase-coded aperture imaging system that can be used in a computational imaging camera. The optical design includes a phase-only screen followed by a detector array. A specific diffraction pattern forms at the detector array when the wavefront from a point source object passes through the phase screen. Since diffraction effects cannot be ignored in the optical regime, an iterative phase retrieval method is used to calculate the phase coded screen. Correlation type processing can be applied for the image recovery. Computer simulation results are presented to illustrate the excellent imaging performance of this camera.  相似文献   

20.
A new cryptology in dual fractional Fourier-wavelet domain is proposed in this paper, which is calculated by discrete fractional Fourier transform and wavelet decomposition. Different random phases are used in different wavelet subbands in encryption. A new color image encoding method is also presented with basic color decomposition and encryption respectively. All the keys, including random phases and fractional orders in R, G and B three channels, should be correctly used in decryption, otherwise people cannot obtain the totally correct information. Some numerical simulations are presented to demonstrate the possibility of the method. It would have widely potential applications in digital color image processing and protection.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号