首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
一种基于角谱理论的改进型相位恢复迭代算法   总被引:2,自引:0,他引:2       下载免费PDF全文
刘宏展  纪越峰 《物理学报》2013,62(11):114203-114203
进行星间激光通信的光学发射天线光束整形器设计时, 首要解决的问题是根据输入光场及理想的输出光场, 确定整形器的相位分布, 其核心就是相位恢复. 基于角谱传播理论, 在传统 Gerchberg-Saxton (G-S)迭代算法的基础上, 提出了一种幅度梯度加成迭代算法, 给出了算法的详细流程与分析. 与G-S相比, 新算法利用迭代过程, 构建光场幅度反馈回路, 利用梯度搜索最佳迭代路径, 两者的联合作用加速其迭代收敛进程. 数值仿真表明, 新算法的单位迭代次数所引起迭代误差下降的速度是G-S算法的1.7倍, 其收敛速度明显优于G-S算法; 对不同的随机初始相位, 新算法都能进行有效迭代, 表现出适应性强, 且收敛一致性好的优点. 幅度梯度加成迭代算法为复杂光场的高效相位恢复提供了一种新思路, 为设计各种衍射光学元件提供了技术支持. 关键词: 相位恢复 迭代算法 角谱理论 光通信  相似文献   

2.
A multiple-image encryption method is proposed that is based on row scanning compressive ghost imaging, (t, n) threshold secret sharing, and phase retrieval in the Fresnel domain. In the encryption process, after wavelet transform and Arnold transform of the target image, the ciphertext matrix can be first detected using a bucket detector. Based on a (t, n) threshold secret sharing algorithm, the measurement key used in the row scanning compressive ghost imaging can be decomposed and shared into two pairs of sub-keys, which are then reconstructed using two phase-only mask (POM) keys with fixed pixel values, placed in the input plane and transform plane 2 of the phase retrieval scheme, respectively; and the other POM key in the transform plane 1 can be generated and updated by the iterative encoding of each plaintext image. In each iteration, the target image acts as the input amplitude constraint in the input plane. During decryption, each plaintext image possessing all the correct keys can be successfully decrypted by measurement key regeneration, compression algorithm reconstruction, inverse wavelet transformation, and Fresnel transformation. Theoretical analysis and numerical simulations both verify the feasibility of the proposed method.  相似文献   

3.
基于级联相位恢复算法的光学图像加密   总被引:12,自引:4,他引:8  
于斌  彭翔 《光学学报》2005,25(7):81-884
在虚拟光学数据加密理论模型的基础上,提出了一种光学图像加密的可视化密码构造算法。该加密算法基于自由空间传播的光学系统,利用级联迭代角谱相位恢复算法把待加密图像分别编码到两块相位模板之中,从而实现图像的加密。该加密技术不但可通过同时调整两块相位模板的相位分布的搜索策略来扩大搜索空间,提高安全强度,而且扩大了系统密钥空间,使系统获得更高的安全性,且能通过简单的数值运算或光学实验装置得到质量非常高的解密图像,还从理论上分析了该算法的时间复杂度。计算机模拟结果表明,该加密算法的收敛速度快,能迅速找到非常好的近似解,解密图像质量高且系统安全性良好。  相似文献   

4.
基于光学4f级联系统,采用前向迭代算法和通过产生多个随机相位板对图像进行了加密和解密。给出了该方法的原理和迭代实现的过程。对该方法在收敛速度、解密图像质量、相位板数目和相位量化阶数对解密图像质量的影响以及保密和安全性能等方面进行了分析和研究。模拟结果表明,该方法收敛速度快,解密图像质量好,可以降低相位板相位量化阶数有限所引起的误差对解密图像质量的影响,图像的安全和保密性能也得到了很大的提高。  相似文献   

5.
在传统的双随机相位光学加密系统的基础上,提出一种新的单强度记录光学加密技术。在加密时,将原始图像置于4-f系统的输入平面上进行双随机相位光学加密,利用CCD等感光器件记录输出平面上的光强分布作为密文,该光学加密过程只需一次曝光,在解密时,利用相位恢复算法进行迭代计算就可以由密文恢复原始图像。由于解密过程采用数字方式,因此可以在解密过程中引入各种数字图像处理技术来抑制散斑噪声,进一步改善解密图像质量。通过一系列仿真实验,证明该光学加密系统可以实现对二值图像和灰度图像的光学加密,并且能够很好地抵御已知明文攻击、选择明文攻击等方法的攻击。理论分析和计算机仿真表明,该光学加密技术系统结构简单,实现方便,并且不易受到各种攻击,安全性较高。  相似文献   

6.
Previous studies have shown that iterative in-line X-ray phase retrieval algorithms may have higher precision than direct retrieval algorithms. This communication compares three iterative phase retrieval algorithms in terms of accuracy and efficiency using computer simulations. We found the Fourier transformation based algorithm (FT) is of the fastest convergence, while the Poisson-solver based algorithm (PS) has higher precision. The traditional Gerchberg-Saxton algorithm (GS) is very slow and sometimes does not converge in our tests. Then a mixed FT-PS algorithm is presented to achieve both high efficiency and high accuracy. The mixed algorithm is tested using simulated images with different noise level and experimentally obtained images of a piece of chicken breast muscle.  相似文献   

7.
Xiao-Gang Wang 《中国物理 B》2022,31(9):94202-094202
The two types of nonlinear optical cryptosystems (NOCs) that are respectively based on amplitude-phase retrieval algorithm (APRA) and phase retrieval algorithm (PRA) have attracted a lot of attention due to their unique mechanism of encryption process and remarkable ability to resist common attacks. In this paper, the securities of the two types of NOCs are evaluated by using a deep-learning (DL) method, where an end-to-end densely connected convolutional network (DenseNet) model for cryptanalysis is developed. The proposed DL-based method is able to retrieve unknown plaintexts from the given ciphertexts by using the trained DenseNet model without prior knowledge of any public or private key. The results of numerical experiments with the DenseNet model clearly demonstrate the validity and good performance of the proposed the DL-based attack on NOCs.  相似文献   

8.
We propose a multiple-image hiding scheme based on the amplitude- and phase-truncation approach, and phase retrieval iterative algorithm in the fractional Fourier domain. The proposed scheme offers multiple levels of security with asymmetric keys. Multiple input images multiplied with random phase masks are independently fractional Fourier transformed with different orders. The individual keys and common keys are generated by using phase and amplitude truncation of fractional spectrum. After using two fractional Fourier transform, the resultant encrypted image is hided in a host image with phase retrieval iterative algorithm. Using the correct universal keys, individual keys, and fractional orders, one can recover the original image successfully. Computer simulation results with four gray-scale images support the proposed method. To measure the validity of the scheme, we calculated the mean square error between the original and the decrypted images. In this scheme, the encryption process and generation of decryption keys are complicated and should be realized using computer. For decryption, an optoelectronic setup has been suggested.  相似文献   

9.
丁敏  薛晖  吴博  孙兵兵  刘政  黄志祥  吴先良 《物理学报》2013,62(4):44218-044218
基于传统反演算法和Kramers-Kronig关系改进算法, 分别提取弱耦合和强耦合超材料渔网结构模型的等效参数, 并对两种算法的有效性及普适性进行了探讨.理论分析及计算结果表明, 传统的反演算法可以准确地反演弱、强耦合情形下电磁超材料结构的等效参数, 但计算复杂度较高;而基于Kramers-Kronig关系的改进算法巧妙地降低了计算的复杂度, 能简单准确地提取弱耦合情形下电磁超材料结构的等效参数, 但对于强耦合情形则不适用, 原因在于强耦合情形破坏了Kramers-Kronig关系的解析且连续性要求. 研究结果拓展了等效媒质理论并可为新的电磁超材料的设计提供理论参考. 关键词: 超材料 反演算法 Kramers-Kronig关系 等效参数  相似文献   

10.
In this paper, we propose a new method in the structured-illumination-based lensless diffractive imaging using variable grating pitches. When a phase grating pitch is sequentially changed, a series of diffraction patterns can be recorded by a charge-coupled device (CCD) camera. Subsequently, a phase retrieval algorithm with a rapid convergence rate is developed to recover a high-quality object from the recorded diffraction patterns. The proposed method is further applied to optical image encryption, and simulation results are presented to demonstrate validity of the proposed method.  相似文献   

11.
傅健  李鹏 《中国物理 B》2013,(1):243-248
Coherent diffractive imaging (CDI) is a lensless imaging technique and can achieve a resolution beyond the Rayleigh or Abbe limit. The ptychographical iterative engine (PIE) is a CDI phase retrieval algorithm that uses multiple diffraction patterns obtained through the scan of a localized illumination on the specimen, which has been demonstrated successfully at optical and X-ray wavelengths. In this paper, a general PIE algorithm (gPIE) is presented and demonstrated with an He-Ne laser light diffraction dataset. This algorithm not only permits the removal of the accurate model of the illumination function in PIE, but also provides improved convergence speed and retrieval quality.  相似文献   

12.
傅健  李鹏 《中国物理 B》2013,22(1):14204-014204
Coherent diffractive imaging (CDI) is a lensless imaging technique and can achieve a resolution beyond the Rayleigh or Abbe limit. The ptychographical iterative engine (PIE) is a CDI phase retrieval algorithm that uses multiple diffraction patterns obtained through the scan of a localized illumination on the specimen, which has been demonstrated successfully at optical and X-ray wavelengths. In this paper, a general PIE algorithm (gPIE) is presented and demonstrated with an He-Ne laser light diffraction dataset. This algorithm not only permits the removal of the accurate model of the illumination function in PIE, but also provides improved convergence speed and retrieval quality.  相似文献   

13.
This paper proposes a hybrid Rao-Nelder–Mead (Rao-NM) algorithm for image template matching is proposed. The developed algorithm incorporates the Rao-1 algorithm and NM algorithm serially. Thus, the powerful global search capability of the Rao-1 algorithm and local search capability of NM algorithm is fully exploited. It can quickly and accurately search for the high-quality optimal solution on the basis of ensuring global convergence. The computing time is highly reduced, while the matching accuracy is significantly improved. Four commonly applied optimization problems and three image datasets are employed to assess the performance of the proposed method. Meanwhile, three commonly used algorithms, including generic Rao-1 algorithm, particle swarm optimization (PSO), genetic algorithm (GA), are considered as benchmarking algorithms. The experiment results demonstrate that the proposed method is effective and efficient in solving image matching problems.  相似文献   

14.
An image encryption scheme has been presented by using two structured phase masks in the fractional Mellin transform (FrMT) plane of a system, employing a phase retrieval technique. Since FrMT is a non-linear integral transform, its use enhances the system security. We also add further security features by carrying out spatial filtering in the frequency domain by using a combination of two phase masks: a toroidal zone plate (TZP) and a radial Hilbert mask (RHM). These masks together increase the key space making the system more secure. The phase key used in decryption has been obtained by applying an iterative phase retrieval algorithm based on the fractional Fourier transform. The algorithm uses amplitude constraints of secret target image and the ciphertext (encrypted image) obtained from multiplication of fractional Mellin transformed arbitrary input image and the two phase masks (TZP and RHM). The proposed encryption scheme has been validated for a few grayscale images, by numerical simulations. The efficacy of the scheme has been evaluated by computing mean-squared-error (MSE) between the secret target image and the decrypted image. The sensitivity analysis of the decryption process to variations in various encryption parameters has also been carried out.  相似文献   

15.
Watermarking is a solution to the problem of copyright protection of multimedia documents over the Internet. This paper presents a block based watermarking scheme using the singular value decomposition (SVD) algorithm to embed encrypted watermarks into digital images. The paper compares between the traditional method of Liu and the proposed method for embedding encrypted watermarks. Also, a permutation based encryption algorithm and a diffusion based encryption algorithm are compared as the watermark encryption algorithms. Experimental results show that the proposed method is superior to the traditional method of Liu for embedding encrypted watermarks and extracting them efficiently under attacks. Results also show that it is preferred to use permutation based encryption algorithms than diffusion based encryption algorithms for watermark encryption due to their lower sensitivity to attacks.  相似文献   

16.
Based on 1-D fractional Fourier transform, we proposed an image encryption algorithm in order to hide two images simultaneously. When the fractional order is closed to 1, most energy in frequency domain is centralized in the center part of spectrum. The image can be recovered acceptable by using a half of spectrum, which locates in the middle part at x-direction or y-direction. Cutting operation is employed in order to combine two spectra. Double random phase encoding is employed for image encryption. The corresponding numerical simulations are performed to demonstrate the validity and efficiency of the algorithm.  相似文献   

17.
Recently, an image fusion encryption algorithm [Optik 124 (18) (2013) 3596–3600] was proposed based on DNA sequence operation and hyper-chaotic system. The security of this algorithm depends mainly on both five keys as the initial conditions of hyper-chaotic system and a key image. In this paper, we cryptanalyze the algorithm and find that two chaotic keystream determined by the five keys keep unchanged for different image encryption processes. The two chaotic keystream can be revealed and the computational complexity is approximately O(mn), where m and n represent the height and width, respectively. In addition, the key image needs to be changed for each encryption. Finally, experimental results also verify our idea.  相似文献   

18.
A novel information security system based on multiple-phase retrieval by an iterative gyrator transform algorithm is proposed. In this method, a series of phase masks are designed and located in the input plane and the gyrator planes, and the phase distributions of all the masks are adjusted simultaneously in each iteration. It can achieve fast convergence and high quality of the recovered image and can provide a higher degree of freedom in key space with more parameters as supplementary keys. Furthermore, the security level of this method is greatly improved by the sensitivity of recovered images with the angles of gyrator transform. Numerical simulations are presented to verify its validity and efficiency.  相似文献   

19.
基于压缩传感的纯相位物体相位恢复   总被引:1,自引:0,他引:1       下载免费PDF全文
杨振亚  郑楚君 《物理学报》2013,62(10):104203-104203
传统的相位恢复算法通过双强度或者单强度测量的数据进行迭代运算以恢复丢失的相位信息, 它要求采样数据必须满足香农采样定理.当成像的分辨率较高时, 大量的测量数据势必会对数据采样设备提出更多的要求.因此, 为减少采样负担, 本文提出了一种基于压缩传感的相位恢复算法, 通过在傅里叶面的少量单强度测量数据, 应用改进的混合输入输出算法来恢复纯相位物体的相位分布.在采样数据远小于采样定理所需的条件时, 该算法仍能精确地恢复相位分布具有分块均匀特征的纯相位物体.数值仿真实验表明该算法具有良好的收敛性能. 关键词: 相位恢复 压缩传感  相似文献   

20.
This paper proposes a more efficient attack method on an image fusion encryption algorithm based on DNA operation and hyperchaos. Although several references have reported some methods to crack the image encryption algorithm, they are not the most efficient. The proposed chosen-plaintext attack method can break the encryption scheme with (4×N/M+1) or (M/(4×N)+1) chosen-plaintext images, which is much less than the number of chosen-plaintext images used in the previous cracking algorithms, where M and N represent the height and width of the target ciphertext image, respectively. The effectiveness of the proposed chosen-plaintext attack is supported by theoretical analysis, and verified by experimental results.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号