首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
The shift-tolerance property of the encrypted image or the Fourier decrypting key in the Fourier space is proposed based on a phase-encoded virtual image. The encrypted data is obtained by the Fourier transform of the product of a phase-encoded virtual image to camouflage the original one and a random phase image. Therefore, even if unauthorized users analyze the encrypted image, they cannot reconstruct the required image. This virtual image protects the original one from being counterfeited and from unauthorized access. We demonstrate the robustness to data loss and shift of the encrypted data or the Fourier decrypting key in the proposed decryption technique using an interferometer.  相似文献   

2.
A new gray-level image encryption scheme based on phase-encoded exclusive-OR (XOR) operations and a full phaseencoding method is presented. The gray-level image can be sliced into binary images which have the same pixel level, and each of them is encrypted by phase-encoded XOR operations with each phase-encoded binary random image. We combine XORed images and phase-encoded binary random images into an encrypted image and a key image, respectively. Gray-level encrypted data and key data are obtained by the phase-encoding process of the encrypted image and the key image in a space domain. The decryption process is simply implemented by using a phasevisualization system and the performance of the proposed scheme is evaluated by computer simulation.  相似文献   

3.
A phase-only encryption scheme using phase-encoded exclusive-OR (XOR) rules in a Fourier plane and a single path decryption system are presented. To generate phase-only encrypted data, a zero-padded original image, multiplied by a random phase image, is Fourier transformed and its real-valued data is encrypted with key data by using phase-encoded XOR rules. Since the original information is encrypted on the Fourier plane, the proposed encryption is more tolerant to loss of key information by scratching or cutting than previous XOR encryption in a space domain. A decryption is simply performed based on 2-f setup with spatial filter by Fourier transform for multiplication phase-only encrypted data with phase-only key data. Due to single path architecture without a reference wave, the proposed system is resistant to mechanical vibrations and fluctuation. Numerical simulations have confirmed the validity of the proposed encryption scheme and simple decryption architecture.  相似文献   

4.
用于光学图象加密的分数傅里叶变换双相位编码   总被引:12,自引:5,他引:7  
于力  朱邦和  刘树田 《光子学报》2001,30(7):904-907
作者提出了一种用于图象加密的基于分数傅里叶变换的双相位编码技术.该方法由于密钥比传统的编码技术增加两重,因而其安全性有所改进.  相似文献   

5.
孙杰 《光学技术》2017,43(3):279-283
为了扩展双图像光学加密算法的密钥空间,克服双随机相位加密系统中随机相位掩模作为密钥难于存储、传输和重构的问题,突破传统图像加密的研究思路,提出了一种基于多混沌系统的双图像加密算法,构造了光学加密系统。系统增加混沌系统参数作为密钥,利用混沌加密密钥空间大和图像置乱隐藏性好的特点,构建基于Logistic混沌映射的图像置乱算法,利用Kent混沌映射生成的伪随机序列构造出一对随机相位掩模,分别放置在分数傅里叶变换光学装置的两端,图像经加密系统变换后得到密文。数值仿真结果表明,算法的密钥敏感性极高,能够有效地对抗统计攻击,具有较高的安全性。  相似文献   

6.
基于级联相位恢复算法的光学图像加密   总被引:12,自引:4,他引:8  
于斌  彭翔 《光学学报》2005,25(7):81-884
在虚拟光学数据加密理论模型的基础上,提出了一种光学图像加密的可视化密码构造算法。该加密算法基于自由空间传播的光学系统,利用级联迭代角谱相位恢复算法把待加密图像分别编码到两块相位模板之中,从而实现图像的加密。该加密技术不但可通过同时调整两块相位模板的相位分布的搜索策略来扩大搜索空间,提高安全强度,而且扩大了系统密钥空间,使系统获得更高的安全性,且能通过简单的数值运算或光学实验装置得到质量非常高的解密图像,还从理论上分析了该算法的时间复杂度。计算机模拟结果表明,该加密算法的收敛速度快,能迅速找到非常好的近似解,解密图像质量高且系统安全性良好。  相似文献   

7.
We demonstrate a deterministic phase-encoded encryption system based on the digital holography and adopted a lenticular lens array (LLA) sheet as a phase modulator. In the proposed scheme the holographic patterns of encrypted images are captured digitally by a digital CCD. This work also adopt a novel, simple and effective technique that is used to suppress numerically the major blurring caused by the zero-order image in the numerical reconstruction. The decryption key is acquired as a digital hologram, called the key hologram. Therefore, the retrieval of the original information can be achieved by multiplying the encrypted hologram with a numerical generated phase-encoded wave. The storage and transmission of all holograms can be carried out by all-digital means. Simulation and experimental results demonstrate that the proposed approach can be operated in single procedure only and represent the satisfactory decrypted image. Finally, rotating and shifting the LLA is applied to investigate the tolerance of decryption to demonstrate the feasibility in the holographic encryption, as well as can also be used to provide the higher security.  相似文献   

8.
Image encryption algorithms typically transform a plain image into a noise-like cipher image, whose appearance is an indication of encrypted content. Bao and Zhou [Image encryption: Generating visually meaningful encrypted images, Information Sciences 324, 2015] propose encrypting the plain image into a visually meaningful cover image. This improves security by masking existence of encrypted content. Following their approach, we propose a lossless visually meaningful image encryption scheme which improves Bao and Zhou's algorithm by making the encrypted content, i.e. distortions to the cover image, more difficult to detect. Empirical results are presented to show high quality of the resulting images and high security of the proposed algorithm. Competence of the proposed scheme is further demonstrated by means of comparison with Bao and Zhou's scheme.  相似文献   

9.
Seo DH  Kim SJ 《Optics letters》2003,28(5):304-306
An improved image decryption system is proposed that is based on phase-encoded images and the principle of interference and uses a reference wave. A novel technique for generating intensity patterns from the decrypted phase information consists simply of interfering a reference wave with the wave passing through the encrypted image and a phase-only decrypting key. Optical experiments have confirmed the proposed technique as a simple and robust architecture for optical encryption.  相似文献   

10.
基于随机相位实值编码的光学图像加密   总被引:7,自引:7,他引:0  
李榕  李萍 《光子学报》2004,33(5):605-608
提出了一种用于图像加密的随机相位实值编码方法,待编码的纯相位图像与一个随机相位掩膜一起作傅里叶变换,取其实部作为编码图像.已编码的图像和随机相位掩膜的傅里叶变换相加作傅里叶反变换,反变换的光强可以准确地重建原图像.该编译码方法简单,编码图像是一个实值图像,便于计算机打印或显示输出.  相似文献   

11.
基于全息技术的光学加密系统实值编码   总被引:2,自引:1,他引:1  
李萍  李榕 《光子学报》2008,37(5):957-959
提出一种基于全息技术用于光学图像加密的实值编码方法.待编码的数字图像与一个大小相同、灰度值为零的图像组成一幅新的图像,然后与一个随机相位掩膜一起通过光学透镜作傅里叶变换,取变换结果的实部作为编码输出图像.利用全息记录的方法解码,即编码输出图像和随机相位掩膜的傅里叶变换相加通过光学透镜作傅里叶反变换,记录反变换的光强分布,再通过非线性变换或灰度变换的方法可以恢复原图像.  相似文献   

12.
A novel double-image encryption algorithm is proposed, based on discrete fractional random transform and chaotic maps. The random matrices used in the discrete fractional random transform are generated by using a chaotic map. One of the two original images is scrambled by using another chaotic map, and then encoded into the phase of a complex matrix with the other original image as its amplitude. Then this complex matrix is encrypted by the discrete fractional random transform. By applying the correct keys which consist of initial values, control parameters, and truncated positions of the chaotic maps, and fractional orders, the two original images can be recovered without cross-talk. Numerical simulation has been performed to test the validity and the security of the proposed encryption algorithm. Encrypting two images together by this algorithm creates only one encrypted image, whereas other single-image encryption methods create two encrypted images. Furthermore, this algorithm requires neither the use of phase keys nor the use of matrix keys. In this sense, this algorithm can raise the efficiency when encrypting, storing or transmitting.  相似文献   

13.
A new optical security system is proposed using a shifted phase-encoded joint transform correlation (JTC) architecture. In the proposed technique, at first, the address code is fed into two channels where one channel is shifted by 180°. The output signals from both the channels are phase-masked and then added with the input image to be encrypted. The joint power spectrum (JPS) obtained from one channel is subtracted from the JPS of the other channel, and the modified JPS is inverse Fourier transformed to yield the encrypted image. For decryption, the received signal is Fourier transformed and multiplied by the phase mask and the address code, which is then inverse Fourier transformed to generate the output signal. The proposed technique does not require complex conjugate of the address code otherwise required in the classical double random phase encryption. Also the decryption result is much more enhanced when compared to the output generated by alternate JTC techniques. Computer simulation results verify that the encryption and decryption are very much secure and efficient in both noise-free and noisy conditions.  相似文献   

14.
A new optical encryption method is proposed in this paper to achieve multiple images encryption. We introduce reference waves with different incident angles and random amplitude masks into a Fourier transform hologram configuration to encrypt multiple images. In the encryption procedure, different random amplitude masks (RAMs) which are placed into the reference arm vertically admit the multiplexing capability. When decrypting one of the original images, reference wave with the same incident angle as encrypting the target image is used to illuminate the encrypted hologram with the insertion of random amplitude mask whose transmissivity is reciprocal of that of the encrypting random amplitude mask in the reference arm. We also simulate and analyze the influence of partly wrong decrypting key on the decrypted results. Numerical simulation proves that the proposed encryption method is valid and of high security level.  相似文献   

15.
In a secret communication system using chaotic synchronization, the communication information is embedded in a signal that behaves as chaos and is sent to the receiver to retrieve the information. In a previous study, a chaotic synchronous system was developed by integrating the wave equation with the van der Pol boundary condition, of which the number of the parameters are only three, which is not enough for security. In this study, we replace the nonlinear boundary condition with an artificial neural network, thereby making the transmitted information difficult to leak. The neural network is divided into two parts; the first half is used as the left boundary condition of the wave equation and the second half is used as that on the right boundary, thus replacing the original nonlinear boundary condition. We also show the results for both monochrome and color images and evaluate the security performance. In particular, it is shown that the encrypted images are almost identical regardless of the input images. The learning performance of the neural network is also investigated. The calculated Lyapunov exponent shows that the learned neural network causes some chaotic vibration effect. The information in the original image is completely invisible when viewed through the image obtained after being concealed by the proposed system. Some security tests are also performed. The proposed method is designed in such a way that the transmitted images are encrypted into almost identical images of waves, thereby preventing the retrieval of information from the original image. The numerical results show that the encrypted images are certainly almost identical, which supports the security of the proposed method. Some security tests are also performed. The proposed method is designed in such a way that the transmitted images are encrypted into almost identical images of waves, thereby preventing the retrieval of information from the original image. The numerical results show that the encrypted images are certainly almost identical, which supports the security of the proposed method.  相似文献   

16.
Chun-Hui Niu  Yan Zhang  Ben-Yuan Gu   《Optik》2006,117(11):516-524
We propose a new optical encryption and verification technique in which multiple frames of images recorded by different wavelengths can be synchronously encrypted into double pure phase masks (PMs). The height distributions of the two surface-relief PMs are designed by using an iterative phase-retrieval algorithm in combination with the conjugate-gradient method. Two PMs are located at the predesigned positions in the verification system. When a plane wave with a correct wavelength illuminates the optical verification system, the corresponding image is extracted to display on the output plane. Another incident plane wave with other different wavelength which was used in recording can produce another image. Only when all the frames of images recorded by different wavelengths are obtained, the user can then pass through the verification procedure. Compared with the previous encryption and verification technique, these predesigned wavelengths can be used as additional verification keys, which should significantly enhance the security of system. Numerical simulation shows that the proposed technique can successfully reconstruct the verification images for the authorized user having all the correct keys, but never for any unauthorized intruder.  相似文献   

17.
Matoba O  Javidi B 《Optics letters》2002,27(5):321-323
Secure data transmission by use of encrypted digital holograms and an optical retrieval system for secure real-time display are proposed. Original images are encrypted by a double-random phase encryption technique and then are recorded as digital holograms in a CCD, together with a reference plane wave. This digital hologram of the encrypted image can be transmitted to receivers via any conventional electronic or digital communication channels. The decryption key is also recorded as a digital hologram. At the receiver, the original image can be retrieved by an optical correlation-based reconstruction process. Both encryption and retrieval can be performed by all-optical means, and thus a real-time secure display can be implemented. We demonstrate the proposed system numerically and experimentally.  相似文献   

18.
Known-plaintext attack on a joint transform correlator encrypting system   总被引:1,自引:0,他引:1  
We demonstrate in this Letter that a joint transform correlator shows vulnerability to known-plaintext attacks. An unauthorized user, who intercepts both an object and its encrypted version, can obtain the security key code mask. In this contribution, we conduct a hybrid heuristic attack scheme merge to a Gerchberg-Saxton routine to estimate the encrypting key to decode different ciphertexts encrypted with that same key. We also analyze the success of this attack for different pairs of plaintext-ciphertext used to get the encrypting code. We present simulation results for the decrypting procedure to demonstrate the validity of our analysis.  相似文献   

19.
An information hiding method based on the optical interference principle is proposed. In this method, a secret image can be obtained by two light beams' interference. One of the beams is modulated by our assigned host image; and the other is modulated by a noise-like complex distribution, which is regard as the encrypted image. The transmission of the encrypted image can be implemented by hiding it in the host image to prevent the communication from being perceived by unauthorized person. In addition, this method can also realize simultaneous encryption and hiding for two images. A series of numerical simulation results are presented to verify the feasibility of our proposed method.  相似文献   

20.
双随机相位图像加密的实值编码研究   总被引:7,自引:5,他引:2  
李榕  李萍 《光子学报》2005,34(6):952-955
提出了一种基于双随机相位的图像实值编码方法,该方法可应用于光学图像加密.要编码的纯相位图像分别在空间域和频域加入随机相位掩膜,其中在频域将编码范围扩大4倍,经过光学系统的变换,将生成的图像取实部作为编码图像.实值编码的图像利用与编码过程类似的方法进行解码,可以准确地重建原图像.该编译码方法简单,编码图像是一个近似随机噪声的实值图像,便于数字图像的传输与输出.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号