共查询到20条相似文献,搜索用时 22 毫秒
1.
A digital holographic information system can process complex three-dimensional (3-D) object information. We demonstrate a scheme for securing complex and 3-D information in the context of in-line digital holography. Double random phase encoding in the free-space propagation domain of light is used to secure the complex information. Encrypted in-line digital holograms are recorded using the position-phase-shifting method. The encrypted complex image at the CCD recording plane is retrieved from the real-valued digital holograms, and is used for decryption. The robustness of the method has also been studied for various securing keys used in the method against blind decryption. A layer-by-layer information retrieval from the encrypted digital hologram is also discussed. The method can also be used to secure digital complex information in a virtual optics modality using holographic principles. 相似文献
2.
Securing information by use of digital holography 总被引:41,自引:0,他引:41
An information security method that uses a digital holographic technique is presented. An encrypted image is stored as a digital hologram. The decryption key is also stored as a digital hologram. The encrypted image can be electrically decrypted by use of the digital hologram of the key. This security technique provides secure storage and data transmission. Experimental results are presented to demonstrate the proposed method. 相似文献
3.
G.-L. Chen W.-K. Yang J. C. Wang C.-C. Chang 《Applied physics. B, Lasers and optics》2008,93(2-3):473-479
We demonstrate a deterministic phase-encoded encryption system based on the digital holography and adopted a lenticular lens array (LLA) sheet as a phase modulator. In the proposed scheme the holographic patterns of encrypted images are captured digitally by a digital CCD. This work also adopt a novel, simple and effective technique that is used to suppress numerically the major blurring caused by the zero-order image in the numerical reconstruction. The decryption key is acquired as a digital hologram, called the key hologram. Therefore, the retrieval of the original information can be achieved by multiplying the encrypted hologram with a numerical generated phase-encoded wave. The storage and transmission of all holograms can be carried out by all-digital means. Simulation and experimental results demonstrate that the proposed approach can be operated in single procedure only and represent the satisfactory decrypted image. Finally, rotating and shifting the LLA is applied to investigate the tolerance of decryption to demonstrate the feasibility in the holographic encryption, as well as can also be used to provide the higher security. 相似文献
4.
Secure optical system that uses fully phase-based encryption and lithium niobate crystal as phase contrast filter for decryption 总被引:1,自引:0,他引:1
In this paper, the implementation of a secure optical system using fully phase encryption is described. A two-dimensional phase image obtained from an amplitude image is encrypted and decrypted by using a spatial light modulator working in phase mode. The fully phase encryption is achieved using double random phase encoding. The encrypted image is holographically recorded in a photorefractive crystal and is then decrypted by generating, through phase conjugation, the conjugate of the encrypted image. A lithium niobate crystal has been used as a phase contrast filter to change the decrypted phase image into an amplitude image, thus alleviating the need for alignment of the phase contrast set-up in the Fourier plane. Simulation results are provided to verify the proposed study. The mean square error between the primary image and decrypted image has been calculated to study the sensitivity of the system. 相似文献
5.
In this paper, we have described a simple and secure double random phase encoding and decoding system to encrypt and decrypt a two-dimensional gray scale image. We have used jigsaw transforms of the second random phase mask and the encrypted image. The random phase mask placed in the Fourier plane is broken into independent non-overlapping segments by applying the jigsaw transform. To make the system more secure, a jigsaw transform on the encrypted image is also carried out. The encrypted image is also broken into independent non-overlapping segments. The jigsaw transform indices of random phase code and the encrypted image form the keys for the successful retrieval of the data. Encrypting with this technique makes it almost impossible to retrieve the image without using both the right keys. Results of computer simulation have been presented in support of the proposed idea. Mean square error (MSE) between the decrypted and the original image has also been calculated in support of the technique. 相似文献
6.
7.
In this paper, we propose a novel method to encrypt a color image based on Arnold transform (ART) and interference method. A color image is decomposed into three independent channels, i.e., red, green and blue, and each channel is then encrypted into two random phase masks based on the ART and interference method. Light sources with corresponding wavelengths are used to illuminate the retrieved phase-only masks during image decryption. The influence of security parameters on decrypted images is also analyzed. Numerical simulation results are presented to illustrate the feasibility and effectiveness of the proposed method. 相似文献
8.
An improved optical security system is proposed based on three phase-encoded images and the principle of interference. This optical system consists of one phase-encoded virtual image to be encrypted and two phase-encoded images, encrypting image and decrypting key. The proposed encryption is performed by the multiplication of an encrypting image and a phase-encoded virtual image which does not contain any information from the decrypted (original) image. Therefore, even if an unauthorized user steals and analyzes the encrypted image, he cannot reconstruct the required image. This virtual image protects the original image from counterfeiting and unauthorized access. Optical experiments show the proposed method is a very useful optical security system. 相似文献
9.
In the present paper, we describe the encryption and decryption of two-dimensional images. The encryption is done by employing a sandwich phase diffuser made by using two elongated speckle patterns, and placed in the Fourier plane of a double random phase encoding system. After encryption, the two constituent phase diffusers of such a sandwich diffuser are separated. During decryption, if the conjugate of either of the two elongated phase speckle patterns is used, the image cannot be retrieved. Correct decryption is also not possible if a sandwich diffuser with any of the phase speckle patterns is shifted in position with respect to the other. For decryption, the encrypted image is Fourier transformed and multiplied by the conjugate of the sandwich diffuser, and then the product is further Fourier transformed. It is possible to generate the image only if both the elongated phase speckle patterns are matched point-to-point and then the proper conjugate is made. The use of elongated speckle patterns in constituting a sandwich phase diffuser makes the system less complicated as compared to the use of a sandwich diffuser made with normal speckle patterns, enabling an easy alignment of the random phase diffuser at the time of rejoining the constituent diffusers for making the right key. The ease of alignment is due to the reduction of the requirement of 360° scanning at the time of rejoining these diffusers with little reduction in the security of the system. Simulation results are presented in support of the proposed idea. For optical implementation, the decrypted image may be obtained by generating a phase conjugate wave by the phase conjugation technique, and passing through the same sandwich phase diffuser. To evaluate the reliability of the technique, mean square error (MSE) between the decrypted and original image has been calculated. 相似文献
10.
In this paper, we implement a fully phase-encrypted memory system using cascaded extended fractional Fourier transform (FRT). We encrypt and decrypt a two-dimensional image obtained from an amplitude image. The full phase image to be encrypted is fractional Fourier transformed three times and random phase masks are placed in the two intermediate planes. Performing the FRT three times increases the key size, at an added complexity of one more lens. The encrypted image is holographically recorded in a photorefractive crystal and is then decrypted by generating through phase conjugation, the conjugate of the encrypted image. A lithium niobate crystal has been used as a phase contrast filter to reconstruct the decrypted phase image, alleviating the need of alignment in the Fourier plane making the system rugged. 相似文献
11.
We propose the encryption and multiplexing of two-dimensional input images by rotating the constituent diffusers of a sandwich random phase diffuser kept in the Fourier plane of a double random phase encoding system. Successive recording of encrypted images is done by taking the input images one by one. The results of multiplexing in encryption and decryption due to different sets of rotation of one or both of the random constituent phase masks have been presented. The use of an aperture system in addition to the rotation of one or both of the random phase masks enhances the multiplexing capability and security of the system avoiding the generation of cross-talk images at the time of decryption. Simulation results are presented in support of the proposed techniques. The decrypted images obtained from a multiplexed encrypted image have been recorded successfully. Mean square-error (MSE) and signal-to-noise ratio (SNR) values as a function of the number of multiplexed images have been calculated. 相似文献
12.
Secure data transmission by use of encrypted digital holograms and an optical retrieval system for secure real-time display are proposed. Original images are encrypted by a double-random phase encryption technique and then are recorded as digital holograms in a CCD, together with a reference plane wave. This digital hologram of the encrypted image can be transmitted to receivers via any conventional electronic or digital communication channels. The decryption key is also recorded as a digital hologram. At the receiver, the original image can be retrieved by an optical correlation-based reconstruction process. Both encryption and retrieval can be performed by all-optical means, and thus a real-time secure display can be implemented. We demonstrate the proposed system numerically and experimentally. 相似文献
13.
We propose a secure holographic storage system with signal and reference waves dually encrypted for shift multiplexing. Two random phase masks are used to encrypt the images in the input and the Fourier planes. The reference beam is phase encoded by a fiber optic faceplate. The encrypted data is stored in a LiNbO3:Fe crystal and decrypted during the readout process. We experimentally demonstrate encryption and decryption of multiple images and the results show high quality and good fault tolerance. 相似文献
14.
We investigate quality of images decrypted from in-line holograms recorded with a random phase mask placed behind an input image. High- and low-contrast fingerprint images are used as test scenes. The simulation results show that due to multiple convolution processes and a limitation of the CCD sensor resolution, quality of decrypted images is sensitive to spatial separations between the input image, the phase mask and the hologram. We propose a new method for improving quality of decrypted images by using background noise removal. It is found that in comparison with high-contrast input, the low-contrast image is more robust to distortion caused by the encryption–decryption process. 相似文献
15.
An improved optical decryption system based on kinogram encoding is proposed. The decrypted phase image is obtained by optically descrambling the encrypted image with the decrypting phase key. Only a single Fourier lens is needed to generate intensity patterns from the decrypted phase image. The design and simulation results have confirmed the proposed technique as a novel, simple, and robust decryption architecture. 相似文献
16.
A new optical image encryption method based on compressed sensing and Arnold transformation is proposed. First, dimensional reduction and random projection, the characteristics of compressed sensing, are utilized to compress and encrypt a digital image. Second, Arnold transformation is used to scramble the encryption image followed by compressed sensing with low data volume. Then, the encryption image is encrypted again by double random phase encoding optical encryption technique; two random phase masks generated by sequences of irrational number are been used as secret keys. In the end, the multi-encrypted information is embedded into the host image and transmitted. At the receiver, original image information is reconstructed approximately via orthogonal matching pursuit algorithm. The peak signal-to-noise ratio and the normalized cross-correlation between the original image and the decrypted one are used to calculate the quality of the decryption image. The experimental results demonstrate that our method is secure and robust. 相似文献
17.
基于多重菲涅耳衍射变换和相位密码板,设计了一种新的图像加密计算方法.待加密的明文图像在多重离散菲涅耳衍射变换和相位密码板的共同作用下,变换为一个具有随机码特征的密文矩阵;衍射距离和相位密码板是主要的密钥.只有当所有密钥都正确时,才能成功地解密密文.结果表明,该加密算法能抵抗JPEG有损压缩、图像剪切、重度噪音污染和重采样等攻击,因此该法具有较强的鲁棒性;由于很难破解多重密钥,所以该算法具有极高的安全性. 相似文献
18.
A numerically generated encryption pattern in practical optical security systems is processed through real display devices
such as electronically addressed spatial liquid-crystal devices (LCDs). The pattern to be encrypted must be therefore congenial
with electronic interfaces. In usual fact, the quality of a decrypted image in a practical system is greatly degraded due
to the mismatch between the desired encryption pattern and the generated pattern without consideration of the device structures,
such as lattice structures of LCDs. We take into account lattice structures for the displays of encryption and key patterns
in real optical security systems and apply a simulated-annealing like method for the optimization of an encrypted binary hologram.
We successfully demonstrate the decryption of holograms by this method. 相似文献
19.
为提高光学图像加密系统的安全性,利用双光楔联合菲涅耳变换相关器和矢量分解设计了一种非线性光学图像加密系统。通过矢量分解将原始图像分解为两个相位模板,其中一个相位模板f1(x)放置于双光楔联合菲涅耳变换相关器物窗口实现图像加密;携带另一相位模板f2(x)信息的光束与解密系统输出的携带f1(x)信息的光束相干叠加得到解密图像。数值模拟了加密系统的加、解密过程,对于灰度图像和二值图像,当光楔楔角为1.8°和相位模板f1(x)与密钥k(x)的中心间距为18 mm时,解密图像与原始图像的相关系数分别为0.812 7和0.810 9;分析了密钥模板相位分布错误对解密效果的影响,验证了加密方法的可行性。模拟分析表明,密钥k(x)的位置和光楔楔角作为附加的密钥参量,有效扩展了加密系统密钥空间,并能抵御唯密文攻击、已知明文攻击和选择明文攻击。 相似文献
20.
A novel multiple information encryption by user-image-based gyrator transform hologram is proposed. In encryption process, each channel of the user image is phase encoded, modulated by random phase function and then gyrator transformed to get the gyrator spectrum of user image. Subsequently, each channel of the secret image is normalized, phase encoded, multiplied by modulated user image, and then gyrator transformed to obtain the gyrator spectrum of secret image. The encrypted digital hologram is recorded by the interference between the gyrator spectrum of user image and the spherical wave function. Similarly, the digital hologram for decryption is recorded by the interference between the gyrator spectrum of secret image and the spherical wave function. The multiple encrypted digital holograms are multiplexed into a final encoded hologram and the corresponding digital holograms for decryption are multiplexed into a final hologram for decryption. The wavelength and radius of the spherical wave function, and angle of gyrator transform are all essential keys for decryption. The proposed system has two main features. First, the encrypted hologram has no information about secret image. Second, the hologram for decryption used as identification key. Consequently the two marked security layers of information protection are achieved. The proposal can be realized by optoelectronic system. Numerical simulation results demonstrate the feasibility and security of the proposed technique. 相似文献