首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
A system of two separated computer-generated holograms termed cascaded Fresnel digital holography (CFDH) is proposed and its application to hiding information is demonstrated by a computer simulation experiment. The technique is that the reconstructed image is the result of the wave Fresnel diffractionof two sub-holograms located at different distances from the imaging plane along the illuminating beam. The two sub-holograms are generated by an iterative algorithm based on the projection onto convex sets. In the application to the hiding of optical information, the information to be hidden is encoded into thesub-hologram which is multiplied by the host image in the input plane, the other sub-hologram in the filterplane is used for the deciphering key, the hidden image can be reconstructed in the imaging plane of the CFDH setup.  相似文献   

2.
We present theory and experiments for two optical methods for measuring histograms of halftone images. In both methods, the histogram is obtained by spatial filtering of the halftone object. In the first method, we used a phase filter with a comb-type point spread function. In the second method, the filter matched one kind of the differentiated halftone dots. Experiments show that the first method works fast and gives fairly accurate results (errors were about 10%), whereas the second method requires more experimental efforts, but the results are more accurate in this case (errors were about 0.9%).  相似文献   

3.
Visual cryptography is expected to have various applications since it has potential for visual decoding. However, there are still few practical applications. One reason for this is the difficulty of superposition to decode. To solve the alignment difficulty, we propose an information hiding method which can be physically decode by superimposing a checkered pattern. Superimposing a checkered pattern can also be considered as a kind of image sampling process, and a decoding experiment using an ordinary compact digital camera is presented.  相似文献   

4.
Hiding Quantum Data   总被引:1,自引:0,他引:1  
Recent work has shown how to use the laws of quantum mechanics to keep classical and quantum bits secret in a number of different circumstances. Among the examples are private quantum channels, quantum secret sharing and quantum data hiding. In this paper we show that a method for keeping two classical bits hidden in any such scenario can be used to construct a method for keeping one quantum bit hidden, and vice–versa. In the realm of quantum data hiding, this allows us to construct bipartite and multipartite hiding schemes for qubits from the previously known constructions for hiding bits.  相似文献   

5.
A major problem in evaluating stochastic local search algorithms for NP-complete problems is the need for a systematic generation of hard test instances having previously known properties of the optimal solutions. On the basis of statistical mechanics results, we propose random generators of hard and satisfiable instances for the 3-satisfiability problem. The design of the hardest problem instances is based on the existence of a first order ferromagnetic phase transition and the glassy nature of excited states. The analytical predictions are corroborated by numerical results obtained from complete as well as stochastic local algorithms.  相似文献   

6.
Hiding bits in bell states.   总被引:1,自引:0,他引:1  
We present a scheme for hiding bits in Bell states that is secure even when the sharers, Alice and Bob, are allowed to carry out local quantum operations and classical communication. We prove that the information that Alice and Bob can gain about a hidden bit is exponentially small in n, the number of qubits in each share, and can be made arbitrarily small for hiding multiple bits. We indicate an alternative efficient low-entanglement method for preparing the shared quantum states. We discuss how our scheme can be implemented using present-day quantum optics.  相似文献   

7.
In recent studies of generative adversarial networks (GAN), researchers have attempted to combine adversarial perturbation with data hiding in order to protect the privacy and authenticity of the host image simultaneously. However, most of the studied approaches can only achieve adversarial perturbation through a visible watermark; the quality of the host image is low, and the concealment of data hiding cannot be achieved. In this work, we propose a true data hiding method with adversarial effect for generating high-quality covers. Based on GAN, the data hiding area is selected precisely by limiting the modification strength in order to preserve the fidelity of the image. We devise a genetic algorithm that can explore decision boundaries in an artificially constrained search space to improve the attack effect as well as construct aggressive covert adversarial samples by detecting “sensitive pixels” in ordinary samples to place discontinuous perturbations. The results reveal that the stego-image has good visual quality and attack effect. To the best of our knowledge, this is the first attempt to use covert data hiding to generate adversarial samples based on GAN.  相似文献   

8.
We present a general technique for hiding a classical bit in multipartite quantum states. The hidden bit, encoded in the choice of one of two possible density operators, cannot be recovered by local operations and classical communication without quantum communication. The scheme remains secure if quantum communication is allowed between certain partners, and can be designed for any choice of quantum communication patterns to be secure, but to allow near perfect recovery for all other patterns. No entanglement is needed since the hiding states can be chosen to be separable. A single ebit of prior entanglement is not sufficient to break the scheme.  相似文献   

9.
When a halftone screened image is discretely sampled by, for example, a CCD array, moiré fringes sometimes appear. These moiré fringes are caused by aliasing errors due to the improper sampling rate. To suppress these fringes, a dual sampling method is proposed. In this method, halftone screened images are sampled twice with different sampling rates, and the selection of proper frequency components less suffering from aliasing errors can effectively suppress moiré fringes.  相似文献   

10.
基于当前流行的视频压缩技术,提出了一种变换域嵌入算法,并通过仿真实验检验了该算法的有效性。该算法以视频图像离散余弦变换(DCT)矩阵的矢量嵌入为基础,以DCT子块为信息嵌入基本载体,将信息隐藏与频域变换相结合,简化了压缩过程的运算量,同时也提高了隐藏的鲁棒性和透明性。  相似文献   

11.
林惠祖 《物理通报》2006,30(11):51-53
隐身技术是提高作战系统生存、突防,尤其是纵深打击能力的有效手段,已经成为集陆、海、空、天、电、磁等多维一体的立体化现代战争中最重要最有效的突防战术技术手段.等离子体隐身技术是一种新概念、新原理的隐身技术,是一种反雷达探测的新技术,其核心是电磁波与等离子体的相互作用.近几年来等离子体隐身技术以其独有的优势而倍受世界各国青睐,成为隐身领域的研究热点,并在航空航天方面取得重大突破.据称,采用等离子体隐身技术后目标被雷达发现的概率可减小99%以上,即可实现“全隐身”.  相似文献   

12.
An improvement in the Hadamard-transform spectrometer and imager is possible by the use of coding masks consisting of orthogonal polarizers.  相似文献   

13.
Image compressors improve the handling of image data in image-processing systems. In our proposed image-compression system, we employ a smart complementary metal oxide semiconductor (CMOS) sensor and an integrated spatial light modulator (SLM) and then the optoelectronic architecture performs a large part of image-compression processes. Each pixel of the integrated SLM consists of multiple modulation pads; the integrated SLM then performs decoding and optical D/A conversion. A paired configuration of the smart CMOS sensor and the integrated SLM transforms optical analog signals into electronic digital signals. A theoretical analysis showed that the error ratio of the proposed systems was 3%.  相似文献   

14.
A computational technique for the determination of optimal hiding conditions of a digital image in a self-organizing pattern is presented in this paper. Three statistical features of the developing pattern (the Wada index based on the weighted and truncated Shannon entropy, the mean of the brightness of the pattern, and the p-value of the Kolmogorov-Smirnov criterion for the normality testing of the distribution function) are used for that purpose. The transition from the small-scale chaos of the initial conditions to the large-scale chaos of the developed pattern is observed during the evolution of the self-organizing system. Computational experiments are performed with the stripe-type patterns, spot-type patterns, and unstable patterns. It appears that optimal image hiding conditions are secured when the Wada index stabilizes after the initial decline, the mean of the brightness of the pattern remains stable before dropping down significantly below the average, and the p-value indicates that the distribution becomes Gaussian.  相似文献   

15.
16.
In this work, we report on a new way to control the propagation of an image via a non-material lens in a rubidium vapor cell. We experimentally demonstrate that a strong control beam with Gaussian mode can be used to change the refractive index at probe frequency in a lambda-type configuration with large single-photon detuning. By this way, we can easily make the image imprinted on the weak probe beam enlarged or shrunken. At the same time, the shape of the image is preserved without obvious change.  相似文献   

17.
18.
Jung C  Kim W  Kim C 《Optics letters》2011,36(22):4428-4430
We present a novel (to our best knowledge) optical recognition technique for detecting shadows from a single image. Most prior approaches definitely depend on explicit physical computational models, but physics-based approaches have the critical problem that they may fail severely even with slight perturbations. Unlike traditional approaches, our method does not rely on any explicit physical models. This breakthrough originates from a discovery of a new modeling mechanism, derived from a biological vision principle, the so-called retinex theory, which is well suited for single-image shadow detection. Experimental results demonstrate that the proposed method outperforms the previous optical recognition techniques and gives robust results even in real-world complex scenes.  相似文献   

19.
夜间有雾图像通常具有对比度低、光照不均匀、颜色偏移以及噪声较多等现象,这些退化现象使得夜间图像去雾具有极大的挑战性。针对夜间图像存在的退化问题,本文提出了一种能够在夜间图像中有效去雾并提高图像质量的方法。首先,将图像分解成光晕层和有雾层,并对有雾层进行颜色校正。其次,通过一种新提出的带有伽马变换的图像光源分割方法来分割光源,并设置分割阈值作为像素点属于光源区域的概率值。然后,将得到的概率值与最大反射先验相结合来估计光源和非光源区域的大气光值。最后,根据图像深度与亮度、饱和度以及梯度之间的关系建立线性模型,进一步估计透射率的值。实验得到的分割阈值为0.07,线性深度估计参数分别为1.026 7、-0.596 6、0.673 5、0.004 135。实验结果表明本文方法在夜间图像去雾、消除光晕、减少噪声,以及提高可视度方面取得良好的效果。  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号