首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
不对称离散分数傅里叶变换实现数字图像的加密变换   总被引:7,自引:1,他引:7  
利用不对称分数傅里叶变换的特性,提出了一种图像加密变换的新方法。对图像的x,y方向分别实施不同级次的一维分数傅里叶变换,得到加密图像。解密方法就是对变换后的图像实施对应级次的分数傅里叶逆变换,只有当x,y方向的逆变换级次分别与原变换级次都相同或者满足周期条件时,才能恢复原图像。加密变换有效地提高了图像加密和防伪力度。数值计算验证了方法的正确性和可行性。  相似文献   

2.
In recent years, the chaos-based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques. In this paper, we propose a new approach for image encryption based on the multiple-parameter discrete fractional Fourier transform and chaotic logistic maps in order to meet the requirements of the secure image transmission. In the proposed image encryption scheme, the image is encrypted by juxtaposition of sections of the image in the multiple-parameter discrete fractional Fourier domains and the alignment of sections is determined by chaotic logistic maps. This method does not require the use of phase keys. The new method has been compared with several existing methods and shows comparable or superior robustness to blind decryption.  相似文献   

3.
对基于离散Fourier变换的内源全息图重构计算方法作了深入系统的分析,讨论了如何计算整个球面全息图对原子重构像的贡献,克服了以往该方法只能计算半个球面全息图的不足,并运用采样定理知识,分析了全息图的采样率、重构像的空间范围和分辨率等问题. 关键词: 内源全息术 离散Fourier变换 采样定理 同步辐射  相似文献   

4.
基于空域非均匀傅里叶变换的傅里叶望远镜   总被引:1,自引:0,他引:1       下载免费PDF全文
为了在稀疏发射阵列下清晰重构目标图像,提出了一种基于空域非均匀傅里叶变换(NDFT)的傅里叶望远镜信号处理方法。依据傅里叶望远镜的发射器位置与抽取的目标空间频率关系,结合MATLAB程序特点,完成了空域非均匀傅里叶逆变换,重构了目标图像。稀疏发射阵列配置方式为:T型阵列单臂放置11个发射望远镜,连续抽取目标的8个低频信息,再抽取3个高频分量。选择不同形状和灰度分布的4个卫星作为成像目标。与补零均匀快速傅里叶变换(FFT)方法重构的图像对比发现:信噪比为100 dB时,相比补零均匀FFT方法, NDFT方法重构图像的Strehl比都有所提升,最高提升了0.159 8。  相似文献   

5.
为了在稀疏发射阵列下清晰重构目标图像,提出了一种基于空域非均匀傅里叶变换(NDFT)的傅里叶望远镜信号处理方法。依据傅里叶望远镜的发射器位置与抽取的目标空间频率关系,结合MATLAB程序特点,完成了空域非均匀傅里叶逆变换,重构了目标图像。稀疏发射阵列配置方式为:T型阵列单臂放置11个发射望远镜,连续抽取目标的8个低频信息,再抽取3个高频分量。选择不同形状和灰度分布的4个卫星作为成像目标。与补零均匀快速傅里叶变换(FFT)方法重构的图像对比发现:信噪比为100 dB时,相比补零均匀FFT方法, NDFT方法重构图像的Strehl比都有所提升,最高提升了0.159 8。  相似文献   

6.
In this research, we thoroughly investigate the complete generalized fractional Fourier transform (CGFRFT) and draw the following conclusions that are different from the original literature: (1) The CGFRFT is not a generalized version, but a special case that ignores the marginal postulate; (2) If the period parameter is not a multiple of four, the CGFRFT can never perform a Fourier transform regardless of the value of the transform order. The simulation results of a rectangular signal support the above conclusions.  相似文献   

7.
Forecasting, for obvious reasons, often become the most important goal to be achieved. For spatially extended systems (e.g. atmospheric system) where the local nonlinearities lead to the most unpredictable chaotic evolution, it is highly desirable to have a simple diagnostic tool to identify regions of predictable behaviour. In this paper, we discuss the use of the bred vector (BV) dimension, a recently introduced statistics, to identify the regimes where a finite time forecast is feasible. Using the tools from dynamical systems theory and Bayesian modelling, we show the finite time predictability in two-dimensional coupled map lattices in the regions of low BV dimension.  相似文献   

8.
The anyonic excitations of topological two-body color code model are used to implement a set of gates. Because of two-body interactions, the model can be simulated in optical lattices. The excitations have nontrivial mutual statistics, and are coupled to nontrivial gauge fields. The underlying lattice structure provides various opportunities for encoding the states of a logical qubit in anyonic states. The interactions make the transition between different anyonic states, so being logical operation in the computational bases of the encoded qubit. Two-qubit gates can be performed in a topological way using the braiding of anyons around each other.  相似文献   

9.
10.
In this work a novel method is proposed for simultaneous determination of refractive index n and geometrical thickness d. Transmittance spectra of dielectric films, exhibiting weakly absorbance in 14,285–14,492 cm−1 region, were exposed to Discrete Fourier Transform (DFT) whereby {n,d} values were extracted at the same time. Refractive index variation of films is assumed to be constant in the measurement range. Obtained results revealed favourable accordance with the literature and mechanical micrometer readings.  相似文献   

11.
在分析经典的Zoom-FFT算法基础上,提出一种基于傅里叶变换光谱技术的Zoom-FFT算法,用matlab仿真常规FFT算法和Zoom-FFT算法,对不同采样步长的干涉条纹进行数据处理,通过反演出的光谱曲线图和原始光谱曲线图可以看出:采样步长小于20 m时,FFT和Zoom-FFT算法都可以反演出光谱;而当采样步长大于20 m且小于33.3 m时,FFT算法未能反演出光谱,而Zoom-FFT算法仍然可以反演出光谱。  相似文献   

12.
提出一种基于弹光调制器(photoelastic-modulator, PEM)的复色光偏振光谱的傅里叶测量方法,被测光经过0°(-45°)弹光调制器调制,通过45°(0°)检偏器并由探测器探测调制后形成干涉信号,对干涉信号进行傅里叶变换,由所得结果实部和虚部得到被测光Stokes矢量中的S1、S2和S3的光谱。该方法降低了偏振光光程测量的复杂度,给出理论推导过程,并结合仿真结果与理论结果对比,证实了该方法复原后的偏振光谱与原始光谱可很好地吻合。  相似文献   

13.
A displacement measurement technology based on joint fractional Fourier transform is firstly proposed. Contrast to conventional displacement measurement based on joint Fourier transform correlator, the position of cross correlation peak in the proposed technology could be fixed arbitrarily according to the order of fractional Fourier transform. The optical setup in the proposed technology is more flexible and easier to implement. Simulation and experiment results are given out to verify the analysis.  相似文献   

14.
15.
Zhengjun Liu  Jingmin Dai  Shutian Liu 《Optik》2010,121(19):1748-1751
We propose a single phase encoding scheme for encrypting image by using fractional Fourier transform. Single phase mask is designed in order to be symmetrical about certain direction, which can be used in the process of both encryption and decryption. A conjugate mask is not required in the image decryption process, which is very convenient for the practical application in optics. Moreover, the optical implementation of the image encryption and decryption is given. The implementing structure is composed of lens and spherical mirror. Numerical simulations have demonstrated the validity and security of the encryption algorithm.  相似文献   

16.
提出一种基于弹光调制器(photoelastic-modulator, PEM)的复色光偏振光谱的傅里叶测量方法,被测光经过0(-45)弹光调制器调制,通过45(0)检偏器并由探测器探测调制后形成干涉信号,对干涉信号进行傅里叶变换,由所得结果实部和虚部得到被测光Stokes矢量中的S1、S2和S3的光谱。该方法降低了偏振光光程测量的复杂度,给出理论推导过程,并结合仿真结果与理论结果对比,证实了该方法复原后的偏振光谱与原始光谱可很好地吻合。  相似文献   

17.
The emission spectrum of TaCl has been recorded at high resolution in the 3000-35 000 cm−1 region using a Fourier transform spectrometer. The bands were observed by microwave excitation of a mixture of TaCl5 vapor and 3.0 Torr of He. Several TaCl bands have also been recorded using the laser ablation/molecular beam source at the University of New Brunswick. A rotational analysis of a number of bands has been obtained and the majority of the stronger bands have been classified into three groups with different lower state spectroscopic constants. The three lower states have been identified as having Ω″ = 0+, Ω″ = 2, and (tentatively) Ω″ = 3. The Ω″ = 0+ and Ω″ = 2 states are very close in energy and one of these two states is the ground state of TaCl.  相似文献   

18.
A multiple-image cryptosystem is proposed based on the cascaded fractional Fourier transform. During an encryption procedure, each of the original images is directly separated into two phase masks. A portion of the masks is subsequently modulated into an interim mask, which is encrypted into the ciphertext image; the others are used as the encryption keys. Using phase truncation in the fractional Fourier domain, one can use an asymmetric cryptosystem to produce a real-valued noise-like ciphertext, while a legal user can reconstruct all of the original images using a different group of phase masks. The encryption key is an indivisible part of the corresponding original image and is still useful during decryption. The proposed system has high resistance to various potential attacks, including the chosen-plaintext attack. Numerical simulations also demonstrate the security and feasibility of the proposed scheme.  相似文献   

19.
A technique for image encryption using fractional Fourier transform (FRT) and radial Hilbert transform (RHT) is proposed. The spatial frequency spectrum of the image to be encrypted is first segregated into two parts/channels using RHT, and image subtraction technique. Each of these channels is encrypted independently using double random phase encoding in the FRT domain. The different fractional orders and random phase masks used during the process of encryption and decryption are the keys to enhance the security of the proposed system. The algorithms to implement the proposed encryption and decryption scheme are discussed, and results of digital simulation are presented.  相似文献   

20.
Using Jacobi elliptic function addition formulas and summation identities we obtain several static and moving periodic soliton solutions of a classical anisotropic, discrete Heisenberg spin chain with and without an external magnetic field. We predict the dispersion relations of these nonlinear excitations and contrast them with that of magnons and relate these findings to the materials realized by a discrete spin chain. As limiting cases, we discuss different forms of domain wall structures and their properties.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号