首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
We propose a method for image encryption by multiple-step random phase encoding with an undercover multiplexing operation. The true image is stored in a multiple record we call encodegram; and then we can reconstruct it by the use of the appropriate random phase masks and a retrieval protocol. To increase the security of the true hidden image and confuse unauthorized receivers, we add to the encodegram an encoded fake image with different content. This fake image has only a small effect on the retrieval of the true hidden image, owing to the specific property of this protocol. In the decryption step, we can reveal the true image by applying the inverse protocol to two cyphertexts, one the encodegram containing the true image along with the fake image; and the other helping to get the random phase key to achieve the true image. Computer simulations verify the validity of this method for image encryption. Digital implementation of the method makes it particularly suitable for the remote transmission of information.  相似文献   

2.
A novel digital image watermarking system based on an iterative phase retrieval algorithm and sine-cosine modulation in the discrete-cosine-transform (DCT) domain is proposed. The original hidden image is first encrypted into two phase masks. Then the cosine and sine functions of one of the phase masks are introduced as a watermark to be embedded into an enlarged host image in the DCT domain. By extracting the watermark of the enlarged superposed image and decryption we can retrieve the hidden image. The feasibility of this method and its robustness against some attacks, such as occlusion, noise attacks, quantization have been verified by computer simulations. This approach can avoid the cross-talk noise due to direct information superposition and enhance the imperceptibility of hidden data.  相似文献   

3.
The performance of a fragile watermarking method based on discrete cosine transform (DCT) has been improved in this paper by using intelligent optimization algorithms (IOA), namely genetic algorithm, differential evolution algorithm, clonal selection algorithm and particle swarm optimization algorithm. In DCT based fragile watermarking techniques, watermark embedding can usually be achieved by modifying the least significant bits of the transformation coefficients. After the embedding process is completed, transforming the modified coefficients from the frequency domain to the spatial domain produces some rounding errors due to the conversion of real numbers to integers. The rounding errors caused by this transformation process were corrected by the use of intelligent optimization algorithms mentioned above. This paper gives experimental results which show the feasibility of using these optimization algorithms for the fragile watermarking and demonstrate the accuracy of these methods. The performance comparison of the algorithms was also realized.  相似文献   

4.
A theoretical formalism describing the formation of images in a linear shift invariant X-ray optical system is derived within the wave-optical theory. It is applicable to a non-crystalline object consisting of two types of features, with the characteristic sizes which are respectively not smaller and much smaller than the resolution of the imaging system. This formalism is then applied to two phase-contrast imaging techniques, the propagation-based and analyser-based imaging. The obtained formulae for the intensity distribution in the image well explain the “decoherence effect” which is observed in the former technique and the “extinction contrast” which is a characteristic of the latter technique. This formalism is shown to be in good agreement with the results of the accurate numerical simulations, using rigorous wave-optical theory, of the propagation-based and analyser-based phase-contrast images of the model objects.  相似文献   

5.
A new theoretical method combining analyser-based and propagation-based hard X-ray phase-contrast imaging is investigated. Unlike the previous theoretical model of the combined imaging method constructed under the assumption of slow variation of the individual transfer functions (large Fresnel numbers), a new model proposed in this paper uses the assumption of a weak scatterer (analogous to the first Born approximation). Consequently, the results are not limited to the case of short propagation distances or low-resolution imaging. An explicit expression for the combined transfer function is derived and analytical and numerical examples solving related inverse imaging problems are presented.  相似文献   

6.
We describe a distributed computational imaging system that employs an array of feature specific sensors, also known as compressive imagers, to directly measure the linear projections of an object. Two different schemes for implementing these non-imaging sensors are discussed. We consider the task of object reconstruction and quantify the fidelity of reconstruction using the root mean squared error (RMSE) metric. We also study the lifetime of such a distributed sensor network. The sources of energy consumption in a distributed feature specific imaging (DFSI) system are discussed and compared with those in a distributed conventional imaging (DCI) system. A DFSI system consisting of 20 imagers collecting DCT, Hadamard, or PCA features has a lifetime of 4.8× that of the DCI system when the noise level is 20% and the reconstruction RMSE requirement is 6%. To validate the simulation results we emulate a distributed computational imaging system using an experimental setup consisting of an array of conventional cameras.  相似文献   

7.
We treat the problems of phase-contrast image formation, deterministic phase retrieval and aberration balancing, in the imaging of weak objects using two-dimensional shift-invariant linear imaging systems. Three classes of model sample are considered: weak phase objects, weak phase-amplitude objects and single-material weak phase-amplitude objects. For each class of sample we show how the various aberration coefficients, which characterise a given imaging system, contribute to the structure of the associated phase-contrast image. The corresponding inverse problem, of obtaining a closed-form expression for the input wave-field given one or more aberrated phase-contrast images of the same, is then examined. Two sample applications are considered: analyser-crystal phase-contrast imaging of weak objects using hard X-rays, and Zernike-type phase-contrast imaging. We close with a discussion of how coherent and incoherent aberrations may be “balanced” against one another, briefly mentioning the applications of this idea to both “deblur by defocus” and proximity-corrected X-ray lithography.  相似文献   

8.
An iterative algorithm to extract the arbitrary unknown phase shift in two-frame phase-shifting interferometry and then reconstruct the complex object wave is proposed. In combination with the least square principle and some calculation formulae we developed, this algorithm allows us to find the value of unknown phase shift by using only two interferograms without additional knowledge or measurement. Computer simulations have shown that this algorithm works well for both the smooth and diffusing objects to a very high accuracy over a wide range of the phase shift from 0.4 to 2.5 rad.  相似文献   

9.
In order to increase data security transmission we propose a multichanneled puzzle-like encryption method. The basic principle relies on the input information decomposition, in the same way as the pieces of a puzzle. Each decomposed part of the input object is encrypted separately in a 4f double random phase mask architecture, by setting the optical parameters in a determined status. Each parameter set defines a channel. In order to retrieve the whole information it is necessary to properly decrypt and compose all channels. Computer simulations that confirm our proposal are presented.  相似文献   

10.
A novel double-image encryption algorithm is proposed, which can simultaneously encrypt two images into a single one as the amplitude of gyrator transform with two different groups of angles. The two original images can be retrieved independently by gyrator transforms with two different groups of angles, one common phase mask, and two different private phase masks. The proposed approach can enlarge the key space, achieve faster convergence in iterative process, and avoid cross-talk between two images in reconstruction. Numerical simulations are presented to verify its validity and efficiency.  相似文献   

11.
We have proposed a new technique for digital image encryption and hiding based on fractional Fourier transforms with double random phases. An original hidden image is encrypted two times and the keys are increased to strengthen information protection. Color image hiding and encryption with wavelength multiplexing is proposed by embedding and encryption in R, G and B three channels. The robustness against occlusion attacks and noise attacks are analyzed. And computer simulations are presented with the corresponding results.  相似文献   

12.
A new discrete fractional transform defined by two parameters (angle and fractional order) is presented. All eigenvectors of the transform are obtained by an angle using recursion method. This transform is named as discrete fractional angular transform (DFAT). The computational load of kernel matrix of the DFAT is minimum than all other transforms with fractional order. This characteristics has very important practical applications in signal and image processing. Numerical results and the mathematical properties of this transform are also given. As fractional Fourier transform, this transform can be applied in one and two dimensional signal processing.  相似文献   

13.
A new cryptology in dual fractional Fourier-wavelet domain is proposed in this paper, which is calculated by discrete fractional Fourier transform and wavelet decomposition. Different random phases are used in different wavelet subbands in encryption. A new color image encoding method is also presented with basic color decomposition and encryption respectively. All the keys, including random phases and fractional orders in R, G and B three channels, should be correctly used in decryption, otherwise people cannot obtain the totally correct information. Some numerical simulations are presented to demonstrate the possibility of the method. It would have widely potential applications in digital color image processing and protection.  相似文献   

14.
We present a new way to demodulate complicated fringe patterns containing closed fringes using a genetic algorithm (GA). The entire fringe pattern is divided into a set of partially overlapping smaller sub-image windows. Each of these has a lower dimensionality and as a consequence is faster and can be demodulated more reliably. The demodulation process proceeds row-by-row way passing from one sub-image in a neighborhood until the whole interferogram is processed. The modulating phase of each sub-image is modeled as a parametric analytic function whose parameters are optimized using a GA. The technique is demonstrated demodulating some normalized fringe patterns that have two main difficulties: closed fringes within the interferogram and regions of under-sampled fringes. These fringe images cannot be demodulated by techniques such as the regularized phase tracker (RPT).  相似文献   

15.
We propose and numerically demonstrate a simple method for measuring waveforms of optical pulses that have spectral bandwidths much larger than the passband of the measuring system, thus enabling a kind of temporal superresolution. The technique is based on pulse intensity modulation that contains high-order harmonics. Parts of the pulse intensity spectrum that are shifted as a result of the modulation, are moved over (“umklapped”) to the center of the passband, transmitted and then recorded by an oscilloscope. The pulse intensity spectrum is restored by parts from the Fourier transform of a few oscillograms, measured after performing the temporal shifts between the pulse train and the modulation. A similar approach is applied for achieving subwavelength spatial resolution in far -field microscopy. The spatial modulation is performed by a diffraction grating. The method allows one to restore a subwavelength object in a single measurement.  相似文献   

16.
Blind dispersion compensation for optical coherence tomography   总被引:1,自引:0,他引:1  
We present a numerical method for compensating dispersion effects in optical coherence tomography that does not require a priori knowledge of dispersive properties of the sample. The method yields results equivalent to recently demonstrated quantum-optical coherence tomography, but without exploiting non-classical states of optical radiation. Dispersion compensation is accomplished by processing phase information present in standard interferograms to calculate the generalized autoconvolution function. The operation of the method can be conveniently visualized using the Wigner distribution function formalism.  相似文献   

17.
We address the problem of degree of polarization (DOP) estimation in images limited by additive Gaussian detector noise. We derive and analyze the probability density function (PDF) of the pixelwise DOP estimate, which is shown to have significantly different statistical properties than when noise is Gamma distributed (speckle). We then determine the Cramer-Rao Lower Bound and the maximum likelihood estimator of the DOP. We deduce from this study practical solutions for characterizing and reducing the noise in these images.  相似文献   

18.
We examine perfect recovery in the optical encryption system based on joint transform correlator architecture, which requires the key mask to be space-limited and phase-only in the frequency domain. Accordingly, a discrete sinc function interpolation is used to generate a binary phase difference mask for image encryption and decryption. Furthermore, the optimal binary phase difference mask is derived from the interpolation process best approximating the ideal sinc function interpolation. The simulation results confirm better recovery of the decrypted image for applying the proposed key masks to the optical encryption system. Especially, the optimal binary phase difference mask significantly enhances the recovery performance.  相似文献   

19.
Analytical expressions for the spatial distribution of the spectral density and intensity of projection images are derived for a broad class of object transmission functions in the case of partially coherent Schell-model-type incident illumination. The expressions are linear with respect to the phase distribution in the transmitted wave. Associated methods for phase retrieval are discussed with the emphasis on a technique that allows simultaneous “automatic” phase retrieval and deconvolution of projection images of homogeneous objects by means of mutual cancellation at a specified defocus distance of the Fresnel diffraction effects and the image blurring due to the point-spread function of the imaging system.  相似文献   

20.
Digital holography (DH) and digital shearography (DS) both play an important role in non-destructive evaluation. In this paper, a novel method based on digital holographic interferometry (DHI) and complex phasor (CP) is proposed to determine displacement derivative. An algorithm is employed to filter the imaginary and real parts of complex values without the need of direct phase manipulation. Two-dimensional short time Fourier transform (STFT) is employed subsequently to process wrapped phase maps. An experiment is conducted to demonstrate the validity of the proposed method.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号