首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
Although a compensation device can correct aberrations of human eyes, the effect will be degraded by its misalignment, especially for high-order aberration correction. We calculate the positioning tolerance of correction device for high-order aberrations, and within what degree the correcting effect is better than low-order aberration (defocus and astigmatism) correction. With fixed certain misalignment within the positioning tolerance, we calculate the residual wavefront rms aberration of the first-6 to first-35 terms along with the 3rd-Sth terms of aberrations corrected, and the combined first-13 terms of aberrations are also studied under the same quantity of misalignment. However, the correction effect of high-order aberrations does not meliorate along with the increase of the high-order terms under some misalignment, moreover, some simple combined terms correction can achieve similar result as complex combinations. These results suggest that it is unnecessary to correct too much the terms of high-order aberrations which are difficult to accomplish in practice, and gives confidence to correct high-order aberrations out of the laboratory.  相似文献   

2.
In this work an optical-digital correlator for pattern recognition and input scene restoration is described. Main features of the described correlator are portability and ability of multi-element input scenes processing. The correlator consists of a consumer grade digital photo camera with a diffractive optical element (DOE) inserted as a correlation filter. Correlation of an input scene with a reference image recorded on the DOE are provided optically and registered by the digital photo camera for further processing. Using obtained correlation signals and DOE’s point spread function (PSF), one can restore the image of the input scene from the image of correlation signals by digital deconvolution algorithms.The construction of the correlator based on the consumer grade digital photo camera is presented. The software procedure that is necessary for images linearization of correlation signals is described. Experimental results on optical correlation are compared with numerical simulation. The results of images restoration from conventionally and specially processed correlation signals are reported. Quantitative estimations of accuracy of correlation signals as well as restored images of the input scene are presented.  相似文献   

3.
4.
A novel digital image watermarking system based on an iterative phase retrieval algorithm and sine-cosine modulation in the discrete-cosine-transform (DCT) domain is proposed. The original hidden image is first encrypted into two phase masks. Then the cosine and sine functions of one of the phase masks are introduced as a watermark to be embedded into an enlarged host image in the DCT domain. By extracting the watermark of the enlarged superposed image and decryption we can retrieve the hidden image. The feasibility of this method and its robustness against some attacks, such as occlusion, noise attacks, quantization have been verified by computer simulations. This approach can avoid the cross-talk noise due to direct information superposition and enhance the imperceptibility of hidden data.  相似文献   

5.
We describe a distributed computational imaging system that employs an array of feature specific sensors, also known as compressive imagers, to directly measure the linear projections of an object. Two different schemes for implementing these non-imaging sensors are discussed. We consider the task of object reconstruction and quantify the fidelity of reconstruction using the root mean squared error (RMSE) metric. We also study the lifetime of such a distributed sensor network. The sources of energy consumption in a distributed feature specific imaging (DFSI) system are discussed and compared with those in a distributed conventional imaging (DCI) system. A DFSI system consisting of 20 imagers collecting DCT, Hadamard, or PCA features has a lifetime of 4.8× that of the DCI system when the noise level is 20% and the reconstruction RMSE requirement is 6%. To validate the simulation results we emulate a distributed computational imaging system using an experimental setup consisting of an array of conventional cameras.  相似文献   

6.
We analyse the diffraction result of optical field after Cosine zone plate, and theoretically deduce its transform matrix. Under some conditions, its diffraction distribution is a mixture of fractional Fourier spectra. Then we use Cosine zone plate and its diffraction result to image encryption. Possible optical image encryption and decryption implementations are proposed, and some numerical simulation results are also provided.  相似文献   

7.
Optical color image encryption with redefined fractional Hartley transform   总被引:1,自引:0,他引:1  
Xinxin Li 《Optik》2010,121(7):673-3242
We propose a new method for color image encryption by wavelength multiplexing on the basis of two-dimensional (2-D) generalization of 1-D fractional Hartley transform that has been redefined recently in search of its inverse transform. A color image can be considered as three monochromatic images and then divided into three components and each component is encrypted independently with different wavelength corresponding to red, green or blue light. The system parameters of fractional Hartley transform and random phase masks are keys in the color image encryption and decryption. Only when all of these keys are correct, can the image be well decrypted. The optical realization is then proposed and computer simulations are also performed to confirm the possibility of the proposed method.  相似文献   

8.
In this work, a numerical study on the pattern correlation using wavelet filters is reported. A comparative study of the correlation using the Mexican hat and Coiflets filters is presented. A Coiflet filter acts not only as a band-pass filter but as a high-pass or low-pass filter. Therefore, unlike the Mexican hat-based filter which acts only as a pass-band filter, the Coiflet-based filters allow selecting horizontal, vertical or diagonals details of the original image. Each one of the original images can be discomposed in an average image and several detail images at different levels of multiresolution. We study the numerical correlation between binary patterns using the Mexican hat filter and the first and second multiresolution level obtained by Coiflet filtering. Additionally, an analysis about the noise immunity for the Mexican hat and Coiflet filters is realized. The results show that Coiflet filters are better to identify special characteristics but perform the worst when they are used with noisy images. On the other side, the Mexican filter presents a better noise immunity but performs the worst when is used to compare special characteristics.  相似文献   

9.
When used with coherent light, optical imaging systems are inherently unable to reproduce both the amplitude and the phase of a two-dimensional field distribution. This is because their impulse response function varies slowly from point to point, a property known as non-isoplanatism. For sufficiently small objects, this usually results in a phase distortion and has no impact on the measured intensity. Here, we show that the intensity distribution can be dramatically distorted when extended objects are imaged. We illustrate the problem using two simple examples: the pinhole camera and the thin lens. The effects predicted by our theoretical analysis are confirmed by experimental observations.  相似文献   

10.
We propose a method for image encryption by multiple-step random phase encoding with an undercover multiplexing operation. The true image is stored in a multiple record we call encodegram; and then we can reconstruct it by the use of the appropriate random phase masks and a retrieval protocol. To increase the security of the true hidden image and confuse unauthorized receivers, we add to the encodegram an encoded fake image with different content. This fake image has only a small effect on the retrieval of the true hidden image, owing to the specific property of this protocol. In the decryption step, we can reveal the true image by applying the inverse protocol to two cyphertexts, one the encodegram containing the true image along with the fake image; and the other helping to get the random phase key to achieve the true image. Computer simulations verify the validity of this method for image encryption. Digital implementation of the method makes it particularly suitable for the remote transmission of information.  相似文献   

11.
The performance of a fragile watermarking method based on discrete cosine transform (DCT) has been improved in this paper by using intelligent optimization algorithms (IOA), namely genetic algorithm, differential evolution algorithm, clonal selection algorithm and particle swarm optimization algorithm. In DCT based fragile watermarking techniques, watermark embedding can usually be achieved by modifying the least significant bits of the transformation coefficients. After the embedding process is completed, transforming the modified coefficients from the frequency domain to the spatial domain produces some rounding errors due to the conversion of real numbers to integers. The rounding errors caused by this transformation process were corrected by the use of intelligent optimization algorithms mentioned above. This paper gives experimental results which show the feasibility of using these optimization algorithms for the fragile watermarking and demonstrate the accuracy of these methods. The performance comparison of the algorithms was also realized.  相似文献   

12.
13.
We propose a novel ghost imaging scheme which is especially served to a pure phase object. A spatially incoherent beam is mixed with a coherent beam of the same frequency field by a beamsplitter. Then we perform the ghost imaging scheme using the mixed beam. Our theoretical result shows that this approach is capable of reconstructing a pure phase object in joint-intensity measurement. The visibility of the images is also analysed for two pure phase objects, an optical wedge and a phase grating.  相似文献   

14.
For the optical spectrum region, we describe a novel phase-coded aperture imaging system that can be used in a computational imaging camera. The optical design includes a phase-only screen followed by a detector array. A specific diffraction pattern forms at the detector array when the wavefront from a point source object passes through the phase screen. Since diffraction effects cannot be ignored in the optical regime, an iterative phase retrieval method is used to calculate the phase coded screen. Correlation type processing can be applied for the image recovery. Computer simulation results are presented to illustrate the excellent imaging performance of this camera.  相似文献   

15.
This paper shows that the Fourier-processing based modulation of short laser pulses can be successfully used for all-optical image transfer. The system under consideration consists of a transmitter, where the transferred image modulates the frequency profile of a carrier pulse, and a receiver, where after the reverse processing an original image is restored. The main limitations are discussed and the information capacity of a single pulse is obtained. The results from preliminary experiments using a CPM-ring dye laser as a source of carrier pulses are presented.  相似文献   

16.
The problems related to noise that arise during recording and reconstruction of holograms used in optical data storage or in massive optical interconnection systems are quite similar and can be analyzed in order to improve the quality of the images that these optical systems provide. In this paper, we will analyze noise in cases in which several coherent object waves are simultaneously stored in a phase recording material in a way that allows us to obtain information about the relationship that exists between the recording material and the number of waves that are being stored. The material used in this study is Agfa Gevaert 8E75 HD holographic film processed with a rehalogenating—type bleach bath without a fixation step. Additionally, we show experimentally that it is possible to holographically store more than 400 waves at the same time (in a coherent fashion) using the same storage geometry, with a signal-to-noise ratio larger than 20 and an average diffraction efficiency of 15%.  相似文献   

17.
The empirical mode decomposition (EMD) method is used to process sequences of dynamic speckle patterns to segment the differential activity that presents a sample as a function of the spatial coordinates and time. The application of the method is illustrated by segmenting bruised regions in fruits. A discussion of the obtained results and a comparison with the use of the filter bank technique are also presented.  相似文献   

18.
Multiplexing encrypted data by using polarized light   总被引:1,自引:0,他引:1  
We investigate the feasibility of multiplexing, employing polarized light, a set of security encrypted data. The encryption approach is based on the double random pure-phase enciphering method. Phase conjugation operation is conducted in the reconstruction stage with the aid of a photorefractive crystal which stores the encrypted information. When storing each encrypted image, a polarization change is introduced in the system. This induces decorrelation on the speckle patterns inside the storing medium. We apply this approach for multiple image encryption. We show experimental results that confirm our approach.  相似文献   

19.
We have proposed a new technique for digital image encryption and hiding based on fractional Fourier transforms with double random phases. An original hidden image is encrypted two times and the keys are increased to strengthen information protection. Color image hiding and encryption with wavelength multiplexing is proposed by embedding and encryption in R, G and B three channels. The robustness against occlusion attacks and noise attacks are analyzed. And computer simulations are presented with the corresponding results.  相似文献   

20.
The fractional Fourier transform (FRT) is applied to off-axis elliptical Gaussian beam (EGB). An analytical formula is derived for the FRT of off-axis EGB in terms of the tensor method. The corresponding tensor ABCD law for performing the FRT of off-axis EGB is also obtained. By using the derived formulae, numerical examples are given. The derived formulae provide a convenient way for analyzing and calculating the FRT of off-axis EGB.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号