首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
基于不对称非标准傅里叶变换的光学图像加密   总被引:1,自引:0,他引:1       下载免费PDF全文
邓晓鹏 《应用光学》2007,28(3):262-264
针对以往光学图像加密系统中输入面和频谱面对称性的缺点,在不增加系统元件的基础上,利用球面波照射不对称非标准傅里叶变换系统进行图像加密。通过把相位掩模置于该系统的傅里叶变换平面,利用不对称非标准傅里叶变换系统的输入面和频谱面的不对称性以及频谱面对于点光源相关参数的依赖性,克服了以前光学加密系统中输入面和频谱面的对称性所带来的安全隐患,并且获得了除相位掩模以外的另外四重密匙。理论分析和模拟实验表明:该方法不仅可行,而且多增加了几重密匙,增强了系统的安全性能。  相似文献   

2.
Double image encryption based on iterative fractional Fourier transform   总被引:1,自引:0,他引:1  
We present an image encryption algorithm to simultaneously encrypt two images into a single one as the amplitudes of fractional Fourier transform with different orders. From the encrypted image we can get two original images independently by fractional Fourier transforms with two different fractional orders. This algorithm can be independent of additional random phases as the encryption/decryption keys. Numerical results are given to analyze the capability of this proposed method. A possible extension to multi-image encryption with a fractional order multiplexing scheme has also been given.  相似文献   

3.
Tao R  Lang J  Wang Y 《Optics letters》2008,33(6):581-583
A novel image encryption algorithm is proposed based on the multiple-parameter fractional Fourier transform, which is a generalized fractional Fourier transform, without the use of phase keys. The image is encrypted simply by performing a multiple-parameter fractional Fourier transform with four keys. Optical implementation is suggested. The method has been compared with existing methods and shows superior robustness to blind decryption.  相似文献   

4.
Optical image encryption using fractional Fourier transform and chaos   总被引:4,自引:2,他引:2  
We propose a new method for image encryption using fractional Fourier transform and chaos theory. Random phase masks are generated using iterative chaos functions. The input image is combined with the first random phase mask at the object plane and is then transformed using the fractional Fourier transform. After the first fractional Fourier transform, the second random phase mask, again generated by using the chaos functions, is used at the fractional plane. The second fractional Fourier transform operation is then carried out to obtain the encrypted image. Three types of chaos functions have been used: the logistic map, the tent map and the Kaplan–Yorke map. The mean square error and the signal-to-noise ratio between the decrypted image and the input image for the correct order and the incorrect order of the fractional Fourier transform have been calculated. The computer simulations are presented to verify the validity of the proposed technique.  相似文献   

5.
Wen Chen  Xudong Chen 《Optics Communications》2011,284(16-17):3913-3917
In recent years, optical color image encryption has attracted much attention in the information security field. Some approaches, such as digital holography, have been proposed to encrypt color images, but the previously proposed methods are developed based on optical symmetric cryptographic strategies. In this paper, we apply an optical asymmetric cryptosystem for the color image encryption instead of conventional symmetric cryptosystems. A phase-truncated strategy is applied in the Fresnel domain, and multiple-wavelength and indexed image methods are further employed. The security of optical asymmetric cryptosystem is also analyzed during the decryption. Numerical results are presented to demonstrate the feasibility and effectiveness of the proposed optical asymmetric cryptosystem for color image encryption.  相似文献   

6.
为了实现对彩色图像的加密,提出一种基于傅里叶变换和非对称密钥加密系统的加密方法。把彩色图像分成三基色分量:红,绿,蓝。然后对这3帧灰度图像的傅里叶频谱进行截取,合成一个目标图像,该目标图像包含了原始彩色图像的大部分信息。对此目标图像的幅度和相位分别用非对称密钥加密系统加密,即实现了彩色图像的加密。 给出了理论分析和计算机模拟结果,实验结果证实了该方法的可行性。  相似文献   

7.
A single-channel color image encryption is proposed based on asymmetric cryptosystem. The color components respectively multiplied with three random phase encryption keys are first combined into one gray image using convolution for further encoding into a real-value gray ciphertext with the asymmetric cryptosystem. Then four decryption keys, which are different from encryption keys and generated in the encryption process, can be used for image decryption. As a result, a more compact and robust system, permitting a real-value gray ciphertext to be transmitted, has been obtained. The feasibility and effectiveness of the proposed method are demonstrated by numerical results.  相似文献   

8.
We analyze the security of a recently proposed asymmetric cryptosystem that based on the phase-truncated Fourier transforms (PTFTs), and describe a specific attack method to break the cryptosystem. This specific attack, which is based on a two-step iterative amplitude retrieval approach and works by using the public keys and ciphertexts, would allow an attacker to reveal the encrypted information and the decryption keys that generated in the encryption procedure. The numerical simulation results, which are given to show the effectiveness of the proposed specific attack, imply that some appropriate measurements should be made to enhance the resistance of the PTFT-based cryptosystem against the specific attack when it is used as a public-key cryptosystem.  相似文献   

9.
A novel method for image encryption and decryption based on Hartley transform in the Fresnel transform domain is presented. Different from the conventional method which requires lens to perform the Fourier transform for achieving Hartley transform, the proposed new optical architecture of Hartley transform is based on the Fresnel diffraction which requires no Fourier transform lenses. The position coordinate as well as the wavelength in the Fresnel transform is used as encoding keys that can ensure the sufficient information security. The main advantages of this proposed image security system are that it uses fewer optical devices and the decryption scheme is straightforward and more secure than the previous works.  相似文献   

10.
A new method of optical image encryption with binary Fourier transform computer-generated hologram (CGH) and pixel-scrambling technology is presented. In this method, the orders of the pixel scrambling, as well as the encrypted image, are used as the keys to decrypt the original image. Therefore, higher security is achieved. Furthermore, the encrypted image is binary, so it is easy to be fabricated and robust against noise and distortion. Computer simulation results are given to verify the feasibility of this method and its robustness against occlusion and additional noise.  相似文献   

11.
A comparison was established between two iterative Fourier transform algorithms (IFTAs), such as the original Gerchberg–Saxton (GS) and the mixed-region amplitude freedom (MRAF) algorithms, for the hologram reconstruction of different target images through the full reference image quality estimation (IQE) and pixel homogeneity in the Fourier plane presented theoretically and experimentally. The comparison was applied depending upon both algorithms based on a computer-generated hologram (CGH) implemented utilizing a reflective phase-modulated liquid-crystal spatial light modulator (LC-SLM) to obtain the digital kinoform holograms of the desired intensity distributions. These digital holograms were applied to reconstruct the intensity patterns for 852 nm, which represents a laser beam source. The theoretical and experimental results of the reconstructed patterns obtained using the MRAF algorithm were found to be smoother and better than the patterns obtained using the GS algorithm. Unmodulated light beam (dc term) is removed from the reconstructed patterns attributed to digital kinoform holograms of MRAF algorithm as an alternative to the theoretical and experimental results without using any additional optic equipment at the light path. Moreover, this paper discussed the full reference objective quality estimations, such as mean square error (MSE), peak signal-to-noise ratio (PSNR), structural content (SC), normalized absolute error (NAE), normalized cross correlation (NK), and homogeneity of pixels, through the contrast (Cont) and inverse difference moment (IDM) for numerical and experimental results. According to the two desired intensity distributions processed theoretically and experimentally, the results of MRAF algorithm were found to be in the highly accurate recovered phase, the quality of image was enhanced, and the dc term was decreased. Image quality estimation of full reference objective relay on the feedback algorithms experimental attestation has not been implemented yet.  相似文献   

12.
A new method for double image encryption is proposed that is based on amplitude-phase hybrid encoding and iterative random phase encoding in fractional Fourier transform (FrFT) domains. In the iterative random phase encoding operation, a binary random matrix is defined to encode two original images to a single complex-valued image, which is then converted into a stationary white noise image by the iterative phase encoding with FrFTs. Compared with the previous schemes that uses fully phase encoding, the proposed method reduces the difference between two original images in key space and sensitivity to the FrFT orders. The primitive images can be retrieved exactly by applying correct keys with initial conditions of chaotic system, the pixel scrambling operation and the FrFT orders. Computer simulations demonstrate that the encryption method has impressively high security level and certain robustness against data loss and noise interference.  相似文献   

13.
Weimin Jin  Caijie Yan 《Optik》2007,118(1):38-41
The optical image encryption based on multichannel fractional Fourier transform (FRT) and double random phase encoding technique is proposed. Optical principles of encoding and decoding are analyzed in detail. With this method, one can encrypt different parts of input image, respectively. The system security can be improved to some extent, not only because fractional orders and random phase masks in every channel can be set with freedom, but also because the system parameters among all channels are independent. Numerical simulation results of optical image encryption based on four channel FRT and double random phase encoding are given to verify the feasibility of the method.  相似文献   

14.
基于背景光调制的复合光傅里叶变换轮廓术   总被引:1,自引:0,他引:1       下载免费PDF全文
提出一种基于背景光调制的用于傅里叶变换轮廓术测量范围的复合光栅,该光栅通过调制一正弦条纹和不含任何相位信息的背景光来抑制零频,较基于相移技术的复合光栅有更大的优势:背景光只含直流分量,使得复合光栅的频谱更加简单,有利于滤出载波信息,提高测量精度;对从复合光栅中解调出来的背景光只涉及平均值校准,校准过程更为简单;解调出的背景光与物体表面的反射率成正比,具有潜在的应用价值。采用Matlab程序对该复合光栅进行了数值模拟,并对该光栅实用性进行了实验研究,结果证实了该光栅用于抑制零频、扩大傅里叶变换轮廓术测量范围的有效性,且提高了测量精度。  相似文献   

15.
提出一种基于背景光调制的用于傅里叶变换轮廓术测量范围的复合光栅,该光栅通过调制一正弦条纹和不含任何相位信息的背景光来抑制零频,较基于相移技术的复合光栅有更大的优势:背景光只含直流分量,使得复合光栅的频谱更加简单,有利于滤出载波信息,提高测量精度;对从复合光栅中解调出来的背景光只涉及平均值校准,校准过程更为简单;解调出的背景光与物体表面的反射率成正比,具有潜在的应用价值。采用Matlab程序对该复合光栅进行了数值模拟,并对该光栅实用性进行了实验研究,结果证实了该光栅用于抑制零频、扩大傅里叶变换轮廓术测量范围的有效性,且提高了测量精度。  相似文献   

16.
Optical image encryption based on multifractional Fourier transforms   总被引:7,自引:0,他引:7  
Zhu B  Liu S  Ran Q 《Optics letters》2000,25(16):1159-1161
We propose a new image encryption algorithm based on a generalized fractional Fourier transform, to which we refer as a multifractional Fourier transform. We encrypt the input image simply by performing the multifractional Fourier transform with two keys. Numerical simulation results are given to verify the algorithm, and an optical implementation setup is also suggested.  相似文献   

17.
In this paper, an asymmetric cryptosystem has been proposed to enhance the security of DRPE. The traditional DRPE scheme is thus tweaked by using fractional Fourier transform (FrFT), a class of structured phase masks called as deterministic phase masks (DMKs) and deploying singular value decomposition (SVD). In specific, we propose to organise the encryption procedure by using two DMKs and FrFT, additionally deploying SVD. On the decryption front, the input image is recovered by utilising the inverse singular value decomposition (ISVD) and an angular portion of the deterministic phase masks. The use of FrFT for encryption and decryption would enhance the robustness of DRPE scheme. Deployment of SVD on our asymmetric cryptosystem provides three components for cipher image is yet another added feature that hardens the security of DRPE scheme. DMKs are formed by the deviation from conventional rectangular function and limited range values which delivers key components with reduced size, better performance and lower complexity. The capability study of defined method, includes analysis on SVD, histogram and correlation coefficient. Our system is subject to an occlusion attack and noise attack to evaluate its performance and reliability. Computational analysis outputs and security investigation are offered in aspect to determine the security potential of proposed system. Comparative results are shown for values of mean-square-error and peak-signal-to-noise ratio of DRPE schemes.  相似文献   

18.
A novel asymmetric single-channel color image encryption using Hartley transform and gyrator transform is proposed. A color image is segregated into R, G, and B channels and then each channel is independently Hartley transformed. The three transformed channels are multiplied and then phase- and amplitude truncated to obtain first encrypted image and first decryption key. The encoded image is modulated with a conjugate of random phase mask. The modulated image is gyrator transformed and then phase- and amplitude truncated to get second encrypted image and second decryption key. The asymmetric (decryption) keys, random phase mask, and transformation angle of gyrator transform serve as main keys. The optoelectronic encryption and decryption systems are suggested. Numerical simulation results have been demonstrated to verify the performance and security of the proposed security system.  相似文献   

19.
Yi Kang 《中国物理 B》2021,30(12):124207-124207
A novel ghost imaging-based optical cryptosystem for multiple images using the integral property of the Fourier transform is proposed. Different from other multiple-image encryption schemes, we mainly construct the modulation patterns related to the plaintext images to realize the encrypted transmission of multiple images. In encryption process, the first image is encrypted by the ghost imaging encryption scheme, and the intensity sequence obtained by the bucket detector is used as the ciphertext. Then modulation patterns of other images are constructed by using the integral property of the Fourier transform and used as the keys. Finally, the ciphertext and keys are transmitted to the receiver to complete the encryption process. During decryption, the receiver uses different keys to decrypt the ciphertext and gets different plaintext images, and decrypted images have no image aliasing problem. Experiments and simulations verify the feasibility, security, and robustness of the proposed scheme. This scheme has high scalability and broad application prospect, which provides a new idea for optical information encryption.  相似文献   

20.
Color image encryption and decryption using fractional Fourier transform   总被引:1,自引:0,他引:1  
We propose the encryption of color images using fractional Fourier transform (FRT). The image to be encrypted is first segregated into three color channels: red, green, and blue. Each of these channels is encrypted independently using double random phase encoding in the FRT domain. The different fractional orders and random phase masks used during the process of encryption and decryption are the keys to enhance the security of the proposed system. The algorithms to implement the proposed encryption and decryption scheme are discussed, and results of digital simulation are presented. The technique is shown to be a powerful one for colored text encryption. We also outline the implementation of the algorithm and examine its sensitiveness to changes in the fractional order during decryption.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号