首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 593 毫秒
1.
Cryptography is the essential subject for network information security to protect important data. Although following the symmetric cryptosystem for which the participations in the communication keep exactly the same keys, the special for the encryption and decryption algorithms proposed in this paper lays in the operational objectives, the quantum image. Firstly, extracts the properties of gray-scale and position from the quantum gray-scale image which the storage expression of image in quantum states is achieved. Along with the geometric transformations in classical images, this article realizes the quantum image geometric transforms by means of designing quantum circuits. Eventually, through a combination of the proposals in previous, the encryption and decryption algorithms on quantum gray-scale images is finally accomplished, which could ensure the confidentiality and security of the information in delivery. The algorithms belong to the application of quantum image geometric transformations, for further, the new explorations for quantum image cryptography researches.  相似文献   

2.
使用计算全息进行三维信息加密的方法研究   总被引:1,自引:0,他引:1  
全息加密技术作为一种特殊的加密方法被广泛应用于信息加密和防伪等领域。在全息加密过程中,光波的波长、记录距离和入射角度等参数用做加密密钥和解密密钥被人们深入研究,但所加密的信息几乎都是二维信息。利用一种基于虚拟光学的对三维信息进行加密的方法,将三维物体的大小作为一个新的密钥被引入安全全息加密算法,其安全性能得到了极大提高;在此基础上提出了对再现三维图像进行客观评价的方法,即修正峰值信噪比法(PSNR,PeakSignal-to-Noise Ratio)。模拟实验证明,计算全息方法(CGH,Computer-Generated Hologram)作为一种对三维信息进行加密的方法是可行的,修正PSNR法对再现三维图像的质量进行定量分析是有效的。  相似文献   

3.
Optical image encryption by random shifting in fractional Fourier domains   总被引:1,自引:0,他引:1  
A number of methods have recently been proposed in the literature for the encryption of two-dimensional information by use of optical systems based on the fractional Fourier transform. Typically, these methods require random phase screen keys for decrypting the data, which must be stored at the receiver and must be carefully aligned with the received encrypted data. A new technique based on a random shifting, or jigsaw, algorithm is proposed. This method does not require the use of phase keys. The image is encrypted by juxtaposition of sections of the image in fractional Fourier domains. The new method has been compared with existing methods and shows comparable or superior robustness to blind decryption. Optical implementation is discussed, and the sensitivity of the various encryption keys to blind decryption is examined.  相似文献   

4.
基于gyrator变换和矢量分解的非对称图像加密方法   总被引:1,自引:0,他引:1       下载免费PDF全文
姚丽莉  袁操今  强俊杰  冯少彤  聂守平 《物理学报》2016,65(21):214203-214203
本文结合矢量分解和gyrator变换的数学实现得到了一种新的非对称图像加密算法,它将待加密图像先通过矢量分解加密到两块纯相位板中,然后利用从gyrator变换的数学实现中推导出来的加密算法加密其中一块相位板,获得最终的实值密文.另一块相位板作为解密密钥.算法的解密密钥不同于加密密钥,实现了非对称加密,加密过程中产生的两个私钥增大了算法的安全性.数值模拟结果验证了该算法的可行性和有效性.  相似文献   

5.
A digital holographic information system can process complex three-dimensional (3-D) object information. We demonstrate a scheme for securing complex and 3-D information in the context of in-line digital holography. Double random phase encoding in the free-space propagation domain of light is used to secure the complex information. Encrypted in-line digital holograms are recorded using the position-phase-shifting method. The encrypted complex image at the CCD recording plane is retrieved from the real-valued digital holograms, and is used for decryption. The robustness of the method has also been studied for various securing keys used in the method against blind decryption. A layer-by-layer information retrieval from the encrypted digital hologram is also discussed. The method can also be used to secure digital complex information in a virtual optics modality using holographic principles.  相似文献   

6.
In blazed diffractive optics produced by the diamond turning process, the finite size of the tool causes a decrease in diffraction efficiency. To analyze the influence of the tool, we evaluate first-order diffraction efficiency of periodic gratings based on the electromagnetic theory. The design indices of the diffractive optics for higher efficiency are shown. Even with the same power of diffractive optics, the efficiency differs with the front or back side of the surface. The efficiency of a diffractive-refractive hybrid lens depends on the curvature of the refractive surface.  相似文献   

7.
一种测量透镜单色焦距的新方法   总被引:1,自引:0,他引:1  
根据单狭缝衍射原理,提出了一种测量透镜单色焦距的新方法。结合光电扫描技术,使该方法既可适合于可见光区,又可用于不可见光区的测量,同对,可获得较高的测量精度。  相似文献   

8.
Peng X  Wei H  Zhang P 《Optics letters》2006,31(24):3579-3581
A system of asymmetric cryptography based on wavefront sensing (ACWS) is proposed for the first time to our knowledge. One of the most significant features of the asymmetric cryptography is that a trapdoor one-way function is required and constructed by analogy to wavefront sensing, in which the public key may be derived from optical parameters, such as the wavelength or the focal length, while the private key may be obtained from a kind of regular point array. The ciphertext is generated by the encoded wavefront and represented with an irregular array. In such an ACWS system, the encryption key is not identical to the decryption key, which is another important feature of an asymmetric cryptographic system. The processes of asymmetric encryption and decryption are formulized mathematically and demonstrated with a set of numerical experiments.  相似文献   

9.
A single-channel color image encryption is proposed based on asymmetric cryptosystem. The color components respectively multiplied with three random phase encryption keys are first combined into one gray image using convolution for further encoding into a real-value gray ciphertext with the asymmetric cryptosystem. Then four decryption keys, which are different from encryption keys and generated in the encryption process, can be used for image decryption. As a result, a more compact and robust system, permitting a real-value gray ciphertext to be transmitted, has been obtained. The feasibility and effectiveness of the proposed method are demonstrated by numerical results.  相似文献   

10.
R.C. Venkatesan   《Physics letters. A》2007,370(5-6):397-404
A novel strategy to encrypt covert information (code) via unitary projections into the null spaces of ill-conditioned eigenstructures of multiple host statistical distributions, inferred from incomplete constraints, is presented. The host pdf's are inferred using the maximum entropy principle. The projection of the covert information is dependent upon the pdf's of the host statistical distributions. The security of the encryption/decryption strategy is based on the extreme instability of the encoding process. A self-consistent procedure to derive keys for both symmetric and asymmetric cryptography is presented. The advantages of using a multiple pdf model to achieve encryption of covert information are briefly highlighted. Numerical simulations exemplify the efficacy of the model.  相似文献   

11.
牛春晖  张岩  顾本源 《中国物理》2005,14(10):1996-2003
A new distribution scheme of decryption keys used in optical verification systems is proposed. The encryption procedure is digitally implemented with the use of an iteration algorithm in computer. Three target images corresponding to three wavelengths are encoded into three sets of phase-only masks (POMs) by a special distributing method. These three sets of POMs are assigned to three authorized users as the personal identification. A lensless optical system is used as the verification system. In the verification procedure, every two of the three authorized users can pass the verification procedure cooperatively, but only one user cannot do. Numerical simulation shows that the proposed distribution scheme of decryption keys not only can improve the security level of verification system, but also can bring convenience and flexibility for authorized users.  相似文献   

12.
In this paper, a new image encryption and decryption algorithm based on Multiresolution Singular Value Decomposition (MSVD) and Discrete Cosine Stockwell Transform (DCST) is proposed. An original image is first transformed in DCST domain and then decomposed into four subbands using MSVD, all the four subbands are further decomposed into four subimages according to their indexing and masked by the parameters generated by MSVD. We have used number of bands of DCST, arrangement of MSVD subbands, arrangement of various subimages obtained from MSVD subbands, values and arrangement of a 4×4 matrix generated by MSVD and the arrangement of masked subimages as encryption and decryption keys. To ensure the correct decryption of encrypted image, it is indeed necessary to have correct knowledge of all keys in correct order along with their exact values. If all the keys are correct but a single key is wrong even though it would be almost impossible to guess the original image. The efficiency of proposed algorithm is evaluated by comparing it with some recent published works and it is evident from the experimental results and analysis that the proposed algorithm can transmit the images more securely and efficiently over the network.  相似文献   

13.
Guo H  Fallah HR  Dainty C  Goncharov AV 《Optics letters》2012,37(12):2226-2228
We present a new method for subjectively evaluating intraocular lenses (IOLs) without implantation surgery. To illustrate the method, three types of single-piece IOL (equispherical monofocal, rotational symmetric aspheric monofocal, and diffractive bifocal) were assembled into a model eye and evaluated using an ocular adaptive optics system by a single subject. To separate the spherical aberration of the crystalline lens, the subject's corneal topography and wavefront aberrations were measured and modeled. Three levels of Zernike spherical aberration were generated and superposed on the IOLs and the subject's eye. The corrected distance visual acuity was measured by psychophysical visual procedure.  相似文献   

14.
用三角形闪耀光栅实现分束器   总被引:2,自引:0,他引:2  
张耀举  肖化层 《光学技术》2003,29(3):368-369
用闪耀光栅实现了光栅分束器。给出了该分束器衍射光强分布的解析表达,讨论了影响分束性能的各种因素,并把复杂的优化设计问题转变为简单的求条件极值问题,使编程简单,计算速度快。数值模拟表明,当分别扇出2束和4束光时,衍射效率可分别达到92.50%和95.75%,扇出光束能量均匀,各级衍射效率的方差分别在10-5和10-6的数量级。与其它分束器进行了比较。  相似文献   

15.
二元光学在光学观测轰炸瞄准中的应用研究   总被引:2,自引:0,他引:2  
光学观测瞄准是大中型轰炸机主要的对地攻击瞄准方式,其光学系统一般采用望远式光学系统,这就要求光学系统能满足可见光和近红外光两个光谱波段。根据国内大中型轰炸机光学观测瞄准系统的主要缺陷,结合光学观测瞄准的实际,探讨了基于二元光学的光学观测系统的组成结构和瞄准原理,分析了可见光波段混合目镜的光学性能、谐衍射物镜的衍射效率以及近红外光波段光学系统的像质,推导了横偏棱镜调平误差引起的瞄准误差的数学表达式,并对设计的合理性进行了验证。  相似文献   

16.
吴顺光  屈世显 《光子学报》1997,26(7):661-664
根据非线性系统的特点和浑沌同步原理,我们提出了一种新的数据加/解密方法,并将此方法应用于对全文数据和数据库中部分字段的加/解密工作中,结果表明,这种加/解密方法的算法简单,钥匙多样复杂,较传统加解密方法更难进行解密,具有一定的推广应用价值。  相似文献   

17.
A new method for image encryption based on optical coherent superposition and basic vector operations is proposed in this paper. In this encryption, the original image can be directly separated into two phase masks (PMs). One is a random phase mask (RPM) and the other is a modulation of the RPM by the original image. The mathematical calculation for obtaining the two PMs is quite simple and direct resulting from the simple principle of optical coherent superposition. The arbitrarily selected RPM can be treated as the encrypted result while the PM can be taken as the key for decryption. With this technique, the same encrypted result can be obtained for different images with the same size while the keys for decryption are different. The encryption can be performed digitally and the decryption can be performed optically or digitally. The security of the proposed method is discussed and computer simulation results are presented to verify the validity of proposed method.  相似文献   

18.
The proof of the security of quantum key distribution is a rather complex problem. Security is defined in terms different from the requirements imposed on keys in classical cryptography. In quantum cryptography, the security of keys is expressed in terms of the closeness of the quantum state of an eavesdropper after key distribution to an ideal quantum state that is uncorrelated to the key of legitimate users. A metric of closeness between two quantum states is given by the trace metric. In classical cryptography, the security of keys is understood in terms of, say, the complexity of key search in the presence of side information. In quantum cryptography, side information for the eavesdropper is given by the whole volume of information on keys obtained from both quantum and classical channels. The fact that the mathematical apparatuses used in the proof of key security in classical and quantum cryptography are essentially different leads to misunderstanding and emotional discussions [1]. Therefore, one should be able to answer the question of how different cryptographic robustness criteria are related to each other. In the present study, it is shown that there is a direct relationship between the security criterion in quantum cryptography, which is based on the trace distance determining the distinguishability of quantum states, and the criterion in classical cryptography, which uses guesswork on the determination of a key in the presence of side information.  相似文献   

19.
新型光学元件   总被引:1,自引:0,他引:1  
介绍了近几年来在光电仪器中开始使用的新型光学元件,它们是衍射元件与衍射折射混合元件,溶胶- 凝胶法高纯度特殊元件和微光学元件,轴向梯度元件以及玻璃- 液体组合元件等。介绍了它们的应用和制造方法。这些元件给光学系统设计提供了新的自由度,并大大地简化了系统的结构和减小了系统的尺寸。  相似文献   

20.
We propose a method to encrypt two covert images into an overt image based on phase-truncated Fourier transforms and phase retrieval. In this method, the two original images are self-encoded in the manner that one of the two images is directly separated into two phase masks (PMs) and used as keys for encryption, and then multiplied by a PM which is generated by using phase retrieval algorithm. At last, the whole encryption process is completed by a Fourier transform operation. In the decryption process, the image without a separation and the two PMs used as keys for encryption are all treated as encoded data. The cryptosystem is asymmetric which means the keys for encryption are different from those for decryption. Numerical simulations are presented to show the viability and good performance of the proposed method.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号