首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
This paper proposes a method of double image encryption based on hybrid structured phase mask (HSPM) in the gyrator transform (GT) domain. The scheme becomes more secure by parameters used in the HSPM. These HSPMs are generated by using the combination of the optical vortex phase masks and secondary images after taking Fourier transform (FT). The input images are encrypted and recovered with correct values of HSPMs, rotation angles of GT and their keys used during the encryption. The use of an HSPM-based phase mask increases the security and key space for encryption. It can also be implemented opto-electronically. The mean square error calculated between the input and retrieved images shows the efficacy of scheme. The proposed method has also been investigated for its sensitivity to encryption parameters and its security against occlusion and noise attacks under a number of iterations. A set of numerical simulation results support the feasibility and security of the proposed scheme.  相似文献   

2.
Liu Z  Xu L  Lin C  Liu S 《Applied optics》2010,49(29):5632-5637
Based on an optical gyrator transform system, an image encryption algorithm is designed and studied. An original secret image is regarded as the output intensity of the second gyrator transform. A coherent nonuniform optical beam is converted into the input of the first gyrator transform. A Gerchberg-Saxton phase retrieval algorithm is employed for obtaining the compensation phases in the first gyrator transform pair. The compensation phases are regarded as the encrypted image and key in this algorithm. The parameters of the laser beam and gyrator transform can serve as the additional key of encryption method. The decryption process of this encryption algorithm can be achieved with an optical system. Numerical simulations are performed to test the validity and capability of the encryption algorithm.  相似文献   

3.
Shi X  Zhao D 《Applied optics》2011,50(14):2134-2139
A new (to our knowledge) method is proposed in this paper for color image hiding and extracting using the phase retrieval algorithm in the fractional Fourier transform (FRFT) domain and Arnold transform (ART). Based on a cascaded phase iterative FRFT algorithm, the three channels (R, G, and B) of the secret color image permuted by ART are encrypted. Then the encoded information is embedded in the blue channel (B channel) of the enlarged color host image. Using the security enhanced encryption method, not only the random phase mask and the wavelength but also the transform parameters of ART and FRFT are provided as additional keys for decryption. It is shown that the security of information hiding will be enhanced. Computer simulations are performed to show the hiding capacity of the proposed system. Numerical results are presented to verify the validity and efficiency of the proposed method.  相似文献   

4.
In this paper, we propose a new quick response (QR) code-based non-linear technique for image encryption using Shearlet transform (ST) and spiral phase transform. The input image is first converted into a QR code and then scrambled using the Arnold transform. The scrambled image is then decomposed into five coefficients using the ST and the first Shearlet coefficient, C1 is interchanged with a security key before performing the inverse ST. The output after inverse ST is then modulated with a random phase mask and further spiral phase transformed to get the final encrypted image. The first coefficient, C1 is used as a private key for decryption. The sensitivity of the security keys is analysed in terms of correlation coefficient and peak signal-to noise ratio. The robustness of the scheme is also checked against various attacks such as noise, occlusion and special attacks. Numerical simulation results are shown in support of the proposed technique and an optoelectronic set-up for encryption is also proposed.  相似文献   

5.
We present a novel multiple-image encryption algorithm by combining log-polar transform with double random phase encoding in the fractional Fourier domain. In this algorithm, the original images are transformed to annular domains by inverse log-polar transform and then the annular domains are merged into one image. The composite image is encrypted by the classical double random phase encoding method. The proposed multiple-image encryption algorithm takes advantage of the data compression characteristic of log-polar transform to obtain high encryption efficiency and avoids cross-talk in the meantime. Optical implementation of the proposed algorithm is demonstrated and numerical simulation results verify the feasibility and the validity of the proposed algorithm.  相似文献   

6.
The Wiener filter is the optimal filter according to the minimal mean square error criterion. For data distorted by noise with given spectral density, the Wiener filter is the optimal filter for restoring the noisy image. In this paper we will define a gyrator convolution operator and its optical implementation. The new generalized gyrator Wiener filter was defined using the new operator. The new filter was compared to the conventional Wiener filter and showed improved performance. An improvement of up to 40?dB in the mean square error at the optimal rotation angle in comparison to the conventional Wiener filter is demonstrated.  相似文献   

7.
8.
Information hiding technique with double phase encoding   总被引:8,自引:0,他引:8  
Kishk S  Javidi B 《Applied optics》2002,41(26):5462-5470
We propose a technique for information hiding using double phase encoding. The proposed method uses a weighted double phase-encoded hidden image added to a host image referred to as the transmitted image. We develop an analytical presentation for the system performance using the statistical properties of double phase encoding. The peak signal-to-noise-ratio metric is used as a measure for the degradation in the quality of the host image and the recovered hidden image. We test, analytically, the distortion of the hidden image that is due to the host image and the effect of occlusion of the pixels of the transmitted image (that is, the host image containing the hidden image). Moreover, we discuss the effect of using only the real part of the transmitted image to recover the hidden image. Computer simulations are presented to test the system performance against these types of distortion. The simulations illustrate the system ability to recover the hidden image under distortions and the robustness of the hidden image against removal trials.  相似文献   

9.
ABSTRACT

In idealized secret image sharing (SIS), all of the shared images (shadows) play the same role, but in real life, the shared images are often hierarchical. This paper proposes a hierarchical secret image sharing (HSIS) method by means of optical imaging. To implement the scheme, a generalized single-phase modulation algorithm is proposed in Fresnel transform domain. Its features that multiple secret images can be recovered through combination of some shared images though each participant only holds one share of images. Theoretically, the secret images are divided into multiple phase encodings (shared images) by phase modulation, each secret image can be directly captured by the intensity detector when illuminating some of the shared images orderly displayed with parallel light. Experimental simulation shows that the shared images and the restored secret images do not have any size distortion, and further verifies the feasibility of the proposed scheme.  相似文献   

10.
In this study, we propose a new optical colour image encryption technique using spiral phase transform and chaotic pixel scrambling. For encryption, three channels of the colour image i.e. red, green and blue are first separated and modulated with three different structured phase masks. Spiral phase transform (SPT) with a particular order of modified spiral phase function (MSPF) is utilized for further processing. Random modulus decomposition is applied to the complex output after SPT to generate the private key for decryption. The pixels of the image are scrambled by using the chaotic Tinkerbell map for enhanced security. The order of MSPF, three structured phase masks, parameters of Tinkerbell mapping, and the private key generated during the encryption process serve as the security keys. The robustness of the proposed method is checked against various potential attacks. A series of numerical simulation results are presented to validate the proposed colour image encryption method.  相似文献   

11.
胡高军  吴芝路  高真真 《光电工程》2006,33(10):132-136
由于侦察图像相关性低,基于传统小波变换的图像编码在渐进恢复时低频近似图像边缘模糊。针对这个问题,提出了基于自适应小波变换结合EBCOT的编码方法。该方法通过区别对待平滑区域和边缘部分,降低边缘被平滑的程度,保持边缘清晰。为了达到无损编码,还推导了整数到整数的自适应小波变换。实验表明,该方法达到了图像的无损编码,并在压缩比基本不变的情况下,图像的低频近似效果得以改善。  相似文献   

12.
Deng X  Zhao D 《Applied optics》2011,50(31):6019-6025
A single-channel color image encryption is proposed based on the modified Gerchberg-Saxton algorithm (MGSA) and mutual encoding in the Fresnel domain. Similar to the double random phase encoding (DRPE), this encryption scheme also employs a pair of phase-only functions (POFs) as encryption keys. But the two POFs are generated by the use of the MGSA rather than a random function generator. In the encryption process, only one color component is needed to be encrypted when these POFs are mutually served as the second encryption keys. As a result, a more compact and simple color encryption system based on one-time-pad, enabling only one gray cipheretext to be recorded and transmitted when holographic recording is used, is obtained. Moreover, the optical setup is lensless, thus easy to be implemented and the system parameters and wavelength can be served as additional keys to further enhance the security of the system. The feasibility and effectiveness of the proposed method are demonstrated by numerical results.  相似文献   

13.
郎俊  付香雪  郭盼 《光电工程》2018,45(6):170732-1-170732-10
为了提高传统双随机相位编码图像光学加密系统的安全性,并减少其所需要处理的数据量,提出了一种基于压缩感知及量子Logistic混沌映射的彩色图像非对称光学加密方法。针对彩色图像加密过程中所需要处理数据量过大问题,首先利用压缩感知理论减少加密系统所需要处理的数据量,其次,将彩色图像三通道转换为单通道加密来减少数据量。针对传统光学加密系统为线性系统问题,采用基于相位截断的非对称光学加密方法进行加密。针对光学加密系统加密密钥为随机相位板不方便传输问题,利用量子混沌产生系统所需要的随机相位板。结果表明,此算法可以获得较为理想的图像加密和解密效果。  相似文献   

14.
Noise suppression in multichannel data sets, such as color images, has drawn much attention in the last few years. An issue of paramount importance in designing color image filters is the determination of the coefficients that should be used to weight the inputs to the filter. In this study, we propose an evolutionary computation‐based approach to select and optimize the coefficients in the class of weighted vector directional filters. Using a genetic algorithm, we were able to adapt the filter weights to match varying image and noise characteristics. Extended experimentation with realistic image processing applications, including television image enhancement and virtual restoration of artworks, indicates that the proposed filters are capable of removing noise while preserving chromaticity information, edges, and fine details, as well as structural image content. © 2006 Wiley Periodicals, Inc. Int J Imaging Syst Technol, 15, 236–251, 2005  相似文献   

15.
Cong WX  Chen NX  Gu BY 《Applied optics》1998,37(29):6906-6910
We first discuss the discrete fractional Fourier transform and present some essential properties. We then propose a recursive algorithm to implement phase retrieval from two intensities in the fractional Fourier transform domain. This approach can significantly simplify computational manipulations and does not need an initial phase estimate compared with conventional iterative algorithms. Simulation results show that this approach can successfully recover the phase from two intensities.  相似文献   

16.
《成像科学杂志》2013,61(7):408-422
Abstract

Image fusion is a challenging area of research with a variety of applications. The process of image fusion collects information from different sources and combines them in a single composite image. The composite fused image can better describe the scene than any of the source images. In this paper, we have proposed a method for noisy image fusion in contourlet domain. The proposed method works equally well for fusion of noise free images. Contourlet transform is a multiscale, multidirectional transform with various aspect ratios. These properties make it more suitable for image fusion than other conventional transforms. In the proposed work, the fusion algorithm is combined with a denoising algorithm to reverse the effect of noise. In the proposed method, we have used a level dependent threshold that is based on standard deviation of contourlet coefficients, mean and median of the absolute contourlet coefficients. Experimental results demonstrate that the proposed method performs well in the presence of different types of noise. Performance of the proposed method is compared with principal components analysis and sharp fusion based methods as well as other fusion methods based on variants of wavelet transform like dual tree complex wavelet transform, discrete wavelet transform, lifting wavelet transform, multiwavelet transform, stationary wavelet transform and pyramid transform using six standard quantitative quality metrics (entropy, standard deviation, edge strength, fusion factor, sharpness and peak signal to noise ratio). The combined qualitative and quantitative evaluation of the experimental results shows that the proposed method performs better than other methods.  相似文献   

17.
We perform a numerical analysis of the double random phase encryption-decryption technique to determine how, in the case of both amplitude and phase encoding, the two decryption keys (the image- and Fourier-plane keys) affect the output gray-scale image when they are in error. We perform perfect encryption and imperfect decryption. We introduce errors into the decrypting keys that correspond to the use of random distributions of incorrect pixel values. We quantify the effects that increasing amounts of error in the image-plane key, the Fourier-plane key, and both keys simultaneously have on the decrypted image. Quantization effects are also examined.  相似文献   

18.
We propose an optical multiple-image encryption scheme based on compressive sensing and double random phase encoding. The orthogonal encoding method is used for integrating and extracting multiple-image compressed sampling data. In the encryption process, each plain image is sampled by compressive sensing and the sampled data of all the images are integrated into a synthesized ciphertext by orthogonal encoding method. The synthesized ciphertext is re-encrypted through the double random phase encoding technique to form final ciphertext. In order to reduce the data of keys, chaotic matrix, of which only the initial value should be memorized, is employed in the compressive sampling process and double random phase encoding process. Numerical simulation and the analysis of attacks on encrypted image are implemented to demonstrate the security and validity of the proposed approach.  相似文献   

19.
Encrypted optical memory using double-random phase encoding   总被引:1,自引:0,他引:1  
Javidi B  Zhang G  Li J 《Applied optics》1997,36(5):1054-1058
We describe an encrypted optical memory that uses double-random phase encoding at the input plane and the Fourier plane. This technique allows the images to be stored as independent white complex stationary processes. Experimental results and computer simulations are presented.  相似文献   

20.
A new robust method of non-blind image watermarking is proposed in this paper. The suggested method is performed by modification on singular value decomposition (SVD) of images in Complex Wavelet Transform (CWT) domain while CWT provides higher capacity than the real wavelet domain. Modification of the appropriate sub-bands leads to a watermarking scheme which favourably preserves the quality. The additional advantage of the proposed technique is its robustness against the most of common attacks. Analysis and experimental results show much improved performance of the proposed method in comparison with the pure SVD-based as well as hybrid methods (e.g. DWT-SVD as the recent best SVD-based scheme).  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号