首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Kumar P  Joseph J  Singh K 《Applied optics》2011,50(13):1805-1811
Interference-based optical encryption schemes have an inherent silhouette problem due to the equipollent nature of the phase-only masks (POMs) generated using an analytical method. One of the earlier methods suggested that removing the problem by use of exchanging process between two masks increases the computational load. This shortcoming is overcome with a noniterative method using the jigsaw transformation (JT) in a single step, with improved security because the inverse JT of these masks, along with correct permutation keys that are necessary to decrypt the original image. The stringent alignment requirement of the POMs in two different arms during the experiment is removed with an alternative method using a single spatial light modulator. Experimental results are provided to demonstrate the decryption process with the proposed method.  相似文献   

2.
Shi X  Zhao D 《Applied optics》2011,50(14):2134-2139
A new (to our knowledge) method is proposed in this paper for color image hiding and extracting using the phase retrieval algorithm in the fractional Fourier transform (FRFT) domain and Arnold transform (ART). Based on a cascaded phase iterative FRFT algorithm, the three channels (R, G, and B) of the secret color image permuted by ART are encrypted. Then the encoded information is embedded in the blue channel (B channel) of the enlarged color host image. Using the security enhanced encryption method, not only the random phase mask and the wavelength but also the transform parameters of ART and FRFT are provided as additional keys for decryption. It is shown that the security of information hiding will be enhanced. Computer simulations are performed to show the hiding capacity of the proposed system. Numerical results are presented to verify the validity and efficiency of the proposed method.  相似文献   

3.
Guo Y  Huang Q  Du J  Zhang Y 《Applied optics》2001,40(17):2860-2863
An information-encryption method based on computer-generated hologram (CGH) interference is presented. In this method the original information is decomposed into two parts, and then each part is encoded on a separate CGH. When these two encoded CGHs are aligned and illuminated, a combined interference pattern is formed. The original information is obtained from this pattern. It is impossible to decrypt the original information from one CGH alone; two matched CGHs must be put together to make it available.  相似文献   

4.
Three methods of processing the image of an interference spiral formed in a fiber optical sensor employing optical vortices have been considered. It is established that a method based on recognition of the spiral image is most stable with respect to noises. Using this technique, it is possible to determine the angle of spiral rotation even when the visibility of the interference pattern decreases to 0.2. The passage from intensity measurements to determination of the geometric parameters of the image significantly increases the range of linearity of interferometric devices employing optical vortices.  相似文献   

5.
6.
研究了新兴的压缩感知(CS)理论在图像融合中的潜在应用,针对已有图像融合方法容易导致融合图像的亮度过高、与源图像的对比度不能保持一致,且伴有明显条纹出现等的缺点,提出了一种新的基于CS原理的图像融合方法,该方法用基于压缩测量值标准偏差(SD)的自适应加权平均融合算子对各待融合图像在CS域的投影测量值进行融合,再经总变分优化算法对融合测量值进行重构而得到融合图像.为验证该方法的有效性,进行了多组不同类型传感器所获图像的融合实验,主观视觉分析和客观评价指标的统计结果均表明,该算法在有效抑制图像中条纹现象发生的同时从原始图像提取了更多的有用信息,显著增强了图像的清晰度,取得了更好的视觉效果,从而展示了CS技术在图像融合方面的突出效果和应用潜力.  相似文献   

7.
Hayasaki Y  Mori M  Nishida N 《Applied optics》1998,37(17):3607-3611
An optical method for a fully parallel analog-to-digital conversion is proposed. The proposed method is carried out by means of intensity transformations of an analog input image and the thresholding for the transformed images and is suitable for two-dimensional implementation based on spatial light modulators. The intensity transformations are implemented by a liquid-crystal spatial light modulator, and thresholding is simulated by computer in consideration of the optical realization.  相似文献   

8.
9.
Binary image encryption based on interference of two phase-only masks   总被引:1,自引:0,他引:1  
W Jia  FJ Wen  YT Chow  C Zhou 《Applied optics》2012,51(21):5253-5258
Optical image encryption based on interference has attracted a lot of attention recently. The technique employs two pure phase masks derived from the complex field of the image in the Fresnel diffraction domain. The image decryption procedure can be carried out by inverse Fresnel transformation of the summation of two pure phase masks. However, the silhouette of the original image, which is recovered by either of the two phase-only masks, impedes the application of this technique. In this paper, a very simple method for binary image encryption based on interference of two phase-only masks is proposed without any silhouette problem. The binary image in combination with a random phase mask is separated into two phase-only masks directly, and the decryption by summation of the two masks can be performed digitally or optically. In this paper, the encryption and decryption processes are analyzed, after which both the optical simulation and the experimental results based on single-beam holography are given to demonstrate the feasibility of the encryption method. As information nowadays is mainly digitized into binary codes, the proposed encryption method may find applications in the information processing field.  相似文献   

10.
11.
《成像科学杂志》2013,61(7):398-407
Abstract

Dual image based reversible data hidings are recently proposed where dual copies of a cover image are used to embed the secret data. In this paper, a novel reversible data hiding method based on neighbouring pixel value differencing is proposed to increase embedding capacity with a good image quality. The mean value of neighbouring pixels and the difference values are used to decide the size of embedding bits per the sub-block. The receiver can extract the secret data and recover the cover image from dual stegoimages. The experimental results show that the proposed method has a higher capacity and still a good image quality where it could embed 767,922 bits and maintain 45.58 and 45.33?dB for dual images.  相似文献   

12.
Fast-response optical recording media based on semiconductor nanostructures (CdTe, GaAs) have been developed for image recording and processing at a speed of up to 106 cps, which is 2–3 orders of magnitude higher than the speed of well-known media based on liquid crystals (MIS-LC). The new media are characterized by a photosensitivity of 10?2 W/cm2 and a spatial resolution of 5–10 lines/mm. Methods for the readout of images recorded in the nanostructures are developed and high-speed incoherent-light optical processors based on these structures are created. The possibility of using these processors for building optical analog computers and image correlators is demonstrated.  相似文献   

13.
《中国测试》2015,(9):71-74
该文利用激光干涉测长原理研发二等量块自动测量系统,该装置采用633 nm碘饱和吸收稳频He-Ne激光器作为标准。硬件方面设计、开发机械本体,搭建激光光路和信号处理模块,研发精密定位的柔性传感器,选配相关电机驱动和环境参数监控系统;软件方面研发数据采集和监控处理程序、测量结果判定及环境参数补偿软件。本装置测量范围上限达100 mm,测量量块的扩展不确定度为U=0.04~0.08μm(k=3),其复现量值指标达到JJG 146——2011《量块》的技术要求。  相似文献   

14.
An optical image encryption method with multiple light paths is proposed based on compressive ghost imaging. In the encryption process, M random phase-only masks (POMs) are generated by means of logistic map algorithm, and these masks are then uploaded to the spatial light modulator (SLM). The collimated laser light is divided into several beams by beam splitters as it passes through the SLM, and the light beams illuminate the secret images, which are converted into sparse images by discrete wavelet transform beforehand. Thus, the secret images are simultaneously encrypted into intensity vectors by ghost imaging. The distances between the SLM and secret images vary and can be used as the main keys with original POM and the logistic map algorithm coefficient in the decryption process. In the proposed method, the storage space can be significantly decreased and the security of the system can be improved. The feasibility, security and robustness of the method are further analysed through computer simulations.  相似文献   

15.
Jansson R  Arwin H  Lundström I 《Applied optics》1994,33(29):6843-6854
Model calculations on the ellipsometric memory are presented. The ellipsometric memory is an n-bit optical memory whose information is extracted by use of the ellipsometric principle. The memory cells of the device consist of thin-film multilayer structures, and the information of each memory cell is contained in the optical properties of the thin films. Several thin-film multilayer structures were examined in order to find out how different choices of layer materials and other system parameters such as layer thicknesses and wavelength affect resolutions and limitations of the ellipsometric memory. Such calculations are also useful for optimizing the readout resolution. It was found that it is possible to use memory cells having up to at least eight layers, which would permit 8-bit words to be stored at each location. It was also found that, in principle, several types of materials can be used as layer materials, and various aspects of different choices of materials are discussed.  相似文献   

16.
分析了用于建筑物测量的高分辨率SAR叠掩及角反射器效应等成像要素,并将其与高分辨率快鸟卫星图像融合,实现了建筑物屋顶信息的提取。进一步利用SAR叠掩得到的建筑物高度信息和快鸟图像得到的建筑物屋顶信息实现了建筑物的三维重建。与实地测量数据相比较,计算结果精度较高,从而验证了这种三维重建方法的可行性。  相似文献   

17.
A technique of computerization of white-light contact interferometers intended for calibration of reference end gauges and other objects in the range 0.1–1000 mm with resolution 0.001 μm is considered. Results are presented from studies of contact interferometers based on digital processing of interference images with the use of corresponding mathematical software. __________ Translated from Izmeritel’naya Tekhnika, No. 7, pp. 35–38, July, 2006.  相似文献   

18.
针对目前传统的原子干涉重力仪—马赫-曾德尔型原子重力仪存在体积较大,影响设备便携性的问题,北京大学实现了国内首个基于移动光晶格的布洛赫振荡原理的小型化原子干涉重力仪。本实验系统的采样率达到0.9 Hz,能够满足长期实时测量的需求,且实验系统中原子的竖直位移约为3 cm,灵敏度达到4.6 × 102 μGal·Hz-1/2,在2 800 s积分时间内,分辨率可以达到6.50.7?μGal。实验成果为原子干涉重力仪的小型化与实用化指明了未来的发展方向。  相似文献   

19.
In this paper, a novel greyscale image encoding and a watermarking scheme based on optical asymmetric cryptography and variational image decomposition (VID) are proposed. In this proposed scheme, the greyscale watermark is encoded into a noise-like pattern by the phase-truncated Fresnel transform (PT-FrT)-based optical asymmetric cryptography. The greyscale host image is decomposed into its cartoon part and texture part by the VID technique. After that, the encoded watermark is embedded into the host image’s texture part by a discrete wavelet transform (DWT) based fusion approach. The proposed scheme can achieve a better watermark invisibility and a higher robustness by embedding the watermark into the host image’s texture part. Additionally, the proposed scheme can achieve a high security, because the PT-FrT-based optical asymmetric cryptography can resist some common cryptographic attacks. The feasibility, robustness and security of the proposed scheme have been demonstrated by extensive experiments and comparison with other relevant image encoding and watermarking schemes.  相似文献   

20.
A nonlinear image encryption scheme using phase-truncated Fourier transform (PTFT) and natural logarithms is proposed in this paper. With the help of the PTFT, the input image is truncated into phase and amplitude parts at the Fourier plane. The phase-only information is kept as the secret key for the decryption, and the amplitude distribution is modulated by adding an undercover amplitude random mask in the encryption process. Furthermore, the encrypted data is kept hidden inside the face biometric-based phase mask key using the base changing rule of logarithms for secure transmission. This phase mask is generated through principal component analysis. Numerical experiments show the feasibility and the validity of the proposed nonlinear scheme. The performance of the proposed scheme has been studied against the brute force attacks and the amplitude-phase retrieval attack. Simulation results are presented to illustrate the enhanced system performance with desired advantages in comparison to the linear cryptosystem.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号