首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
基于傅里叶变换和Gyrator变换的图像加密   总被引:1,自引:0,他引:1  
蔡宁  沈学举 《光学仪器》2015,37(1):75-78
基于傅里叶变换和Gyrator变换对图像进行加密。将原始图像和第一个随机相位函数叠加后做傅里叶变换,然后将频域信息减去第二个随机相位函数后得到一个复函数。复函数经过Gyrator变换得到加密图像,将第二个随机相位函数作为相位密钥,同时将Gyrator变换角度作为密钥,由此增大了密钥空间和增强了系统安全性。通过数字方法对图像进行加密,解密过程用光学装置实现。计算机模拟结果表明,该加密方法解密图像质量好,系统安全性良好。  相似文献   

2.
以分数小波变换为基本理论依据,介绍了一种基于分数小波变换的双随机相位光学图像加密技术,丰富了光学图像加密的方法。该方法通过研究分数小波变换和随机相位,得到了一种多密钥的选择性光学图像加密系统。其特点在于利用分数小波变换多层次分解的优势,结合双随机相位编码,不仅增大了密钥空间,增加了安全性,而且能够实现选择性加密,使加密技术变得更加灵活和多样。通过仿真验证了该方案,可实现多密钥加密,并结合仿真结果,理论分析了该方案的加密效果、密钥的安全性和选择性加密的优良特性。研究可知,该方案是一种新的有效的光学图像加密方案。  相似文献   

3.
李娟  冯勇  杨旭强 《光学精密工程》2008,16(9):1738-1745
利用混沌拉伸和折叠的原理,提出了一种三维可逆混沌映射图像加密方法及其优化算法。将灰度图像用一个三维数据矩阵描述,根据提出的算法将该三维数据矩阵映射为二维数据矩阵。对此二维数据矩阵应用拉伸和折叠算法实现图像像素的置乱处理。最后将置乱后的二维数据矩阵还原为三维数据矩阵,得到加密图像。该加密方法是可逆的,可用于图像加密和解密。推导了加密和解密算法完整的数学表达式。由于图像数据量大,利用推导的数学表达式实现图像加密和解密时计算量较大,加密时间长,针对这个问题提出了一种优化算法。仿真结果表明该加密方法同时实现了像素置乱和像素混淆,抵御统计攻击的能力增强,密钥敏感度高,优化算法明显提高了加密速度。  相似文献   

4.
提出一种整合了Henon映射与无限折叠混沌映射的复合混沌系统,并应用该系统生成的混沌序列进行数字图像的加密.算法以He-non映射的初值为加密系统的密钥.首先.固定无限折叠混沌映射的一个控制参数.输入密钥.迭代Henon映射,并将所生成的混沌序列的均值作为无限折叠混沌映射的另一个控制参数.然后.迭代无限折叠混沌映射以产生所需的混沌序列,最后,应用该混沌序列构建出置乱矩阵和变换矩阵,对图像进行加密.实验结果表明.该算法具有较好的加密效果和较高的安全性.  相似文献   

5.
三维可逆混沌映射图像加密及其优化算法   总被引:3,自引:2,他引:1  
利用混沌拉伸和折叠的原理,提出了一种三维可逆混沌映射图像加密方法及其优化算法.该方法用一个三维数据矩阵描述灰度图像,用提出的箅法将该三维数据矩阵映射为二维数据矩阵.然后,应用拉伸和折叠算法对此二维数据矩阵实现图像像素的置乱处理.最后将置乱后的二维数据矩阵还原为三维数据矩阵,得到加密图像.该加密方法足可逆的,亦可用于图像解密.推导了加密和解密算法完整的数学表达式.由于图像数据量大,利用推导的数学表达式实现图像加密和解密时计算量较大,加密时间长,因此,提出了一种优化算法.仿真结果表明,该加密方法同时实现了像素置乱和像素混淆,其优化算法将加密速度提高了3~4倍.该加密算法抵御统计攻击的能力较强,密钥敏感度高,加密速度快,安全性高.  相似文献   

6.
由于混沌动力学系统具有伪随机性、确定性和对初始条件与系统参数的极端敏感特性,故将其与数字图像加密技术相结合,可构造出非常好的图像信息加密系统。提出基于驱动响应法实现图像加密和解密,经过仿真实验表明加密后原始图像无法从加密后的图像中提取原始信息,然而经过解密后的图像能达到与原始图像一致的效果。为了实现两异结构混沌系统在有限时间内同步数据安全通讯,分别改变线性映射关系参数和控制律参数对图像解密密钥敏感性进行分析,实验结果为图像与明文有很大差别。因此,证明了异结构混沌同步系统图像加密方法具有良好的安全性。  相似文献   

7.
为了克服当前的混沌加密系统在整个加密过程中需多轮"置乱-扩散"带来的严重时耗缺陷,引入线性丢番图数学方程,设计了密钥动态更新规则和引擎排序机制;提出了引擎排序耦合密钥动态更新规则的图像加密算法。该算法通过引擎排序法可同时产生大量的置乱密钥和扩散密钥,避免了严重时耗问题;根据动态密钥更新规则实时改变密钥,增强密文的可靠性。由混沌映射输出线性丢番图方程的系数;根据系数求解丢番图方程,获得求解值;根据引擎排序方法重排求解值,获得新引擎;并根据新引擎产生的大量的置乱-扩散密钥来加密子图像。MATLAB仿真结果显示:该算法的密文质量优异;与当前的混沌加密算法相比,该算法的计算效率更高,只需一轮加密即可达到理想效果,有效改善了时耗现象。  相似文献   

8.
基于加密傅里叶变换全息印刷防伪技术研究   总被引:1,自引:3,他引:1  
在研究双随机相位数据加密技术的基础上,结合印刷技术和全息技术的特点,提出了一种基于傅里叶变换印刷全息标识防伪方法。该方法将二值认证图像经过输入面和频谱面上双随机相位加密模板调制生成的物光,与参考光叠加生成加密的傅里叶变换全息图,该全息图可生成印刷全息防伪标识。通过打印和扫描实验验证了加密的傅里叶变换全息标识,可以通过数字印刷技术印制在证件等印刷品上作为防伪标识,具有重要的实用意义。  相似文献   

9.
利用图像分割思想的二维混沌映射及图像加密算法   总被引:2,自引:2,他引:2  
黄峰  冯勇 《光学精密工程》2007,15(7):1096-1103
根据二维混沌映射思想,设计了一种新的图像加密算法。二维混沌映射包括左映射和右映射两个子映射。通过对图像的拉伸和折叠处理,实现图像的混沌加密。沿图像的对角线方向,将方图分割为上下两个等腰三角形图像;利用等腰三角形图像两列像素之间的像素数目差,以水平方向,依次将某列中的像素插入到相邻下一列像素之中,直至将原始图像拉伸成为一条直线。最后,按照原始图像大小,将这条直线折叠成一个新的图像。映射是可逆的,可应用于图像加密,密钥设计为二维混沌映射的左映射和右映射的组合。进行了仿真研究,结果表明:当密钥为64 bit时,密钥空间为1.84×1019,加密速度约为3 Mb/s。该加密算法具有加密速度快、安全性高、没有信息损失、可移植性强和容易软、硬件实现等特点。  相似文献   

10.
金聪  刘会 《光学精密工程》2017,25(3):749-755
本文提出一种量子混沌与折叠算法相结合的图像加密系统。该系统的主要思想是通过量子混沌映射和二维Logistic映射分别进行Arnold变换,得到两个由伪随机数组成的与灰度图像大小相等的矩阵Q、E,然后利用这两个矩阵对图像分别进行以下操作:一是利用矩阵Q对图像从4个方向进行"折叠操作",二是使用前一个像素值与当前像素值进行异或,然后将异或得到的值加上E对应的值,以对当前像素值进行修改,从而达到图像扩散的效果,增加差分攻击的难度。利用MATLAB对测试图像进行模拟仿真分析,结果显示,经该加密系统加密后的图像,其水平、竖直和对角线方向像素值的相关性分别为0.001 006、0.000 152、0.000 789,信息熵H(s)=7.997 3。一系列的实验结果表明该加密系统具有很高的安全性和随机性。  相似文献   

11.
An engineering system may consist of several different types of components,belonging to such physical"domains"as mechanical,electrical,fluid,and thermal.It is t...  相似文献   

12.
The strength of composite plate with different hole-shapes is always one of the most important but complicated issues in the application of the composite material. The holes will lead to mutations and discontinuity to the structure. So the hole-edge stress concentration is always a serious phenomenon. And the phenomenon makes the structure strength decrease very quickly to form dangerous weak points. Most partial damage begins from these weak points. According to the complex variable functions theory, the accurate boundary condition of composite plate with different hole-shapes is founded by conformal mapping method to settle the boundary condition problem of complex hole-shapes. Composite plate with commonly hole-shapes in engineering is studied by several complex variable stress fimction. The boundary integral equations are founded based on exact boundary conditions. Then the exact hole-edge stress analytic solution of composite plate with rectangle holes and wing manholes is resolved. Both of offset axis loadings and its influences on the stress concentration coefficient of the hole-edge are discussed. And comparisons of different loads along various offset axis on the hole-edge stress distribution of orthotropic plate with rectangle hole or wing manhole are made. It can be concluded that hole-edge with continuous variable curvatures might help to decrease the stress concentration coefficient; and smaller angle of outer load and fiber can decrease the stress peak value.  相似文献   

13.
Giannuzzi LA  Utlaut M 《Ultramicroscopy》2011,111(11):1564-1573
30 keV Ga+ focused ion beam induced secondary electron (iSE) imaging was used to determine the relative contrast between several materials. The iSE signal compared from C, Si, Al, Ti, Cr, Ni, Cu, Mo, Ag, and W metal layers does not decrease with an increase in target atomic number Z2, and shows a non-monotonic relationship between contrast and Z2. The non-monotonic relationship is attributed to periodic fluctuations of the stopping power and sputter yield inherent to the ion–solid interactions. In addition, material contrast from electron-induced secondary electron (eSE) and backscattered electron (BSE) images using scanning electron microscopy (SEM) also shows non-monotonic contrast as a function of Z2, following the periodic behavior of the stopping power for electron–solid interactions. A comparison of the iSE and eSE results shows similar relative contrast between the metal layers, and not complementary contrast as conventionally understood. These similarities in the contrast behavior can be attributed to similarities in the periodic and non-monotonic function defined by incident particle–solid interaction theory.  相似文献   

14.
The fraction defective of semi-finished products is predicted to optimize the process of relay production lines, by which production quality and productivity ar...  相似文献   

15.
The use of hand gestures can be the most intuitive human-machine interaction medium.The early approaches for hand gesture recognition used device-based methods....  相似文献   

16.
This paper proposes a novel grading method of apples,in an automated grading device that uses convolutional neural networks to extract the size,color,texture,an...  相似文献   

17.
分布动态载荷识别的抗噪处理   总被引:2,自引:2,他引:0  
针对正交多项式频域法在用多种响应对矩形薄板进行载荷识别中抗噪性较差的问题,综合运用平均法、矩阵预处理和奇异值截断法等方法对之进行改善,并引入空间映射的思想,将该方法的应用范围拓展为复杂的模型.利用仿真算例,证实了该方法具有较好的抗噪性.  相似文献   

18.
针对工程实践中环网通讯相关问题的处理缺乏理论基础及国产化安全级DCS平台的开发缺乏成熟经验借鉴问题,对基于MELTAC-N平台核电厂安全级DCS环网的软硬件实现进行了研究。提出了安全级DCS环网双环网冗余设计、光切换开关设计等硬件设计方法,以及以RPR协议为基础,采用全数据收发策略的软件设计方法。在CPR1000安全级DCS平台上对安全级DCS环网的可靠性及实时性进行了评价,并进行了容错能力、响应时间及响应时间稳定性测试验证实验。结果表明,基于MELTAC-N平台安全级DCS环网软硬件设计具有较好的容错能力及响应时间稳定性。  相似文献   

19.
Abrasive wear has long been recognised as one of the most potentially serious tribological problems facing the operators of many types of plant and machinery; several industrial surveys have indicated that wear by abrasion can be responsible for more than 50% of unscheduled machine and plant stoppages. Locating the operating point of a tribological contact in an appropriate operational ‚map’︁ can provide a useful guide to the likely nature and origins of the surface degradation experienced in use, though care must be exercised in choosing the most suitable parameters for the axes of the plot. Laboratory testing of materials and simulations of machine contacts are carried out for a number of purposes; at one level for the very practical aims of ranking candidate materials or surface hardening treatments in order of their wear resistance, or in an attempt to predict wear lives under field conditions. More fundamentally, tests may be aimed at elucidating the essential physical mechanisms of surface damage and loss, with the longer term aim of building an analytical and predictive model of the wear process itself. In many cases, component surface damage is brought about by the ingress of hard, particulate matter into machine bearing or sealing clearances. These may be running dry although, more usually, a lubricant or service fluid is present at the interface. A number of standardised wear test geometries and procedures have been established for both two- and three-body wear situations, and these are briefly described. Although abrasive wear is often modelled as following an ‚Archard’︁ equation (i.e. a linear increase in material loss with both load and time, and an inverse dependence on specimen hardness) both industrial experience and laboratory tests of particularly lubricated contacts show that this is not always the case: increasing the hardness differential in an abrasively contaminated lubricated pair may not always reduce the rate of damage to the harder surface.  相似文献   

20.
A graph as the new engineering method for estimate the safety of bulging deformation of coke tower is proposed. Through stresses analysis of circumferential weld of coke tower and comparing the stresses produced by pressure with heat stress of steady state, residual stress, bending stress produced by both itself weight and wind loads, it showed that the stresses produced by pressure on the angle distortion are the main factor of equivalent stress of the combined stress. After comparing four kinds of stress controlling conditions, the relation to stress with depth of angular distortion, grade of curvature of angular distortion and half of region of angular distortion has been inferred. Graph of deformation allowable value of coke tower for different condition by angular distortion and half of region of angular distortion has been plotted. The five steps for its engineering use have been explained. The lighter the grade of curvature is, the larger of bulge allowance, may be, and the bigger of depth of angular distortion may pose too. For the coke tower with a popular structure of Dg 5 400 mm×28 mm, the result by graph is nearly more than the result of two formulas formed by other research, the error is less than 7.0%. But, the graph can be easily applied to different size of angular distortion.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号