级联迭代傅里叶变换算法在光学安全中的应用英文文献及翻译

上传人:206****923 文档编号:42293304 上传时间:2018-06-01 格式:DOC 页数:14 大小:293KB
返回 下载 相关 举报
级联迭代傅里叶变换算法在光学安全中的应用英文文献及翻译_第1页
第1页 / 共14页
级联迭代傅里叶变换算法在光学安全中的应用英文文献及翻译_第2页
第2页 / 共14页
级联迭代傅里叶变换算法在光学安全中的应用英文文献及翻译_第3页
第3页 / 共14页
级联迭代傅里叶变换算法在光学安全中的应用英文文献及翻译_第4页
第4页 / 共14页
级联迭代傅里叶变换算法在光学安全中的应用英文文献及翻译_第5页
第5页 / 共14页
点击查看更多>>
资源描述

《级联迭代傅里叶变换算法在光学安全中的应用英文文献及翻译》由会员分享,可在线阅读,更多相关《级联迭代傅里叶变换算法在光学安全中的应用英文文献及翻译(14页珍藏版)》请在金锄头文库上搜索。

1、河南科技大学本科毕业设计(论文)11A cascaded iterative Fourier transform algorithm for optical security applicationsAbstract:A cascaded iterative Fourier transform (CIFT) algorithm is presented for optical security applications. Two phase-masks are designed and located in the input and the Fourier domains of a 4-f

2、correlator respectively, in order to implement the optical encryption or authenticity verification. Compared with previous methods, the proposed algorithm employs an improved searching strategy: modifying the phase-distributions of both masks synchronously as well as enlarging the searching space. C

3、omputer simulations show that the algorithm results in much faster convergence and better image quality for the recovered image. Each of these masks is assigned to different person. Therefore, the decrypted image can be obtained only when all these masks are under authorization. This key-assignment

4、strategy may reduce the risk of being intruded.Key words: Optical security optical encryption cascaded iterative Fourier transform algorithm1. IntroductionOptical techniques have shown great potential in the field of information security applications. Recently Rfrgier and Javidi proposed a novel dou

5、ble-random-phase encoding technique, which encodes a primary image into a stationary white noise. This technique was also used to encrypt information in the fractional Fourier domain and to store encrypted information holographically. Phase encoding techniques were also proposed for optical authenti

6、city verification. Wang et al and Li et al proposed another method for optical encryption and authenticity verification. Unlike the techniques mentioned above, this method encrypts information completely into a phase mask, which is located in either the input or the Fourier domain of a 4-f correlato

7、r. For instance, given the predefinitions of a significant image f(x, y) as the desired output and a phase-distribution expjb(u, v) in the Fourier domain, its easy to optimize the other phase function expjp(x, y) with a modified projection onto constraint sets (POCS) algorithm 10. Therefore the imag

8、e f(x, y) is encoded successfully into expjp(x, y) with the aid of expjb(u, v). In other words, the fixed phase expjb(u, v) serves as the lock while the retrieved phase expjp(x, y) serves as the key of the security system. To reconstruct the original information, the phase functions expjp(x, y) and

9、expjb(u, v) must match and be located in the input and the Fourier plane respectively. Abookasis et al implemented this scheme with a joint transform correlator for optical verification. 河南科技大学本科毕业设计(论文)22However, because the key expjp(x, y) contains information of the image f(x, y) and the lock exp

10、jb(u, v), and the 4-f correlator has a character of linearity, it is possible for the intruder to find out the phase-distribution of the lock function by statistically analyzing the random characters of the keys if the system uses only one lock for different image. In order to increase the secure le

11、vel of such system, one approach is to use different lock function for different image. Enlarging the key space is another approach to increase the secure level. It can be achieved by encrypting images in the fractional Fourier domain; as a result, the scale factors and the transform order offer add

12、itional keys. On the other hand, note that the phase-mask serves as the key of the system, enlarging the key space can be achieved by encoding the target image into two or more phase masks with a modified POCS algorithm. Chang et al have proposed a multiple-phases retrieval algorithm and demonstrate

13、d that an optical security system based on it has higher level of security and higher quality for the decrypted image. However, this algorithm retrieves only one phase-distribution with a phase constraint in each iteration. As a result, the masks are not so consistent and may affect the quality of t

14、he recovered image. In the present paper, we propose a modified POCS algorithm that adjusts the distributions of both phase-masks synchronously in each iteration. As a result, the convergent speed of the iteration process is expected to significantly increase. And the target image with much higher q

15、uality is expected to recover because of the co-adjusting of the two masks during the iteration process. When the iteration process is finished, the target image is encoded into the phase-masks successfully. Each of these masks severs as the key of the security system and part of the encrypted image

16、 itself as well. Moreover, the algorithm can be extended to generate multiple phase-masks for arbitrary stages correlator. To acquire the maximum security, each key is assigned to different authority so that the decryption cannot be performed but being authorized by all of them. This key-assignment scheme is especially useful for military and government applications. The algorithm description is presented in Section 2. Computer simulation of this algorithm

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 行业资料 > 其它行业文档

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号