高级检索

球面波照明下傅里叶变换全息多图像加密方法研究

沈学举, 刘旭敏, 许芹祖, 林超

沈学举, 刘旭敏, 许芹祖, 林超. 球面波照明下傅里叶变换全息多图像加密方法研究[J]. 激光技术, 2014, 38(4): 488-493. DOI: 10.7510/jgjs.issn.1001-3806.2014.04.012
引用本文: 沈学举, 刘旭敏, 许芹祖, 林超. 球面波照明下傅里叶变换全息多图像加密方法研究[J]. 激光技术, 2014, 38(4): 488-493. DOI: 10.7510/jgjs.issn.1001-3806.2014.04.012
SHEN Xueju, LIU Xumin, XU Qinzu, LIN Chao. Multiple image encryption based on Fourier transform holography under spherical wave illumination[J]. LASER TECHNOLOGY, 2014, 38(4): 488-493. DOI: 10.7510/jgjs.issn.1001-3806.2014.04.012
Citation: SHEN Xueju, LIU Xumin, XU Qinzu, LIN Chao. Multiple image encryption based on Fourier transform holography under spherical wave illumination[J]. LASER TECHNOLOGY, 2014, 38(4): 488-493. DOI: 10.7510/jgjs.issn.1001-3806.2014.04.012

球面波照明下傅里叶变换全息多图像加密方法研究

详细信息
    作者简介:

    沈学举(1963- ),教授,博士生导师,主要从事激光技术和光学信息处理方面的教学和科研工作。E-mail:shxjoptics@aliyun.com

  • 中图分类号: O438

Multiple image encryption based on Fourier transform holography under spherical wave illumination

  • 摘要: 为了减少加密系统所用模板数,简化隐藏图像对解密过程的影响,采用球面波照明研究了基于傅里叶变换全息的多图像加密隐藏方法,并进行了加密、加密图像隐藏和解密的理论分析和数值模拟,加密图像和原始图像间的相关系数趋于0,宿主图像和加密图像的叠加系数0.3时,宿主图像和隐藏图像的相关系数趋于1,解密图像和原始图像间的相关系数趋于1。结果表明,该加密隐藏方法的加密、解密和隐藏效果良好。
    Abstract: To reduce the number of binary random phase mask used in an image encryption system and simplify the effect of hidden encryption images on decryption process, an optical multiple-image encryption and hiding scheme was put forward based on Fourier transform holography under spherical wave illumination. Theoretical analysis and numerical simulation of image encryption and hiding encryption image and image decryption were made. The results show that correlation coefficient between encryption image and original image approaches 0, correlation coefficient between host image and hiding encryption image approaches 1 when superposition coefficient between host image and hiding encryption image is less than 0.3, correlation coefficient between decryption image and original image approaches 1. The encryption method can obtain good encryption effect.
  • [1]

    REFREGIER P, JAVIDI B. Optical image encryption based on in- put plane and Fourier plane random encoding[J]. Optics Letters, 1995, 20(3):767-769.

    [2]

    UNNIKRISHNAN G, JOSEPH J. Optical encryption system that uses phase conjugation in a photorefractive crystal[J]. Applied Optics, 1998, 37(18): 8181-8186.

    [3]

    MATOBA O, JAVIDI B. Encrypted optical memory system using three dimensional-keys in the fresnel domain [J]. Optics Letters, 1999, 24(4): 762-764.

    [4]

    XIAO Y L, LIU Q, YUAN Sh, et al. Study about decryption based on optical image encryption system in the Fresnel domain[J]. Laser Technology, 2009, 33(4): 433-436 (in Chinese).

    [5]

    LIN Ch,SHEN X J, YANG Sh X. Simulation analysis of random phase mask with spatial light modulator[J]. Laser Technology, 2013, 37(3): 365-370 (in Chinese).

    [6]

    FENG J B, ZHOU X. Random phase encoding achievement of color images under spotlight illumination[J]. Laser Technology, 2008, 32(6): 621-623 (in Chinese).

    [7]

    LIN Ch, SHEN X J, LI Z. cryptographic analysis on the key space of optical phase encryption algorithm based on the design of discrete random phase mask[J]. Optics and Laser Technology, 2013,49(1):108-117.

    [8]

    MATOBA O, JAVIDI B. Encrypted optical storage with angular multiplexing[J]. Applied Optics, 1999, 38(15): 7288-7293.

    [9]

    SITU G H, ZHANG J. Multiple-image encryption by wavelength multiplexing[J]. Optics Letters, 2005, 30(6): 1306-1308.

    [10]

    BARRERA J, HENAO R. Multiplexing encryption-decryption via lateral shifting of a random phase mask[J]. Optics Communications, 2006, 259(3): 532-536.

    [11]

    BARRERA J, HENAO R. Multiplexing encrypted data by using polarized light[J]. Optics Communications,2006, 260(1): 109-112.

    [12]

    RUEDA E, RIOS C. Experimental multiplexing approach via code key rotations under a joint transform correlator scheme[J]. Optics Communications, 2011, 284(7):2500-2504.

    [13]

    BARRERA J, HENAO R. Multiple image encryption using an aperture-modulated optical system[J]. Optics Communications, 2006, 261(1): 29-33.

    [14]

    SHEN X J, LIN Ch, KONG D Zh. Fresnel-transform holographic encryption based on angular ultiplexing and random-amplitude mask[J]. Optical Engineering, 2012, 51(6): 3286-3219.

    [15]

    MUNOZ-RODRIGUEZ J A. Computational cryptography based on trigonometric algorithms and intensity superposition[J]. Imaging Science Journal, 2010, 58(2): 61-80.

计量
  • 文章访问数:  5
  • HTML全文浏览量:  0
  • PDF下载量:  8
  • 被引次数: 0
出版历程
  • 收稿日期:  2013-08-13
  • 修回日期:  2013-09-21
  • 发布日期:  2014-07-24

目录

    /

    返回文章
    返回