期刊文献+

通过宿主图像隐蔽传递双随机位相编码信息 被引量:2

Transmitting double-random phase encoded data through host image
下载PDF
导出
摘要 本文基于图像隐藏和双随机位相编码技术提出了一种隐蔽传递信息的方法 ,可以把一幅或多幅需隐蔽传递的图像经双随机位相编码后隐藏在另一幅任意选取且足够大的宿主图像中。而在恢复隐蔽图像时 ,可直接对携带隐藏信息的融合图像进行处理 ,不需要利用原始宿主图像 ,且重构图像的质量较好 。 Based on image hiding and double-random phase encoding techniques,a method for transmitting data secretly is presented.One or several double-random phase encode images that need to be transmitted secretly can be hided in a large host image selected at random.When need to decode,operation can be applied on the composed image directly and no original host image will be needed.The quality of the reconstructed image will be quite well and be not influenced by the host image.
作者 周昕 陈建国
出处 《激光杂志》 CAS CSCD 北大核心 2004年第4期71-72,共2页 Laser Journal
关键词 图像隐藏 双随机位相编码 宿主图像 扩幅 image hiding double-random phase encoding host image size enlarging
  • 相关文献

参考文献5

  • 1[1]Lingfeng Yu,Lilong Cai.Multidimensional data encryption with digital holography[J].Opt.Comm.,2003,215:271-284.
  • 2[2]Nobukatsu Takai,Yuto Mifune.Digital watermarking by a holographic technique[J].Appl.Opt.,2002,41(5):865-873.
  • 3[3]Bahram Javidi,Takanori Nomura.Securing information by use of digital holography[J].Opt.Lett.,2000,25(1):28-30.
  • 4[4]Nobukazu Yoshikawa,Masahide ltoh,Toyohiko Yatagai.Binary computer-generated holograms for security applications from a synthetic double-exposure method by electron-beam lithography [J].Opt.Lett.,1998,23(18):1483-1485.
  • 5[5]Philippe Refregier,Bahram Javidi.Optical image encryption based on input plane and Fourier plane random enecoding[J].Opt.Lett.1995,20(7):767-769.

同被引文献23

  • 1P.C.Mogensen and J.Glückstad.,Phase-only Optical encryption of a fixed mask[J].Appl.Opt.2001,40(8),1226-1235.
  • 2O.Matoba and B.Javidi.Secure holographic memory by double-random polarization encryption[J].Appl.Opt,2004,43(14):2915-2919.
  • 3B.Javidi and T.Nomura.Securing information by use of digital holography.[J].Opt.Lett.2000,25(1),28-30.
  • 4X.Tan,O.Matoba,T.Shimura,et al.Secure Optical storage that uses fully phase encryption[J].Appl.Opt.,2000,39(35):6689-6694.
  • 5E.Tajahuerce,O.Matoba,S.C.Verrall and B.javidi,D.Abookasis,O.Arazi and J.Rosen,Security optical systems based on a joint transform correlator with significant output images[J].Opt.Eng.,2001,40(8):1584-1589.
  • 6B.Javidi and T.Nomura.Polarization encoding for optical security systems[J].Opt.Eng,2000,39(9):2439-2443.
  • 7J.Ohtsubo and A.Fujimoto.Practical image encryption and decryption by phase-coding technique for optical security systems[J].Appl.Opt.,2002,41(23),4848-4855.
  • 8YOSHIKAWA N, ITOH M, YATAGAI T. Binary computergenerated holograms for security applications from a synthetic double-exposure method by electron-beam lithography[J]. Opt Lett,1998,23(21):1483-1485.
  • 9TAJAHUERCE E, MATOBA O, VERRALL S C, et al. Security optical systems based on ajoint transform correlator with significant output images[J]. Opt Eng, 2001,40(8) : 1584- 1589.
  • 10AVIDI B, AHOUZI E. Optical security system with Fourier plane eneoding[J]. Appl Opt, 1998,37(26) : 6247-6255.

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部