期刊文献+

基于级联相位恢复算法的光学图像加密 被引量:17

Optical Image Encryption Based on Cascaded Phase Retrieval Algorithm
原文传递
导出
摘要 在虚拟光学数据加密理论模型的基础上,提出了一种光学图像加密的可视化密码构造算法。该加密算法基于自由空间传播的光学系统,利用级联迭代角谱相位恢复算法把待加密图像分别编码到两块相位模板之中,从而实现图像的加密。该加密技术不但可通过同时调整两块相位模板的相位分布的搜索策略来扩大搜索空间,提高安全强度,而且扩大了系统密钥空间,使系统获得更高的安全性,且能通过简单的数值运算或光学实验装置得到质量非常高的解密图像,还从理论上分析了该算法的时间复杂度。计算机模拟结果表明,该加密算法的收敛速度快,能迅速找到非常好的近似解,解密图像质量高且系统安全性良好。 A new technique of optical image encryption and decryption based on the methodology of virtual optics is proposed. The technique is based on the free space propagation optical system and encodes the target image into two different phase masks (PM) by using cascaded iterative angular spectrum phase retrieval approach (CIASA) and both two phase masks can serve as enciphered texts. The proposed algorithm employs an improved scheme, i.e. modifying the phase distributions of two phase masks synchronously and enlarging the search space, and the time complexity of the algorithm is discussed, too. Computer simulations show that the algorithm generates much faster convergence and better image quality for the decrypted image and key space enlarged. These characters may introduce high security-level that makes the encrypted image much harder to be decrypted by an unauthorized person.
作者 于斌 彭翔
出处 《光学学报》 EI CAS CSCD 北大核心 2005年第7期881-884,共4页 Acta Optica Sinica
基金 国家自然科学基金(60472107) 广东省自然科学基金博士启动基金(04300862) 深圳市科技计划项目(200426)资助课题
关键词 信息光学 光学加密 信息安全 级联相位恢复算法 Computer simulation Cryptography Encoding (symbols) Image quality Security of data
  • 相关文献

参考文献21

  • 1P. Refregier, B. Javidi. Optical image encryption based on input plane and Fourier plane random encoding[J]. Opt. Lett. , 1995,20(7): 767-769.
  • 2E. Tajahuerce, O. Matoba, S. C. Verrall et al.. Optoelectronic information encryption with phase shifting interferometry [J].Appl. Opt., 2000, 39(14): 2313-2320.
  • 3G. Unnikrishnan, J. Joseph. K. Singh. Optical encryption by double-random phase encoding in the fractional Fourier domain[J]. Opt. Lett., 2000, 25(12): 887-889.
  • 4Shutian Liu, Li Yu. Banghe Zhu. Optical image encryption by cascaded fractional Fourier transforms with random phase filtering[J]. Opt. Commun., 2001. 187(1-3): 57-63.
  • 5D. Weber, J. Trolinger. Novel implementation of nonlinear joint transform correlators in optical security and validation[J]. Opt.Engng., 1999, 38(1): 62-68.
  • 6R. K. Wang, lan A. Watson, C. Chatwin. Random phase encoding for optical security[J]. Opt. Engng. , 1996, 35 (9) :2464-2469.
  • 7Y. Li. K. Kreske, J. Rosen. Security and encryption optical systems based on a correlator with significant output image[J].Appl. Opt. , 2000. 39(29): 5295-5301.
  • 8D. Abookasis, O. Arazi, J. Rosen et al.. Security optical systems based on a joint transform correlator with significant output images[J]. Opt. Engng. , 2001, 40(8): 1584-1589.
  • 9H. T. Chang, W. C. Lu, C. J. Kuo. Multiple-phase retrieval for optical security .systems by use of random phase encoding[J].Appl. Opt. , 2002, 41(23) :4825-4834.
  • 10Xiang Peng, Lingfeng Yu. Lilong Cai. Double-lock for image encryption with virtual opitcal wavelength[J]. Opt.EXpress,2001. 10(1): 41-45.

二级参考文献16

  • 1Refregier P, Javidi B. Optical image encryption based on input and Fourier plane random encoding. Opt. Lett.,1995, 20(7):767-769.
  • 2Javidi B. Securing information by use of digital holography. Opt. Lett. , 2000, 25(1):28-30.
  • 3Matoba O, Javidi B. Encrypted optical memory system using three-dimensional keys in the Fresnel domain. Opt.Lett., 1999, 24(11) :762-764.
  • 4Peng X, Cui Z Y, Tan T. Information encryption with virtual-optics imaging system. Opt. Commun. , 2002, 212(4-6) :235-245.
  • 5Peng X, Cui Z Y, Tan T. Image encryption with virtual optics. Proc. SPIE, 2002, 4929:96-104.
  • 6TMS320C62X/C67X CPU and Instruction Set. Texas Instruments, 1998. http://www. ti. com.
  • 7TMS320C6X Optimizing C Compiler, Texas Instruments,1998. http://www.ti. com.
  • 8petitcolas F A P.Towards 'robust' watermarls-an introduction to digital watermarking.its state of the art and some key research topics.IEE Seminar on Secure Images and Image Authentication.2000.1/1-1/7.
  • 9Takai N,Mifune Y.Sigital watermarking by a holographic technique.Appl.Opt..2002.41(5):865-873.
  • 10Kishk S,Javidi B .Watermarking of three-dimensional object by digital holography.Opt.Lett.2003.28(3):167-169.

共引文献29

同被引文献278

引证文献17

二级引证文献73

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部