期刊文献+

纯相位图象的实值编码 被引量:2

The real-value encryption for the full phase image
下载PDF
导出
摘要 一种用于纯相位图象加密的实值编码方法 ,待编码的纯相位图象与一个随机相位掩膜一起作傅立叶变换 ,取其实部作为编码图象。已编码的图象和随机相位掩膜的傅立叶变换相加作傅立叶反变换 ,记录反变换的光强分布 ,再通过图象灰度变换可以恢复图象。该编译码方法简单 ,编码图象是一个实值图象 。 A real-value encryption and decryption method is proposed for the optical image security system.A full-phase image to be encrypted together with a random phase mask is Fourier transformed and real part of the result is used as an encrypted image.The addition of encrypted image and the Fourier transformed of the random phase is inverse-Fourier transformed.The intensity values of the inverse-Fourier transformed image is adjusted.It gives the exact original image.The method of encryption and decryption is simply performed and encrypted image is real-valued,so it is convenient for print or display on computer.
出处 《激光杂志》 CAS CSCD 北大核心 2004年第2期37-38,共2页 Laser Journal
基金 广东省自然科学基金 ( 0 2 1 0 89) 广东省教育厅自然科学研究项目 (Z0 2 0 2 0 )资助
关键词 纯相位图象 实值编码 图象加密 随机相位掩膜 灰度变换 optical image security random phase encryption real-value encryption adjust image intensity values
  • 相关文献

参考文献1

  • 1[美]DEDudgeon M Mersereau著.多维数字信号处理[M].北京:科学出版社,1991.52-53.

同被引文献13

  • 1周昕,陈建国.通过宿主图像隐蔽传递双随机位相编码信息[J].激光杂志,2004,25(4):71-72. 被引量:2
  • 2Bruckstein A. M, Holt R. J, Netravali A. N. Holographic representations of images[J]. IEEE Transactions on Image Processing, 1998,7 ( 11 ) : 1583- 1597.
  • 3Hemami S. S. Robust image communication over wireless channels[J]. IEEE Communications Magazine, 2001, 39 (11) :120 - 124.
  • 4Kozintsev, I, Ramchandran, K. On the transmission of aclass of hidden Markov sources over Gaussian channels with applications to image communication [ C ]. Image Processing, 2000. Proceedings. 2000 International Conference on, 2000,1 : 363 - 366.
  • 5John G. Proakis. Digital Communications(M).4th ed. New York: McGraw- Hill, 2000,186- 203.
  • 6P.C.Mogensen and J.Glückstad.,Phase-only Optical encryption of a fixed mask[J].Appl.Opt.2001,40(8),1226-1235.
  • 7O.Matoba and B.Javidi.Secure holographic memory by double-random polarization encryption[J].Appl.Opt,2004,43(14):2915-2919.
  • 8B.Javidi and T.Nomura.Securing information by use of digital holography.[J].Opt.Lett.2000,25(1),28-30.
  • 9X.Tan,O.Matoba,T.Shimura,et al.Secure Optical storage that uses fully phase encryption[J].Appl.Opt.,2000,39(35):6689-6694.
  • 10E.Tajahuerce,O.Matoba,S.C.Verrall and B.javidi,D.Abookasis,O.Arazi and J.Rosen,Security optical systems based on a joint transform correlator with significant output images[J].Opt.Eng.,2001,40(8):1584-1589.

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部