This paper introduces an efficient image cryptography system.The pro-posed image cryptography system is based on employing the two-dimensional(2D)chaotic henon map(CHM)in the Discrete Fourier Transform(DFT).The propos...This paper introduces an efficient image cryptography system.The pro-posed image cryptography system is based on employing the two-dimensional(2D)chaotic henon map(CHM)in the Discrete Fourier Transform(DFT).The proposed DFT-based CHM image cryptography has two procedures which are the encryption and decryption procedures.In the proposed DFT-based CHM image cryptography,the confusion is employed using the CHM while the diffu-sion is realized using the DFT.So,the proposed DFT-based CHM image crypto-graphy achieves both confusion and diffusion characteristics.The encryption procedure starts by applying the DFT on the image then the DFT transformed image is scrambled using the CHM and the inverse DFT is applied to get the final-ly encrypted image.The decryption procedure follows the inverse procedure of encryption.The proposed DFT-based CHM image cryptography system is exam-ined using a set of security tests like statistical tests,entropy tests,differential tests,and sensitivity tests.The obtained results confirm and ensure the superiority of the proposed DFT-based CHM image cryptography system.These outcomes encourage the employment of the proposed DFT-based CHM image cryptography system in real-time image and video applications.展开更多
In this paper, the two-dimensional Warped Discrete Fourier Transform (2-D WDFT) is developed based on the concept of the 1-D WDFT. An exact computation algorithm is developed for 2-D WDFT based on matrix factorizing...In this paper, the two-dimensional Warped Discrete Fourier Transform (2-D WDFT) is developed based on the concept of the 1-D WDFT. An exact computation algorithm is developed for 2-D WDFT based on matrix factorizing with special structure. A fast algorithm is then proposed to reduce greatly the computational complexity of the inverse 2-D WDFT. Finally, numerical examples are given to show the efficiency of the proposed approach.展开更多
In this paper a novel technique, Authentication and Secret Message Transmission using Discrete Fourier Transformation (ASMTDFT) has been proposed to authenticate an image and also some secret message or image can be t...In this paper a novel technique, Authentication and Secret Message Transmission using Discrete Fourier Transformation (ASMTDFT) has been proposed to authenticate an image and also some secret message or image can be transmitted over the network. Instead of direct embedding a message or image within the source image, choosing a window of size 2 x 2 of the source image in sliding window manner and then con-vert it from spatial domain to frequency domain using Discrete Fourier Transform (DFT). The bits of the authenticating message or image are then embedded at LSB within the real part of the transformed image. Inverse DFT is performed for the transformation from frequency domain to spatial domain as final step of encoding. Decoding is done through the reverse procedure. The experimental results have been discussed and compared with the existing steganography algorithm S-Tools. Histogram analysis and Chi-Square test of source image with embedded image shows the better results in comparison with the S-Tools.展开更多
On-chip manipulation of the spatiotemporal characteristics of optical signals is important in the transmission and processing of information.However,the simultaneous modulation of on-chip optical pulses,both spatially...On-chip manipulation of the spatiotemporal characteristics of optical signals is important in the transmission and processing of information.However,the simultaneous modulation of on-chip optical pulses,both spatially at the nano-scale and temporally over ultra-fast intervals,is challenging.Here,we propose a spatiotemporal Fourier transform method for on-chip control of the propagation of femtosecond optical pulses and verify this method employing surface plasmon polariton(SPP)pulses on metal surface.An analytical model is built for the method and proved by numerical simulations.By varying space-and frequency-dependent parameters,we demonstrate that the traditional SPP focal spot may be bent into a ring shape,and that the direction of propagation of a curved SPP-Airy beam may be reversed at certain moments to create an S-shaped path.Compared with conventional spatial modulation of SPPs,this method offers potentially a variety of extraordinary effects in SPP modulation especially associated with the temporal domain,thereby providing a new platform for on-chip spatiotemporal manipulation of optical pulses with applications including ultrafast on-chip photonic information processing,ultrafast pulse/beam shaping,and optical computing.展开更多
We present experimental observations of soliton pulsations in the net normal-dispersion fiber laser by using the dispersive Fourier transform(DFT) technique. According to the pulsating characteristics, the soliton pul...We present experimental observations of soliton pulsations in the net normal-dispersion fiber laser by using the dispersive Fourier transform(DFT) technique. According to the pulsating characteristics, the soliton pulsations are classified as visible and invisible soliton pulsations. The visible soliton pulsation is converted from single-into dual-soliton pulsation with the common characteristics of energy oscillation and bandwidth breathing. The invisible soliton pulsation undergoes periodic variation in the spectral profile and peak power but remains invariable in pulse energy. The reason for invisible soliton pulsation behavior is periodic oscillation of the pulse inside the soliton molecule. These results could be helpful in deepening our understanding of the soliton pulsation phenomena.展开更多
基金This research was funded by Deanship of Scientific Research,Taif University Researches Supporting Project number(TURSP-2020/216),Taif University,Taif,Saudi Arabia.
文摘This paper introduces an efficient image cryptography system.The pro-posed image cryptography system is based on employing the two-dimensional(2D)chaotic henon map(CHM)in the Discrete Fourier Transform(DFT).The proposed DFT-based CHM image cryptography has two procedures which are the encryption and decryption procedures.In the proposed DFT-based CHM image cryptography,the confusion is employed using the CHM while the diffu-sion is realized using the DFT.So,the proposed DFT-based CHM image crypto-graphy achieves both confusion and diffusion characteristics.The encryption procedure starts by applying the DFT on the image then the DFT transformed image is scrambled using the CHM and the inverse DFT is applied to get the final-ly encrypted image.The decryption procedure follows the inverse procedure of encryption.The proposed DFT-based CHM image cryptography system is exam-ined using a set of security tests like statistical tests,entropy tests,differential tests,and sensitivity tests.The obtained results confirm and ensure the superiority of the proposed DFT-based CHM image cryptography system.These outcomes encourage the employment of the proposed DFT-based CHM image cryptography system in real-time image and video applications.
基金This work was supported by the National Natural Science Foundation of China (No. 60172048).
文摘In this paper, the two-dimensional Warped Discrete Fourier Transform (2-D WDFT) is developed based on the concept of the 1-D WDFT. An exact computation algorithm is developed for 2-D WDFT based on matrix factorizing with special structure. A fast algorithm is then proposed to reduce greatly the computational complexity of the inverse 2-D WDFT. Finally, numerical examples are given to show the efficiency of the proposed approach.
文摘In this paper a novel technique, Authentication and Secret Message Transmission using Discrete Fourier Transformation (ASMTDFT) has been proposed to authenticate an image and also some secret message or image can be transmitted over the network. Instead of direct embedding a message or image within the source image, choosing a window of size 2 x 2 of the source image in sliding window manner and then con-vert it from spatial domain to frequency domain using Discrete Fourier Transform (DFT). The bits of the authenticating message or image are then embedded at LSB within the real part of the transformed image. Inverse DFT is performed for the transformation from frequency domain to spatial domain as final step of encoding. Decoding is done through the reverse procedure. The experimental results have been discussed and compared with the existing steganography algorithm S-Tools. Histogram analysis and Chi-Square test of source image with embedded image shows the better results in comparison with the S-Tools.
基金the Guangdong Major Project of Basic and Applied Basic Research (2020B0301030009)National Natural Science Foundation of China (91750205,62175157,61935013,61975128)+2 种基金Leading Talents of Guangdong Province Program (00201505)Natural Science Foundation of Guangdong Province (2019TQ05X750)Shenzhen ScienceandTechnologyProgram(JCYJ20210324120403011,KQTD20170330110444030,RCJC20210609103232046)
文摘On-chip manipulation of the spatiotemporal characteristics of optical signals is important in the transmission and processing of information.However,the simultaneous modulation of on-chip optical pulses,both spatially at the nano-scale and temporally over ultra-fast intervals,is challenging.Here,we propose a spatiotemporal Fourier transform method for on-chip control of the propagation of femtosecond optical pulses and verify this method employing surface plasmon polariton(SPP)pulses on metal surface.An analytical model is built for the method and proved by numerical simulations.By varying space-and frequency-dependent parameters,we demonstrate that the traditional SPP focal spot may be bent into a ring shape,and that the direction of propagation of a curved SPP-Airy beam may be reversed at certain moments to create an S-shaped path.Compared with conventional spatial modulation of SPPs,this method offers potentially a variety of extraordinary effects in SPP modulation especially associated with the temporal domain,thereby providing a new platform for on-chip spatiotemporal manipulation of optical pulses with applications including ultrafast on-chip photonic information processing,ultrafast pulse/beam shaping,and optical computing.
基金supported by the National Natural Science Foundation of China (Grant No. 41875040)the Natural Science Foundation of Anhui Province, China (Grant No. 2008085MF211)+1 种基金the Foundation for Young Talents in College of Anhui Province, China (Grant No. gxyqZD2019034)the Innovation Fund for Postgraduates of Huaibei Normal University, China (Grant No. CX2022035)。
文摘We present experimental observations of soliton pulsations in the net normal-dispersion fiber laser by using the dispersive Fourier transform(DFT) technique. According to the pulsating characteristics, the soliton pulsations are classified as visible and invisible soliton pulsations. The visible soliton pulsation is converted from single-into dual-soliton pulsation with the common characteristics of energy oscillation and bandwidth breathing. The invisible soliton pulsation undergoes periodic variation in the spectral profile and peak power but remains invariable in pulse energy. The reason for invisible soliton pulsation behavior is periodic oscillation of the pulse inside the soliton molecule. These results could be helpful in deepening our understanding of the soliton pulsation phenomena.