An optical encryption scheme based on a ghost imaging system with disordered speckles is proposed to obtain a higher security with a small key. In the scheme, Alice produces the random speckle patterns and obtains the...An optical encryption scheme based on a ghost imaging system with disordered speckles is proposed to obtain a higher security with a small key. In the scheme, Alice produces the random speckle patterns and obtains the detection results with the help of a computational ghost imaging(CGI) system. Then Alice permutes the order of the random speckle patterns and shares the permutation sequence as a secure key to the authorized users. With the secure key, Bob could recover the object with the principle of the CGI system, whereas, the unauthorized users could not obtain any information of the object. The numerical simulations and experimental results show that the proposed scheme is feasible with a small key, simultaneously,it has a higher security. When the eavesdropping ratio(ER) is less than 40%, the eavesdropper cannot acquire any useful information. Meanwhile, the authorized users could recover completely with the secure key.展开更多
In a non-free field,the existence of disturbing sources would destroy the free-field condition required by near-field acoustic holography,and confuse the identification of target source due to the scattering effect ca...In a non-free field,the existence of disturbing sources would destroy the free-field condition required by near-field acoustic holography,and confuse the identification of target source due to the scattering effect caused by disturbing sound falling on the target source.To totally remove the influence of disturbing source,a method for recovering and reconstructing the target sound field in a non-free field was proposed based on the equivalent source method and the pressure-velocity measurement.In the proposed method,the sound field separation technique was firstly used to separate the mixed sound field into the outgoing field coming from the target source and the incoming field coming from the disturbing source.Then the scattered component contained in the outgoing field was calculated by using the disturbing sound and the surface impedance of the target source.Finally,the sound field radiated by the target source in a free field was obtained by subtracting the scattered component from the outgoing field and was further used to reconstruct the sound field of the target source.The proposed method was numerically and experimentally testified and the results of both the simulation and the experiment demonstrated the validity of the proposed method.展开更多
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61475075 and 61271238)the Open Research Fund of Key Lab of Broadband Wireless Communication and Sensor Network Technology,Ministry of Education,China(Grant No.NYKL2015011)
文摘An optical encryption scheme based on a ghost imaging system with disordered speckles is proposed to obtain a higher security with a small key. In the scheme, Alice produces the random speckle patterns and obtains the detection results with the help of a computational ghost imaging(CGI) system. Then Alice permutes the order of the random speckle patterns and shares the permutation sequence as a secure key to the authorized users. With the secure key, Bob could recover the object with the principle of the CGI system, whereas, the unauthorized users could not obtain any information of the object. The numerical simulations and experimental results show that the proposed scheme is feasible with a small key, simultaneously,it has a higher security. When the eavesdropping ratio(ER) is less than 40%, the eavesdropper cannot acquire any useful information. Meanwhile, the authorized users could recover completely with the secure key.
基金supported by the National Natural Science Foundation of China(51605274)the Young College Teachers Program of Shanghai Education Committee(ZZGCD15115)+1 种基金the Innovation Program of Shanghai Municipal Education Commission(14YZ137)the Postdoctoral Research Project of Jiangxi Province(2014ky20)
文摘In a non-free field,the existence of disturbing sources would destroy the free-field condition required by near-field acoustic holography,and confuse the identification of target source due to the scattering effect caused by disturbing sound falling on the target source.To totally remove the influence of disturbing source,a method for recovering and reconstructing the target sound field in a non-free field was proposed based on the equivalent source method and the pressure-velocity measurement.In the proposed method,the sound field separation technique was firstly used to separate the mixed sound field into the outgoing field coming from the target source and the incoming field coming from the disturbing source.Then the scattered component contained in the outgoing field was calculated by using the disturbing sound and the surface impedance of the target source.Finally,the sound field radiated by the target source in a free field was obtained by subtracting the scattered component from the outgoing field and was further used to reconstruct the sound field of the target source.The proposed method was numerically and experimentally testified and the results of both the simulation and the experiment demonstrated the validity of the proposed method.