期刊文献+

Gyrator变换全息图及其在图像加密中的应用 被引量:17

Gyrator Transform Hologram and Its Application in Image Encryption
在线阅读 下载PDF
导出
摘要 提出了gyrator变换全息图,利用gyrator变换快速算法模拟实现了gyrator变换全息图的产生和再现,并研究了基于相移数字全息的gyrator变换全息图.在此基础上提出了采用正弦相位光栅实现光学图像加密的新方法.该方法利用gyrator变换在相空间的旋转特性,将gyrator变换的角度、光栅的频率及光栅的旋转角度作为加密密钥,并利用两个或两个以上的gyrator变换系统的级联实现图像加密,增加了系统的安全性.依据相移数字全息进行的两个gyrator变换系统级联的仿真实验验证了该方法的可行性、有效性及其良好的安全性能. The gyrator transform hologram is proposed.The generation and the reconstruction of the gyrator transform hologram are simulated by using the fast algorithm for computing the gyrator transform.This new type hologram based on phase-shifting digital hologram is also studied.A novel method is proposed for optical image encryption by using sinusoidal phase gratings based on the methods mentioned above.In this proposal method,the angle of gyrator transform,the frequency and the rotation angle of the gratings are regarded as the encryption keys according to the rotation properties of the gyrator transform in the phase space.Two or more cascaded gyrator transform systems are applied to realize the image encryption.The simulation experiments are performed with two cascaded gyrator transform systems on the basis of the phase-shifting digital hologram.The results confirm the feasibility,validity and the secure performance of the proposal method.
作者 林睿
出处 《光子学报》 EI CAS CSCD 北大核心 2013年第2期245-252,共8页 Acta Photonica Sinica
基金 重庆市教委科技研究项目基金(No.KJl00717)资助
关键词 gyrator变换 gyrator变换全息图 gyrator变换快速算法 相移数字全息 图像加密 Gyrator transform Gyrator transform hologram Fast algorithm of gyrator transform Phase-shifting digital hologram Image encryption
作者简介 林睿(1972-),男,讲师,硕士,主要研究方向为光学图像处理.Email:linrui@ctbu.edu.cn
  • 相关文献

参考文献17

  • 1RODRIGO J A, AIAEVA T, CALVO M L. Gyrator transform: properties and applications [J]. Optics Express, 2007, 15(5) : 2190-2203.
  • 2RODRIGO J A, AIAEVA T, CALVO M L. Experimental implementation of the gyrator transform [J]. Journal of Optics Society of America A, 2007, 24(10) : 3135-3139.
  • 3RODRIGO J A, ALIEVA T, CALVO M I: Applications of gyrator transform for image processing [ J ]. Optics communication, 2007, 278(2): 279-284.
  • 4LI Hui juan , WANG Yu rong. Information security system based on iterative multiple phase retrieval in gyrator domain [J]. Opticsand Laser Technology, 2008, 40(7): 962-966.
  • 5LI Hui juan, WANG Yu rong. Double image encryption based on iterative gyrator transform[J]. Optics Communications, 2008, 281(23): 5745-5749.
  • 6LI Hui-juan. Image encryption based on gyrator transform and two-step phase-shifting interferometry[J].Optics and Lasers in Engineering , 2009, 47(1): 45-50.
  • 7LIU Zheng-jun, GUO Qing, XU Lie, et al. Double image encryption by using iterativerandom binary encoding in gyrator domains[J]. Opties Express, 2010, 18( 11): 12033-12043.
  • 8LIU Zheng-jnn, XU Lie, LIN Chuang, et al. Image ncryption scheme by using iterative random phase encoding in gyrator transform domains [J]. Optics and Lasers in Engineering, 2011, 45(5): 542-546.
  • 9SINGH N, SINHA A. Gyrator transform based optical image encryption using chaos[J]. Optics and Lasers in Engineering, 2009, 47(5) : 539-546.
  • 10ABUTURAB M R. Securing color information using Arnold transform in gyrator transform domain[J].Optics and Lasers in Engineering, 2012, 50(5): 772-779.

二级参考文献33

  • 1李喜德,林卫星,伍小平.相移干涉计量中相移器的同光路自动标定[J].光学学报,1994,14(9):956-960. 被引量:5
  • 2彭翔,汤红乔,田劲东.双随机相位编码光学加密系统的唯密文攻击[J].物理学报,2007,56(5):2629-2636. 被引量:42
  • 3RODRIGO J A, ALIEVA T, CALVO M L. Gyrator transform: properties and applications [J]. Optics Express,2007,15 ( 5 ) : 2190-2203.
  • 4RODRIGO J A, ALIEVA T, CALVO M L. Experimental implementation of the gyrator transform [J]. Journal of the Optics Society of America,2007 ,A24(10) :3135-3139.
  • 5RODRIGO J A, ALIEVA T, CALVO M L. Applications of gyrator transform for image processing[ J ]. Optics Communications,2007,278 (2) :279-284.
  • 6LI H J, WANG Y R. Information security system based on iterative multiple-phase retrieval in gyrator domain[J]. Optics and Laser Technology, 2008,40(7 ) :962-966.
  • 7LI H J, WANG Y R. Double-image encryption based on iterative gyrator transform [ J ]. Optics Communications ,2008,281 (23) :5745-5749.
  • 8LI H J. Image encryption based on gyrator transform and two-step phase-shifting interferometry [ J ]. Optics and Lasers in Engineering, 2009,47( 1 ) :45-50.
  • 9LIU Z, GUO Q, XU L, et al. Double image encryption by using iterative random binary encoding in gyrator domains[ J]. Optics Express, 2010,18 ( 11 ) : 12033-12043.
  • 10PEI S Ch, DING J J. Properties,digital implementation,applications, and self image phenomena of the gyrator transform [ C ]//17th European Signal Processing Conference. Glasgow, Scotland: European Sig- nal Processing Federation, 2009:441-445.

共引文献31

同被引文献134

引证文献17

二级引证文献61

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部