版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領
文檔簡介
1、英文文獻原文A cascaded iterative Fourier transform algorithmfor optical security applicationsAbstract:A cascaded iterative Fourier transform (CIFT) algorithm is presented for optical security applications. Two phase-masks are
2、 designed and located in the input and the Fourier domains of a 4-f correlator respectively, in order to implement the optical encryption or authenticity verification. Compared with previous methods, the proposed algori
3、thm employs an improved searching strategy: modifying the phase- distributions of both masks synchronously as well as enlarging the searching space. Computer simulations show that the algorithm results in much faster con
4、vergence and better image quality for the recovered image. Each of these masks is assigned to different person. Therefore, the decrypted image can be obtained only when all these masks are under authorization. This key-a
5、ssignment strategy may reduce the risk of being intruded.Key words: Optical security – optical encryption – cascaded iterative Fourier transform algorithm1. IntroductionOptical techniques have shown great potential
6、in the field of information security applications. Recently Réfrégier and Javidi proposed a novel double-random-phase encoding technique, which encodes a primary image into a stationary white noise. This techni
7、que was also used to encrypt information in the fractional Fourier domain and to store encrypted information holographically. Phase encoding techniques were also proposed for optical authenticity verification. Wang et
8、 al and Li et al proposed another method for optical encryption and authenticity verification. Unlike the techniques mentioned above, this method encrypts information completely into a phase mask, which is located in e
9、ither the input or the Fourier domain of a 4-f correlator. For instance, given the predefinitions of a significant image f(x, y) as the desired output and a phase-distribution exp{jb(u, v)} in the Fourier domain, it’s
10、 easy to optimize the other phase function exp{jp(x, y)} with a modified projection onto constraint sets (POCS) algorithm [10]. Therefore the image f(x, y) is encoded successfully into exp{jp(x, y)} with the aid of ex
11、p{jb(u, v)}. In other words, the fixed phase exp{jb(u, v)} serves as the lock while the retrieved phase exp{jp(x, y)} serves as the key of the security system. To reconstruct the original information, the phase functio
12、ns exp{jp(x, y)} and exp{jb(u, v)} must match and be located in the input and the Fourier plane respectively. Abookasis et al implemented this scheme with a joint transform correlator for optical verification. However
13、, because the key exp{jp(x, y)} contains information of the image f(x, y) and the lock exp{jb(u, v)}, and the 4-f correlator has a character of linearity, it is possible for the intruder to find out the phase-distribut
14、ion of the lock function by statistically initialization of the phase-distributions of the masks. Suppose the iteration process reaches the kth iteration (k = 1, 2, 3, …), and the phase-distributions in the input and the
15、 Fourier plane are represented as and , respectively. Then an estimation of the target image is obtained at the output of the correlator defined by where FT and IFT denote the Fourier transform and the inverse Fourier t
16、ransform, respectively.If fk(x,y)satisfies the convergent criterion, the iteration process stops, and and are the optimized distributions. Otherwise, the fk(x,y) is modified to satisfy the target image constraint as fol
17、lows Then the modified function is transformed backward to generate both of the phase-distributions as follows where ang{ · } denotes the phase extraction function. Then k is replaced by k+1 for the next iteration.
18、It is shown in Eqs. 3(a) and 3(b) that both of the phase-distributions are modified in every iteration, accorded to the estimation of the target image in the present iteration. It ensures he algorithm converges with much
19、 faster speed and more consistent for the phase-masks. In general, the convergent criterion can be the MSE or the correlation coefficient between the iterated and the target image, which are defined by where M*N is the
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 眾賞文庫僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
- 6. 下載文件中如有侵權(quán)或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 外文翻譯---級聯(lián)迭代傅里葉變換算法在光學安全中的應用
- 外文翻譯---級聯(lián)迭代傅里葉變換算法在光學安全中的應用
- 外文翻譯---級聯(lián)迭代傅里葉變換算法在光學安全中的應用.docx
- 外文翻譯---級聯(lián)迭代傅里葉變換算法在光學安全中的應用.docx
- 外文翻譯---級聯(lián)迭代傅里葉變換算法在光學安全中的應用(英文)
- 基于計算全息和迭代傅里葉變換算法的光學圖像加密技術的研究.pdf
- 分數(shù)階傅里葉變換算法的應用研究
- 分數(shù)階傅里葉變換算法的應用研究.pdf
- 基于級聯(lián)迭代傅里葉變換的圖像隱藏技術的研究及應用.pdf
- 信息光學中的傅里葉變換
- 多核環(huán)境并行傅里葉變換算法的研究.pdf
- 傅里葉變換在信號處理中的應用
- 傅里葉變換在圖像處理中的應用研究
- 基于插值的非均勻信號的傅里葉變換算法研究大學論文
- 傅里葉變換_離散時間傅里葉變換_離散傅里葉變換的關系
- 分數(shù)階傅里葉變換在chirp調(diào)制信號接收中的應用
- 光學第六章-傅里葉變換光學簡介
- 詳解快速傅里葉變換fft算法
- 短時傅里葉變換和提升小波變換在脈象信號分析中的應用.pdf
- 非均勻快速傅里葉變換及其在SAR成像中的應用.pdf
評論
0/150
提交評論