版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
1、A cascaded iterative Fourier transform algorithm for optical security applicationsGuohai Situ, Jingjuan ZhangDepartment of Physics, Graduate School of the Chinese Academy of Sciences, P.O. Box 3908, Beijing, 100039, Chin
2、aAbstract: A cascaded iterative Fourier transform (CIFT) al- gorithm is presented for optical security applications. Two phase-masks are designed and located in the input and the Fourier domains of a 4-f correlator respe
3、ctively, in order to implement the optical encryption or authenticity verifica- tion. Compared with previous methods, the proposed algo- rithm employs an improved searching strategy: modifying the phase-distributions of
4、both masks synchronously as well as enlarging the searching space. Computer simulations show that the algorithm results in much faster convergence and better image quality for the recovered image. Each of these masks is
5、assigned to different person. Therefore, the decrypted image can be obtained only when all these masks are under authorization. This key-assignment strategy may reduce the risk of being intruded.Key words: Optical securi
6、ty – optical encryption – cascaded iterative Fourier transform algorithm1. IntroductionOptical techniques have shown great potential in the field of information security applications. Recently Re ´- fre ´gier a
7、nd Javidi [1] proposed a novel double-ran- dom-phase encoding technique, which encodes a pri- mary image into a stationary white noise. This technique was also used to encrypt information in the fractional Fourier domain
8、 [2, 3] and to store encrypted information holographically [4, 5]. Phase encoding techniques were also proposed for optical authenticity verification [6–8]. Wang et al. [9] and Li et al. [10] proposed another method for
9、optical encryption and authenticity verifi- cation. Unlike the techniques mentioned above, this method encrypts information completely into a phase mask, which is located in either the input or the Four- ier domain of a
10、4-f correlator. For instance, given the predefinitions of a significant image fðx; yÞ as the de- sired output and a phase-distribution exp fibðu; vÞg in the Fourier domain, it’s easy to optimize the o
11、ther phase function exp fipðx; yÞÞg with a modified projec-tion onto constraint sets (POCS) algorithm [10]. There- fore the image fðx; yÞ is encoded successfully into exp fipðx; yÞg wit
12、h the aid of exp fibðu; vÞg. In other words, the fixed phase exp fibðu; vÞg serves as the lock while the retrieved phase exp fipðx; yÞg serves as the key of the security system. To reconstru
13、ct the original information, the phase functions exp fipðx; yÞg and exp fibðu; vÞg must match and be located in the input and the Fourier plane respectively. Abookasis et al. [11] implemented this sch
14、eme with a joint transform correlator for optical verification. However, because the key exp fipðx; yÞg contains information of the image fðx; yÞ and the lock exp fibðu; vÞg, and the 4-f cor
15、relator has a character of linearity, it is possible for the intruder to find out the phase-distribution of the lock function by statistically analyzing the random characters of the keys if the sys- tem uses only one loc
16、k for different image. In order to increase the secure level of such system, one ap- proach is to use different lock function for different image. Enlarging the key space is another approach to increase the secure level.
17、 It can be achieved by en- crypting images in the fractional Fourier domain; as a result, the scale factors and the transform order offer additional keys [2, 3]. On the other hand, note that the phase-mask serves as the
18、key of the system, enlar- ging the key space can be achieved by encoding the target image into two or more phase masks with a modified POCS algorithm. Chang et al. [12] have pro- posed a multiple-phases retrieval algorit
19、hm and de- monstrated that an optical security system based on it has higher level of security and higher quality for the decrypted image. However, this algorithm retrieves only one phase-distribution with a phase constr
20、aint in each iteration. As a result, the masks are not so con- sistent and may affect the quality of the recovered im- age. In the present paper, we propose a modified POCS algorithm that adjusts the distributions of bot
21、h phase- masks synchronously in each iteration. As a result, the convergent speed of the iteration process is expected to significantly increase. And the target image with much higher quality is expected to recover becau
22、se of the co-adjusting of the two masks during the iteration process. When the iteration process is finished, the tar-Guohai Situ, Jingjuan Zhang, A cascaded iterative Fourier transform algorithm for optical security app
23、lications 473International Journal for Light and Electron Optics0030-4026/03/114/10-473 $ 15.00/0Received 1 July 2003; accepted 12 October 2003.Correspondence to: G. Situ E-mail: ghsitu@mails.gscas.ac.cnOptik 114, No. 10
24、 (2003) 473–477 http://www.elsevier-deutschland.de/ijleoventional iteration algorithm, that is, the final phase- distributions of the masks are determined by the initia- lizations of them. Therefore different initializat
25、ions will result in different distributions of foptðx; yÞ and woptðu; vÞ. The target image cannot be descrypted if the keys mismatch (that is, the keys were generated from the different iteration proc
26、ess). In practical system, the phases of the masks are quantized to finite levels, which might reduce the solu- tion space and introduce noise to the recovered image. To compensate the loss of the quality, the target ima
27、ge can be encoded into more phase-masks to provide ad- ditional freedom for solutions searching, which means to encrypt the image with a multi-stages (cascaded) correlator. From the point of view of security, this strat-
28、 egy significantly enlarges the key space (because more keys were generated), and makes the intrusion more difficult. Generally, the t-stages correlation is defined asf 0ðx; yÞ ¼ IFT fFT f. . . IFT fFT fex
29、p ½i2pfð1Þ ðx; yÞ?g? exp ½i2pwð2Þðu; vÞ?g . . . exp ½i2pfðt?1Þðx; yÞ?g? exp ½i2pwðtÞðu; vÞ?g ; ð5aÞfor t is ev
30、en, orf 0ðx; yÞ ¼ IFT fFT f. . . IFT fFT fIðx; yÞg? exp ½i2pwð1Þðu; vÞ?g . . . exp ½i2pfðt?1Þðx; yÞ?g? exp ½i2pwðtÞðu; vÞ
31、;?g ; ð5bÞfor t is odd, where the matrix Iðx; yÞ represents the input plane wave, and the superscript i ði ¼ 1; 2; . . . ; tÞ denotes the serial number of the masks in the system. The p
32、hase-distributions of these masks may be de- duced by analogous analysis for eq. 3.3. Computer simulationIn this section we numerically demonstrate our gen- eral concept. A jet plane image of the size 128 ? 128 with 256
33、grayscale is used as the target image as shown in fig. 2. The sizes of both phase-masks are same as the target image. And we suppose the opti- cal system is illuminated by a plane wave with the amplitude equating to 1. T
34、he algorithm starts with the random initialization of the two phase-masks. Then the phase functions are transformed forward and backward alternatively through the correlation defined by eqs. (1)–(3). The algorithm conver
35、ges very fast. The correlation coefficient reaches 0.99 after about 3 iterations, then it keeps increasing slowly and finally reaches 1 within 20 iterations, cor- respondingly, the intensity distribution of the re- triev
36、ed image is extremely close to that of the target image. Rigorously, the correlation coefficient does converge but not equate to 1 no matter how many iterations the algorithm runs because no analytic so-lutions for eq. (
37、1) can be found. Here we say it REACHES 1 just because the difference between the two images is beyond the limitation of the repre- sentational precision of the digital computer. Actu- ally, the CIFT algorithm retains th
38、e error-reducing property of the conventional POCS algorithm. The MSE keeps reducing till the local (but not global) minimum is reached. One interesting character of the CIFT algorithm is that arbitrary initializations c
39、an generate recovered images with almost same quality, and result in different distributions for the masks, as shown in fig. 3. Therefore the optimized phase-masks can be used as the keys of the security system. Only two
40、 phase-masks, which match each other and are located in the appropriate planes of the 4-f architecture, respectively, can recover the tar- get image. Otherwise, the output is meaningless. On the other hand, the keys exp
41、½i2pfoptðx; yÞ? and exp ½i2pwoptðu; vÞ?, are phase-only functions, and have ran- dom-like distributions as well. These characters may introduce a high level of security because they offer a
42、property of anti-counterfeiting. Another secure advan- tage of the CIFT algorithm arises in the application of authenticity verification. Instead of detecting a single correlation peak, the verification system based on t
43、he CIFT algorithm detects a significant output to deter- mine whether or not to verify the input. So it is impos- sible to cause a false verification by directly illuminat- ing the output plane bypassing the correlator b
44、ecause the intruder cannot generate the same pattern at the output without the knowledge of the correct phase-dis- tributions. This is especially useful in the applications where high security is necessary. For the sake
45、of secur- ity, the two masks are expected assigning to two per- sons, respectively. Therefore, the verification can be performed only under the authorizations of them both. If higher security is required, more phase-mask
46、s can be retrieved and assigned to more authorities so as to diminish the risk of being stolen of the keys. To compare with previous methods, the CIFT algo- rithm and the previous methods are investigated under the same
47、initial conditions. Let Algorithm A, B, C and D denote the methods presented in refs. [9], [10], [12] and the algorithm proposed in the present paper, re- spectively. Algorithm A and B merely modify the dis- tribution of
溫馨提示
- 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 眾賞文庫(kù)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 外文翻譯---級(jí)聯(lián)迭代傅里葉變換算法在光學(xué)安全中的應(yīng)用
- 外文翻譯---級(jí)聯(lián)迭代傅里葉變換算法在光學(xué)安全中的應(yīng)用
- 外文翻譯---級(jí)聯(lián)迭代傅里葉變換算法在光學(xué)安全中的應(yīng)用
- 外文翻譯---級(jí)聯(lián)迭代傅里葉變換算法在光學(xué)安全中的應(yīng)用.docx
- 外文翻譯---級(jí)聯(lián)迭代傅里葉變換算法在光學(xué)安全中的應(yīng)用.docx
- 基于計(jì)算全息和迭代傅里葉變換算法的光學(xué)圖像加密技術(shù)的研究.pdf
- 分?jǐn)?shù)階傅里葉變換算法的應(yīng)用研究
- 分?jǐn)?shù)階傅里葉變換算法的應(yīng)用研究.pdf
- 基于級(jí)聯(lián)迭代傅里葉變換的圖像隱藏技術(shù)的研究及應(yīng)用.pdf
- 信息光學(xué)中的傅里葉變換
- 多核環(huán)境并行傅里葉變換算法的研究.pdf
- 傅里葉變換在信號(hào)處理中的應(yīng)用
- 傅里葉變換在圖像處理中的應(yīng)用研究
- 基于插值的非均勻信號(hào)的傅里葉變換算法研究大學(xué)論文
- 傅里葉變換_離散時(shí)間傅里葉變換_離散傅里葉變換的關(guān)系
- 分?jǐn)?shù)階傅里葉變換在chirp調(diào)制信號(hào)接收中的應(yīng)用
- 光學(xué)第六章-傅里葉變換光學(xué)簡(jiǎn)介
- 詳解快速傅里葉變換fft算法
- 短時(shí)傅里葉變換和提升小波變換在脈象信號(hào)分析中的應(yīng)用.pdf
- 非均勻快速傅里葉變換及其在SAR成像中的應(yīng)用.pdf
評(píng)論
0/150
提交評(píng)論