欢迎来到毕设资料网! | 帮助中心 毕设资料交流与分享平台
毕设资料网
全部分类
  • 毕业设计>
  • 毕业论文>
  • 外文翻译>
  • 课程设计>
  • 实习报告>
  • 相关资料>
  • ImageVerifierCode 换一换
    首页 毕设资料网 > 资源分类 > DOCX文档下载
    分享到微信 分享到微博 分享到QQ空间

    外文翻译---级联迭代傅里叶变换算法在光学安全中的应用

    • 资源ID:126250       资源大小:199.99KB        全文页数:11页
    • 资源格式: DOCX        下载积分:100金币
    快捷下载 游客一键下载
    账号登录下载
    三方登录下载: QQ登录
    下载资源需要100金币
    邮箱/手机:
    温馨提示:
    快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如填写123,账号就是123,密码也是123。
    支付方式: 支付宝   
    验证码:   换一换

     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。

    外文翻译---级联迭代傅里叶变换算法在光学安全中的应用

    1、PDF外文:http:/   AcascadediterativeFouriertransformalgorithm foroptical securityapplications Abstract:A cascaded iterative Fourier transform (CIFT) algorithm is presented for optical security applications. Two phase-masks are designed and located in the input and the Fourier domains of a 4-f corr

    2、elator respectively, in order to implement the optical encryption or authenticity verification. Compared with previous methods, the proposed algorithm employs an improved searching strategy: modifying the phase-distributions of both masks synchronously as well as enlarging the searching space. Compu

    3、ter simulations show that the algorithm results in much faster convergence and better image quality for the recovered image. Each of these masks is assigned to different person. Therefore, the decrypted image can be obtained only when all these masks are under authorization. This key-assignment stra

    4、tegy may reduce the risk of being intruded. Key  words: Opticalsecurityoptical encryptioncascaded iterativeFouriertransformalgorithm 1.Introduction Optical techniques have shown great potential in the field of information security applications. Recently Rfrgier and Javidi proposed a novel doubl

    5、e-random-phase encoding technique, which encodes a primary image into a stationary white noise. This technique was also used to encrypt information in the fractional Fourier domain and  to store encrypted information  holographically. Phase encoding techniques were also proposed for optica

    6、l authenticity verification.    Wang et al and Li et al proposed another method for optical encryption and authenticity verification. Unlike the techniques mentioned above, this method encrypts information completely into  a phase mask, which is located in either the input or the Four

    7、ier domain of a 4-f correlator. For instance, given the predefinitions of a significant image f(x, y)  as the desired output and a phase-distribution expjb(u, v) in the Fourier domain, its easy to optimize the other phase function expjp(x, y) with a modified projection onto constraint sets &nbs

    8、p;(POCS) algorithm 10.  Therefore the image f(x, y) is encoded successfully into expjp(x, y)  with the aid of expjb(u, v). In other words, the fixed phase expjb(u, v) serves as the lockwhile the retrieved phase expjp(x, y) serves as the key of the security system. To reconstruct the origin

    9、al information, the phase functions expjp(x, y) and expjb(u, v) must match and be located in the input and the Fourier plane respectively. Abookasis et al implemented this scheme with a joint transform correlator for optical verification.   However, because the key expjp(x, y) contains informat

    10、ion of the image f(x, y) and the  lock expjb(u, v), and the 4-f correlator has a character of linearity, it is possible for the intruder to find out the phase-distribution of the lock function by statistically analyzing the random characters of the keys if the system uses only one lock for diff

    11、erent image. In order to increase the secure level of such system, one approach is to use different lock function for different image. Enlarging the key space is another approach to increase the secure level. It can be achieved by encrypting images in the fractional Fourier domain; as a result, the

    12、scale factors and the transform order offer additional keys. On the other hand, note that the phase-mask serves as the key of the system, enlarging the key space can be achieved by encoding the target image into two or more phase masks with a modified POCS algorithm. Chang et al have proposed a mult

    13、iple-phases retrieval algorithm and demonstrated that an optical security system based on it has higher level of security and higher quality for the decrypted image. However, this algorithm retrieves only one phase-distribution with a phase constraint in each iteration. As a result, the masks are no

    14、t so consistent and may affect the quality of the recovered image.  In the present paper, we propose a modified POCS algorithm that adjusts the distributions of both phase-masks synchronously in each iteration. As a result, the convergent speed of the iteration process is expected to significan

    15、tly increase. And the target image with much higher quality is expected to recover because of the co-adjusting of the two masks during the iteration process. When the iteration process is finished, the target image is encoded into the phase-masks successfully. Each of these masks severs as the key o

    16、f the security system and part of the encrypted image itself as well. Moreover, the algorithm can be extended to generate multiple phase-masks for arbitrary stages correlator. To acquire the maximum security, each key is assigned to different authority so that the decryption cannot be performed but

    17、being authorized by all of them. This key-assignment scheme is especially useful for military and government applications.   The algorithm description is presented in Section 2. Computer simulation of this algorithm and the corresponding discuss are presented in Section 3.   2. Cascaded It

    18、erative Fourier Transform (CIFT) Algorithm  Consider the operation of the encryption system with the help of a 4-f correlator as shown in Fig.1, the phase masks placed in the input and the Fourier planes are denoted as and respectively, where (x, y) and (u, v) represent the space and the freque

    19、ncy coordinate, respectively. Once the system is illuminated with a monochromatic plane wave, a target image f(x,y)(an image to be decrypted or verified) is expected to obtain at the output plane. The phase-masks andcontain the information of f(x,y), that is,f(x,y)is encoded into these phase-masks.

    20、The encoding process is the optimization of the two phase-distributions. It is somewhat similar with the problems of the image reconstruction and the phase retrieval, which can be solved with the POCS algorithm. However, the present problem comes down to the phase retrieval in three (or more, in gen

    21、eral) planes along the propagation direction. So the conventional POCS algorithm should be modified for this application.    The cascaded iteration Fourier transform (CIFT) algorithm begins with the initialization of the phase-distributions of the masks. Suppose the iteration process reach

    22、es the kthiteration (k = 1, 2, 3, ), and the phase -distributions in the input and the Fourier plane are represented as and  , respectively. Then an estimation of the target image is obtained at the output of the correlator defined by   where FT and IFT denote the Fourier transform and the

    23、 inverse Fourier transform, respectively.Iffk(x,y)satisfies the convergent criterion, the iteration process stops, and and are the optimized distributions. Otherwise, the fk(x,y) is modified to satisfy the target image constraint as follows   Then the modified function is transformed backward t

    24、o generate both of the phase-distributions as follows   where ang denotes the phase extraction function. Then k is replaced by k+1 for the next iteration. It is shown in Eqs. 3(a) and 3(b) that both of the phase-distributions are modified in every iteration, accorded to the estimation of the ta

    25、rget image in the present iteration. It ensures he algorithm converges with much faster speed and more consistent for the phase-masks.  In general, the convergent criterion can be the MSE or the correlation coefficient between the iterated and the target image, which are defined by   where M*N is the size of the image, and E denotes the mean of the image.


    注意事项

    本文(外文翻译---级联迭代傅里叶变换算法在光学安全中的应用)为本站会员(译***)主动上传,毕设资料网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请联系网站客服QQ:540560583,我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们
    本站所有资料均属于原创者所有,仅提供参考和学习交流之用,请勿用做其他用途,转载必究!如有侵犯您的权利请联系本站,一经查实我们会立即删除相关内容!
    copyright@ 2008-2025 毕设资料网所有
    联系QQ:540560583