外文翻译---级联迭代傅里叶变换算法在光学安全中的应用
《外文翻译---级联迭代傅里叶变换算法在光学安全中的应用》由会员分享,可在线阅读,更多相关《外文翻译---级联迭代傅里叶变换算法在光学安全中的应用(11页珍藏版)》请在毕设资料网上搜索。
1、PDF外文:http:/ AcascadediterativeFouriertransformalgorithm foroptical securityapplications Abstract:A cascaded iterative Fourier transform (CIFT) algorithm is presented for optical security applications. Two phase-masks are designed and located in the input and the Fourier domains of a 4-f corr
2、elator respectively, in order to implement the optical encryption or authenticity verification. Compared with previous methods, the proposed algorithm employs an improved searching strategy: modifying the phase-distributions of both masks synchronously as well as enlarging the searching space. Compu
3、ter simulations show that the algorithm results in much faster convergence and better image quality for the recovered image. Each of these masks is assigned to different person. Therefore, the decrypted image can be obtained only when all these masks are under authorization. This key-assignment stra
4、tegy may reduce the risk of being intruded. Key words: Opticalsecurityoptical encryptioncascaded iterativeFouriertransformalgorithm 1.Introduction Optical techniques have shown great potential in the field of information security applications. Recently Rfrgier and Javidi proposed a novel doubl
5、e-random-phase encoding technique, which encodes a primary image into a stationary white noise. This technique was also used to encrypt information in the fractional Fourier domain and to store encrypted information holographically. Phase encoding techniques were also proposed for optica
6、l authenticity verification. Wang et al and Li et al proposed another method for optical encryption and authenticity verification. Unlike the techniques mentioned above, this method encrypts information completely into a phase mask, which is located in either the input or the Four
7、ier domain of a 4-f correlator. For instance, given the predefinitions of a significant image f(x, y) as the desired output and a phase-distribution expjb(u, v) in the Fourier domain, its easy to optimize the other phase function expjp(x, y) with a modified projection onto constraint sets &nbs
8、p;(POCS) algorithm 10. Therefore the image f(x, y) is encoded successfully into expjp(x, y) with the aid of expjb(u, v). In other words, the fixed phase expjb(u, v) serves as the lockwhile the retrieved phase expjp(x, y) serves as the key of the security system. To reconstruct the origin
9、al information, the phase functions expjp(x, y) and expjb(u, v) must match and be located in the input and the Fourier plane respectively. Abookasis et al implemented this scheme with a joint transform correlator for optical verification. However, because the key expjp(x, y) contains informat
10、ion of the image f(x, y) and the lock expjb(u, v), and the 4-f correlator has a character of linearity, it is possible for the intruder to find out the phase-distribution of the lock function by statistically analyzing the random characters of the keys if the system uses only one lock for diff
11、erent image. In order to increase the secure level of such system, one approach is to use different lock function for different image. Enlarging the key space is another approach to increase the secure level. It can be achieved by encrypting images in the fractional Fourier domain; as a result, the
12、scale factors and the transform order offer additional keys. On the other hand, note that the phase-mask serves as the key of the system, enlarging the key space can be achieved by encoding the target image into two or more phase masks with a modified POCS algorithm. Chang et al have proposed a mult
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中设计图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 外文 翻译 级联 傅里叶变换 算法 光学 安全 中的 应用 利用 运用
