期刊文献+

三步相移数字全息术用于相位密钥的复制 被引量:7

Phase-key Duplication with Three-step Phase-shifting Digital Holography
在线阅读 下载PDF
导出
摘要 提出把双随机相位编码中的相位密钥记录为数字全息图,以实现密钥的复制。这能使用户远程访问密文时,可以通过相应的相移算法从记录的数字全息图中重构出相位密钥,并解密得到原始图像。给出了一种可能的应用方案,并分析了CCD噪声对相位密钥重构质量的影响。 A phase-key duplication technique is introduced. The phase-key in the doudle random-phase encoding system is recorded as digital holograms for this purpose. Therefore,the user who remotely access the encrypted data can recover the original image with the phase-key reconstructed by use of a corresponding phase-shifting algorithm from the recorded holograms. We analyze the influence of the noise in the COD camera on the recording process to the reconstruction of the phase-key. In addition,we also present a possible application of the technique of phase-key duplication based on digital holography.
出处 《光电子.激光》 EI CAS CSCD 北大核心 2006年第7期884-886,共3页 Journal of Optoelectronics·Laser
基金 国家自然科学基金资助项目(60277027)
关键词 光学加密 数字全息术 双随机相位编码 密钥复制 optical encryption digital holography double random-phase encoding phase-key replication
  • 相关文献

参考文献13

  • 1张静娟,司徒国海,张艳.基于随机相位编码技术的光学安全系统的研究进展[J].中国科学院研究生院学报,2003,20(3):265-272. 被引量:12
  • 2Refregier P,Javidi B. Optical image encryption based on input plane and Fourier plane random encoding[J]. Optics Letters,1995,20(7) :767-769.
  • 3Hennelly B M, Sheridan J T. Image encryption and the fractional Fourier transform [J]. Optik, 2004, 114 (6):251-265.
  • 4SITU Guo-hai, ZHANG Jing-juan. Double random-phase encoding in the Fresnel domain[J]. Optics Letters,2004,29(14) : 1584-1586.
  • 5Su W C,Sun C C,Chen Y C, et al. Duplication of phase key for random-phase-encrypted volume holograms[J].Applied Optics, 2004,43(8):1728-1733.
  • 6Tajahuerce E, Matoba O, Verrall S C, et al. Optoelectronic information encryption with phase-shifting interferometry[J]. Applied Optics, 2000,39(14) :2313-2320.
  • 7司徒国海,张静娟,张艳,赵震声.级联相位恢复算法用于光学图像加密[J].光电子.激光,2004,15(3):341-343. 被引量:7
  • 8SITU Guo-hai ,ZHANG Jing-juan. A lensless optical security system based on computer-generated phase only masks[J]. Optics Communications, 2004,232 ( 1-6 ) : 115-122.
  • 9SITU Guo-hai, ZHANG Jing-juan. Image hiding with computer-generated phase codes for optical authentication[J]. Optics Communications, 2005,245 (1-6): 55-65.
  • 10Yamaguchi I, Zhang T. Phase-shifting digital holography[J]. Optics Letters, 1997,22(16) : 1268-1270.

二级参考文献65

  • 1[1]P Réfrégier,B Javidi.Optical image encryption based on input plane and Fourier plane random enconding[J].OPtics Letter,1995,20(7):767-769.
  • 2[2]G Unnikrishnan,J Joseph,K Singh.Optical encryption by double-random phase encoding in the fractional Fourier domain[J].Optical Letter,2000,25(12):887-889.
  • 3[3]YANG Xiao-ping,ZHAI Hong-chen,LIU Fu-min.Optimization of kinoform in random phase encryption[J].J.of Optoelectronics·Laser(光电子·激光),2003,14(11):1187-1190.(in Chinese)
  • 4[4]Y Li,K Kreske,J Rosen.Security and encryption optical systems based on a correlator with significant output images[J].Applied Optics,2000,39(29):5295-5301.
  • 5[5]R K Wang,L A Watson,C Chatwin.Random phase encoding for optical security[J].Optical Engineering,1996,35(9):2464-2469.
  • 6[6]J R Fienup.Iterative method applied to image reconstruction and to computer-generated holograms[J].Optical Engineering,1980,19(3):297-305.
  • 7K John Drinkwater, Brian W Holmes, Keith A Jones. Development and applications of diffractive optical security devices for banknotes and high documents. SPIE,2000, 3973:66-77.
  • 8Pawel Stephen, Remigiusz Gajda, Tomasz Sznplik. Distributed kinoforms in optical security applications. Opt Eng, 1996, 35(9):2453-2458.
  • 9Thad G Walker. Holography without photography. Am J Phys, 1999, 67(9) : 783-785.
  • 10Bahram Javidi, Joseph L Homer. Optical pattern recognition for validation and security verification. Opt Eng, 1994, 33(6) : 1752-1756.

共引文献17

同被引文献78

引证文献7

二级引证文献41

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部