光学图像加密中随机模板的特性比较

沈学举, 许芹祖, 刘旭敏

沈学举, 许芹祖, 刘旭敏. 光学图像加密中随机模板的特性比较[J]. 应用光学, 2014, 35(1): 58-64.
引用本文: 沈学举, 许芹祖, 刘旭敏. 光学图像加密中随机模板的特性比较[J]. 应用光学, 2014, 35(1): 58-64.
SHEN Xue-ju, XU Qin-zu, LIU Xu-min. Properties comparison of random mask in optical image encryption[J]. Journal of Applied Optics, 2014, 35(1): 58-64.
Citation: SHEN Xue-ju, XU Qin-zu, LIU Xu-min. Properties comparison of random mask in optical image encryption[J]. Journal of Applied Optics, 2014, 35(1): 58-64.

光学图像加密中随机模板的特性比较

详细信息
    通讯作者:

    沈学举(1963-),男,山东人,教授,博士生导师,现主要从事激光技术及光学信息处理方面的教学和研究工作

  • 中图分类号: TN911.73

Properties comparison of random mask in optical image encryption

  • 摘要: 为比较光学图像加密中随机模板的特性,分别利用随机相位模板和随机振幅模板对几种典型的光学图像加密系统进行了光学图像加密的数值模拟和加密效果分析。模拟结果表明,将随机振幅模板用于基于光学傅里叶变换的双随机模板图像加密系统时,原始图像和加密图像的相关系数大于0.5,不能有效加密原始图。但将其用于基于菲涅耳变换全息的光学图像加密系统时,原始图像和加密图像的相关系数趋于0,可获得与使用随机相位模板时非常接近的加密效果。
    Abstract: To compare the properties of random mask in the optical image encryption, optical image encryption was stimulated and image encryption effects were analyzed using random phase mask and random amplitude mask in the several typical optical image encryption systems. The stimulation result shows that the correlation coefficient between original image and encryption image is bigger than 0.5 when random amplitude mask is used in double random mask optical encryption system based on optical Fourier transform and the original image can not be encrypted effectively. But the correlation coefficient between original image and encryption image approaches 0 when random amplitude mask is used in optical encryption system based on optical Fourier transform holography and the encryption effect is similar to one when random phase mask is used.
  • [1]REFREGIER P, JAVIDI B. Optical image encryption based on input plane and Fourier plane random encoding[J]. Opt. Let., 1995, 20(7):767-769.
    [2]张静娟,史伟诗,司徒国海. 光学信息隐藏综述[J]. 中国科学院研究生院学报,2006, 23(3): 289-296.
      ZHANG Jing-juan, SHI Yi-Shi. SITU Guo-hai. A survey on optical information hiding[J]. Journal of the Graduate School of the Chinese Academy of Science, 2006,23(3): 289-296.(in Chinese with an English abstract)
    [3]JAVIDI B. Securing information with optical technologies [J]. Physics Today, 1997, 50 (3): 27-32.
    [4]KISHK S, JAVIDI B. Information hiding technique with double phase encoding [J]. Appl. Opt., 2002, 41 (26): 5462-5470.
    [5]SHEN Xue-ju, LIN Chao, KONG De-zhao. Fresnel-transform holographic encryption based on angular multiplexing and random-amplitude mask[J]. Opt. Eng., 2012, 51(6): 1-6.
    [6]LIN C, SHEN Xue-ju, TANG Rui, et al. Multiple images encryption based on Fourier transform hologram[J]. Opt. Commun., 2012, 285:1023-1028
    [7]SITU G, ZHANG J. Double random-phase encoding in the Fresnel domain [J]. Opt. Let., 2004, 29 (14): 1584-1586.
    [8]任国朝,井西利,谢丹艳. 基于分频域和菲涅耳域的光学图像加密方法[J]. 应用光学,2009,30(2): 183-194.
    REN Guo-zhao,JING Xi-li,XIE Dan-yan. Optical image encryption based on frequency splitting domain and Fresnel domain[J]. Journal of Applied Optics, 2009,30(2): 183-194.(in Chinese with an English abstract)
    [9]UNNIKRISHNAN G, SINGH K. Double random fractional Fourier domain encoding for optical security [J]. Opt. Eng., 2000, 39 (11): 2853-2859.
    [10]CHEN F, ZHAO M. Image encryption with fractional wavelet packet method [J]. Optik, 2008, 119 (1): 286-291.
    [11]CHEN F, ZHAO M. Optical image encryption with Hartley transforms [J]. Opt. Let., 2006, 31 (23): 3438- 3440.
    [12]MA J, LIU. J. Double-image sharing encryption based on associated fractional Fourier transform and gyrator transform [J]. Chinese Opt. Let., 2010, 8 (3): 290-292.
    [13]秦怡,巩琼,吕晓东,等. 基于干涉原理的双图像加密系统[J]. 应用光学,2013. 34(2):260-266.
    QIN Yi, GONG Qiong, Lv Xiao-dong, et al. Double image encryption system based on principles of interference[J]. Journal of Applied Optics, 2013, 34(2):260-266.(in Chinese with an English abstract)
    [14]孟祥锋, 彭翔. 优化的两步相移算法在图像加密中的应用研究[J]. 物理学报, 2010, 59 (9): 118-6124.
    MENG Xiang-feng, PENG Xiang. Optimized two-step phase-shifting algorithm applied to image encryption[J]. Acta Physica Sinica, 2010, 59 (9): 118-6124.(in Chinese with an English abstract)
    [15]LIN Chao, SHEN Xue-ju.Analysis and design of impulse attack free generalized joint transform correlator optical encryption scheme[J]. Optics & Laser Technology ,2012,44:2032-2036.
    [16]AMAYA D, TEBALDI M. Wavelength multiplexing encryption using joint transform correlator architecture [J]. Appl. Opt., 2009, 48 (11): 2099-2104.
    [17]RUEDA E, BARRERA J. Optical encryption with a reference wave in a joint transform correlator architecture [J]. Opt. Commun., 2009, 282 (1): 3243-3249.
    [18]RUEDA E, BARRERA J. Lateral shift multiplexing with a modied random mask in a joint transform correlator encrypting architecture [J]. Opt. Eng., 2009, 48 (2): 027006 (1-6).
    [19]ALFALOU A, BROSSEAU C. Dual encryption scheme of images using polarized light [J]. Opt. Let., 2010, 35 (13): 2185-2187.
    [20]RODRLGUEZ J. Computational cryptography based on trigonometric algorithms and intensity superposition [J]. The Imaging Science Journal, 2010, 58 (1): 61-80.
计量
  • 文章访问数:  1884
  • HTML全文浏览量:  118
  • PDF下载量:  278
  • 被引次数: 0
出版历程
  • 刊出日期:  2014-01-14

目录

    /

    返回文章
    返回