- 1、本文档共11页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
- 5、该文档为VIP文档,如果想要下载,成为VIP会员后,下载免费。
- 6、成为VIP后,下载本文档将扣除1次下载权益。下载后,不支持退款、换文档。如有疑问请联系我们。
- 7、成为VIP后,您将拥有八大权益,权益包括:VIP文档下载权益、阅读免打扰、文档格式转换、高级专利检索、专属身份标志、高级客服、多端互通、版权登记。
- 8、VIP文档为合作方或网友上传,每下载1次, 网站将根据用户上传文档的质量评分、类型等,对文档贡献者给予高额补贴、流量扶持。如果你也想贡献VIP文档。上传文档
查看更多
英文文献原文AcascadediterativeFouriertransformalgorithmforoptical securityapplicationsAbstract:A cascaded iterative Fourier transform (CIFT) algorithm is presented for optical security applications. Two phase-masks are designed and located in the input and the Fourier domains of a 4-f correlator respectively, in order to implement the optical encryption or authenticity verification. Compared with previous methods, the proposed algorithm employs an improved searching strategy: modifying the phase-distributions of both masks synchronously as well as enlarging the searching space. Computer simulations show that the algorithm results in much faster convergence and better image quality for the recovered image. Each of these masks is assigned to different person. Therefore, the decrypted image can be obtained only when all these masks are under authorization. This key-assignment strategy may reduce the risk of being intruded.Key words: Opticalsecurity–optical encryption–cascaded iterativeFouriertransformalgorithm1.IntroductionOptical techniques have shown great potential in the field of information security applications. Recently Réfrégier and Javidi proposed a novel double-random-phase encoding technique, which encodes a primary image into a stationary white noise. This technique was also used to encrypt information in the fractional Fourier domain and to store encrypted information holographically. Phase encoding techniques were also proposed for optical authenticity verification. Wang et al and Li et al proposed another method for optical encryption and authenticity verification. Unlike the techniques mentioned above, this method encrypts information completely into a phase mask, which is located in either the input or the Fourier domain of a 4-f correlator. For instance, given the predefinitions of a significant image f(x, y) as the desired output and a phase-distribution exp{jb(u, v)} in the Fourier domain, it’s easy to optimize the other phase function exp{jp(x, y)
您可能关注的文档
- 吉利汽车部件实习报告.doc
- 基于整车匹配的变速器总体设计及整车动力性计算课程设计.doc
- 均布荷载作用下挡土墙上的土压力.doc
- 咖啡岗店商业计划书 毕业论文.doc
- 可编程序控制器课程设计---热处理加热炉电气控制系统设计.doc
- 可编程序控制器外文翻译2.docx
- 可编程控制器课程设计--基于运料小车自动往返顺序控制的PLC程序设计.doc
- 可口可乐公司_皓月集团参观实习报告.doc
- 可视化课程设计---多媒体播放器系统实现.docx
- 可调稳压电源与叮咚门铃课程设计.doc
- 2023年度安全员考试题库检测试题打印附答案详解(达标题).docx
- 2023年度安全员考试题库检测试题打印(实用)附答案详解.docx
- 2023年度安全员考试题库检测试题打印附完整答案详解【名师系列】.docx
- 2023年度安全员考试题库检测试题打印及答案详解【考点梳理】.docx
- 2023年度安全员考试题库检测试题打印附完整答案详解【各地真题】.docx
- 2023年度安全员考试题库检测试题打印附参考答案详解【完整版】.docx
- 2023年度安全员考试高分题库含答案详解(精练).docx
- 2023年度安全员考试高分题库及参考答案详解【能力提升】.docx
- 2023年度安全员考试高分题库附答案详解【典型题】.docx
- 2023年度安全员考试高分题库及参考答案详解(培优B卷).docx
文档评论(0)