基于双随机相位编码的图像隐藏技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
数千年来,信息在人类社会进步和发展中发挥了重要作用。当今,伴随着信息时代的到来,特别是80年代以来,随着计算机和网络技术的兴起与发展,信息安全问题日益凸显。基于信息光学理论的光学信息安全技术是近20年来信息安全领域内兴起的一个重要课题。当前,随着光电技术的不断进步,光学信息安全技术不断拓展、快速发展,在安全认证、图像加密和图像隐藏等方面不断涌现出新方法、新技术,促使人们对这些新的研究课题进行深入细致地探讨。
     本文围绕双随机相位编码技术,将光学和数字技术相结合,研究了基于光学信息理论“双随机相位编码”技术的二元、灰度及彩色图像隐藏方法。
     第一章,综述了信息安全问题的理论基础、重点介绍了信息隐藏技术及其研究现状;综述了光学信息安全技术的发展概述,介绍了目前国内外的相关领域研究现状,指出了本论文研究的目的和意义;对光信息安全技术的理论基础如透镜的傅立叶变换性质、全息技术、联合变换相关器和相位恢复算法理论和研究方法作了归纳介绍。
     第二章,提出了基于联合变换相关器和全息技术的傅立叶域二元图像隐藏(水印)理论。利用联合变换相关器对隐藏(水印)图像进行加密,以联合功率谱的形式记录了加密信息,通过加性嵌入方式实现了加密图像傅立叶域隐藏。提出了结合图像特征的预处理方法,通过图像预处理的方法有效地降低了恢复图像中的交叉噪声,提高了恢复图像质量。该系统克服了光路对准、制作共轭相位密钥的问题,并能有效抵抗剪切、滤波和噪声等各类攻击。
     第三章,提出了一种基于无透镜联合变换相关器和相移干涉技术的双图像隐藏技术。该技术利用无透镜联合变换相关器实现图像的加密,并以二步相移干涉光强的形式记录加密结果,提出了双图像分割和相位调制技术以实现双图像的隐藏。该系统结构简单、信息容量小、并能有效抑制和克服交叉噪声对恢复图像的干扰。
     第四章,提出了一种基于Arnold变换和分数傅立叶域迭代恢复算法的彩色图像隐藏技术。根据RGB三基色原理,将彩色图像分解成R、G和B三个分量,利用Arnold变换实现多通道单分量置乱,由分数傅立叶域迭代恢复算法进一步对置乱分量进行加密;然后结合邻域相减技术将加密结果嵌入宿主图像的蓝色通道,实现了彩色图像的隐藏。
     第五章,提出了一种基于混合记录技术的多幅彩色图像隐藏技术。该技术利用并行多通道混合记录,将RGB三通道信息记录在一幅灰度图像上,然后通过Arnold变换和菲涅耳域迭代恢复算法实现彩色图像的置乱、加密,将多个加密复光场的相位分布函数提取出来进行叠加,得到一个加密结果。该方法通过数值与光学技术结合的方法实现了单通道彩色图像处理,大大简化了系统结构,同时能有效去除恢复图像间的交叉噪声。
     最后,总结了本论文已经完成的工作和主要创新点,并提出对未来工作的展望。
Information is powerful, mankind has had this knowledge for millennia. Nowdays, in this information age, especially in the mid-80s, with the advent of the computer and the internet, information security is becoming more and more important. Optical security technique based on the Fourier optics has become one of the most important issues in information security domain. With the advance of high performance CCD cameras and spatial light modulators (SLM), optical information security technique has developed rapidly and becomes more and more attractive for optical realization of security certificate, information encoding and information hiding. Various kinds of optical security techniques and systems have been proposed to solve the problem of security in the transmission of information, these excellent results will push us to take more further and detailed study to find more powerful system on this topic.
     In this thesis, optical processing procedure and digital technique are used, the optical image hiding techniques for binary, gray and color image hiding based on the double random phase encoding (DRPE) are proposed. The major contributions of this thesis are summarized as follows:
     This thesis begins by summarizing an overall rationale and development of the information security, and by focusing on the characteristics of information hiding in Chapter1. The classification and development of the optical security techniques are also presented in this part. The purpose and significance of this thesis are pointed out. The rationale of optical security such as:the Fourier transform characteristics of lens, optical hologram technique, the joint transform corrlator and the phase retrieval algorithm are also introduced in this part.
     Chapter2will follow with a discussion of the proposed system for the binary image hiding. In this Chapter, based on the joint transform correlator architecture and holographic technique a new method for image hiding is presented. A hidden image encrypted by joint transform correlator architecture is embedded in the Fourier hologram of the host image. Inverse Fourier transform can be used to get the watermarked image, and joint transform correlator architecture is used to decode the hidden image from the watermarked hologram. Unlike other watermarking technique, by information prochoosing, noise added to the recovered hidden image by the host can be reduced. And unlike other watermarking systems based on double random phase encryption, no conjugate key is used to recover the hidden image. The robustness of the proposed system for resisting of attacks such as occlusion, noise and filtering are also introduced.
     In Chapter3, based on the joint Fresnel transform correlator, a new system for double images hiding is presented. By this security system, dual secret images are encrypted and recorded as intensity patterns employing phase-shifting interference technology. To improve the system security, a dual images hiding method is used. By digital means, the deduced encryption complex distribution is divided into two subparts. For each image, only one subpart is reserved and modulated by a phase factor. Then these modified results are combined together and embedded into the host image. By the phase modulation, the cross talk caused by images superposition can be reduced for their spatial parallel separation.
     Chapter4details the thesis of hiding a color image into another color image. In this part, a new method is proposed for color image hiding and extracting by use of phase retrieval algorithm in fractional Fourier transform domain and Arnold transform. Based on a cascaded phase iterative FRFT algorithm, the3-channel (R, G and B) of the secret color image permuted by ART are encrypted. Then the encoded information is embedded in Blue-channel (B-channel) of the enlarged color host image. The random phase mask, the wavelength, transform parameters are provided as keys for decryption.
     In Chapter5, we propose a new method for multiple color images hiding by using of triplets recombination. In this proposed technique, triplet (R, G and B) components of the secret color image is recorded simultaneously as a real and positive gray image exploiting parallel multi-wavelength recording technology. Arnold transform and phase retrieval algorithm adapted to Fresnel transform domain are used to encode the parallel hybrid result. By using of the proposed technique, each color image is encrypted into a pure phase distribution and combined by superposition. Phase modulation is introduced to eliminate the cross-talk caused by multiple images superposition. The wavelength, transform parameters are provided as keys to enhance the system security.
     Finally, we summarize the main conclusions in this thesis and anticipate a more efficient, reliable and significant work would be done in the future for the optical security applications.
引文
1. D. Kahn, The Codebreakers-The story of Secret Writing. (Scribner,New York,1967).
    2.章照止,现代密码学基础.北京邮电大学出版社(2004).
    3.王炳锡,彭天强,信息隐藏技术.国防工业出版社(2007).
    4.王育民,张彤,黄继武,信息隐藏—理论与技术.清华大学出版社(2006).
    5.钮心忻,信息隐藏与数字水印.北京邮电大学出版社(2004).
    6.孙圣和,陆哲明,牛夏牧等,数字水印技术及应用.北京:科学出版社(2004).
    7.陶然,邓兵,王越,分数阶傅立叶变换及其应用.清华大学出版社(2009).
    8. F. Petitcolas, R. J. Anderson and M.G. Kuhn, Information hiding-A survey, Proc. IEEE.87,1062-1078(1999).
    9.宋菲君,近代光学信息处理.北京大学出版社(1998).
    10. J. W. Goodman, Introduction to Fourier Optics,2nd ed. (McGraw-Hill,1996).
    11.彭翔,位恒政,张鹏,光学信息安全导论.科学出版社(2008).
    12.杨振寰,陈树源,光学信号处理、计算和神经网络.新时代出版社(1997).
    13.位恒政,“光学对称密码分析学的研究,”[D],天津大学(2007).
    14.张静娟,史祎诗,司徒国海,“光学信息隐藏综述,”中科院研究生院学报,23,289-296(2006).
    15. B. Javidi etc., Advanced sciences and technologies for security applications, (Springer Press,2006).
    16. M. Born and E. Wolf, Principles of Optics,7th ed. (Cambridge U. Press,1999).
    17. T. J. Grycewicz, "Optical correlators using the binarized joint power spectrum," [D], University of Connecticut (1996).
    18. C.S.Weaver and J.W.Goodman, "Technique for optically convolving two functions," Appl. Opt.5,1248-1249(1966).
    19. B. Javidi and J. Homer, "Optical pattern recognition for validation and security Verification," Opt. Eng.33,1752-1756(1994).
    20. B. Javidi and E. Ahouzi, "Optical security system with Fourier plane encoding," Appl. Opt.37,6247-6255(1998).
    21. B. Javidi and A. Sergent, "Fully phase encoded key and biometrics for security verification," Opt. Eng.36,935-942(1997).
    22. B. Javidi, "Optical spatial filtering for image encryption and security system," SPIE.3386,14-23(1997).
    23. B. Javidi, G. Zhang and J. Li, "Experimental demonstration of the random phase encoding technique for image encryption and security verification," Opt. Eng.35, 2506-2512(1996).
    24. B. Soon, M. Kari and M. Alam, "Using the joint transform correlator as the feature extractor for the nearest neighbor classifier," Opt. Eng.38,39-46(1999).
    25. D. Weber and J. Trolinger, "Novel implementation of nonlinear joint transform correlators in optical security and validation," Opt. Eng.38,62-68(1999).
    26. K. Fielding, J. Horner and C. Makekau, "Optical fingerprint identification by binary joint transform correlation," Opt. Eng.30,1958-1961(1991).
    27. A. Stoianov, C. Soutar and A. Graham, "High-speed fingerprint verification using an optical correlator," Opt. Eng.38,99-107(1999).
    28. D. Weber and J. Trolinger, "Novel implementation of nonlinear joint transform correlators in optical security and validation," Opt. Eng.38,62-68(1999).
    29. C. Watson and D. Casasent, "Recognition of live-scan fingerprints with elastic distortions using correlation filters," Opt. Eng.43,2274-2282(2004).
    30. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett.20,767-769(1995).
    31. B. Javidi, "Security information with optical technology," Phys. Today.50,27-32 (1997).
    32. G. Unnikrishnan, J. Joseph and K. Singh, "Optical encryption by double-random phase encoding in the fractional Fourier domain," Opt. Lett.25,887-889(2000).
    33. B. Zhu, S. Liu and Q. Ran, "Optical image encryption based on multi-fractional Fourier transforms," Opt. Lett.25,1159-1161(2000).
    34.朱邦和,“基于分数傅里叶变换的光学安全和模式识别,”[D],哈尔滨工业大学(2003).
    35. S. Liu, L. Yu and B. Zhu, "Optical image encryption by cascaded fractional Fourier transforms with random phase filtering," Opt. Commun.187, 57-63(2001).
    36. Z. Liu and S. Liu, "Random fractional Fourier transform," Opt. Lett.32, 2088-2090(2007).
    37. R. Tao, Y. Xin and Y. Wang, "Double image encryption based on random phase encoding in the Fractional Fourier domain," Opt. Express,15, 16067-16079(2007).
    38. R. Tao, J. Lang and Y. Wang, "Optical image encryption based on the multiple-parameter fractional Fourier domain," Opt. Lett,33,581-583(2008).
    39. G. Situ and J. Zhang, "Double random-phase encoding in the Fresnel domain," Opt. Lett.29,1584-1586(2004).
    40. L. Chen and D. Zhao, "Optical image encryption with Hartley transforms," Opt. Lett.31,3438-3440(2006).
    41. L. Chen and D. Zhao, "Optical image encryption based on fractional wavelet transform," Opt. Commun.254,361-367(2005).
    42. L. Chen and D. Zhao, "Image encryption with fractional wavelet packet method," Optik.119,286-291(2008).
    43. H. Li and Y.Wang, "Informaiton security system based on iteration multiple-phase retrieval in gyrator domain." Optics & Laser Technology.40,962-966(2008).
    44. J. A. Rodrigo, T.Alieva and M.L.Calvo, "Application of gyrator transform for image processing," Opt. Commun.278,279-284(2007).
    45. H. Li and Y.Wang, "Double-image encryption based on iteration gyrator transform," Opt. Commun.281,5745-5749(2008).
    46. T. Nomura and B. Javidi, "Optical encryption using a joint transform correlator architecture," Opt. Eng.39,2031-2035(2000).
    47. X. Peng, Z. Cui, and T. Tan, "Information encryption with virtual-optics imaging system," Opt. Commun.212,235-245(2002).
    48. E. Tajahuerce, O.Matoba, S.C.Verrall and B.Javidi, "Optoelectronic information encryption with phase-shifting interferometry," Appl. Opt.41,2313-2320(2000).
    49. H. Kim and Y. Lee, "Optimal watermarking of digital hologram of 3-D object," Opt. Exp.13,2881-2886(2005).
    50. O. Matoba and B. Javidi, "Encrypted optical memory system using three dimensional keys in the Fresnel domain," Opt. Lett.24,762-764(1999).
    51.X. Meng, L. Cai, X. Xu, X. Yang, X. Shen, G. Dong and Y. Wang, "Two-step phase-shifting interferometry and its application in image encryption," Opt. Lett. 31,1414-1416(2006).
    52. B. Javidi and T. Nomura, "Polarization encoding for optical security sytems," Opt. Exp.39,2439-2443(2000).
    53. J. Rosen, "Learning in correlators based on projections onto constraint sets," Opt. Lett.18,1183-1185(1993).
    54. Y. Li, K. Kreske and J. Rosen, "Security and encryption optical systems based on a correlator with significant output images," Appl. Opt.39,5295-5301(2000).
    55. R. Wang, I. Watson and C. Chatwin, "Random phase encoding for optical security," Opt. Eng.35,2464-2469(1996).
    56. H. T. Chang, W. C. Lu and C. J. Kuo, "Multiple-phase retrieval for optical security systems by use of random-phase encoding," Appl. Opt.41,4825-4834 (2002).
    57. W. Chen, X. Chen, A. Anand and C. Sheppard, "Optical image encryption based on diffractive imaging," Opt. Lett.35,3817-3819(2010).
    58. W. Chen, X. Chen, A. Anand and B. Javidi, "Optical encryption using multiple intensity samplingsin the axial domain," J. Opt. Soc. Am. A.30,806-812(2013).
    59. O. Matoba and B. Javidi, "Encrypted optical storage with angular multiplexing,' Appl. Opt.38,7288-7293(1999).
    60. G. Situ and J. Zhang, "Multiple-image encryption by wavelength multiplexing," Opt. Lett.30,1306-1308(2005).
    61. G. Situ and J. Zhang, "Position multiplexing for multiple-image encryption," J. Opt.A:Pure Appl.Opt.8,391-397(2006).
    62. B. Hennelly, T. Naughton and J. McDonald, "Spread-space spread-spectrum technique for secure multiplexing," Opt. Lett.32,1060-1062(20007).
    63. Y.Shi, G. Situ and J. Zhang, "Multiple-image encryption by information prechoosing," Opt. Lett.33,542-544(2008).
    64. H. E. Hwang, H. T. Chang and W. N. Lie, "Multiple-image encryption and multiplexing using modified Gerchberg-Saxtion algorithm and phase modulation in Fresnel transform domain," Opt. Lett.34,3917-3919(2009).
    65. J. Rosen and B. Javidi, "Hidden images in halftone pictures," Appl. Opt.40, 3346-3353(2001).
    66. D. Abookasis, O. Montal, O. Aramson and J. Rosen, "Watermarks encrypted in a concealogram and deciphered by a modified joint-transform correlator," Appl. Opt.55,3019-3023(2005).
    67. S. Kishk and B. Javidi, "Information hiding technique with double phase encoding," Appl. Opt.41,5462-5470(2002).
    68. N. Takai and Y. Mifune, "Digital watermarking by a holographic technique," Appl. Opt.41,865-873(2002).
    69. H.T. Chang and C.L. Tsan, "Image watermarking by use of digital holography embedded in the discrete-cosine-transform domain," Appl. Opt.44,6211-6219 (2005).
    70. G. Situ and J. Zhang, "Image hiding with computer-generated phase codes for optical authentication," Opt. Commun.245,55-65(2005).
    71. H. Chang, "Image encryption using separable amplitude-based virtual image and iteratively retrieved phase information," Optical Engineering,40, 2165-2171(2001).
    72.尉迟亮,顾济华,刘薇等,“基于数字全息及离散余弦变换的图像数字水印技术,”光学学报,26,355-361(2006).
    73. X. Shi and D. Zhao, "Image hiding in Fourier domain by use of joint transform correlator architecture and holographic technique," Appl. Opt.50, 766-773(2011).
    74. S. Kishk and B. Javidi, "Watermarking of three-dimensional objects by digital holography," Opt. Lett.28,167-169(2003).
    75. S. Kishk and B. Javidi,"3D object watermarking by a 3D hidden object," Opt. Exp.11,874-888(2003).
    76. H. Kim and Y. Lee, "Optimal watermarking of digital hologram of 3-D object," Opt. Exp.13,2881-2886(2005).
    77.彭翔,张鹏,牛憨笨,“基于虚拟光学的三维空间数字水印系统,”光学学报,24,1507-1510(2004).
    78.彭翔,张鹏,牛憨笨,“基于虚拟光学的三维数字水印嵌入/检测方法及装置,”中国发明专利,ZL 03130553.9
    79. X. Peng, P. Zhang and H. Niu., "Audio-signal watermarking in 3-D space based on virtual-optics," Optik,114,451-456(2003).
    80. J. Kim, J. Kim and E. Kim, "Optodigital implementation of multiple information hiding and extraction system," Opt. Eng.43,113-125(2004).
    81. M.Z.He, L.Z.Cai, Q.Liu, X.C.Wang and X.F.Meng, "Multiple image encryption and watermarking by random phase matching," Opt. Commun.,247, 29-37(2005).
    82. Y. Shi, G. Situ and J. Zhang, "Multiple-image hiding in the Fresnel domain," Opt. Lett.32,1914-1916(2007).
    83. Y. Shi, G. Situ and J. Zhang, "Multiple-image hiding in information precoosing," Opt. Lett.33,542-544(2008).
    84. Y. Xiao, X. Zhou and S. Yuan, et al, "Multiple-image optical encryption:an improved encoding approach," Appl. Opt.48,2686-2692(2009).
    85. S.Zhang and M.A.Karim, "Color image encryption using double random phase encoding," Microwave. Opt. Technol. Lett.21,318-323(1999).
    86. L. Chen and D. Zhao, "Optical color image encryption by wavelength multiplexing and lensless Fresnel transform holograms," Opt. Exp.14, 8552-8560(2006).
    87. M.Joshi, Chandrashakher and K.Singh, "Color image encryption and decryption using fractional Fourier transform." Opt. Commun.279,35-42(2007).
    88. M.Joshi, Chandrashakher and K.Singh, "Color image encryption and decryption for twin images in fractional Fourier transform," Opt. Commun.281, 5713-5720(2008).
    89. W. Chen, C. Quan and C. J. Tay, "Optical color image encryption based on Arnold transform and interference method," Opt. Commun.282,3680-3685 (2009).
    90. C. Tay, C. Quan, W. Chen, et al "Color image encryption based on interference and virtual optics," Opt. Laser Technol.42,409-415(2010).
    91.X. Meng, L. Cai, X. Yang, et al, "Digital color image watermarking based on phase-shifting interferometry and neighboring pixel value subtraction algorithm in the discrete-cosine-transform domain," Appl. Opt.46,4694-4701(2007).
    92. Q. Guo, Z. Liu and S. Liu, "Color image encryption by using Arnold and discretefractional random transforms in IHS space," Opt. Laser. Eng.48, 1174-1181(2010).
    93. F. Ge, L. Chen and D. Zhao, "A half-blind color image hiding and encryption method in fractional Fourier domains," Opt. Commun.281,4254-4260(2008).
    94. X. Shi and D. Zhao. "Color image hiding based on the phase retrieval technique and Arnold transform," Appl. Opt.50,2134-2139(2011).
    95. Z. Liu, L. Xu, T. Liu, H. Chen, P. Li, C. Lin and S. Liu, "Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains," Opt. Commun.284,123-128(2011).
    96. L. Chen and D. Zhao, "Color information processing (coding and synthesis) with fractional Fourier transforms and digital holography," Opt. Exp.15,16080-16089 (2007).
    97. M.S.Millan, M.Corbalan, J.Romero and M.J.Yzuel, "Optical pattern recognition based on color vision models," Opt. Lett.20,1722-1724(1995).
    98.1. Yamaguchi and T. Zhang, "Phase-shifting digital holography," Opt. Lett.22, 1268-1270(1997).
    99.1. Yamaguchi, T. Matsumura and J. Kato, "Phase-shifting color digital holography," Opt. Lett.27,1108-1110(2002).
    100. L.Cai, Q. Liu and X.Yang, "Phase-shift extraction and wave-front reconstruction in phase-shifting interferometry with arbitrary phase steps," Opt. Lett.28, 1808-1810(2003).
    101. B. Javidi and E. Tajahuerce, "Three-dimensional object recognition by use of digital holography," Opt. Lett.25,610-612(2000).
    102. B. Javidi and Takanori Nomura, "Securing information by use of digital holography," Opt. Lett.25,28-30(2000).
    103. E. Tajahuerce and B. Javidi, "Encrypting three-dimensional information with digital holography," Appl. Opt.39,6595-6601(2000).
    104. Matoba and B. Javidi, "Optical retrieval of encrypted digital holograms for secure real-time display," Opt. Lett.27,321-323(2002).
    105. G.Lu, Z.Zhang, S. Wu and F.T.S.Yu, "Implementation of a non-zero-order joint-transform correlator by use of phase-shifting techniques," Appl. Opt.36, 470-483(1997).
    106. D.Weber and J.Trolinger, "Novel implementation of nonlinear joint transform correlators in optical security and validation," Opt. Eng.38,62-68(1999).
    107. K.Fielding, J.Horner and C.Makekau, "Optical fingerprint identification by binary joint transform correlation," Opt. Eng.30,1958-1961(1991).
    108. A.Stoianov, C.Soutar and A.Graham, "High-speed fingerprint verification using an optical correlator," Opt. Eng.38,99-107(1999).
    109. S.Jutamullia, GM.Storti, D.A.Gregory and J.C.Kirsch, "Illumination independent high efficiency joint transform correlator," Appl. Opt.30, 4173-4175(1991).
    110. D. Abookasis, O. Arazi, J. Rosen and B. Javidi, "Security optical systems based on joint transform correlator with significant output images," Opt. Eng.40, 1584-1589(2001).
    111. H. T. Chang and C. T. Chen, "Enhanced optical image verification based on joint transform correlator adopting Fourier hologram," Opt. Rev.11,165-169 (2004).
    112. C. L. Mela and C. Iemmi, "Optical encryption using phase-shifting interferometry in a joint transform correlator," Opt. Lett.31,2562-2564(2006).
    113. H. Zhang, L. Z. Cai, X. F. Meng, X. F. Xu, X. L. Yang, X. X. Shen and G. Y. Dong, "Image watermarking based on an iterative phase retrieval algorithm and sine-cosine modulation in the discrete-cosine-transform domain," Opt. Commun. 278,257-263(2007).
    114. M. He, Q. Tan, L. Cao, Q. He and G. Jin, "Security enhanced optical encryption system by random phase key and permutation key," Opt. Exp.17, 22462-22473(2009).
    115.X. Zhou and J. G. Chen, "Information hiding based on double-random phase encoding technology," J. Mod. Opt.53,1777-1783(2006).
    116. Z. Liu and S. Liu, "Double image encryption based on iterative fractional fractional Fourier transform," Opt. Commun.275,324-329(2007).
    117. X. Meng, L. Cai, X. Yang, X. Shen and G. Dong, "Information security system by iterative multiple-phase retrieval and pixel random permutation," Appl. Opt. 45,3289-3297(2006).
    118. Z. Zalevsky, D. Mendlovic and R. Dorsch, "Gerchberg-Saxton algorithm applied in the fractional Fourier or the Fresnel domain," Opt. Lett.21,842-844 (1996).
    119. M. He, Q. Tan, L. Cao, Q. He and G. Jin, "Security enhanced optical encryption system by random phase key and permutation key," Opt. Exp.17, 22462-22473(2009).
    120.孟祥峰,“基于迭代相位恢复算法和相移干涉术的光学信息安全技术的研究,”[D],山东大学(2008).
    121. R.W.Gerchberg and W.O.Saxton, "A practical algorithm for the determination of phase form image and diffraction phase picture," Optik.35,237-246(1972).
    122. J.R.Fienup, "Reconstruction of an object from the modulus of its Fourier transform," Opt. Lett.3,27-29(1978).
    123. J. R. Fienup, "Phase retrieval algorithm:a comparison," Appl. Opt.22, 2758-2769(1982).
    124.顾本源,杨国桢,“关于光学显微术的电子显微术中的相位恢复问题,”光学学报.6,517-522(1980).
    1.P. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett.20,767-769(1995).
    2. B. Javidi, "Security information with optical technology," Phys. Today.50,27-32 (1997).
    3. G. Unnikrishnan, J. Joseph and K. Singh, "Optical encryption by double-random phase encoding in the fractional Fourier domain," Opt. Lett.25,887-889(2000).
    4. G. Situ and J. Zhang, "Double random-phase encoding in the Fresnel domain," Opt. Lett.29,1584-1586(2004).
    5. B. Javidi and Takanori Nomura, "Securing information by use of digital holography," Opt. Lett.25,28-30(2000).
    6. T.Nomura and B. Javidi, "Optical encryption using a joint transform correlator architecture," Opt. Eng.39,2031-2035(2000).
    7. S. Kishk and B. Javidi, "Information hiding technique with double phase encoding," Appl. Opt.41,5462-5470(2002).
    8. N. Takai and Y. Mifune, "Digital watermarking by a holographic technique," Appl. Opt.41,865-873(2002).
    9. H.T. Chang and C.L. Tsan, "Image watermarking by use of digital holography embedded in the discrete-cosine-transform domain," Appl. Opt.44,6211-6219 (2005).
    10. Y. Shi, G. Situ and J. Zhang, "Optical image hiding in the Fresnel domain," J. Opt. A:Pure Appl. Opt.8,569-577(2007).
    U.S. Kishk and B. Javidi, "Watermarking of three-dimensional objects by digital holography," Opt. Lett.28,167-169(2003).
    12. Y. Shi, G. Situ and J. Zhang, "Multiple-image hiding in the Fresnel domain," Opt. Lett.32,1914-1916(2007).
    13. M. He, Q. Tan, L. Cao, Q. He and G. Jin, "Security enhanced optical encryption system by random phase key and permutation key," Opt. Exp.17,22462-22473 (2009).
    14. H. Zhang, L. Z. Cai, X. F. Meng, X. F. Xu, X. L. Yang, X. X. Shen and G. Y. Dong, "Image watermarking based on an iterative phase retrieval algorithm and sine-cosine modulation in the discrete-cosine-transform domain," Opt. Commun. 278,257-263(2007).
    15. D. Abookasis, O. Arazi, J. Rosen and B. Javidi, "Security optical systems based on joint transform correlator with significant output images," Opt. Eng.40, 1584-1589(2001).
    16. H. T. Chang and C. T. Chen, "Enhanced optical image verification based on joint transform correlator adopting Fourier hologram," Opt. Rev.11,165-169(2004).
    17. C. L. Mela and C. Iemmi, "Optical encryption using phase-shifting interferometry in a joint transform correlator," Opt. Lett.31,2562-2564(2006).
    18. O. Matoba and B. Javidi, "Optical retrieval of encrypted digital holograms for secure real-time display," Opt. Lett.27,321-323(2002).
    19. J. W. Goodman, Introduction to Fourier Optics,2nd ed. (McGraw-Hill,1996).
    20. M. Born and E. Wolf, Principles of Optics,7th ed. (Cambridge U. Press,1999).
    21.X. Shi and D. Zhao, "Image hiding in Fourier domain by use of joint transform correlator architecture and holographic technique," Appl. Opt.50, 766-773(2011).
    1. P. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett.20,767-769 (1995).
    2. B. Javidi, "Security information with optical technology," Phys. Today.50,27-32 (1997).
    3. G. Unnikrishnan, J. Joseph and K. Singh, "Optical encryption by double-random phase encoding in the fractional Fourier domain," Opt. Lett.25,887-889(2000).
    4. G. Situ and J. Zhang, "Double random-phase encoding in the Fresnel domain," Opt. Lett.29,1584-1586(2004).
    5. B. Javidi and Takanori Nomura, "Securing information by use of digital holography," Opt. Lett.25,28-30(2000).
    6. E. Tajahuerce, O. Matoba, S. Verrall and B. Javidi, "Optoelectronic information encryption with phase-shifting interferometry," Appl. Opt.39,2313-2320(2000).
    7. S. Kishk and B. Javidi, "Information hiding technique with double phase encoding," Appl. Opt.41,5462-5470(2002).
    8. N. Takai and Y. Mifune, "Digital watermarking by a holographic technique," Appl. Opt.41,865-873(2002).
    9. S. Kishk and B. Javidi, "Watermarking of three-dimensional objects by digital holography," Opt. Lett.28,167-169(2003).
    10. H. Chang and C. Tsan, "Image watermarking by use of digital holography embedded in the discrete-cosine-transform domain," Appl. Opt.44,6211-6219 (2005).
    11. X. Meng, L. Cai, X. Xu, X. Yang, X. Shen, G. Dong and Y. Wang, "Two-step phase-shifting interferometry and its application in image encryption," Opt. Lett. 31,1414-1426(2006).
    12. Y. Shi, G. Situ and J. Zhang, "Multiple-image hiding in the Fresnel domain," Opt. Lett.32,1914-1916(2007).
    13. H. Hwang, H. Chang and W. Lie, "Multiple-image encryption and multiplexing using a modified Gerchberg-Saxton algorithm and phase modulation in Fresnel-transform domain," Opt. Lett.34,3917-3919(2009).
    14. H. Chang, H. Hwang, C. Lee and M. Lee, "Wavelength multiplexing multiple-image encryption using cascaded phase-only masks in the Fresnel transform domain," Appl. Opt.50,710-716(2011).
    15. T.Nomura and B. Javidi, "Optical encryption using a joint transform correlator architecture," Opt. Eng.39,2031-2035(2000).
    16. D. Abookasis, O. Arazi, J. Rosen and B. Javidi, "Security optical systems based on a joint transform correlator with significant output images," Opt. Eng.40, 1584-1589(2001).
    17. H. T. Chang and C. T. Chen, "Enhanced optical image verification based on joint transform correlator adopting Fourier hologram," Opt. Rev.11,165-169(2004).
    18. D. Abookasis, O. Montal, O. Aramson and J. Rosen, "Watermarks encrypted in a concealogram and deciphered by a modified joint-transform correlator," Appl. Opt.55,3019-3023(2005).
    19. X. Shi and D. Zhao, "Image hiding in Fourier domain by use of joint transform correlator architecture and holographic technique," Appl. Opt.50, 766-773(2011).
    20. H. Chang and C. Chen, "Fully-phase asymmetric-image verification system based on joint transform correlator," Opt. Exp.14,1458-1567(2006).
    21. C. Mela and C. Iemmi, "Optical encryption using phase-shifting interferometry in a joint transform correlator," Opt. Lett.31,2562-2564(2006).
    22. J. R. Fienup, "Phase retrieval algorithms:a comparison," Appl. Opt.22, 2758-2769(1982).
    23. W.Qin, X.Peng, X.Meng and B. Gao, "Vulnerability to chosen-plaintext attack of optoelectronic information encryption with phase-shifting interferometry," Opt. Eng.50,065601-1-065601-5(2011).
    24. W.Qin, X.Peng and X.Meng, "Cryptanalysis of optical encryption schemes based on joint transform correlator architecture," Opt. Eng.50,028201-1-028201-4 (2011).
    25. H. Tashima, M. Takeda, H.Suzuki, T.Obi, M.Yamaguchi and N. Ohyama, "Known plaintext attack on double random phase encoding using fingerprint as key and a method for avoiding the attack," Opt. Exp.14,13772-13781(2010).
    26. X. Shi, D. Zhao and Y. Huang, "Double images hiding by using joint transform correlator architecture adopting two-step phase-shifting digital holography," Opt. Commun.297,32-37(2013).
    1. P. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett.20,767-769(1995).
    2. B. Javidi, "Security information with optical technology," Phys. Today 50,27-32 (1997).
    3. G. Unnikrishnan, J. Joseph and K. Singh, "Optical encryption by double-random phase encoding in the fractional Fourier domain," Opt. Lett.25,887-889(2000).
    4. G. Situ and J. Zhang, "Double random-phase encoding in the Fresnel domain," Opt. Lett.29,1584-1586(2004).
    5. T. Nomura and B. Javidi, "Optical encryption using a joint transform correlator architecture," Opt. Eng.39,2031-2035(2000).
    6. X. Peng, Z. Cui and T. Tan, "Information encryption with virtual-optics imaging system," Opt Commun.212,235-45(2002).
    7. S. Kishk and B. Javidi, "Information hiding technique with double phase encoding," Appl. Opt.41,5462-5470(2002).
    8. H.T. Chang and C.L. Tsan, "Image watermarking by use of digital holography embedded in the discrete-cosine-transform domain," Appl. Opt.44,6211-6219 (2005).
    9. H. Zhang, L. Z. Cai, X. F. Meng, X. F. Xu, X. L. Yang, X. X. Shen and G. Y. Dong, "Image watermarking based on an iterative phase retrieval algorithm and sine-cosine modulation in the discrete-cosine-transform domain," Opt. Commun. 278,257-263(2007).
    10. Y. Shi, G. Situ and J. Zhang, "Multiple-image hiding in the Fresnel domain," Opt. Lett.32,1914-1916(2007).
    11. G. Situ and J. Zhang, "Image hiding with computer-generated phase codes for optical authentication," Opt. Commun.245,55-65(2005).
    12. M. He, Q. Tan, L. Cao, Q. He and G. Jin, "Security enhanced optical encryption system by random phase key and permutation key," Opt. Exp.17,22462-22473 (2009).
    13.X. Zhou and J. G. Chen, "Information hiding based on double-random phase encoding technology," J. Mod. Opt.53,1777-1783(2006).
    14. L. Chen and D. Zhao, "Optical color image encryption by wavelength multiplexing and lensless Fresnel transform holograms," Opt. Exp.14, 8552-8560(2006).
    15. L. Chen and D. Zhao, "Color information processing (coding and synthesis) with fractional Fourier transforms and digital holography" Opt. Exp 15,16080-16089 (2007).
    16. F. Ge, L. Chen and D. Zhao, "A half-blind color image hiding and encryption method in fractional Fourier domains", Opt. Commun.281,4254-4260(2008).
    17. Z. Liu, L. Xu, T. Liu, H. Chen, P. Li, C. Lin and S. Liu, "Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains." Opt. Commun.284,123-128(2011).
    18. W. Chen, C. Quan and C. J. Tay. "Optical color image encryption based on Arnold transform and interference method." Opt. Commun.282, 3680-3685(2009).
    19. Y. Li, K. Kreske and J. Rosen, "Security and encryption optical systems based on a correlator with significant output images," Appl. Opt.39,5295-5301(2000).
    20. Z. Liu and S. Liu, "Double image encryption based on iterative fractional fractional Fourier transform." Opt. Commun.275,324-329(2007).
    21. H. T. Chang, W. C. Lu and C. J. Kuo, "Multiple-phase retrieval for optical security systems by use of random-phase encoding," Appl. Opt.41, 4825-4834(2002).
    22. X. Meng, L. Cai, X. Yang, X. Shen and G. Dong, "Information security system by iterative multiple-phase retrieval and pixel random permutation," Appl. Opt.45, 3289-3297(2006).
    23. W. Chen, X. Chen, A. Anand and B. Javidi, "Optical encryption using multiple intensity samplingsin the axial domain," J. Opt. Soc. Am. A.30,806-812(2013).
    24. W. Chen, X. Chen, A. Anand and C. Sheppard, "Optical image encryption based on diffractive imaging," Opt. Lett.35,3817-3819(2010).
    25. W. Chen, X. Chen, A. Anand and C. Sheppard, "Optical color-image encryption and synthesis using coherent diffractive imaging in the Fresnel domain," Opt. Exp. 20,3853-3865(2012).
    26. J. R. Fienup, "Phase retrieval algorithm:a comparison," Appl. Opt.22,2758-2769 (1982).
    27. Z. Zalevsky, D. Mendlovic and R. Dorsch, "Gerchberg-Saxton algorithm applied in the fractional Fourier or the Fresnel domain," Opt. Lett.21,842-844(1996).
    28. X. Shi and D. Zhao, "Color image hiding based on the phase retrieval technique and Arnold transform," Appl. Opt.50,2134-2139(2011).
    1. P. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett.20,767-769(1995).
    2. B. Javidi, "Security information with optical technology," Phys. Today 50,27-32 (1997).
    3. G. Unnikrishnan, J. Joseph and K. Singh, "Optical encryption by double-random phase encoding in the fractional Fourier domain," Opt. Lett.25,887-889(2000).
    4. G. Situ and J. Zhang, "Double random-phase encoding in the Fresnel domain," Opt. Lett.29,1584-1586(2004).
    5. J. R. Fienup, "Phase retrieval algorithm:a comparison," Appl. Opt.22,2758-2769 (1982).
    6. Z. Zalevsky, D. Mendlovic and R. Dorsch, "Gerchberg-Saxton algorithm applied in the fractional Fourier or the Fresnel domain," Opt. Lett.21,842-844(1996).
    7. R. Wang, I. Waston, and C. Chatwin, "Random phase encoding for optical security," Opt. Eng.35,2464-2468(1996).
    8. Y. Li, K. Kreske and J. Rosen, "Security and encryption optical systems based on a correlator with significant output images," Appl. Opt.39,5295-5310(2000).
    9. Y. Shi, G. Situ and J. Zhang, "Multiple-image hiding in the Fresnel domain," Opt. Lett.32,1914-1916(2007).
    10. Z. Liu and S. Liu, "Double image encryption based on iterative fractional fractional Fourier transform," Opt. Commun.275,324-329(2007).
    11. H. T. Chang, W. C. Lu and C. J. Kuo, "Multiple-phase retrieval for optical security systems by use of random-phase encoding," Appl. Opt.41, 4825-4834(2002).
    12. H. E. Hwang, H. T. Chang and W. N. Lie, "Multiple-image encryption and multiplexing using modified Gerchberg-Saxtion algorithm and phase modulation in Fresnel transform domain," Opt. Lett.34,3917-3919(2009).
    13. H. Zhang, L. Z. Cai, X. F. Meng, X. F. Xu, X. L. Yang, X. X. Shen and G. Y. Dong, "Image watermarking based on an iterative phase retrieval algorithm and sine-cosine modulation in the discrete-cosine-transform domain," Opt. Commun. 278,257-263(2007).
    14. M. He, Q. Tan, L. Cao, Q. He and G. Jin, "Security enhanced optical encryption system by random phase key and permutation key," Opt. Exp.17,22462-22473 (2009).
    15. S. Kishk and B. Javidi, "Information hiding technique with double phase encoding," Appl. Opt.41,5462-5470(2002).
    16. Y. Shi, G. Situ and J. Zhang, "Multiple-image hiding in information prechoosing,' Opt. Lett.33,542-544(2008).
    17. H.T. Chang and C.L. Tsan, "Image watermarking by use of digital holography embedded in the discrete-cosine-transform domain," Appl. Opt.44,6211-6219 (2005).
    18. S. Zhang and M. Karim, "Color image encryption using double random phase encoding," Micr. and Opt. Tech. Lett.21,318-322(1999).
    19. L. Chen and D. Zhao, "Optical color image encryption by wavelength multiplexing and lensless Fresnel transform holograms," Opt. Exp.14, 8552-8560(2006).
    20. W. Chen, C. Quan and C. J. Tay, "Optical color image encryption based on Arnold transform and interference method," Opt. Commun.282, 3680-3685(2009).
    21. X. Shi and D. Zhao, "Color image hiding based on the phase retrieval technique and Arnold transform," Appl. Opt.50,2134-2139(2011).
    22. T. Kakue, T. Tahara, K. Ito, Y. Shimozato, Y. Awatsuji, K. Nishio, S. Ura, T. Kubota and O. Matoba, "Parallel phase-shifting color digital holography using two phase shifts," Appl. Opt.48, H244-H250(2009).
    23. T. Kakue, Y. Moritani, K. Ito, Y. Shimozato, Y. Awatsuji, K. Nishio, S. Ura, T. Kubota and O. Matoba, "Image quality improvement of parallel four-step phase-shifting digital holography by using the algorithm of parallel two-step phase-shifting digital holography," Opt. Exp.18,9555-9560(2010).
    24. L. Chen and D. Zhao, "Color information processing (coding and synthesis) with fractional Fourier transforms and digital holography," Opt. Exp 15,16080-16089 (2007).
    25. X. Shi, D. Zhao, Y. Huang and J. Pan, "Multiple color images encryption by triplets recombination combining the phase retrieval technique and Arnold transform," Opt. Commun.306,90-98(2013).

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700