计算全息和光学图像的随机相位加密技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着社会的发展,信息量的爆炸式增长和因特网进入人们的日常生活已经成为时代的标志。本论文研究目的在于将传统电子设备的灵活性和光学的快速并行计算结合起来,实现光学图像加密和图像识别,实现高效的信息安全保护。
     基于加密过程中相位函数的随机性,首先研究用计算机制全息图的方法。主要包括傅立叶变换全息图和相息图,指出不论在衍射效率还是成像质量,相息图都比傅立叶变换全息图更适宜用于随机相位加密。
     论文将光学加密方法分为两类进行研究,一种是基于联合变换相关器的加密方法。它虽然具有平移不变的系统特性,但振幅型滤波器降低了系统的衍射效率;第二种是基于匹配滤波相关器的加密方法。这种方法在基于投影限制集算法的基础上,利用纯相位函数,改善了系统的衍射效率,但同时带来了对系统光学元件对准的严格要求。为了提高光学元件的衍射效率和系统的实际可操作性,在比较两类加密方法的基础上,实现了在联合变换相关器上的纯相位加密方法。论文同时给出了计算机仿真和光学试验结果,证明这种方法的正确性和可行性。
     最后为了在因特网中传输保护信息,提出用加密隐藏的方法进行信息传输。用纯相位的加密函数和密钥函数一起能够很好地重建原始信息;但是由于加密结果容易引起攻击者注意,所以将其隐藏在一幅非安全性的图像中进行传输,仿真结果证明该方法可以隐藏的信息量大、恢复效果好,具有很强的鲁棒性。
With the social development, the information increasing and the entrance of Internet to the people's life have already become the time sign. In this thesis, the research aims to combine the flexibleness of electrical equipment with the fast parallel optical computing, so that it can realize optical image encryption and recognition and high efficiency of information security protection.
    Some research works in the execution methods of hologram have been done firstly based on the randomicity of phase function used for encryption. It includes Fourier transform hologram and kinoform mostly. The research indicates that kinoform is more suitable for random phase encryption than the other hologram either the diffraction efficiency or the equality of reconstruction image.
    The thesis categorizes the encryption methods as two sorts. The first is based on the joint transform system .The expected advantage from this security system is the shift invariance, but the disadvantage is that the amplitude characteristic of filter restricts system's diffractive efficiency. The second is based Vander lugt correlator. This method improves the diffractive efficiency of system because of optical phase-only elements, which produce from project onto constraints algorithm, but at the same time it has the problem of misalignment sensitivity of the filter mask in the VLC system. To obtain high diffractive efficiency and the convenient manipulation in practice simultaneously, the phase-only decryption in the JTC has been adopted based on the above methods' compare. The validity and feasibility of this method is proved though computer simulation and optical experiment result.
    Finally, the way of information hiding is used in order to transmit the protected image though Internet. Using encrypted and key functions, the original information can be reconstructed very well. But the encryption result may arouse the attackers' notice, so it can be hided in a common image. The simulation illustrates the system ability to recover the hidden image under distortions and the robustness of the hidden image against removal trails. The information capacity which system can be hided is also enormous.
引文
[1] B.Javidi,J.L,Horner.Optical pattern recognition for validation and security verification. Opt.Eng. 1994,33.1752-1756.
    [2] B.Javidi,J.L.Horner and J.F,Walkup.An optical pattern recognition system for validation and security verification. Opt.Photo.News 1994.13-18.
    [3] Junji Ohtsubo and Ayano Fujimoto.Practical image encryption and decryption by phasecoding technique for optical security systems. APPLIED OPTICS.2002,41(23):4848-4855.
    [4] Bahrain Javidi and Esmail Ahouzi .Optical security with Fourier plane encoding, Applied Optics. 1998,37(26):6247-6255.
    [5] 虞祖良,金国藩.计算机制全息图.第一版.北京:清华大学出版社,1984.
    [6] 黄奇忠,杜惊雷,张怡霄等.利用纯位相计算全息图实现位相函数相加的光学安全技术.中国激光.2000,27(7).645-648.
    [7] P.Refregier and B.Javidi.Optical image encryption based on input plane and Fourier plane random encoding. Opt.Lett., 1995,20.767-769.
    [8] D.L.Flannery and J.L.Homer.Fourier optical siginal processors. Proc.IEEE .1989,77:1511-1527.
    [9] Ruikang K.Wang, Ian A.Watson, Chris Chatwin. Random phase encoding for optical security. Opt.Eng. 1996, 35(9): 2464-2469.
    [10] Youzhi Li, Kathi Kreske, and Joseph Rosen.security and encryption optical systems based on a correlator with significant output images. Applied Optics.2000, 39(29): 5395-5301.
    [11] 陈鹤鸣,陈雄.旋转、平移不变光电混合指纹识别系统的研究.南京邮电学院学报(自然科学版).1999,19(4):15-19.
    [12] 张培鲲,李育林,刘家英等.光学图像相位加密中旋转不变性的实现及环形相位解密.中国激光.2000,27(3):224-228.
    [13] 刘思民,许京军,郭儒.相干光学原理及应用.天津:南开大学出版社,2000.45-81
    [14] 竺子民.光电图像处理.武汉:华中理工大学出版社,2000.33-39
    [15] 国承山,王伟田.计算全息图的模拟再现.[J].光电子·激光.1997,8(4):291-294.
    [16] 陈仲伟,施志果,郑辉.用计算机产生全息图.
    [17] 史密斯.全息记录材料.科学出版社,1984.
    [18] 游明俊.信息光学基础实验.兵器工业出版社.1992.
    [19] 顾翔,徐克涛.用于相位恢复的GS算法的一点改进.复旦学报(自然科学版).2000,39(2):206-211.
    [20] 沐仁旺,周进.用二元光学技术制作反射式相息图.光学学报,1998年,18(12):1746-1750
    [21] 王玉堂,陈岩松,李秀英.全息干板漂白乳胶厚度起伏特性的研究及其相位滤波器的制备.
    [22] [日]松下昭,平井纪光.全息照相术的原理及实验.科学出版社,1988.140-143.
    [23] Bahrain Javidi,Arnaud Sergent, Esmail Ahouzi.Performance of double phase encoding encryption
    
    technique using binarized encrypted images.Opt.Eng. 1998,37(2).565-569.
    [24] L.G.Neto and Y.Sheng.Optical implementation of image encryption using random phase encoding. Opt.Eng.1996, 35.2459-2463.
    [25] Hoon-Gee Yang, Eun-Soo Kim.Practical image encryption scheme by real-valued data. Opt.Eng. 1996,35(9).2473-2478.
    [26] Mitsuhiro Yamazaki, Junji Ohtsubo.Optimization of encrypted hologram in optical security systems.Opt.Eng.2001, 40(1): 132-137.
    [27] Takanori Nomura, B.Javidi.Optical encryption using a joint transform correlator architecture. Opt.Eng.,2000,39(8).2031-2035
    [28] Bahram Javidi, Guanshen Zhang, Jian Li.Experimental demonstration of the random phase encoding technique for image encryption and security verification.Opt.Eng.1996, 35(9): 2506-2512.
    [29] H.Stark, ed. Image Recovery Theory and Application.1st. ed. (Academic New York, 1987), pp.29 and 277.
    [30] J.Rosen.Synthesis of nondiffracting beams in free space.Opt.Lett. 1994,19(6): 369-371.
    [31] R.Piestum, J.Shamir.Control of wave-front propagation with diffractive elements. Opt.Lett.1994, 19(11): 771-773.
    [32] Joseph Rosen.Learning in correlators based on projections onto constrain sets. Optical Letters.1993, 18(14): 1185-1186.
    [33] Hsuan T.Chang, Wei C. Lu, and Chung J.Kuo.Multiple-phase retrieval for optical security systems by use of random-phase encoding. Applied Optics.2002, 41(23): 4825-4833.
    [34] David Abookasis, Ortal Arazi, Joseph Rosen. Security optical systems based on a joint transforms correlator with significant output. Opt.Eng.,2001,40(8): 1584-1589
    [35] 张培琨,李玉林等.随机相位光学防伪中的前向迭代算法.激光杂志,1999(21):13-15.
    [36] Sherif Kishk and Bahram Javidi.Information hiding technique with double phase encoding. APPLIED OPTICS .2002,41(26): 5462-5470.
    [37] Nobukatsu Takai and Yoto Mifune. Digital watermarking by a holographic technique. Appl.opt. 2002, 41:865-873

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700