河南科技大学本科毕业设计(论文)
w h i l e t h e r e t r i e v e d p h a s e e x p { j p ( x , y ) } s e r v e s a s t h e k e y o f t h e s e c u r i t y s y s t e m . T o
reconstruct the original information, the phase functions exp{jp(x, y)} and exp{jb(u, v)} must
m a t c h a n d b e l o c a t e d i n t h e i n p u t a n d t h e F o u r i e r p l a n e r e s p e c t i v e l y . A b o o k a s i s e t a l
implemented this scheme with a joint transform correlator for optical verification.
However, because the key exp{jp(x, y)} contains information of the image f(x, y) and the
l o c k e x p { j b ( u , v ) } , a n d t h e 4 - f c o r r e l a t o r h a s a c h a r a c t e r o f l i n e a r i t y , i t i s p o s s i b l e f o r t h e
i n t r u de r t o f i n d o u t t h e p h a s e- d i s tr i b u t i o n o f t h e l o c k f u nc t i o n b y s t a t i s t i c al l y a n a l y z in g t h e
random characters of the keys if the system uses only one lock for different image. In order
to inc r ea s e t he s ecu re lev el o f s u ch sys tem , o n e a p pro ach is to use diffe ren t l o ck fun c ti o n
f o r d i f f e r e n t i m a g e . E n l a r g i n g t h e k e y s p a c e i s a n o t h e r a p p r o a c h t o i n c r e a s e t h e s e c u r e
level. It can be achieved by encrypting images in the fractional Fourier domain; as a result,
the scale factors and the transform order offer additional keys. On the other hand, note that
the phase-mask serves as the key of the system, enlarging the key space can be achieved
b y e n c o d i n g t h e t a r g e t i m a g e i n t o t w o o r m o r e p h a s e m a s k s w i t h a m o d i f i e d P O C S
a l g o r i t h m . C h a n g e t a l h a v e p r o p o s e d a m u l t i p l e - p h a s e s r e t r i e v a l a l g o r i t h m a n d
d e m o n s t r a t e d t h a t a n o p t i c a l s e c u r i t y s y s t e m b a s e d o n i t h a s h i g h e r l e v e l o f s e c u r i t y a n d
h i g h e r q u a l i t y f o r t h e d e c r y p t e d i m a g e . H o w e v e r, t h i s a l g o r i t h m r e t r i e v e s o n l y o n e p h a s e -
d i s t r i b u t i o n w i t h a p h a s e c o n s t r a i n t i n e a c h i t e r a t i o n . A s a r e s u l t , t h e m a s k s a r e n o t s o
consistent and may affect the quality of the recovered image.
I n t h e p r e s e n t p a p e r , w e p r o p o s e a m o d i f i e d P O C S a l g o r i t h m t h a t a d j u s t s t h e
d i s t r i b u t i o n s o f b o t h p h a s e - m a s k s s y n c h r o n o u s l y i n e a c h i t e r a t i o n . A s a r e s u l t , t h e
c o n v e r g e n t s p e e d o f t h e i t e r a t i o n p r o c e s s i s e x p e c t e d t o s i g n i f i c a n t l y i n c r e a s e . A n d t h e
target image with much higher quality is expected to recover because of the co-adjusting of
the two masks during the iteration process. When the iteration process is finished, the target
image is encoded into the phase-masks successfully. Each of these masks severs as the key
of the security system and part of the encrypted image itself as well. Moreover, the algorithm
can be extended to generate multiple phase-masks for arbitrary stages correlator. To acquire
t h e m a x i m u m s e c u r i t y , e a c h k e y i s a s s i g n e d t o d i f f e r e n t a u t h o r i t y s o t h a t t h e d e c r y p t i o n
c a n n o t b e p e r f o r m e d b u t b e i n g a u t h o r i z e d b y a l l o f t h e m . T h i s k e y - a s s i g n m e n t s c h e m e i s
especially useful for military and government applications.
评论0
最新资源