英文文献及翻译级联迭代傅里叶变换算法在光学安全中的应用.docx
- 文档编号:5480009
- 上传时间:2022-12-16
- 格式:DOCX
- 页数:11
- 大小:173.89KB
英文文献及翻译级联迭代傅里叶变换算法在光学安全中的应用.docx
《英文文献及翻译级联迭代傅里叶变换算法在光学安全中的应用.docx》由会员分享,可在线阅读,更多相关《英文文献及翻译级联迭代傅里叶变换算法在光学安全中的应用.docx(11页珍藏版)》请在冰豆网上搜索。
英文文献及翻译级联迭代傅里叶变换算法在光学安全中的应用
AcascadediterativeFouriertransformalgorithm
foropticalsecurityapplications
Abstract:
AcascadediterativeFouriertransform(CIFT)algorithmispresentedforopticalsecurityapplications.Twophase-masksaredesignedandlocatedintheinputandtheFourierdomainsofa4-fcorrelatorrespectively,inordertoimplementtheopticalencryptionorauthenticityverification.Comparedwithpreviousmethods,theproposedalgorithmemploysanimprovedsearchingstrategy:
modifyingthephase-distributionsofbothmaskssynchronouslyaswellasenlargingthesearchingspace.Computersimulationsshowthatthealgorithmresultsinmuchfasterconvergenceandbetterimagequalityfortherecoveredimage.Eachofthesemasksisassignedtodifferentperson.Therefore,thedecryptedimagecanbeobtainedonlywhenallthesemasksareunderauthorization.Thiskey-assignmentstrategymayreducetheriskofbeingintruded.
Keywords:
Opticalsecurity–opticalencryption–cascadediterativeFouriertransformalgorithm
1.Introduction
Opticaltechniqueshaveshowngreatpotentialinthefieldofinformationsecurityapplications.RecentlyRéfrégierandJavidiproposedanoveldouble-random-phaseencodingtechnique,whichencodesaprimaryimageintoastationarywhitenoise.ThistechniquewasalsousedtoencryptinformationinthefractionalFourierdomainandtostoreencryptedinformationholographically.Phaseencodingtechniqueswerealsoproposedforopticalauthenticityverification.
WangetalandLietalproposedanothermethodforopticalencryptionandauthenticityverification.Unlikethetechniquesmentionedabove,thismethodencryptsinformationcompletelyintoaphasemask,whichislocatedineithertheinputortheFourierdomainofa4-fcorrelator.Forinstance,giventhepredefinitionsofasignificantimagef(x,y)asthedesiredoutputandaphase-distributionexp{jb(u,v)}intheFourierdomain,it’seasytooptimizetheotherphasefunctionexp{jp(x,y)}withamodifiedprojectionontoconstraintsets
(POCS)algorithm[10].Thereforetheimagef(x,y)isencodedsuccessfullyintoexp{jp(x,y)}
withtheaidofexp{jb(u,v)}.Inotherwords,thefixedphaseexp{jb(u,v)}servesasthelockwhiletheretrievedphaseexp{jp(x,y)}servesasthekeyofthesecuritysystem.Toreconstructtheoriginalinformation,thephasefunctionsexp{jp(x,y)}andexp{jb(u,v)}mustmatchandbelocatedintheinputandtheFourierplanerespectively.Abookasisetalimplementedthisschemewithajointtransformcorrelatorforopticalverification.
However,becausethekeyexp{jp(x,y)}containsinformationoftheimagef(x,y)andthe
lockexp{jb(u,v)},andthe4-fcorrelatorhasacharacteroflinearity,itispossiblefortheintrudertofindoutthephase-distributionofthelockfunctionbystatisticallyanalyzingtherandomcharactersofthekeysifthesystemusesonlyonelockfordifferentimage.Inordertoincreasethesecurelevelofsuchsystem,oneapproachistousedifferentlockfunctionfordifferentimage.Enlargingthekeyspaceisanotherapproachtoincreasethesecurelevel.ItcanbeachievedbyencryptingimagesinthefractionalFourierdomain;asaresult,thescalefactorsandthetransformorderofferadditionalkeys.Ontheotherhand,notethatthephase-maskservesasthekeyofthesystem,enlargingthekeyspacecanbeachievedbyencodingthetargetimageintotwoormorephasemaskswithamodifiedPOCSalgorithm.Changetalhaveproposedamultiple-phasesretrievalalgorithmanddemonstratedthatanopticalsecuritysystembasedonithashigherlevelofsecurityandhigherqualityforthedecryptedimage.However,thisalgorithmretrievesonlyonephase-distributionwithaphaseconstraintineachiteration.Asaresult,themasksarenotsoconsistentandmayaffectthequalityoftherecoveredimage.
Inthepresentpaper,weproposeamodifiedPOCSalgorithmthatadjuststhedistributionsofbothphase-maskssynchronouslyineachiteration.Asaresult,theconvergentspeedoftheiterationprocessisexpectedtosignificantlyincrease.Andthetargetimagewithmuchhigherqualityisexpectedtorecoverbecauseoftheco-adjustingofthetwomasksduringtheiterationprocess.Whentheiterationprocessisfinished,thetargetimageisencodedintothephase-maskssuccessfully.Eachofthesemasksseversasthekeyofthesecuritysystemandpartoftheencryptedimageitselfaswell.Moreover,thealgorithmcanbeextendedtogeneratemultiplephase-masksforarbitrarystagescorrelator.Toacquirethemaximumsecurity,eachkeyisassignedtodifferentauthoritysothatthedecryptioncannotbeperformedbutbeingauthorizedbyallofthem.Thiskey-assignmentschemeisespeciallyusefulformilitaryandgovernmentapplications.
ThealgorithmdescriptionispresentedinSection2.ComputersimulationofthisalgorithmandthecorrespondingdiscussarepresentedinSection3.
2.CascadedIterativeFourierTransform(CIFT)Algorithm
Considertheoperationoftheencryptionsystemwiththehelpofa4-fcorrelatorasshowninFig.1,thephasemasksplacedintheinputandtheFourierplanesaredenotedas
and
respectively,where(x,y)and(u,v)representthespaceandthefrequencycoordinate,respectively.Oncethesystemisilluminatedwithamonochromaticplanewave,atargetimagef(x,y)(animagetobedecryptedorverified)isexpectedtoobtainattheoutputplane.Thephase-masks
and
containtheinformationoff(x,y),thatis,f(x,y)isencodedintothesephase-masks.Theencodingprocessistheoptimizationofthetwophase-distributions.Itissomewhatsimilarwiththeproblemsoftheimagereconstructionandthephaseretrieval,whichcanbesolvedwiththePOCSalgorithm.However,thepresentproblemcomesdowntothephaseretrievalinthree(ormore,ingeneral)planesalongthepropagationdirection.SotheconventionalPOCSalgorithmshouldbemodifiedforthisapplication.
ThecascadediterationFouriertransform(CIFT)algorithmbeginswiththeinitializationofthephase-distributionsofthemasks.Supposetheiterationprocessreachesthekthiteration(k=1,2,3,…),andthephase-distributionsintheinputandtheFourierplanearerepresentedas
and
respectively.Thenanestimationofthetargetimageisobtainedattheoutputofthecorrelatordefinedby
whereFTandIFTdenotetheFouriertransformandtheinverseFouriertransform,respectively.Iffk(x,y)satisfiestheconvergentcriterion,theiterationprocessstops,and
and
aretheoptimizeddistributions.Otherwise,thefk(x,y)ismodifiedtosatisfythetargetimageconstraintasfollows
Thenthemodifiedfunctionistransformedbackwardtogeneratebothofthephase-distributionsasfollows
whereang{·}denotesthephaseextractionfunction.Thenkisreplacedbyk+1forthenextiteration.ItisshowninEqs.3(a)and3(b)thatbothofthephase-distributionsaremodifiedineveryiteration,accordedtotheestimationofthetargetimageinthepresentiteration.Itensureshealgorithmconvergeswithmuchfasterspeedandmoreconsistentforthephase-masks.
Ingeneral,theconvergentcriterioncanbetheMSEorthecorrelationcoefficientbetweentheiteratedandthetargetimage,whicharedefinedby
whereM*Nisthesizeoftheimage,andE[·]denotesthemeanoftheimage.TheconvergentbehaviorofthisalgorithmissimilartothatoftheconventionalPOCS.Thatis,theMSEreducesrapidlyintheforemostfewiterations,thenitkeepsreducingslowlytillitreachestheminimum.Correspondingly,thecorrelationcoefficientisexpectedtoincreaserapidlyatfirstandkeepincreasingslowlytillthestoppingcriterionissatisfied.
Indecryption,thedeterminedphase-masks
and
(thekeysoressentially,theencryptedimages)areplacedintheinputandtheFourierplane,respectively,andthentransformedintotheoutputplanethroughthecorrelationdefinedbyEq.
(1).Themodulusoftheoutputisthedecryptedimage.TheCIFTalgorithmretainsthepropertyoftheconventionaliterationalgorithm,thatis,thefinalphase-distributionsofthemasksaredeterminedbytheinitializationsofthem.Thereforedifferentinitializationswillresultindifferentdistributionsof
and
.Thetargetimagecannotbedecryptedifthekeysmismatch(thatis,thekeysweregeneratedfromthedifferentiterationprocess).
Inpracticalsystem,thephasesofthemasksarequantizedtofinitelevels,whichmightreducethesolutionspaceandintroducenoisetotherecoveredimage.Tocompensatethelossofthequality,thetargetimagecanbeencodedintomorephase-maskstoprovideadditionalfreedomforsolutionssearching,whichmeanstoencrypttheimagewithamulti-stages(cascaded)correlator.Fromthepointofviewofsecurity,thisstrategysignificantlyenlargesthekeyspace(becausemorekeysweregenerated),andmakestheintrusionmoredifficult.Generally,thet-stagescorrelationisdefinedas
fortiseven,or
fortisodd,wherethematrixI(x,y)representstheinputplanewave,andthesuperscripti(i=1,2,…,t)denotestheserialnumberofthemasksinthesystem.Thephase-distributionsofthesemasksmaybededucedbyanalogousanalysisforEq.3.
3.Computersimulation
Inthissectionwenumericallydemonstrateourgeneralconcept.Ajetplaneimageofthesize128´128with256grayscaleisusedasthetargetimageasshowninFig.2.Thesizesofbothphase-masksaresameasthetargetimage.Andwesupposetheopticalsystemisilluminatedbyaplanewavewiththeamplitudeequatingto1.Thealgorithmstartswiththerandominitializationofthetwophase-masks.Thenthephasefunctionsaretransformedforwardandbackwardalternativelythroughth
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 英文 文献 翻译 级联 傅里叶变换 算法 光学 安全 中的 应用