搜索

x
中国物理学会期刊

基于空间角度复用和双随机相位的多图像光学加密方法

CSTR: 32037.14.aps.68.20191362

Multiple-image encryption method based on spatial angle multiplexing and double random phase encoding

CSTR: 32037.14.aps.68.20191362
PDF
HTML
导出引用
  • 提出了基于空间角度复用和双随机相位的多图像光学加密新方法. 加密过程中, 首先将原始图像进行随机相位调制和不同距离的菲涅耳衍射; 其次, 将携带调制后图像的参考光与携带随机相位且具有不同立体角的参考光相干叠加, 产生干涉条纹; 最后, 将不同方向的干涉条纹叠加形成复合加密图像. 解密为加密的逆过程, 将复合加密图像置于空间滤波和菲涅耳衍射系统中, 经过不同相位密钥解调和正确距离的菲涅耳衍射完成解密, 得到多幅解密图像. 该方法可以同时对多幅图像进行高效的加密, 计算简单、安全可靠、抗噪声能力强. 利用相关系数评估了该方法的加密效果, 并通过仿真实验验证了该方法的有效性和安全性.

     

    An optical encryption method of multiple-image based on spatial angle multiplexing and double random phase encoding is proposed in this paper. In the encryption process, firstly the original images are modulated by random phase in Fresnel transform with different diffraction distances. Secondly, the modulated images are coherently superposed with reference beams which have different spatial angles and random phases, to generate interference fringes. Finally, the interference fringes from different directions are superposed to form a compound encrypted image. In the decryption process, the compound image is placed in a spatial filtering and Fresnel diffraction system, and the decrypted images are obtained after implementing the different phase keys’ demodulation and Fresnel diffraction with correct distance. This method encrypts multiple images into a single gray-scale image, which is easy to save and transmit. The double random phases are placed in object light and reference light respectively, which reduces the complexity of the encryption system and overcomes the difficulty of pixel-by-pixel alignment of random phase keys in traditional decryption experiment. At the same time, the multiplexing capacity of the proposed encryption system is analyzed, and the result shows that the system has sufficient encryption capacity. So the proposed method possesses the characteristics of high storage efficiency, simple calculation and strong anti-noise ability, and thus can encrypt multiple images simultaneously. In this paper, the encryption effect is evaluated by correlation coefficient, while the effectiveness and security are verified by simulation experiment.

     

    目录

    /

    返回文章
    返回