资源描述:
《外文翻译---级联迭代傅里叶变换算法在光学安全中的应用》由会员上传分享,免费在线阅读,更多相关内容在学术论文-天天文库。
1、英文文献原文AcascadediterativeFouriertransformalgorithmforopticalsecurityapplicationsAbstract:AcascadediterativeFouriertransform(CIFT)algorithmispresentedforopticalsecurityapplications.Twophase-masksaredesignedandlocatedintheinputandtheFourierdomainsofa4-fcorrela
2、torrespectively,inordertoimplementtheopticalencryptionorauthenticityverification.Comparedwithpreviousmethods,theproposedalgorithmemploysanimprovedsearchingstrategy:modifyingthephase-distributionsofbothmaskssynchronouslyaswellasenlargingthesearchingspace.Com
3、putersimulationsshowthatthealgorithmresultsinmuchfasterconvergenceandbetterimagequalityfortherecoveredimage.Eachofthesemasksisassignedtodifferentperson.Therefore,thedecryptedimagecanbeobtainedonlywhenallthesemasksareunderauthorization.Thiskey-assignmentstra
4、tegymayreducetheriskofbeingintruded.Keywords:Opticalsecurity–opticalencryption–cascadediterativeFouriertransformalgorithm1.IntroductionOpticaltechniqueshaveshowngreatpotentialinthefieldofinformationsecurityapplications.RecentlyRéfrégierandJavidiproposedanov
5、eldouble-random-phaseencodingtechnique,whichencodesaprimaryimageintoastationarywhitenoise.ThistechniquewasalsousedtoencryptinformationinthefractionalFourierdomainandtostoreencryptedinformationholographically.Phaseencodingtechniqueswerealsoproposedforoptical
6、authenticityverification.WangetalandLietalproposedanothermethodforopticalencryptionandauthenticityverification.Unlikethetechniquesmentionedabove,thismethodencryptsinformationcompletelyintoaphasemask,whichislocatedineithertheinputortheFourierdomainofa4-fcorr
7、elator.Forinstance,giventhepredefinitionsofasignificantimagef(x,y)asthedesiredoutputandaphase-distributionexp{jb(u,v)}intheFourierdomain,it’seasytooptimizetheotherphasefunctionexp{jp(x,y)}withamodifiedprojectionontoconstraintsets(POCS)algorithm[10].Therefor
8、etheimagef(x,y)isencodedsuccessfullyintoexp{jp(x,y)}withtheaidofexp{jb(u,v)}.Inotherwords,thefixedphaseexp{jb(u,v)}servesasthelockwhiletheretrievedphaseexp{jp(x,y)}servesasthekeyofthesecuritysystem.Tor