Optical image encryption method for calculating ghost imaging by using phase iterative algorithm

An iterative algorithm, optical image technology, applied in computing, computer security devices, instruments, etc., can solve the problem of inconvenient storage and transmission, and achieve the effect of convenient storage and transmission of keys, reducing the number, and encrypting grayscale images

Active Publication Date: 2019-10-18
XIAN UNIV OF TECH
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Second, it is very inconvenient in terms of storage and transmission when a large number of pure phase masks are considered as secret keys

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Optical image encryption method for calculating ghost imaging by using phase iterative algorithm
  • Optical image encryption method for calculating ghost imaging by using phase iterative algorithm
  • Optical image encryption method for calculating ghost imaging by using phase iterative algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0020] In order to improve the quality of reconstructed images with fewer measured intensities, the present invention proposes an optical image encryption for high-quality computational ghost imaging using an iterative phase retrieval algorithm, and the corresponding schematic diagram is set as figure 1 As shown, the structure is that a laser 1 , a spatial light modulator 2 , an object 3 , a barrel detector 4 and a controller 5 are placed in sequence along the axis, and the barrel detector 4 communicates with the spatial light modulator 2 through the controller 5 .

[0021] The method of the present invention adopts the above-mentioned configuration, referring to figure 2 , follow the steps below to implement:

[0022] Step 1: The laser beam is collimated and a set of different random phase masks is sequentially input into the spatial light...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an optical image encryption method for calculating ghost imaging by using a phase iterative algorithm, which comprises the following steps of: 1) performing collimation illumination on a laser beam, and sequentially inputting a group of different random phase masks into a spatial light modulator; wherein the wave is modulated by a pure phase mask, and the generated random speckle pattern passes through the object at the axial distance from the plane of the spatial light modulator; 2) wherein a transmission function T ([mu]m, v) of the object, Ii ([mu]m, v) = | Ei ([mu]m, v) | 2 being a speckle pattern, Ei ([mu]m, v) being a free space propagation field of the pure phase mask and (mu, v) representing lateral coordinates of the object plane; performing, for each purephase mask embedded in the spatial light modulator, by using Fresnel diffraction; and 3) correlating the intensity distribution collected by the barrel detector with the speckle pattern derived from the known pure phase mask. The method provided by the invention is simple and easy to implement and high in accuracy.

Description

technical field [0001] The invention belongs to the technical field of image security, and relates to an optical image encryption method using a phase iterative algorithm for computing ghost imaging. Background technique [0002] Ghost imaging, known as correlated photon imaging, is an interesting optical imaging technique that allows the reconstruction of objects by using intensity correlations. So far, a large number of new structures and algorithms for ghost imaging have been developed. Based on the famous image encryption structure of double random phase encoding, many optical technologies have been widely used in the field of information security due to its high-speed parallel processing and multi-dimensional capabilities. It can be found that there are two main disadvantages in the ghost imaging process. First, there is a need to further improve the quality of reconstructed images of measured intensities collected by single-pixel bucket detectors. Because the random...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60
CPCG06F21/602
Inventor 隋连升程茵王战敏
Owner XIAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products