Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 4 de 4
Filter
Add more filters










Database
Language
Publication year range
1.
Appl Opt ; 46(21): 4694-701, 2007 Jul 20.
Article in English | MEDLINE | ID: mdl-17609717

ABSTRACT

A novel single-channel color-image watermarking with digital-optics means based on phase-shifting interferometry (PSI) and a neighboring pixel value subtraction algorithm in the discrete-cosine-transform (DCT) domain is proposed. The converted two-dimensional indexed image matrix from an original color image is encrypted to four interferograms by a PSI and double random-phase encoding technique. Then the interferograms are embedded in one chosen channel of an enlarged color host image in the DCT domain. The hidden color image can be retrieved by DCT, the improved neighboring pixel value subtraction algorithm, an inverse encryption process, and color image format conversion. The feasibility of this method and its robustness against some types of distortion and attacks from the superposed image with different weighting factors are verified and analyzed by computer simulations. This approach can avoid the cross-talk noise due to direct information superposition, enhance the imperceptibility of hidden data, and improve the efficiency of data transmission.

2.
Appl Opt ; 45(14): 3289-97, 2006 May 10.
Article in English | MEDLINE | ID: mdl-16676034

ABSTRACT

A novel information security system based on multiple-phase retrieval by an iterative Fresnel-transform algorithm and pixel random permutation (PRP) technique is proposed. In this method a series of phase masks cascaded in free space are employed and the phase distributions of all the masks are adjusted simultaneously in each iteration. It can achieve faster convergence and better quality of the recovered image compared with double-phase encoding and a similar approach in the spatial-frequency domain with the same number of phase masks and can provide a higher degree of freedom in key space with more geometric parameters as supplementary keys. Furthermore, the security level of this method is greatly improved by the introduction of the PRP technique. The feasibility of this method and its robustness against occlusion and additional noise attacks are verified by computer simulations. The performance of this technique for different numbers of phase masks and quantized phase levels is investigated systematically with the correlation coefficient and mean square error as convergence criterions.

3.
Appl Opt ; 44(13): 2600-6, 2005 May 01.
Article in English | MEDLINE | ID: mdl-15881069

ABSTRACT

Generally, the reconstruction of an object image from its diffraction field requires both the amplitude and the phase information of this field. We systematically investigated the effects of using only the real part, the imaginary part, or the phase information of the diffraction field to reconstruct the original image for both the binary and the gray-level images. We show that the phase information can yield a better result of image retrieval than the real or imaginary part and that the recovered image from the phase information is satisfactory especially for binary input. On the basis of this idea, a new technique of image encryption and watermarking by use of only one delivered image-the phase map of the diffraction field of the original image-through double random-phase encoding is proposed and verified by computer simulations with phase-shifting interferometry. This method can greatly cut down the communication load and is suitable for Internet transmission.

4.
Appl Opt ; 43(15): 3078-84, 2004 May 20.
Article in English | MEDLINE | ID: mdl-15176196

ABSTRACT

A method for both image encryption and watermarking by three-step phase-shifting interferometry is proposed. The image to be hidden is stored in three interferograms and then can be reconstructed by use of one random phase mask, several specific geometric parameters, and a certain algorithm. To further increase the security of the hidden image and confuse unauthorized receivers, images with the same or different content can be added to the interferograms, and these images will have no or only a small effect on the retrieval of the hidden image, owing to the specific property of this algorithm. All these features and the utility of this method for image retrieval from parts of interferograms are verified by computer simulations. This technique uses intensity maps as decrypted images for delivery, and both encryption and decryption can be conveniently achieved digitally. It is particularly suitable for the remote transmission of secret information via the Internet.

SELECTION OF CITATIONS
SEARCH DETAIL
...