{"title":"基于傅里叶计算机生成全息图和逻辑调制的灰度图像光学加密","authors":"Y. Wang, Qiong-Hua Wang, Qi Liu, Jun Wang","doi":"10.1109/CISP-BMEI.2016.7852817","DOIUrl":null,"url":null,"abstract":"In this paper, we proposed a novel optical encryption and decryption method of gray image based on the Fourier computer-generated hologram (CGH) and logical modulation. Since the encryption method using the CGH or the logical modulation alone has a shortness of low security, the proposed novel encryption combines the two methods together. In our encryption processing, the hologram, which is gotten by Fourier transform from the original image, is encrypted by logical modulation with the chaotic sequence. Simulation results and analysis show that the security and robustness of the proposed approach has a satisfactory performance.","PeriodicalId":275095,"journal":{"name":"2016 9th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Optical encryption of gray image based on the fourier computer generated hologram and logical modulation\",\"authors\":\"Y. Wang, Qiong-Hua Wang, Qi Liu, Jun Wang\",\"doi\":\"10.1109/CISP-BMEI.2016.7852817\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we proposed a novel optical encryption and decryption method of gray image based on the Fourier computer-generated hologram (CGH) and logical modulation. Since the encryption method using the CGH or the logical modulation alone has a shortness of low security, the proposed novel encryption combines the two methods together. In our encryption processing, the hologram, which is gotten by Fourier transform from the original image, is encrypted by logical modulation with the chaotic sequence. Simulation results and analysis show that the security and robustness of the proposed approach has a satisfactory performance.\",\"PeriodicalId\":275095,\"journal\":{\"name\":\"2016 9th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)\",\"volume\":\"135 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 9th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CISP-BMEI.2016.7852817\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 9th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CISP-BMEI.2016.7852817","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Optical encryption of gray image based on the fourier computer generated hologram and logical modulation
In this paper, we proposed a novel optical encryption and decryption method of gray image based on the Fourier computer-generated hologram (CGH) and logical modulation. Since the encryption method using the CGH or the logical modulation alone has a shortness of low security, the proposed novel encryption combines the two methods together. In our encryption processing, the hologram, which is gotten by Fourier transform from the original image, is encrypted by logical modulation with the chaotic sequence. Simulation results and analysis show that the security and robustness of the proposed approach has a satisfactory performance.