• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

用于多深度物体的生物特征光学密码术。

Optical cryptography with biometrics for multi-depth objects.

作者信息

Yan Aimin, Wei Yang, Hu Zhijuan, Zhang Jingtao, Tsang Peter Wai Ming, Poon Ting-Chung

机构信息

Key Laboratory of Optoelectronic Material and Device, College of Mathematics and Science, Shanghai Normal University, Shanghai, 200234, China.

Department of Electronic Engineering, City University of Hong Kong, Hong Kong, SAR, China.

出版信息

Sci Rep. 2017 Oct 11;7(1):12933. doi: 10.1038/s41598-017-12946-8.

DOI:10.1038/s41598-017-12946-8
PMID:29021574
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC5636816/
Abstract

We propose an optical cryptosystem for encrypting images of multi-depth objects based on the combination of optical heterodyne technique and fingerprint keys. Optical heterodyning requires two optical beams to be mixed. For encryption, each optical beam is modulated by an optical mask containing either the fingerprint of the person who is sending, or receiving the image. The pair of optical masks are taken as the encryption keys. Subsequently, the two beams are used to scan over a multi-depth 3-D object to obtain an encrypted hologram. During the decryption process, each sectional image of the 3-D object is recovered by convolving its encrypted hologram (through numerical computation) with the encrypted hologram of a pinhole image that is positioned at the same depth as the sectional image. Our proposed method has three major advantages. First, the lost-key situation can be avoided with the use of fingerprints as the encryption keys. Second, the method can be applied to encrypt 3-D images for subsequent decrypted sectional images. Third, since optical heterodyning scanning is employed to encrypt a 3-D object, the optical system is incoherent, resulting in negligible amount of speckle noise upon decryption. To the best of our knowledge, this is the first time optical cryptography of 3-D object images has been demonstrated in an incoherent optical system with biometric keys.

摘要

我们提出了一种基于光学外差技术和指纹密钥相结合的用于加密多深度物体图像的光学加密系统。光学外差需要两束光混合。为了进行加密,每束光由一个光学掩模调制,该掩模包含发送或接收图像的人的指纹。这对光学掩模被用作加密密钥。随后,这两束光用于扫描多深度三维物体以获得加密全息图。在解密过程中,通过将三维物体的加密全息图(通过数值计算)与位于与截面图像相同深度的针孔图像的加密全息图进行卷积,来恢复三维物体的每个截面图像。我们提出的方法有三个主要优点。首先,使用指纹作为加密密钥可以避免密钥丢失的情况。其次,该方法可用于加密三维图像以获得后续的解密截面图像。第三,由于采用光学外差扫描对三维物体进行加密,光学系统是不相干的,解密时散斑噪声量可忽略不计。据我们所知,这是首次在具有生物特征密钥的非相干光学系统中演示三维物体图像的光学加密。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f833/5636816/d7fc374096ec/41598_2017_12946_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f833/5636816/255199ff6c1a/41598_2017_12946_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f833/5636816/47966e49171e/41598_2017_12946_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f833/5636816/67d5d289b35e/41598_2017_12946_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f833/5636816/1b40fbfe5834/41598_2017_12946_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f833/5636816/c422206b5ea2/41598_2017_12946_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f833/5636816/d4beb83f58e5/41598_2017_12946_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f833/5636816/93ab1b0e12a1/41598_2017_12946_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f833/5636816/d7fc374096ec/41598_2017_12946_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f833/5636816/255199ff6c1a/41598_2017_12946_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f833/5636816/47966e49171e/41598_2017_12946_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f833/5636816/67d5d289b35e/41598_2017_12946_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f833/5636816/1b40fbfe5834/41598_2017_12946_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f833/5636816/c422206b5ea2/41598_2017_12946_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f833/5636816/d4beb83f58e5/41598_2017_12946_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f833/5636816/93ab1b0e12a1/41598_2017_12946_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f833/5636816/d7fc374096ec/41598_2017_12946_Fig8_HTML.jpg

相似文献

1
Optical cryptography with biometrics for multi-depth objects.用于多深度物体的生物特征光学密码术。
Sci Rep. 2017 Oct 11;7(1):12933. doi: 10.1038/s41598-017-12946-8.
2
Nonlinear Encryption for Multiple Images Based on a Joint Transform Correlator and the Gyrator Transform.基于联合变换相关器和回旋器变换的多图像非线性加密。
Sensors (Basel). 2023 Feb 3;23(3):1679. doi: 10.3390/s23031679.
3
Asymmetric cryptosystem based on optical scanning cryptography and elliptic curve algorithm.基于光学扫描密码学和椭圆曲线算法的非对称密码系统。
Sci Rep. 2022 May 11;12(1):7722. doi: 10.1038/s41598-022-11861-x.
4
Optical image encryption based on biometric keys and singular value decomposition.基于生物特征密钥和奇异值分解的光学图像加密
Appl Opt. 2020 Mar 10;59(8):2422-2430. doi: 10.1364/AO.385652.
5
Optical scanning cryptography for secure wireless transmission.用于安全无线传输的光学扫描密码术。
Appl Opt. 2003 Nov 10;42(32):6496-503. doi: 10.1364/ao.42.006496.
6
Novel optical scanning cryptography using Fresnel telescope imaging.使用菲涅耳望远镜成像的新型光学扫描密码术。
Opt Express. 2015 Jul 13;23(14):18428-34. doi: 10.1364/OE.23.018428.
7
Optical asymmetric cryptosystem for multi-image in cyan-magenta-yellow-black color space.用于青-品红-黄-黑颜色空间中多图像的光学非对称密码系统。
Appl Opt. 2020 Mar 1;59(7):1854-1863. doi: 10.1364/AO.381723.
8
Fast numerical generation and encryption of computer-generated Fresnel holograms.计算机生成菲涅耳全息图的快速数值生成与加密。
Appl Opt. 2011 Mar 1;50(7):B46-52. doi: 10.1364/AO.50.000B46.
9
Optical image encryption based on a joint Fresnel transform correlator with double optical wedges.基于带有双光楔的联合菲涅耳变换相关器的光学图像加密
Appl Opt. 2016 Oct 20;55(30):8513-8522. doi: 10.1364/AO.55.008513.
10
Double Image Encryption System Using a Nonlinear Joint Transform Correlator in the Fourier Domain.基于傅里叶域中非线性联合变换相关器的双图像加密系统。
Sensors (Basel). 2023 Feb 2;23(3):1641. doi: 10.3390/s23031641.

引用本文的文献

1
Image encryption using binary polarization states of light beam.利用光束的二元偏振态进行图像加密。
Sci Rep. 2023 Aug 28;13(1):14028. doi: 10.1038/s41598-023-41251-w.
2
Stokes meta-hologram toward optical cryptography.用于光学加密的斯托克斯元全息图。
Nat Commun. 2022 Nov 5;13(1):6687. doi: 10.1038/s41467-022-34542-9.
3
Asymmetric cryptosystem based on optical scanning cryptography and elliptic curve algorithm.基于光学扫描密码学和椭圆曲线算法的非对称密码系统。

本文引用的文献

1
Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm: comment.基于杨-顾算法的混合检索类型的随机二进制相位调制的非对称密码系统:评论。
Opt Lett. 2013 Oct 15;38(20):4044. doi: 10.1364/OL.38.004044.
2
Image encryption based on interference that uses fractional Fourier domain asymmetric keys.基于使用分数傅里叶域非对称密钥的干涉的图像加密。
Appl Opt. 2012 Apr 1;51(10):1446-52. doi: 10.1364/AO.51.001446.
3
Dual encryption scheme of images using polarized light.基于偏振光的图像双重加密方案。
Sci Rep. 2022 May 11;12(1):7722. doi: 10.1038/s41598-022-11861-x.
Opt Lett. 2010 Jul 1;35(13):2185-7. doi: 10.1364/OL.35.002185.
4
Known plaintext attack on double random phase encoding using fingerprint as key and a method for avoiding the attack.基于指纹作为密钥对双随机相位编码的已知明文攻击及一种避免该攻击的方法。
Opt Express. 2010 Jun 21;18(13):13772-81. doi: 10.1364/OE.18.013772.
5
Asymmetric cryptosystem based on phase-truncated Fourier transforms.基于相位截断傅里叶变换的非对称密码系统。
Opt Lett. 2010 Jan 15;35(2):118-20. doi: 10.1364/OL.35.000118.
6
Optical image encryption based on input plane and Fourier plane random encoding.基于输入平面和傅里叶平面随机编码的光学图像加密。
Opt Lett. 1995 Apr 1;20(7):767-9. doi: 10.1364/ol.20.000767.
7
3D object watermarking by a 3D hidden object.
Opt Express. 2003 Apr 21;11(8):874-88. doi: 10.1364/oe.11.000874.
8
Encrypting three-dimensional information with digital holography.
Appl Opt. 2000 Dec 10;39(35):6595-601. doi: 10.1364/ao.39.006595.
9
Optical encryption by double-random phase encoding in the fractional Fourier domain.分数傅里叶域中双随机相位编码的光学加密
Opt Lett. 2000 Jun 15;25(12):887-9. doi: 10.1364/ol.25.000887.
10
Securing information by use of digital holography.利用数字全息术保护信息。
Opt Lett. 2000 Jan 1;25(1):28-30. doi: 10.1364/ol.25.000028.