节点文献

基于双随机相位编码的图像隐藏技术研究

Studies on the Image Hiding Based on the Double Random Phase Encoding

【作者】 石小燕

【导师】 赵道木;

【作者基本信息】 浙江大学 , 光学, 2013, 博士

【摘要】 数千年来,信息在人类社会进步和发展中发挥了重要作用。当今,伴随着信息时代的到来,特别是80年代以来,随着计算机和网络技术的兴起与发展,信息安全问题日益凸显。基于信息光学理论的光学信息安全技术是近20年来信息安全领域内兴起的一个重要课题。当前,随着光电技术的不断进步,光学信息安全技术不断拓展、快速发展,在安全认证、图像加密和图像隐藏等方面不断涌现出新方法、新技术,促使人们对这些新的研究课题进行深入细致地探讨。本文围绕双随机相位编码技术,将光学和数字技术相结合,研究了基于光学信息理论“双随机相位编码”技术的二元、灰度及彩色图像隐藏方法。第一章,综述了信息安全问题的理论基础、重点介绍了信息隐藏技术及其研究现状;综述了光学信息安全技术的发展概述,介绍了目前国内外的相关领域研究现状,指出了本论文研究的目的和意义;对光信息安全技术的理论基础如透镜的傅立叶变换性质、全息技术、联合变换相关器和相位恢复算法理论和研究方法作了归纳介绍。第二章,提出了基于联合变换相关器和全息技术的傅立叶域二元图像隐藏(水印)理论。利用联合变换相关器对隐藏(水印)图像进行加密,以联合功率谱的形式记录了加密信息,通过加性嵌入方式实现了加密图像傅立叶域隐藏。提出了结合图像特征的预处理方法,通过图像预处理的方法有效地降低了恢复图像中的交叉噪声,提高了恢复图像质量。该系统克服了光路对准、制作共轭相位密钥的问题,并能有效抵抗剪切、滤波和噪声等各类攻击。第三章,提出了一种基于无透镜联合变换相关器和相移干涉技术的双图像隐藏技术。该技术利用无透镜联合变换相关器实现图像的加密,并以二步相移干涉光强的形式记录加密结果,提出了双图像分割和相位调制技术以实现双图像的隐藏。该系统结构简单、信息容量小、并能有效抑制和克服交叉噪声对恢复图像的干扰。第四章,提出了一种基于Arnold变换和分数傅立叶域迭代恢复算法的彩色图像隐藏技术。根据RGB三基色原理,将彩色图像分解成R、G和B三个分量,利用Arnold变换实现多通道单分量置乱,由分数傅立叶域迭代恢复算法进一步对置乱分量进行加密;然后结合邻域相减技术将加密结果嵌入宿主图像的蓝色通道,实现了彩色图像的隐藏。第五章,提出了一种基于混合记录技术的多幅彩色图像隐藏技术。该技术利用并行多通道混合记录,将RGB三通道信息记录在一幅灰度图像上,然后通过Arnold变换和菲涅耳域迭代恢复算法实现彩色图像的置乱、加密,将多个加密复光场的相位分布函数提取出来进行叠加,得到一个加密结果。该方法通过数值与光学技术结合的方法实现了单通道彩色图像处理,大大简化了系统结构,同时能有效去除恢复图像间的交叉噪声。最后,总结了本论文已经完成的工作和主要创新点,并提出对未来工作的展望。

【Abstract】 Information is powerful, mankind has had this knowledge for millennia. Nowdays, in this information age, especially in the mid-80s, with the advent of the computer and the internet, information security is becoming more and more important. Optical security technique based on the Fourier optics has become one of the most important issues in information security domain. With the advance of high performance CCD cameras and spatial light modulators (SLM), optical information security technique has developed rapidly and becomes more and more attractive for optical realization of security certificate, information encoding and information hiding. Various kinds of optical security techniques and systems have been proposed to solve the problem of security in the transmission of information, these excellent results will push us to take more further and detailed study to find more powerful system on this topic.In this thesis, optical processing procedure and digital technique are used, the optical image hiding techniques for binary, gray and color image hiding based on the double random phase encoding (DRPE) are proposed. The major contributions of this thesis are summarized as follows:This thesis begins by summarizing an overall rationale and development of the information security, and by focusing on the characteristics of information hiding in Chapter1. The classification and development of the optical security techniques are also presented in this part. The purpose and significance of this thesis are pointed out. The rationale of optical security such as:the Fourier transform characteristics of lens, optical hologram technique, the joint transform corrlator and the phase retrieval algorithm are also introduced in this part.Chapter2will follow with a discussion of the proposed system for the binary image hiding. In this Chapter, based on the joint transform correlator architecture and holographic technique a new method for image hiding is presented. A hidden image encrypted by joint transform correlator architecture is embedded in the Fourier hologram of the host image. Inverse Fourier transform can be used to get the watermarked image, and joint transform correlator architecture is used to decode the hidden image from the watermarked hologram. Unlike other watermarking technique, by information prochoosing, noise added to the recovered hidden image by the host can be reduced. And unlike other watermarking systems based on double random phase encryption, no conjugate key is used to recover the hidden image. The robustness of the proposed system for resisting of attacks such as occlusion, noise and filtering are also introduced.In Chapter3, based on the joint Fresnel transform correlator, a new system for double images hiding is presented. By this security system, dual secret images are encrypted and recorded as intensity patterns employing phase-shifting interference technology. To improve the system security, a dual images hiding method is used. By digital means, the deduced encryption complex distribution is divided into two subparts. For each image, only one subpart is reserved and modulated by a phase factor. Then these modified results are combined together and embedded into the host image. By the phase modulation, the cross talk caused by images superposition can be reduced for their spatial parallel separation.Chapter4details the thesis of hiding a color image into another color image. In this part, a new method is proposed for color image hiding and extracting by use of phase retrieval algorithm in fractional Fourier transform domain and Arnold transform. Based on a cascaded phase iterative FRFT algorithm, the3-channel (R, G and B) of the secret color image permuted by ART are encrypted. Then the encoded information is embedded in Blue-channel (B-channel) of the enlarged color host image. The random phase mask, the wavelength, transform parameters are provided as keys for decryption.In Chapter5, we propose a new method for multiple color images hiding by using of triplets recombination. In this proposed technique, triplet (R, G and B) components of the secret color image is recorded simultaneously as a real and positive gray image exploiting parallel multi-wavelength recording technology. Arnold transform and phase retrieval algorithm adapted to Fresnel transform domain are used to encode the parallel hybrid result. By using of the proposed technique, each color image is encrypted into a pure phase distribution and combined by superposition. Phase modulation is introduced to eliminate the cross-talk caused by multiple images superposition. The wavelength, transform parameters are provided as keys to enhance the system security.Finally, we summarize the main conclusions in this thesis and anticipate a more efficient, reliable and significant work would be done in the future for the optical security applications.

  • 【网络出版投稿人】 浙江大学
  • 【网络出版年期】2014年 04期
节点文献中: 

本文链接的文献网络图示:

本文的引文网络