Limits...
Optically secured information retrieval using two authenticated phase-only masks.

Wang X, Chen W, Mei S, Chen X - Sci Rep (2015)

Bottom Line: The images required for optical retrieval are first stored in quick-response (QR) codes for noise-free retrieval and flexible readout.No visible information about the target images or the reference images can be obtained from each of these authenticated POMs. This approach allows users to authenticate the two POMs used for image reconstruction without visual observation of the reference images.It also allows user to friendly access and readout with mobile devices.

View Article: PubMed Central - PubMed

Affiliation: School of Sciences, Zhejiang A&F University, Linan 311300, China.

ABSTRACT
We propose an algorithm for jointly designing two phase-only masks (POMs) that allow for the encryption and noise-free retrieval of triple images. The images required for optical retrieval are first stored in quick-response (QR) codes for noise-free retrieval and flexible readout. Two sparse POMs are respectively calculated from two different images used as references for authentication based on modified Gerchberg-Saxton algorithm (GSA) and pixel extraction, and are then used as support constraints in a modified double-phase retrieval algorithm (MPRA), together with the above-mentioned QR codes. No visible information about the target images or the reference images can be obtained from each of these authenticated POMs. This approach allows users to authenticate the two POMs used for image reconstruction without visual observation of the reference images. It also allows user to friendly access and readout with mobile devices.

No MeSH data available.


Authentication of the POMs based on nonlinear correlation.(a) Correlation outputs corresponding to P1 and (b) P2.
© Copyright Policy - open-access
Related In: Results  -  Collection

License
getmorefigures.php?uid=PMC4616229&req=5

f6: Authentication of the POMs based on nonlinear correlation.(a) Correlation outputs corresponding to P1 and (b) P2.

Mentions: When those two visually unrecognizable images [Fig. 5(c,d)] are respectively compared with the references, i.e., Fig. 3(a,c), by nonlinear correlation, sharp correlation peaks could be obtained as shown in Fig. 6(a,b), which implies that the two POMs are successfully authenticated with correct parameters.


Optically secured information retrieval using two authenticated phase-only masks.

Wang X, Chen W, Mei S, Chen X - Sci Rep (2015)

Authentication of the POMs based on nonlinear correlation.(a) Correlation outputs corresponding to P1 and (b) P2.
© Copyright Policy - open-access
Related In: Results  -  Collection

License
Show All Figures
getmorefigures.php?uid=PMC4616229&req=5

f6: Authentication of the POMs based on nonlinear correlation.(a) Correlation outputs corresponding to P1 and (b) P2.
Mentions: When those two visually unrecognizable images [Fig. 5(c,d)] are respectively compared with the references, i.e., Fig. 3(a,c), by nonlinear correlation, sharp correlation peaks could be obtained as shown in Fig. 6(a,b), which implies that the two POMs are successfully authenticated with correct parameters.

Bottom Line: The images required for optical retrieval are first stored in quick-response (QR) codes for noise-free retrieval and flexible readout.No visible information about the target images or the reference images can be obtained from each of these authenticated POMs. This approach allows users to authenticate the two POMs used for image reconstruction without visual observation of the reference images.It also allows user to friendly access and readout with mobile devices.

View Article: PubMed Central - PubMed

Affiliation: School of Sciences, Zhejiang A&F University, Linan 311300, China.

ABSTRACT
We propose an algorithm for jointly designing two phase-only masks (POMs) that allow for the encryption and noise-free retrieval of triple images. The images required for optical retrieval are first stored in quick-response (QR) codes for noise-free retrieval and flexible readout. Two sparse POMs are respectively calculated from two different images used as references for authentication based on modified Gerchberg-Saxton algorithm (GSA) and pixel extraction, and are then used as support constraints in a modified double-phase retrieval algorithm (MPRA), together with the above-mentioned QR codes. No visible information about the target images or the reference images can be obtained from each of these authenticated POMs. This approach allows users to authenticate the two POMs used for image reconstruction without visual observation of the reference images. It also allows user to friendly access and readout with mobile devices.

No MeSH data available.