跳到主要內容

臺灣博碩士論文加值系統

(35.174.62.102) 您好!臺灣時間:2021/07/25 03:47
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:林慶忠
研究生(外文):Ching-Chung Lin
論文名稱:光學聯合轉換相關器訊號壓縮與重建研究
論文名稱(外文):Study on joint transform correlator signal compression and reconstruction
指導教授:張軒庭張軒庭引用關係
指導教授(外文):Hsuan-Ting Chang
學位類別:碩士
校院名稱:國立雲林科技大學
系所名稱:電機工程系碩士班
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2004
畢業學年度:92
語文別:中文
論文頁數:89
中文關鍵詞:訊號箝制功率頻譜聯合轉換相關器光訊號處理
外文關鍵詞:signal clippingpower spectrumjoint transform correlator (JTC)optical signal processing
相關次數:
  • 被引用被引用:0
  • 點閱點閱:89
  • 評分評分:
  • 下載下載:4
  • 收藏至我的研究室書目清單書目收藏:0
光資訊處理技術近年已廣泛應用於圖形辨識、影像鑑別、安全認證與資訊加密應用研究,其中光學聯合轉換相關器JTC(joint transform correlator)為光訊號處理研究主要的基本架構之一,本論文主要可分三大部分,第一部分應用傳統光學聯合轉換相關器原理與架構,以電腦模擬相關影像之功率頻譜訊號經壓縮重建之變化影響,第二部分應用光學聯合轉換相關器影像鑑別架構,以電腦模擬鑑別影像之功率頻譜訊號經壓縮重建後之影像品質,第三部分應用光學聯合轉換相關器影像加密架構,進行影像加密安全研究,並以電腦模擬加密功率頻譜訊號經壓縮重建後之影像品質,所採用的訊號壓縮技術為量化(Quantization)、JPEG(Joint Photographic Experts Group)與向量量化(Vector Quantization),結論證明功率頻譜訊號可壓縮重建,但重建品質除受採用的訊號壓縮方法影響外,更易受訊號本身特性的影響,訊號間呈亂數分佈,強度差距較大或集中於中高頻者,不易被壓縮重建,反之訊號分佈較規律和緩,且訊號間強度差距較小者,仍可以JPEG方法有效重建,且訊號壓縮前箝制處理(clipper),可有效改善影像重建品質。
Optical signal processing has been widely applied in pattern recognition, image verification, information security and data encryption areas in recent years. Joint transform correlator (JTC) is one of the fundamental architectures in optical signal processing research. There are three parts in this thesis of power spectrum compression and reconstruction in image correlation, image verification and image encryption, respectively. We will conduct power spectrum compression and reconstruction with JTC architecture.

The compression methods used are quantization, JPEG and vector quantization (VQ). The computer simulation will be demonstrated that power spectrum can be compressed and restructured effectively. We concluded JPEG is the better method for power spectrum compression. The effect of reconstruction is not only related with the applied compression method but also the signal itself. Power spectrum displayed as random, vast magnitude difference in scale or concentrate at middle and high region are not easy to be compressed and lead to inferior reconstruction outcome. Power spectrum displayed as less random or regular, moderate magnitude difference in scale can be reconstructed effectively by JPEG. Moreover, power spectrum clipped before compression can enhance image reconstruction quality.
中文摘要……………………………………………………………i
英文摘要……………………………………………………………ii
誌謝…………………………………………………………………iii
第一章 緒論………………………………………………………9
1.1 研究動機與目的…………………………………………9
1.2 研究方法……………………………………………… 10
1.3 本論文貢獻…………………………………………… 11
1.4 各章提要……………………………………………… 11
第二章 聯合轉換相關器相關分析……………………………12
2.1 前言……………………………………………………………12
2.2 聯合轉換相關器相關分析架構………………………………12
2.3 壓縮技術………………………………………………14
2.3.1量化…………………………………………………………14
2.3.2 JPEG…………………………………………………15
2.3.3 向量量化……………………………………………16
2.4 電腦模擬………………………………………………17
2.4.1量化模擬……………………………………………20
2.4.2 JPEG模擬……………………………………………25
2.4.3向量量化模擬………………………………………28
2.5 本章結論…………………………………………….34
第三章 聯合轉換相關器影像鑑別應用……………….…..37
3.1 前言…………………………………………………………37
3.2 聯合轉換相關器影像鑑別架構……………………………37
3.3 電腦模擬(一)………………………………………………40
3.3.1 量化模擬………………........……………........40
3.3.2 JPEG模擬………….......…….…………………...43
3.3.3 向量量化模擬………………....………………....…45
3.4電腦模擬(二)…………………………………….…………50
3.5 本章結論……………………………………………………54
第四章 聯合轉換相關器加密應用……………………………55
4.1 前言…………………………………………………………55
4.2 聯合轉換相關器加密解密架構……….……………………56
4.3 電腦模擬(一)…..…………………………………………58
4.3.1 量化模擬……………………………….………………62
4.3.2 JPEG模擬...……………………………….……………65
4.3.3 向量量化模擬………………………….……..……….69
4.4電腦模擬(二)…..……………………………………………73
4.5 本章結論…………………………………………………….78
第五章 結論及未來研究方向…………………………………79
[1] H.Y. Li, Y. Qiao and D. Psaltis,”Optical network for rea-time face recognition”, Appl. Opt. 32, 5026-5035, 1993
[2] B. Javidi and J. L. Horner, “Optical patern recognition for validation and security verication”, Opt. Eng. 33, 1752-1756, 1994
[3] H. Liu, M. Wu, G. Jin, G. Cheng, and Q. He, “Real-time optoelectronic morphological processor for human face recognition,” Optical Engineering, vol. 37, no.1, pp. 151-157, Jan. 1998
[4] B. Javidi and E. Ahouzi, “Optical security with Fourier Plane encoding,” Applied Optics, vol. 37, no. 26, pp. 6247-6255, Sep. 1998
[5] G.H. Lin, Hsuan T. Chang, W.N. Lai, & C.H. Chuang, "A public-key-based optical image cryptosystem with data embedding techniques," Optical Engineering (SCI), Accepted, 2003/02
[6] Hsuan Ting Chang, “Optical image camouflage based on double-random phase encryption,” in Proceedings of 2001 Workshop on Consumer Electronics(WCE2001), Taipei, October 2001
[7] J. W. Goodman, “Introduction to Fourier Optics”, McGraw-Hill, New York, 1996
[8] A. VanderLught, “Signal detection by complex matched spatial filtering”, IEEE Trans. Inf. Theory IT-10, 139-145, 1964
[9] T. J. Naughton, Y. Frauel, B. Jadivi and E. Tajahuerce, “Compression of digital holograms for three-dimensional object reconstruction and recognition,” Applied Optics, vol. 41, no. 20, pp. 4124-4132, 2002
[10] T. J. Naughton, J. B. McDonald and B. Jadivi, “Efficient compression of Fresnel fields for internet transmission of three-dimensional images,” Applied Optics, vol. 42, no. 23, pp. 4758-4764, 2003
[11] Joseph Rosen and Bahram Javidi, “Security optical systems based on a joint transform correlator with significant output images,” Optical Engineering vol. 40, no. 8, pp. 1584-1589, August 2001
[12] RM. Gray, “Vector Quantization,” IEEE ASSP Mag., pp. 4~29, April 1984
[13] Y. Linde, A. Buzo, and R. Gray, “An algorithm for vector quantization design,” IEEE Trans. On Communications, vol. 28, no. 1, pp. 84-95, Jan. 1980
[14] Youzhi Li, Kathi Kreske, and Joseph Rosen, “Security and encryption optical systems based on a correlator with significant output images.” Applied Optics, vol. 39, no. 29, pp. 5295-5301, October 2000
[15] Hsuan Ting Chang “Image encryption using separable amplitude-based virtual image & iteratively retrieved phase information,” Optical Engineering vol. 40, no. 10, pp. 2165-2171, October 2001
[16] P. Refregier and B. Javidi, “Optical image encryption using input plane and Fourier plane random encoding,” Optics Letters, vol. 20, no. 7, pp. 767-769, 1995
[17] T. Nomura and B. Javidi, “Optical encryption using a joint transform correlator architecture,” Optical Engineering, vol. 39, no. 8, pp. 2031-2035, August 2000
[18] 陳慶唐,2003,光學資訊安全系統中影像鑑別架構之研究,國立雲林科技大學,碩士論文。
[19] 潘彥豪,2003,提升有限狀態向量量化影像編碼效能之研究,國立雲林科技大學,碩士論文。
[20] N. Towghi, B. Javidi, and Z. Luo, “Fully phase encrypted image processor,” Journal of Optical Society of America, A, vol. 16, no. 8, pp. 1915-1927, August 1999
[21] G. Unnikrishnan, J. Joseph, and K. Singh, “Optical Encryption system that uses phase conjugation in a photorefractive crystal,” Applied Optics, vol. 37, no. 35, pp. 8181-8186, Dec. 1998
[22] G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by double-random phase encoding in the fractional Fourier domain,” Optics Letters, vol. 25, no. 12, pp. 887-889, June 2000
[23] O. Matoba and B. Javidi, “Encrypted optical memory system using three-dimensional keys in the Fresnel domain,” Optics Letters, vol. 24, no. 11, pp. 762-764, June 1999
[24] O. Motoba and B. Javidi, “Encrypted optical storage with wavelength-key and random phase codes,” Applied Optics, vol. 38, no. 32, pp. 6785-6790, Nov. 1999
[25] B. Wang, C.-C. Sun, W.-C. Su, and Arthur E.T. Chiou, “Shift-tolerance property of an optical double-random phase-encoding encryption system,” Applied Optics, vol. 39, no. 26, pp. 4788-4793, Sep. 2000
[26] L.E.M. Brackenbury and K.M. Bell, “Optical encryption of digital data,” Applied Optics, vol. 39, no. 29, pp. 5374-5379, October 2000
[27] J.W. Han, S.H. Lee, and E.-S. Kim, “Optical key bit stream generator,” Optical Engineering, vol. 38, no. 1, pp. 33-38, Jan. 1999
[28] J.W. Han, C.S. Park, D.-H. Ryu, and E.-S. Kim, “Optical image encryption based o XOR operations,” Optical Engineering, vol. 38, no.1, pp. 47-54, Jan. 1999
[29] B. Javidi and J. Wang, “Position-invariant two-dimensional image correlation using a one-dimensional space integrating optical processor: application to security verification,” Optical Engineering, vol. 35, no. 9, pp. 2479-2486, Sep. 1996
[30] B. Jadivi, A. Sergent, G. Zhang, and L. Guilbert, “Fault tolerance properties of a double-phase encoding encryption technique,” Optical Engineering, vol. 36, no. 4, pp. 992-998, 1997
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top