Next Article in Journal / Special Issue
Image Encryption and Decryption Systems Using the Jigsaw Transform and the Iterative Finite Field Cosine Transform
Previous Article in Journal
Tunable THz Graphene Filter Based on Cross-In-Square-Shaped Resonators Metasurface
Previous Article in Special Issue
Lithographic Mask Defects Analysis on an MMI 3 dB Splitter
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Image Processing Operators Based on the Gyrator Transform: Generalized Shift, Convolution and Correlation

by
Ronal A. Perez
1,
Juan M. Vilardy O.
1,* and
Cesar O. Torres M.
2
1
Grupo de Investigación en Física del Estado Sólido (GIFES), Faculty of Basic and Applied Sciences, Universidad de La Guajira, Riohacha (La Guajira) 440007, Colombia
2
Grupo de Óptica e Informática, Department of Electronic Engineering, Universidad Popular del Cesar, Valledupar (Cesar) 200001, Colombia
*
Author to whom correspondence should be addressed.
Photonics 2019, 6(4), 120; https://doi.org/10.3390/photonics6040120
Submission received: 20 September 2019 / Revised: 5 November 2019 / Accepted: 8 November 2019 / Published: 16 November 2019

Abstract

:
The gyrator transform (GT) is used for images processing in applications of light propagation. We propose new image processing operators based on the GT, these operators are: Generalized shift, convolution and correlation. The generalized shift is given by a simultaneous application of a spatial shift and a modulation by a pure linear phase term. The new operators of convolution and correlation are defined using the GT. All these image processing operators can be used in order to design and implement new optical image processing systems based on the GT. The sampling theorem for images whose resulting GT has finite support is developed and presented using the previously defined operators. Finally, we describe and show the results for an optical image encryption system using a nonlinear joint transform correlator and the proposed image processing operators based on the GT.

1. Introduction

The usual convolution and correlation operations have been used in some optical systems for image processing, such as filtering, encryption, decryption, comparison, authentication, pattern recognition and classification of images [1,2,3,4,5,6]. Shift operation has also been used in optical systems; for instance, shift operation is utilized at the input plane of the joint transform correlator (JTC) architecture in order to place two non-overlapping data distributions side-by-side [7,8]. The usual shift, convolution and correlation operators have been defined using the fractional Fourier transform [9,10] and these fractional operators were applied to the sampling theorem for fractional bandlimited signal [11], time-variant filtering for non-stationary random signals [12] and prediction, interpolation and filtering of α -stationary random signals [13], where α is the fractional order of the fractional Fourier transform [10].
In this paper, we propose to define a new generalized shift, convolution and correlation operators based on the gyrator transform (GT). The GT can be implemented using an optical system [14,15] or a digital algorithm [16]; these implementations are used in applications of filtering and encryption of images, holography, beam characterization, optical mode converter and phase-amplitude retrieval, among other things [17,18]. The generalized shift is the simultaneous application of a spatial shift and a modulation by a pure linear phase term that does not introduce a shift in the gyrator domain (GD). The proposed convolution and correlation operators are generalized versions of the usual convolution and correlation operations and these generalized versions depend on the parameter α , which is the rotation angle of the GT. We provide explicit integral equations to compute the new convolution and correlation operators at the spatial domain. The new proposed convolution and correlation operators can also be computed in the GD using two GTs and a pure phase term. We apply the proposed new operators with the purpose of developing and defining the sampling theorem for images whose resulting GT has finite support. This result is important when it is necessary to sample properly the spatial domain or the GD of an optical system based on the GT. Finally, we present the application of the proposed new operators in order to describe and to simulate a nonlinear JTC-based encryption system in the GD [19,20].

2. The Gyrator Transform (GT) Operator

The gyrator transform (GT) operator at parameter α , which is the rotation angle, of a two-dimensional function f ( x , y ) is [14]
f α ( u , v ) = G α { f ( x , y ) } = + + f ( x , y ) K α ( u , v , x , y ) d x d y ,
K α ( u , v , x , y ) = C α exp { i 2 π ( u v + x y ) cot α ( v x + u y ) csc α } , C α = 1 | sin α | ,
where x and y denote the coordinates at the spatial domain, u and v indicate the output coordinates in the gyrator domain (GD), K α is the gyrator kernel and the possible values of the rotation angle are in the following interval 0 α < 2 π . For α = 0 , it corresponds to the identity transform. For α = π / 2 , it reduces to the direct Fourier transform with rotation of the coordinate at π / 2 . For α = π , the reverse transform is obtained. For α = 3 π / 2 , it corresponds to the inverse Fourier transform with rotation of the coordinate at π / 2 [14]. The inverse GT corresponds to the GT at rotation angle α . There are certain similarities in the properties of the GT and the fractional Fourier transform; however, these transforms are basically different, because the kernel of the GT is a product of the hyperbolic and plane waves, whereas the kernel of the fractional Fourier transform is the product of the spherical and the plane waves [19].
The main properties of the GT, which will be used below in the following sections, are
G α { G β { f ( x , y ) } } = G α + β { f ( x , y ) } ,
G α { f ( x x 0 , y y 0 ) } = e i 2 π x 0 y 0 sin α cos α e i 2 π ( x 0 v + y 0 u ) sin α f α ( u x 0 cos α , v y 0 cos α ) ,
G α { e i 2 π ( u 0 x + v 0 y ) f ( x , y ) } = e i 2 π u 0 v 0 sin α cos α e i 2 π ( u 0 u + v 0 v ) cos α f α ( u v 0 sin α , v u 0 sin α ) ,
where x 0 , y 0 , u 0 and v 0 are real constants. We can observe in Equations (4) and (5) that a shift or a modulation by a pure linear phase term applied to the function f ( x , y ) produces a shift of the GT f α ( u , v ) , which is proportional to the parameters α , x 0 , y 0 , u 0 and v 0 . These properties of the shift or modulation by a pure linear phase term also introduce another modulation by a pure linear phase term in the GD. Other properties of the GT are described in [14].

3. Generalized Shift Operator

We propose a generalized shift operator as the simultaneous application over a function f ( x , y ) of a spatial shift and a specific modulation by a pure linear phase term. The generalized shift operator at parameters x 0 , y 0 and α is defined as
GS x 0 , y 0 ; α f ( x , y ) = exp i 2 π y 0 x x 0 2 + x 0 y y 0 2 cot α f ( x x 0 , y y 0 ) .
The generalized shift operator is a commutative group for a given parameter α . The composition law is GS x 1 , y 1 ; α GS x 2 , y 2 ; α = GS x 1 + x 2 , y 1 + y 2 ; α . When the parameter α is equal to π / 2 , the generalized shift operator is reduced to the usual shift operator GS x 0 , y 0 ; π / 2 f ( x , y ) = f ( x x 0 , y y 0 ) . The GT at parameter α of the generalized shift operator GS x 0 , y 0 ; α is given by
G α { GS x 0 , y 0 ; α f ( x , y ) } = exp i 2 π y 0 u + x 0 v csc α f α ( u , v ) .
From the two previous equations, the parameter α corresponds to the rotation angle of the GT. The generalized shift operator does not produce a shift of the GT f α ( u , v ) in comparison with Equations (4) and (5). This property is very useful for centred optical systems.

4. Convolution Operator in the GD

We define a new convolution operator at parameter α in the spatial domain by using the following integrals
f ( x , y ) α g ( x , y ) = C α + + f ( x , y ) g ( x x , y y ) × exp i 2 π y ( x x ) + x ( y y ) cot α d x d y .
The GTs of G α { f ( x , y ) } = f α ( u , v ) and G α { g ( x , y ) } = g α ( u , v ) allow to write the previous equation in the following form
f ( x , y ) α g ( x , y ) = G α f α ( u , v ) g α ( u , v ) exp i 2 π u v cot α .
The proposed convolution operator at parameter α in the GD can be computed using the product of the resulting GTs at parameter α of the functions f ( x , y ) and g ( x , y ) and the pure phase term given by exp i 2 π u v cot α . The usual convolution is obtained from Equation (8) when α = π / 2 , i.e., f ( x , y ) π / 2 g ( x , y ) = f ( x , y ) g ( x , y ) . The new convolution of a function f ( x , y ) and a shifted Dirac delta function δ ( x x 0 , y y 0 ) is
f ( x , y ) α δ ( x x 0 , y y 0 ) = C α exp i 2 π y 0 ( x x 0 ) + x 0 ( y y 0 ) cot α f ( x x 0 , y y 0 ) .
Therefore, the generalized shift operator can be expressed in terms of the convolution operator proposed in this work
GS x 0 , y 0 ; α f ( x , y ) = 1 C α f ( x , y ) α δ ( x x 0 , y y 0 ) exp i 2 π x 0 y 0 cot α .
The proposed new convolution operator is invariant to the generalized shift operator
GS x 0 , y 0 ; α f ( x , y ) α g ( x , y ) = GS x 0 , y 0 ; α f ( x , y ) α g ( x , y ) = f ( x , y ) α GS x 0 , y 0 ; α g ( x , y ) .

5. Correlation Operator in the GD

We propose the definition of a new correlation operator at parameter α in the spatial domain by using the following integrals
f ( x , y ) α g ( x , y ) = C α + + f ( x , y ) g ( x x , y y ) × exp i 2 π y ( x x ) + x ( y y ) cot α d x d y .
Using the GTs G α { f ( x , y ) } = f α ( u , v ) and G α { g ( x , y ) } = g α ( u , v ) , the integral form of the new correlation operator can be expressed as
f ( x , y ) α g ( x , y ) = G α f α ( u , v ) g α ( u , v ) exp i 2 π u v cot α .
The new correlation operator at parameter α in the GD is computed using the product of the GTs f α ( u , v ) and g α ( u , v ) and the pure phase term given by exp i 2 π u v cot α . The new correlation operator is reduced to the usual correlation when α = π / 2 , i.e., f ( x , y ) π / 2 g ( x , y ) = f ( x , y ) g ( x , y ) . The new correlation operator is also invariant to the generalized shift operator
GS x 0 , y 0 ; α f ( x , y ) α g ( x , y ) = GS x 0 , y 0 ; α f ( x , y ) α g ( x , y ) = f ( x , y ) α GS x 0 , y 0 ; α g ( x , y ) .

6. Sampling Theorem in the GD

Nowadays, the optical implementations of image processing systems are mainly carried out using optoelectronic devices, such as spatial light modulators or cameras. These devices introduce a sampling over the optical wave that it is used in an optical image processing system. Therefore, a right sampling at the spatial domain is necessary for a current optical image processing system when all features of the resulting GT for an image must be preserved by the mentioned optoelectronic devices.
In this section, we use the proposed operators in order to describe the sampling theorem for images whose resulting GT has finite support. We define a new Dirac comb function at parameter α with periods T x and T y by
c o m b α x T x , y T y = T x T y m = n = exp i 2 π m T x n T y cot α δ ( x m T x ) δ ( y n T y ) .
The GT at parameter α of the new Dirac comb function is
G α c o m b α x T x , y T y = C α T x T y c o m b α u sin α / T y , v sin α / T x .
Therefore, the GT at parameter α of the new Dirac comb function at parameter α with periods T x and T y is another new Dirac comb function at parameter α with periods sin α / T y and sin α / T x .
In order to describe the sampling theorem in the GD, we consider a function f ( x , y ) whose GT f α ( u , v ) has a finite support [ u 0 / 2 , u 0 / 2 ] for the horizontal coordinate u and [ v 0 / 2 , v 0 / 2 ] for the vertical coordinate v. The following function S ( u , v ) represents shifted replicas of f α ( u , v )
S ( u , v ) = f α ( u , v ) α c o m b α u u 0 , v v 0 = C α u 0 v 0 m = n = exp i 2 π ( n u 0 ) ( m v 0 ) cot α exp i 2 π n v 0 u + m u 0 v cot α × f α ( u m u 0 , v n v 0 ) .
The inverse GT at parameter α of the previous equation is
S ( x , y ) = 1 C α m = n = f m sin α v 0 , n sin α u 0 δ x m sin α v 0 δ y n sin α u 0 .
Equation (19) is a sampled version of f ( x , y ) for the sampling periods of the coordinates x and y given by T x = sin α / v 0 and T y = sin α / u 0 , respectively. The reconstruction of f ( x , y ) is computed by using the image filtering of the function S ( x , y ) with a low-pass filter in the GD; this image filtering is described with the proposed convolution operator of Section 4. Thus, the reconstruction of f ( x , y ) is
f ( x , y ) = S ( x , y ) α G α 1 u 0 v 0 r e c t u u 0 , v v 0 exp i 2 π u v cot α = C α exp i 2 π x y cot α m = n = exp i 2 π m T x n T y cot α f ( m T x , n T y ) × sin π x m T x / T x π x m T x / T x sin π y n T y / T y π y n T y / T y .
The low-pass filter in the GD is a rectangle whose extension on the horizontal coordinate is u 0 and the extension on the vertical coordinate is v 0 . Therefore, the extension of the low-pass filter in the GD is given by the size of the finite support of the GT f α ( u , v ) . Equation (20) is the sampling theorem in the GD and this equation provides the values of f ( x , y ) for every x and y in terms of the sampled version of f ( x , y ) whenever the sampling periods are defined using the following conditions T x sin α / v 0 and T y sin α / u 0 . If the previous condition is not fulfilled, the reconstruction of f ( x , y ) will have aliasing.

7. Optical Image Encryption System Using a Nonlinear Joint Transform Correlator (JTC) in the GD

Several optical image processing systems can be described and analysed using the new operators proposed in this work. The use of these new operators allows for an easy, simple and compact description of the behaviour for some optical image processing systems in the GD.
The proposed operators of the previous sections are used with the purpose of describing and simulating the nonlinear JTC-based encryption system that was presented in the work of references [19,20]. The real-valued image to encrypt z ( x , y ) has their values in the interval [0, 1] and the two random phase masks (RPMs) k ( x , y ) and h ( x , y ) are represented by
k ( x , y ) = exp { i 2 π m ( x , y ) } , h ( x , y ) = exp { i 2 π n ( x , y ) } ,
where m ( x , y ) and n ( x , y ) are normalized positive functions randomly generated, statistically independent and uniformly distributed in the interval [0, 1]. Figure 1 (part I) depicts the optical encryption scheme based on a nonlinear JTC architecture in the GD. The input plane of the JTC-based encryption system uses two non-overlapping data distributions placed side-by-side. The first data distribution a ( x , y ) is the result given by the application of the generalized shift operator at parameters x 0 0 , y 0 = 0 and α 0 over the real image to encrypt z ( x , y ) placed against the RPM k ( x , y )
a ( x , y ) = GS x 0 , 0 ; α k ( x , y ) z ( x , y ) = exp i 2 π x 0 y cot α z ( x x 0 , y ) k ( x x 0 , y ) .
The second data distribution b ( x , y ) of the input plane of the JTC corresponds to the result given by the application of the generalized shift operator at parameters x 0 0 , y 0 = 0 and α 0 over the RPM h ( x , y )
b ( x , y ) = GS x 0 , 0 ; α h ( x , y ) = exp i 2 π x 0 y cot α h ( x + x 0 , y ) .
The GT at parameter α of the distributions k ( x , y ) z ( x , y ) and h ( x , y ) are denoted by
t α ( u , v ) = G α { k ( x , y ) z ( x , y ) } , h α ( u , v ) = G α { h ( x , y ) } = h α ( u , v ) exp { i 2 π ϕ α ( u , v ) } .
For the encryption system, the joint gyrator power distribution (JGPD) at parameter α is the intensity of the GT at parameter α applied over the input plane of the JTC [19]
JGPD α ( u , v ) = G α a ( x , y ) + b ( x , y ) 2 .
The encrypted image is computed using the following nonlinear processing on the JGPD [19]
e α ( u , v ) = JGPD α ( u , v ) t α ( u , v ) 2 h α ( u , v ) 2 h α ( u , v ) 2 = t α ( u , v ) h α ( u , v ) h α ( u , v ) 2 exp i 2 π ( 2 x 0 ) v csc α + t α ( u , v ) h α ( u , v ) h α ( u , v ) 2 exp i 2 π ( 2 x 0 ) v csc α .
If | h α ( u , v ) | 2 is equal to zero for a particular value of u and v, this intensity value is substituted by a small constant to avoid singularities when computing e α ( u , v ) . The encrypted image is a real-valued image that can be computed using the following three intensity distributions: JGPD α ( u , v ) , | t α ( u , v ) | 2 and | h α ( u , v ) | 2 . The security keys of the encryption system are given by the RPM h ( x , y ) and the rotation angle α of the GT. The RPM k ( x , y ) is used to spread the information content of the original image z ( x , y ) onto the encrypted image e α ( u , v ) [19]. The inverse GT at parameter α of Equation (26) denotes the encrypted image e ( x , y ) in the spatial domain
e ( x , y ) = G α e α ( u , v ) = GS 2 x 0 , 0 ; α h ( x , y ) α k ( x , y ) z ( x , y ) α h 1 ( x , y ) + GS 2 x 0 , 0 ; α k ( x , y ) z ( x , y ) α h ( x , y ) α h 1 ( x , y ) ,
where h 1 ( x , y ) = G α 1 / | h α ( u , v ) | 2 . Therefore, the encrypted image e ( x , y ) of reference [19] can be described using the proposed generalized shift, convolution and correlation operators in this work.
For the initial step of the decryption system depicted in Figure 1 (part II), we perform the product of the GT of the second data distribution G α b ( x , y ) and the encrypted image e α ( u , v ) , in order to obtain the following result
d α ( u , v ) = e α ( u , v ) G α b ( x , y ) = e α ( u , v ) h α ( u , v ) exp i 2 π x 0 v csc α = h α ( u , v ) G α k ( x , y ) z ( x , y ) exp i 2 π u v cot α 1 h α ( u , v ) exp i 2 π u v cot α × exp i 2 π ( 3 x 0 ) v csc α + G α k ( x , y ) z ( x , y ) h α ( u , v ) h α ( u , v ) h α ( u , v ) 2 exp i 2 π x 0 v csc α .
Using the result of Equations (7), (9) and (14), the inverse GT at parameter α of the previous equation is the output plane d ( x , y ) of the decryption system
d ( x , y ) = G α d α ( u , v ) = GS 3 x 0 , 0 ; α h ( x , y ) α k ( x , y ) z ( x , y ) α h 2 ( x , y ) + GS x 0 , 0 ; α k ( x , y ) z ( x , y ) ,
where h 2 ( x , y ) = G α 1 / h α ( u , v ) . The proposed operators in this work can also be used in order to describe the output plane d ( x , y ) of the decryption system presented in reference [19]. If we take the absolute value of the second term of the right side of Equation (29), we obtain the decrypted image z ˜ ( x , y ) centred at coordinates x = x 0 and y = 0
z ˜ ( x x 0 , y ) = GS x 0 , 0 ; α k ( x , y ) z ( x , y ) .
We perform the numerical simulations of the encryption and decryption systems that were described using the the proposed generalized shift, convolution and correlation operators in this work. Figure 2a,b show the original image to encrypt and the random distribution code m ( x , y ) of the RPM k ( x , y ) , respectively. The random distribution code n ( x , y ) of the RPM h ( x , y ) has a similar appearance to the image presented in Figure 2b but different values for their pixels. The image presented in Figure 2c corresponds to the encrypted image e α ( u , v ) for the security keys α = 0.727 π and the RPM h ( x , y ) . The decrypted image z ˜ ( x , y ) is shown in Figure 2d when the right values of the security key are used in the decryption system. If a wrong value of the rotation angle α of the GT or an incorrect RPM h ( x , y ) are used in the decryption process, the obtained decrypted image will be a random distribution image. In reference [19], the authors showed that the sensitivity of the rotation angle of the GT over the resulting decrypted images is much higher than the sensitivity shown by the encryption–decryption system that uses generalized JTC to variations in the fractional order of the fractional Fourier transform.

8. Conclusions

We have proposed new image processing operators based on the GT; these new operators are: Generalized shift and the convolution and correlation operations in the GD. The generalized shift operator allows to use shifted distribution images at the input plane (spatial domain) of an optical system without introducing a shift for the resulting GTs of these shifted distribution images. This feature of the generalized shift operator is very helpful for centred optical systems. The proposed new operators for the convolution and correlation can be computed in the GD using the product of the results of two GTs and a pure phase term. For these new operators of the convolution and correlation, we presented two explicit integrals that permit to perform generalized convolution and correlation operations at the spatial domain using different values of the parameter α . The sampling theorem in the GD for images whose resulting GT has finite support was developed and presented by using the new operators proposed in this work. We show that the sampling periods at the spatial domain are directly proportional to the term sin α , where the parameter α is the rotation angle of the GT and inversely proportional to the extension or lengths of the finite support of the image given by the result of the GT. Finally, a nonlinear JTC-based encryption system in the GD was described and simulated by using the new operators proposed in this paper. We expect that the proposed new operators can be used to design, analyse and improve some optical image processing systems, such as imaging systems, diffraction through an aperture, beam focusing, optical tweezers and image filtering system, among others.

Author Contributions

The work described in this article is the collaborative development of all authors. Conceptualization, R.A.P., J.M.V.O. and C.O.T.M.; Methodology, R.A.P., J.M.V.O. and C.O.T.M.; Software, R.A.P. and J.M.V.O.; Validation, C.O.T.M.; Investigation, R.A.P., J.M.V.O. and C.O.T.M.; Writing—original draft preparation, R.A.P. and J.M.V.O.; Writing—review and editing, J.M.V.O. and C.O.T.M.; Supervision, J.M.V.O. and C.O.T.M.

Funding

This research has been funded by the Universidad de La Guajira (Riohacha) and the Universidad Popular del Cesar from Valledupar (Cesar).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Goodman, J.W. Introduction to Fourier Optics; McGraw-Hill: New York, NY, USA, 1996. [Google Scholar]
  2. Réfrégier, P.; Javidi, B. Optical image encryption based on input plane and Fourier plane random encoding. Opt. Lett. 1995, 20, 767–769. [Google Scholar] [CrossRef]
  3. Millán, M.S.; Pérez-Cabré, E. Optical data encryption. In Optical and Digital Image Processing: Fundamentals and Applications; Cristóbal, G., Schelkens, P., Thienpont, H., Eds.; Wiley-VCH Verlag GmbH & Co.: Hoboken, NJ, USA, 2011; pp. 739–767. [Google Scholar]
  4. Chen, W.; Javidi, B.; Chen, X. Advances in optical security systems. Adv. Opt. Photonics 2014, 6, 120–155. [Google Scholar] [CrossRef]
  5. Javidi, B.; Carnicer, A.; Yamaguchi, M.; Nomura, T.; Pérez-Cabré, E.; Millán, M.; Nishchal, N.; Torroba, R.; Barrera, J.; He, W.; et al. Roadmap on optical security. J. Opt. 2016, 18, 083001. [Google Scholar] [CrossRef]
  6. Millán, M.S.; Pérez-Cabré, E.; Vilardy, J.M. Nonlinear techniques for secure optical encryption and multifactor authentication. In Advanced Secure Optical Image Processing for Communications; Al Falou, A., Ed.; IOP Publishing: Bristol, UK, 2018; pp. 8-1–8-33. [Google Scholar]
  7. Nomura, T.; Javidi, B. Optical encryption using a joint transform correlator architecture. Opt. Eng. 2000, 39, 2031–2035. [Google Scholar]
  8. Vilardy, J.M.; Millán, M.S.; Pérez-Cabré, E. Improved decryption quality and security of a joint transform correlator-based encryption system. J. Opt. 2013, 15, 025401. [Google Scholar] [CrossRef]
  9. Torres, R.; Pellat-Finet, P.; Torres, Y. Fractional convolution, fractional correlation and their translation invariance properties. Signal Process. 2010, 90, 1976–1984. [Google Scholar] [CrossRef]
  10. Ozaktas, H.M.; Zalevsky, Z.; Kutay, M.A. The Fractional Fourier Transform: With Applications in Optics and Signal Processing; Wiley: Hoboken, NJ, USA, 2001. [Google Scholar]
  11. Torres, R.; Pellat-Finet, P.; Torres, Y. Sampling theorem for fractional bandlimited signals: A self-contained proof. Application to digital holography. IEEE Signal Process Lett. 2006, 13, 676–679. [Google Scholar] [CrossRef]
  12. Chinchilla, L.; Sierra, D.A.; Torres, R. A time-variant filtering approach for non-stationary random signals based on the fractional convolution. Signal Process. 2016, 119, 92–101. [Google Scholar] [CrossRef]
  13. Torres, R.; Torres, D.; Lizarazo, Z. Theory of prediction, interpolation and filtering of α-stationary random signals. Signal Process. 2018, 147, 46–53. [Google Scholar] [CrossRef]
  14. Rodrigo, J.A.; Alieva, T.; Calvo, M.L. Gyrator transform: properties and applications. Opt. Express 2007, 15, 2190–2203. [Google Scholar] [CrossRef]
  15. Rodrigo, J.A.; Alieva, T.; Calvo, M.L. Experimental implementation of the gyrator transform. J. Opt. Soc. Am. A 2007, 24, 3135–3139. [Google Scholar] [CrossRef]
  16. Liu, Z.; Chen, D.; Ma, J.; Wei, S.; Zhang, Y.; Dai, J.; Liu, S. Fast algorithm of discrete gyrator transform based on convolution operation. Optik 2011, 122, 864–867. [Google Scholar] [CrossRef]
  17. Rodrigo, J.A.; Alieva, T.; Calvo, M.L. Applications of gyrator transform for image processing. Opt. Commun. 2007, 278, 279–284. [Google Scholar] [CrossRef]
  18. Liu, Z.; Guo, C.; Tan, J.; Wu, Q.; Pan, L.; Liu, S. Iterative phase-amplitude retrieval with multiple intensity images at output plane of gyrator transforms. J. Opt. 2015, 17, 025701. [Google Scholar] [CrossRef]
  19. Vilardy, J.M.; Millán, M.S.; Pérez-Cabré, E. Nonlinear image encryption using a fully phase nonzero-order joint transform correlator in the Gyrator domain. Opt. Lasers Eng. 2017, 89, 88–94. [Google Scholar] [CrossRef] [Green Version]
  20. Vilardy, J.M.; Millán, M.S.; Pérez-Cabré, E. Influence of a perturbation in the Gyrator domain for a joint transform correlator-based encryption system. Proc. SPIE 2017, 10453, 1045329. [Google Scholar]
Figure 1. Schematic diagram of the optical system. The encryption system is a nonlinear joint transform correlator (JTC) architecture that uses a gyrator transform (GT) and the decryption system performs two successive GTs [19].
Figure 1. Schematic diagram of the optical system. The encryption system is a nonlinear joint transform correlator (JTC) architecture that uses a gyrator transform (GT) and the decryption system performs two successive GTs [19].
Photonics 06 00120 g001
Figure 2. (a) Original image to encrypt z ( x , y ) . (b) Random distribution code m ( x , y ) of the random phase mask (RPM) k ( x , y ) . (c) Encrypted image e α ( u , v ) for the security keys α = 0.727 π and the RPM h ( x , y ) . (d) Right decrypted image z ˜ ( x , y ) .
Figure 2. (a) Original image to encrypt z ( x , y ) . (b) Random distribution code m ( x , y ) of the random phase mask (RPM) k ( x , y ) . (c) Encrypted image e α ( u , v ) for the security keys α = 0.727 π and the RPM h ( x , y ) . (d) Right decrypted image z ˜ ( x , y ) .
Photonics 06 00120 g002

Share and Cite

MDPI and ACS Style

Perez, R.A.; Vilardy O., J.M.; Torres M., C.O. Image Processing Operators Based on the Gyrator Transform: Generalized Shift, Convolution and Correlation. Photonics 2019, 6, 120. https://doi.org/10.3390/photonics6040120

AMA Style

Perez RA, Vilardy O. JM, Torres M. CO. Image Processing Operators Based on the Gyrator Transform: Generalized Shift, Convolution and Correlation. Photonics. 2019; 6(4):120. https://doi.org/10.3390/photonics6040120

Chicago/Turabian Style

Perez, Ronal A., Juan M. Vilardy O., and Cesar O. Torres M. 2019. "Image Processing Operators Based on the Gyrator Transform: Generalized Shift, Convolution and Correlation" Photonics 6, no. 4: 120. https://doi.org/10.3390/photonics6040120

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop