Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Daomu Zhao is active.

Publication


Featured researches published by Daomu Zhao.


Optics Express | 2006

Optical color image encryption by wavelength multiplexing and lensless Fresnel transform holograms

Linfei Chen; Daomu Zhao

We propose what we believe is a new method for color image encryption by use of wavelength multiplexing based on lensless Fresnel transform holograms. An image is separated into three channels: red, green, and blue, and each channel is independently encrypted. The system parameters of Fresnel transforms and random phase masks in each channel are keys in image encryption and decryption. An optical color image coding configuration with multichannel implementation and an optoelectronic color image encryption architecture with single-channel implementation are presented. The keys can be added by iteratively employing the Fresnel transforms. Computer simulations are given to prove the possibility of the proposed idea.


Optics Letters | 2006

Optical image encryption with Hartley transforms

Linfei Chen; Daomu Zhao

We propose a new method for image encryption based on Hartley transforms that is a real transform and can be realized by spatially incoherent or coherent illumination. The proposed optical implementation is based on a Michelson-type interferometer in which the pure random intensity is distributed at the Hartley plane in encryption. Computer simulations prove it is possible. A Hartley hologram method is also given and described to resolve the sign ambiguity problem that would be encountered in image reconstruction.


Optics Express | 2007

Changes in the Statistical Properties of Stochastic Anisotropic Electromagnetic Beams on Propagation in the Turbulent Atmosphere

Xinyue Du; Daomu Zhao; Olga Korotkova

We report analytic formulas for the elements of the e 2 X2 cross-spectral density matrix of a stochastic electromagnetic anisotropic beam propagating through the turbulent atmosphere with the help of vector integration. From these formulas the changes in the spectral density (spectrum), in the spectral degree of polarization, and in the spectral degree of coherence of such a beam on propagation are determined. As an example, these quantities are calculated for a so-called anisotropic electromagnetic Gaussian Schell-model beam propagating in the isotropic and homogeneous atmosphere. In particular, it is shown numerically that for a beam of this class, unlike for an isotropic electromagnetic Gaussian Schell-model beam, its spectral degree of polarization does not return to its value in the source plane after propagating at sufficiently large distances in the atmosphere. It is also shown that the spectral degree of coherence of such a beam tends to zero with increasing distance of propagation through the turbulent atmosphere, in agreement with results previously reported for isotropic beams.


Optics Express | 2008

Propagation of stochastic Gaussian-Schell model array beams in turbulent atmosphere

Yingbin Zhu; Daomu Zhao; Xinyue Du

Analytical formulas for the elements of the 2x2 cross-spectral density matrix of a kind of stochastic electromagnetic array beam propagating through the turbulent atmosphere are derived with the help of vector integration. Two types of superposition (i.e. the correlated superposition and the uncorrelated superposition) are considered. The changes in the spectral density and in the spectral degree of polarization of such an array beam generated by isotropic or anisotropic electromagnetic Gaussian Schell-model sources on propagation are determined by the use of the analytical formulas. It is shown by numerical calculations that for the array beam composed by isotropic Gaussian-Schell model sources, the spectral degree of polarization in the sufficiently far field returns to the value of the array source; for the array beam composed by anisotropic sources, the spectral degree of polarization in the far field approaches a fixed value that is different from the source.


Optics Express | 2007

Color information processing (coding and synthesis) with fractional Fourier transforms and digital holography

Linfei Chen; Daomu Zhao

In this paper, we propose a new method for color image coding and synthesis based on fractional Fourier transforms and wavelength multiplexing with digital holography. A color image is divided into three channels and each channel, in which the information is encrypted with different wavelength, fractional orders and random phase masks, is independently encrypted or synthesized. The system parameters are additional keys and this method would improve the security of information encryption. The images are fused or subtracted by phase shifting technique. The possible optical implementations for color image encryption and synthesis are also proposed with some simulation results that show the possibility of the proposed idea.


Applied Optics | 2014

Discussion and a new attack of the optical asymmetric cryptosystem based on phase-truncated Fourier transform

Xiaogang Wang; Yixiang Chen; Chao-Qing Dai; Daomu Zhao

A discussion and a cryptanalysis of the optical phase-truncated Fourier-transform-based cryptosystem are presented in this paper. The concept of an optical asymmetric cryptosystem, which was introduced into the optical image encryption scheme based on phase-truncated Fourier transforms in 2010, is suggested to be retained in optical encryption. A new method of attack is also proposed to simultaneously obtain the main information of the original image, the two decryption keys from its cyphertext, and the public keys based on the modified amplitude-phase retrieval algorithm. The numerical results illustrate that the computing efficiency of the algorithm is improved and the number of iterations is much less than that by the specific attack, which has two iteration loops.


Optics Communications | 2003

Propagation of off-axial Hermite-cosine-Gaussian beams through an apertured and misaligned ABCD optical system

Daomu Zhao; Haidan Mao; Weichun Zhang; Shaomin Wang

By introducing the hard aperture function into a finite sum of complex Gaussian functions, an approximate analytical expression for the one-dimensional off-axial Hermite–cosine–Gaussian beams passing through an apertured and misaligned paraxially ABCD optical system has been derived. As special cases, the corresponding closed-forms for the off-axial or non-off-axial Hermite–cosine–Gaussian beams passing through apertured or unapertured and misaligned or aligned paraxially ABCD optical systems have also been given. The results provide more convenient for studying their propagation and transformation than the usual way by using diffraction integral directly, which can be straightforward to the two-dimensional case. Some numerical examples are also illustrated.


Applied Optics | 2012

Optical image hiding with silhouette removal based on the optical interference principle.

Xiaogang Wang; Daomu Zhao

The earlier proposed interference-based encryption method with two phase-only masks (POMs), which actually is a special case of our method, is quite simple and does not need iterative encoding. However, it has been found recently that the encryption method has security problems and cannot be directly applied to image encryption due to the inherent silhouette problem. Several methods based on chaotic encryption algorithms have been proposed to remove the problem by postprocessing of the POMs, which increased the computation time or led to digital inverse computation in decryption. Here we propose a new method for image encryption based on optical interference and analytical algorithm that can be directly used for image encryption. The information of the target image is hidden into three POMs, and the silhouette problem that exists in the method with two POMs can be resolved during the generation procedure of POMs based on the interference principle. Simulation results are presented to verify the validity of the proposed approach.


Optics Express | 2012

Double images encryption method with resistance against the specific attack based on an asymmetric algorithm

Xiaogang Wang; Daomu Zhao

A double-image encryption technique that based on an asymmetric algorithm is proposed. In this method, the encryption process is different from the decryption and the encrypting keys are also different from the decrypting keys. In the nonlinear encryption process, the images are encoded into an amplitude cyphertext, and two phase-only masks (POMs) generated based on phase truncation are kept as keys for decryption. By using the classical double random phase encoding (DRPE) system, the primary images can be collected by an intensity detector that located at the output plane. Three random POMs that applied in the asymmetric encryption can be safely applied as public keys. Simulation results are presented to demonstrate the validity and security of the proposed protocol.


Journal of The Optical Society of America A-optics Image Science and Vision | 2004

Propagation of Laguerre–Gaussian and elegant Laguerre–Gaussian beams in apertured fractional Hankel transform systems

Zhangrong Mei; Daomu Zhao

On the basis of the fact that a hard-edged-aperture function can be expanded into a finite sum of complex Gaussian functions, approximate analytical expressions for the output field distribution of a Laguerre-Gaussian beam and an elegant Laguerre-Gaussian beam passing through apertured fractional Hankel transform systems are derived. Some numerical simulation comparisons are done, by using the approximate analytical formulas and diffraction integral formulas, and it is shown that our method can significantly improve the numerical calculation efficiency.

Collaboration


Dive into the Daomu Zhao's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Tao Wang

Sichuan Normal University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Fan Ge

Hangzhou Dianzi University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge