Sparse aperture structure can solve the problems that single-aperture structure with large aperture is difficult to process. It can solve the problem that large aperture is easy to be deformed and can reduce the weight and size of the optical system. The most ideal state of the sparse aperture is to obtain more light information with the smallest light-passing area. The current goal is to obtain the best image quality by researching the arrangement of sparse aperture. However, most of the current sparse aperture structures have the same sub-aperture’s diameter, which leads to a rapid decline of system's modulation transfer function in the mid-frequency band. In this paper, the structure of three sub-apertures surrounding the large sub-aperture called quasi four-mirror structure is proposed through theoretical analysis and MATLAB simulation. The proportion of the diameter of the central mirror of the structure and the diameter of the surrounding sub-aperture is established. This proportional relation can ensure that the actual cutoff frequency is maximized while the filling factor of the entire system is minimized, thereby obtaining higher frequency information. The structure also has a feature that allows uniform acquisition of the mid-frequency information to obtain more detail information of image. The results of imaging simulation show that the imaging quality of the structure is better than that of the four-mirror structure when the filling factor and the light-passing area are equal. The sparse aperture structure of the quasi four-mirror structure proposed in this paper can be applied not only to large-scale astronomical telescopes, but also to medical endoscopes.
Optical encryption system is generally vulnerable to attacks based on phase retrieval algorithm. In this paper, an improved encryption scheme is proposed based on the coherent 4-f system and complementary masks. This pair of irregular shaped complementary masks are introduced to cut the ciphertext and regroup them. The stitched ciphertext has high immunity to ciphertext attacks based on phase retrieval algorithms. We have done numerically simulation to demonstrate the feasibility and validity of the proposed technique.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.