An optical multiple-image authentication based on computational ghost imaging and total-variation minimization

被引:4
|
作者
Zhou, Yaoling [1 ]
Sun, Yueer [2 ]
Yang, Mu [3 ]
Hou, Junzhao [3 ]
Xiao, Zhaolin [1 ]
Anand, Asundi [4 ]
Sui, Liansheng [1 ,5 ]
机构
[1] Xian Univ Technol, Sch Comp Sci & Engn, Xian 710048, Peoples R China
[2] Yonyou Network co Ltd, Beijing 100085, Peoples R China
[3] Xian Haitang Vocat Coll, Xian 710038, Peoples R China
[4] dOptron Pte Ltd, Singapore 639798, Singapore
[5] Shaanxi Key Lab Network Comp & Secur Technol, Xian 710048, Peoples R China
基金
中国国家自然科学基金;
关键词
Multiple -image authentication; Computational ghost imaging; Total -variation minimization; ENCRYPTION; SCHEME;
D O I
10.1016/j.heliyon.2023.e17682
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
An optical multiple-image authentication is suggested using computational ghost imaging and total-variation minimization. Differing from encrypting multiple images into a noise-like ciphertext directly, as described in most conventional authentication methods, the related encoded information is embedded into a cover image to avoid the attention of eavesdroppers. First, multiple images are encoded to form real-valued sequences composed of corresponding bucket values obtained by the aid of computational ghost imaging, and four sub-images are obtained by decomposing the cover image using wavelet transform. Second, measured sequences are embedded into one of the sub-images, and embedding positions are randomly selected using corresponding binary masks. To enhance the security level, a chaotic sequence is produced using logistic map and used to scramble measured intensities. Most importantly, original images with high quality can be directly recovered using total-variation minimization. The validity and robustness of the proposed approach are verified with optical experiments.
引用
收藏
页数:16
相关论文
共 50 条
  • [41] Optical multiple-image authentication based on modified Gerchberg-Saxton algorithm with random sampling
    Chen, Wen
    Chen, Xudong
    OPTICS COMMUNICATIONS, 2014, 318 : 128 - 132
  • [42] Research on multiple-image encryption scheme based on joint power spectral division multiplexing and ghost imaging
    Wang, Yang
    Zhang, Leihong
    Zhang, Dawei
    Wang, Kaimin
    LASER PHYSICS, 2021, 31 (05)
  • [43] Multiple-image authentication based on the single-pixel correlated imaging and multiple-level wavelet transform
    Sui Liansheng
    Zhang Liwen
    Wang Qiang
    Tian Ailing
    Anand, Asundi
    OPTICS AND LASERS IN ENGINEERING, 2020, 130
  • [44] Image denoising based on nonconvex anisotropic total-variation regularization
    Guo, Juncheng
    Chen, Qinghua
    SIGNAL PROCESSING, 2021, 186
  • [45] Optical authentication method based on correspondence ghost imaging
    Zhang, Jialin
    Zhao, Dan
    Li, Yue
    Liu, Yang
    Sun, Mingze
    Li, Xinjia
    Yu, Zhan
    Zhou, Xin
    APPLIED OPTICS, 2023, 62 (29) : 7678 - 7688
  • [46] Multiple-image authentication based on metasurface and phase retrieval with sparsity constraints
    Xue, Ruijie
    Su, Yanfeng
    Wang, Zhihan
    Wang, Boyu
    Wang, Yiwen
    Cai, Zhijian
    Wan, Wenqiang
    OPTICS COMMUNICATIONS, 2024, 569
  • [47] Combined use of BP neural network and computational integral imaging reconstruction for optical multiple-image security
    Li, Xiao Wei
    Cho, Sung Jin
    Kim, Seok Tae
    OPTICS COMMUNICATIONS, 2014, 315 : 147 - 158
  • [48] Multiple-image authentication scheme based on the phase-only hologram
    Jiang Zishan
    Sui Liansheng
    Wang Jiahao
    Xiao Zhaolin
    Zeng Tianyu
    INTERNATIONAL CONFERENCE ON OPTICAL AND PHOTONIC ENGINEERING, ICOPEN 2023, 2024, 13069
  • [49] Optical encryption based on computational ghost imaging
    Clemente, Pere
    Duran, Vicente
    Torres-Company, Victor
    Tajahuerce, Enrique
    Lancis, Jesus
    OPTICS LETTERS, 2010, 35 (14) : 2391 - 2393
  • [50] DISPARITY-COMPENSATED TOTAL-VARIATION MINIMIZATION FOR COMPRESSED-SENSED MULTIVIEW IMAGE RECONSTRUCTION
    Liu, Ring
    Zhang, Chen
    Kim, Joohee
    2015 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING (ICASSP), 2015, : 1458 - 1462