Multiple-Image Encryption Based on Compressive Ghost Imaging and Coordinate Sampling

被引:41
|
作者
Li, Xianye [1 ,2 ]
Meng, Xiangfeng [1 ,2 ]
Yang, Xiulun [1 ,2 ]
Yin, Yongkai [1 ,2 ]
Wang, Yurong [1 ,2 ]
Peng, Xiang [3 ]
He, Wenqi [3 ]
Dong, Guoyan [4 ]
Chen, Hongyi [5 ]
机构
[1] Shandong Univ, Sch Informat Sci & Engn, Dept Opt, Jinan 250100, Peoples R China
[2] Shandong Univ, Shandong Prov Key Lab Laser Technol & Applicat, Jinan 250100, Peoples R China
[3] Shenzhen Univ, Coll Optoelect Engn, Shenzhen 518060, Peoples R China
[4] Univ Chinese Acad Sci, Coll Mat Sci & Optoelect Techol, Beijing 100049, Peoples R China
[5] Shenzhen Univ, Coll Elect Sci & Technol, Shenzhen 518060, Peoples R China
来源
IEEE PHOTONICS JOURNAL | 2016年 / 8卷 / 04期
基金
中国国家自然科学基金;
关键词
Ghost imaging; compressive sensing; OBJECT AUTHENTICATION; PHASE RETRIEVAL; MASK;
D O I
10.1109/JPHOT.2016.2591441
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A multiple-image encryption method that is based on a modified logistic map algorithm, compressive ghost imaging, and coordinate sampling is proposed. In the encryption process, random phase-only masks are first generated with the modified logistic map algorithm; multiple secret images are transformed to be sparsed by the 2-D discrete cosine transformation (DCT) operation and scrambled by different random sequences; the scrambled images are then grouped to one combined image with the help of the coordinate sampling matrices; finally, putting the combined image in the object plane of the compressive ghost imaging system, the ciphertext will be obtained from the buck detector and transferred to the receivers. During the decryption, which is the possession of the correct principle keys and the assistant geometrical parameter key, the original secret images can be successfully decrypted by the logistic map algorithm, measurement matrix generations, compressive sensing reconstruction, DCT distribution extraction, inverse DCT transform, and filtering operation.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] Multiple-image encryption based on computational ghost imaging
    Wu, Jingjing
    Xie, Zhenwei
    Liu, Zhengjun
    Liu, Wei
    Zhang, Yan
    Liu, Shutian
    [J]. OPTICS COMMUNICATIONS, 2016, 359 : 38 - 43
  • [2] Multiple-image hybrid encryption based on compressive sensing and diffractive imaging
    Hazer, Abdurrahman
    Yildirim, Remzi
    [J]. JOURNAL OF OPTICS, 2020, 22 (10)
  • [3] Multiple-image encryption via lifting wavelet transform and XOR operation based on compressive ghost imaging scheme
    Li, Xianye
    Meng, Xiangfeng
    Yang, Xiulun
    Wang, Yurong
    Yin, Yongkai
    Peng, Xiang
    He, Wenqi
    Dong, Guoyan
    Chen, Hongyi
    [J]. OPTICS AND LASERS IN ENGINEERING, 2018, 102 : 106 - 111
  • [4] Research on multiple-image encryption mechanism based on Radon transform and ghost imaging
    Zhang Leihong
    Wang Yang
    Zhang Dawei
    [J]. OPTICS COMMUNICATIONS, 2022, 504
  • [5] Plaintext-related multiple-image encryption based on computational ghost imaging
    Tao, Yuanchun
    Yang, Xiulun
    Meng, Xiangfeng
    Wang, Yurong
    Yin, Yongkai
    Dong, Guoyan
    [J]. JOURNAL OF MODERN OPTICS, 2020, 67 (05) : 394 - 404
  • [6] Multiple-Image Encryption Mechanism Based on Ghost Imaging and Public Key Cryptography
    Zhang, Leihong
    Yuan, Xiao
    Wang, Kaimin
    Zhang, Dawei
    [J]. IEEE PHOTONICS JOURNAL, 2019, 11 (04):
  • [7] Research on multiple-image encryption mechanism based on Radon transform and ghost imaging
    Zhang, Leihong
    Wang, Yang
    Zhang, Dawei
    [J]. Optics Communications, 2022, 504
  • [8] Multiple-image encryption by compressive holography
    Di, Hong
    Zheng, Kangfeng
    Zhang, Xin
    Lam, Edmund Y.
    Kim, Taegeun
    Kim, You Seok
    Poon, Ting-Chung
    Zhou, Changhe
    [J]. APPLIED OPTICS, 2012, 51 (07) : 1000 - 1009
  • [9] Secret shared multiple-image encryption based on row scanning compressive ghost imaging and phase retrieval in the Fresnel domain
    Li, Xianye
    Meng, Xiangfeng
    Wang, Yurong
    Yang, Xiulun
    Yin, Yongkai
    Peng, Xiang
    He, Wenqi
    Dong, Guoyan
    Chen, Hongyi
    [J]. OPTICS AND LASERS IN ENGINEERING, 2017, 96 : 7 - 16
  • [10] Research on Multiple-image Encryption Scheme Based on Fourier Transform and Ghost Imaging Algorithm
    Zhang Leihong
    Yuan Xiao
    Zhang Dawei
    Chen Jian
    [J]. CURRENT OPTICS AND PHOTONICS, 2018, 2 (04) : 315 - 323