Research on Double Encryption of Ghost Imaging by SegNet Deep Neural Network

被引:5
作者
Ye, Hualong [1 ]
Guo, Daidou [2 ]
机构
[1] Changshu Inst Technol, Suzhou 215500, Peoples R China
[2] Univ Shanghai Sci & Technol, Sch Opt Elect & Comp Engn, Shanghai 200093, Peoples R China
关键词
Ghost imaging; deep learning; SegNet neural network; double encryption;
D O I
10.1109/LPT.2024.3379554
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Based on the development of ghost imaging and deep learning, this letter proposes a double encryption method of ghost imaging by SegNet deep neural network by fully combining the advantages of both. In the sender, the secret image and host image are encrypted by hiding network structure and ghost imaging system to complete the first level and the second level encryption to obtain the ciphertext. In this encryption method, a hiding network is constructed based on SegNet, and important information is preserved by concatenation convolution of two images, and image steganography is realized by encoding. The revealed network based on CNN is constructed to realize the secret image extraction. Through the analysis of the encryption results, can be seen that this encryption scheme has higher efficiency and better effect in information encryption compared with other image encryption methods, and has more practical research significance and application value.
引用
收藏
页码:669 / 672
页数:4
相关论文
共 16 条
[1]  
Ding Y, 2022, IEEE T NEUR NET LEAR, V33, P4915, DOI [10.1080/00206814.2021.1969525, 10.1109/TNNLS.2021.3062754]
[2]   High-efficiency optical image authentication scheme based on ghost imaging and block processing [J].
Du, J. ;
Xiong, Y. ;
Quan, C. .
OPTICS COMMUNICATIONS, 2020, 460
[3]   Three-dimensional ghost imaging lidar via sparsity constraint [J].
Gong, Wenlin ;
Zhao, Chengqiang ;
Yu, Hong ;
Chen, Mingliang ;
Xu, Wendong ;
Han, Shensheng .
SCIENTIFIC REPORTS, 2016, 6
[4]   A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks [J].
Hu, Donghui ;
Wang, Liang ;
Jiang, Wenjie ;
Zheng, Shuli ;
Li, Bin .
IEEE ACCESS, 2018, 6 :38303-38314
[5]   Encryption of ghost imaging [J].
Kong, Ling-Jun ;
Li, Yongnan ;
Qian, Sheng-Xia ;
Li, Si-Min ;
Tu, Chenghou ;
Wang, Hui-Tian .
PHYSICAL REVIEW A, 2013, 88 (01)
[6]   Multiple-image encryption via lifting wavelet transform and XOR operation based on compressive ghost imaging scheme [J].
Li, Xianye ;
Meng, Xiangfeng ;
Yang, Xiulun ;
Wang, Yurong ;
Yin, Yongkai ;
Peng, Xiang ;
He, Wenqi ;
Dong, Guoyan ;
Chen, Hongyi .
OPTICS AND LASERS IN ENGINEERING, 2018, 102 :106-111
[7]   Multiple-Image Encryption Based on Compressive Ghost Imaging and Coordinate Sampling [J].
Li, Xianye ;
Meng, Xiangfeng ;
Yang, Xiulun ;
Yin, Yongkai ;
Wang, Yurong ;
Peng, Xiang ;
He, Wenqi ;
Dong, Guoyan ;
Chen, Hongyi .
IEEE PHOTONICS JOURNAL, 2016, 8 (04)
[8]  
Liu Ming-ming, 2018, Journal of Applied Sciences - Electronics and Information Engineering, V36, P371, DOI 10.3969/j.issn.0255-8297.2018.02.015
[9]   Deep learning in neural networks: An overview [J].
Schmidhuber, Juergen .
NEURAL NETWORKS, 2015, 61 :85-117
[10]   CNN-Based Adversarial Embedding for Image Steganography [J].
Tang, Weixuan ;
Li, Bin ;
Tan, Shunquan ;
Barni, Mauro ;
Huang, Jiwu .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (08) :2074-2087