Multi-images encryption and watermarking with small number of keys via computational ghost imaging

被引:13
作者
Guan, Qingtian [1 ]
Deng, Huaxia [2 ]
Liang, Wenbo [1 ]
Zhong, Xiang [1 ]
Ma, Mengchao [1 ]
机构
[1] Hefei Univ Technol, Sch Instrument Sci & Optoelect Engn, Hefei 230009, Anhui, Peoples R China
[2] Univ Sci & Technol China, Dept Modern Mech, CAS Key Lab Mech Behav & Design Mat, Hefei 230027, Anhui, Peoples R China
基金
中国国家自然科学基金;
关键词
Image encryption; Image watermarking; Computational ghost imaging; Arnold transform; Independent component analysis;
D O I
10.1016/j.optlastec.2023.109957
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
A computational ghost imaging encryption and watermarking method with a small key storage space is proposed. This method uses the Arnold transform to rearrange the measurement matrix in the computational ghost imaging (CGI), using the parameters in the transform as encryption/decryption keys. To reduce the risk of key leakage, the independent component analysis (ICA) method is introduced to analyze the CGI signals, making them statistically independent from each other and further increasing the difficulty of cracking. Two watermarking strategies are proposed that can identify illegal data tampering by verifying the integrity of the watermark. The feasibility of this method is verified by both numerical simulations and optical experiments. The research results represent an optical imaging encryption and watermarking technique with multi-images and multi-user characteristics. As its key storage requirements are small, it can be applied to confidential channels with low speeds, such as quantum cryptography.
引用
收藏
页数:11
相关论文
共 25 条
  • [1] Summation of power series by continued exponentials
    Bender, CM
    Vinson, JP
    [J]. JOURNAL OF MATHEMATICAL PHYSICS, 1996, 37 (08) : 4103 - 4119
  • [2] A new robust reference watermarking scheme based on DWT-SVD
    Bhatnagar, Gaurav
    Raman, Balasubramanian
    [J]. COMPUTER STANDARDS & INTERFACES, 2009, 31 (05) : 1002 - 1013
  • [3] Marked ghost imaging
    Chen, Wen
    Chen, Xudong
    [J]. APPLIED PHYSICS LETTERS, 2014, 104 (25)
  • [4] Secure spread spectrum watermarking for multimedia
    Cox, IJ
    Kilian, J
    Leighton, FT
    Shamoon, T
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) : 1673 - 1687
  • [5] Fourier single-pixel imaging using fewer illumination patterns
    Deng, Huaxia
    Gao, Xicheng
    Ma, Mengchao
    Yao, Pengcheng
    Guan, Qingtian
    Zhong, Xiang
    Zhang, Jin
    [J]. APPLIED PHYSICS LETTERS, 2019, 114 (22)
  • [6] Principles and prospects for single-pixel imaging
    Edgar, Matthew P.
    Gibson, Graham M.
    Padgett, Miles J.
    [J]. NATURE PHOTONICS, 2019, 13 (01) : 13 - 20
  • [7] Multiple layer encryption and steganography via multi-channel ghost imaging
    Ghanbari-Ghalehjoughi, Hossein
    Eslami, Mansour
    Ahmadi-Kandjani, Sohrab
    Ghanbari-Ghalehjoughi, Mohsen
    Yu, Zeyun
    [J]. OPTICS AND LASERS IN ENGINEERING, 2020, 134
  • [8] LI H, 1994, IEEE IMAGE PROC, P51, DOI 10.1109/ICIP.1994.413273
  • [9] High-efficiency single-pixel imaging using discrete Hartley transform
    Ma, Mengchao
    Sun, Qianzhen
    Gao, Xicheng
    Wang, Guan
    Deng, Huaxia
    Zhang, Yi
    Guan, Qingtian
    Zhong, Xiang
    [J]. AIP ADVANCES, 2021, 11 (07)
  • [10] ORuanaidh JJK, 1996, INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, PROCEEDINGS - VOL III, P239, DOI 10.1109/ICIP.1996.560428