An optical multiple-image authentication based on computational ghost imaging and total-variation minimization

被引:4
|
作者
Zhou, Yaoling [1 ]
Sun, Yueer [2 ]
Yang, Mu [3 ]
Hou, Junzhao [3 ]
Xiao, Zhaolin [1 ]
Anand, Asundi [4 ]
Sui, Liansheng [1 ,5 ]
机构
[1] Xian Univ Technol, Sch Comp Sci & Engn, Xian 710048, Peoples R China
[2] Yonyou Network co Ltd, Beijing 100085, Peoples R China
[3] Xian Haitang Vocat Coll, Xian 710038, Peoples R China
[4] dOptron Pte Ltd, Singapore 639798, Singapore
[5] Shaanxi Key Lab Network Comp & Secur Technol, Xian 710048, Peoples R China
基金
中国国家自然科学基金;
关键词
Multiple -image authentication; Computational ghost imaging; Total -variation minimization; ENCRYPTION; SCHEME;
D O I
10.1016/j.heliyon.2023.e17682
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
An optical multiple-image authentication is suggested using computational ghost imaging and total-variation minimization. Differing from encrypting multiple images into a noise-like ciphertext directly, as described in most conventional authentication methods, the related encoded information is embedded into a cover image to avoid the attention of eavesdroppers. First, multiple images are encoded to form real-valued sequences composed of corresponding bucket values obtained by the aid of computational ghost imaging, and four sub-images are obtained by decomposing the cover image using wavelet transform. Second, measured sequences are embedded into one of the sub-images, and embedding positions are randomly selected using corresponding binary masks. To enhance the security level, a chaotic sequence is produced using logistic map and used to scramble measured intensities. Most importantly, original images with high quality can be directly recovered using total-variation minimization. The validity and robustness of the proposed approach are verified with optical experiments.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] Optical multiple-image authentication based on computational ghost imaging and hybrid non-convex second-order total variation
    Zhou, Yaoling
    Sun, Yueer
    Yang, Mu
    Zhou, Bei
    Hou, Junzhao
    Zeng, Tianyu
    Xiao, Zhaolin
    Sui, Liansheng
    OPTICS EXPRESS, 2023, 31 (13) : 20887 - 20904
  • [2] Multiple-image encryption based on computational ghost imaging
    Wu, Jingjing
    Xie, Zhenwei
    Liu, Zhengjun
    Liu, Wei
    Zhang, Yan
    Liu, Shutian
    OPTICS COMMUNICATIONS, 2016, 359 : 38 - 43
  • [3] Plaintext-related multiple-image encryption based on computational ghost imaging
    Tao, Yuanchun
    Yang, Xiulun
    Meng, Xiangfeng
    Wang, Yurong
    Yin, Yongkai
    Dong, Guoyan
    JOURNAL OF MODERN OPTICS, 2020, 67 (05) : 394 - 404
  • [4] Optical image authentication and encryption scheme with computational ghost imaging
    Hu, Jie-Long
    Chen, Ming-Xuan
    Zhou, Shun
    Zhou, Nan-Run
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2024, 361 (17):
  • [5] Optical image encryption and authentication scheme with computational ghost imaging
    Guo, Zhe
    Chen, Su-Hua
    Zhou, Ling
    Gong, Li-Hua
    APPLIED MATHEMATICAL MODELLING, 2024, 131 : 49 - 66
  • [6] Noninvasive Transmural Electrophysiological Imaging Based on Minimization of Total-Variation Functional
    Xu, Jingjia
    Dehaghani, Azar Rahimi
    Gao, Fei
    Wang, Linwei
    IEEE TRANSACTIONS ON MEDICAL IMAGING, 2014, 33 (09) : 1860 - 1874
  • [7] An optical multiple-image authentication based on transport of intensity equation
    Sui, Liansheng
    Zhao, Xiaoyu
    Huang, Chongtian
    Tian, Ailing
    Anand, Asundi
    OPTICS AND LASERS IN ENGINEERING, 2019, 116 : 116 - 124
  • [8] A crosstalk-free multiple-image encryption scheme based on computational ghost imaging with binarized detection
    Bai, Xing
    Yuan, Sheng
    Yu, Zhan
    Wang, Yujie
    Chen, Xingyu
    Liu, Yang
    Sun, Mingze
    Li, Xinjia
    Zhou, Xin
    LASER PHYSICS, 2024, 34 (08)
  • [9] Multiple-Image Encryption Based on Compressive Ghost Imaging and Coordinate Sampling
    Li, Xianye
    Meng, Xiangfeng
    Yang, Xiulun
    Yin, Yongkai
    Wang, Yurong
    Peng, Xiang
    He, Wenqi
    Dong, Guoyan
    Chen, Hongyi
    IEEE PHOTONICS JOURNAL, 2016, 8 (04):
  • [10] Optical cryptosystem based on computational ghost imaging and nonlinear authentication
    Zhang, Lin
    Wang, Xiaogang
    Zhou, Qingming
    Xue, Jidong
    Xu, Bijun
    OPTICS EXPRESS, 2024, 32 (03) : 4242 - 4253