An optical multiple-image authentication based on computational ghost imaging and total-variation minimization

被引:4
|
作者
Zhou, Yaoling [1 ]
Sun, Yueer [2 ]
Yang, Mu [3 ]
Hou, Junzhao [3 ]
Xiao, Zhaolin [1 ]
Anand, Asundi [4 ]
Sui, Liansheng [1 ,5 ]
机构
[1] Xian Univ Technol, Sch Comp Sci & Engn, Xian 710048, Peoples R China
[2] Yonyou Network co Ltd, Beijing 100085, Peoples R China
[3] Xian Haitang Vocat Coll, Xian 710038, Peoples R China
[4] dOptron Pte Ltd, Singapore 639798, Singapore
[5] Shaanxi Key Lab Network Comp & Secur Technol, Xian 710048, Peoples R China
基金
中国国家自然科学基金;
关键词
Multiple -image authentication; Computational ghost imaging; Total -variation minimization; ENCRYPTION; SCHEME;
D O I
10.1016/j.heliyon.2023.e17682
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
An optical multiple-image authentication is suggested using computational ghost imaging and total-variation minimization. Differing from encrypting multiple images into a noise-like ciphertext directly, as described in most conventional authentication methods, the related encoded information is embedded into a cover image to avoid the attention of eavesdroppers. First, multiple images are encoded to form real-valued sequences composed of corresponding bucket values obtained by the aid of computational ghost imaging, and four sub-images are obtained by decomposing the cover image using wavelet transform. Second, measured sequences are embedded into one of the sub-images, and embedding positions are randomly selected using corresponding binary masks. To enhance the security level, a chaotic sequence is produced using logistic map and used to scramble measured intensities. Most importantly, original images with high quality can be directly recovered using total-variation minimization. The validity and robustness of the proposed approach are verified with optical experiments.
引用
收藏
页数:16
相关论文
共 50 条
  • [22] An optical image watermarking method based on computational ghost imaging and multiple logistic maps
    Zhou, Yaoling
    Yang, Mu
    Zhou, Bei
    Xiao, Zhaolin
    Sui, Liansheng
    APPLIED PHYSICS B-LASERS AND OPTICS, 2022, 128 (07):
  • [23] Multiple-image encryption and authentication based on optical interference by sparsification and space multiplexing
    Liu, Lei
    Shan, Mingguang
    Zhong, Zhi
    Liu, Bin
    OPTICS AND LASER TECHNOLOGY, 2020, 122
  • [24] An optical image watermarking method based on computational ghost imaging and multiple logistic maps
    Yaoling Zhou
    Mu Yang
    Bei Zhou
    Zhaolin Xiao
    Liansheng Sui
    Applied Physics B, 2022, 128
  • [25] Research on Multiple-image Encryption Scheme Based on Fourier Transform and Ghost Imaging Algorithm
    Zhang Leihong
    Yuan Xiao
    Zhang Dawei
    Chen Jian
    CURRENT OPTICS AND PHOTONICS, 2018, 2 (04) : 315 - 323
  • [26] Multiple-image encryption scheme based on ghost imaging of Hadamard matrix and spatial multiplexing
    Yuan, Xiao
    Zhang, Leihong
    Chen, Jian
    Wang, Kaimin
    Zhang, Dawei
    APPLIED PHYSICS B-LASERS AND OPTICS, 2019, 125 (09):
  • [27] COMPRESSIVE OPTICAL DEFLECTOMETRIC TOMOGRAPHY: A CONSTRAINED TOTAL-VARIATION MINIMIZATION APPROACH
    Gonzalez, Adriana
    Jacques, Laurent
    De Vleeschouwer, Christophe
    Antoine, Philippe
    INVERSE PROBLEMS AND IMAGING, 2014, 8 (02) : 421 - 457
  • [28] Multiple-image encryption based on Toeplitz matrix ghost imaging and elliptic curve cryptography
    Zhixiang, Bian
    Leihong, Zhang
    Hualong, Ye
    Kaimin, Wang
    Dawei, Zhang
    LASER PHYSICS LETTERS, 2021, 18 (05)
  • [29] Multiple-image encryption scheme based on ghost imaging of Hadamard matrix and spatial multiplexing
    Xiao Yuan
    Leihong Zhang
    Jian Chen
    Kaimin Wang
    Dawei Zhang
    Applied Physics B, 2019, 125
  • [30] Total-variation based picture reconstruction in multiple description image and video coding
    Zhu, Shuyuan
    Yeung, Siu-Kei Au
    Zeng, Bing
    Wu, Jiying
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2012, 27 (02) : 126 - 139