An optical multiple-image authentication based on computational ghost imaging and total-variation minimization

被引:4
|
作者
Zhou, Yaoling [1 ]
Sun, Yueer [2 ]
Yang, Mu [3 ]
Hou, Junzhao [3 ]
Xiao, Zhaolin [1 ]
Anand, Asundi [4 ]
Sui, Liansheng [1 ,5 ]
机构
[1] Xian Univ Technol, Sch Comp Sci & Engn, Xian 710048, Peoples R China
[2] Yonyou Network co Ltd, Beijing 100085, Peoples R China
[3] Xian Haitang Vocat Coll, Xian 710038, Peoples R China
[4] dOptron Pte Ltd, Singapore 639798, Singapore
[5] Shaanxi Key Lab Network Comp & Secur Technol, Xian 710048, Peoples R China
基金
中国国家自然科学基金;
关键词
Multiple -image authentication; Computational ghost imaging; Total -variation minimization; ENCRYPTION; SCHEME;
D O I
10.1016/j.heliyon.2023.e17682
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
An optical multiple-image authentication is suggested using computational ghost imaging and total-variation minimization. Differing from encrypting multiple images into a noise-like ciphertext directly, as described in most conventional authentication methods, the related encoded information is embedded into a cover image to avoid the attention of eavesdroppers. First, multiple images are encoded to form real-valued sequences composed of corresponding bucket values obtained by the aid of computational ghost imaging, and four sub-images are obtained by decomposing the cover image using wavelet transform. Second, measured sequences are embedded into one of the sub-images, and embedding positions are randomly selected using corresponding binary masks. To enhance the security level, a chaotic sequence is produced using logistic map and used to scramble measured intensities. Most importantly, original images with high quality can be directly recovered using total-variation minimization. The validity and robustness of the proposed approach are verified with optical experiments.
引用
收藏
页数:16
相关论文
共 50 条
  • [31] Optical multiple-image authentication scheme based on the phase retrieval algorithm in gyrator domain
    Sui, Liansheng
    Zhang, Xiao
    Tian, Ailing
    JOURNAL OF OPTICS, 2017, 19 (05)
  • [32] Optical multiple-image authentication and encryption based on phase retrieval and interference with sparsity constraints
    Wei, Haoyu
    Wang, Xiaogang
    OPTICS AND LASER TECHNOLOGY, 2021, 142
  • [33] Fast minimization methods for solving constrained total-variation superresolution image reconstruction
    Michael Ng
    Fan Wang
    Xiao-Ming Yuan
    Multidimensional Systems and Signal Processing, 2011, 22 : 259 - 286
  • [34] Fast minimization methods for solving constrained total-variation superresolution image reconstruction
    Ng, Michael
    Wang, Fan
    Yuan, Xiao-Ming
    MULTIDIMENSIONAL SYSTEMS AND SIGNAL PROCESSING, 2011, 22 (1-3) : 259 - 286
  • [35] Image reconstruction based on total-variation minimization and alternating direction method in linear scan computed tomography
    Zhang Han-Ming
    Wang Lin-Yuan
    Yan Bin
    Li Lei
    Xi Xiao-Qi
    Lu Li-Zhong
    CHINESE PHYSICS B, 2013, 22 (07)
  • [36] Image encryption and authentication scheme based on computational ghost imaging and lifting wavelet transform
    Miao, Meng-Ke
    Gong, Li-Hua
    Zhang, Yu-Jin
    Zhou, Nan-Run
    OPTICS AND LASERS IN ENGINEERING, 2025, 184
  • [37] Image reconstruction based on total-variation minimization and alternating direction method in linear scan computed tomography
    张瀚铭
    王林元
    闫镔
    李磊
    席晓琦
    陆利忠
    Chinese Physics B, 2013, (07) : 586 - 593
  • [38] An optical image encryption based on computational ghost imaging with sparse reconstruction
    Sui, Liansheng
    Pang, Zhi
    Cheng, Ying
    Cheng, Yin
    Xiao, Zhaolin
    Tian, Ailing
    Qian, Kemao
    Anand, Asundi
    OPTICS AND LASERS IN ENGINEERING, 2021, 143 (143)
  • [39] 4D Digital Tomosynthesis Based On Algebraic Image Reconstruction and Total-Variation Minimization for the Improvement of Image Quality
    Kim, D.
    Kang, S.
    Kim, T.
    Kim, S.
    Suh, T.
    MEDICAL PHYSICS, 2014, 41 (06) : 154 - 154
  • [40] Research on the algorithm of multiple-image encryption based on the improved virtual optical imaging
    Xu Ning
    Chen Xue-Lian
    Yang Geng
    ACTA PHYSICA SINICA, 2013, 62 (08)