Multiple Image Encryption Method Based on Light Field Imaging Theory and Chaotic System

被引:1
作者
Han Si-min [1 ]
Zhang Wei [1 ]
Zhang Xiang [1 ]
Wei Xiao-xiao [1 ]
Wan Xin-jun [1 ]
机构
[1] Univ Shanghai Sci & Technol, Sch Opt Elect & Comp Engn, Shanghai Key Lab Modern Opt Syst, Engn Res Ctr Opt Instrument & Syst,Minist Educ, Shanghai 200093, Peoples R China
基金
中国国家自然科学基金;
关键词
Information optics; Computational imaging; Light field imaging; Chaotic system; Multiple-image encryption;
D O I
10.3788/gzxb20204903.0310002
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
In order to overcome the limitations of the existing optical encryption methods on high encryption system requirements, limited device performance, low encryption efficiency, and easy distortion of decrypted images, a multi-image encryption method based on the light field imaging principle and chaotic system was proposed. The method first generates random numbers through a chaotic system, and these numbers are used as the number of the light field imaging systems and the parameters of each system. Then multiple light field imaging systems are built according to the generated numbers in the computer. The images to be encrypted are spliced to a big image, and placed into the constructed light field imaging systems sequentially to obtain the corresponding light field images. By extracting and splicing the sub-aperture images of each light field image, the encryption of multiple images are achieved fast. The decryption process is the reverse of the encryption. The proposed method introduces the computing imaging technology into the encryption, which can avoid the limitation of real optical decives, and is easy to be achieved. The experimental results show that the proposed algorithm has low complexity of secure keys which can be transmitted easily. And it has good robustness to noise, large key space and high sensitivity of keys, which can provide high security. It also has high efficiency. The proposed method has widely potential uses in the fields of requiring plenty of images transmission with security.
引用
收藏
页数:10
相关论文
共 24 条
[1]  
GEORGIEV T, 2013, SPIE, V8667
[2]   Focused plenoptic camera and rendering [J].
Georgiev, Todor ;
Lumsdaine, Andrew .
JOURNAL OF ELECTRONIC IMAGING, 2010, 19 (02)
[3]   Optical image encryption by random shifting in fractional Fourier domains [J].
Hennelly, B ;
Sheridan, JT .
OPTICS LETTERS, 2003, 28 (04) :269-271
[4]   An asymmetric multi-image cryptosystem based on cylindrical diffraction and phase truncation [J].
Hu, Ke-Ya ;
Wu, Chao ;
Wang, Ying ;
Wang, Jun ;
Wang, Qiong-Hua .
OPTICS COMMUNICATIONS, 2019, 449 :100-109
[5]   Quantum Multi-Image Encryption Based on Iteration Arnold Transform with Parameters and Image Correlation Decomposition [J].
Hu, Yiqun ;
Xie, Xinwen ;
Liu, Xingbin ;
Zhou, Nanrun .
INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2017, 56 (07) :2192-2205
[6]  
Ji-nan ZHU, 2019, RES IMAGE ENCRYPTION
[7]   Information hiding technique with double phase encoding [J].
Kishk, S ;
Javidi, B .
APPLIED OPTICS, 2002, 41 (26) :5462-5470
[8]  
Levoy M., 1996, Computer Graphics Proceedings. SIGGRAPH '96, P31, DOI 10.1145/237170.237199
[9]   Light field microscopy [J].
Levoy, Marc ;
Ng, Ren ;
Adams, Andrew ;
Footer, Matthew ;
Horowitz, Mark .
ACM TRANSACTIONS ON GRAPHICS, 2006, 25 (03) :924-934
[10]   Asymmetric multiple-image encryption based on the cascaded fractional Fourier transform [J].
Li, Yanbin ;
Zhang, Feng ;
Li, Yuanchao ;
Tao, Ran .
OPTICS AND LASERS IN ENGINEERING, 2015, 72 :18-25