Secret shared multiple-image encryption based on row scanning compressive ghost imaging and phase retrieval in the Fresnel domain

被引:45
作者
Li, Xianye [1 ,2 ]
Meng, Xiangfeng [1 ,2 ]
Wang, Yurong [1 ,2 ]
Yang, Xiulun [1 ,2 ]
Yin, Yongkai [1 ,2 ]
Peng, Xiang [3 ]
He, Wenqi [3 ]
Dong, Guoyan [4 ]
Chen, Hongyi [5 ]
机构
[1] Shandong Univ, Sch Informat Sci & Engn, Dept Opt, Jinan 250100, Peoples R China
[2] Shandong Univ, Shandong Prov Key Lab Laser Technol & Applicat, Jinan 250100, Peoples R China
[3] Shenzhen Univ, Coll Optoelect Engn, Shenzhen 518060, Peoples R China
[4] Univ Chinese Acad Sci, Coll Mat Sci & Optoelect Technol, Beijing 100049, Peoples R China
[5] Shenzhen Univ, Coll Elect Sci & Technol, Shenzhen 518060, Peoples R China
基金
中国国家自然科学基金;
关键词
Compressive ghost imaging; Phase retrieval; Threshold secret sharing; ALGORITHM; AUTHENTICATION; INTERFERENCE; INFORMATION; TRANSFORM; MASK;
D O I
10.1016/j.optlaseng.2017.04.005
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
A multiple-image encryption method is proposed that is based on row scanning compressive ghost imaging, (t, n) threshold secret sharing, and phase retrieval in the Fresnel domain. In the encryption process, after wavelet transform and Arnold transform of the target image, the ciphertext matrix can be first detected using a bucket detector. Based on a (t, n) threshold secret sharing algorithm, the measurement key used in the row scanning compressive ghost imaging can be decomposed and shared into two pairs of sub-keys, which are then reconstructed using two phase-only mask (POM) keys with fixed pixel values, placed in the input plane and transform plane 2 of the phase retrieval scheme, respectively; and the other POM key in the transform plane 1 can be generated and updated by the iterative encoding of each plaintext image. In each iteration, the target image acts as the input amplitude constraint in the input plane. During decryption, each plaintext image possessing all the correct keys can be successfully decrypted by measurement key regeneration, compression algorithm reconstruction, inverse wavelet transformation, and Fresnel transformation. Theoretical analysis and numerical simulations both verify the feasibility of the proposed method.
引用
收藏
页码:7 / 16
页数:10
相关论文
共 39 条
[1]   Exploiting root-mean-square time-frequency structure for multiple-image optical compression and encryption [J].
Alfalou, A. ;
Brosseau, C. .
OPTICS LETTERS, 2010, 35 (11) :1914-1916
[2]   Multiplexing encryption-decryption via lateral shifting of a random phase mask [J].
Barrera, JF ;
Henao, R ;
Tebaldi, M ;
Torroba, R ;
Bolognini, N .
OPTICS COMMUNICATIONS, 2006, 259 (02) :532-536
[3]   Ghost imaging with a single detector [J].
Bromberg, Yaron ;
Katz, Ori ;
Silberberg, Yaron .
PHYSICAL REVIEW A, 2009, 79 (05)
[4]  
Chen ScottShaobing., 2001, SIAM Journal on Scientific Computing, V20, P33, DOI DOI 10.1137/51064827596304010
[5]   Optical cryptosystem based on single-pixel encoding using the modified Gerchberg-Saxton algorithm with a cascaded structure [J].
Chen, Wen .
JOURNAL OF THE OPTICAL SOCIETY OF AMERICA A-OPTICS IMAGE SCIENCE AND VISION, 2016, 33 (12) :2305-2311
[6]   Correlated-Photon Secured Imaging by Iterative Phase Retrieval Using Axially-Varying Distances [J].
Chen, Wen .
IEEE PHOTONICS TECHNOLOGY LETTERS, 2016, 28 (18) :1932-1935
[7]   Optical Multiple-Image Encryption Using Three-Dimensional Space [J].
Chen, Wen .
IEEE PHOTONICS JOURNAL, 2016, 8 (02)
[8]   Modulating Phase via Rotation for Optical Encoding Based on Correlated Photon Imaging [J].
Chen, Wen .
IEEE PHOTONICS TECHNOLOGY LETTERS, 2016, 28 (04) :540-543
[9]   Optical authentication via photon-synthesized ghost imaging using optical nonlinear correlation [J].
Chen, Wen ;
Chen, Xudong .
OPTICS AND LASERS IN ENGINEERING, 2015, 73 :123-127
[10]   Marked ghost imaging [J].
Chen, Wen ;
Chen, Xudong .
APPLIED PHYSICS LETTERS, 2014, 104 (25)