DOI QR코드

DOI QR Code

Research on Multiple-image Encryption Scheme Based on Fourier Transform and Ghost Imaging Algorithm

  • Zhang, Leihong (University of Shanghai for Science and Technology) ;
  • Yuan, Xiao (University of Shanghai for Science and Technology) ;
  • Zhang, Dawei (University of Shanghai for Science and Technology) ;
  • Chen, Jian (Anhui Province Key Laboratory of Nondestructive Evaluation)
  • 투고 : 2018.04.26
  • 심사 : 2018.07.11
  • 발행 : 2018.08.25

초록

A new multiple-image encryption scheme that is based on a compressive ghost imaging concept along with a Fourier transform sampling principle has been proposed. This further improves the security of the scheme. The scheme adopts a Fourier transform to sample the original multiple-image information respectively, utilizing the centrosymmetric conjugation property of the spatial spectrum of the images to obtain each Fourier coefficient in the most abundant spatial frequency band. Based on this sampling principle, the multiple images to be encrypted are grouped into a combined image, and then the compressive ghost imaging algorithm is used to improve the security, which reduces the amount of information transmission and improves the information transmission rate. Due to the presence of the compressive sensing algorithm, the scheme improves the accuracy of image reconstruction.

키워드

참고문헌

  1. P. Refregier and B. Javidi, "Optical-image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995). https://doi.org/10.1364/OL.20.000767
  2. Y. Frauel, A. Castro, T. Naughton, and B. Javidi, "Resistance of the double random phase encryption against various attacks," Opt. Express 15, 10253-10265 (2007). https://doi.org/10.1364/OE.15.010253
  3. I.-H. Lee and M. Cho, "Optical encryption and information authentication of 3D objects considering wireless channel characteristics," J. Opt. Soc. Korea 17, 494-499 (2013). https://doi.org/10.3807/JOSK.2013.17.6.494
  4. M. Cho and B. Javidi, "Three-dimensional photon counting double random phase encryption," Opt. Lett. 38, 3198-3201 (2013). https://doi.org/10.1364/OL.38.003198
  5. I.-H. Lee and M. Cho, "Double random phase encryption based orthogonal encoding technique for color images," J. Opt. Soc. Korea 18, 129-133 (2014). https://doi.org/10.3807/JOSK.2014.18.2.129
  6. D. N. Klyshko, "Combine EPR and two-slit experiments: Interference of advanced waves," Phys. Lett. A 132, 199-304 (1999).
  7. M. Tanha, S. Ahmadi-Kandjani, R. Kheradmand, and H. Ghanbari, "Computational fluorescence ghost imaging," Eur. Phys. J. D 67, 44 (2013).
  8. O. Katz, Y. Bromberg, and Y. Silberberg, "Compressive ghost imaging," Appl. Phys. Lett. 95, 131110-131113 (2009). https://doi.org/10.1063/1.3238296
  9. V. Katkovnik and J. Astola, "Compressive sensing computational ghost imaging," J. Opt. Soc. Korea A 29, 1556-1567 (2012). https://doi.org/10.1364/JOSAA.29.001556
  10. J. H. Shapiro and R. W. Boyd, "The physics of ghost imaging," Quantum. Inf. Process. 11, 949-993 (2012). https://doi.org/10.1007/s11128-011-0356-5
  11. J. Garnier, "Ghost imaging in the random paraxial regime," Inverse Probl. Imaging 10, 409-432 (2017).
  12. S. Yuan, J. Yao, X. Liu, X. Zhou, and Z. Li, "Cryptanalysis and security enhancement of optical cryptography based on computational ghost imaging," Opt. Commun. 365, 180-185 (2016). https://doi.org/10.1016/j.optcom.2015.12.013
  13. Y Wang and Y Liu, "High speed computational ghost imaging via spatial sweeping," Sci Rep. 7, 45325 (2017). https://doi.org/10.1038/srep45325
  14. J. J. Wu, Z. W. Xie, Z. J. Liu, W. Liu, Y. Zhang, and S. T. Liu, "Multipleimage encryption based on computational ghost imaging," Opt. Commun. 359, 38-43 (2016). https://doi.org/10.1016/j.optcom.2015.09.039
  15. I.-H. Lee and M. Cho, "Double random phase encryption using orthogonal encoding for multipleimage transmission," J. Opt. Soc. Korea 18, 201-206 (2014). https://doi.org/10.3807/JOSK.2014.18.3.201
  16. X. Li, X. Meng, X. Yang, Y. Yin, Y. Wang, X. Peng, W. He, G. Dong, and H. Chen, "Multiple-image encryption based on compressive ghost imaging and coordinate sampling," IEEE Photon. J. 8, 900511 (2016).
  17. J. Wu, Z. Xie, Z. Liu, W. Liu, Y. Zhang, and S. Liu, "Multiple-image encryption based on computational ghost imaging," Opt. Commun. 359, 38-43 (2016). https://doi.org/10.1016/j.optcom.2015.09.039
  18. S. Yuan, X. Liu, X. Zhou, and Z. Li, "Multiple-image encryption scheme with a single-pixel detector," J. Mod. Opt. 63, 1457-1465 (2016). https://doi.org/10.1080/09500340.2016.1154196
  19. W. Chen and X. Chen, "Ghost imaging for three-dimensional optical security," Appl. Phys. Lett. 103, 221106 (2013). https://doi.org/10.1063/1.4836995
  20. Z. Liu, C. Shen, J. Tan, and S. Liu, "A recovery method of double random phase encoding system with a parallel phase retrieval," IEEE Photon. J. 8, 7801807 (2016).