DOI QR코드

DOI QR Code

Research on Equal-resolution Image Hiding Encryption Based on Image Steganography and Computational Ghost Imaging

  • Leihong Zhang (School of Optical-electrical and Computer Engineering, University of Shanghai for Science and Technology) ;
  • Yiqiang Zhang (School of Optical-electrical and Computer Engineering, University of Shanghai for Science and Technology) ;
  • Runchu Xu (School of Optical-electrical and Computer Engineering, University of Shanghai for Science and Technology) ;
  • Yangjun Li (School of Optical-electrical and Computer Engineering, University of Shanghai for Science and Technology) ;
  • Dawei Zhang (School of Optical-electrical and Computer Engineering, University of Shanghai for Science and Technology)
  • Received : 2023.12.27
  • Accepted : 2024.04.30
  • Published : 2024.06.25

Abstract

Information-hiding technology is introduced into an optical ghost imaging encryption scheme, which can greatly improve the security of the encryption scheme. However, in the current mainstream research on camouflage ghost imaging encryption, information hiding techniques such as digital watermarking can only hide 1/4 resolution information of a cover image, and most secret images are simple binary images. In this paper, we propose an equal-resolution image-hiding encryption scheme based on deep learning and computational ghost imaging. With the equal-resolution image steganography network based on deep learning (ERIS-Net), we can realize the hiding and extraction of equal-resolution natural images and increase the amount of encrypted information from 25% to 100% when transmitting the same size of secret data. To the best of our knowledge, this paper combines image steganography based on deep learning with optical ghost imaging encryption method for the first time. With deep learning experiments and simulation, the feasibility, security, robustness, and high encryption capacity of this scheme are verified, and a new idea for optical ghost imaging encryption is proposed.

Keywords

Acknowledgement

The authors thank the National Natural Science Foundation of China, Shanghai Industrial Collaborative Innovation Project and the development fund for Shanghai talents for help identifying collaborators for this work.

References

  1. O. Matoba, T. Nomura, E. Perez-Cabre, M. S. Millan, and B. Javidi. "Optical techniques for information security," Proc. IEEE 97, 1128-1148 (2009).
  2. D. Xiao, X. Li, S.-J. Liu, and Q.-H. Wang, "Encryption and display of multiple-image information using computer-generated holography with modified GS iterative algorithm," Opt. Commun. 410, 488-495 (2018).
  3. Y. Kang, L. Zhang, H. Ye, M. Zhao, S. Kanwal, C. Bai, and D. Zhang, "One-to-many optical information encryption transmission method based on temporal ghost imaging and code division multiple access," Photonics Res. 7, 1370-1380 (2019).
  4. W. Qin and X. Peng, "Asymmetric cryptosystem based on phase-truncated Fourier transforms," Opt. Express 35, 118-120 (2010).
  5. X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, "Security enhancement of double random phase encryption by amplitude modulation," Opt. Lett. 33, 1575-1577 (2008).
  6. P. Kumar, A. Kumar, J. Joseph, and K. Singh, "Impulse attack free double-random-phase encryption scheme with randomized lens-phase functions," Opt. Lett. 34, 331-333 (2009).
  7. P. Kumar, J. Joseph, and K. Singh, "Impulse attack-free four random phase mask encryption based on a 4-f optical system," Appl. Opt. 48, 2356-2363 (2009).
  8. G. Situ and J. Zhang, "Double random-phase encoding in the Fresnel domain," Opt. Lett. 29, 1584-1586 (2004).
  9. Y. Yang, B. Guan, and J. Li, "Image compression-encryption scheme based on fractional order hyperchaotic system combined with 2D compressed sensing and DNA encoding," Opt. Laser Technol. 119, 1056661 (2019).
  10. L.-Q. Huang, H. Liu, Z.-Y. Wang, and J.-H. Wang, "Self-adaptive image encryption algorithm combining chaotic map with DNA computing," J. Chin. Comput. Syst. 41, 1959-1965 (2020).
  11. L. Zhu, H. Song, X. Zhang, M. Yan, L. Zhang, and T. Yan, "A novel image encryption scheme based on nonuniform sampling in block compressive sensing," IEEE Access 7, 22161-22174 (2019).
  12. L. Zhang, Z. Pan, and G. Zhou, "Study on the key technology of optical encryption based on adaptive compressive ghost imaging for a large-sized object," J. Opt. Technol. 84, 471-476 (2017).
  13. O. Katz, Y. Bromberg, and Y. Silberberg, "Compressive ghost imaging," Appl. Phys. Lett. 95, 131110 (2009).
  14. S. Wang, X. Meng, Y. Yin, Y. Wang, X. Yang, X. Zhang, X. Peng, W. He, G. Dong, and H. Chen, "Optical image watermarking based on singular value decomposition ghost imaging and lifting wavelet transform," Opt. Lasers Eng. 114, 76-82 (2019).
  15. J.-Y. Wu, W.-L. Huang, M.-J. Zuo, and L.-H. Gong, "Optical watermark scheme based on singular value decomposition ghost imaging and particle swarm optimization algorithm," J. Mod. Opt. 67, 1059-1071 (2020).
  16. Y. Zhou, M. Yang, B. Zhou, Z. Xiao, and L. Sui, "An optical image watermarking method based on computational ghost imaging and multiple logistic maps," Appl. Phys. B 128, 134 (2022).
  17. C. Xu, D. Li, K. Guo, Z. Yin, and Z. Guo, "Computational ghost imaging with key-patterns for image encryption," Opt. Commun. 537, 129190 (2023).
  18. X. Wang, S. Lin, J. Xue, B. Xu, and J. Chen, "Information security scheme using deep learning assisted single-pixel imaging and orthogonal coding," Opt. Express 31, 2402-2413 (2023).
  19. F. Wang, H. Wang, H. Wang, G. Li, and G. Situ, "Learning from simulation: An end-to-end deep-learning approach for computational ghost imaging," Opt. Express 27, 25560-25572 (2019).
  20. H. Wu, R. Wang, G. Zhao, H. Xiao, D. Wang, J. Liang, X. Tian, L. Cheng, and X. Zhang, "Sub-Nyquist computational ghost imaging with deep learning," Opt. Express 28, 3846-3853 (2020).
  21. T. Shimobaba, Y. Endo, T. Nishitsuji, T. Takahashi, Y. Nagahama, S. Hasegawa, M. Sano, R. Hirayama, T. Kakue, A. Shiraki, and T. Ito, "Computational ghost imaging using deep learning," Opt. Commun. 413, 147-151 (2018).
  22. S. Liu, X. Meng, Y. Yin, H. Wu, and W. Jiang, "Computational ghost imaging based on an untrained neural network," Opt. Lasers Eng. 147, 106744 (2021).
  23. S. Lin, X. Wang, A. Zhu, J. Xue, and B. Xu, "Steganographic optical image encryption based on single-pixel imaging and an untrained neural network," Opt. Express 30, 36144-36154 (2022).
  24. A. Zhu, S. Lin, and X. Wang, "Optical color ghost cryptography and steganography based on multi-discriminator generative adversarial network," Opt. Commun. 512, 128032 (2022).
  25. S. Baluja, "Hiding images in plain sight: Deep steganography," Adv. Neural Inf. Process. Syst. 30, 2066-2076 (2017).
  26. S. Chen and D. Donoho, "Basis pursuit," in Proc. 1994 28th Asilomar Conference on Signals, Systems and Computers (Pacific Grove, CA, USA, Oct. 31-Nov. 2, 1994), pp. 41-44.
  27. H.-C. Liu and W. Chen, "Optical ghost cryptography and steganography," Opt. Lasers Eng. 130, 106094 (2020).
  28. J. Xu, X. Mao, X. Jin, A. Jaffer, S. Lu, L. Li, and M. Toyoura, "Hidden message in a deformation-based texture," Vis. Comput. Int. J. Comput. Graph. 31,1653-1669 (2015).
  29. K. Yi, Z. Leihong, Y. Hualong, Z. Mantong, S. Kanwal, and Z. Dawei, "Camouflaged optical encryption based on compressive ghost imaging," Opt. Lasers Eng. 134, 106154 (2020).
  30. A. ur Rehman, R. Rahim, S. Nadeem, and S. ul Hussain, "End-to-end trained CNN encoder-decoder networks for image steganography," arXiv:1711.07201 (2017).