DOI QR코드

DOI QR Code

Research on Camouflaged Encryption Scheme Based on Hadamard Matrix and Ghost Imaging Algorithm

  • Leihong, Zhang (College of Communication and Art Design, University of Shanghai for Science and Technology) ;
  • Yang, Wang (College of Communication and Art Design, University of Shanghai for Science and Technology) ;
  • Hualong, Ye (School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology) ;
  • Runchu, Xu (College of Communication and Art Design, University of Shanghai for Science and Technology) ;
  • Dawei, Zhang (School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology)
  • Received : 2021.04.05
  • Accepted : 2021.08.12
  • Published : 2021.12.25

Abstract

A camouflaged encryption scheme based on Hadamard matrix and ghost imaging is proposed. In the process of the encryption, an orthogonal matrix is used as the projection pattern of ghost imaging to improve the definition of the reconstructed images. The ciphertext of the secret image is constrained to the camouflaged image. The key of the camouflaged image is obtained by the method of sparse decomposition by principal component orthogonal basis and the constrained ciphertext. The information of the secret image is hidden into the information of the camouflaged image which can improve the security of the system. In the decryption process, the authorized user needs to extract the key of the secret image according to the obtained random sequences. The real encrypted information can be obtained. Otherwise, the obtained image is the camouflaged image. In order to verify the feasibility, security and robustness of the encryption system, binary images and gray-scale images are selected for simulation and experiment. The results show that the proposed encryption system simplifies the calculation process, and also improves the definition of the reconstructed images and the security of the encryption system.

Keywords

Acknowledgement

This research is supported by Natural Science Foundation of Shanghai (Grant No. 18ZR1425800), and the National Natural Science Foundation of China (NSFC) (Grant No. 61875125).

References

  1. O. Matoba, T. Nomura, E. Perez-Cabre, M. S. Millan, and B. Javidi, "Optical techniques for information security," Proc. IEEE 97, 1128-1148 (2009). https://doi.org/10.1109/JPROC.2009.2018367
  2. S. Liua, C. Guo, and J. T. Sheridan, "A review of optical image encryption techniques," Opt. Laser Technol. 57, 327-342 (2014). https://doi.org/10.1016/j.optlastec.2013.05.023
  3. A. Alfalou and C. Brosseau, "Optical image compression and encryption methods," Adv. Opt. Photonics 1, 589-636 (2009). https://doi.org/10.1364/AOP.1.000589
  4. P. Refregier and B. Javidi, "Optical image encryption using input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995). https://doi.org/10.1364/OL.20.000767
  5. V. Namias, "The fractional order Fourier transform and its application to quantum mechanics," IMA J. Appl. Math. 25, 241-265 (1980). https://doi.org/10.1093/imamat/25.3.241
  6. J.-J. Huang, H.-E. Hwang, C.-Y. Chen, and C.-M. Chen, "Optical multiple-image encryption based on phase encoding algorithm in the Fresnel transform domain," Opt. Laser Technol. 44, 2238-2244 (2012). https://doi.org/10.1016/j.optlastec.2012.02.032
  7. S. K. Rajput and N. K. Nishchal, "Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform," Appl. Opt. 52, 871-878 (2013). https://doi.org/10.1364/AO.52.000871
  8. Z. Liu, C. Guo, J. Tan, W. Liu, J. Wu, Q. Wu, L. Pan, and S. Liu, "Securing color image by using phase-only encoding in Fresnel domains," Opt. Lasers Eng. 68, 87-92 (2015). https://doi.org/10.1016/j.optlaseng.2014.12.022
  9. L. Sui, K. Duan, J. Liang, and X. Hei, "Asymmetric double-image encryption based on cascaded discrete fractional random transform and logistic maps," Opt. Express 22, 10605-10621 (2014). https://doi.org/10.1364/OE.22.010605
  10. G. Situ and J. Zhang, "Double random-phase encoding in the Fresnel domain." Opt. Lett. 29, 1584-1586 (2004). https://doi.org/10.1364/OL.29.001584
  11. S. Liu, L. Yu, and B. Zhu, "Optical image encryption by cascaded fractional Fourier transforms with random phase filtering," Opt. Commun. 187, 57-63 (2001). https://doi.org/10.1016/S0030-4018(00)01093-2
  12. Z. Liu, M. A. Ahmad, and S. Liu, "Image encryption based on double random amplitude coding in random Hartley transform domain," Optik 121, 959-964 (2010). https://doi.org/10.1016/j.ijleo.2008.12.006
  13. P. Clemente, V. Duran, V. Torres-Company, E. Tajahuerce, and J. Lancis, "Optical encryption based on computational ghost imaging," Opt. Lett. 35, 2391-2393 (2010). https://doi.org/10.1364/OL.35.002391
  14. M. Tanha, R. Kheradmand, and S. Ahmadi-Kandjani, "Grayscale and color optical encryption based on computational ghost imaging," Appl. Phys. Lett. 101, 101108 (2012). https://doi.org/10.1063/1.4748875
  15. S. Liansheng, C. Yin, L. Bing, T. Ailing, and A. K. Asundi, "Optical image encryption via high-quality computational ghost imaging using iterative phase retrieval," Laser Phys. Lett. 15, 075204 (2018). https://doi.org/10.1088/1612-202X/aac002
  16. K. Yi, Z. Leihong, and Z. Dawei, "Optical encryption based on ghost imaging and public key cryptography," Opt. Lasers Eng. 111, 58-64 (2018). https://doi.org/10.1016/j.optlaseng.2018.07.014
  17. S. Dafu, Z. Wenjie, and Z. Leihong, "Research on a big data information optical double encryption algorithm based on compressive ghost imaging," Laser Phys. Lett. 16, 085201 (2019). https://doi.org/10.1088/1612-202x/ab1feb
  18. C. Zhang, W. He, B. Han, M. Liao, D. Lu, X. Peng, and C. Xu, "Compressive optical steganography via single-pixel imaging," Opt. Express 27, 13469-13478 (2019). https://doi.org/10.1364/oe.27.013469
  19. K. Yi, Z. Leihong, Y. Hualong, Z. Mantong, S. Kanwal, and Z. Dawei, "Camouflaged optical encryption based on compressive ghost imaging," Opt. Lasers Eng. 134, 106154 (2020). https://doi.org/10.1016/j.optlaseng.2020.106154
  20. K. Shibuya, K. Nakae, Y. Mizutani, and T. Iwata, "Comparison of reconstructed images between ghost imaging and Hadamard transform imaging," Opt. Rev. 22, 897-902 (2015). https://doi.org/10.1007/s10043-015-0138-x
  21. L. Wang and S. Zhao, "Fast reconstructed and high-quality ghost imaging with fast Walsh-Hadamard transform," Photonics Res. 4, 240-244 (2016). https://doi.org/10.1364/PRJ.4.000240
  22. H. Wu, G. Zhao, R. Wang, H. Xiao, D. Wang, J. Liang, L. Cheng, and R. Liang, "Computational ghost imaging system with 4-connected-region-optimized Hadamard pattern sequence," Opt. Lasers Eng. 132, 106105 (2020). https://doi.org/10.1016/j.optlaseng.2020.106105
  23. Y. Chen, W. Zheng, W. Li, and Y. Huang, "Large group activity security risk assessment and risk early warning based on random forest algorithm," Pattern Recognit. Lett. 144, 1-5 (2021). https://doi.org/10.1016/j.patrec.2021.01.008
  24. B.-H. Li, Y. Liu, A.-M. Zhang, W.-H. Wang, and S. Wan, "A survey on blocking technology of entity resolution," J. Comput. Sci. Technol. 35, 769-793 (2020). https://doi.org/10.1007/s11390-020-0350-4
  25. C. Mi, L. Cao, Z. Zhang, Y. Feng, L. Yao, and Y. Wu, "A port container code recognition algorithm under natural conditions," J. Coast. Res. 103, 822-829 (2020). https://doi.org/10.2112/si103-170.1
  26. X. Zenggang, T. Zhiwen, C. Xiaowen, Z. Xue-min, Z. Kaibin, and Y. Conghuan, "Research on image retrieval algorithm based on combination of color and shape features," J. Signal Process. Syst. 93, 139-146 (2021). https://doi.org/10.1007/s11265-019-01508-y
  27. J. Zhang and C. Shen, "Set-based obfuscation for strong PUFs against machine learning attacks," IEEE Trans. Circuits Sys. I: Regul. Pap. 68, 288-300 (2021). https://doi.org/10.1109/TCSI.2020.3028508
  28. B. Wang and L. L. Chen, "New results on fuzzy synchronization for a kind of disturbed memristive chaotic system," Complexity 2018, 3079108, (2018).
  29. J. Shi, Y. Lu, and J. Zhang, "Approximation attacks on strong PUFs," IEEE Trans. Comput. -Aided Des. Integr. Circuits Syst. 39, 2138-2151 (2020). https://doi.org/10.1109/tcad.2019.2962115
  30. B. Wang, F. C. Zou, J. Cheng, and S. M. Zhong, "Fault detection filter design for continuous-time nonlinear Markovian jump systems with mode-dependent delay and time-varying transition probabilities," Adv. Differ. Equ. 2017, 262 (2017). https://doi.org/10.1186/s13662-017-1313-0
  31. C. Zuo, Q. Chen, L. Tian, L. Waller, and A. Asundi, "Transport of intensity phase retrieval and computational imaging for partially coherent fields: the phase space perspective," Opt. Lasers Eng. 71, 20-32 (2015). https://doi.org/10.1016/j.optlaseng.2015.03.006
  32. W. K. Yu, "Super sub-Nyquist single-pixel imaging by means of cake-cutting Hadamard basis sort," Sensors 19, 4122 (2019). https://doi.org/10.3390/s19194122
  33. W. K. Pratt, J. Kane, and H. C. Andrews, "Hadamard transform image coding," Proc. IEEE 57, 58-68 (1969). https://doi.org/10.1109/PROC.1969.6869
  34. Y. Mizutani, K. Shibuya, H. Taguchi, T. Iwata, Y. Takaya, and T. Yasui, "Single-pixel imaging by Hadamard transform and its application for hyperspectral imaging," Proc. SPIE 10021, 100210B (2016).
  35. L. Zhang, Y. Wang, H. Ye, R. Xu, Y. Kang, Z. Zhang, D. Zhang, and K. Wang, "Camouflaged encryption mechanism based on sparse decomposition of principal component orthogonal basis and ghost imaging," Opt. Eng. 60, 013110 (2021).