과제정보
The authors thank the National Natural Science Foundation of China, Shanghai Industrial Collaborative Innovation Project and the development fund for Shanghai talents for help identifying collaborators for this work.
참고문헌
- O. Matoba, T. Nomura, E. Perez-Cabre, M. S. Millan, and B. Javidi. "Optical techniques for information security," Proc. IEEE 97, 1128-1148 (2009). https://doi.org/10.1109/JPROC.2009.2018367
- D. Xiao, X. Li, S.-J. Liu, and Q.-H. Wang, "Encryption and display of multiple-image information using computer-generated holography with modified GS iterative algorithm," Opt. Commun. 410, 488-495 (2018). https://doi.org/10.1016/j.optcom.2017.09.087
- Y. Kang, L. Zhang, H. Ye, M. Zhao, S. Kanwal, C. Bai, and D. Zhang, "One-to-many optical information encryption transmission method based on temporal ghost imaging and code division multiple access," Photonics Res. 7, 1370-1380 (2019). https://doi.org/10.1364/PRJ.7.001370
- W. Qin and X. Peng, "Asymmetric cryptosystem based on phase-truncated Fourier transforms," Opt. Express 35, 118-120 (2010).
- X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, "Security enhancement of double random phase encryption by amplitude modulation," Opt. Lett. 33, 1575-1577 (2008). https://doi.org/10.1364/OL.33.001575
- P. Kumar, A. Kumar, J. Joseph, and K. Singh, "Impulse attack free double-random-phase encryption scheme with randomized lens-phase functions," Opt. Lett. 34, 331-333 (2009). https://doi.org/10.1364/OL.34.000331
- P. Kumar, J. Joseph, and K. Singh, "Impulse attack-free four random phase mask encryption based on a 4-f optical system," Appl. Opt. 48, 2356-2363 (2009). https://doi.org/10.1364/AO.48.002356
- G. Situ and J. Zhang, "Double random-phase encoding in the Fresnel domain," Opt. Lett. 29, 1584-1586 (2004). https://doi.org/10.1364/OL.29.001584
- Y. Yang, B. Guan, and J. Li, "Image compression-encryption scheme based on fractional order hyperchaotic system combined with 2D compressed sensing and DNA encoding," Opt. Laser Technol. 119, 1056661 (2019).
- L.-Q. Huang, H. Liu, Z.-Y. Wang, and J.-H. Wang, "Self-adaptive image encryption algorithm combining chaotic map with DNA computing," J. Chin. Comput. Syst. 41, 1959-1965 (2020).
- L. Zhu, H. Song, X. Zhang, M. Yan, L. Zhang, and T. Yan, "A novel image encryption scheme based on nonuniform sampling in block compressive sensing," IEEE Access 7, 22161-22174 (2019). https://doi.org/10.1109/ACCESS.2019.2897721
- L. Zhang, Z. Pan, and G. Zhou, "Study on the key technology of optical encryption based on adaptive compressive ghost imaging for a large-sized object," J. Opt. Technol. 84, 471-476 (2017). https://doi.org/10.1364/JOT.84.000471
- O. Katz, Y. Bromberg, and Y. Silberberg, "Compressive ghost imaging," Appl. Phys. Lett. 95, 131110 (2009).
- S. Wang, X. Meng, Y. Yin, Y. Wang, X. Yang, X. Zhang, X. Peng, W. He, G. Dong, and H. Chen, "Optical image watermarking based on singular value decomposition ghost imaging and lifting wavelet transform," Opt. Lasers Eng. 114, 76-82 (2019). https://doi.org/10.1016/j.optlaseng.2018.10.014
- J.-Y. Wu, W.-L. Huang, M.-J. Zuo, and L.-H. Gong, "Optical watermark scheme based on singular value decomposition ghost imaging and particle swarm optimization algorithm," J. Mod. Opt. 67, 1059-1071 (2020). https://doi.org/10.1080/09500340.2020.1810346
- Y. Zhou, M. Yang, B. Zhou, Z. Xiao, and L. Sui, "An optical image watermarking method based on computational ghost imaging and multiple logistic maps," Appl. Phys. B 128, 134 (2022).
- C. Xu, D. Li, K. Guo, Z. Yin, and Z. Guo, "Computational ghost imaging with key-patterns for image encryption," Opt. Commun. 537, 129190 (2023).
- X. Wang, S. Lin, J. Xue, B. Xu, and J. Chen, "Information security scheme using deep learning assisted single-pixel imaging and orthogonal coding," Opt. Express 31, 2402-2413 (2023). https://doi.org/10.1364/OE.478148
- F. Wang, H. Wang, H. Wang, G. Li, and G. Situ, "Learning from simulation: An end-to-end deep-learning approach for computational ghost imaging," Opt. Express 27, 25560-25572 (2019). https://doi.org/10.1364/OE.27.025560
- H. Wu, R. Wang, G. Zhao, H. Xiao, D. Wang, J. Liang, X. Tian, L. Cheng, and X. Zhang, "Sub-Nyquist computational ghost imaging with deep learning," Opt. Express 28, 3846-3853 (2020). https://doi.org/10.1364/OE.386976
- T. Shimobaba, Y. Endo, T. Nishitsuji, T. Takahashi, Y. Nagahama, S. Hasegawa, M. Sano, R. Hirayama, T. Kakue, A. Shiraki, and T. Ito, "Computational ghost imaging using deep learning," Opt. Commun. 413, 147-151 (2018). https://doi.org/10.1016/j.optcom.2017.12.041
- S. Liu, X. Meng, Y. Yin, H. Wu, and W. Jiang, "Computational ghost imaging based on an untrained neural network," Opt. Lasers Eng. 147, 106744 (2021).
- S. Lin, X. Wang, A. Zhu, J. Xue, and B. Xu, "Steganographic optical image encryption based on single-pixel imaging and an untrained neural network," Opt. Express 30, 36144-36154 (2022). https://doi.org/10.1364/OE.467708
- A. Zhu, S. Lin, and X. Wang, "Optical color ghost cryptography and steganography based on multi-discriminator generative adversarial network," Opt. Commun. 512, 128032 (2022).
- S. Baluja, "Hiding images in plain sight: Deep steganography," Adv. Neural Inf. Process. Syst. 30, 2066-2076 (2017).
- S. Chen and D. Donoho, "Basis pursuit," in Proc. 1994 28th Asilomar Conference on Signals, Systems and Computers (Pacific Grove, CA, USA, Oct. 31-Nov. 2, 1994), pp. 41-44.
- H.-C. Liu and W. Chen, "Optical ghost cryptography and steganography," Opt. Lasers Eng. 130, 106094 (2020).
- J. Xu, X. Mao, X. Jin, A. Jaffer, S. Lu, L. Li, and M. Toyoura, "Hidden message in a deformation-based texture," Vis. Comput. Int. J. Comput. Graph. 31,1653-1669 (2015).
- K. Yi, Z. Leihong, Y. Hualong, Z. Mantong, S. Kanwal, and Z. Dawei, "Camouflaged optical encryption based on compressive ghost imaging," Opt. Lasers Eng. 134, 106154 (2020).
- A. ur Rehman, R. Rahim, S. Nadeem, and S. ul Hussain, "End-to-end trained CNN encoder-decoder networks for image steganography," arXiv:1711.07201 (2017).