DOI QR코드

DOI QR Code

Research on Equal-resolution Image Hiding Encryption Based on Image Steganography and Computational Ghost Imaging

  • Leihong Zhang (School of Optical-electrical and Computer Engineering, University of Shanghai for Science and Technology) ;
  • Yiqiang Zhang (School of Optical-electrical and Computer Engineering, University of Shanghai for Science and Technology) ;
  • Runchu Xu (School of Optical-electrical and Computer Engineering, University of Shanghai for Science and Technology) ;
  • Yangjun Li (School of Optical-electrical and Computer Engineering, University of Shanghai for Science and Technology) ;
  • Dawei Zhang (School of Optical-electrical and Computer Engineering, University of Shanghai for Science and Technology)
  • 투고 : 2023.12.27
  • 심사 : 2024.04.30
  • 발행 : 2024.06.25

초록

Information-hiding technology is introduced into an optical ghost imaging encryption scheme, which can greatly improve the security of the encryption scheme. However, in the current mainstream research on camouflage ghost imaging encryption, information hiding techniques such as digital watermarking can only hide 1/4 resolution information of a cover image, and most secret images are simple binary images. In this paper, we propose an equal-resolution image-hiding encryption scheme based on deep learning and computational ghost imaging. With the equal-resolution image steganography network based on deep learning (ERIS-Net), we can realize the hiding and extraction of equal-resolution natural images and increase the amount of encrypted information from 25% to 100% when transmitting the same size of secret data. To the best of our knowledge, this paper combines image steganography based on deep learning with optical ghost imaging encryption method for the first time. With deep learning experiments and simulation, the feasibility, security, robustness, and high encryption capacity of this scheme are verified, and a new idea for optical ghost imaging encryption is proposed.

키워드

과제정보

The authors thank the National Natural Science Foundation of China, Shanghai Industrial Collaborative Innovation Project and the development fund for Shanghai talents for help identifying collaborators for this work.

참고문헌

  1. O. Matoba, T. Nomura, E. Perez-Cabre, M. S. Millan, and B. Javidi. "Optical techniques for information security," Proc. IEEE 97, 1128-1148 (2009). https://doi.org/10.1109/JPROC.2009.2018367
  2. D. Xiao, X. Li, S.-J. Liu, and Q.-H. Wang, "Encryption and display of multiple-image information using computer-generated holography with modified GS iterative algorithm," Opt. Commun. 410, 488-495 (2018). https://doi.org/10.1016/j.optcom.2017.09.087
  3. Y. Kang, L. Zhang, H. Ye, M. Zhao, S. Kanwal, C. Bai, and D. Zhang, "One-to-many optical information encryption transmission method based on temporal ghost imaging and code division multiple access," Photonics Res. 7, 1370-1380 (2019). https://doi.org/10.1364/PRJ.7.001370
  4. W. Qin and X. Peng, "Asymmetric cryptosystem based on phase-truncated Fourier transforms," Opt. Express 35, 118-120 (2010).
  5. X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, "Security enhancement of double random phase encryption by amplitude modulation," Opt. Lett. 33, 1575-1577 (2008). https://doi.org/10.1364/OL.33.001575
  6. P. Kumar, A. Kumar, J. Joseph, and K. Singh, "Impulse attack free double-random-phase encryption scheme with randomized lens-phase functions," Opt. Lett. 34, 331-333 (2009). https://doi.org/10.1364/OL.34.000331
  7. P. Kumar, J. Joseph, and K. Singh, "Impulse attack-free four random phase mask encryption based on a 4-f optical system," Appl. Opt. 48, 2356-2363 (2009). https://doi.org/10.1364/AO.48.002356
  8. G. Situ and J. Zhang, "Double random-phase encoding in the Fresnel domain," Opt. Lett. 29, 1584-1586 (2004). https://doi.org/10.1364/OL.29.001584
  9. Y. Yang, B. Guan, and J. Li, "Image compression-encryption scheme based on fractional order hyperchaotic system combined with 2D compressed sensing and DNA encoding," Opt. Laser Technol. 119, 1056661 (2019).
  10. L.-Q. Huang, H. Liu, Z.-Y. Wang, and J.-H. Wang, "Self-adaptive image encryption algorithm combining chaotic map with DNA computing," J. Chin. Comput. Syst. 41, 1959-1965 (2020).
  11. L. Zhu, H. Song, X. Zhang, M. Yan, L. Zhang, and T. Yan, "A novel image encryption scheme based on nonuniform sampling in block compressive sensing," IEEE Access 7, 22161-22174 (2019). https://doi.org/10.1109/ACCESS.2019.2897721
  12. L. Zhang, Z. Pan, and G. Zhou, "Study on the key technology of optical encryption based on adaptive compressive ghost imaging for a large-sized object," J. Opt. Technol. 84, 471-476 (2017). https://doi.org/10.1364/JOT.84.000471
  13. O. Katz, Y. Bromberg, and Y. Silberberg, "Compressive ghost imaging," Appl. Phys. Lett. 95, 131110 (2009).
  14. S. Wang, X. Meng, Y. Yin, Y. Wang, X. Yang, X. Zhang, X. Peng, W. He, G. Dong, and H. Chen, "Optical image watermarking based on singular value decomposition ghost imaging and lifting wavelet transform," Opt. Lasers Eng. 114, 76-82 (2019). https://doi.org/10.1016/j.optlaseng.2018.10.014
  15. J.-Y. Wu, W.-L. Huang, M.-J. Zuo, and L.-H. Gong, "Optical watermark scheme based on singular value decomposition ghost imaging and particle swarm optimization algorithm," J. Mod. Opt. 67, 1059-1071 (2020). https://doi.org/10.1080/09500340.2020.1810346
  16. Y. Zhou, M. Yang, B. Zhou, Z. Xiao, and L. Sui, "An optical image watermarking method based on computational ghost imaging and multiple logistic maps," Appl. Phys. B 128, 134 (2022).
  17. C. Xu, D. Li, K. Guo, Z. Yin, and Z. Guo, "Computational ghost imaging with key-patterns for image encryption," Opt. Commun. 537, 129190 (2023).
  18. X. Wang, S. Lin, J. Xue, B. Xu, and J. Chen, "Information security scheme using deep learning assisted single-pixel imaging and orthogonal coding," Opt. Express 31, 2402-2413 (2023). https://doi.org/10.1364/OE.478148
  19. F. Wang, H. Wang, H. Wang, G. Li, and G. Situ, "Learning from simulation: An end-to-end deep-learning approach for computational ghost imaging," Opt. Express 27, 25560-25572 (2019). https://doi.org/10.1364/OE.27.025560
  20. H. Wu, R. Wang, G. Zhao, H. Xiao, D. Wang, J. Liang, X. Tian, L. Cheng, and X. Zhang, "Sub-Nyquist computational ghost imaging with deep learning," Opt. Express 28, 3846-3853 (2020). https://doi.org/10.1364/OE.386976
  21. T. Shimobaba, Y. Endo, T. Nishitsuji, T. Takahashi, Y. Nagahama, S. Hasegawa, M. Sano, R. Hirayama, T. Kakue, A. Shiraki, and T. Ito, "Computational ghost imaging using deep learning," Opt. Commun. 413, 147-151 (2018). https://doi.org/10.1016/j.optcom.2017.12.041
  22. S. Liu, X. Meng, Y. Yin, H. Wu, and W. Jiang, "Computational ghost imaging based on an untrained neural network," Opt. Lasers Eng. 147, 106744 (2021).
  23. S. Lin, X. Wang, A. Zhu, J. Xue, and B. Xu, "Steganographic optical image encryption based on single-pixel imaging and an untrained neural network," Opt. Express 30, 36144-36154 (2022). https://doi.org/10.1364/OE.467708
  24. A. Zhu, S. Lin, and X. Wang, "Optical color ghost cryptography and steganography based on multi-discriminator generative adversarial network," Opt. Commun. 512, 128032 (2022).
  25. S. Baluja, "Hiding images in plain sight: Deep steganography," Adv. Neural Inf. Process. Syst. 30, 2066-2076 (2017).
  26. S. Chen and D. Donoho, "Basis pursuit," in Proc. 1994 28th Asilomar Conference on Signals, Systems and Computers (Pacific Grove, CA, USA, Oct. 31-Nov. 2, 1994), pp. 41-44.
  27. H.-C. Liu and W. Chen, "Optical ghost cryptography and steganography," Opt. Lasers Eng. 130, 106094 (2020).
  28. J. Xu, X. Mao, X. Jin, A. Jaffer, S. Lu, L. Li, and M. Toyoura, "Hidden message in a deformation-based texture," Vis. Comput. Int. J. Comput. Graph. 31,1653-1669 (2015).
  29. K. Yi, Z. Leihong, Y. Hualong, Z. Mantong, S. Kanwal, and Z. Dawei, "Camouflaged optical encryption based on compressive ghost imaging," Opt. Lasers Eng. 134, 106154 (2020).
  30. A. ur Rehman, R. Rahim, S. Nadeem, and S. ul Hussain, "End-to-end trained CNN encoder-decoder networks for image steganography," arXiv:1711.07201 (2017).