Browse > Article
http://dx.doi.org/10.3807/COPP.2018.2.4.315

Research on Multiple-image Encryption Scheme Based on Fourier Transform and Ghost Imaging Algorithm  

Zhang, Leihong (University of Shanghai for Science and Technology)
Yuan, Xiao (University of Shanghai for Science and Technology)
Zhang, Dawei (University of Shanghai for Science and Technology)
Chen, Jian (Anhui Province Key Laboratory of Nondestructive Evaluation)
Publication Information
Current Optics and Photonics / v.2, no.4, 2018 , pp. 315-323 More about this Journal
Abstract
A new multiple-image encryption scheme that is based on a compressive ghost imaging concept along with a Fourier transform sampling principle has been proposed. This further improves the security of the scheme. The scheme adopts a Fourier transform to sample the original multiple-image information respectively, utilizing the centrosymmetric conjugation property of the spatial spectrum of the images to obtain each Fourier coefficient in the most abundant spatial frequency band. Based on this sampling principle, the multiple images to be encrypted are grouped into a combined image, and then the compressive ghost imaging algorithm is used to improve the security, which reduces the amount of information transmission and improves the information transmission rate. Due to the presence of the compressive sensing algorithm, the scheme improves the accuracy of image reconstruction.
Keywords
Fourier transform; Compressive sensing; Ghost imaging; Multiple-image Encryption;
Citations & Related Records
연도 인용수 순위
  • Reference
1 J. J. Wu, Z. W. Xie, Z. J. Liu, W. Liu, Y. Zhang, and S. T. Liu, "Multipleimage encryption based on computational ghost imaging," Opt. Commun. 359, 38-43 (2016).   DOI
2 I.-H. Lee and M. Cho, "Double random phase encryption using orthogonal encoding for multipleimage transmission," J. Opt. Soc. Korea 18, 201-206 (2014).   DOI
3 X. Li, X. Meng, X. Yang, Y. Yin, Y. Wang, X. Peng, W. He, G. Dong, and H. Chen, "Multiple-image encryption based on compressive ghost imaging and coordinate sampling," IEEE Photon. J. 8, 900511 (2016).
4 J. Wu, Z. Xie, Z. Liu, W. Liu, Y. Zhang, and S. Liu, "Multiple-image encryption based on computational ghost imaging," Opt. Commun. 359, 38-43 (2016).   DOI
5 S. Yuan, X. Liu, X. Zhou, and Z. Li, "Multiple-image encryption scheme with a single-pixel detector," J. Mod. Opt. 63, 1457-1465 (2016).   DOI
6 W. Chen and X. Chen, "Ghost imaging for three-dimensional optical security," Appl. Phys. Lett. 103, 221106 (2013).   DOI
7 Z. Liu, C. Shen, J. Tan, and S. Liu, "A recovery method of double random phase encoding system with a parallel phase retrieval," IEEE Photon. J. 8, 7801807 (2016).
8 I.-H. Lee and M. Cho, "Optical encryption and information authentication of 3D objects considering wireless channel characteristics," J. Opt. Soc. Korea 17, 494-499 (2013).   DOI
9 M. Cho and B. Javidi, "Three-dimensional photon counting double random phase encryption," Opt. Lett. 38, 3198-3201 (2013).   DOI
10 I.-H. Lee and M. Cho, "Double random phase encryption based orthogonal encoding technique for color images," J. Opt. Soc. Korea 18, 129-133 (2014).   DOI
11 D. N. Klyshko, "Combine EPR and two-slit experiments: Interference of advanced waves," Phys. Lett. A 132, 199-304 (1999).
12 M. Tanha, S. Ahmadi-Kandjani, R. Kheradmand, and H. Ghanbari, "Computational fluorescence ghost imaging," Eur. Phys. J. D 67, 44 (2013).
13 O. Katz, Y. Bromberg, and Y. Silberberg, "Compressive ghost imaging," Appl. Phys. Lett. 95, 131110-131113 (2009).   DOI
14 S. Yuan, J. Yao, X. Liu, X. Zhou, and Z. Li, "Cryptanalysis and security enhancement of optical cryptography based on computational ghost imaging," Opt. Commun. 365, 180-185 (2016).   DOI
15 V. Katkovnik and J. Astola, "Compressive sensing computational ghost imaging," J. Opt. Soc. Korea A 29, 1556-1567 (2012).   DOI
16 J. H. Shapiro and R. W. Boyd, "The physics of ghost imaging," Quantum. Inf. Process. 11, 949-993 (2012).   DOI
17 J. Garnier, "Ghost imaging in the random paraxial regime," Inverse Probl. Imaging 10, 409-432 (2017).
18 Y Wang and Y Liu, "High speed computational ghost imaging via spatial sweeping," Sci Rep. 7, 45325 (2017).   DOI
19 P. Refregier and B. Javidi, "Optical-image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995).   DOI
20 Y. Frauel, A. Castro, T. Naughton, and B. Javidi, "Resistance of the double random phase encryption against various attacks," Opt. Express 15, 10253-10265 (2007).   DOI