Research on Camouflaged Encryption Scheme Based on Hadamard Matrix and Ghost Imaging Algorithm |
Leihong, Zhang
(College of Communication and Art Design, University of Shanghai for Science and Technology)
Yang, Wang (College of Communication and Art Design, University of Shanghai for Science and Technology) Hualong, Ye (School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology) Runchu, Xu (College of Communication and Art Design, University of Shanghai for Science and Technology) Dawei, Zhang (School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology) |
1 | L. Zhang, Y. Wang, H. Ye, R. Xu, Y. Kang, Z. Zhang, D. Zhang, and K. Wang, "Camouflaged encryption mechanism based on sparse decomposition of principal component orthogonal basis and ghost imaging," Opt. Eng. 60, 013110 (2021). |
2 | O. Matoba, T. Nomura, E. Perez-Cabre, M. S. Millan, and B. Javidi, "Optical techniques for information security," Proc. IEEE 97, 1128-1148 (2009). DOI |
3 | S. Liua, C. Guo, and J. T. Sheridan, "A review of optical image encryption techniques," Opt. Laser Technol. 57, 327-342 (2014). DOI |
4 | P. Refregier and B. Javidi, "Optical image encryption using input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995). DOI |
5 | V. Namias, "The fractional order Fourier transform and its application to quantum mechanics," IMA J. Appl. Math. 25, 241-265 (1980). DOI |
6 | S. K. Rajput and N. K. Nishchal, "Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform," Appl. Opt. 52, 871-878 (2013). DOI |
7 | X. Zenggang, T. Zhiwen, C. Xiaowen, Z. Xue-min, Z. Kaibin, and Y. Conghuan, "Research on image retrieval algorithm based on combination of color and shape features," J. Signal Process. Syst. 93, 139-146 (2021). DOI |
8 | B. Wang and L. L. Chen, "New results on fuzzy synchronization for a kind of disturbed memristive chaotic system," Complexity 2018, 3079108, (2018). |
9 | W. K. Pratt, J. Kane, and H. C. Andrews, "Hadamard transform image coding," Proc. IEEE 57, 58-68 (1969). DOI |
10 | K. Yi, Z. Leihong, Y. Hualong, Z. Mantong, S. Kanwal, and Z. Dawei, "Camouflaged optical encryption based on compressive ghost imaging," Opt. Lasers Eng. 134, 106154 (2020). DOI |
11 | Z. Liu, C. Guo, J. Tan, W. Liu, J. Wu, Q. Wu, L. Pan, and S. Liu, "Securing color image by using phase-only encoding in Fresnel domains," Opt. Lasers Eng. 68, 87-92 (2015). DOI |
12 | G. Situ and J. Zhang, "Double random-phase encoding in the Fresnel domain." Opt. Lett. 29, 1584-1586 (2004). DOI |
13 | S. Liu, L. Yu, and B. Zhu, "Optical image encryption by cascaded fractional Fourier transforms with random phase filtering," Opt. Commun. 187, 57-63 (2001). DOI |
14 | S. Dafu, Z. Wenjie, and Z. Leihong, "Research on a big data information optical double encryption algorithm based on compressive ghost imaging," Laser Phys. Lett. 16, 085201 (2019). DOI |
15 | P. Clemente, V. Duran, V. Torres-Company, E. Tajahuerce, and J. Lancis, "Optical encryption based on computational ghost imaging," Opt. Lett. 35, 2391-2393 (2010). DOI |
16 | M. Tanha, R. Kheradmand, and S. Ahmadi-Kandjani, "Grayscale and color optical encryption based on computational ghost imaging," Appl. Phys. Lett. 101, 101108 (2012). DOI |
17 | K. Yi, Z. Leihong, and Z. Dawei, "Optical encryption based on ghost imaging and public key cryptography," Opt. Lasers Eng. 111, 58-64 (2018). DOI |
18 | K. Shibuya, K. Nakae, Y. Mizutani, and T. Iwata, "Comparison of reconstructed images between ghost imaging and Hadamard transform imaging," Opt. Rev. 22, 897-902 (2015). DOI |
19 | H. Wu, G. Zhao, R. Wang, H. Xiao, D. Wang, J. Liang, L. Cheng, and R. Liang, "Computational ghost imaging system with 4-connected-region-optimized Hadamard pattern sequence," Opt. Lasers Eng. 132, 106105 (2020). DOI |
20 | A. Alfalou and C. Brosseau, "Optical image compression and encryption methods," Adv. Opt. Photonics 1, 589-636 (2009). DOI |
21 | J.-J. Huang, H.-E. Hwang, C.-Y. Chen, and C.-M. Chen, "Optical multiple-image encryption based on phase encoding algorithm in the Fresnel transform domain," Opt. Laser Technol. 44, 2238-2244 (2012). DOI |
22 | L. Sui, K. Duan, J. Liang, and X. Hei, "Asymmetric double-image encryption based on cascaded discrete fractional random transform and logistic maps," Opt. Express 22, 10605-10621 (2014). DOI |
23 | L. Wang and S. Zhao, "Fast reconstructed and high-quality ghost imaging with fast Walsh-Hadamard transform," Photonics Res. 4, 240-244 (2016). DOI |
24 | Z. Liu, M. A. Ahmad, and S. Liu, "Image encryption based on double random amplitude coding in random Hartley transform domain," Optik 121, 959-964 (2010). DOI |
25 | S. Liansheng, C. Yin, L. Bing, T. Ailing, and A. K. Asundi, "Optical image encryption via high-quality computational ghost imaging using iterative phase retrieval," Laser Phys. Lett. 15, 075204 (2018). DOI |
26 | C. Zhang, W. He, B. Han, M. Liao, D. Lu, X. Peng, and C. Xu, "Compressive optical steganography via single-pixel imaging," Opt. Express 27, 13469-13478 (2019). DOI |
27 | J. Zhang and C. Shen, "Set-based obfuscation for strong PUFs against machine learning attacks," IEEE Trans. Circuits Sys. I: Regul. Pap. 68, 288-300 (2021). DOI |
28 | Y. Chen, W. Zheng, W. Li, and Y. Huang, "Large group activity security risk assessment and risk early warning based on random forest algorithm," Pattern Recognit. Lett. 144, 1-5 (2021). DOI |
29 | C. Mi, L. Cao, Z. Zhang, Y. Feng, L. Yao, and Y. Wu, "A port container code recognition algorithm under natural conditions," J. Coast. Res. 103, 822-829 (2020). DOI |
30 | B. Wang, F. C. Zou, J. Cheng, and S. M. Zhong, "Fault detection filter design for continuous-time nonlinear Markovian jump systems with mode-dependent delay and time-varying transition probabilities," Adv. Differ. Equ. 2017, 262 (2017). DOI |
31 | B.-H. Li, Y. Liu, A.-M. Zhang, W.-H. Wang, and S. Wan, "A survey on blocking technology of entity resolution," J. Comput. Sci. Technol. 35, 769-793 (2020). DOI |
32 | W. K. Yu, "Super sub-Nyquist single-pixel imaging by means of cake-cutting Hadamard basis sort," Sensors 19, 4122 (2019). DOI |
33 | J. Shi, Y. Lu, and J. Zhang, "Approximation attacks on strong PUFs," IEEE Trans. Comput. -Aided Des. Integr. Circuits Syst. 39, 2138-2151 (2020). DOI |
34 | C. Zuo, Q. Chen, L. Tian, L. Waller, and A. Asundi, "Transport of intensity phase retrieval and computational imaging for partially coherent fields: the phase space perspective," Opt. Lasers Eng. 71, 20-32 (2015). DOI |
35 | Y. Mizutani, K. Shibuya, H. Taguchi, T. Iwata, Y. Takaya, and T. Yasui, "Single-pixel imaging by Hadamard transform and its application for hyperspectral imaging," Proc. SPIE 10021, 100210B (2016). |