Optical multilevel authentication based on singular value decomposition ghost imaging and secret sharing cryptography

Abstract An optical multilevel authentication method is proposed that is based on the singular value decomposition ghost imaging (SVDGI) and (t, n) threshold secret sharing scheme. SVDGI provides an efficient reconstruction method in ghost imaging (GI) by modifying the measurement matrix with the help of singular value decomposition, which enables the reconstruction of an N-pixel image utilizing much less than N measurements with less time and a higher quality. On the other hand, the (t, n) threshold secret sharing algorithm guarantees the multilevel authentication system, in which, the modified measurement matrix is grouped into n parts as n keys and distributed to n different participants, any t (t ≤ n) or more of authorized participants with their correct keys can be collected to restore the original meaningful certification image, which is so called the high-level authentication; While in the case of low-level authentication, any t - 1 or fewer will gain no exact information of the certification image, but a remarkable peak output can be acquired in the 3D distribution of the nonlinear correlation coefficient of the standard certification image and the recovered image. So that the method successfully provides a multilevel authentication. Both numerical simulations and optical experiments validate the feasibility of the proposed method.

[1]  A. Gatti,et al.  Experimental evidence of high-resolution ghost imaging and ghost diffraction with classical thermal light , 2004, quant-ph/0408021.

[2]  Chi Zhang,et al.  Object reconstitution using pseudo-inverse for ghost imaging. , 2014, Optics express.

[3]  A. Gatti,et al.  Differential ghost imaging. , 2010, Physical review letters.

[4]  Shih,et al.  Observation of two-photon "ghost" interference and diffraction. , 1995, Physical review letters.

[5]  Y. Shih Quantum Imaging , 2007, IEEE Journal of Selected Topics in Quantum Electronics.

[6]  Ching-Nung Yang,et al.  Steganography and authentication in image sharing without parity bits , 2012 .

[7]  Enrico Brambilla,et al.  Correlated imaging, quantum and classical , 2004 .

[8]  Giuseppe Schirripa Spagnolo,et al.  Content fragile watermarking based on a computer generated hologram coding technique , 2005 .

[9]  Zhang Leihong,et al.  High-performance compression and double cryptography based on compressive ghost imaging with the fast Fourier transform , 2016 .

[10]  Lu-Zhong Cai,et al.  Information security system by iterative multiple-phase retrieval and pixel random permutation. , 2006, Applied optics.

[11]  Wenlin Gong High-resolution pseudo-inverse ghost imaging , 2015 .

[12]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[13]  Qionghai Dai,et al.  Multispectral imaging using a single bucket detector , 2015, Scientific Reports.

[14]  Wenqi He,et al.  Optical information encoding and image watermarking scheme based on phase-shifting interferometry and singular value decomposition , 2013 .

[15]  Naveen K. Nishchal,et al.  Image encryption and authentication verification using fractional nonconventional joint transform correlator , 2012 .

[16]  Ja-Chen Lin,et al.  Secret image sharing , 2002, Comput. Graph..

[17]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[18]  Jesús Lancis,et al.  Optical encryption based on computational ghost imaging. , 2010, Optics letters.

[19]  Xiang Peng,et al.  Singular value decomposition ghost imaging. , 2018, Optics express.

[20]  John T. Sheridan,et al.  A review of optical image encryption techniques , 2014 .

[21]  Bahram Javidi,et al.  Advances in optical security systems , 2014 .

[22]  Wen Chen,et al.  Object authentication in computational ghost imaging with the realizations less than 5% of Nyquist limit. , 2013, Optics letters.

[23]  Bahram Javidi,et al.  Guest Editorial: Special Section on Optical Pattern Recognition , 1994 .

[24]  Qionghai Dai,et al.  High Speed Computational Ghost Imaging via Spatial Sweeping , 2017, Scientific Reports.

[25]  Linfei Chen,et al.  Image encryption based on singular value decomposition and Arnold transform in fractional domain , 2013 .

[26]  Min-Shian Hwang,et al.  A new approach to the secret image sharing with steganography and authentication , 2009 .

[27]  Osamu Matoba,et al.  Optical Techniques for Information Security , 2009, Proceedings of the IEEE.

[28]  Jinli Suo,et al.  Gerchberg-Saxton-like ghost imaging. , 2015, Optics express.

[29]  Jeffrey H. Shapiro,et al.  Computational ghost imaging , 2008, 2009 Conference on Lasers and Electro-Optics and 2009 Conference on Quantum electronics and Laser Science Conference.

[30]  Chih-Chin Lai,et al.  An improved SVD-based watermarking scheme using human visual characteristics , 2011 .

[31]  Chang-Chou Lin,et al.  Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..

[32]  Lina Zhou,et al.  Secured single-pixel ghost holography , 2020 .

[33]  Wen Chen,et al.  Ghost imaging for three-dimensional optical security , 2013 .

[34]  Zhenfu Cao,et al.  Survey of information security , 2007, Science in China Series F: Information Sciences.

[35]  Wen Chen,et al.  Ghost imaging using labyrinth-like phase modulation patterns for high-efficiency and high-security optical encryption , 2015 .

[36]  Naveen K. Nishchal,et al.  Flexible optical encryption with multiple users and multiple security levels , 2011 .

[37]  Graham M. Gibson,et al.  Simultaneous real-time visible and infrared video with single-pixel detectors , 2015, Scientific Reports.

[38]  William Puech,et al.  Application of Homomorphism to Secure Image Sharing , 2011 .

[39]  Joseph L. Horner Optical Pattern Recognition , 2016 .

[40]  Wenlin Gong,et al.  A method to improve the visibility of ghost images obtained by thermal light , 2010 .

[41]  Graham M Gibson,et al.  Improving the signal-to-noise ratio of single-pixel imaging using digital microscanning. , 2016, Optics express.

[42]  Naveen K. Nishchal,et al.  Optical asymmetric cryptosystem based on photon counting and phase-truncated Fresnel transforms , 2017 .

[43]  Zhongyang Li,et al.  Cryptanalysis and security enhancement of optical cryptography based on computational ghost imaging , 2016 .

[44]  X C Cheng,et al.  Security enhancement of double-random phase encryption by amplitude modulation. , 2008, Optics letters.

[45]  Wenqi He,et al.  Multilevel image authentication using shared secret threshold and phase retrieval , 2014 .

[46]  Shih,et al.  Optical imaging by means of two-photon quantum entanglement. , 1995, Physical review. A, Atomic, molecular, and optical physics.

[47]  Bahram Javidi,et al.  Optical encryption using a joint transform correlator architecture , 2000 .

[48]  A. Gatti,et al.  Correlated imaging, quantum and classical , 2003, quant-ph/0307187.

[49]  Wen Chen Optical cryptosystem based on single-pixel encoding using the modified Gerchberg-Saxton algorithm with a cascaded structure. , 2016, Journal of the Optical Society of America. A, Optics, image science, and vision.

[50]  M. Padgett,et al.  3D Computational Imaging with Single-Pixel Detectors , 2013, Science.

[51]  Bahram Javidi,et al.  Roadmap on optical security , 2016 .

[52]  Wen Chen Modulating Phase via Rotation for Optical Encoding Based on Correlated Photon Imaging , 2016, IEEE Photonics Technology Letters.

[53]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[54]  B Javidi,et al.  Securing information by use of digital holography. , 2000, Optics letters.

[55]  Bahram Javidi,et al.  Watermarking of three-dimensional objects by digital holography. , 2003, Optics letters.

[56]  Wenqi He,et al.  Optical identity authentication scheme based on elliptic curve digital signature algorithm and phase retrieval algorithm. , 2013, Applied optics.

[57]  A. Stern,et al.  Phase-Modulated Optical System With Sparse Representation for Information Encoding and Authentication , 2013, IEEE Photonics Journal.

[58]  Yanhua Shih,et al.  Quantum imaging , 2007, 2007 Conference on Lasers and Electro-Optics - Pacific Rim.

[59]  José A. Rodrigo,et al.  Applications of gyrator transform for image processing , 2007 .

[60]  Guohai Situ,et al.  Deep-learning-based ghost imaging , 2017, Scientific Reports.

[61]  X. F. Meng,et al.  Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain , 2007 .