Optical secure image verification system based on ghost imaging

Abstract The ghost imaging can perform Fourier-space filtering by tailoring the configuration. We proposed a novel optical secure image verification system based on this theory with the help of phase matched filtering. In the verification process, the system key and the ID card which contain the information of the correct image and the information to be verified are put in the reference and the test paths, respectively. We demonstrate that the ghost imaging configuration can perform an incoherent correlation between the system key and the ID card. The correct verification manifests itself with a correlation peak in the ghost image. The primary image and the image to be verified are encrypted and encoded into pure phase masks beforehand for security. Multi-image secure verifications can also be implemented in the proposed system.

[1]  Yan Zhang,et al.  Multiple-image encryption based on computational ghost imaging , 2016 .

[2]  A. Gatti,et al.  Differential ghost imaging. , 2010, Physical review letters.

[3]  Y. Shih,et al.  Two-photon "ghost" imaging with thermal light , 2004, 2005 Quantum Electronics and Laser Science Conference.

[4]  Myungjin Cho,et al.  Information authentication using photon-counting double-random-phase encrypted images. , 2011, Optics letters.

[5]  R. Boyd,et al.  "Two-Photon" coincidence imaging with a classical source. , 2002, Physical review letters.

[6]  Wen Chen,et al.  Grayscale object authentication based on ghost imaging using binary signals , 2015 .

[7]  Wen Chen,et al.  Ghost imaging for three-dimensional optical security , 2013 .

[8]  Jun Xiong,et al.  Lensless ghost imaging of a phase object with pseudo-thermal light , 2014 .

[9]  Wen Chen,et al.  Object authentication in computational ghost imaging with the realizations less than 5% of Nyquist limit. , 2013, Optics letters.

[10]  Jesús Lancis,et al.  Optical encryption based on computational ghost imaging. , 2010, Optics letters.

[11]  Jeffrey H. Shapiro,et al.  Computational ghost imaging , 2008, 2009 Conference on Lasers and Electro-Optics and 2009 Conference on Quantum electronics and Laser Science Conference.

[12]  Ling-Jun Kong,et al.  Encryption of ghost imaging , 2013 .

[13]  Xiang Peng,et al.  Asymmetric cryptosystem based on phase-truncated Fourier transforms. , 2010, Optics letters.

[14]  Tero Setälä,et al.  Ghost imaging of phase objects with classical incoherent light , 2011 .

[15]  Wei Liu,et al.  Correlated-imaging-based chosen plaintext attack on general cryptosystems composed of linear canonical transforms and phase encodings , 2015 .

[16]  Xudong Chen,et al.  Optical authentication via photon-synthesized ghost imaging using optical nonlinear correlation , 2015 .

[17]  Wei Liu,et al.  Secure optical verification using dual phase-only correlation , 2015 .

[18]  Hsuan T. Chang,et al.  Fully-phase asymmetric-image verification system based on joint transform correlator. , 2006, Optics express.

[19]  Wen Chen,et al.  Double random phase encoding using phase reservation and compression , 2014 .

[20]  Yangjian Cai,et al.  Ghost imaging with incoherent and partially coherent light radiation. , 2005, Physical review. E, Statistical, nonlinear, and soft matter physics.

[21]  Naveen K Nishchal,et al.  An optical encryption and authentication scheme using asymmetric keys. , 2014, Journal of the Optical Society of America. A, Optics, image science, and vision.

[22]  Shih,et al.  Optical imaging by means of two-photon quantum entanglement. , 1995, Physical review. A, Atomic, molecular, and optical physics.

[23]  O. Katz,et al.  Compressive ghost imaging , 2009, 0905.0321.

[24]  Wenlin Gong,et al.  Phase-retrieval ghost imaging of complex-valued objects , 2010 .

[25]  Reza Kheradmand,et al.  Gray-scale and color optical encryption based on computational ghost imaging , 2012 .