Secret shared multiple-image encryption based on row scanning compressive ghost imaging and phase retrieval in the Fresnel domain

Abstract A multiple-image encryption method is proposed that is based on row scanning compressive ghost imaging, (t, n) threshold secret sharing, and phase retrieval in the Fresnel domain. In the encryption process, after wavelet transform and Arnold transform of the target image, the ciphertext matrix can be first detected using a bucket detector. Based on a (t, n) threshold secret sharing algorithm, the measurement key used in the row scanning compressive ghost imaging can be decomposed and shared into two pairs of sub-keys, which are then reconstructed using two phase-only mask (POM) keys with fixed pixel values, placed in the input plane and transform plane 2 of the phase retrieval scheme, respectively; and the other POM key in the transform plane 1 can be generated and updated by the iterative encoding of each plaintext image. In each iteration, the target image acts as the input amplitude constraint in the input plane. During decryption, each plaintext image possessing all the correct keys can be successfully decrypted by measurement key regeneration, compression algorithm reconstruction, inverse wavelet transformation, and Fresnel transformation. Theoretical analysis and numerical simulations both verify the feasibility of the proposed method.

[1]  Shih,et al.  Optical imaging by means of two-photon quantum entanglement. , 1995, Physical review. A, Atomic, molecular, and optical physics.

[2]  Wen Chen,et al.  Optical Multiple-Image Encryption Using Three-Dimensional Space , 2016, IEEE Photonics Journal.

[3]  M. Biyajima A possible modification of the Koonin formula of two-proton interferometry including an effect of two-proton clusters with a short range correlation , 1983 .

[4]  Thong T. Do,et al.  Sparsity adaptive matching pursuit algorithm for practical compressed sensing , 2008, 2008 42nd Asilomar Conference on Signals, Systems and Computers.

[5]  Jingjuan Zhang,et al.  Position multiplexing for multiple-image encryption , 2006 .

[6]  Lu-Zhong Cai,et al.  Information security system by iterative multiple-phase retrieval and pixel random permutation. , 2006, Applied optics.

[7]  N. E. Day Linear and quadratic discrimination in pattern recognition (Corresp.) , 1969, IEEE Trans. Inf. Theory.

[8]  L Z Cai,et al.  Two-step phase-shifting interferometry and its application in image encryption. , 2006, Optics letters.

[9]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[10]  Qu Wang,et al.  Multiple-image encryption based on interference principle and phase-only mask multiplexing in Fresnel transform domain. , 2013, Applied optics.

[11]  Ting Sun,et al.  Single-pixel imaging via compressive sampling , 2008, IEEE Signal Process. Mag..

[12]  Wen Chen Modulating Phase via Rotation for Optical Encoding Based on Correlated Photon Imaging , 2016, IEEE Photonics Technology Letters.

[13]  A. Alfalou,et al.  Exploiting root-mean-square time-frequency structure for multiple-image optical compression and encryption. , 2010, Optics letters.

[14]  Yuan Zhao,et al.  Heterodyne 3D ghost imaging , 2016 .

[15]  Kwok-Wo Wong,et al.  Embedding cryptographic features in compressive sensing , 2014, Neurocomputing.

[16]  Jiantao Zhou,et al.  A Review of Compressive Sensing in Information Security Field , 2016, IEEE Access.

[17]  Yan Zhang,et al.  Multiple-image encryption based on computational ghost imaging , 2016 .

[18]  Jingjuan Zhang,et al.  Multiple-image encryption by wavelength multiplexing. , 2005, Optics letters.

[19]  B. Javidi,et al.  Encrypting three-dimensional information with digital holography. , 2000, Applied optics.

[20]  A. Gatti,et al.  Ghost imaging with thermal light: comparing entanglement and classical correlation. , 2004, Physical review letters.

[21]  Xudong Chen,et al.  Optical authentication via photon-synthesized ghost imaging using optical nonlinear correlation , 2015 .

[22]  Xiang Peng,et al.  Multiple-Image Encryption Based on Compressive Ghost Imaging and Coordinate Sampling , 2016, IEEE Photonics Journal.

[23]  Bo Wang,et al.  Optical image encryption based on interference. , 2008, Optics letters.

[24]  Li-Hua Gong,et al.  Novel optical image encryption scheme based on fractional Mellin transform , 2011 .

[25]  S Liu,et al.  Optical image encryption with multistage and multichannel fractional Fourier-domain filtering. , 2001, Optics letters.

[26]  Wen Chen Optical cryptosystem based on single-pixel encoding using the modified Gerchberg-Saxton algorithm with a cascaded structure. , 2016, Journal of the Optical Society of America. A, Optics, image science, and vision.

[27]  O. Katz,et al.  Compressive ghost imaging , 2009, 0905.0321.

[28]  D. Donoho,et al.  Atomic Decomposition by Basis Pursuit , 2001 .

[29]  V. Torres-Company,et al.  Optical encryption with compressive ghost imaging , 2011, 2011 Conference on Lasers and Electro-Optics Europe and 12th European Quantum Electronics Conference (CLEO EUROPE/EQEC).

[30]  X. F. Meng,et al.  Hierarchical image encryption based on cascaded iterative phase retrieval algorithm in the Fresnel domain , 2007 .

[31]  D. Klyshko Combine EPR and two-slit experiments: Interference of advanced waves , 1988 .

[32]  Wenqi He,et al.  Optical identity authentication scheme based on elliptic curve digital signature algorithm and phase retrieval algorithm. , 2013, Applied optics.

[33]  Wen Chen,et al.  Correlated-Photon Secured Imaging by Iterative Phase Retrieval Using Axially-Varying Distances , 2016, IEEE Photonics Technology Letters.

[34]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[35]  Zhengjun Liu,et al.  Double image encryption by using iterative random binary encoding in gyrator domains. , 2010, Optics express.

[36]  O. Katz,et al.  Ghost imaging with a single detector , 2008, 0812.2633.

[37]  Myrian Tebaldi,et al.  Multiplexing encryption–decryption via lateral shifting of a random phase mask , 2006 .

[38]  Wen Chen,et al.  Marked ghost imaging , 2014 .

[39]  Joel A. Tropp,et al.  Signal Recovery From Random Measurements Via Orthogonal Matching Pursuit , 2007, IEEE Transactions on Information Theory.