Multiple-image encryption via lifting wavelet transform and XOR operation based on compressive ghost imaging scheme

Abstract A multiple-image encryption method via lifting wavelet transform (LWT) and XOR operation is proposed, which is based on a row scanning compressive ghost imaging scheme. In the encryption process, the scrambling operation is implemented for the sparse images transformed by LWT, then the XOR operation is performed on the scrambled images, and the resulting XOR images are compressed in the row scanning compressive ghost imaging, through which the ciphertext images can be detected by bucket detector arrays. During decryption, the participant who possesses his/her correct key-group, can successfully reconstruct the corresponding plaintext image by measurement key regeneration, compression algorithm reconstruction, XOR operation, sparse images recovery, and inverse LWT (iLWT). Theoretical analysis and numerical simulations validate the feasibility of the proposed method.

[1]  Xudong Chen,et al.  Optical authentication via photon-synthesized ghost imaging using optical nonlinear correlation , 2015 .

[2]  Xiang Peng,et al.  Multiple-Image Encryption Based on Compressive Ghost Imaging and Coordinate Sampling , 2016, IEEE Photonics Journal.

[3]  Yan Zhang,et al.  Multiple-image encryption based on computational ghost imaging , 2016 .

[4]  Bo Wang,et al.  Optical image encryption based on interference. , 2008, Optics letters.

[5]  Y Li,et al.  Security and encryption optical systems based on a correlator with significant output images. , 2000, Applied optics.

[6]  J. Astola,et al.  Compressive sensing computational ghost imaging. , 2012, Journal of the Optical Society of America. A, Optics, image science, and vision.

[7]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[8]  Qu Wang,et al.  Multiple-image encryption based on interference principle and phase-only mask multiplexing in Fresnel transform domain. , 2013, Applied optics.

[9]  Jingjuan Zhang,et al.  Multiple-image encryption by wavelength multiplexing. , 2005, Optics letters.

[10]  V. Torres-Company,et al.  Optical encryption with compressive ghost imaging , 2011, 2011 Conference on Lasers and Electro-Optics Europe and 12th European Quantum Electronics Conference (CLEO EUROPE/EQEC).

[11]  Qiong Gong,et al.  Optical multiple-image encryption in diffractive-imaging-based scheme using spectral fusion and nonlinear operation. , 2016, Optics express.

[12]  Olgica Milenkovic,et al.  Subspace Pursuit for Compressive Sensing Signal Reconstruction , 2008, IEEE Transactions on Information Theory.

[13]  N. E. Day Linear and quadratic discrimination in pattern recognition (Corresp.) , 1969, IEEE Trans. Inf. Theory.

[14]  Jiantao Zhou,et al.  A Review of Compressive Sensing in Information Security Field , 2016, IEEE Access.

[15]  Chris Chatwin,et al.  Random phase encoding for optical security , 1996 .

[16]  B Deepan,et al.  Multiple-image encryption by space multiplexing based on compressive sensing and the double-random phase-encoding technique. , 2014, Applied optics.

[17]  Kwok-Wo Wong,et al.  Bi-level Protected Compressive Sampling , 2016, IEEE Transactions on Multimedia.

[18]  John T. Sheridan,et al.  Image encryption and the fractional Fourier transform , 2003 .

[19]  Lu-Zhong Cai,et al.  Information security system by iterative multiple-phase retrieval and pixel random permutation. , 2006, Applied optics.

[20]  Li Yu,et al.  Optical image encryption by cascaded fractional Fourier transforms with random phase filtering , 2001 .

[21]  Zhengjun Liu,et al.  Double image encryption by using iterative random binary encoding in gyrator domains. , 2010, Optics express.

[22]  Yiran Chen,et al.  A visually secure image encryption scheme based on compressive sensing , 2017, Signal Process..

[23]  O. Katz,et al.  Ghost imaging with a single detector , 2008, 0812.2633.

[24]  Li-Hua Gong,et al.  Novel optical image encryption scheme based on fractional Mellin transform , 2011 .

[25]  Thong T. Do,et al.  Sparsity adaptive matching pursuit algorithm for practical compressed sensing , 2008, 2008 42nd Asilomar Conference on Signals, Systems and Computers.

[26]  Jingjuan Zhang,et al.  Double random-phase encoding in the Fresnel domain. , 2004, Optics letters.

[27]  Linfei Chen,et al.  Optical color image encryption by wavelength multiplexing and lensless Fresnel transform holograms. , 2006, Optics express.

[28]  Joel A. Tropp,et al.  Signal Recovery From Random Measurements Via Orthogonal Matching Pursuit , 2007, IEEE Transactions on Information Theory.

[29]  Ling-An Wu,et al.  Adaptive compressive ghost imaging based on wavelet trees and sparse representation. , 2014, Optics express.

[30]  Wen Chen,et al.  Marked ghost imaging , 2014 .

[31]  Wen Chen,et al.  Optical Multiple-Image Encryption Using Three-Dimensional Space , 2016, IEEE Photonics Journal.

[32]  Jingjuan Zhang,et al.  Position multiplexing for multiple-image encryption , 2006 .

[33]  Bin Chen,et al.  A Block Compressive Sensing Based Scalable Encryption Framework for Protecting Significant Image Regions , 2016, Int. J. Bifurc. Chaos.

[34]  Leo Yu Zhang,et al.  On the Security of Optical Ciphers Under the Architecture of Compressed Sensing Combining With Double Random Phase Encoding , 2017, IEEE Photonics Journal.

[35]  Wenqi He,et al.  Optical identity authentication scheme based on elliptic curve digital signature algorithm and phase retrieval algorithm. , 2013, Applied optics.

[36]  Tian Ailing,et al.  Optical multiple-image encryption based on the chaotic structured phase masks under the illumination of a vortex beam in the gyrator domain. , 2016, Optics express.

[37]  Kwok-Wo Wong,et al.  Embedding cryptographic features in compressive sensing , 2014, Neurocomputing.

[38]  Bahram Javidi,et al.  Optical encryption using a joint transform correlator architecture , 2000 .

[39]  O. Katz,et al.  Compressive ghost imaging , 2009, 0905.0321.

[40]  Xudong Chen,et al.  Optical image encryption based on diffractive imaging. , 2010, Optics letters.

[41]  Le Wang,et al.  High performance optical encryption based on computational ghost imaging with QR code and compressive sensing technique , 2015 .

[42]  D. Klyshko Two-photon light: influence of filtration and a new possible EPR experiment , 1988 .

[43]  D. Donoho,et al.  Atomic Decomposition by Basis Pursuit , 2001 .

[44]  Qing Liu,et al.  Digital image encryption and watermarking by phase-shifting interferometry. , 2004, Applied optics.

[45]  Myrian Tebaldi,et al.  Multiplexing encryption–decryption via lateral shifting of a random phase mask , 2006 .