Multiple-image authentication based on the single-pixel correlated imaging and multiple-level wavelet transform

Abstract Single-pixel correlated imaging has been developed as one of the most promising techniques in the past decades. In this paper, a new mechanism of single-pixel correlated imaging is designed for multiple-image authentication. The object wave is sequentially modulated by a series of phase-only mask pairs embedded into two cascaded spatial light modulators. The modulated wave passes through the input image located in the object plane, and its intensity is recorded as one of the ciphertext values by using a single-pixel bucket detector without spatial resolution. The sparse data of plaintext images are obtained with the multiple-level wavelet transform and used to construct an interim image with the help of binary amplitude masks. The interim image with a smaller size than that of plaintext images is considered as the input of single-pixel correlated imaging, which can guarantee the number of measurements reduced. Simultaneously, the phase-only mask pairs are retrieved from the 2D patterns formed with the row vectors of the spatially orthogonal Hadamard matrix by using an efficient iterative phase retrieval algorithm. Because the redundancy between speckle patterns generated with these phase-only mask pairs is greatly restrained, the number of measurements can be further reduced. Moreover, the related binary amplitude masks are employed as the secret keys so that the security level is also extensively enhanced. Given the above, the proposed method can significantly achieve the goal of multiple-image verification and provide a different research approach for optical authentication based on single-pixel correlated imaging.

[1]  Bahram Javidi,et al.  Roadmap on optical security , 2016 .

[2]  Zhengjun Liu,et al.  Optical hyperspectral image encryption based on improved Chirikov mapping and gyrator transform , 2018, Optics and Lasers in Engineering.

[3]  Linfei Chen,et al.  Optical image conversion and encryption by diffraction, phase retrieval algorithm and incoherent superposition , 2017 .

[4]  Guowei Li,et al.  Cyphertext-only attack on the double random-phase encryption: Experimental demonstration. , 2017, Optics express.

[5]  Shengmei Zhao,et al.  Fast reconstructed and high-quality ghost imaging with fast Walsh–Hadamard transform , 2016 .

[6]  Wenqi He,et al.  Secret shared multiple-image encryption based on row scanning compressive ghost imaging and phase retrieval in the Fresnel domain , 2017 .

[7]  Yu-dong Zhang,et al.  Optical encryption scheme based on ghost imaging with disordered speckles , 2017 .

[8]  Zhang Xiao,et al.  Silhouette-free interference-based multiple-image encryption using cascaded fractional Fourier transforms , 2019, Optics and Lasers in Engineering.

[9]  A. Alfalou,et al.  New perspectives in face correlation research: a tutorial , 2017 .

[10]  Zhongyang Li,et al.  Multiple-image encryption scheme with a single-pixel detector , 2016 .

[11]  B. Javidi,et al.  Photon-Counting Security Tagging and Verification Using Optically Encoded QR Codes , 2014, IEEE Photonics Journal.

[12]  Tian Ailing,et al.  Information encryption based on the customized data container under the framework of computational ghost imaging. , 2019, Optics express.

[13]  Peng Zhang,et al.  Chosen-plaintext attack on lensless double-random phase encoding in the Fresnel domain. , 2006, Optics letters.

[14]  Wen Chen,et al.  Grayscale object authentication based on ghost imaging using binary signals , 2015 .

[15]  A. Alfalou,et al.  Recent Advances in Optical Image Processing , 2015 .

[16]  Naveen K. Nishchal,et al.  Optical image security using Stokes polarimetry of spatially variant polarized beam , 2018, Optics Communications.

[17]  Hai Yu,et al.  Gyrator transform based double random phase encoding with sparse representation for information authentication , 2015 .

[18]  Caojin Yuan,et al.  An asymmetric color image encryption method by using deduced gyrator transform , 2017 .

[19]  Anand Asundi,et al.  Single-pixel correlated imaging with high-quality reconstruction using iterative phase retrieval algorithm , 2018, Optics and Lasers in Engineering.

[20]  Ayman Alfalou,et al.  Optical image compression and encryption methods , 2009 .

[21]  Isha Mehra,et al.  Optical asymmetric watermarking using modified wavelet fusion and diffractive imaging , 2015 .

[22]  Naveen K. Nishchal,et al.  Quick response code and interference-based optical asymmetric cryptosystem , 2019, J. Inf. Secur. Appl..

[23]  Zhengjun Liu,et al.  Optical secure image verification system based on ghost imaging , 2017 .

[24]  Asundi Anand,et al.  An optical multiple-image authentication based on transport of intensity equation , 2019, Optics and Lasers in Engineering.

[25]  Chenggong Zhang,et al.  Compressive optical steganography via single-pixel imaging. , 2019, Optics express.

[26]  Huaying Wang,et al.  Multiple-Image Hiding by Using Single-Shot Ptychography in Transform Domain , 2017, IEEE Photonics Journal.

[27]  Naveen K Nishchal,et al.  An optical encryption and authentication scheme using asymmetric keys. , 2014, Journal of the Optical Society of America. A, Optics, image science, and vision.

[28]  Zhang Xiao,et al.  Double-image encryption based on interference and logistic map under the framework of double random phase encoding , 2019, Optics and Lasers in Engineering.

[29]  Tzu-Chao Lin,et al.  Wavelet-based copyright-protection scheme for digital images based on local features , 2009, Inf. Sci..

[30]  Mingjie Sun,et al.  Motion estimation and quality enhancement for a single image in dynamic single-pixel imaging. , 2019, Optics express.

[31]  Jing Ma,et al.  Security of image encryption scheme based on multi-parameter fractional Fourier transform , 2016 .

[32]  A He,et al.  Cryptoanalysis on optical image encryption systems based on the vector decomposition technique in the Fourier domain. , 2019, Applied optics.

[33]  Faliu Yi,et al.  Efficient asymmetric image authentication schemes based on photon counting-double random phase encoding and RSA algorithms. , 2016, Applied optics.

[34]  Arturo Carnicer,et al.  Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. , 2005, Optics letters.

[35]  Roberto Torroba,et al.  Customized data container for improved performance in optical cryptosystems , 2016 .

[36]  Liangcai Cao,et al.  Image Encryption Based on Interleaved Computer-Generated Holograms , 2018, IEEE Transactions on Industrial Informatics.

[37]  Anand Asundi,et al.  Optical image hiding under framework of computational ghost imaging based on an expansion strategy. , 2019, Optics express.

[38]  María S. Millán,et al.  Nonlinear image encryption using a fully phase nonzero-order joint transform correlator in the Gyrator domain , 2017 .

[39]  Muhammad Rafiq Abuturab Securing multiple information using wavelet transform and Yang-Gu mixture amplitude-phase retrieval algorithm , 2019, Optics and Lasers in Engineering.

[40]  Shutian Liu,et al.  Iterative phase-amplitude retrieval with multiple intensity images at output plane of gyrator transforms , 2015 .

[41]  Yi Qin,et al.  Information Encryption in Ghost Imaging With Customized Data Container and XOR Operation , 2017, IEEE Photonics Journal.

[42]  Byung-Geun Lee,et al.  Low photon count based digital holography for quadratic phase cryptography. , 2017, Optics letters.

[43]  Wen Chen,et al.  Correlated-Photon Secured Imaging by Iterative Phase Retrieval Using Axially-Varying Distances , 2016, IEEE Photonics Technology Letters.

[44]  Zhang Leihong,et al.  High-performance compression and double cryptography based on compressive ghost imaging with the fast Fourier transform , 2016 .

[45]  Min Zhao,et al.  Optical encryption via monospectral integral imaging. , 2017, Optics express.

[46]  Roberto Torroba,et al.  Experimental QR code optical encryption: noise-free data recovering. , 2014, Optics letters.

[47]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[48]  Wen Chen,et al.  Experimental demonstration of ghost-imaging-based authentication in scattering media. , 2019, Optics express.

[49]  Rong Shu,et al.  Information Security Scheme Based on Computational Temporal Ghost Imaging , 2017, Scientific Reports.

[50]  Peng Zhang,et al.  Known-plaintext attack on optical encryption based on double random phase keys. , 2006, Optics letters.

[51]  Muhammad Rafiq Abuturab Asymmetric multiple information cryptosystem based on chaotic spiral phase mask and random spectrum decomposition , 2018 .

[52]  Reza Kheradmand,et al.  Optical encryption with selective computational ghost imaging , 2014 .