Secured single-pixel ghost holography

Abstract In this paper, we propose and experimentally demonstrate a new optical security method using single-pixel ghost holography. The plaintext is optically encoded into a series of single-pixel data using the designed single-pixel ghost holography, and then a digital hologram just before spatial light modulator (SLM) is retrieved by using a correlation algorithm with all recorded single-pixel data to be stored as a reference in a database. Subsequently, some recorded single-pixel data are randomly selected, and random amplitude-only patterns corresponding to those selected single-pixel data serve as principal security keys. Other parameters, e.g., wavelength and axial distance, can be used as additional security keys. The 1-bit quantization operation is further applied to process those randomly-selected single-pixel data in order to generate binary signals as ciphertext. Finally, different strategies are developed and applied for optical authentication of the decrypted holograms or decrypted objects. Numerical analyses and optical experiments demonstrate that the proposed method possesses high security, high flexibility and high discrimination capability. It is also illustrated that the proposed method possesses high robustness against contaminations. It is believed that the proposed method can provide a promising strategy for greatly enriching optical security field. @ Elsevier, 2020.

[1]  E. Cuche,et al.  Digital holographic microscopy: a noninvasive contrast imaging technique allowing quantitative visualization of living cells with subwavelength axial accuracy. , 2005, Optics letters.

[2]  Myungjin Cho,et al.  Information authentication using photon-counting double-random-phase encrypted images. , 2011, Optics letters.

[3]  M. Chekhova,et al.  High-visibility, high-order lensless ghost imaging with thermal light. , 2009, Optics letters.

[4]  Chi-Ching Chang,et al.  Three-dimensional information encryption and anticounterfeiting using digital holography. , 2015, Applied optics.

[5]  Bahram Javidi,et al.  Compression of encrypted three-dimensional objects using digital holography , 2004 .

[6]  Kazuya Nakano,et al.  Encrypted Sensing Based on Digital Holography for Fingerprint Images , 2015 .

[7]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[8]  M. Padgett,et al.  Fast full-color computational imaging with single-pixel detectors. , 2013, Optics express.

[9]  Bahram Javidi,et al.  Advances in optical security systems , 2014 .

[10]  Mark A. Neifeld,et al.  Digital wavefront reconstruction and its application to image encryption , 2000 .

[11]  Ayman Alfalou,et al.  Optical image compression and encryption methods , 2009 .

[12]  John T Sheridan,et al.  Phase-retrieval-based attacks on linear-canonical-transform-based DRPE systems. , 2016, Applied optics.

[13]  Wei Liu,et al.  Correlated-imaging-based chosen plaintext attack on general cryptosystems composed of linear canonical transforms and phase encodings , 2015 .

[14]  Xudong Chen,et al.  Optical authentication via photon-synthesized ghost imaging using optical nonlinear correlation , 2015 .

[15]  Jingjuan Zhang,et al.  Multiple-image encryption by wavelength multiplexing. , 2005, Optics letters.

[16]  Wen Chen,et al.  Object authentication in computational ghost imaging with the realizations less than 5% of Nyquist limit. , 2013, Optics letters.

[17]  A. Gatti,et al.  Differential ghost imaging. , 2010, Physical review letters.

[18]  Xudong Chen,et al.  Computational Methods for Electromagnetic Inverse Scattering , 2018 .

[19]  Wen Chen,et al.  Grayscale object authentication based on ghost imaging using binary signals , 2015 .

[20]  Xiaogang Wang,et al.  Security-enhanced phase encryption assisted by nonlinear optical correlation via sparse phase , 2015 .

[21]  Arturo Carnicer,et al.  Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys. , 2005, Optics letters.

[22]  Wen Chen,et al.  3D Gerchberg-Saxton Optical Correlation , 2018, IEEE Photonics Journal.

[23]  N. Tian,et al.  Fluorescence ghost imaging with pseudothermal light. , 2011, Optics letters.

[24]  Ting Sun,et al.  Single-pixel imaging via compressive sampling , 2008, IEEE Signal Process. Mag..

[25]  Jeffrey H. Shapiro,et al.  Computational ghost imaging , 2008, 2009 Conference on Lasers and Electro-Optics and 2009 Conference on Quantum electronics and Laser Science Conference.

[26]  Christian Depeursinge,et al.  Simultaneous cell morphometry and refractive index measurement with dual-wavelength digital holographic microscopy and dye-enhanced dispersion of perfusion medium. , 2008, Optics letters.

[27]  M. Padgett,et al.  3D Computational Imaging with Single-Pixel Detectors , 2013, Science.

[28]  B. Kemper,et al.  Digital holographic microscopy for live cell applications and technical inspection. , 2008, Applied optics.

[29]  Reza Kheradmand,et al.  Gray-scale and color optical encryption based on computational ghost imaging , 2012 .

[30]  Graham M Gibson,et al.  Improving the signal-to-noise ratio of single-pixel imaging using digital microscanning. , 2016, Optics express.

[31]  Wenqi He,et al.  Ciphertext-only attack on optical cryptosystem with spatially incoherent illumination: from the view of imaging through scattering medium , 2017, Scientific Reports.

[32]  Jingang Zhong,et al.  Single-pixel imaging by means of Fourier spectrum acquisition , 2015, Nature Communications.

[33]  O. Katz,et al.  Ghost imaging with a single detector , 2008, 0812.2633.

[34]  J. Goodman Introduction to Fourier optics , 1969 .

[35]  Wenlin Gong,et al.  Correlated imaging through atmospheric turbulence , 2010, 1005.5011.

[36]  Unnikrishnan Gopinathan,et al.  Three-dimensional object recognition from digital Fresnel hologram by wavelet matched filtering , 2006 .

[37]  Jesús Lancis,et al.  Optical encryption based on computational ghost imaging. , 2010, Optics letters.

[38]  Wen Chen Hierarchically optical double-image correlation using 3D phase retrieval algorithm in fractional Fourier transform domain , 2018 .

[39]  Peng Zhang,et al.  Known-plaintext attack on optical encryption based on double random phase keys. , 2006, Optics letters.

[40]  Osamu Matoba,et al.  Optical Techniques for Information Security , 2009, Proceedings of the IEEE.

[41]  J. Shapiro,et al.  Normalized ghost imaging , 2012, 1212.5041.

[42]  B. Javidi Nonlinear joint power spectrum based optical correlation. , 1989, Applied optics.

[43]  Wen Chen,et al.  Ghost imaging for three-dimensional optical security , 2013 .

[44]  Naveen K Nishchal,et al.  Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform. , 2013, Applied optics.