Optical secure image verification system based on ghost imaging

被引:11
|
作者
Wu, Jingjing [1 ]
Haobogedewude, Buyinggaridi [2 ]
Liu, Zhengjun [3 ]
Liu, Shutian [1 ]
机构
[1] Harbin Inst Technol, Dept Phys, Harbin 150001, Peoples R China
[2] Heilongjiang Univ, Coll Elect Engn, Harbin 150080, Peoples R China
[3] Harbin Inst Technol, Dept Automat Measurement & Control, Harbin 150001, Peoples R China
基金
中国国家自然科学基金;
关键词
Optical verification; Ghost imaging; Filter; OBJECT AUTHENTICATION; ENCRYPTION; TRANSFORMS;
D O I
10.1016/j.optcom.2017.04.042
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
The ghost imaging can perform Fourier-space filtering by tailoring the configuration. We proposed a novel optical secure image verification system based on this theory with the help of phase matched filtering. In the verification process, the system key and the ID card which contain the information of the correct image and the information to be verified are put in the reference and the test paths, respectively. We demonstrate that the ghost imaging configuration can perform an incoherent correlation between the system key and the ID card. The correct verification manifests itself with a correlation peak in the ghost image. The primary image and the image to be verified are encrypted and encoded into pure phase masks beforehand for security. Multi-image secure verifications can also be implemented in the proposed system.
引用
收藏
页码:98 / 103
页数:6
相关论文
共 50 条
  • [41] Optical cryptosystem based on computational ghost imaging and nonlinear authentication
    Zhang, Lin
    Wang, Xiaogang
    Zhou, Qingming
    Xue, Jidong
    Xu, Bijun
    OPTICS EXPRESS, 2024, 32 (03) : 4242 - 4253
  • [42] Photon counting imaging and polarized light encoding for secure image verification and hologam watermarking
    Rajput, Sudheesh K.
    Kumar, Dhirendra
    Nishchal, Naveen K.
    JOURNAL OF OPTICS, 2014, 16 (12)
  • [43] Secure verification by multifactor optical validation
    Millan, Maria S.
    Perez-Cabre, Elisabet
    Javidi, Bahrain
    OPTICAL INFORMATION SYSTEMS IV, 2006, 6311
  • [44] Forgery attack on optical encryption based on computational ghost imaging
    Yuan, Sheng
    Wang, Lanjie
    Liu, Xuemei
    Zhou, Xin
    OPTICS LETTERS, 2020, 45 (14) : 3913 - 3916
  • [45] Optical encryption scheme based on ghost imaging with disordered speckles
    Zhang, Yu-dong
    Zhao, Sheng-mei
    CHINESE PHYSICS B, 2017, 26 (05)
  • [46] High performance optical image hiding based on computational ghost imaging with BCH error correction coding technique
    Bai, Xing
    Zhang, LuoZhi
    Li, Jinxi
    Yu, Zhan
    Yang, Zhongzhuo
    Wang, Yujie
    Chen, Xingyu
    Zhou, Xin
    OPTICS AND LASER TECHNOLOGY, 2022, 152
  • [47] Optical encryption based on ghost imaging and public key cryptography
    Kang Yi
    Zhang Leihong
    Zhang Dawei
    OPTICS AND LASERS IN ENGINEERING, 2018, 111 : 58 - 64
  • [48] Optical encryption scheme based on spread spectrum ghost imaging
    刘进芬
    董玥
    王乐
    赵生妹
    Chinese Physics B, 2023, (07) : 435 - 441
  • [49] On Ghost Imaging Studies for Information Optical Imaging
    Hu, Chenyu
    Han, Shensheng
    APPLIED SCIENCES-BASEL, 2022, 12 (21):
  • [50] Implicit image processing with ghost imaging
    Penketh, Harry
    Barnes, William L.
    Bertolotti, Jacopo
    OPTICS EXPRESS, 2022, 30 (05) : 7035 - 7043