Optical image hiding based on computational ghost imaging

被引:55
|
作者
Wang, Le [1 ]
Zhao, Shengmei [1 ,2 ]
Cheng, Weiwen [1 ]
Gong, Longyan [3 ,4 ]
Chen, Hanwu [5 ]
机构
[1] Nanjing Univ Posts & Telecommun, Inst Signal Proc & Transmiss, Nanjing 210003, Jiangsu, Peoples R China
[2] Minist Educ, Key Lab Broadband Wireless Commun & Sensor Networ, Nanjing, Jiangsu, Peoples R China
[3] NUPT, Informat Phys Res Ctr, Nanjing, Jiangsu, Peoples R China
[4] NUPT, Dept Appl Phys, Nanjing, Jiangsu, Peoples R China
[5] Southeast Univ, Sch Comp Sci & Engn, Nanjing, Jiangsu, Peoples R China
基金
高等学校博士学科点专项科研基金; 中国国家自然科学基金;
关键词
Digital watermarking; Computational ghost imaging; Imaging reconstruction techniques; Least significant bit; KEY DISTRIBUTION; WATERMARKING; TURBULENCE;
D O I
10.1016/j.optcom.2016.01.026
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Imaging hiding schemes play important roles in now big data times. They provide copyright protections of digital images. In the paper, we propose a novel image hiding scheme based on computational ghost imaging to have strong robustness and high security. The watermark is encrypted with the configuration of a computational ghost imaging system, and the random speckle patterns compose a secret key. Least significant bit algorithm is adopted to embed the watermark and both the second-order correlation algorithm and the compressed sensing (CS) algorithm are used to extract the watermark. The experimental and simulation results show that the authorized users can get the watermark with the secret key. The watermark image could not be retrieved when the eavesdropping ratio is less than 45% with the second-order correlation algorithm, whereas it is less than 20% with the TVAL3 CS reconstructed algorithm. In addition, the proposed scheme is robust against the 'salt and pepper' noise and image cropping degradations. (C) 2016 Elsevier B.V. All rights reserved.
引用
收藏
页码:314 / 320
页数:7
相关论文
共 50 条
  • [31] Computational ghost imaging with key-patterns for image encryption
    Xu, Chenxiang
    Li, Dekui
    Guo, Kai
    Yin, Zhiping
    Guo, Zhongyi
    OPTICS COMMUNICATIONS, 2023, 537
  • [32] Computational ghost imaging
    Shapiro, Jeffrey H.
    PHYSICAL REVIEW A, 2008, 78 (06):
  • [33] Computational Ghost Imaging
    Shapiro, Jeffrey H.
    2009 CONFERENCE ON LASERS AND ELECTRO-OPTICS AND QUANTUM ELECTRONICS AND LASER SCIENCE CONFERENCE (CLEO/QELS 2009), VOLS 1-5, 2009, : 2168 - 2169
  • [34] Optical encryption for multi-user based on computational ghost imaging with Hadamard modulation
    Yuan, Sheng
    Han, Yakun
    Liu, Xuemei
    Li, Zhongyang
    Bing, Pibin
    Zhou, Xin
    OPTIK, 2023, 273
  • [35] Optical Encryption Scheme with Multiple Users Based on Computational Ghost Imaging and Orthogonal Modulation
    Yuan, Sheng
    Liu, Xuemei
    Zhou, Xin
    Li, Zhongyang
    JOURNAL OF THE OPTICAL SOCIETY OF KOREA, 2016, 20 (04) : 476 - 480
  • [36] An optical watermarking scheme with two-layer framework based on computational ghost imaging
    Sui Liansheng
    Cheng Yin
    Ailing, Tian
    Asundi, Anand Krishna
    OPTICS AND LASERS IN ENGINEERING, 2018, 107 : 38 - 45
  • [37] Full-Duplex Optical Communication System Based on Computational Temporal Ghost Imaging
    Zhao, Jianing
    Tang, Zhenzhou
    Shao, Kunlin
    Sun, Xiuyuan
    Pan, Shilong
    JOURNAL OF LIGHTWAVE TECHNOLOGY, 2024, 42 (23) : 8229 - 8236
  • [38] On the Characteristics of Photoacoustic Imaging Based on the Algorithm of Computational Ghost Imaging
    Zhang, L. H.
    Tang, B.
    Wang, F-Q.
    Sun, L-J.
    Ma, X-H.
    LASERS IN ENGINEERING, 2013, 25 (1-2) : 1 - 11
  • [39] Real single-channel color image encryption method based on computational ghost imaging
    Bai, Xing
    Li, Jinxi
    Yu, Zhan
    Yang, Zhongzhuo
    Wang, Yujie
    Chen, Xingyu
    Yuan, Sheng
    Zhou, Xin
    LASER PHYSICS LETTERS, 2022, 19 (12)
  • [40] Computational ghost imaging based on Walsh matrix replication
    Jia Shan-Shan
    Zhao Xi-Wei
    Zhou Cheng
    Song Li-Jun
    AOPC 2019: OPTICAL SENSING AND IMAGING TECHNOLOGY, 2019, 11338