Zhou Y, Sun Y, Yang M, Hou J, Xiao Z, Anand A, Sui L. An optical multiple-image authentication based on computational ghost imaging and total-variation minimization.
Heliyon 2023;
9:e17682. [PMID:
37449136 PMCID:
PMC10336455 DOI:
10.1016/j.heliyon.2023.e17682]
[Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/01/2023] [Revised: 06/24/2023] [Accepted: 06/26/2023] [Indexed: 07/18/2023] Open
Abstract
An optical multiple-image authentication is suggested using computational ghost imaging and total-variation minimization. Differing from encrypting multiple images into a noise-like ciphertext directly, as described in most conventional authentication methods, the related encoded information is embedded into a cover image to avoid the attention of eavesdroppers. First, multiple images are encoded to form real-valued sequences composed of corresponding bucket values obtained by the aid of computational ghost imaging, and four sub-images are obtained by decomposing the cover image using wavelet transform. Second, measured sequences are embedded into one of the sub-images, and embedding positions are randomly selected using corresponding binary masks. To enhance the security level, a chaotic sequence is produced using logistic map and used to scramble measured intensities. Most importantly, original images with high quality can be directly recovered using total-variation minimization. The validity and robustness of the proposed approach are verified with optical experiments.
Collapse