首页 | 本学科首页   官方微博 | 高级检索  
     检索      


Secret shared multiple-image encryption based on row scanning compressive ghost imaging and phase retrieval in the Fresnel domain
Institution:1. Department of Optics, School of Information Science and Engineering, and Shandong Provincial Key Laboratory of Laser Technology and Application, Shandong University, Jinan 250100, China;2. College of Optoelectronics Engineering, Shenzhen University, Shenzhen 518060, China;3. College of Materials Science and Opto-Electronic Technology, University of Chinese Academy of Sciences, Beijing 100049, China;4. College of Electronic Science and Technology, Shenzhen University, Shenzhen 518060, China;1. School of Physics and Optoelectronic Engineering, Guangdong University of Technology, Guangzhou 510006, China;2. Vision Lab. ISEN Brest, L@bISEN, 20 rue Cuirassé Bretagne, CS 42807, 29228 Brest Cedex 2, France;3. Université de Brest, Lab-STICC, 6 Avenue Le Gorgeu, CS 93837, 29238 Brest Cedex 3, France;1. School of Electronic Information Engineering, Tianjin University, Tianjin, 300072 PR China;2. State Key Laboratory of Structural Analysis for Industrial Equipment, Dalian University of Technology, Dalian, 116024 PR China;1. Department of Opto-Electronics Engineering, Army Engineering University, Shijiazhuang 050000, China;2. Non-commissioned Officers School, Hangzhou 311400, China;3. Yantai Aviation University, Yantai 264001, China;1. Fujian Institute of Research on the Structure of Matter, Chinese Academy of Sciences, Fuzhou 350108, China;2. College of Materials Science and Opto-Electronic Technology, University of Chinese Academy of Sciences, Beijing 100049, China;3. University of Chinese Academy of Sciences, Beijing 100049, China
Abstract:A multiple-image encryption method is proposed that is based on row scanning compressive ghost imaging, (t, n) threshold secret sharing, and phase retrieval in the Fresnel domain. In the encryption process, after wavelet transform and Arnold transform of the target image, the ciphertext matrix can be first detected using a bucket detector. Based on a (t, n) threshold secret sharing algorithm, the measurement key used in the row scanning compressive ghost imaging can be decomposed and shared into two pairs of sub-keys, which are then reconstructed using two phase-only mask (POM) keys with fixed pixel values, placed in the input plane and transform plane 2 of the phase retrieval scheme, respectively; and the other POM key in the transform plane 1 can be generated and updated by the iterative encoding of each plaintext image. In each iteration, the target image acts as the input amplitude constraint in the input plane. During decryption, each plaintext image possessing all the correct keys can be successfully decrypted by measurement key regeneration, compression algorithm reconstruction, inverse wavelet transformation, and Fresnel transformation. Theoretical analysis and numerical simulations both verify the feasibility of the proposed method.
Keywords:Compressive ghost imaging  Phase retrieval  Threshold secret sharing
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号