-
Ghost imaging is closely related to image encryption, since the random speckle patterns are often exploited. In the two-dimensional case, computational ghost imaging can be realized through LXR T= Y , where X is a two-dimensional object, Y is the bucket detection signals reshaped into two-dimensional form, and L and R are two random matrices. In this paper, a scenario of flexible image encryption in ghost imaging in two-dimensional case is proposed. The image is encrypted into the bucket detection signals, by arbitrarily arranging the two random matrices ( L and R ) and other two permutation matrices ( P 1 and P 2). The permutation matrices are used to disrupt the distribution of the bucket signals. Considering the specific size of the image, that the image may not be square but rectangular, eight ways of image encryption are investigated. Four of them use only one permutation matrix ( P 1 or P 2), and they are P 1 LXR T= Y 1, LP 1 XR T= Y 2, LXP 2 R T= Y 3, LXR T P 2= Y 4 . The other four use two permutation matrices ( P 1 and P 2), and they are P 1 LXP 2 R T= Y 5, P 1 LXR T P 2= Y 6, LP 1 XP 2 R T= Y 7, LP 1 XR T P 2= Y 8.
In experiment, specifically, the measurement matrix is generated by the Kronecker product of the random matrices and permutation matrices. According to the 8 ways of image encryption, the 8 measurement matrices are A 1=( P 1 L )⊗R, A 2=( LP 1)⊗R, A 3= L ⊗( RP 2T), A 4= L ⊗( P 2T R ), A 5=( P 1 L )⊗( RP 2T), A 6=( P 1 L )⊗( P 2T R ), A 7=( LP 1)⊗( RP 2T), and A 8=( LP 1)⊗( P 2T R ), respectively. These measurement matrices are used to form the random speckle patterns which are then projected onto the object. A spatial light modulator (SLM) is employed to play the object and random speckle patterns. A charge coupled device (CCD) is used to obtain the bucket detection signals.
As truncated singular value decomposition (TSVD) is an effective way to denoise, it is performed to obtain the pseudoinverse matrices of the random matrices which are used in the decryption process. Only when the pseudoinverse matrices of the random matrices, as well as the correct sequences of the random and permutation matrices, are known in each way, can the image be successfully decrypted. Otherwise, image decryption will not be successful. The structural similarity (SSIM), peak signal-to-noise ratio (PSNR), and correlation coefficient (CC) are used to evaluate the quality of the decrypted images. The SSIMs of object and the two-dimensional bucket detection signals are very low, indicating the successful encryption. The PSNRs and CCs of the successful decrypted images are better than the unsuccessful ones. The successfully decrypted images clearly reconstruct the image of the object, while the unsuccessful images are in a mess.
Our method provides a new idea of image encryption in ghost imaging, and image encryption is therefore enhanced and made flexible. Moreover, the present protocol can be combined with other image encryption techniques, to form more flexible protocols of image encryption, and may also have some application prospects in other image processing such as watermarking, image hiding, and so on.-
Keywords:
- Ghost imaging /
- Permutation encryption /
- Kronecker product
-
[1] Shapiro J H 2008 Phys. Rev. A 78 061802
[2] Cao D Z, Xiong J, Zhang S H, Lin L F, Gao L, Wang K 2008 Appl. Phys. Lett. 92 201102
[3] Chan K W C, O’Sullivan M N, Boyd R W 2009 Opt. Lett. 34 3343-3345
[4] Bromberg Y, Katz O, Silberberg Y 2009 Phys. Rev. A 79 053840
[5] Romberg J 2008 IEEE Signal Process. Mag. 25 14
[6] Katz O, Bromberg Y, Silberberg Y 2009 Appl. Phys. Lett. 95 131110
[7] Zhang C, Guo S, Cao J, Guan J, Gao F 2014 Opt. Express 22 30063-30073
[8] Gong W 2015 Photon. Res. 3 234-237
[9] Zhang X, Meng X, Yang X, Wang Y, Yin Y, Li X, Peng X, He W, Dong G, Chen H 2018 Opt. Express 26 12948-12958
[10] Lv X, Guo S, Wang C, Yang C, Zhang H, Song J, Gong W, Gao F 2018 IEEE Photonics J. 10 3900708
[11] Luo B, Yin P, Yin L, Wu G, Guo H 2018 Opt. Express 26 23093-23106
[12] Nie X, Zhao X, Peng T, Scully M O 2022 Phys. Rev. A 105 043525
[13] Lyu M, Wang W, Wang H, Wang H, Li G, Chen N, Situ G 2017 Sci. Rep. 7 17865
[14] Barbastathis G, Ozcan A, Situ G 2019 Optica 6 921-943
[15] Zhang X, Ren Y, Feng G, Qian Z 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing Dalian, China, October 14-16, 2011 p222-225
[16] Kong L J, Li Y, Qian S X, Li S M, Tu C, Wang H T 2013 Phys. Rev. A 88 013852
[17] Chen W, Chen X 2013 Appl. Phys. Lett. 103 221106
[18] Zhang Y, Zhao S 2017 Chinese Phys. B 26 054205
[19] Wu J, Xie Z, Liu Z, Liu W, Zhang Y, Liu S 2016 Opt. Commun. 359 38
[20] Shi D, Huang J, Wang Y, Yuan K, Xie C, Liu D, Zhu W 2017 Sci. Rep. 7 13172
[21] Zhu J, Yang X, Meng X, Wang Y, Yin Y, Sun X, Dong G 2018 Opt. Commun. 420 34
[22] Kang Y, Zhang L, Zhang D 2018 Opt. Lasers Eng. 111 58
[23] Liu Y, Zheng P, Liu H C 2022 Opt. Express 30 14073
[24] Liu J F, Dong Y, Wang L, Zhao S M 2023 Chin. Phys. B 32 074202
[25] Zhao Y N, Chen L S, Chen L Y, Kong L, Wang C, Ren C, Zhang S H, Cao D Z 2024 Opt. Lasers Eng. 181 108408
[26] Albert A 1972 Regression and the Moore-Penrose pseudoinverse (New York: Academic Press)
[27] Chen L Y, Wang C, Xiao X Y, Ren C, Zhang D J, Li Z, Cao D Z 2022 Opt. Express 30 6248-6257
[28] Zhou W, Bovik A C, Sheikh H R, Simoncelli E P 2004 IEEE Trans. Image Process. 13 600-612
[29] Qu G, Meng X, Yang X, Wu H, Wang P, He W, Chen H 2021 Opt. Lasers Eng. 137 106376
[30] Wang L, Zhao S, Cheng W, Gong L, Chen H 2016 Opt. Commun. 366 314
[31] Qu G, Meng X, Yin Y, Wu H, Yang X, Peng X, He W 2021Opt. Lasers Eng. 137 106392
[32] Huang H, Han Z 2024 Results Phys 56 107282
Metrics
- Abstract views: 66
- PDF Downloads: 1
- Cited By: 0