Cargando…
An optical multiple-image authentication based on computational ghost imaging and total-variation minimization
An optical multiple-image authentication is suggested using computational ghost imaging and total-variation minimization. Differing from encrypting multiple images into a noise-like ciphertext directly, as described in most conventional authentication methods, the related encoded information is embe...
Autores principales: | , , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Elsevier
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10336455/ https://www.ncbi.nlm.nih.gov/pubmed/37449136 http://dx.doi.org/10.1016/j.heliyon.2023.e17682 |
_version_ | 1785071213544996864 |
---|---|
author | Zhou, Yaoling Sun, Yueer Yang, Mu Hou, Junzhao Xiao, Zhaolin Anand, Asundi Sui, Liansheng |
author_facet | Zhou, Yaoling Sun, Yueer Yang, Mu Hou, Junzhao Xiao, Zhaolin Anand, Asundi Sui, Liansheng |
author_sort | Zhou, Yaoling |
collection | PubMed |
description | An optical multiple-image authentication is suggested using computational ghost imaging and total-variation minimization. Differing from encrypting multiple images into a noise-like ciphertext directly, as described in most conventional authentication methods, the related encoded information is embedded into a cover image to avoid the attention of eavesdroppers. First, multiple images are encoded to form real-valued sequences composed of corresponding bucket values obtained by the aid of computational ghost imaging, and four sub-images are obtained by decomposing the cover image using wavelet transform. Second, measured sequences are embedded into one of the sub-images, and embedding positions are randomly selected using corresponding binary masks. To enhance the security level, a chaotic sequence is produced using logistic map and used to scramble measured intensities. Most importantly, original images with high quality can be directly recovered using total-variation minimization. The validity and robustness of the proposed approach are verified with optical experiments. |
format | Online Article Text |
id | pubmed-10336455 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | Elsevier |
record_format | MEDLINE/PubMed |
spelling | pubmed-103364552023-07-13 An optical multiple-image authentication based on computational ghost imaging and total-variation minimization Zhou, Yaoling Sun, Yueer Yang, Mu Hou, Junzhao Xiao, Zhaolin Anand, Asundi Sui, Liansheng Heliyon Research Article An optical multiple-image authentication is suggested using computational ghost imaging and total-variation minimization. Differing from encrypting multiple images into a noise-like ciphertext directly, as described in most conventional authentication methods, the related encoded information is embedded into a cover image to avoid the attention of eavesdroppers. First, multiple images are encoded to form real-valued sequences composed of corresponding bucket values obtained by the aid of computational ghost imaging, and four sub-images are obtained by decomposing the cover image using wavelet transform. Second, measured sequences are embedded into one of the sub-images, and embedding positions are randomly selected using corresponding binary masks. To enhance the security level, a chaotic sequence is produced using logistic map and used to scramble measured intensities. Most importantly, original images with high quality can be directly recovered using total-variation minimization. The validity and robustness of the proposed approach are verified with optical experiments. Elsevier 2023-06-29 /pmc/articles/PMC10336455/ /pubmed/37449136 http://dx.doi.org/10.1016/j.heliyon.2023.e17682 Text en © 2023 The Authors. Published by Elsevier Ltd. https://creativecommons.org/licenses/by/4.0/This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Research Article Zhou, Yaoling Sun, Yueer Yang, Mu Hou, Junzhao Xiao, Zhaolin Anand, Asundi Sui, Liansheng An optical multiple-image authentication based on computational ghost imaging and total-variation minimization |
title | An optical multiple-image authentication based on computational ghost imaging and total-variation minimization |
title_full | An optical multiple-image authentication based on computational ghost imaging and total-variation minimization |
title_fullStr | An optical multiple-image authentication based on computational ghost imaging and total-variation minimization |
title_full_unstemmed | An optical multiple-image authentication based on computational ghost imaging and total-variation minimization |
title_short | An optical multiple-image authentication based on computational ghost imaging and total-variation minimization |
title_sort | optical multiple-image authentication based on computational ghost imaging and total-variation minimization |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10336455/ https://www.ncbi.nlm.nih.gov/pubmed/37449136 http://dx.doi.org/10.1016/j.heliyon.2023.e17682 |
work_keys_str_mv | AT zhouyaoling anopticalmultipleimageauthenticationbasedoncomputationalghostimagingandtotalvariationminimization AT sunyueer anopticalmultipleimageauthenticationbasedoncomputationalghostimagingandtotalvariationminimization AT yangmu anopticalmultipleimageauthenticationbasedoncomputationalghostimagingandtotalvariationminimization AT houjunzhao anopticalmultipleimageauthenticationbasedoncomputationalghostimagingandtotalvariationminimization AT xiaozhaolin anopticalmultipleimageauthenticationbasedoncomputationalghostimagingandtotalvariationminimization AT anandasundi anopticalmultipleimageauthenticationbasedoncomputationalghostimagingandtotalvariationminimization AT suiliansheng anopticalmultipleimageauthenticationbasedoncomputationalghostimagingandtotalvariationminimization AT zhouyaoling opticalmultipleimageauthenticationbasedoncomputationalghostimagingandtotalvariationminimization AT sunyueer opticalmultipleimageauthenticationbasedoncomputationalghostimagingandtotalvariationminimization AT yangmu opticalmultipleimageauthenticationbasedoncomputationalghostimagingandtotalvariationminimization AT houjunzhao opticalmultipleimageauthenticationbasedoncomputationalghostimagingandtotalvariationminimization AT xiaozhaolin opticalmultipleimageauthenticationbasedoncomputationalghostimagingandtotalvariationminimization AT anandasundi opticalmultipleimageauthenticationbasedoncomputationalghostimagingandtotalvariationminimization AT suiliansheng opticalmultipleimageauthenticationbasedoncomputationalghostimagingandtotalvariationminimization |