• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于扩展策略的计算鬼成像框架下的光学图像隐藏

Optical image hiding under framework of computational ghost imaging based on an expansion strategy.

作者信息

Liansheng Sui, Jiahao Wang, Ailing Tian, Asundi Anand

出版信息

Opt Express. 2019 Mar 4;27(5):7213-7225. doi: 10.1364/OE.27.007213.

DOI:10.1364/OE.27.007213
PMID:30876289
Abstract

A novel optical image hiding scheme based on an expansion strategy is presented under the framework of computational ghost imaging. The image to be hidden is concealed into an expanded interim with the same size as the host image. This is implemented by rearranging the measured intensities of the original object after the process of ghost imaging. An initial Hadamard matrix is used to generate additional matrices by shifting it circularly along the column direction, so that enough 2D patterns are engendered to retrieve phase-only profiles for imaging. Next, the frequency coefficients of the host image are modified with that of the expanded interim by controlling a small weighting factor. After an inverse transform, the host image carrying the hidden information can be obtained with high imperceptibility. Security is assured by considering optical parameters, such as wavelength and axial distance, as secret keys due to their high sensitivity to tiny change. Importantly, differing from other computational ghost imaging based schemes, many phase-only profiles are used to collect the measured intensities to enhance the resistance against noise and occlusion attacks. The simulated experiments illustrate the feasibility and effectiveness of the proposed scheme.

摘要

在计算鬼成像框架下,提出了一种基于扩展策略的新型光学图像隐藏方案。待隐藏图像被隐藏到一个与宿主图像大小相同的扩展中间图像中。这是通过在鬼成像过程后重新排列原始物体的测量强度来实现的。使用初始哈达玛矩阵通过沿列方向循环移位来生成额外的矩阵,从而产生足够的二维图案以检索仅相位轮廓用于成像。接下来,通过控制一个小的加权因子,用扩展中间图像的频率系数修改宿主图像的频率系数。经过逆变换后,可以获得携带隐藏信息且具有高不可感知性的宿主图像。由于光学参数(如波长和轴向距离)对微小变化高度敏感,将其作为秘密密钥可确保安全性。重要的是,与其他基于计算鬼成像的方案不同,该方案使用许多仅相位轮廓来收集测量强度,以增强对噪声和遮挡攻击的抵抗力。模拟实验说明了该方案的可行性和有效性。

相似文献

1
Optical image hiding under framework of computational ghost imaging based on an expansion strategy.基于扩展策略的计算鬼成像框架下的光学图像隐藏
Opt Express. 2019 Mar 4;27(5):7213-7225. doi: 10.1364/OE.27.007213.
2
Information encryption based on the customized data container under the framework of computational ghost imaging.基于计算鬼成像框架下定制数据容器的信息加密
Opt Express. 2019 Jun 10;27(12):16493-16506. doi: 10.1364/OE.27.016493.
3
Optical cryptosystem based on computational ghost imaging and nonlinear authentication.基于计算鬼成像和非线性认证的光学密码系统。
Opt Express. 2024 Jan 29;32(3):4242-4253. doi: 10.1364/OE.510356.
4
Optical multiple-image authentication based on computational ghost imaging and hybrid non-convex second-order total variation.基于计算鬼成像和混合非凸二阶全变分的光学多图像认证
Opt Express. 2023 Jun 19;31(13):20887-20904. doi: 10.1364/OE.492608.
5
Optical encoding and hiding scheme for a double image based on chaotic fingerprint phase masks and phase-shifting digital holography.基于混沌指纹相位掩模和相移数字全息术的双图像光学编码与隐藏方案
Appl Opt. 2023 Oct 10;62(29):7577-7587. doi: 10.1364/AO.503129.
6
An optical multiple-image authentication based on computational ghost imaging and total-variation minimization.一种基于计算鬼成像和全变差最小化的光学多重图像认证方法。
Heliyon. 2023 Jun 29;9(7):e17682. doi: 10.1016/j.heliyon.2023.e17682. eCollection 2023 Jul.
7
Information Security Scheme Based on Computational Temporal Ghost Imaging.基于计算时频鬼成像的信息安全方案
Sci Rep. 2017 Aug 9;7(1):7676. doi: 10.1038/s41598-017-07816-2.
8
Digital color image watermarking based on phase-shifting interferometry and neighboring pixel value subtraction algorithm in the discrete-cosine-transform domain.基于离散余弦变换域中相移干涉测量和相邻像素值减法算法的数字彩色图像水印技术
Appl Opt. 2007 Jul 20;46(21):4694-701. doi: 10.1364/ao.46.004694.
9
Multi-image optical information hiding algorithm based on Fourier transform without hidden key transmission.
Appl Opt. 2024 Feb 10;63(5):1292-1305. doi: 10.1364/AO.509301.
10
Single-pixel computational ghost imaging with helicity-dependent metasurface hologram.基于螺旋度相关超表面全息图的单像素计算鬼成像
Sci Adv. 2017 Sep 8;3(9):e1701477. doi: 10.1126/sciadv.1701477. eCollection 2017 Sep.

引用本文的文献

1
An optical multiple-image authentication based on computational ghost imaging and total-variation minimization.一种基于计算鬼成像和全变差最小化的光学多重图像认证方法。
Heliyon. 2023 Jun 29;9(7):e17682. doi: 10.1016/j.heliyon.2023.e17682. eCollection 2023 Jul.