• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于计算鬼成像和混合非凸二阶全变分的光学多图像认证

Optical multiple-image authentication based on computational ghost imaging and hybrid non-convex second-order total variation.

出版信息

Opt Express. 2023 Jun 19;31(13):20887-20904. doi: 10.1364/OE.492608.

DOI:10.1364/OE.492608
PMID:37381202
Abstract

An optical security method for multiple-image authentication is proposed based on computational ghost imaging and hybrid non-convex second-order total variation. Firstly, each original image to be authenticated is encoded to the sparse information using computational ghost imaging, where illumination patterns are generated based on Hadamard matrix. In the same time, the cover image is divided into four sub-images with wavelet transform. Secondly, one of sub-images with low-frequency coefficients is decomposed using singular value decomposition (SVD), and all sparse data are embedded into the diagonal matrix with the help of binary masks. To enhance the security, the generalized Arnold transform is used to scramble the modified diagonal matrix. After using SVD again, the marked cover image carrying the information of multiple original images is obtained using the inverse wavelet transform. In the authentication process, the quality of each reconstructed image can be greatly improved based on hybrid non-convex second-order total variation. Even at a very low sampling ratio (i.e., 6%), the existence of original images can be efficiently verified using the nonlinear correlation maps. To our knowledge, it is first to embed sparse data into the high-frequency sub-image using two cascaded SVDs, which can guarantee high robustness against the Gaussian filter and sharpen filter. The optical experiments demonstrate the feasibility of the proposed mechanism, which can provide an effective alternative for the multiple-image authentication.

摘要

提出了一种基于计算鬼成像和混合非凸二阶全变分的多图像认证光安全方法。首先,使用计算鬼成像将每个要认证的原始图像编码为稀疏信息,其中照明图案基于 Hadamard 矩阵生成。同时,将掩蔽图像分为四个子图像进行小波变换。其次,使用奇异值分解 (SVD) 对具有低频系数的子图像之一进行分解,并使用二进制掩模将所有稀疏数据嵌入对角矩阵中。为了提高安全性,使用广义 Arnold 变换对修改后的对角矩阵进行置乱。再次使用 SVD 后,使用逆小波变换获得携带多个原始图像信息的标记掩蔽图像。在认证过程中,基于混合非凸二阶全变分可以大大提高每个重构图像的质量。即使在非常低的采样率(即 6%)下,也可以使用非线性相关图有效地验证原始图像的存在。据我们所知,首次使用两个级联的 SVD 将稀疏数据嵌入到高频子图像中,这可以保证对高斯滤波器和锐化滤波器具有很高的鲁棒性。光学实验证明了所提出机制的可行性,可为多图像认证提供一种有效方法。

相似文献

1
Optical multiple-image authentication based on computational ghost imaging and hybrid non-convex second-order total variation.基于计算鬼成像和混合非凸二阶全变分的光学多图像认证
Opt Express. 2023 Jun 19;31(13):20887-20904. doi: 10.1364/OE.492608.
2
An optical multiple-image authentication based on computational ghost imaging and total-variation minimization.一种基于计算鬼成像和全变差最小化的光学多重图像认证方法。
Heliyon. 2023 Jun 29;9(7):e17682. doi: 10.1016/j.heliyon.2023.e17682. eCollection 2023 Jul.
3
Optical cryptosystem based on computational ghost imaging and nonlinear authentication.基于计算鬼成像和非线性认证的光学密码系统。
Opt Express. 2024 Jan 29;32(3):4242-4253. doi: 10.1364/OE.510356.
4
Optical multiple-image authentication method based on Fourier single-pixel imaging and multiple logistic maps.基于傅里叶单像素成像和多重逻辑映射的光学多图像认证方法
Opt Express. 2023 Jul 31;31(16):26535-26551. doi: 10.1364/OE.497016.
5
Singular value decomposition ghost imaging.奇异值分解鬼成像。
Opt Express. 2018 May 14;26(10):12948-12958. doi: 10.1364/OE.26.012948.
6
Double-Matrix Decomposition Image Steganography Scheme Based on Wavelet Transform with Multi-Region Coverage.基于小波变换和多区域覆盖的双矩阵分解图像隐写术方案
Entropy (Basel). 2022 Feb 7;24(2):246. doi: 10.3390/e24020246.
7
Optical image hiding under framework of computational ghost imaging based on an expansion strategy.基于扩展策略的计算鬼成像框架下的光学图像隐藏
Opt Express. 2019 Mar 4;27(5):7213-7225. doi: 10.1364/OE.27.007213.
8
Improved multiple-image authentication based on optical interference by wavelength multiplexing.基于波长复用光学干涉的改进型多图像认证
Appl Opt. 2022 Aug 10;61(23):6931-6938. doi: 10.1364/AO.456222.
9
Computational ghost imaging with spatiotemporal encoding pseudo-random binary patterns.具有时空编码伪随机二进制模式的计算鬼成像
Opt Express. 2020 Oct 12;28(21):31163-31179. doi: 10.1364/OE.403375.
10
Robust, imperceptible and optimized watermarking of DICOM image using Schur decomposition, LWT-DCT-SVD and its authentication using SURF.基于Schur分解、LWT-DCT-SVD的稳健、不可感知且优化的DICOM图像水印及其基于SURF的认证
Multimed Tools Appl. 2023;82(11):16555-16589. doi: 10.1007/s11042-022-14002-8. Epub 2022 Sep 27.