• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

一种基于计算鬼成像和全变差最小化的光学多重图像认证方法。

An optical multiple-image authentication based on computational ghost imaging and total-variation minimization.

作者信息

Zhou Yaoling, Sun Yueer, Yang Mu, Hou Junzhao, Xiao Zhaolin, Anand Asundi, Sui Liansheng

机构信息

School of Computer Science and Engineering, Xi'an University of Technology, Xi'an, 710048, China.

Yonyou Network co., Ltd, Beijing, 100085, China.

出版信息

Heliyon. 2023 Jun 29;9(7):e17682. doi: 10.1016/j.heliyon.2023.e17682. eCollection 2023 Jul.

DOI:10.1016/j.heliyon.2023.e17682
PMID:37449136
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10336455/
Abstract

An optical multiple-image authentication is suggested using computational ghost imaging and total-variation minimization. Differing from encrypting multiple images into a noise-like ciphertext directly, as described in most conventional authentication methods, the related encoded information is embedded into a cover image to avoid the attention of eavesdroppers. First, multiple images are encoded to form real-valued sequences composed of corresponding bucket values obtained by the aid of computational ghost imaging, and four sub-images are obtained by decomposing the cover image using wavelet transform. Second, measured sequences are embedded into one of the sub-images, and embedding positions are randomly selected using corresponding binary masks. To enhance the security level, a chaotic sequence is produced using logistic map and used to scramble measured intensities. Most importantly, original images with high quality can be directly recovered using total-variation minimization. The validity and robustness of the proposed approach are verified with optical experiments.

摘要

提出了一种利用计算鬼成像和全变差最小化的光学多图像认证方法。与大多数传统认证方法中直接将多幅图像加密成类似噪声的密文不同,相关编码信息被嵌入到一幅掩护图像中,以避免被窃听者注意。首先,对多幅图像进行编码,形成由借助计算鬼成像获得的相应桶值组成的实值序列,并通过小波变换对掩护图像进行分解得到四个子图像。其次,将测量序列嵌入到其中一个子图像中,并使用相应的二进制掩码随机选择嵌入位置。为了提高安全级别,利用逻辑斯谛映射生成一个混沌序列,并用于扰乱测量强度。最重要的是,可以使用全变差最小化直接恢复高质量的原始图像。通过光学实验验证了该方法的有效性和鲁棒性。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/063c/10336455/7c5c50a375bd/gr19.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/063c/10336455/c5b23611bf22/gr1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/063c/10336455/57835782ad4b/gr2.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/063c/10336455/d0213a9c38f2/gr3.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/063c/10336455/62bcda8493d6/gr4.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/063c/10336455/88c11d89881b/gr5.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/063c/10336455/4b41c886925e/gr6.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/063c/10336455/45dca5d0d0dd/gr7.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/063c/10336455/68eb453b9a35/gr8.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/063c/10336455/b05694b97f53/gr9.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/063c/10336455/9362c41de71f/gr10.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/063c/10336455/b88725a2a2e7/gr11.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/063c/10336455/80002b5133a8/gr12.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/063c/10336455/f0bcd680ed8b/gr13.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/063c/10336455/6dd1c627a40b/gr14.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/063c/10336455/ebbc7a94d3fa/gr15.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/063c/10336455/1605b383ac29/gr16.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/063c/10336455/1df55c6903e1/gr17.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/063c/10336455/247807f8b8c6/gr18.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/063c/10336455/7c5c50a375bd/gr19.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/063c/10336455/c5b23611bf22/gr1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/063c/10336455/57835782ad4b/gr2.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/063c/10336455/d0213a9c38f2/gr3.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/063c/10336455/62bcda8493d6/gr4.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/063c/10336455/88c11d89881b/gr5.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/063c/10336455/4b41c886925e/gr6.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/063c/10336455/45dca5d0d0dd/gr7.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/063c/10336455/68eb453b9a35/gr8.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/063c/10336455/b05694b97f53/gr9.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/063c/10336455/9362c41de71f/gr10.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/063c/10336455/b88725a2a2e7/gr11.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/063c/10336455/80002b5133a8/gr12.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/063c/10336455/f0bcd680ed8b/gr13.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/063c/10336455/6dd1c627a40b/gr14.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/063c/10336455/ebbc7a94d3fa/gr15.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/063c/10336455/1605b383ac29/gr16.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/063c/10336455/1df55c6903e1/gr17.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/063c/10336455/247807f8b8c6/gr18.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/063c/10336455/7c5c50a375bd/gr19.jpg

相似文献

1
An optical multiple-image authentication based on computational ghost imaging and total-variation minimization.一种基于计算鬼成像和全变差最小化的光学多重图像认证方法。
Heliyon. 2023 Jun 29;9(7):e17682. doi: 10.1016/j.heliyon.2023.e17682. eCollection 2023 Jul.
2
Optical multiple-image authentication based on computational ghost imaging and hybrid non-convex second-order total variation.基于计算鬼成像和混合非凸二阶全变分的光学多图像认证
Opt Express. 2023 Jun 19;31(13):20887-20904. doi: 10.1364/OE.492608.
3
Optical cryptosystem based on computational ghost imaging and nonlinear authentication.基于计算鬼成像和非线性认证的光学密码系统。
Opt Express. 2024 Jan 29;32(3):4242-4253. doi: 10.1364/OE.510356.
4
Experimental demonstration of ghost-imaging-based authentication in scattering media.基于鬼成像的散射介质认证实验演示。
Opt Express. 2019 Jul 22;27(15):20558-20566. doi: 10.1364/OE.27.020558.
5
Optical authentication method based on correspondence ghost imaging.基于对应鬼成像的光学认证方法。
Appl Opt. 2023 Oct 10;62(29):7678-7688. doi: 10.1364/AO.501263.
6
Information encryption based on the customized data container under the framework of computational ghost imaging.基于计算鬼成像框架下定制数据容器的信息加密
Opt Express. 2019 Jun 10;27(12):16493-16506. doi: 10.1364/OE.27.016493.
7
Optical image hiding under framework of computational ghost imaging based on an expansion strategy.基于扩展策略的计算鬼成像框架下的光学图像隐藏
Opt Express. 2019 Mar 4;27(5):7213-7225. doi: 10.1364/OE.27.007213.
8
Optical multiple-image authentication method based on Fourier single-pixel imaging and multiple logistic maps.基于傅里叶单像素成像和多重逻辑映射的光学多图像认证方法
Opt Express. 2023 Jul 31;31(16):26535-26551. doi: 10.1364/OE.497016.
9
Encrypting orbital angular momentum holography with ghost imaging.利用鬼成像技术对轨道角动量全息术进行加密。
Opt Express. 2023 Mar 27;31(7):11717-11728. doi: 10.1364/OE.483923.
10
Computational ghost imaging with spatiotemporal encoding pseudo-random binary patterns.具有时空编码伪随机二进制模式的计算鬼成像
Opt Express. 2020 Oct 12;28(21):31163-31179. doi: 10.1364/OE.403375.

引用本文的文献

1
Blind video watermarking scheme for medical video authentication.用于医学视频认证的盲视频水印方案。
Heliyon. 2023 Sep 7;9(9):e19809. doi: 10.1016/j.heliyon.2023.e19809. eCollection 2023 Sep.

本文引用的文献

1
Light-field 3D encryption based on the monocular depth rendering.基于单目深度渲染的光场三维加密
Opt Lett. 2022 Sep 15;47(18):4762-4765. doi: 10.1364/OL.469466.
2
Asymmetric optical cryptosystem for multiple images based on devil's spiral Fresnel lens phase and random spiral transform in gyrator domain.基于魔鬼螺旋菲涅耳透镜相位和回转器域中随机螺旋变换的多图像非对称光学密码系统。
Sci Rep. 2021 Oct 21;11(1):20846. doi: 10.1038/s41598-021-00276-9.
3
Inverse computational ghost imaging for image encryption.用于图像加密的逆计算鬼成像
Opt Express. 2021 Jul 5;29(14):21290-21299. doi: 10.1364/OE.428036.
4
Metasurface-based key for computational imaging encryption.基于超表面的计算成像加密密钥
Sci Adv. 2021 May 21;7(21). doi: 10.1126/sciadv.abg0363. Print 2021 May.
5
Computational ghost imaging with spatiotemporal encoding pseudo-random binary patterns.具有时空编码伪随机二进制模式的计算鬼成像
Opt Express. 2020 Oct 12;28(21):31163-31179. doi: 10.1364/OE.403375.
6
Weighted full binary tree-sliced binary pattern: An RGB-D image descriptor.加权完全二叉树切片二进制模式:一种RGB-D图像描述符。
Heliyon. 2020 May 11;6(5):e03751. doi: 10.1016/j.heliyon.2020.e03751. eCollection 2020 May.
7
Removal of high density Gaussian noise in compressed sensing MRI reconstruction through modified total variation image denoising method.通过改进的全变差图像去噪方法在压缩感知磁共振成像重建中去除高密度高斯噪声
Heliyon. 2020 Mar 30;6(3):e03680. doi: 10.1016/j.heliyon.2020.e03680. eCollection 2020 Mar.
8
Visual cryptography in single-pixel imaging.单像素成像中的视觉密码学。
Opt Express. 2020 Mar 2;28(5):7301-7313. doi: 10.1364/OE.383240.
9
Meta-hologram-based authentication scheme employing a speckle pattern fingerprint.基于元全息图的认证方案,采用散斑图案指纹。
Opt Express. 2020 Mar 16;28(6):8924-8936. doi: 10.1364/OE.388233.
10
Estimation of optimized timely system matrix with improved image quality in iterative reconstruction algorithm: A simulation study.迭代重建算法中具有改善图像质量的优化适时系统矩阵估计:一项模拟研究。
Heliyon. 2020 Jan 22;6(1):e03279. doi: 10.1016/j.heliyon.2020.e03279. eCollection 2020 Jan.