Optical image hiding under framework of computational ghost imaging based on an expansion strategy
A novel optical image hiding scheme based on an expansion strategy is presented under the framework of computational ghost imaging. The image to be hidden is concealed into an expanded interim with the same size as the host image. This is implemented by rearranging the measured intensities of the or...
Saved in:
Main Authors: | , , , |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
2019
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/106810 http://hdl.handle.net/10220/49649 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-106810 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1068102023-03-04T17:21:33Z Optical image hiding under framework of computational ghost imaging based on an expansion strategy Anand, Asundi Sui, Liansheng Wang, Jiahao Tian, Ailing School of Mechanical and Aerospace Engineering Computational Imaging Compressive Imaging Engineering::Mechanical engineering A novel optical image hiding scheme based on an expansion strategy is presented under the framework of computational ghost imaging. The image to be hidden is concealed into an expanded interim with the same size as the host image. This is implemented by rearranging the measured intensities of the original object after the process of ghost imaging. An initial Hadamard matrix is used to generate additional matrices by shifting it circularly along the column direction, so that enough 2D patterns are engendered to retrieve phase-only profiles for imaging. Next, the frequency coefficients of the host image are modified with that of the expanded interim by controlling a small weighting factor. After an inverse transform, the host image carrying the hidden information can be obtained with high imperceptibility. Security is assured by considering optical parameters, such as wavelength and axial distance, as secret keys due to their high sensitivity to tiny change. Importantly, differing from other computational ghost imaging based schemes, many phase-only profiles are used to collect the measured intensities to enhance the resistance against noise and occlusion attacks. The simulated experiments illustrate the feasibility and effectiveness of the proposed scheme. Published version 2019-08-15T05:24:46Z 2019-12-06T22:18:53Z 2019-08-15T05:24:46Z 2019-12-06T22:18:53Z 2019 Journal Article Sui, L., Wang, J., Tian, A., & Anand, A. (2019). Optical image hiding under framework of computational ghost imaging based on an expansion strategy. Optics Express, 27(5), 7213-7225. doi:10.1364/OE.27.007213 1094-4087 https://hdl.handle.net/10356/106810 http://hdl.handle.net/10220/49649 10.1364/OE.27.007213 en Optics Express © 2019 Optical Society of America under the terms of the OSA Open Access Publishing Agreement. Users may use, reuse, and build upon the article, or use the article for text or data mining, so long as such uses are for non-commercial purposes and appropriate attribution is maintained. All other rights are reserved. 13 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Computational Imaging Compressive Imaging Engineering::Mechanical engineering |
spellingShingle |
Computational Imaging Compressive Imaging Engineering::Mechanical engineering Anand, Asundi Sui, Liansheng Wang, Jiahao Tian, Ailing Optical image hiding under framework of computational ghost imaging based on an expansion strategy |
description |
A novel optical image hiding scheme based on an expansion strategy is presented under the framework of computational ghost imaging. The image to be hidden is concealed into an expanded interim with the same size as the host image. This is implemented by rearranging the measured intensities of the original object after the process of ghost imaging. An initial Hadamard matrix is used to generate additional matrices by shifting it circularly along the column direction, so that enough 2D patterns are engendered to retrieve phase-only profiles for imaging. Next, the frequency coefficients of the host image are modified with that of the expanded interim by controlling a small weighting factor. After an inverse transform, the host image carrying the hidden information can be obtained with high imperceptibility. Security is assured by considering optical parameters, such as wavelength and axial distance, as secret keys due to their high sensitivity to tiny change. Importantly, differing from other computational ghost imaging based schemes, many phase-only profiles are used to collect the measured intensities to enhance the resistance against noise and occlusion attacks. The simulated experiments illustrate the feasibility and effectiveness of the proposed scheme. |
author2 |
School of Mechanical and Aerospace Engineering |
author_facet |
School of Mechanical and Aerospace Engineering Anand, Asundi Sui, Liansheng Wang, Jiahao Tian, Ailing |
format |
Article |
author |
Anand, Asundi Sui, Liansheng Wang, Jiahao Tian, Ailing |
author_sort |
Anand, Asundi |
title |
Optical image hiding under framework of computational ghost imaging based on an expansion strategy |
title_short |
Optical image hiding under framework of computational ghost imaging based on an expansion strategy |
title_full |
Optical image hiding under framework of computational ghost imaging based on an expansion strategy |
title_fullStr |
Optical image hiding under framework of computational ghost imaging based on an expansion strategy |
title_full_unstemmed |
Optical image hiding under framework of computational ghost imaging based on an expansion strategy |
title_sort |
optical image hiding under framework of computational ghost imaging based on an expansion strategy |
publishDate |
2019 |
url |
https://hdl.handle.net/10356/106810 http://hdl.handle.net/10220/49649 |
_version_ |
1759854326529916928 |