Optical image encryption via high-quality computational ghost imaging using iterative phase retrieval
A novel computational ghost imaging scheme based on specially designed phase-only masks, which can be efficiently applied to encrypt an original image into a series of measured intensities, is proposed in this paper. First, a Hadamard matrix with a certain order is generated, where the number of ele...
Saved in:
Main Authors: | , , , , |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
2019
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/87106 http://hdl.handle.net/10220/49867 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-87106 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-871062023-03-04T17:14:01Z Optical image encryption via high-quality computational ghost imaging using iterative phase retrieval Asundi, Anand Krishna Sui, Liansheng Cheng, Yin Li, Bing Tian, Ailing School of Mechanical and Aerospace Engineering Computational Imaging Optical Security and Encryption Engineering::Mechanical engineering A novel computational ghost imaging scheme based on specially designed phase-only masks, which can be efficiently applied to encrypt an original image into a series of measured intensities, is proposed in this paper. First, a Hadamard matrix with a certain order is generated, where the number of elements in each row is equal to the size of the original image to be encrypted. Each row of the matrix is rearranged into the corresponding 2D pattern. Then, each pattern is encoded into the phase-only masks by making use of an iterative phase retrieval algorithm. These specially designed masks can be wholly or partially used in the process of computational ghost imaging to reconstruct the original information with high quality. When a significantly small number of phase-only masks are used to record the measured intensities in a single-pixel bucket detector, the information can be authenticated without clear visualization by calculating the nonlinear correlation map between the original image and its reconstruction. The results illustrate the feasibility and effectiveness of the proposed computational ghost imaging mechanism, which will provide an effective alternative for enriching the related research on the computational ghost imaging technique. Published version 2019-09-04T06:52:18Z 2019-12-06T16:35:19Z 2019-09-04T06:52:18Z 2019-12-06T16:35:19Z 2018 Journal Article Sui, L., Cheng, Y., Li, B., Tian, A., & Asundi, A. K. (2018). Optical image encryption via high-quality computational ghost imaging using iterative phase retrieval. Laser Physics Letters, 15(7), 075204-. doi:10.1088/1612-202X/aac002 1612-2011 https://hdl.handle.net/10356/87106 http://hdl.handle.net/10220/49867 10.1088/1612-202X/aac002 en Laser Physics Letters © 2018 Astro Ltd (published by IOP Publishing). Original content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI. 9 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Computational Imaging Optical Security and Encryption Engineering::Mechanical engineering |
spellingShingle |
Computational Imaging Optical Security and Encryption Engineering::Mechanical engineering Asundi, Anand Krishna Sui, Liansheng Cheng, Yin Li, Bing Tian, Ailing Optical image encryption via high-quality computational ghost imaging using iterative phase retrieval |
description |
A novel computational ghost imaging scheme based on specially designed phase-only masks, which can be efficiently applied to encrypt an original image into a series of measured intensities, is proposed in this paper. First, a Hadamard matrix with a certain order is generated, where the number of elements in each row is equal to the size of the original image to be encrypted. Each row of the matrix is rearranged into the corresponding 2D pattern. Then, each pattern is encoded into the phase-only masks by making use of an iterative phase retrieval algorithm. These specially designed masks can be wholly or partially used in the process of computational ghost imaging to reconstruct the original information with high quality. When a significantly small number of phase-only masks are used to record the measured intensities in a single-pixel bucket detector, the information can be authenticated without clear visualization by calculating the nonlinear correlation map between the original image and its reconstruction. The results illustrate the feasibility and effectiveness of the proposed computational ghost imaging mechanism, which will provide an effective alternative for enriching the related research on the computational ghost imaging technique. |
author2 |
School of Mechanical and Aerospace Engineering |
author_facet |
School of Mechanical and Aerospace Engineering Asundi, Anand Krishna Sui, Liansheng Cheng, Yin Li, Bing Tian, Ailing |
format |
Article |
author |
Asundi, Anand Krishna Sui, Liansheng Cheng, Yin Li, Bing Tian, Ailing |
author_sort |
Asundi, Anand Krishna |
title |
Optical image encryption via high-quality computational ghost imaging using iterative phase retrieval |
title_short |
Optical image encryption via high-quality computational ghost imaging using iterative phase retrieval |
title_full |
Optical image encryption via high-quality computational ghost imaging using iterative phase retrieval |
title_fullStr |
Optical image encryption via high-quality computational ghost imaging using iterative phase retrieval |
title_full_unstemmed |
Optical image encryption via high-quality computational ghost imaging using iterative phase retrieval |
title_sort |
optical image encryption via high-quality computational ghost imaging using iterative phase retrieval |
publishDate |
2019 |
url |
https://hdl.handle.net/10356/87106 http://hdl.handle.net/10220/49867 |
_version_ |
1759854269590142976 |