Optical image encryption via high-quality computational ghost imaging using iterative phase retrieval

A novel computational ghost imaging scheme based on specially designed phase-only masks, which can be efficiently applied to encrypt an original image into a series of measured intensities, is proposed in this paper. First, a Hadamard matrix with a certain order is generated, where the number of ele...

Full description

Saved in:
Bibliographic Details
Main Authors: Asundi, Anand Krishna, Sui, Liansheng, Cheng, Yin, Li, Bing, Tian, Ailing
Other Authors: School of Mechanical and Aerospace Engineering
Format: Article
Language:English
Published: 2019
Subjects:
Online Access:https://hdl.handle.net/10356/87106
http://hdl.handle.net/10220/49867
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-87106
record_format dspace
spelling sg-ntu-dr.10356-871062023-03-04T17:14:01Z Optical image encryption via high-quality computational ghost imaging using iterative phase retrieval Asundi, Anand Krishna Sui, Liansheng Cheng, Yin Li, Bing Tian, Ailing School of Mechanical and Aerospace Engineering Computational Imaging Optical Security and Encryption Engineering::Mechanical engineering A novel computational ghost imaging scheme based on specially designed phase-only masks, which can be efficiently applied to encrypt an original image into a series of measured intensities, is proposed in this paper. First, a Hadamard matrix with a certain order is generated, where the number of elements in each row is equal to the size of the original image to be encrypted. Each row of the matrix is rearranged into the corresponding 2D pattern. Then, each pattern is encoded into the phase-only masks by making use of an iterative phase retrieval algorithm. These specially designed masks can be wholly or partially used in the process of computational ghost imaging to reconstruct the original information with high quality. When a significantly small number of phase-only masks are used to record the measured intensities in a single-pixel bucket detector, the information can be authenticated without clear visualization by calculating the nonlinear correlation map between the original image and its reconstruction. The results illustrate the feasibility and effectiveness of the proposed computational ghost imaging mechanism, which will provide an effective alternative for enriching the related research on the computational ghost imaging technique. Published version 2019-09-04T06:52:18Z 2019-12-06T16:35:19Z 2019-09-04T06:52:18Z 2019-12-06T16:35:19Z 2018 Journal Article Sui, L., Cheng, Y., Li, B., Tian, A., & Asundi, A. K. (2018). Optical image encryption via high-quality computational ghost imaging using iterative phase retrieval. Laser Physics Letters, 15(7), 075204-. doi:10.1088/1612-202X/aac002 1612-2011 https://hdl.handle.net/10356/87106 http://hdl.handle.net/10220/49867 10.1088/1612-202X/aac002 en Laser Physics Letters © 2018 Astro Ltd (published by IOP Publishing). Original content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI. 9 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Computational Imaging
Optical Security and Encryption
Engineering::Mechanical engineering
spellingShingle Computational Imaging
Optical Security and Encryption
Engineering::Mechanical engineering
Asundi, Anand Krishna
Sui, Liansheng
Cheng, Yin
Li, Bing
Tian, Ailing
Optical image encryption via high-quality computational ghost imaging using iterative phase retrieval
description A novel computational ghost imaging scheme based on specially designed phase-only masks, which can be efficiently applied to encrypt an original image into a series of measured intensities, is proposed in this paper. First, a Hadamard matrix with a certain order is generated, where the number of elements in each row is equal to the size of the original image to be encrypted. Each row of the matrix is rearranged into the corresponding 2D pattern. Then, each pattern is encoded into the phase-only masks by making use of an iterative phase retrieval algorithm. These specially designed masks can be wholly or partially used in the process of computational ghost imaging to reconstruct the original information with high quality. When a significantly small number of phase-only masks are used to record the measured intensities in a single-pixel bucket detector, the information can be authenticated without clear visualization by calculating the nonlinear correlation map between the original image and its reconstruction. The results illustrate the feasibility and effectiveness of the proposed computational ghost imaging mechanism, which will provide an effective alternative for enriching the related research on the computational ghost imaging technique.
author2 School of Mechanical and Aerospace Engineering
author_facet School of Mechanical and Aerospace Engineering
Asundi, Anand Krishna
Sui, Liansheng
Cheng, Yin
Li, Bing
Tian, Ailing
format Article
author Asundi, Anand Krishna
Sui, Liansheng
Cheng, Yin
Li, Bing
Tian, Ailing
author_sort Asundi, Anand Krishna
title Optical image encryption via high-quality computational ghost imaging using iterative phase retrieval
title_short Optical image encryption via high-quality computational ghost imaging using iterative phase retrieval
title_full Optical image encryption via high-quality computational ghost imaging using iterative phase retrieval
title_fullStr Optical image encryption via high-quality computational ghost imaging using iterative phase retrieval
title_full_unstemmed Optical image encryption via high-quality computational ghost imaging using iterative phase retrieval
title_sort optical image encryption via high-quality computational ghost imaging using iterative phase retrieval
publishDate 2019
url https://hdl.handle.net/10356/87106
http://hdl.handle.net/10220/49867
_version_ 1759854269590142976