As a promising technique, the spatial information of an object can be acquired by employing active illumination of sinusoidal patterns in the Fourier single-pixel imaging. However, the major challenge in this field is that a large number of illumination patterns should be generated to record measurements in order to avoid the loss of object details. In this paper, an optical multiple-image authentication method is proposed based on sparse sampling and multiple logistic maps. To improve the measurement efficiency, object images to be authenticated are randomly sampled based on the spatial frequency distribution with smaller size, and the Fourier sinusoid patterns generated for each frequency are converted into binarized illumination patterns using the Floyd-Steinberg error diffusion dithering algorithm. In the generation process of the ciphertext, two chaotic sequences are used to randomly select spatial frequency for each object image and scramble all measurements, respectively. Considering initial values and bifurcation parameters of logistic maps as secret keys, the security of the cryptosystem can be greatly enhanced. For the first time to our knowledge, how to authenticate the reconstructed object image is implemented using a significantly low number of measurements (i.e., at a very low sampling ratio less than 5% of Nyquist limit) in the Fourier single-pixel imaging. The experimental results as well as simulations illustrate the feasibility of the proposed multiple-image authentication mechanism, which can provide an effective alternative for the related research.

Download full-text PDF

Source
http://dx.doi.org/10.1364/OE.497016DOI Listing

Publication Analysis

Top Keywords

multiple-image authentication
12
fourier single-pixel
12
single-pixel imaging
12
logistic maps
12
optical multiple-image
8
authentication method
8
multiple logistic
8
illumination patterns
8
patterns generated
8
spatial frequency
8

Similar Publications

An interesting security method for a multiple-image authentication scheme is proposed based on computer-generated holograms and a logistic map. First, each original image is encoded as the complex-valued hologram under the point light source model. The resulting hologram is then converted to a phase-only hologram using the Floyd-Steinberg dithering algorithm.

View Article and Find Full Text PDF

If we visit famous and iconic landmarks, we may want to take a photo of them. However, such sites are usually crowded, and taking photos with only landmarks without people could be challenging. This paper aims to automatically remove people in a picture and produce a natural image of the landmark alone.

View Article and Find Full Text PDF

As a promising technique, the spatial information of an object can be acquired by employing active illumination of sinusoidal patterns in the Fourier single-pixel imaging. However, the major challenge in this field is that a large number of illumination patterns should be generated to record measurements in order to avoid the loss of object details. In this paper, an optical multiple-image authentication method is proposed based on sparse sampling and multiple logistic maps.

View Article and Find Full Text PDF
Article Synopsis
  • The proposed method uses computational ghost imaging and total-variation minimization to create an optical system for authenticating multiple images while keeping them concealed in a cover image.* -
  • Instead of directly encrypting images into ciphertext, the images are encoded into real-valued sequences and hidden within sub-images derived from a cover image through wavelet transform.* -
  • The process includes random embedding of these sequences and enhances security by scrambling data with a chaotic sequence generated from a logistic map, allowing for high-quality recovery of the original images.*
View Article and Find Full Text PDF

An optical security method for multiple-image authentication is proposed based on computational ghost imaging and hybrid non-convex second-order total variation. Firstly, each original image to be authenticated is encoded to the sparse information using computational ghost imaging, where illumination patterns are generated based on Hadamard matrix. In the same time, the cover image is divided into four sub-images with wavelet transform.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!