光学与光电技术, 2022, 20 (1): 77, 网络出版: 2022-03-16   

基于二值化计算鬼成像的图像隐藏方法

Image Hiding Method Based on Binary Calculation of Ghost Imaging
作者单位
四川大学电子信息学院, 四川 成都 610065
摘要
图像隐藏技术在当今大数据时代扮演着重要角色, 尤其在版权保护和保密通信等领域中有着巨大的应用价值。提出了一种基于计算鬼成像的图像隐藏方法, 目标图像经过计算鬼成像系统加密, 随机散斑作为系统密钥, 将密文进行二值化后的结果采用最低有效位算法嵌入到宿主图像中, 利用相应的水印提取规则和二阶相关算法恢复目标图像。仿真结果表明, 该方法具有较好的隐蔽性, 嵌入水印图像的峰值信噪比可以达到50 dB, 授权用户可以用密钥获得目标图像, 同时, 所提方案有一定的容错能力, 对椒盐噪声和图像裁剪具有一定的鲁棒性。
Abstract
Image hiding technology plays an important role in the era of big data, especially in the fields of copyright protection and confidential communication. An image hiding method based on computational ghost imaging is proposed in this paper. The target image is encrypted by the computational ghost imaging system, random speckle is used as the system key, and the result of the binary ciphertext is embedded into the host image using the least significant bit algorithm. The corresponding watermark extraction rules and the second-order correlation algorithm are used to restore the target image. The simulation results show that the method has good concealment. The peak signal-to-noise ratio of the embedded watermark image can reach 50 dB. The authorized user can use the key to obtain the target image. At the same time, the proposed scheme has a certain fault tolerance. Image cropping is robust.
参考文献

[1] Javidi B, Carnicer A, Yamaguchi M, et al. Roadmap on optical security[J]. Journal of Optics, 2016, 18(8): 083001.

[2] Chen W, Javidi B, Chen X. Advances in optical security systems[J]. Advances in Optics and Photonics, 2014, 6(2): 120-155.

[3] Refregier P, Javidi B. Optical image encryption based on input plane and Fourier plane random encoding[J]. Optics letters, 1995, 20(7): 767-769.

[4] Situ G, Zhang J. Double random-phase encoding in the Fresnel domain[J]. Optics Letters, 2004, 29(14): 1584-1586.

[5] Zhang Y, Wang B. Optical image encryption based on interference[J]. Optics Letters, 2008, 33(21): 2443-2445.

[6] Wang X, Zhao D. Optical image hiding with silhouette removal based on the optical interference principle[J]. Applied optics, 2012, 51(6): 686-691.

[7] Xie P, Shi X, Huang X, et al. Binary detection in ghost imaging with preserved grayscale[J]. The European Physical Journal D, 2019, 73(5): 102.

[8] Chen W, Chen X. Ghost imaging for three-dimensional optical security[J]. Applied Physics Letters, 2013, 103(22): 221106.

[9] Wu J, Xie Z, Liu Z, et al. Multiple-image encryption based on computational ghost imaging[J]. Optics Communications, 2016, 359(2): 38-43.

[10] Chen W, Chen X. Ghost imaging using labyrinth-like phase modulation patterns for high-efficiency and high-security optical encryption[J]. EPL (Europhysics Letters), 2015, 109(1): 14001.

[11] Li J P, Song L, Chen L, et al. Quadratic polar coordinate transform technique for the demodulation of circular carrier interferogram[J]. Optics Communications, 2015, 336(8): 166-172.

[12] Li J, Li H, Li J, et al. Compressive optical image encryption with two-step-only quadrature phase-shifting digital holography[J]. Optics Communications, 2015, 344(2): 166-171.

[13] Li X, Meng X, Yang X, et al. Multiple-image encryption based on compressive ghost imaging and coordinate sampling[J]. IEEE Photonics Journal, 2016, 8(4): 1-11.

[14] Clemente P, Durán V, Tajahuerce E, et al. Optical encryption based on computational ghost imaging[J]. Optics letters, 2010, 35(14): 2391-2393.

[15] Chen W, Chen X. Marked ghost imaging[J]. Applied Physics Letters, 2014, 104(25): 251109.

[16] Wang L, Zhao S, Cheng W, et al. Optical image hiding based on computational ghost imaging[J]. Optics Communications, 2016, 366(6): 314-320.

[17] Liansheng S, Yin C, Ailing T, et al. An optical watermarking scheme with two-layer framework based on computational ghost imaging[J]. Optics and Lasers in Engineering, 2018, 107(3): 38-45.

[18] Yuan S, Magayane D A, Liu X, et al. A blind watermarking scheme based on computational ghost imaging in wavelet domain[J]. Optics Communications, 2021, 482(5): 126568.

杨忠卓, 白星, 余展, 王玉杰, 陈星宇, 周昕. 基于二值化计算鬼成像的图像隐藏方法[J]. 光学与光电技术, 2022, 20(1): 77. YANG Zhong-zhuo, BAI Xing, YU Zhan, WANG Yu-jie, CHEN Xing-yu, ZHOU Xin. Image Hiding Method Based on Binary Calculation of Ghost Imaging[J]. OPTICS & OPTOELECTRONIC TECHNOLOGY, 2022, 20(1): 77.

本文已被 2 篇论文引用
被引统计数据来源于中国光学期刊网
引用该论文: TXT   |   EndNote

相关论文

加载中...

关于本站 Cookie 的使用提示

中国光学期刊网使用基于 cookie 的技术来更好地为您提供各项服务,点击此处了解我们的隐私策略。 如您需继续使用本网站,请您授权我们使用本地 cookie 来保存部分信息。
全站搜索
您最值得信赖的光电行业旗舰网络服务平台!