Loading…

Optical image hiding based on computational ghost imaging

Imaging hiding schemes play important roles in now big data times. They provide copyright protections of digital images. In the paper, we propose a novel image hiding scheme based on computational ghost imaging to have strong robustness and high security. The watermark is encrypted with the configur...

Full description

Saved in:
Bibliographic Details
Published in:Optics communications 2016-05, Vol.366, p.314-320
Main Authors: Wang, Le, Zhao, Shengmei, Cheng, Weiwen, Gong, Longyan, Chen, Hanwu
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c479t-e6a51e84ed57363c8fa427e31c6dbefd5567fe99765723d1abf183a15f2bba763
cites cdi_FETCH-LOGICAL-c479t-e6a51e84ed57363c8fa427e31c6dbefd5567fe99765723d1abf183a15f2bba763
container_end_page 320
container_issue
container_start_page 314
container_title Optics communications
container_volume 366
creator Wang, Le
Zhao, Shengmei
Cheng, Weiwen
Gong, Longyan
Chen, Hanwu
description Imaging hiding schemes play important roles in now big data times. They provide copyright protections of digital images. In the paper, we propose a novel image hiding scheme based on computational ghost imaging to have strong robustness and high security. The watermark is encrypted with the configuration of a computational ghost imaging system, and the random speckle patterns compose a secret key. Least significant bit algorithm is adopted to embed the watermark and both the second-order correlation algorithm and the compressed sensing (CS) algorithm are used to extract the watermark. The experimental and simulation results show that the authorized users can get the watermark with the secret key. The watermark image could not be retrieved when the eavesdropping ratio is less than 45% with the second-order correlation algorithm, whereas it is less than 20% with the TVAL3 CS reconstructed algorithm. In addition, the proposed scheme is robust against the ‘salt and pepper’ noise and image cropping degradations. •We propose an image hiding scheme based on computational ghost imaging (CGI) system.•We demonstrate the feasibility of the proposed image hiding scheme by experiment and numerical simulation. Then we test the robustness of the proposed scheme against ‘salt and pepper’ noise and image cropping operation and the security against eavesdropping by experiments.•Comparing with LSB algorithm, the encrypted watermark image produced with the aid of the CGI system, instead of the original watermark image, is embedded into a host image in the proposed scheme, which is complete noise even if eavesdropper has known the proper reconstruction mechanism but has no secret keys.•The scheme paves a way to exploit an image hiding technique combing with ghost imaging, so as to significantly enhance the security and robustness of image hiding techniques.
doi_str_mv 10.1016/j.optcom.2016.01.026
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1816067335</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0030401816300268</els_id><sourcerecordid>1816067335</sourcerecordid><originalsourceid>FETCH-LOGICAL-c479t-e6a51e84ed57363c8fa427e31c6dbefd5567fe99765723d1abf183a15f2bba763</originalsourceid><addsrcrecordid>eNp9kE1LxDAQhoMouK7-Aw89emmdadqkvQiy-AULe9FzSNPpbpZuU5us4L83az17Ggae92XmYewWIUNAcb_P3BiMO2R53DLADHJxxhZYSZ4CRzhnCwAOaQFYXbIr7_cAgAWvFqzejMEa3Sf2oLeU7Gxrh23SaE9t4oYklo7HoIN1Q2S2O-fDLxmha3bR6d7Tzd9cso_np_fVa7revLytHtepKWQdUhK6RKoKakvJBTdVp4tcEkcj2oa6tiyF7KiupShlzlvUTYcV11h2edNoKfiS3c294-Q-j-SDOlhvqO_1QO7oFVYoQEjOy4gWM2om5_1EnRqneO30rRDUyZTaq9mUOplSgCqairGHOUbxjS9Lk_LG0mCotROZoFpn_y_4AYt2c60</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1816067335</pqid></control><display><type>article</type><title>Optical image hiding based on computational ghost imaging</title><source>Elsevier:Jisc Collections:Elsevier Read and Publish Agreement 2022-2024:Freedom Collection (Reading list)</source><creator>Wang, Le ; Zhao, Shengmei ; Cheng, Weiwen ; Gong, Longyan ; Chen, Hanwu</creator><creatorcontrib>Wang, Le ; Zhao, Shengmei ; Cheng, Weiwen ; Gong, Longyan ; Chen, Hanwu</creatorcontrib><description>Imaging hiding schemes play important roles in now big data times. They provide copyright protections of digital images. In the paper, we propose a novel image hiding scheme based on computational ghost imaging to have strong robustness and high security. The watermark is encrypted with the configuration of a computational ghost imaging system, and the random speckle patterns compose a secret key. Least significant bit algorithm is adopted to embed the watermark and both the second-order correlation algorithm and the compressed sensing (CS) algorithm are used to extract the watermark. The experimental and simulation results show that the authorized users can get the watermark with the secret key. The watermark image could not be retrieved when the eavesdropping ratio is less than 45% with the second-order correlation algorithm, whereas it is less than 20% with the TVAL3 CS reconstructed algorithm. In addition, the proposed scheme is robust against the ‘salt and pepper’ noise and image cropping degradations. •We propose an image hiding scheme based on computational ghost imaging (CGI) system.•We demonstrate the feasibility of the proposed image hiding scheme by experiment and numerical simulation. Then we test the robustness of the proposed scheme against ‘salt and pepper’ noise and image cropping operation and the security against eavesdropping by experiments.•Comparing with LSB algorithm, the encrypted watermark image produced with the aid of the CGI system, instead of the original watermark image, is embedded into a host image in the proposed scheme, which is complete noise even if eavesdropper has known the proper reconstruction mechanism but has no secret keys.•The scheme paves a way to exploit an image hiding technique combing with ghost imaging, so as to significantly enhance the security and robustness of image hiding techniques.</description><identifier>ISSN: 0030-4018</identifier><identifier>EISSN: 1873-0310</identifier><identifier>DOI: 10.1016/j.optcom.2016.01.026</identifier><language>eng</language><publisher>Elsevier B.V</publisher><subject>Algorithms ; Computation ; Computational ghost imaging ; Correlation ; Digital watermarking ; Eavesdropping ; Ghosts ; Imaging ; Imaging reconstruction techniques ; Least significant bit ; Watermarking</subject><ispartof>Optics communications, 2016-05, Vol.366, p.314-320</ispartof><rights>2016 Elsevier B.V.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c479t-e6a51e84ed57363c8fa427e31c6dbefd5567fe99765723d1abf183a15f2bba763</citedby><cites>FETCH-LOGICAL-c479t-e6a51e84ed57363c8fa427e31c6dbefd5567fe99765723d1abf183a15f2bba763</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Wang, Le</creatorcontrib><creatorcontrib>Zhao, Shengmei</creatorcontrib><creatorcontrib>Cheng, Weiwen</creatorcontrib><creatorcontrib>Gong, Longyan</creatorcontrib><creatorcontrib>Chen, Hanwu</creatorcontrib><title>Optical image hiding based on computational ghost imaging</title><title>Optics communications</title><description>Imaging hiding schemes play important roles in now big data times. They provide copyright protections of digital images. In the paper, we propose a novel image hiding scheme based on computational ghost imaging to have strong robustness and high security. The watermark is encrypted with the configuration of a computational ghost imaging system, and the random speckle patterns compose a secret key. Least significant bit algorithm is adopted to embed the watermark and both the second-order correlation algorithm and the compressed sensing (CS) algorithm are used to extract the watermark. The experimental and simulation results show that the authorized users can get the watermark with the secret key. The watermark image could not be retrieved when the eavesdropping ratio is less than 45% with the second-order correlation algorithm, whereas it is less than 20% with the TVAL3 CS reconstructed algorithm. In addition, the proposed scheme is robust against the ‘salt and pepper’ noise and image cropping degradations. •We propose an image hiding scheme based on computational ghost imaging (CGI) system.•We demonstrate the feasibility of the proposed image hiding scheme by experiment and numerical simulation. Then we test the robustness of the proposed scheme against ‘salt and pepper’ noise and image cropping operation and the security against eavesdropping by experiments.•Comparing with LSB algorithm, the encrypted watermark image produced with the aid of the CGI system, instead of the original watermark image, is embedded into a host image in the proposed scheme, which is complete noise even if eavesdropper has known the proper reconstruction mechanism but has no secret keys.•The scheme paves a way to exploit an image hiding technique combing with ghost imaging, so as to significantly enhance the security and robustness of image hiding techniques.</description><subject>Algorithms</subject><subject>Computation</subject><subject>Computational ghost imaging</subject><subject>Correlation</subject><subject>Digital watermarking</subject><subject>Eavesdropping</subject><subject>Ghosts</subject><subject>Imaging</subject><subject>Imaging reconstruction techniques</subject><subject>Least significant bit</subject><subject>Watermarking</subject><issn>0030-4018</issn><issn>1873-0310</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><recordid>eNp9kE1LxDAQhoMouK7-Aw89emmdadqkvQiy-AULe9FzSNPpbpZuU5us4L83az17Ggae92XmYewWIUNAcb_P3BiMO2R53DLADHJxxhZYSZ4CRzhnCwAOaQFYXbIr7_cAgAWvFqzejMEa3Sf2oLeU7Gxrh23SaE9t4oYklo7HoIN1Q2S2O-fDLxmha3bR6d7Tzd9cso_np_fVa7revLytHtepKWQdUhK6RKoKakvJBTdVp4tcEkcj2oa6tiyF7KiupShlzlvUTYcV11h2edNoKfiS3c294-Q-j-SDOlhvqO_1QO7oFVYoQEjOy4gWM2om5_1EnRqneO30rRDUyZTaq9mUOplSgCqairGHOUbxjS9Lk_LG0mCotROZoFpn_y_4AYt2c60</recordid><startdate>20160501</startdate><enddate>20160501</enddate><creator>Wang, Le</creator><creator>Zhao, Shengmei</creator><creator>Cheng, Weiwen</creator><creator>Gong, Longyan</creator><creator>Chen, Hanwu</creator><general>Elsevier B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>7U5</scope><scope>8FD</scope><scope>H8D</scope><scope>L7M</scope></search><sort><creationdate>20160501</creationdate><title>Optical image hiding based on computational ghost imaging</title><author>Wang, Le ; Zhao, Shengmei ; Cheng, Weiwen ; Gong, Longyan ; Chen, Hanwu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c479t-e6a51e84ed57363c8fa427e31c6dbefd5567fe99765723d1abf183a15f2bba763</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Algorithms</topic><topic>Computation</topic><topic>Computational ghost imaging</topic><topic>Correlation</topic><topic>Digital watermarking</topic><topic>Eavesdropping</topic><topic>Ghosts</topic><topic>Imaging</topic><topic>Imaging reconstruction techniques</topic><topic>Least significant bit</topic><topic>Watermarking</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Wang, Le</creatorcontrib><creatorcontrib>Zhao, Shengmei</creatorcontrib><creatorcontrib>Cheng, Weiwen</creatorcontrib><creatorcontrib>Gong, Longyan</creatorcontrib><creatorcontrib>Chen, Hanwu</creatorcontrib><collection>CrossRef</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Solid State and Superconductivity Abstracts</collection><collection>Technology Research Database</collection><collection>Aerospace Database</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>Optics communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Wang, Le</au><au>Zhao, Shengmei</au><au>Cheng, Weiwen</au><au>Gong, Longyan</au><au>Chen, Hanwu</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Optical image hiding based on computational ghost imaging</atitle><jtitle>Optics communications</jtitle><date>2016-05-01</date><risdate>2016</risdate><volume>366</volume><spage>314</spage><epage>320</epage><pages>314-320</pages><issn>0030-4018</issn><eissn>1873-0310</eissn><abstract>Imaging hiding schemes play important roles in now big data times. They provide copyright protections of digital images. In the paper, we propose a novel image hiding scheme based on computational ghost imaging to have strong robustness and high security. The watermark is encrypted with the configuration of a computational ghost imaging system, and the random speckle patterns compose a secret key. Least significant bit algorithm is adopted to embed the watermark and both the second-order correlation algorithm and the compressed sensing (CS) algorithm are used to extract the watermark. The experimental and simulation results show that the authorized users can get the watermark with the secret key. The watermark image could not be retrieved when the eavesdropping ratio is less than 45% with the second-order correlation algorithm, whereas it is less than 20% with the TVAL3 CS reconstructed algorithm. In addition, the proposed scheme is robust against the ‘salt and pepper’ noise and image cropping degradations. •We propose an image hiding scheme based on computational ghost imaging (CGI) system.•We demonstrate the feasibility of the proposed image hiding scheme by experiment and numerical simulation. Then we test the robustness of the proposed scheme against ‘salt and pepper’ noise and image cropping operation and the security against eavesdropping by experiments.•Comparing with LSB algorithm, the encrypted watermark image produced with the aid of the CGI system, instead of the original watermark image, is embedded into a host image in the proposed scheme, which is complete noise even if eavesdropper has known the proper reconstruction mechanism but has no secret keys.•The scheme paves a way to exploit an image hiding technique combing with ghost imaging, so as to significantly enhance the security and robustness of image hiding techniques.</abstract><pub>Elsevier B.V</pub><doi>10.1016/j.optcom.2016.01.026</doi><tpages>7</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0030-4018
ispartof Optics communications, 2016-05, Vol.366, p.314-320
issn 0030-4018
1873-0310
language eng
recordid cdi_proquest_miscellaneous_1816067335
source Elsevier:Jisc Collections:Elsevier Read and Publish Agreement 2022-2024:Freedom Collection (Reading list)
subjects Algorithms
Computation
Computational ghost imaging
Correlation
Digital watermarking
Eavesdropping
Ghosts
Imaging
Imaging reconstruction techniques
Least significant bit
Watermarking
title Optical image hiding based on computational ghost imaging
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T04%3A16%3A27IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Optical%20image%20hiding%20based%20on%20computational%20ghost%20imaging&rft.jtitle=Optics%20communications&rft.au=Wang,%20Le&rft.date=2016-05-01&rft.volume=366&rft.spage=314&rft.epage=320&rft.pages=314-320&rft.issn=0030-4018&rft.eissn=1873-0310&rft_id=info:doi/10.1016/j.optcom.2016.01.026&rft_dat=%3Cproquest_cross%3E1816067335%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c479t-e6a51e84ed57363c8fa427e31c6dbefd5567fe99765723d1abf183a15f2bba763%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1816067335&rft_id=info:pmid/&rfr_iscdi=true