搜索

x

留言板

姓名
邮箱
手机号码
标题
留言内容
验证码

引用本文:
Citation:

赵一宁, 陈琳珊, 孔令鑫, 王翀, 任承, 徐宝龙, 曹德忠
cstr: 32037.14.aps.74.20250592

Ghost imaging based on two-dimensional permutational encryption

ZHAO Yining, CHEN Linshan, KONG Lingxin, WANG Chong, REN Cheng, XU Baolong, CAO Dezhong
cstr: 32037.14.aps.74.20250592
Article Text (iFLYTEK Translation)
PDF
HTML
导出引用
  • 本文提出了一种基于鬼成像的二维图像置换加密方案, 以二维随机矩阵之Kronecker积作为测量矩阵, 结合置换矩阵, 形成灵活多变的加密方式. 加密方案以图像的二维分布为基准, 采用两个随机矩阵和两个置换矩阵, 对图像进行加密操作. 这些矩阵及其排序信息都是图像加密的有效手段. 只有当随机矩阵和置换矩阵的具体形式及其排序信息完全正确时, 才能够成功解密图像. 具体而言, 在鬼成像研究中, 首先利用矩阵相乘及其Kronecker积, 将随机矩阵和置换矩阵制备成实验所需的测量矩阵, 再将测量矩阵形成一系列待投影散斑图案. 实验上, 采用空间光调制器加载物体和随机散斑图案, 利用CCD作为桶探测器采集桶测量信号, 研究了8种排序的图像置换加密及相应解密方案. 方案所提出的二维置换鬼成像加密方法灵活多变, 也为图像水印与图像隐匿等图像处理技术提供了一种新思路.
    Ghost imaging is closely related to image encryption, since the random speckle patterns are often utilized. In the two-dimensional (2D) case, computational ghost imaging can be realized through $ \boldsymbol{L}\boldsymbol{X}{\boldsymbol{R}}^{\mathrm{T}}=\boldsymbol{Y} $, where $ \boldsymbol{X} $ is a 2D object, $ \boldsymbol{Y} $ is the bucket detection signals reshaped into a 2D form, and $ \boldsymbol{L} $ and $ \boldsymbol{R} $ are two random matrices. In this work, a scenario of flexible image encryption in ghost imaging in the 2D case is proposed. The image is encrypted into the bucket detection signals by arbitrarily arranging the two random matrices ($ \boldsymbol{L} $ and $ \boldsymbol{R} $) and other two permutation matrices ($ {\boldsymbol{P}}_{1} $ and $ {\boldsymbol{P}}_{2} $). The permutation matrices are used to disrupt the distribution of the bucket signals. Considering that the specific size of the image may not be square but rectangle, eight ways of image encryption are investigated in this work. Four of them use only one permutation matrix ($ {\boldsymbol{P}}_{1} $ or $ {\boldsymbol{P}}_{2} $), and they are $ {\boldsymbol{P}}_{1}\boldsymbol{L}\boldsymbol{X}{\boldsymbol{R}}^{\mathrm{T}}={\boldsymbol{Y}}_{1} $, $ \boldsymbol{L}{\boldsymbol{P}}_{1}\boldsymbol{X}{\boldsymbol{R}}^{\mathrm{T}}={\boldsymbol{Y}}_{2} $, $ \boldsymbol{L}\boldsymbol{X}{\boldsymbol{P}}_{2}{\boldsymbol{R}}^{\mathrm{T}}={\boldsymbol{Y}}_{3} $, $ \boldsymbol{L}\boldsymbol{X}{\boldsymbol{R}}^{\mathrm{T}}{\boldsymbol{P}}_{2}={\boldsymbol{Y}}_{4} $. The other four use two permutation matrices ($ {\boldsymbol{P}}_{1} $ and $ {\boldsymbol{P}}_{2} $), and they are $ {\boldsymbol{P}}_{1}\boldsymbol{L}\boldsymbol{X}{\boldsymbol{P}}_{2}{\boldsymbol{R}}^{\mathrm{T}}={\boldsymbol{Y}}_{5} $, $ {\boldsymbol{P}}_{1}\boldsymbol{L}\boldsymbol{X}{\boldsymbol{R}}^{\mathrm{T}}{\boldsymbol{P}}_{2}={\boldsymbol{Y}}_{6} $, $ \boldsymbol{L}{\boldsymbol{P}}_{1}\boldsymbol{X}{\boldsymbol{P}}_{2}{\boldsymbol{R}}^{\mathrm{T}} $$ ={\boldsymbol{Y}}_{7} $, and $ \boldsymbol{L}{\boldsymbol{P}}_{1}\boldsymbol{X}{\boldsymbol{R}}^{\mathrm{T}}{\boldsymbol{P}}_{2}={\boldsymbol{Y}}_{8} $.Specifically, in experiment, the measurement matrix is generated by the Kronecker product of the random matrices and permutation matrices. According to the 8 ways of image encryption, the 8 measurement matrices are $ {\boldsymbol{A}}_{1}=\left({\boldsymbol{P}}_{1}\boldsymbol{L}\right)\otimes \boldsymbol{R}, $ $ {\boldsymbol{A}}_{2}=\left(\boldsymbol{L}{\boldsymbol{P}}_{1}\right)\otimes \boldsymbol{R}, $ $ {\boldsymbol{A}}_{3}=\boldsymbol{L}\otimes \left(\boldsymbol{R}{\boldsymbol{P}}_{2}^{\mathrm{T}}\right) $, $ {\boldsymbol{A}}_{4}=\boldsymbol{L}\otimes \left({\boldsymbol{P}}_{2}^{\mathrm{T}}\boldsymbol{R}\right) $, $ {\boldsymbol{A}}_{5}=\left({\boldsymbol{P}}_{1}\boldsymbol{L}\right)\otimes \left(\boldsymbol{R}{\boldsymbol{P}}_{2}^{\mathrm{T}}\right) $, $ {\boldsymbol{A}}_{6}=\left({\boldsymbol{P}}_{1}\boldsymbol{L}\right)\otimes $$ \left({\boldsymbol{P}}_{2}^{\mathrm{T}}\boldsymbol{R}\right) $, $ {\boldsymbol{A}}_{7}=\left(\boldsymbol{L}{\boldsymbol{P}}_{1}\right)\otimes \left(\boldsymbol{R}{\boldsymbol{P}}_{2}^{\mathrm{T}}\right) $, and $ {\boldsymbol{A}}_{8}=\left(\boldsymbol{L}{\boldsymbol{P}}_{1}\right)\otimes \left({\boldsymbol{P}}_{2}^{\mathrm{T}}\boldsymbol{R}\right) $. These measurement matrices are used to form the random speckle patterns which are then projected onto the object. A spatial light modulator (SLM) is employed to load the objects and random speckle patterns. A charge coupled device (CCD) is used to obtain the bucket detection signals.As truncated singular value decomposition (TSVD) is an effective denoising method, it is used to obtain the pseudoinverse matrices of the random matrices used in the decryption process. Only when the pseudoinverse matrices of the random matrices, as well as the correct sequences of the random and permutation matrices, are known in each way, can the image be successfully decrypted. Otherwise, image decryption will not be successful. The structural similarity (SSIM), peak signal-to-noise ratio (PSNR), and correlation coefficient (CC) are used to evaluate the quality of the decrypted images. The SSIMs of object and the 2D bucket detection signals are very low, indicating the successfully encryption. The PSNRs and CCs of the successfully decrypted images are better than those of unsuccessful images. The successfully decrypted images clearly reconstruct the image of the object, while the unsuccessful images are in a mess.Our method provides a new idea of image encryption in ghost imaging, and image encryption is therefore enhanced and made flexible. Moreover, the present protocol can be combined with other image encryption techniques to form a more flexible protocol, which also has some application prospects in other image processing such as watermarking and image hiding.
      Corresponding author: XU Baolong, baolongxu@ytu.edu.cn ; CAO Dezhong, dzcao@ytu.edu.cn
    • Funds: Project supported by the National Natural Science Foundation of China (Grant Nos. 62105278, 11674273).
    [1]

    [2]

    [3]

    [4]

    [5]

    [6]

    [7]

    [8]

    [9]

    [10]

    [11]

    [12]

    [13]

    [14]

    [15]

    [16]

    [17]

    [18]

    [19]

    [20]

    [21]

    [22]

    [23]

    [24]

    [25]

    [26]

    [27]

    [28]

    [29]

    [30]

    [31]

    [32]

  • Baidu
  • [1]

    [2]

    [3]

    [4]

    [5]

    [6]

    [7]

    [8]

    [9]

    [10]

    [11]

    [12]

    [13]

    [14]

    [15]

    [16]

    [17]

    [18]

    [19]

    [20]

    [21]

    [22]

    [23]

    [24]

    [25]

    [26]

    [27]

    [28]

    [29]

    [30]

    [31]

    [32]

  • [1] 周阳, 杨洋, 赵佳乐, 初伟, 徐艳蕾, 张文颖. 基于盲噪声估计与迭代滤波降噪的鬼成像方法. 必威体育下载 , 2025, 74(16): 164204. doi: 10.7498/aps.74.20250544
    [2] 陈星宇, 周昕, 白星, 余展, 王玉杰, 李欣家, 刘洋, 孙铭泽. 傅里叶鬼成像与正弦鬼成像的等价性分析. 必威体育下载 , 2023, 72(14): 144202. doi: 10.7498/aps.72.20222317
    [3] 姜瑶瑶, 张文彬, 初鹏程, 马鸿洋. 基于置换群的多粒子环上量子行走的反馈搜索算法. 必威体育下载 , 2022, 71(3): 030201. doi: 10.7498/aps.71.20211000
    [4] 张海鹏, 赵昌哲, 鞠晓璐, 汤杰, 肖体乔. 基于迭代重构算法改进晶体衍射分光X射线鬼成像的图像质量研究. 必威体育下载 , 2022, 71(7): 074201. doi: 10.7498/aps.71.20211978
    [5] 贾棋, 樊秦凯, 侯文清, 杨晨光, 王利邦, 王浩, 徐春华, 李明, 陆颖. DNA双链退火压力对DNA聚合酶gp5链置换的调控. 必威体育下载 , 2021, 70(15): 158701. doi: 10.7498/aps.70.20210707
    [6] 姜瑶瑶, 张文彬, 初鹏程, 马鸿洋. 基于置换群的多粒子环上量子漫步的反馈搜索算法. 必威体育下载 , 2021, (): . doi: 10.7498/aps.70.20211000
    [7] 张瑞雪, 李洪国, 李宗国. 基于光场一阶关联的时域成像. 必威体育下载 , 2019, 68(10): 104202. doi: 10.7498/aps.68.20190184
    [8] 周阳, 张红伟, 钟菲, 郭树旭. 基于自适应阈值方法实现迭代降噪鬼成像. 必威体育下载 , 2018, 67(24): 244201. doi: 10.7498/aps.67.20181240
    [9] 朱胜利, 甘露. 一种基于非完整二维相空间分量置换的混沌检测方法. 必威体育下载 , 2016, 65(7): 070502. doi: 10.7498/aps.65.070502
    [10] 仲亚军, 刘娇, 梁文强, 赵生妹. 针对多散斑图的差分压缩鬼成像方案研究. 必威体育下载 , 2015, 64(1): 014202. doi: 10.7498/aps.64.014202
    [11] 李龙珍, 姚旭日, 刘雪峰, 俞文凯, 翟光杰. 基于压缩感知超分辨鬼成像. 必威体育下载 , 2014, 63(22): 224201. doi: 10.7498/aps.63.224201
    [12] 刘雪峰, 姚旭日, 李明飞, 俞文凯, 陈希浩, 孙志斌, 吴令安, 翟光杰. 强度涨落在热光鬼成像中的作用. 必威体育下载 , 2013, 62(18): 184205. doi: 10.7498/aps.62.184205
    [13] 孙福艳, 吕宗旺. 空间混沌序列的加密特性研究. 必威体育下载 , 2011, 60(4): 040503. doi: 10.7498/aps.60.040503
    [14] 程雪涛, 徐向华, 梁新刚. 广义流动中的积原理. 必威体育下载 , 2011, 60(11): 118103. doi: 10.7498/aps.60.118103
    [15] 程雪涛, 梁新刚, 徐向华. (火积)的微观表述. 必威体育下载 , 2011, 60(6): 060512. doi: 10.7498/aps.60.060512
    [16] 程雪涛, 董源, 梁新刚. 积与积减原理. 必威体育下载 , 2011, 60(11): 114402. doi: 10.7498/aps.60.114402
    [17] 沈德芳, 杜腾达, 王丽娟, 张伟珠. Bi置换DyIG溅射薄膜的磁光性能与干涉效应的研究. 必威体育下载 , 1991, 40(4): 653-658. doi: 10.7498/aps.40.653
    [18] 刘爱琢, 裴奉奎. 自旋置换对称体系多脉冲及二维核磁共振实验的密度算符描述(Ⅱ)——多量子积算符方法. 必威体育下载 , 1990, 39(8): 154-161. doi: 10.7498/aps.39.154-2
    [19] 侯伯宇, 侯伯元, 王珮. 平移群上同调与Kronecker映象. 必威体育下载 , 1986, 35(6): 829-832. doi: 10.7498/aps.35.829
    [20] 陈金全, 王凡, 高美娟. 群表示论的物理方法(Ⅱ)——置换群亚标准基和酉群Gelfand基. 必威体育下载 , 1977, 26(5): 427-432. doi: 10.7498/aps.26.427
计量
  • 文章访问数:  412
  • PDF下载量:  8
  • 被引次数: 0
出版历程
  • 收稿日期:  2025-05-03
  • 修回日期:  2025-05-30
  • 上网日期:  2025-06-11
  • 刊出日期:  2025-08-20

返回文章
返回
Baidu
map