Please use this identifier to cite or link to this item:
Title: Optical image hiding under framework of computational ghost imaging based on an expansion strategy
Authors: Anand, Asundi
Sui, Liansheng
Wang, Jiahao
Tian, Ailing
Keywords: Computational Imaging
Compressive Imaging
Engineering::Mechanical engineering
Issue Date: 2019
Source: Sui, L., Wang, J., Tian, A., & Anand, A. (2019). Optical image hiding under framework of computational ghost imaging based on an expansion strategy. Optics Express, 27(5), 7213-7225. doi:10.1364/OE.27.007213
Series/Report no.: Optics Express
Abstract: A novel optical image hiding scheme based on an expansion strategy is presented under the framework of computational ghost imaging. The image to be hidden is concealed into an expanded interim with the same size as the host image. This is implemented by rearranging the measured intensities of the original object after the process of ghost imaging. An initial Hadamard matrix is used to generate additional matrices by shifting it circularly along the column direction, so that enough 2D patterns are engendered to retrieve phase-only profiles for imaging. Next, the frequency coefficients of the host image are modified with that of the expanded interim by controlling a small weighting factor. After an inverse transform, the host image carrying the hidden information can be obtained with high imperceptibility. Security is assured by considering optical parameters, such as wavelength and axial distance, as secret keys due to their high sensitivity to tiny change. Importantly, differing from other computational ghost imaging based schemes, many phase-only profiles are used to collect the measured intensities to enhance the resistance against noise and occlusion attacks. The simulated experiments illustrate the feasibility and effectiveness of the proposed scheme.
ISSN: 1094-4087
DOI: 10.1364/OE.27.007213
Rights: © 2019 Optical Society of America under the terms of the OSA Open Access Publishing Agreement. Users may use, reuse, and build upon the article, or use the article for text or data mining, so long as such uses are for non-commercial purposes and appropriate attribution is maintained. All other rights are reserved.
Fulltext Permission: open
Fulltext Availability: With Fulltext
Appears in Collections:MAE Journal Articles

Citations 20

Updated on Aug 31, 2020

Citations 20

Updated on Mar 7, 2021

Page view(s)

Updated on May 17, 2021

Download(s) 50

Updated on May 17, 2021

Google ScholarTM




Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.