CN116743934B - An equal-resolution image hiding encryption method based on deep learning and ghost imaging - Google Patents
An equal-resolution image hiding encryption method based on deep learning and ghost imaging Download PDFInfo
- Publication number
- CN116743934B CN116743934B CN202310612463.2A CN202310612463A CN116743934B CN 116743934 B CN116743934 B CN 116743934B CN 202310612463 A CN202310612463 A CN 202310612463A CN 116743934 B CN116743934 B CN 116743934B
- Authority
- CN
- China
- Prior art keywords
- image
- net
- information
- secret
- hiding
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Image Processing (AREA)
Abstract
Description
技术领域Technical Field
本发明涉及光学图像加密的技术领域,特别涉及一种基于深度学习和鬼成像的等分辨率图像隐藏加密方法。The present invention relates to the technical field of optical image encryption, and in particular to an equal-resolution image hiding encryption method based on deep learning and ghost imaging.
背景技术Background technique
鬼成像因其具有非定域成像、抗干扰性强和高灵敏度等优点,在光学图像加密中发挥着重要作用。信息隐藏技术也是信息安全的一个重要研究方向,如今广泛应用于数字水印、光学认证等版权保护领域中。然而,目前主流的信息隐藏技术存在加密容量小的缺点,如基于离散小波变换(DWT)的数字水印技术通常只能隐藏载体图像1/4大小,甚至1/8以及更少的图像或文字信息。Ghost imaging plays an important role in optical image encryption because of its advantages such as non-localized imaging, strong anti-interference and high sensitivity. Information hiding technology is also an important research direction in information security and is now widely used in copyright protection fields such as digital watermarking and optical authentication. However, the current mainstream information hiding technology has the disadvantage of small encryption capacity. For example, digital watermarking technology based on discrete wavelet transform (DWT) can usually only hide 1/4 of the size of the carrier image, or even 1/8 or less image or text information.
发明内容Summary of the invention
针对现有技术中存在的不足之处,本发明的目的是提供一种基于深度学习和鬼成像的等分辨率图像隐藏加密方法,不同于以往的将深度学习应用于鬼成像图像重构方向的研究,将深度学习应用于图像隐藏加密的过程中,可以实现等分辨率图像的隐藏与提取,隐藏后的图像经过计算鬼成像技术加密和压缩感知解密后仍然能够从含密图像中提取出明文图像的信息,表明本加密方案具有较好的鲁棒性,实现了等分辨率图像的隐藏加密,大大提升了隐藏加密系统的信息隐藏容量。为了实现根据本发明的上述目的和其他优点,提供了一种基于深度学习和鬼成像的等分辨率图像隐藏加密方法,包括:In view of the shortcomings in the prior art, the purpose of the present invention is to provide an equal-resolution image hiding encryption method based on deep learning and ghost imaging. Different from the previous research on applying deep learning to ghost imaging image reconstruction, deep learning is applied to the process of image hiding encryption, which can realize the hiding and extraction of equal-resolution images. After the hidden image is encrypted by computational ghost imaging technology and compressed sensing decryption, the information of the plaintext image can still be extracted from the encrypted image, indicating that the encryption scheme has good robustness, realizes the hiding encryption of equal-resolution images, and greatly improves the information hiding capacity of the hidden encryption system. In order to achieve the above-mentioned purpose and other advantages according to the present invention, a method for hiding and encrypting equal-resolution images based on deep learning and ghost imaging is provided, comprising:
S1、设计并训练用于等分辨率图像隐藏的深度学习图像隐写模型ERIH-Net,其包含两个子网络,即图像隐藏网络Hide-Net和图像提取网络Extract-Net;S1. Design and train a deep learning image steganography model ERIH-Net for equal-resolution image hiding, which consists of two sub-networks, namely the image hiding network Hide-Net and the image extraction network Extract-Net;
S2、通过预训练的ERIH-Net中的图像隐藏网络Hide-Net将一幅明文图像隐藏到非秘密图像中,生成一张含有明文图像特征信息的含密图像;S2, hide a plaintext image into a non-secret image through the image hiding network Hide-Net in the pre-trained ERIH-Net, and generate a secret image containing the feature information of the plaintext image;
S3、通过DMD加载4096个哈达玛矩阵用于调制光场并生成照明散斑,利用调制的照明散斑照明含密图像;通过桶探测器采集含密图像的总光强值,获得4096个光强值序列,即密文信息;S3, 4096 Hadamard matrices are loaded through the DMD to modulate the light field and generate illumination speckles, and the modulated illumination speckles are used to illuminate the secret image; the total light intensity value of the secret image is collected through the bucket detector to obtain a sequence of 4096 light intensity values, i.e., the ciphertext information;
S4、使用压缩感知图像重构算法通过密文序列和哈达玛调制模式(密钥)重构出含密图像信息;S4, using a compressed sensing image reconstruction algorithm to reconstruct the secret image information through the ciphertext sequence and the Hadamard modulation mode (key);
S5、将压缩感知重构出来的含密图像作为提取网络Extract-Net的输入端,提取出初始秘密图像信息。S5. Use the secret image reconstructed by compressed sensing as the input of the extraction network Extract-Net to extract the initial secret image information.
优选的,步骤S1中等分辨率图像隐写模型ERIH-Net通过多个卷积层进行特征提取和下采样,得到高维特征图;在高维特征图的基础上通过反卷积层进行上采样和特征重建,得到与原始图像尺寸相同的成像结果。Preferably, in step S1, the medium-resolution image steganography model ERIH-Net performs feature extraction and downsampling through multiple convolutional layers to obtain a high-dimensional feature map; based on the high-dimensional feature map, upsampling and feature reconstruction are performed through a deconvolution layer to obtain an imaging result with the same size as the original image.
优选的,步骤S2中输入的明文图像和非秘密图像的分辨率相同,实验中均为64×64×1大小。Preferably, the plaintext image and the non-secret image input in step S2 have the same resolution, and in the experiment, both are 64×64×1 in size.
优选的,步骤S3中的光学鬼成像系统包括532.8nm波长的He-Ne激光器,设置于激光器一侧的扩束器、光束准直透镜、数字微镜装置DMD、设置于DMD一侧的聚焦透镜、无空间分辨能力的桶探测器BD、计算机PC。Preferably, the optical ghost imaging system in step S3 includes a He-Ne laser with a wavelength of 532.8 nm, a beam expander arranged on one side of the laser, a beam collimating lens, a digital micromirror device DMD, a focusing lens arranged on one side of the DMD, a bucket detector BD without spatial resolution capability, and a computer PC.
优选的,步骤S4中密文通过公共通道接收,密钥通过安全通道接收,压缩感知图像重构算法选用正交匹配追踪(OMP)算法。Preferably, in step S4, the ciphertext is received through a public channel, the key is received through a secure channel, and the compressed sensing image reconstruction algorithm uses an orthogonal matching pursuit (OMP) algorithm.
优选的,步骤S5中Extract-Net由6个不相同的卷积层构成,前5个卷积层接Relu激活函数,最后一个卷积层后面添加tanh激活函数。Preferably, in step S5, the Extract-Net is composed of 6 different convolutional layers, the first 5 convolutional layers are connected to the Relu activation function, and the last convolutional layer is followed by a tanh activation function.
本发明与现有技术相比,其有益效果是:Compared with the prior art, the present invention has the following beneficial effects:
(1)将基于深度学习的图像隐写模型应用于计算鬼成像加密中的伪装加密过程,相较于其他传统隐写方法,基于深度学习的图像隐藏过程操作简单,模型的泛化能力强。(1) The deep learning-based image steganography model is applied to the camouflage encryption process in computational ghost imaging encryption. Compared with other traditional steganography methods, the image hiding process based on deep learning is simple to operate and has strong generalization ability.
(2)通过等分辨率图像隐写模型可以实现相同分辨率大小的图像之间的隐藏与提取,且经过计算鬼成像重构之后,隐写模型的提取网络也能良好的提取出明文图像的信息,说明模型具有较好的鲁棒性。(2) The equal-resolution image steganography model can realize hiding and extraction between images of the same resolution size. After the ghost image reconstruction, the extraction network of the steganography model can also extract the information of the plaintext image well, indicating that the model has good robustness.
(3)基于编码器-解码器的深度学习图像隐写网络与计算鬼成像加密的组合,以及压缩感知算法使用,可以提升伪装图像加密的信息隐藏容量、安全性、和成像质量。(3) The combination of encoder-decoder based deep learning image steganography network and computational ghost imaging encryption, as well as the use of compressed sensing algorithm, can improve the information hiding capacity, security, and imaging quality of camouflaged image encryption.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
图1为根据本发明的基于深度学习和鬼成像的等分辨率图像隐藏加密方法的系统流程图;FIG1 is a system flow chart of an equal-resolution image hiding encryption method based on deep learning and ghost imaging according to the present invention;
图2为根据本发明的基于深度学习和鬼成像的等分辨率图像隐藏加密方法的ERIH-Net结构图;FIG2 is a structural diagram of the ERIH-Net of the equal-resolution image hiding encryption method based on deep learning and ghost imaging according to the present invention;
图3为根据本发明的基于深度学习和鬼成像的等分辨率图像隐藏加密方法的鬼成像光路结构图;FIG3 is a ghost imaging optical path structure diagram of an equal-resolution image hiding encryption method based on deep learning and ghost imaging according to the present invention;
图4为根据本发明的基于深度学习和鬼成像的等分辨率图像隐藏加密方法的系统加密结构图;FIG4 is a system encryption structure diagram of an equal-resolution image hiding encryption method based on deep learning and ghost imaging according to the present invention;
图5为根据本发明的基于深度学习和鬼成像的等分辨率图像隐藏加密方法的系统解密结构图;FIG5 is a system decryption structure diagram of the equal-resolution image hiding encryption method based on deep learning and ghost imaging according to the present invention;
具体实施方式Detailed ways
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The following will be combined with the drawings in the embodiments of the present invention to clearly and completely describe the technical solutions in the embodiments of the present invention. Obviously, the described embodiments are only part of the embodiments of the present invention, not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by ordinary technicians in this field without creative work are within the scope of protection of the present invention.
参照图1-5,一种基于深度学习和鬼成像的等分辨率图像隐藏加密方法,包括以下步骤:1-5, a method for equal-resolution image hiding and encryption based on deep learning and ghost imaging includes the following steps:
S1、设计并训练用于等分辨率图像隐藏的深度学习图像隐写模型ERIH-Net;S1. Design and train a deep learning image steganography model ERIH-Net for equal-resolution image hiding;
S2、通过预训练的ERIH-Net中的图像隐藏网络Hide-Net将一幅明文图像隐藏到非秘密图像中,生成一张含有明文图像特征信息的含密图像;S2, hide a plaintext image into a non-secret image through the image hiding network Hide-Net in the pre-trained ERIH-Net, and generate a secret image containing the feature information of the plaintext image;
S3、通过DMD加载4096个哈达玛矩阵用于调制光场并生成照明散斑,利用调制的照明散斑照明含密图像;通过桶探测器采集含密图像的总光强值,获得4096个光强值序列,即密文信息;S3, 4096 Hadamard matrices are loaded through the DMD to modulate the light field and generate illumination speckles, and the modulated illumination speckles are used to illuminate the secret image; the total light intensity value of the secret image is collected through the bucket detector to obtain a sequence of 4096 light intensity values, i.e., the ciphertext information;
S4、使用压缩感知图像重构算法通过密文序列和哈达玛调制模式(密钥)重构出含密图像信息;S4, using a compressed sensing image reconstruction algorithm to reconstruct the secret image information through the ciphertext sequence and the Hadamard modulation mode (key);
S5、将压缩感知重构出来的含密图像作为提取网络Extract-Net的输入端,提取出初始秘密图像信息。S5. Use the secret image reconstructed by compressed sensing as the input of the extraction network Extract-Net to extract the initial secret image information.
实施例1Example 1
步骤S1,首先通过python语言在pytorch深度学习框架上设计一种基于编码器解码器结构的等分辨率图像隐写模型ERIH-Net。ERIH-Net结构图如图2所示,其包括图像隐藏网络Hide-Net和图像提取网络Extract-Net两个子网络,其中,Hide-Net包括预处理卷积层、下采样卷积层、和转置卷积上采样层组成;Extract-Net由6个卷积层组成。预处理块能够将秘密图像的大小调整到和载体图像同分辨率,并且提取出原始图像的高维特征;卷积上采样块和转置卷积下采样块能够将两张图像拼接后的高维特征图进行特征融合,最后经过Tanh激活函数生成含有秘密图像信息的载密图像。将MSE损失函数设置为网络的损失函数,载体图像c与载密图像c'之间的均方差损失与秘密图像s与提取出的秘密图像s'之间的均方差损失的β倍之和作为等分辨率图像隐写网络的总损失函数进行训练迭代(β是重构误差的权重)。本网络使用Adam优化器来加速训练,初始学习率lr设为0.001,训练周期为200轮,在第80和150次训练后,学习率一次将为原来的1/10倍。批量处理大小设为8,图像大小为64×64×1,数据集为7300张Matlab2018b软件灰度处理过的Oxford-IIIT_Pets图像,测试集为若干张Set12、Fashion Mnist和二值图像,均缩放为64×64大小。Step S1, firstly, an equal-resolution image steganography model ERIH-Net based on the encoder-decoder structure is designed on the pytorch deep learning framework by using the python language. The structure diagram of ERIH-Net is shown in FIG2, which includes two sub-networks, the image hiding network Hide-Net and the image extraction network Extract-Net, wherein Hide-Net includes a preprocessing convolution layer, a downsampling convolution layer, and a transposed convolution upsampling layer; and Extract-Net consists of 6 convolution layers. The preprocessing block can adjust the size of the secret image to the same resolution as the carrier image and extract the high-dimensional features of the original image; the convolution upsampling block and the transposed convolution downsampling block can perform feature fusion on the high-dimensional feature map after the two images are spliced, and finally a secret image containing secret image information is generated through the Tanh activation function. The MSE loss function is set as the loss function of the network, and the sum of the mean square error loss between the carrier image c and the secret image c' and the mean square error loss between the secret image s and the extracted secret image s' is used as the total loss function of the equal-resolution image steganography network for training iteration (β is the weight of the reconstruction error). This network uses the Adam optimizer to accelerate training. The initial learning rate lr is set to 0.001, and the training cycle is 200 rounds. After the 80th and 150th training, the learning rate will be 1/10 of the original. The batch size is set to 8, the image size is 64×64×1, the data set is 7300 Oxford-IIIT_Pets images processed by Matlab2018b software, and the test set is several Set12, Fashion Mnist and binary images, all scaled to 64×64.
步骤S2,将64×64像素大小的秘密图像和载体图像作为Hide-Net的输入端,调用预训练好的模型参数进行秘密图像的隐藏,生成一张含有秘密图像特征的载密图像。Step S2, taking the secret image and carrier image of 64×64 pixels as the input of Hide-Net, calling the pre-trained model parameters to hide the secret image, and generating a carrier image containing the features of the secret image.
步骤S3中的计算鬼成像光路结构图如图3所示,其中激光器发出的光束经过扩束、准直后将透射物体图像照明,携带了物体振幅信息的光束透过物体后又照射到加载了一系列随机相位调制矩阵的DMD(Digital Micromirror Device)上,光场的相位信息经过DMD调制后,反射的光强信息由桶探测器(Bucket Detector)收集,记为Di。DMD依次加载N次随机相位调制矩阵,便会得到N个桶探测器值,发送者将其作为密文通过公共通道传输给接收者,将N个相位调制矩阵展平为N个一维向量作为密钥通过安全通道传送给接收者。The optical path structure diagram of the computational ghost imaging in step S3 is shown in FIG3 , wherein the light beam emitted by the laser is expanded and collimated to illuminate the image of the transmitted object, and the light beam carrying the amplitude information of the object is transmitted through the object and then irradiated onto the DMD (Digital Micromirror Device) loaded with a series of random phase modulation matrices. After the phase information of the light field is modulated by the DMD, the reflected light intensity information is collected by the bucket detector (Bucket Detector), which is recorded as Di. The DMD loads the random phase modulation matrix N times in sequence, and then obtains N bucket detector values, which the sender transmits to the receiver through the public channel as ciphertext, and flattens the N phase modulation matrices into N one-dimensional vectors as keys and transmits them to the receiver through the secure channel.
步骤S4,接收者从公共通道和安全通道接收到密文和密钥后,可以根据菲涅尔衍射定理和密钥中的随机相位调制矩阵计算出相应的光场分布信息Ii(x,y)。接收者由解得的光场信息和密文信息进行二阶关联运算,即可获得解密图像信息。传统的二阶关联重构算法在解密过程中存在解密效率较低、成像质量较差等缺点,为了提高成像质量,本文采用了压缩感知优化解密算法来实现秘密信息的高质量重建。压缩感知算法能够突破奈奎斯特采样定律,利用自然图像的稀疏性对图像信号进行压缩采样可以保留信号的重要信息,通过求解一个最小L1范数优化问题实现从压缩数据中恢复原始信号。Step S4, after the receiver receives the ciphertext and key from the public channel and the secure channel, the corresponding light field distribution information I i (x, y) can be calculated according to the Fresnel diffraction theorem and the random phase modulation matrix in the key. The receiver performs a second-order correlation operation on the decrypted light field information and the ciphertext information to obtain the decrypted image information. The traditional second-order correlation reconstruction algorithm has the disadvantages of low decryption efficiency and poor imaging quality in the decryption process. In order to improve the imaging quality, this paper adopts a compressed sensing optimization decryption algorithm to achieve high-quality reconstruction of secret information. The compressed sensing algorithm can break through the Nyquist sampling theorem, and the important information of the signal can be retained by compressing and sampling the image signal using the sparsity of natural images. The original signal can be restored from the compressed data by solving a minimum L1 norm optimization problem.
步骤S5,接收者将压缩感知算法重构出的载密图像作为提取网络的输入,提取出关联成像重构的秘密图像信息。In step S5, the receiver uses the secret image reconstructed by the compressed sensing algorithm as the input of the extraction network to extract the secret image information reconstructed by the associated imaging.
综上,目前主流的计算鬼成像伪装图像加密研究中存在图像隐藏容量小、图像隐藏过程复杂等缺点。本发明针对这一现象,分析了各种图像隐藏方法,如数字水印、图像隐写等方法,发现了基于深度学习图像隐写模型来实现图像的隐藏与提取的优点,有信息隐藏容量高、范化能力强、操作简单等优点。而后分析了压缩感知图像重构方法,发现该方法相较于二阶关联计算等其他图像重构算法,成像质量效果更好,性能优异,鲁棒性好,抗干扰能力强,可以提升计算鬼成像的图像重构效果。In summary, the current mainstream computational ghost imaging camouflage image encryption research has the disadvantages of small image hiding capacity and complex image hiding process. In view of this phenomenon, the present invention analyzes various image hiding methods, such as digital watermarking, image steganography and other methods, and finds the advantages of hiding and extracting images based on deep learning image steganography models, which have the advantages of high information hiding capacity, strong generalization ability, and simple operation. Then the compressed sensing image reconstruction method is analyzed, and it is found that compared with other image reconstruction algorithms such as second-order correlation calculation, this method has better imaging quality, excellent performance, good robustness, and strong anti-interference ability, which can improve the image reconstruction effect of computational ghost imaging.
这里说明的设备数量和处理规模是用来简化本发明的说明的,对本发明的应用、修改和变化对本领域的技术人员来说是显而易见的。The number of devices and processing scales described here are used to simplify the description of the present invention, and the application, modification and variation of the present invention will be obvious to those skilled in the art.
尽管本发明的实施方案已公开如上,但其并不仅限于说明书和实施方式中所列运用,它完全可以被适用于各种适合本发明的领域,对于熟悉本领域的人员而言,可容易地实现另外的修改,因此在不背离权利要求及等同范围所限定的一般概念下,本发明并不限于特定的细节和这里示出与描述的图例。Although the embodiments of the present invention have been disclosed as above, they are not limited to the applications listed in the specification and implementation modes. They can be fully applied to various fields suitable for the present invention. For those familiar with the art, additional modifications can be easily implemented. Therefore, without departing from the general concept defined by the claims and the scope of equivalents, the present invention is not limited to the specific details and the illustrations shown and described herein.
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310612463.2A CN116743934B (en) | 2023-05-29 | 2023-05-29 | An equal-resolution image hiding encryption method based on deep learning and ghost imaging |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310612463.2A CN116743934B (en) | 2023-05-29 | 2023-05-29 | An equal-resolution image hiding encryption method based on deep learning and ghost imaging |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116743934A CN116743934A (en) | 2023-09-12 |
CN116743934B true CN116743934B (en) | 2024-05-14 |
Family
ID=87905484
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310612463.2A Active CN116743934B (en) | 2023-05-29 | 2023-05-29 | An equal-resolution image hiding encryption method based on deep learning and ghost imaging |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116743934B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117201691B (en) * | 2023-11-02 | 2024-01-09 | 湘江实验室 | Panoramic scanning associated imaging method based on deep learning |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6557103B1 (en) * | 1998-04-13 | 2003-04-29 | The United States Of America As Represented By The Secretary Of The Army | Spread spectrum image steganography |
CN108989603A (en) * | 2018-07-18 | 2018-12-11 | 上海理工大学 | Image encryption method based on self-encoding encoder combination relevance imaging |
CN112989371A (en) * | 2021-03-02 | 2021-06-18 | 浙江科技学院 | Multi-image encryption and decryption method based on Walsh transform and computational ghost imaging |
CN114119785A (en) * | 2021-11-30 | 2022-03-01 | 浙江科技学院 | Color ghost steganography method based on multi-discriminator confrontation generation network |
CN114119786A (en) * | 2021-11-30 | 2022-03-01 | 浙江科技学院 | Pseudo-ghost imaging encryption and decryption method based on Dense Net |
CN114979407A (en) * | 2022-05-24 | 2022-08-30 | 浙江科技学院 | Multi-image encryption and decryption method based on code division multiple access and deep learning ghost imaging |
CN115314602A (en) * | 2022-08-02 | 2022-11-08 | 上海理工大学 | A Multi-Image Encryption System Based on Image Scaling and Correlation Imaging |
CN115603830A (en) * | 2022-09-26 | 2023-01-13 | 浙江科技学院(Cn) | Optical Image Encryption and Decryption Method Based on Deep Learning and Random Mask Coding |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9639912B2 (en) * | 2014-12-30 | 2017-05-02 | University Of Macau | Method for reversible image data hiding |
US11054310B2 (en) * | 2019-09-05 | 2021-07-06 | Coherent AI LLC | Spectral sensor system employing a deep learning model for sensing light from arbitrary angles of incidence, and related hyperspectral imaging sensor |
-
2023
- 2023-05-29 CN CN202310612463.2A patent/CN116743934B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6557103B1 (en) * | 1998-04-13 | 2003-04-29 | The United States Of America As Represented By The Secretary Of The Army | Spread spectrum image steganography |
CN108989603A (en) * | 2018-07-18 | 2018-12-11 | 上海理工大学 | Image encryption method based on self-encoding encoder combination relevance imaging |
CN112989371A (en) * | 2021-03-02 | 2021-06-18 | 浙江科技学院 | Multi-image encryption and decryption method based on Walsh transform and computational ghost imaging |
CN114119785A (en) * | 2021-11-30 | 2022-03-01 | 浙江科技学院 | Color ghost steganography method based on multi-discriminator confrontation generation network |
CN114119786A (en) * | 2021-11-30 | 2022-03-01 | 浙江科技学院 | Pseudo-ghost imaging encryption and decryption method based on Dense Net |
CN114979407A (en) * | 2022-05-24 | 2022-08-30 | 浙江科技学院 | Multi-image encryption and decryption method based on code division multiple access and deep learning ghost imaging |
CN115314602A (en) * | 2022-08-02 | 2022-11-08 | 上海理工大学 | A Multi-Image Encryption System Based on Image Scaling and Correlation Imaging |
CN115603830A (en) * | 2022-09-26 | 2023-01-13 | 浙江科技学院(Cn) | Optical Image Encryption and Decryption Method Based on Deep Learning and Random Mask Coding |
Non-Patent Citations (3)
Title |
---|
Multiple-Image Encryption Mechanism Based on Ghost Imaging and Public Key Cryptography;Leihong Zhang ET AL;《 IEEE Photonics Journal 》;20190619;全文 * |
Study on the Key Technology of Image Transmission Mechanism Based on Channel Coding Ghost Imaging;Leihong Zhang ET AL;《IEEE Photonics Journal》;20180726;全文 * |
康祎 ; 任治舟 ; 张雷洪 ; 张大伟 ; 庄松林. 关联成像技术在光学信息加密方面的研究现状及展望.《关联成像技术在光学信息加密方面的研究现状及展望》.2022,全文. * |
Also Published As
Publication number | Publication date |
---|---|
CN116743934A (en) | 2023-09-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Alfalou et al. | Optical image compression and encryption methods | |
CN105451024B (en) | Digital hologram coding transmission method adopting compressed sensing | |
Zhou et al. | Optical image encryption based on two-channel detection and deep learning | |
Liansheng et al. | Single-pixel correlated imaging with high-quality reconstruction using iterative phase retrieval algorithm | |
Shamshad et al. | Compressed sensing-based robust phase retrieval via deep generative priors | |
Li et al. | Modified integral imaging reconstruction and encryption using an improved SR reconstruction algorithm | |
CN110071798B (en) | An equivalent key acquisition method, device and computer-readable storage medium | |
Yuan et al. | Optical image transformation and encryption by phase-retrieval-based double random-phase encoding and compressive ghost imaging | |
EP1340192B1 (en) | Hiding images in halftone pictures | |
CN110348232B (en) | Optical Image Encryption Method for Computational Ghost Imaging Using Phase Iterative Algorithms | |
CN116743934B (en) | An equal-resolution image hiding encryption method based on deep learning and ghost imaging | |
Liansheng et al. | An optical color image watermarking scheme by using compressive sensing with human visual characteristics in gyrator domain | |
Li et al. | Robust image steganography framework based on generative adversarial network | |
Liu et al. | Known-plaintext cryptanalysis for a computational-ghost-imaging cryptosystem via the Pix2Pix generative adversarial network | |
Zhou et al. | Learning-based optical authentication in complex scattering media | |
CN118803165A (en) | Image encryption and decryption method based on Fourier single pixel imaging and phase iteration | |
Le Guludec et al. | Deep light field acquisition using learned coded mask distributions for color filter array sensors | |
WO2024230145A1 (en) | Real-time imaging method and apparatus, electronic device, and storage medium | |
Zhang et al. | Image watermarking scheme employing Gerchberg–Saxton algorithm and integer wavelet transform | |
Shi et al. | Compact self-adaptive coding for spectral compressive sensing | |
Hwang et al. | Hologram authentication based on a secure watermarking algorithm using cellular automata | |
CN119211444A (en) | A multi-image hiding encryption method based on deep learning and ghost imaging | |
Wang et al. | Research on multiple-image encryption method using modified Gerchberg–Saxton algorithm and chaotic systems | |
CN118229498A (en) | A highly invisible ghost imaging image steganography encryption method based on deep learning | |
CN112765624A (en) | Authenticatable phase-only hologram generation method based on phase optimization and sparse constraint |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |