Skip to main content
Log in

Multi-image holographic encryption based on phase recovery algorithm and ghost imaging

  • Published:
Applied Physics B Aims and scope Submit manuscript

Abstract

There is a method that presents for securing much information at the same time, which need not be restricted to a single image data. Based on ghost imaging, this paper proposes a new encryption algorithm: multi-image holographic encryption based on phase recovery algorithm and ghost imaging (PRA-GI). In the encryption process, first, multiple images are combined into one phase hologram image by phase holographic recovery algorithm. Second, the combined image is encrypted by ghost imaging to obtain ciphertext. During the decryption, each receiver can get the same phase hologram image reconstructed by the public key. Finally, each receiver uses the unique assisted private key to get corresponding information. By numerical simulation, it is found that this algorithm can effectively improve the encryption capacity. Experimental results and objective indicators verify the feasibility of this algorithm. At the same time, PRA-GI is suitable for enterprises and governments. For example, the leader license different assisted private keys and the primary public key to different employees according to different permissions. This algorithm implements double encryption, which ensures the security of information and solves crosstalk problems among images.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. D.N. Klyshko, Two-photon light: influence of filtration and a new possible EPR experiment. Phys. Lett. A 128(3-4), 133–137 (1988)

    Article  ADS  Google Scholar 

  2. J.H. Shapiro, Computational ghost imaging. Phys. Rev. A 78(6), 061802 (2008)

    Article  ADS  Google Scholar 

  3. P. Clemente, V. Durán, V. Torres-Company, E. Tajahuerc, J. Lancis, Optical encryption based on computational ghost imaging. Opt. Lett. 5(14), 2391–2393 (2010)

    Article  ADS  Google Scholar 

  4. Z. Chi, G. Shuxu, C. Junsheng, G. Jian, G. Fengli, Object reconstitution using pseudo-inverse for ghost imaging. Opt. Express 22(24), 30063–30073 (2014)

    Article  Google Scholar 

  5. W. Gong, High-resolution pseudo-inverse ghost imaging. Photon. Res. 3(5), 234–237 (2015)

    Article  Google Scholar 

  6. G. Ying, Q. Wei, X. Shen, A two-step phase-retrieval method in fourier-transform ghost imaging. Opt. Commun. 281(20), 5130–5132 (2008)

    Article  ADS  Google Scholar 

  7. Z. Zhang, S. Jiao, M. Yao, X. Li, J. Zhong, Secured single-pixel broadcast imaging. Opt. Express 26(11), 14578–14591 (2018)

    Article  ADS  Google Scholar 

  8. S. Jiao, J. Feng, Y. Gao, T. Lei, X. Yuan, Visual cryptography in single-pixel imaging. Opt. Express 28(5), 7301–7313 (2020)

    Article  ADS  Google Scholar 

  9. W. Chen, X. Chen, Ghost imaging for three-dimensional optical security. Appl. Phys. Lett. 103(22), 221106 (2013)

    Article  ADS  Google Scholar 

  10. W. Chen, X. Chen, Ghost imaging using labyrinth-like phase modulation patterns for high-efficiency and high-security optical encryption. EPL 109(1), 14001 (2015)

    Article  ADS  Google Scholar 

  11. J.J. Wu, W.X. Zhen, J.L. Zheng, W. Liu, Y. Zhang, S. Liu, Multiple-image encryption based on computational ghost imaging. Opt. Commun. 359, 38–43 (2016)

    Article  ADS  Google Scholar 

  12. I.H. Lee, M. Cho, Double random phase encryption using orthogonal encoding for multiple-image transmission. J. Opt. Soc. Korea 18(3), 201–206 (2014)

    Article  Google Scholar 

  13. X. Li et al., Multiple-image encryption based on compressive ghost imaging and coordinate sampling. IEEE Photon. J. 8(4), 1–11 (2017)

    Google Scholar 

  14. L. Sui, X. Zhao, An optical multiple-image authentication based on transport of intensity equation. Opt. Lasers Eng. 116, 116–124 (2019)

    Article  Google Scholar 

  15. N. Zhou, X. Yan, Multi-image encryption scheme based on quantum 3D Arnold transform and scaled Zhongtang chaotic system. Q. Inf. Process. 17, 338 (2018)

    Article  Google Scholar 

  16. L. Junhui, Y. Dongyue, L. Bin, W. Guohua, Y. Longfei, G. Hong, Image quality recovery in binary ghost imaging by adding random noise. Opt. Lett. 42(8), 1640–1643 (2017)

    Article  Google Scholar 

  17. B. Luo et al., Orthonormalization method in ghost imaging. Opt. Express 26(18), 23093–23106 (2018)

    Article  ADS  Google Scholar 

  18. H.C. Liu, J. Xiong, Properties of high-order ghost imaging with natural light. J. Opt. Soc. Am. A 30(5), 956 (2013)

    Article  ADS  Google Scholar 

  19. B. Luo, G. Wu, L. Yin, Lensless two-color ghost imaging from the perspective of coherent-mode representation. Chin. Phys. B 9, 313–318 (2018)

    Google Scholar 

  20. J. Chen, W. Gong, S. Han, Sub-Rayleigh ghost imaging via sparsity constraints based on a digital micro-mirror device. Phys. Lett. A 377(31), 1844–1847 (2013)

    Article  ADS  Google Scholar 

  21. H. Heyan, Z. Cheng, G. Wenlin, S. Lijun, Block matching low-rank for ghost imaging. Opt. Express 27(26), 38624–38634 (2019)

    Article  ADS  Google Scholar 

  22. R.W. Gerchberg, A pratical algorithm for the determination of phase from image and diffraction plane pictures. Optik 35, 237 (1972)

    Google Scholar 

  23. S. Dongfeng, Z. Jiamin, H. Jian, Polarization-multiplexing ghost imaging. Opt. Lasers Eng. 102, 100–105 (2018)

    Article  Google Scholar 

  24. A.A. Karawia, Encryption algorithm of multiple-image using mixed image elements and two-dimensional chaotic economic map. Entropy 20, 801 (2018)

    Article  ADS  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhang Dawei.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Leihong, Z., Zhisheng, Z., Hualong, Y. et al. Multi-image holographic encryption based on phase recovery algorithm and ghost imaging. Appl. Phys. B 126, 136 (2020). https://doi.org/10.1007/s00340-020-07487-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s00340-020-07487-4

Navigation