4.7 Article

Optical color image encryption based on Hadamard single-pixel imaging and Arnold transformation

Journal

OPTICS AND LASERS IN ENGINEERING
Volume 137, Issue -, Pages -

Publisher

ELSEVIER SCI LTD
DOI: 10.1016/j.optlaseng.2020.106392

Keywords

Color image encryption; Hadamard single-pixel imaging; Arnold transformation

Categories

Funding

  1. Natural National Science Foundation of China (NSFC) [61775121, 11574311]
  2. Key R&D Program of Shandong Province [2018GGX101002]
  3. Natural Science Foundation of Shandong province [ZR2016FM03]

Ask authors/readers for more resources

An optical color image encryption method based on Hadamard single-pixel imaging (SPI) and Arnold transformation is proposed, which can achieve high-quality encryption with good imaging quality and high security using only a single bucket detector (BD). The feasibility and robustness of this method against some types of attacks are verified through both computer simulations and optical experiments.
An optical color image encryption method based on Hadamard single-pixel imaging (SPI) and Arnold transformation is proposed, in which, optical full-color image encryption with good imaging quality and high security performance can be accomplished by only one bucket detector (BD). In the encryption process, after controlling and modulating the Hadamard matrix by the coefficient matrix key, three different sets of colored Hadamard patterns are generated to be projected onto the target colored object; Subsequently, the collected experimental data: R, G, and B components are detected by a BD, which are then scrambled by Arnold transformation to further increase the security; Finally the colored ciphertext image can be recombined and obtained to transferring to the receivers. During the decryption, with the colored ciphertext and all the corrected keys, the original secret color image can be successfully decrypted by the extraction of R, G, B components, inverse Arnold transformation, the correlated computation in SPI, and inverse Hadamard transformation. The feasibility of this method and its robustness against some types of attacks are verified by both computer simulations and optical experiments.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available