摘要
提出了一种利用全光学手段实现光学图像隐藏技术的改进方案,它结合压缩感知技术,解决了光学图像隐藏技术中普遍存在的隐藏图像中的数据冗余问题。首先,与三步或四步相移数字全息术不同的是,系统采用两步相移光学图像隐藏技术(TPOIH:two-step phase shifting optical image hiding)来减少记录的全息图数量并实现对图像的安全保护。然后,通过使用CS理论,将全息图压缩成一维数据并在探测器中对它们进行采样。并且在接收终端,使用全息重建算法和CS理论很好地重建安全图像。实验验结果表明,该方法对于光学图像隐藏和光学图像压缩是有效的,它可以通过使用非常少的数据量(约为原始干涉图数据大小的18. 8%)很好的恢复安全图像。这证明了方案可以用于隐私保护方面,如物联网和全光网络的图像传输。
An optical image hiding technique combined with compressive sensing using fully optical means has been proposed,which solves the massive redundant data of the hidden images in optical image hiding technology. Firstly,take two-step phase shifting optical image hiding( TPOIH) to reduce the recorded holograms number in contrast to three-step or four-step phase-shifting holography method. Then,by using CS theory,we compress the hologram into one-dimensional data and sample them in a bucket detector. At the receiving terminal,the secure image can be well reconstructed with the TPOIH method and CS theory. The preliminary experimental results show that the method is effective for optical image hiding and optical image compression,and it may provide the new path of using very little secure data volume( 18. 8% of original interferograms data size) for privacy protection such as Internet of Things and all-optical network.
引文
[1]沈钰莹.图像加密技术综述[J].城市建设理论研究:电子版,2013,23:18-21
[2]JAVIDI B,CARNICER A,YAMAGUCHI M,et al.Roadmap on optical security[J].Journal of Optics,2016,18(8):083001.
[3]LIU S,GUO C,SHERIDAN J T.A review of optical image encryption techniques[J].Optics&Laser Technology,2014,57(7):327-42.
[4]ZHU J,YANG X,MENG X,et al.Optical image encryption scheme with multiple light paths based on compressive ghost imaging[J].Journal of Modern Optics,2017,65(3):1-8.
[5]LI J,LI J,PAN Y,et al.Optical image hiding with a modified Mach-Zehnder interferometer[J].Optics&Lasers in Engineering,2014,55(7):258-61.
[6]LI J,LI J,SHEN L,et al.Optical image encryption and hiding based on a modified Mach-Zehnder interferometer[J].Optics Express,2014,22(4):4849.
[7]DONOHO D L.Compressed sensing[J].IEEE Transactions on Information Theory,2006,52(4):1289-306.
[8]LI J,JIAO S L,YANG Y P,et al.Compressive Optical Image Encryption[J].Sci Rep,2014,5:10374.
[9]HUA G,XIANG Y,BI G.When Compressive Sensing Meets Data Hiding[J].IEEE Signal Processing Letters,2016,23(4):473-477.
[10]LIAO X,LI K,YIN J.Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform[J].Multimedia Tools&Applications,2016,76(20):1-15.
[11]Jason N.Laska,Michael B.Wakin,Marco F.Duarte,et al.A new compressive imaging camera architecture using optical-domain compression[J].Proc Computational Imaging IV,2006,6065:43-52.
[12]ZHOU J X,RONG-ZHI W U.Digital Micromirror Device[J].Chinese Journal of Liquid Crystals&Displays,2003,25:313-314.
[13]RODRIGO P J,PERCHNIELSEN I R,GL CKSTAD J.High-speed phase modulation using the RPC method with a digital micromirror-array device[J].Optics Express,2006,14(12):5588-93.
[14]Liheng Bian,Jinli Suo,Guohai Situ,et al.Multispectral imaging using a single bucket detector[J].Scientific Reports,2016,6:24752.
[15]BIOUCAS-DIAS J M,FIGUEIREDO M A T.A New Tw IST:Two-Step Iterative Shrinkage/Thresholding Algorithms for Image Restoration[J].IEEE Transactions on Image Processing,2007,16(12):2992-3004.