1. Multi‐image encryption and authentication using computational ghost imaging and singular value decomposition.
- Author
-
Huang, Hong and Han, ZhiGuang
- Subjects
- *
SINGULAR value decomposition , *INFORMATION technology security , *IMAGE reconstruction , *IMAGE processing , *DIGITAL watermarking , *IMAGE reconstruction algorithms - Abstract
The non‐local imaging characteristics of computational ghost imaging (CGI) make it widely used in the field of information security. However, the information processing method based on traditional CGI has some problems in the process of multi‐image encryption, such as low efficiency and unsatisfactory reconstruction quality. Therefore, this article proposes to use wavelet transform and singular value decomposition technology to help computational ghost imaging to efficiently complete the coding and encryption of multiple images, and use alternating direction multiplier method (ADMM) in the process of image restoration to carry out high‐quality reconstruction of the original encrypted image. The results show that the scheme has good reconstruction effect, strong security and robustness even at a low sampling rate. It provides some reference for digital watermarking technology and cryptography. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF