• Acta Optica Sinica
  • Vol. 40, Issue 5, 0510003 (2020)
Yujia Liu1, Ning Zhang1、*, Fuqi Zhang2, Xiping Xu1、**, and Zhaoguo Jiang1、***
Author Affiliations
  • 1College of Optoelectronic Engineering, Changchun University of Science and Technology, Changchun, Jilin 130022, China
  • 2Network Optimization Center, China Mobile Communications Group Jilin Co., Ltd., Changchun, Jilin 130000, China
  • show less
    DOI: 10.3788/AOS202040.0510003 Cite this Article Set citation alerts
    Yujia Liu, Ning Zhang, Fuqi Zhang, Xiping Xu, Zhaoguo Jiang. Optical Multiple-Image Authentication Method Based on Hyper-Chaos and Phase Information Multiplexing in Gyrator Transform Domain[J]. Acta Optica Sinica, 2020, 40(5): 0510003 Copy Citation Text show less
    Modified Gerchberg-Saxton algorithm flowchart in Gyrator transform domain
    Fig. 1. Modified Gerchberg-Saxton algorithm flowchart in Gyrator transform domain
    Authentication system encryption schematic
    Fig. 2. Authentication system encryption schematic
    Schematic diagram of the authentication system
    Fig. 3. Schematic diagram of the authentication system
    Original images in high-level authentication. (a) Pepper; (b) Cameraman; (c) Pirate; (d) Baboon
    Fig. 4. Original images in high-level authentication. (a) Pepper; (b) Cameraman; (c) Pirate; (d) Baboon
    High-level authentication results. (a) φh1; (b) φh2</inli
    Fig. 5. High-level authentication results. (a) φh1; (b) φh2
    Iterative encoding results. (a) Hyper-chaotic random amplitude constraint; (b) phase distribution of coded image E of high-level authentication; (c) average γCC variation versus the iteration number of the primary MGSA; (d) authentication key POM2; (e) authentication key POM1; (f) average γCC variation versus the iteration number of the secondary MGSA
    Fig. 6. Iterative encoding results. (a) Hyper-chaotic random amplitude constraint; (b) phase distribution of coded image E of high-level authentication; (c) average γCC variation versus the iteration number of the primary MGSA; (d) authentication key POM2; (e) authentication key POM1; (f) average γCC variation versus the iteration number of the secondary MGSA
    Original images in low-level authentication. (a) Barbara; (b) Couple; (c) Starfish; (d) Ship
    Fig. 7. Original images in low-level authentication. (a) Barbara; (b) Couple; (c) Starfish; (d) Ship
    Low-level authentication results. (a) φl1; (b) φl2</inlin
    Fig. 8. Low-level authentication results. (a) φl1; (b) φl2
    3D γNCC distributions of low-level noise-like authentication images [Fig. 8(e)--(h)]. (a) Barbara; (b) Couple; (c) Starfish; (d) Ship
    Fig. 9. 3D γNCC distributions of low-level noise-like authentication images [Fig. 8(e)--(h)]. (a) Barbara; (b) Couple; (c) Starfish; (d) Ship
    3D γNCC distributions when the false low-level authentication key is used. (a) Barbara; (b) Couple; (c) Starfish; (d) Ship
    Fig. 10. 3D γNCC distributions when the false low-level authentication key is used. (a) Barbara; (b) Couple; (c) Starfish; (d) Ship
    Occlusion attack experiment. (a) Actual image; (b) authentication result; (c) authentication result when occluding 25%; (d) authentication result when occluding 50%
    Fig. 11. Occlusion attack experiment. (a) Actual image; (b) authentication result; (c) authentication result when occluding 25%; (d) authentication result when occluding 50%
    MSE changing with noise intensity factor ξ and the authentication image obtained with ξ=0.4,ξ=0.8
    Fig. 12. MSE changing with noise intensity factor ξ and the authentication image obtained with ξ=0.4,ξ=0.8
    Yujia Liu, Ning Zhang, Fuqi Zhang, Xiping Xu, Zhaoguo Jiang. Optical Multiple-Image Authentication Method Based on Hyper-Chaos and Phase Information Multiplexing in Gyrator Transform Domain[J]. Acta Optica Sinica, 2020, 40(5): 0510003
    Download Citation