• Acta Photonica Sinica
  • Vol. 49, Issue 9, 0910001 (2020)
Cheng ZHANG1、2, Hai-tao XU1, Yuan-yuan ZHU1, Jun TANG1, and Sui WEI1
Author Affiliations
  • 1Key Laboratory of Intelligent Computing and Signal Processing, Ministry of Education, Anhui University, Hefei 230039, China
  • 2Key Laboratory of Modern Imaging and Displaying Technology, Anhui University, Hefei 230039, China
  • show less
    DOI: 10.3788/gzxb20204909.0910001 Cite this Article
    Cheng ZHANG, Hai-tao XU, Yuan-yuan ZHU, Jun TANG, Sui WEI. Multiple Color Images Encryption via Compressive Holography and Spatial Multiplexing[J]. Acta Photonica Sinica, 2020, 49(9): 0910001 Copy Citation Text show less
    Schematic diagram of compressive color holography
    Fig. 1. Schematic diagram of compressive color holography
    Schematic setup of multiple color image encryption based on space division multiplexing
    Fig. 2. Schematic setup of multiple color image encryption based on space division multiplexing
    Decryption model of multiple color image
    Fig. 3. Decryption model of multiple color image
    Flow chart of the proposed multiple color image encryption and decryption process
    Fig. 4. Flow chart of the proposed multiple color image encryption and decryption process
    Comparison of self-sparse color image with inherent noise
    Fig. 5. Comparison of self-sparse color image with inherent noise
    Comparison of complex color image with inherent noise
    Fig. 6. Comparison of complex color image with inherent noise
    Comparison of self-sparse color image with encryption
    Fig. 7. Comparison of self-sparse color image with encryption
    Comparison of complex color image with encryption
    Fig. 8. Comparison of complex color image with encryption
    The simulated results of encryption and decryption security on RPM
    Fig. 9. The simulated results of encryption and decryption security on RPM
    The simulated results of encryption and decryption security on propagating distance
    Fig. 10. The simulated results of encryption and decryption security on propagating distance
    The simulated results to investigate the robustness against occlusion attack (sampling ratio δ)
    Fig. 11. The simulated results to investigate the robustness against occlusion attack (sampling ratio δ)
    Simulated results on the robust of decryption against Gaussian noise with the different standard deviation σ
    Fig. 12. Simulated results on the robust of decryption against Gaussian noise with the different standard deviation σ
    VariableDescriptionDimensions
    fcThe c channel of vectorized multiple color images(Nx·Ny·L)×1
    RDiagonal matrix of RPMs(Nx·Ny·L)×(Nx·Ny·L)
    BBlock diagonal matrix composed of multiple 2Ddiscrete fourier transform (DFT) matrix(Nx·Ny·L)×(Nx·Ny·L)
    \begin{document}$\mathit{\pmb{\mathscr{F}}}$\end{document}2D2D DFT matrix(Nx·Ny)×(Nx·Ny)
    \begin{document}$\mathit{\pmb{\mathscr{F}}}$\end{document}2D-12D inverse DFT matrix(Nx·Ny)×(Nx·Ny)
    Ql, cPSF of the c channel of l color image(Nx·Ny)×(Nx·Ny)
    QcPSF of the c channel of multiple color images(Nx·Ny)×(Nx·Ny·L)
    gcThec channel of vectorized encrypted color hologram(Nx·Ny)×1
    gVectorization of encrypted color hologram(Nx·Ny)×3
    Table 1. Definition of variables and description of dimensions
    Inherent noise reconstructionUn-inherent noise reconstruction
    SNRPSNRNCSNRPSNRNC
    “A”54.84467.5460.99859.41971.5040.998
    “H”57.57170.2760.99860.99973.2510.998
    “T”57.58072.5270.99861.00275.5730.998
    “V”57.11670.5270.99859.00972.1710.998
    “lena”21.90324.3370.948 827.61228.9900.992
    “house”19.68423.0910.940 524.65027.2310.988
    “airplane”24.42623.6410.95930.38828.4380.995
    “peppers”20.67224.002 50.944 727.11429.3430.990
    Table 2. The performance comparison of color image with inherent noise
    Unencrypted reconstructionEncrypted reconstruction
    SNRPSNRNCSNRPSNRNC
    “A”33.04348.5940.97459.41971.5040.998
    “H”34.66350.3750.97561.00073.2510.998
    “T”36.83554.5820.98161.00275.5730.998
    “V”36.07052.2460.97759.00972.1710.998
    Table 3. The performance comparison of multiple self-sparse color image
    Unencrypted reconstructionEncrypted reconstruction
    SNRPSNRNCSNRPSNRNC
    “lena”10.82114.4060.80327.61128.9900.992
    “house”11.09615.4590.84624.65027.2310.988
    “airplane”7.9528.9090.55730.38828.4380.995
    “peppers”8.70313.3520.81027.11429.3430.990
    Table 4. The performance comparison of multiple complex color image shown
    75%50%20%10%
    Avg_SNR24.92222.78319.59516.688
    Avg_PSNR26.31524.44521.69719.151
    Avg_NC0.9860.9770.9660.944
    Table 5. The performance comparison of occlusion attack
    0.10.20.30.4
    Avg_SNR22.96019.55117.06215.079
    Avg_PSNR25.73824.13124.20723.463
    Avg_NC0.9870.9850.9770.974
    Table 6. The robust performance comparison of decryption under Gaussian noise
    Cheng ZHANG, Hai-tao XU, Yuan-yuan ZHU, Jun TANG, Sui WEI. Multiple Color Images Encryption via Compressive Holography and Spatial Multiplexing[J]. Acta Photonica Sinica, 2020, 49(9): 0910001
    Download Citation