Multi‐image encryption and authentication using computational ghost imaging and singular value decomposition

Hong Huang,ZhiGuang Han
DOI: https://doi.org/10.1049/ipr2.13214
IF: 2.3
2024-09-08
IET Image Processing
Abstract:This article proposes a coding encryption and authentication scheme for multi‐image information of computational ghost imaging using wavelet transform and singular value decomposition. Using ADMM optimization algorithm to reconstruct, the original image can be recovered with high quality even under low sampling rate. The non‐local imaging characteristics of computational ghost imaging (CGI) make it widely used in the field of information security. However, the information processing method based on traditional CGI has some problems in the process of multi‐image encryption, such as low efficiency and unsatisfactory reconstruction quality. Therefore, this article proposes to use wavelet transform and singular value decomposition technology to help computational ghost imaging to efficiently complete the coding and encryption of multiple images, and use alternating direction multiplier method (ADMM) in the process of image restoration to carry out high‐quality reconstruction of the original encrypted image. The results show that the scheme has good reconstruction effect, strong security and robustness even at a low sampling rate. It provides some reference for digital watermarking technology and cryptography.
computer science, artificial intelligence,engineering, electrical & electronic,imaging science & photographic technology
What problem does this paper attempt to address?