Acta Optica Sinica, Volume. 40, Issue 5, 0510003(2020)
Optical Multiple-Image Authentication Method Based on Hyper-Chaos and Phase Information Multiplexing in Gyrator Transform Domain
Fig. 1. Modified Gerchberg-Saxton algorithm flowchart in Gyrator transform domain
Fig. 2. Authentication system encryption schematic
Fig. 3. Schematic diagram of the authentication system
Fig. 4. Original images in high-level authentication. (a) Pepper; (b) Cameraman; (c) Pirate; (d) Baboon
Fig. 5. High-level authentication results. (a)
Fig. 6. Iterative encoding results. (a) Hyper-chaotic random amplitude constraint; (b) phase distribution of coded image E of high-level authentication; (c) average γCC variation versus the iteration number of the primary MGSA; (d) authentication key POM2; (e) authentication key POM1; (f) average γCC variation versus the iteration number of the secondary MGSA
Fig. 7. Original images in low-level authentication. (a) Barbara; (b) Couple; (c) Starfish; (d) Ship
Fig. 8. Low-level authentication results. (a)
Fig. 9. 3D γNCC distributions of low-level noise-like authentication images [
Fig. 10. 3D γNCC distributions when the false low-level authentication key is used. (a) Barbara; (b) Couple; (c) Starfish; (d) Ship
Fig. 11. Occlusion attack experiment. (a) Actual image; (b) authentication result; (c) authentication result when occluding 25%; (d) authentication result when occluding 50%
Fig. 12. MSE changing with noise intensity factor ξ and the authentication image obtained with ξ=0.4,ξ=0.8
Get Citation
Copy Citation Text
Yujia Liu, Ning Zhang, Fuqi Zhang, Xiping Xu, Zhaoguo Jiang. Optical Multiple-Image Authentication Method Based on Hyper-Chaos and Phase Information Multiplexing in Gyrator Transform Domain[J]. Acta Optica Sinica, 2020, 40(5): 0510003
Category: Image Processing
Received: Sep. 25, 2019
Accepted: Oct. 30, 2019
Published Online: Mar. 10, 2020
The Author Email: Zhang Ning (custzn@126.com), Xu Xiping (xxp@cust.edu.cn), Jiang Zhaoguo (jiang.geele@gmail.com)