- 1Research Institute for Applied Physics and Astronomy, University of Tabriz, Tabriz, Iran
- 2Centre of Photonics Excellence, University of Tabriz, Tabriz, Iran
- 3Faculty of Physics, University of Tabriz, Tabriz, Iran
A sweeping computational ghost imaging (SCGI)-based encryption system is intended for increased data security and speedier data transport. SCGI is combined with steganography and cryptography processes in this system. SCGI requires fewer shots, resulting in faster image capture, transmission, encryption, and decryption. This strategy also results in smaller, more compact data packages and higher bitrates. Least significant bit (LSB) uses steganography to conceal the hidden picture. In the case of Rivest–Shamir–Adleman (RSA) encryption, public and private keys are generated via a one-way function based on bucket values. Encryption is performed on two levels, with an asymmetric approach divided into three sub-items that significantly increase encryption. Surprisingly, the method uses fewer pictures for image reconstruction, resulting in faster image reconstruction. SCGI promises applications in an extensive number of data encryption sectors since this technology leads to smaller data packages and higher bitrates. The presented approach is examined using the number of pixel change rate (NPCR), normalized root mean square (NRMS), peak signal-to-noise ratio (PSNR), and correlation coefficient (CC), which indicates constant encryption improvement. We experimentally and situationally demonstrate our findings under eavesdropping, which prove the resistance and robustness of our methods. In optimal settings, this innovation enhances encryption by up to 90% when compared to traditional encryption methods.
1 Introduction
Ghost imaging (GI) is a relatively new imaging technique. An optical beam is divided into two arms in GI: a reference arm that is routed to a charge-coupled device (CCD) detector to record the spatial pattern and an object beam that illuminates the object and is reflected to a bucket detector that records a single intensity value. The second-order correlation of these two arrayed and single-value intensities [1–4] yields the picture. GI has various applications, including 3D imaging [5, 6], X-ray imaging [6, 7], face recognition [8, 9], imaging in turbulent medium [10], and data encryption [11, 12]. Pittman et al. [13] demonstrated the first GI using quantum entanglement in 1995. Later, Boyd et al. [14], in 2002, captured GI from a pseudo-thermal source. Computational GI (CGI) was introduced by Shapiro [15] by using a spatial light modulator (SLM) [16] or digital micro-mirror device (DMD) [17] rather than measuring the intensity profile of the reference arm with a CCD. The primary concern with GI is its low speed, which results in longer capture times when compared to those of other imaging methods. In order to address these obstacles, our group developed the sweeping CGI (SCGI) approach in 2019 [18]. In each shot, randomly generated CGI matrices were modified to have an all-bright row or column, and the position of these bright rows or columns was swept horizontally or vertically throughout the illumination matrix. Our technique may increase the imaging speed of moving objects by 22–4,000 times [19, 20]. Furthermore, because SCGI requires a predetermined number of shots equal to the sum of numbers of rows and columns of the randomly generated matrix, the photos are taken instantaneously.
One of the most crucial conditions for dependable data exchange is a secure and impermeable connection. Approaches including digital signatures, authentication, data masking, and sharing have made considerable strides in preventing or restricting unauthorized access to photographs. Raw data, compressed data, and comprehensive data encryption are the three methods of data encryption that have been in use since 1980 [21]. Data encryption can be carried out symmetrically or asymmetrically. The encryption and decryption keys are only accessible to the transmitter and receiver under symmetric situations. However, in asymmetrical situations, only the intended user has access to the decryption key [22]. Asymmetric data encryption is typically accomplished using Rivest–Shamir–Adleman (RSA) encryption [23, 24]. Steganography is a kind of data encryption in which data are hidden or inserted into a picture, audio, or video [25]. The phase, intensity, and wavelength of light are used in optical data encryption [26–28]. Recently, a number of optical encryption strategies have been introduced, including GI encryption, chaotic encryption [29], and dual random phase encryption [30]. The first optical data encryption method based on CGI was introduced by Clemente et al. [26]. Our team [12] proposed CGI-based grayscale and color optical encryption in 2012. We used selective CGI to confirm optical encryption once again [11]. High-performance optical encryption based on CGI, fast response codes, and a compressive sensing technique was proposed by Shengmei et al. in 2014 [31]. Leihong et al. improved the practicality, security, and robustness of the suggested encryption system earlier this year [32] by developing GI public key cryptography. In 2019, [30] Dawei et al. revealed double-layer GI optical information encryption and improved security.
We apply RSA and steganography techniques to encrypt GI data [33, 34]. In RSA encryption, public and private keys are used to exchange data. The one-way function is used in these techniques. The American Standard Code for Information Interchange (ASCII) is used to convert data into binary images. Three steps and two layers comprise the encryption process. In steganography, the cover image conceals the picture’s contents in one of two ways: either it is chosen at random or from the SCGI. The suggested methods quickly and securely encrypt data, paving the way for SCGI applications in steganography and cryptography [35].
We compute the normalized root mean square (NRMS) for various eavesdropping percentages in order to assess the robustness of the encrypted ghost image. The amount of the error for an unauthorized user who has learned some of the secret key’s components through eavesdropping is provided by NRMS [12]. To quantify the link between two variables, statistical analysis tools like the correlation coefficient (CC) are used. This characteristic shows how the suggested encryption technique is strongly resistant to statistical attacks [41]. The most used metric for assessing the resistance of picture encryption methods and ciphers to differential assaults is the number of pixel change rate (NPCR) [37]. The encryption’s resistance to various attacks is calculated using NPCR, NRMS, and CC under different eavesdropping percentages for simulation and experimentation. In addition, the PSNR evaluates the quality of two images. A higher PSNR value provides a higher image quality [39].
2 Proposed methods
In this section, first, a full introduction to the SCGI theory and its application to the encryption process is given. The RSA cryptography method is exclusive, followed by steganography.
2.1 SCGI theory
By manipulating the illuminating random patterns, SCGI [18] creates a row or column of bright pixels that stand out against the intensity of the background. A bucket detector monitors the amount of light that is transmitted or reflected after the beam strikes the target. The light line sweeps the entirely random pattern in each image by moving to the next line. The sum of the rows and columns, therefore, defines the overall number of shots. For instance,
where
In addition, Gc1 and Gr1 are defined considering a row from Gc and a column from Gr [18]; indeed, Gr1 and Gc1 are row and column matrices, respectively, and a and b are arbitrary row and column numbers from Gr and Gc, respectively:
The final gray image Gfinal was reconstructed by the cross-product of Gc1 to Gr1; in fact, the size of Gfinal is equal to
SCGI can be applied to both horizontal and vertical images. The SCGI system is shown in Figure 1 as random sweeping patterns
According to Eqs 3, 4, the line shifts one pixel either vertically or horizontally in each frame. The most possible number of imaging shots is 128; 64 for reconstructed images created using a row sweep and 64 using a column sweep. In addition, the final image is produced by Eq. 5.
The data were encrypted by SCGI using steganographic and cryptographic techniques. The asymmetric and steganography systems are displayed in Figures 1, 2. The generic encryption strategy for SCGI shown in Figure 1 uses keys that reflect the random pattern (S) with a bright row (Sr) or column (Sc) and is determined by the public and private key sections. The bucket intensities for the row and column random patterns are Br and Bc, respectively. The blue and red arrows indicate the two-row and -column stages of the SCGI method, respectively. The red path produces a picture via column sweeping (Gr), as opposed to the blue path’s image delivered by row sweeping (Gc). Yellow lines show Gc1 and Gr1 (Eqs 3, 4) and Gfinal reconstructed by the cross-product Gc1 and Gr1. The public and private keys for SCGI encryption can be either random patterns (Sr and Sc) or bucket intensities (Br and Bc).
FIGURE 2. Depicts the first (large pictures) and second (small pictures) steganography technique in SCGI which
2.2 Steganography process
Steganography is a technique for concealing text such that only the sender and recipient may see it in any digital medium, including images, videos, and audio [25]. Two messages (pictures), one to serve as the cover and the other as the disguised image, are needed, as shown in Figure 2. The least significant bit (LSB) method, which is the quickest technique to covertly implant information, is a steganography key. This fundamental LSB embedding technique is easy to compute and can incorporate a large amount of data without compromising the quality. Figure 2 illustrates the specifics of the used strategy:
Both binary and colored images were used for steganography (Figure 2). For large photos, an SCGI image is selected as the cover, and a simple LSB-inserted hidden image is added to the cover. The LSB, which is located on the rightmost byte, has little bearing on the values of the other seven bits. Therefore, the LSB hinges on swapping the final bits of the cover picture’s pixels with those in the secret image without the cover image noticeably changing. As a result, the final image was created using the LSB, the cover, and concealed photographs. The intended receiver is then contacted by SCGI. When dealing with large photographs, the hidden image can be extracted from the stego image by using LSB. After LSB image extraction and subsequent SCGI application on two photos (small pictures in Figure 4), the cover and concealed images are rebuilt for tiny pictures using column sweep (Gr) and row sweep (Gc), and the final image reconstruction takes place in a binary scenario.
Steps of steganography:
➢ Select a cover image from SCGI images
➢ Choose secret data (binary/gray/color image)
➢ Divide the color image in RGB
➢ Embed LSB as a stego key
➢ Produce a stego image and send to the receiver by channel
➢ Receive the stego image by the user
➢ Apply the LSB to the stego image
➢ Merge color images (large case)
➢ Find the secret image and cover image separately (small case)
➢ Apply Equation 5 to find the SCGI image (small case)
2.3 RSA cryptography process
The cryptography method is shown in Figure 3, which is an asymmetric algorithm with both public and secret keys (such as RSA). All users are visible to the general public, but only the sender and recipient have access to the secret keys. This research uses this kind of cryptography.
The process of converting a message from a readable form at the transmitter end to an incomprehensible form at the recipient end is known as cryptography, and it is used in bucket detector intensity. Symmetric and asymmetric systems are two subcategories that can be distinguished. Public and private keys (both the sender and the recipient have access to the latter) are the foundation of asymmetric encryption [23, 24]. The American Standard Code for Information Interchange (ASCII) is used in both the encryption and decryption processes.
To rebuild the final image in SCGI, the bucket detector channel must correspond with its random matrices. The bucket values supplied to the intended user are in the form of a
The mechanism behind the RSA algorithm that shows us public and private keys:
➢ Select two prime numbers P and Q
➢ Calculate n = P * Q
➢ Need
➢ And select e that must be
• An integer
• Not be a factor of n
• And
➢ Calculate d that d*e = 1 mod
3 Results and discussions
In this work, three parameters for evaluating the encryption of images were developed: NPCR, Eq. 8 NRMS, Eq. 9 and correlation coefficient (CC), Eq. 10 and PSNR Eq. 13 was chosen to investigate the image quality. For quantitative comparisons and to measure the encryption level under different eavesdropping settings, the number of pixel change rate (NPCR) was determined as follows [37]:
where
where
The correlation coefficient (CC) is used to measure the relation between two variables. In cryptography, they are plaintext and its encryption (ciphertext). This factor demonstrates resistance against attacks. The CC is measured by the following equation [41]:
where x and y are variables of the plaintext and ciphertext.
In addition,
It has a value between 1 and –1. If the CC equals 1 and –1, plaintext and ciphertext are identical, indicating weak encryption. If it becomes 0, the plaintext is completely different from the ciphertext, indicating strong encryption.
The PSNR is chosen for evaluating the quality of images in steganography [39]:
where
We used two binary and grayscale objects for imaging in SCGI, and both of them are “TII.” Figure 4 shows two binary and grayscale images detected using the SCGI method, with columns denoting the original image, row sweeping, column sweeping, final image, and intensity of the 30th line of final reconstructed images, in that order. The random patterns show the primary difference between GI and SCGI. The brightest cells in the GI have fluctuating intensities, but the SCGI has stable values.
FIGURE 4. Reconstructed images based on grayscale and binary images. (A) Original image. (B) Image by using row sweeping Gc (corner image). (C) Image by using column sweeping Gr (corner image). (D) Final GI Gfinal. (E) Intensity of the 30th line of final reconstructed images for detection of binary and grayscale images.
In the experiment, we built up SCGI setup by Figure 5. A projector (SONY VPL-DX120) with a resolution of 1024 × 768 is available to apply sweeping random patterns (Sr and Sc) that are produced by a computer to the object (
In the initial phase of the steganography process, the final and SCGI images are covered and buried
FIGURE 6. Results of steganography and PSNR. (i) First stage for color images, and (ii) second stage for grayscale images. Numbers indicates PSNR values. (A) cover image. (B) secret image. (C) stego image. (D) recovered image.
In the first stage, the cover image is picked from SCGI and then at random in the second stage, with both Gc and Gr hidden in the adoptive image. As shown in Figure 6, the steganography system results show that the concealed image is totally hidden within the cover image and is never visible. PSNR values for color and grayscale image steganography are 13.08 and 12.99, respectively.
Next, asymmetric SCGI-based encryption was carried out. As a result, P and Q are chosen using the Agrawal–Kayal–Saxena algorithm [40], a decision-making process for primality testing, such that they are 37 and 19, respectively.
Here, value (
In the RSA process, data are encrypted in two layers. The first layer is a one-way function, and the other is carried out by getting values in the T matrix.
Asymmetric systems are used to demonstrate an applied encryption diagram in Figure 3. In the first method, row and column data of the reconstructed image are encrypted together
FIGURE 7. Simulation results with the asymmetric encryption system. (A) Encrypted by RSA and (B) decrypted images.
In modeling, in Figure 7, for the “TII” object, the third column shows a rebuilt image in its encrypted and decrypted states, while the fourth column shows the image’s binary reconstruction, which recovers a high-contrast binary image by applying a post-processing method to a grayscale image that has been reconstructed. The binary function threshold is set to the lowest intensity in the grayscale image, and intensity values above and below this threshold are set to 1 and 0, respectively, to carry out the process.
In addition, NPCR results for the encrypted image versus eavesdropping percentage are depicted in Figure 8 for a) Gk, b) Gc and Gr, and c) Gr or Gc. The NPCR shows the difference between pixel values in the original and encrypted images displayed in Figure 11. The difference between the original and encrypted images is 0.7 and 0.6 after 100% of the original image’s information has been revealed, demonstrating that the NPCR in case b is higher than that in other cases, whereas in cases a and c, it becomes 0, indicating that the attacker has fully realized the information.
FIGURE 8. NPCR of the simulation results by encryption variables: (A) Gk, (B) Gr and Gc, and (C) Gr or Gc.
In Figures 9, 10, the NRMS is calculated for binary and grayscale encryption images, respectively. In example b, NRMS has the greatest number, which means the robustness of case b against the attacker is 0.6 and 0.7 after 100% eavesdropping; however, in the others, it is 0.
FIGURE 9. NRMS of simulation results for binary images versus encryption variables: (A) Gk, (B) Gr and Gc, and (C) Gr or Gc.
FIGURE 10. NRMS of simulation results for grayscale images versus encryption variables: (A) Gk, (B) Gr and Gc, and (C) Gr or Gc.
Figure 11 depicts decrypted binary and grayscale images in the simulation case for three encryption scenarios, with eavesdropping percentages ranging from 0% to 100%. The first two examples show the image in its entirety, but the third example never does. The attacker was unable to find crucial data to decode as a result.
FIGURE 11. Decrypted binary and grayscale images in the simulation case from 0 to 100 percentage of eavesdropping in Gk, Gr or Gc, and Gr and Gc.
The CC is determined for eavesdropping 0% and 100% for three scenarios and binary and grayscale images in the Table 1 to assess resistance against the attacker. It demonstrates that even after complete eavesdropping, Gr and Gc have a great resistance to attackers.
In the experiment, double slits (II) is selected as the object (
FIGURE 12. Experimental results obtained with the asymmetric system [18]. (A) Encrypted by the RSA algorithm and (B) decrypted images.
The results of the experiment are displayed in Figures 13–15. The poor NPCR in Figure 13 results in higher eavesdropping percentages, as can be observed in cases a and c; however, in case b, even if all data were destroyed, an attacker would not be able to access information, as can be shown in case b, which shows stable protection from 0% to 100% eavesdropping with 0.96.
FIGURE 13. NPCR of experimental results versus encryption variables: (A) Gk, (B) Gr and Gc, and (C) Gr or Gc.
FIGURE 14. NRMS of experimental results for binary images versus encryption variables: (A) Gk, (B) Gr and Gc, and (C) Gr or Gc.
FIGURE 15. NRMS of experimental results for grayscale images versus encryption variables: (A) Gk, (B) Gr and Gc, and (C) Gr or Gc.
Figures 14, 15 show the NRMS values for the experimental results in binary and grayscale imaging instances, respectively. The location of the values and the one-way function must be known to the attacker in order to decode the data. Data security is low in situation a, where an attacker may find large volumes of data with ease; moderate in case c; and high in case b.
Figure 16 exhibits decrypted images, which, for three various eavesdropping techniques, range from 0% to 100%, from the first to the last row, and they are shown for experimental conditions. The results demonstrate that the Gr and Gc approaches are more secure than the others since and that even in a 100% eavesdropping scenario, an attacker was unable to obtain information about the original image. The results are compared to past data in the literature [11, 12, 23, 38] to validate that increased security, speed, and reduced data packing were accomplished under the same eavesdropping percentages. Our results had almost the same security as those from our prior investigation in [11], with the exception that they were realized with fewer shot counts in the current investigation. NRMS in the eavesdropping 30% in [11] is 0.25, but it is 0.95 in the present study in the best case. The NRMS in [12] with a 70% loss is 0.11; however, in our analysis, it is roughly constant at 0.95, indicating that an attacker can only retrieve 15% of the data after a 70% loss. In conclusion, the Gr and Gc methods of the RSA algorithm, which separately encrypt the row/column data of the rebuilt images, have the highest security with NPCR and NRMS values.
FIGURE 16. Decrypted binary and grayscale images in the experimental case from 0 to 100 percentage of eavesdropping in Gk, Gr or Gc, and Gr and Gc.
Table 2 indicates that for three instances, binary and grayscale images in the experimental genres, the CC for eavesdropping is between 0 and 100 percent. Gr and Gc scenarios have strong resistance against attackers due to their values of 0.3335 and 0.3443 for 100% eavesdropping, respectively.
The speed for SCGI, GI, DCSGI [42], and CGISR [43] is shown in Table 3. It can be seen that the SCGI speed is 3.3 times GI in the same quality. Visibility is a quality parameter for evaluating images. Zhang et al. [42] used 4,500 measurements in DCSGI to reconstruct a picture with
TABLE 3. Comparison between SCGI and other methods considering the shots, visibility, time, CC, and PSNR.
4 Conclusion
We introduce SCGI and encryption methods which require fewer shot numbers to deliver high security. Faster image capturing and smaller data package sizes are made possible by this advantage. In SCGI, the final image is reconstructed by row and column sweeping of binary and grayscale images. Steganography and RSA cryptography technologies with SCGI have been used for data encryption and transferring. For evaluating the encryption security level, NPCR, NRMS, and CC parameters were measured and PSNR was used for assessing the quality of images. In the steganography system, secret binary and color images were concealed in the cover image that was reconstructed by SCGI by using the LSB. PSNR values demonstrate that the initial and final images have the best quality, and they could not be distinguished from each other; furthermore, secret images were concealed in the SCGI images and finally reconstructed by the SCGI equation. In the cryptography process, public and private keys in the RSA method were described using a one-way function. The RSA technique is applied to the bucket detector (or reconstructed images by column and row sweeping in the SCGI) which is produced by SCGI. SCGI has two series of bucket detector values, and we can divide encryption into three items. Three sub-items (Gr and Gc, Gr or Gc, and Gk) based on reconstructed images by column and row sweeping in the SCGI consisted of our cryptography approach. Therefore, NPCR and CC evaluating parameters prove that one item (Gr and Gc) has strong security with increasing eavesdropping percentage and NRMS shows that it has strong robustness than other sub-items because of durable values. The introduced approach only needs a small number of shots to reconstruct an image, for data processing, and imaging, which boosts imaging speed compared to that in the previous studies, resulting in smaller data packages and faster communications. These advantages suggest the widespread application of sweeping ghost imaging encryption among data security technologies. We believe that cryptography and steganography encryption by SCGI can provide a new perspective on information security. The encryption of 3D color images will be our next study outlined by this new method.
Data availability statement
The original contributions presented in the study are included in the article/Supplementary Material; further inquiries can be directed to the corresponding author.
Author contributions
SR-G: conceptualization, data curation, formal analysis, investigation, methodology, software, validation, visualization, and writing–original draft. BO: writing–original draft and writing–review and editing. RK: conceptualization, data curation, supervision, validation, and writing–review and editing. SA-K: conceptualization, data curation, formal analysis, investigation, supervision, writing–original draft, and writing–review and editing.
Funding
The author(s) declare that no financial support was received for the research, authorship, and/or publication of this article.
Conflict of interest
The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.
Publisher’s note
All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors, and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.
References
1. Erkmen BI, Shapiro JH. Ghost imaging: from quantum to classical to computational. Adv Opt Photon (2010) 2(4):405–50. doi:10.1364/AOP.2.000405
2. Ghaleh SR, Ahmadi-Kandjani S, Kheradmand R, Olyaeefar B. Improved edge detection in computational ghost imaging by introducing orbital angular momentum. Appl Opt (2018) 57(32):9609–14. doi:10.1364/AO.57.009609
3. Ryczkowski P, Barbier M, Friberg AT, Dudley JM, Genty G. Ghost imaging in the time domain. Nat Photon (2016) 10(3):167–70. doi:10.1038/nphoton.2015.274
4. Khakimov RI, Henson BM, Shin DK, Hodgman SS, Dall RG, Baldwin KG, et al. Ghost imaging with atoms. Nature (2016) 540(7631):100–3. doi:10.1038/nature20154
5. Sun B, Edgar MP, Bowman R, Vittert LE, Welsh S, Bowman A, et al. 3d computational ghost imaging. In: 2014 IEEE Photonics conference (2014). p. 174–5. doi:10.1364/CQO.2013.W1.1
6. Klein Y, Schori A, Dolbnya IP, Sawhney K, Shwartz S. X-ray computational ghost imaging with single-pixel detector. Opt express (2019) 27(3):3284–93. doi:10.1364/OE.27.003284
7. Pelliccia D, Olbinado MP, Rack A, Kingston AM, Myers GR, Paganin DM. Towards a practical implementation of X-ray ghost imaging with synchrotron light. IUCrJ (2018) 5(4):428–38. doi:10.1107/S205225251800711X
8. Qiu X, Zhang D, Zhang W, Chen L. Structured-pump-enabled quantum pattern recognition. Phys Rev Lett (2019) 122(12):123901. doi:10.1103/PhysRevLett.122.123901
9. Zhao S, Yang H, Li Y, Cao F, Sheng Y, Cheng W, et al. The influence of atmospheric turbulence on holographic ghost imaging using orbital angular momentum entanglement: simulation and experimental studies. Opt Commun (2013) 294:223–8. doi:10.1016/j.optcom.2012.12.027
10. Erkmen BI. Computational ghost imaging for remote sensing. JOSA A (2012) 29(5):782–9. doi:10.1364/JOSAA.29.000782
11. Zafari M, Ahmadi-Kandjani S. Optical encryption with selective computational ghost imaging. J Opt (2014) 16(10):105405. doi:10.1088/2040-8978/16/10/105405
12. Tanha M, Kheradmand R, Ahmadi-Kandjani S. Gray-scale and color optical encryption based on computational ghost imaging. Appl Phys Lett (2012) 101(10):101. doi:10.1063/1.4748875
13. Pittman TB, Shih YH, Strekalov DV, Sergienko AV. Optical imaging by means of two-photon quantum entanglement. Phys Rev A (1995) 52(5):R3429–32. doi:10.1103/PhysRevA.52.R3429
14. Bennink RS, Bentley SJ, Boyd RW. “Two-photon” coincidence imaging with a classical source. Phys Rev Lett (2002) 89(11):113601. doi:10.1103/PhysRevLett.89.113601
15. Shapiro JH. Computational ghost imaging. Phys Rev A (2008) 78(6):061802. doi:10.1103/PhysRevA.78.061802
16. Frumker E, Silberberg Y. Femtosecond pulse shaping using a two-dimensional liquid-crystal spatial light modulator. Opt Lett (2007) 32(11):1384–6. doi:10.1364/OL.32.001384
17. Wang Y, Liu Y, Suo J, Situ G, Qiao C, Dai Q. High speed computational ghost imaging via spatial sweeping. Sci Reports (2017) 7(45325):45325. doi:10.1038/srep45325
18. Rajabi-Ghaleh S, Olyaeefar B, Kheradmand R, Ahmadi-Kandjani S. Ultra-fast vivid computational ghost imaging of still and moving objects by sweeping random patterns. J Opt (2020) 22(9):095701. doi:10.1088/2040-8986/aba03d
19. Li X, Deng C, Chen M, Gong W, Han S. Ghost imaging for an axially moving target with an unknown constant speed. Photon Res (2015) 3(4):153–7. doi:10.1364/PRJ.3.000153
20. Gholami-milani S, Olyaeefar B, Ahmadi-kandjani S, Kheradmand R. Grayscale and color ghost-imaging of moving objects by memory-enabled, memoryless and compressive sensing algorithms. J Opt (2019) 21(8):085709. doi:10.1088/2040-8986/ab3063
21. Lian S. Multimedia content encryption: techniques and applications. (New York, United States: CRC Press) (2008).
22. Goldreich O. Foundations of cryptography, volume 2, basic applications. (United Kingdom: Cambridge University Press) (2009).
23. Mahajan P, Sachdeva A. A study of encryption algorithms AES, DES and RSA for security. Glob J Comp Sci Tech (2013).
24. Zhou X, Tang X. August. Research and implementation of RSA algorithm for encryption and decryption. In: Proceedings of 2011 6th international forum on strategic technology. IEEE (2011). p. 1118–21.
25. Cox I, Miller M, Bloom J, Fridrich J, Kalker T. Digital watermarking and steganography. United States: Morgan Kaufmann (2007).
26. Clemente P, Durán V, Tajahuerce E, Lancis J. Optical encryption based on computational ghost imaging. Opt Lett (2010) 35(14):2391–3. doi:10.1364/OL.35.002391
27. Kong LJ, Li Y, Qian SX, Li SM, Tu C, Wang HT. Encryption of ghost imaging. Phys Rev A (2013) 88(1):013852. doi:10.1103/PhysRevA.88.013852
28. Sun M, Shi J, Li H, Zeng G. A simple optical encryption based on shape merging technique in periodic diffraction correlation imaging. Opt Express (2013) 21(16):19395–400. doi:10.1364/OE.21.019395
29. Yang Z, Yuan S, Li J, Bai X, Yu Z, Zhou X. An encryption method based on computational ghost imaging with chaotic mapping and DNA encoding. J Opt (2022) 24(6):065702. doi:10.1088/2040-8986/ac6597
30. Leihong Z, Zhisheng Z, Yi K, Hualong Y, Rui X, Xiao Y, et al. Research on double-layers optical information encryption based on ghost imaging. Opt Commun (2020) 455:124585. doi:10.1016/j.optcom.2019.124585
31. Zhao S, Wang L, Liang W, Cheng W, Gong L. High performance optical encryption based on computational ghost imaging with QR code and compressive sensing technique. Opt Commun (2015) 353:90–5. doi:10.1016/j.optcom.2015.04.063
32. Yi K, Leihong Z, Dawei Z. Optical encryption based on ghost imaging and public key cryptography. Opt Lasers Eng (2018) 111:58–64. doi:10.1016/j.optlaseng.2018.07.014
33. Dubey MK, Ratan R, Verma N, Saxena PK. Cryptanalytic attacks and countermeasures on RSA. In: InProceedings of the third international conference on soft computing for problem solving: SocProS 2013. Springer India (2014). p. 805–19. doi:10.1007/978-81-322-1771-8_70
34. Cheddad A, Condell J, Curran K, Mc Kevitt P. Digital image steganography: survey and analysis of current methods. Signal Processing (2010) 90(3):727–52. doi:10.1016/j.sigpro.2009.08.010
35. Ratan R, Arvind . Bit-plane specific measures and its applications in analysis of image ciphers. In: Advances in signal processing and intelligent recognition systems: 4th international symposium SIRS 2018. Bangalore, India: Springer Singapore (2018). p. 282–97. Revised Selected Papers 4 2019. doi:10.1007/978-981-13-5758-9_24
36. Bromberg Y, Katz O, Silberberg Y. Ghost imaging with a single detector. Phys Rev A (2009) 79(5):053840. doi:10.1103/PhysRevA.79.053840
37. Wu Y, Noonan JP, Agaian S, et al. Npcr and uaci randomness tests for image encryption, Cyber journals: multidisciplinary journals science technology. J Sel Areas Telecommun JSAT (2011) 1:31–8.
38. Ghanbari-Ghalehjoughi H, Eslami M, Ahmadi-Kandjani S, Ghanbari-Ghalehjoughi M, Yu Z. Multiple layer encryption and steganography via multi-channel ghost imaging. Opt Lasers Eng (2020) 134:106227. doi:10.1016/j.optlaseng.2020.106227
39. Hore A, Ziou D. Image quality metrics: PSNR vs. In: SSIM. In2010 20th international conference on pattern recognition. IEEE (2010). p. 2366–9. doi:10.1109/ICPR.2010.579
40. Chan HL, Norrish M. Mechanisation of the AKS algorithm. J Automated Reasoning (2021) 65:205–56. doi:10.1007/s10817-020-09563-y
41. Mousa A, Faragallah OS, El-Rabaie S, Nigm EM. Security analysis of reverse encryption algorithm for databases. Int J Comp Appl (2013) 66(14). doi:10.5120/11153-6255
42. Zhang X, Zhong H, Cao L. Robust compressed ghost imaging against environmental influence factors. Opt Express (2024) 32(2):1669–76. doi:10.1364/OE.507909
43. Sui L, Pang Z, Cheng Y, Cheng Y, Xiao Z, Tian A, et al. An optical image encryption based on computational ghost imaging with sparse reconstruction. Opt Lasers Eng (2021) 143:106627. doi:10.1016/j.optlaseng.2021.106627
Keywords: encryption, correlation coefficient, cryptography, NPCR, NRMS, RSA, steganography, sweeping computational ghost imaging
Citation: Rajabi-Ghaleh S, Olyaeefar B, Kheradmand R and Ahmadi-Kandjani S (2024) Image security using steganography and cryptography with sweeping computational ghost imaging. Front. Phys. 12:1336485. doi: 10.3389/fphy.2024.1336485
Received: 10 November 2023; Accepted: 13 February 2024;
Published: 05 March 2024.
Edited by:
Tao Li, Nanjing University of Science and Technology, ChinaReviewed by:
Ma Hongyang, Qingdao University of Technology, ChinaVinod Patidar, University of Petroleum and Energy Studies, India
Copyright © 2024 Rajabi-Ghaleh, Olyaeefar, Kheradmand and Ahmadi-Kandjani. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
*Correspondence: Sajjad Rajabi-Ghaleh, s_rajabi@tabrizu.ac.ir