Skip to main content
Log in

Visual cryptography based on ghost imaging and Hadamard transform

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

Visual cryptography is a potentially important technique for optical information security. However, the limitations of carrier materials and the high precision requirements of the reconstruction process limit the application scope of visual cryptography. Herein, we propose a novel visual cryptography technique based on ghost imaging. The spatial information on one visual key image is encoded into time-varying factors in ghost imaging and loaded onto Hadamard illumination patterns. The secret image can be recovered when the illumination patterns are projected onto another visual key image. This method utilizes light-intensity superposition to overlap visual key image pixels. Simulation and experimental results substantiate the feasibility and security of the proposed technique. This method incorporates the unique advantages of ghost imaging and visual cryptography and is not limited by carrier materials and precision. Hence, it has high scalability and broad application scenarios in ghost imaging broadcasting systems and information authentication, among others.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig.13

Similar content being viewed by others

Data availability

All data generated or analyzed during this study are included in this published article.

References

  1. Li, J.X., Kamin, S., Zheng, G., Neubrech, F., Zhang, S., Liu, N.: Addressable metasurfaces for dynamic holography and optical information encryption. Sci. Adv. 4(6), eaar6768 (2018)

    Article  ADS  Google Scholar 

  2. Liu, Z., Guo, Q., Xu, L., Ahmad, M., Liu, S.: Double image encryption by using iterative random binary encoding in gyrator domains. Opt. Express 18(11), 12033–12043 (2010)

    Article  ADS  Google Scholar 

  3. Peng, D., Huang, Z.F., Liu, Y.L., Chen, Y.H., Wang, F., Ponomarenko, S.A., Cai, Y.J.: Optical coherence encryption with structured random light. PhotoniX 2(1), 1–15 (2021)

    Article  Google Scholar 

  4. Duan, C.F., Zhou, J., Gong, L.H., Wu, J.Y., Zhou, N.R.: New color image encryption scheme based on multiple-parameter fractional discrete Tchebyshev moments and nonlinear fractal permutation method. Opt. Lasers Eng. 150, 106881 (2022)

    Article  Google Scholar 

  5. Naor, M., Shamir, A.: Visual cryptography. In: Advance in Cryptology Euro Crypt’94. Lecture Notes in Computer Science, vol. 950, pp. 1–12. Springer, Berlin (1995)

  6. Yan, B., Xiang, Y., Hua, G.: Improving the visual quality of size-invariant visual cryptography for grayscale images: an analysis-by-synthesis (AbS) approach. IEEE Trans. Image Process. 28(2), 896–911 (2018)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  7. Wu, X., Yang, C.N.: A combination of color-black-and-white visual cryptography and polynomial based secret image sharing. J. Vis. Commun. Image Represent. 61, 74–84 (2019)

    Article  Google Scholar 

  8. Yamamoto, H., Hayasaki, Y., Nishida, N.: Secure information display with limited viewing zone by use of multi-color visual cryptography. Opt. Express 12(7), 1258–1270 (2004)

    Article  ADS  Google Scholar 

  9. Yang, N., Gao, Q., Shi, Y.: Visual-cryptographic image hiding with holographic optical elements. Opt. Express 26(24), 31995–32006 (2018)

    Article  ADS  Google Scholar 

  10. Li, Z., Dong, G., Yang, D., Yang, G., Shi, S., Bi, K., Zhou, J.: Efficient dielectric metasurface hologram for visual-cryptographic image hiding. Opt. Express 27(14), 19212–19217 (2019)

    Article  ADS  Google Scholar 

  11. Lu, D., Liao, M., He, W., Xing, Q., Verma, G., Peng, X.: Experimental optical secret sharing via an iterative phase retrieval algorithm. Opt. Lasers Eng. 126, 105904 (2020)

    Article  Google Scholar 

  12. Shi, Y., Yang, X.: Optical hiding with visual cryptography. J. Opt. 19(11), 115703 (2017)

    Article  ADS  Google Scholar 

  13. Jiao, S., Feng, J., Gao, Y., Lei, T., Yuan, X.: Visual cryptography in single-pixel imaging. Opt. Express 28(5), 7301–7313 (2020)

    Article  ADS  Google Scholar 

  14. Pittman, T.B., Shih, Y.H., Strekalov, D.V., Segienko, A.: Optical imaging by means of two-photon quantum entanglement. Phys. Rev. A 52(5), R3429–R3432 (1995)

    Article  ADS  Google Scholar 

  15. Bromberg, Y., Katz, O., Silberberg, Y.: Ghost imaging with a single detector. Phys. Rev. A 79(5), 1744–1747 (2008)

    Google Scholar 

  16. Gong, W.: High-resolution pseudo-inverse ghost imaging. Photon. Res. 3, 234–237 (2015)

    Article  Google Scholar 

  17. Lyu, M., Wang, W., Wang, H., Wang, H., Li, G., Chen, N., Situ, G.: Deep-learning-based ghost imaging. Sci. Rep. 7(1), 17865 (2017)

    Article  ADS  Google Scholar 

  18. Daniele, F.: Optical communications: temporal ghost imaging. Nat. Photon. 10(3), 150–152 (2016)

    Article  MathSciNet  Google Scholar 

  19. Meng, W., Shi, D., Yuan, K., Zha, L., Huang, J., Wang, Y., Fan, C.: Fourier-temporal ghost imaging. Opt. Lasers Eng. 134, 106294 (2020)

    Article  Google Scholar 

  20. Clemente, P., Durán, V., Torres-Company, V., Tajahuerce, E., Lancis, J.: Optical encryption based on computational ghost imaging. Opt. Lett. 35(14), 2391–2393 (2010)

    Article  ADS  Google Scholar 

  21. Kang, Y., Zhang, L., Ye, H., Zhao, M., Kanwal, S., Bai, C., Zhang, D.: One-to-many optical information encryption transmission method based on temporal ghost imaging and code division multiple access. Photon. Res. 7(12), 1370–1380 (2019)

    Article  Google Scholar 

  22. Huang, X., Nan, S., Tan, W., Bai, Y., Fu, X.: Ghost imaging influenced by a supersonic wind-induced random environment. Opt. Lett. 46(5), 1009–1012 (2021)

    Article  ADS  Google Scholar 

  23. Zhang, A.X., He, Y.H., Wu, L.A.: Tabletop x-ray ghost imaging with ultra-low radiation. Optica 5(4), 374–377 (2018)

    Article  ADS  Google Scholar 

  24. Balakin, D.A., Belinsky, A.V.: Extraction of additional information during quantum ghost imaging and its processing. Quantum Inf. Process. 19, 316 (2020)

    Article  ADS  MATH  Google Scholar 

  25. Wang, L., Zhao, S.: Fast reconstructed and high-quality ghost imaging with fast Walsh-Hadamard transform. Photon. Res. 4(6), 240–244 (2016)

    Article  Google Scholar 

  26. Zhang, Z., Wang, X., Zheng, G., Zhong, J.: Hadamard single-pixel imaging versus Fourier single-pixel imaging. Opt. Express 25(16), 19619–19639 (2017)

    Article  ADS  Google Scholar 

  27. Ye, Z., Wang, H., Xiong, J., Wang, K.: Simultaneous full-color single-pixel imaging and visible watermarking using Hadamard-Bayer illumination patterns. Opt. Lasers Eng. 127, 105955 (2020)

    Article  Google Scholar 

  28. Chen, C., Yang, H.: Correlation between turbulence-impacted optical signals collected via a pair of adjacent spatial-mode receivers. Opt. Express 28, 14280–14299 (2020)

    Article  ADS  Google Scholar 

  29. Huanga, Z.W., Zhou, N.R.: An image encryption scheme based on discrete cosine Stockwell transform and DNA-level modulus diffusion. Opt Laser Technol. 149, 107879 (2022)

    Article  Google Scholar 

  30. Kang, Y., Zhang, L., Zhang, D.: Optical encryption based on ghost imaging and public key cryptography. Opt. Lasers Eng. 111, 58–64 (2018)

    Article  Google Scholar 

  31. Li, F., Zhao, M., Tian, Z., Willomitzer, F., Cossairt, O.: Compressive ghost imaging through scattering media with deep learning. Opt. Express 28, 17395–17408 (2020)

    Article  ADS  Google Scholar 

  32. Wang, F., Wang, H., Wang, H., Li, G., Situ, G.: Learning from simulation: an end-to-end deep-learning approach for computational ghost imaging. Opt. Express 27, 25560–25572 (2019)

    Article  ADS  Google Scholar 

Download references

Acknowledgements

The authors are indebted to the anonymous referees for their instructive comments and suggestions.

Funding

This research was funded by the National Natural Science Foundation of China (Grant No. 62205207).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dawei Zhang.

Ethics declarations

Conflict of interest

All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix

Appendix

Two visual cryptography schemes are described in this paper. One extends secret images into two meaningless images while in the other, secret images can be composed of two meaningful images. These two coding methods are described as follows.

1.1 A. The (2,2) visual cryptographic coding scheme

In this scheme, a secret image is extended into two meaningless images. Any image cannot get information about the secret image. The secret image can be obtained only if the two images are superimposed together. The operation of encryption and decryption is shown in Fig. 

Fig. 14
figure 14

Process schematic diagram of encryption and decryption of visual cryptographic

14.

We first process the secret image in pixels, and each pixel is divided into two shared blocks. The separation rule is shown in Table

Table 2 The encryption rules of the (2, 2) scheme

2.

When a pixel in the secret image is a white pixel, we can randomly select a combination mode of white pixels as presented in Table 1. The two shared blocks contain two subpixels, one black and one white, and the results are also black and white when two shared blocks are superimposed. When a pixel is black, we randomly choose the combination mode but the superposition result is black. Thus, the secret image is extended into two shared images. Because of the random selection, each black or white pixel in the secret image is encrypted into two subpixels (one black and one white) in the shared image, so it is not possible to obtain any information on the secret image from the shared image. The information on the secret image can only be obtained in the case of overlapping of the two shared images.

In this rule, one pixel in the secret image is expanded into two subpixels, so the shared image is twice as large as the secret image. For instance, when the size of the secret image is \(128 \times 128\) pixels, the size of the shared image is \(128 \times 256\) pixels. One pixel can also be expanded into 4, 8, or 16 subpixels according to this rule. In this study, one pixel is expanded into 4 subpixels.

1.2 B. An enhanced visual-cryptographic coding scheme

In this coding scheme, multiple shared images are generated based on the secret image and mask images, and the shared image is a halftone image generated after encoding the mask image. When multiple shared images overlap, the secret image can be recovered.

We encode the image as a halftone image and the grayscale value of each pixel in the image determines the number of black and white pixels in the halftone image’s subpixels. We divide the grayscale values of the image into different levels. Herein, they are divided into 16 levels (the grayscale value of 0~15 is the 1 level and 16~31 is the 2 level). A pixel in the original image is expanded into a \(4 \times 4\) subpixel. For example, if the grayscale value of a pixel is 100, then its grayscale level is 7, so there are seven white pixels in a \(4 \times 4\) grid. After processing, the size of the original \(128 \times 128\) pixel image will become \(512 \times 512\), as shown in Fig. 

Fig. 15
figure 15

a Original image. b Halftone image

15.

The order of the black and white pixels in the subpixels will not affect the visual effect but will give the overlay result different grayscale levels. As shown in Fig. 

Fig. 16
figure 16

Examples of subpixel arrangements. Arranging two subpixels with \(a = 6/16\) and \(b = 9/16\) as the examples make \(c = 9/16,\;c = 15/16,\;c = 10/16\)

16, the two subpixels’ grayscale levels are 6 and 9, respectively. If their black and white pixels are located at different positions then the grayscale level of their superimposed results also differs.

According to the rules, the secret and shared images are encoded into halftone images. The order of the black and white pixels in the two shared images’ subpixels is adjusted according to the grayscale level of the secret image. If necessary, we can slightly change the grayscale level of the shared images’ subpixels. The coded shared image can be superimposed to obtain the expected grayscale level and the secret image can be reproduced. Figure 

Fig. 17
figure 17

Specific example of the enhanced visual-cryptographic coding scheme. a Shared image 1. b Shared image 2. c Reconstructed secret image

17 shows a specific example.

Using this scheme, the secret image can be composed of meaningful images which significantly increases the information capacity and reduces the possibility of being suspected.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kang, Y., Zhang, L., Ye, H. et al. Visual cryptography based on ghost imaging and Hadamard transform. Quantum Inf Process 22, 116 (2023). https://doi.org/10.1007/s11128-022-03821-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11128-022-03821-1

Keywords

Navigation