Information security is a critical issue in modern society and image watermarking can effectively prevent unauthorized information access. Optical image watermarking techniques generally have advantages of parallel high-speed processing and multi-dimensional capabilities compared with digital approaches. This paper provides a comprehensive review on the research works related to optical image hiding and watermarking techniques conducted in the past decade.The past research works are focused on two major aspects, various optical systems for image hiding and the methods for embedding optical system output into a host image. A summary of the state-of-the-art works is made from these two perspectives.
It is a critical issue to reduce the enormous amount of data in the processing, storage and transmission of a hologram in digital format. In photograph compression, the JPEG standard is commonly supported by almost every system and device. It will be favorable if JPEG standard is applicable to hologram compression, with advantages of universal compatibility. However, the reconstructed image from a JPEG compressed hologram suffers from severe quality degradation since some high frequency features in the hologram will be lost during the compression process. In this work, we employ a deep convolutional neural network to reduce the artifacts in a JPEG compressed hologram. Simulation and experimental results reveal that our proposed "JPEG + deep learning" hologram compression scheme can achieve satisfactory reconstruction results for a computer-generated phase-only hologram after compression.
Quick response (QR) code has been employed as a data carrier for optical cryptosystems in many recent research works, and the error-correction coding mechanism allows the decrypted result to be noise free. However, in this paper, we point out for the first time that the Reed-Solomon coding algorithm in QR code is not a very suitable option for the nonlocally distributed speckle noise in optical cryptosystems from an information coding perspective. The average channel capacity is proposed to measure the data storage capacity and noise-resistant capability of different encoding schemes. We design an alternative 2D barcode scheme based on Bose-Chaudhuri-Hocquenghem (BCH) coding, which demonstrates substantially better average channel capacity than QR code in numerical simulated optical cryptosystems.
In this paper, a special ciphertext-only attack (COA) scenario to the traditional double random phase encoding (DRPE) technique is proposed based on plaintext shifting. We assume the attacker can illegally manipulate the DRPE system to gain multiple ciphertexts from randomly shifted versions of the same plaintext. The plaintext image can be recovered when our proposed scenario is combined with a speckle correlation attacking method proposed in previous work. Simulation results demonstrate that our proposed scheme can successfully crack the DRPE system even when the speckle correlation method alone fails to work in the conventional single ciphertext scenario due to the small size of the plaintext image. The work in this paper reveals a severe security flaw of DRPE systems when minor position shifting of the plaintext occurs.
A secured ghost imaging system can be constructed in a big data environment by generating many ciphertext sequences (including both correct and incorrect ones) from different object images and only allowing authorized users to retrieve the target correct ones. In such schemes, the identification of the truth of the ciphertext is a critical issue. In previous works, a ciphertext authentication scheme for a ghost imaging system was proposed by embedding ciphertext fractions generated from hidden images into the target object ciphertext sequence. However, the substituted ciphertext elements will cause severe degradation in the reconstructed object image quality, especially when a large number of hidden images are employed in a mass user environment. In this paper, we propose a non-destructive ciphertext authentication scheme by recording the positions of the ciphertext elements with similar intensities to form the authentication key, rather than direct embedding. Our proposed scheme has a significant advantage over the previous destructive authentication scheme by preserving the fidelity of the reconstructed object image when the ciphertext is authenticated by many users simultaneously.
Twisting the stacking of layered materials leads to rich new physics. A three-dimensional topological insulator film hosts two-dimensional gapless Dirac electrons on top and bottom surfaces, which, when the film is below some critical thickness, will hybridize and open a gap in the surface state structure. The hybridization gap can be tuned by various parameters such as film thickness and inversion symmetry, according to the literature. The three-dimensional strong topological insulator Bi(Sb)Se(Te) family has layered structures composed of quintuple layers (QLs) stacked together by van der Waals interaction. Here we successfully grow twistedly stacked Sb2Te3 QLs and investigate the effect of twist angels on the hybridization gaps below the thickness limit. It is found that the hybridization gap can be tuned for films of three QLs, which may lead to quantum spin Hall states. Signatures of gap-closing are found in 3-QL films. The successful in situ application of this approach opens a new route to search for exotic physics in topological insulators.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.