- Advanced Photonics Nexus
- Vol. 3, Issue 5, 056016 (2024)
Abstract
1 Introduction
With the increasing demand for personal privacy and the growing scarcity of communication resources, multiuser encryption has become an important trend for the future development of optical cryptography. Among the optical cryptography methods, single-pixel imaging (SPI), as a typical type of indirect computational imaging technique, has revealed significant potential due to the non-visual and encryption-like imaging principle.1
Fortunately, key management, playing as the upstream layer of plaintext encryption responsible for all the tasks of related keys,14
Thus, in this paper, we provide a complete solution to multiuser SPI cryptography and authentication framework combined with OFDM-assisted key management. Within the framework, regional and global encryptions are first conducted to form a composite intensity sequence to be transmitted to different individuals, simultaneously generating the corresponding keys specially used by users. Then, keys are isolated into independent frequency points and asymmetrically encapsulated into a Malus metasurface by OFDM-assisted key management. By the key distribution of the metasurface in a polarized manner, users can eventually recover their designated SPI images and verify their authenticity. To verify the security of the multiuser SPI framework, five pioneering SPI encrypting works relying on direct plaintext encryption and our scheme are compared. The results show that the multiuser scheme can resist multiple types of attacks and can verify the authenticity even when one of the users is compromised to Eve. Our work facilitates the development of indirect computational imaging security into the multiuser framework, enhancing its application in secure optical communication, anticounterfeiting, and security.
Sign up for Advanced Photonics Nexus TOC. Get the latest issue of Advanced Photonics Nexus delivered right to you!Sign up now
2 Principle and Methodology
2.1 Multiuser SPI Encryption and Authentication Framework
Figure 1 shows the procedure of users. plaintexts with an authentication image are first encrypted and transmitted by the Fourier SPI encryption. While in key space, a pair of private key sets and dedicated to decryption and authentication, respectively, and a commonly used key set for all users are generated. Enabled by OFDM-like and RSA asymmetric coding, and are multiplexed and cross-encapsulated as , sealed with into the light envelope of a Malus metasurface. In the receiving end, two polarized channels of the metasurface are inversely extended into keys (i.e., three types of key sets) for users. Receiving the bucket signal, users can retrieve plaintexts privately using their own keys and further collaboratively verify the authenticity of the decrypted images. In the following sections, we will quantify this process, taking as a case study, to demonstrate the detailed mechanism of our method.
Figure 1.Concept of the multiuser SPI security framework.
2.2 Composite Fourier SPI Encryption
As shown in Fig. 2, the Fourier SPI encryption is composed of regional encryption, containing whitening and permutation, basically providing internal privacy among users, and global encryption, including diffusion and Fourier SPI, of all users for authentication and countering malicious attacks from Eve. In order to conduct the encryption, whitening, permutation, and diffusion keys , , and are generated in terms of chaos and will be further processed in terms of key management.
Figure 2.Schematic of the Fourier SPI encryption. The host digitally processes
For regional encryption, as shown in Fig. 3(a), plaintexts , , with the identical dimension of pixels (i.e., here ) are planarly concatenated into a triplex-grid image , in which are the private plaintexts for each user whereas the common is attached in case of counterfeiting for authentication of all users. Because the direct super-pixel permutation of plaintexts without any alteration of image pixel values can still reveal the content information and are affected by ciphertext analysis, as shown in Fig. 3(b), the integrated image should be whitened pixel-by-pixel in advance to cover the basic texture.
Figure 3.Schematic of regional encryption. (a) Texture information and spacing distribution of pixels can be scrambled by whitening and permutation, whereas (b) permutation-only encryption still can reveal the content information.
Therefore, for each , we define nine chaotic masks , , independently corresponding to different initial conditions of chaos, including the type index of generation functions , the starting values of chaotic sequence , the sequence size , and the initial number to start count . The generation of the whitening masks by the four chaos conditions is shown in Fig. 4. The type of generation functions is independently chosen among the Bernoulli map, piecewise linear chaotic map (PWLCM), and Lorenz map. Then, we integrate the following generated masks into triplex-grid form and XOR it with : .
Figure 4.Flowchart for generating different whitening masks
Subsequently, the adjacent (i.e., here ) regular pixels in form a super-pixel, and super-pixels integrate the whole , with the coordinate index ranging from 0 to 575. Note that and . Afterward, we re-utilize the PWLCM chaos to generate the corresponding permutation matrix to scramble the index 0 to 575, equivalent to switching the position of each super-pixel within the entire : . For the of each user, the permutation key is noted as and , , constituting the whole .
For global encryption, a series of masks , , are sequentially generated in terms of the initial chaos conditions . The rows and columns of are applied as the basic unit to finish rounds of diffusion specific to . In general, should be satisfied to achieve an effective avalanche effect against cryptanalysis, particularly differential analysis. Thus, two-round diffusion is used in our design, and an instance flowchart of diffusion is shown in Fig. 5. XOR is used in the first diffusion, and MOD calculation is used in the second round so that only one mask can be used to realize the effective diffusing performance, declining the workload of further key processing.
Figure 5.Schematic of diffusion encryption.
Eventually, the diffused image is illuminated by Fourier structured light to be broadcasted to users. For the generation of structured light, four-step phase shifting is applied in SPI encryption. Four Fourier patterns are designed to be , , where and denote the two-dimensional (2D) Cartesian coordinates in the scene and spatial frequency distribution of images, respectively, while and denote the average image intensity and image contrast, respectively. After the illumination of each set of four-step phase shifted patterns, four intensities can be acquired by each user. Following this process, a corresponding Fourier coefficient of the target can be further obtained by .35 Finally, after collecting all the Fourier coefficients, users only have to operate inverse fast Fourier transform (IFFT) to recover the image without correlating with any pattern. The complete code demonstration of composite Fourier encryption can be found in Sec. S1 in the Supplementary Material.
Different encrypting steps generate keys with different functions. According to the functions, we divide the keys as two groups for separate management. Regional encryption is privately used for each user to independently protect their own plaintext. Thus, , , form and , is treated as the access of the metasurface to . Global encryption is commonly used for all users countering external attacks from Eve. Thus, and are grouped as , also publicly used to retrieve the authentication image . Simultaneously, to verify the authentication image, we also generate a synonym (i.e., dwelling) from as an authentication key, namely token, for parallel OFDM-like modulation.
2.3 OFDM-Assisted Key Management
As shown in Fig. 6(a), after SPI encryption, key management is used to isolate and distribute corresponding keys to different users, addressing the contradiction between multiuser privacy and SPI broadcast transparency. Figure 6(b) shows the encapsulating flowchart of key management. The authenticating token generated from is first divided into eight parallel components, which are further isolated onto separate OFDM carriers, producing as the eight private keys for synergic authentication and a multiplexed ciphertext . Then, and are further cross-encapsulated by RSA to terminate the progressive dependency of key generation. Consequently, each user can use the asymmetric RSA pair to decrypt their keys coded in the OFDM sequence. Finally, nanobricks are used to modulate the polarization state of the cross-encapsulated keys pixel-by-pixel, forming a discrete and stable structure for key service.
Figure 6.Design concept of OFDM-assisted key management. (a) Connecting role of key management between SPI encryption and multiple users. (b) Keys are separately processed by OFDM-like coding and RSA, zoned as the private channel and public channel, which are further physically confused by polarization and etched into the metasurface.
For OFDM-like coding, the complex Fourier bases in traditional OFDM algorithms are first replaced by trigonometric bases. Other modulating bases, such as Chebyshev polynomial and Hadamard sequences, are also considered as one of the encoding options (see Sec. S1 in the Supplementary Material) to enlarge the key space. In addition, to demodulate the coded sequence without distortion in user ends, the adjacent subcarriers are designed to secretly differ by one complete period in an OFDM symbol duration with a sampling rate . The symbol rate is regarded as symbol/s, equivalent to the bit rate. Moreover, to ensure separability when decrypting plaintexts, frequency interval among subcarriers should be greater than the , whereas to handle more users, is derived as unit 1 to be as less as possible. The modulating process of the token is shown in Fig. 7(a) and Fig. S1 in the Supplementary Material. The token is first compartmentalized into single letters as sub-tokens. Each sub-token (e.g., the initial “” corresponding to user 1) is then transferred into an ACSII character as we regulate the metasurface to be monochrome in view of the error tolerance of keys and possible errors triggered by manual recognition of grayscale pixels, noted as a binary vector , , (e.g., “” → “01000100”). Then, eight frequency indices denoted as are randomly initialized and assigned to eight users as the first-level keys. The subcarrier of ’th user is written as , and the orthogonality is expressed as Eq. (2), where and :
Figure 7.Design principle of the OFDM-assisted key management. (a) Flowchart of OFDM-like coding. (b) Time-frequency diagram of
Note that denotes the randomly chosen initial frequency. Based on this principle, each symbol of is separately modulated by the assigned subcarrier in terms of Eq. (3):
Symmetric encryption, such as OFDM-like coding, can trigger an extension of the trust chain, continuously requiring another cryptography to protect the keys in turn produced by the one before. Thereby, as a root of trust, OFDM-like coding needs to be further integrated with RSA asymmetric coding to terminate the progressive dependency. Through the process, ’th user produces a unique pair of keys, in which the public is broadcasted and the private is preserved. Receiving for each user, the host connects the private key set and in serial and encapsulates them as a whole plaintext to acquire the binary ciphertext . As a result, , which contains all information about and recorded in the private channel, whereas and are publicly used for members generally with a lower security requirement, is arranged serially to form the public channel expression of the metasurface, as shown in Fig. S2 in the Supplementary Material (see S3 in the Supplementary Material).
Finally, a Malus metasurface is used to record the processed keys to provide information entities, integrating the 17 subchannels of keys into a whole as well. A rectangular aluminous nanobrick is designed to be etched on a top of glass substrate, forming a unit nanobrick cell, where , , , and . The size of the unit cell is optimized according to the relative polarized reflection efficiency (RPRE), as shown in Fig. 7(c), and the corresponding operating wavelength is set as . Simultaneously, the simulated reflectivity and transmissivity of the incident light polarized along the long-axis () are shown in Fig. 7(d) (for more optimization details, see Sec. S3 in the Supplementary Material). According to the Jones derivation, the orientation angle is selected among the four: 0, 45, 90, and 135 deg, as shown in Fig. 7(e). Specifically, the private channel of and public channel of and are set as , and , , respectively, where and denote the rotating angle of a polarizer and an analyzer, respectively. Note that as long as the metasurface can clearly display key information to achieve the security function of keys, the parameters of the nanobricks, including material or shape, are not strictly confined. Finally, the metasurface of with the size of is fabricated, as shown in Fig. 7(f). Each pixel is composed of a nanobrick array.
3 Results
3.1 Experimental Decryption and Authentication
The optical experimental configurations of the multiuser SPI encryption and authentication framework with the metasurface are shown in Fig. 8. The setup of the multiuser SPI encryption framework and decryption mechanism is shown in Fig. 8(a). The laser beam is emitted by a light source operating at the wavelength of 625 nm. Then, the laser beam is reflected by a DMD (Amphenol V-7001 VIS), and the modulated patterns are expanded by an expanding lens. Subsequently, the patterns are projected onto the object plane and gathered by a bucket detector (Thorlabs DET100A2 320 to 1100 nm) equipped with a photodiode amplifier (Thorlabs PDA200C) and a data acquisition (DAQ) board (NI USB-6343). During the experiment, since two bucket detectors are owned only, four repeated experiments were conducted, where the two intensity detectors were separately positioned in different locations in each experiment to imitate the original eight users.
Figure 8.Optical setup of the proposed scheme. (a) Setup of the multiuser SPI encryption framework and decryption mechanism. (b) Configuration of key distribution.
For decryption and receiving the bucket signals, eight users first need to operate the IFFT to acquire . Then, each user accesses the metasurface to decode their keys. The experimental setup of acquiring keys by the metasurface is based on a BA310MET-T microscope, as shown in Fig. 8(b). First, they access the public channel of the metasurface and extract from for global decryption. Sequentially, for RSA decryption, the ’th user accesses the private channel to decode by , obtaining the for regional decryption and for OFDM demodulation. Note that when the ’th user accesses the private channel, all the actually have been exposed to him. However, because the ’th user only owns the unpublished , only the ciphertext can be decoded, whereas the other are still under protection of RSA. After acquiring and , the user eventually can recover of his own privately, as shown in Fig. 8(a), during which the decryption is symmetrically inverse to the regional encryption of the composite Fourier SPI encryption.
For authentication, is first reconstructed in the public channel to retrieve the common . Implementing the decrypted by RSA decryption, users recover subcarriers afterward to demodulate , acquiring their secret sub-token by . During the calculation, the ’th symbol in corresponding to the ’th user can be represented by the inner product of the ’th row in and carrier : . After ACSII-to-character transforms, the eight letters are consociated in sequence, and it is evaluated whether the combined word matches , as shown in Fig. 9. The synergetic scheme is specially established for the multiuser scenario since a single letter can convey a multitude of implications, such as “” revealing “document,” “paddle,” and “wood.” Unless a sufficient number of users cooperate with others, the splitting letter can reveal little information. Therefore, the authenticating credibility (i.e., house element in ) can still be maintained even if one of the users is compromised to Eve.
Figure 9.Synergetic authentication mechanism. The red dashed box shows the retrieving process of
3.2 Security Assessment by Confrontation and Numerical Analysis
3.2.1 Deep differential attack
The essence of an encrypting scheme consists of confrontation. Thus, we develop a cracking model of SPI encryption, namely a deep differential attack (technical details are supplied in S5 in the Supplementary Material), to intuitively demonstrate the security and capacity of the proposed multiuser scheme. The security and capacity are assessed in terms of the external and internal attack, respectively (see Sec. S5.1 in the Supplementary Material). Five current works without key management, including single-user SPI-metasurface encryption,13 single-user SPI encryption,8,11,36 and multiuser SPI encryption,6 are also attacked for comparison. The numbers of encrypting steps are 3, 2, 1, 4, and 2, indicating different levels of attacking difficulty. Also, we carry on the confrontation on three different datasets including MINIST, USC-SIPI, and University-1652 to verify the security generalization of the multiuser SPI encryption framework.
As shown in Fig. 10, the ciphertexts of the five current SPI encrypting schemes are approximately cracked. Intuitively, the sensitive profiles, particularly letters or foreground objects, can be roughly recognized though the recovered ones differ from the ground truths and legally decrypted versions. This inconsistency occurs mainly due to the different methods and depths of encryption, which means that the errors can gradually accumulate as the cryptanalysis progresses step by step. But for our method, the external attack turns out to be ineffective in seeking correlation between the SPI optical paths and key management, showing the effective security of the multiuser SPI cryptography framework. In addition, the imperceptible outcomes suggest that internal users also are unable to decipher the plaintexts of others. Thus, the independent encrypted transmission of each user and, consequently, the SPI encryption capacity under the multiuser scheme are available. Provided that the security and capacity of multiple users are satisfied, the multi-user SPI encryption and authentication framework is achieved.
Figure 10.Attacking results from a deep differential attack. G. T., D. V., and C. V. denote ground truth, the legal decrypted version, and cracked version, respectively. Ex. Att. and In. Att. mean the external and internal attacking results from Eve and internal user, respectively. The attack mode is only directed toward the pertinent stages of SPI encryption. The measures unrelated to encryption, such as steganography and holography, are assumed to be prior-known by default. SCU is the abbreviation of Sichuan University and is used with the permission of Sichuan University.
3.2.2 Brute force attack
Further, a brute force attack is conducted for the SPI image encryption and key management. Technically, the brute force attack against OFDM-assisted key management refers to the attack against the authentication key and ciphertext key presented in the two meta-channels separately, whereas the attack against Fourier SPI encryption refers to the bucket signal .
For the attack against OFDM-assisted key management, authentication key should be first considered. During the process, a set of candidates of OFDM modulation should be first determined, which is also the merit compared to the optical encryption inspired by code division multiplexing (CDM).5,37 Specifically, only one type of parameter (i.e., the index of orthogonal codes) pertains in CDM to encrypt plaintexts, whereas the type of the modulation bases, symbol modulating categories, , , and in OFDM, can supply more complex key space. For , a 1024-bit key is needed for RSA encryption, and thus the key space is roughly on the order of .
For the brute force attack against SPI Fourier image encryption, the key length of chaos conditions of whitening mask refers to 64-8-8-8-bit. The generating conditions of and are presented in bits in the same way. Thus, in total, the key space of the key management algorithm and image encryption is shown in Table 1. The results show that both the key spaces are larger than the minimal requirement ,38 showing the ability to resist the brute force attack.
Objective | Key category | Key space | |
Key management on the metasurface | 7 | Pass | |
SPI Fourier encryption for images | 4 | Pass |
Table 1. Key space of Fourier SPI image encryption and key management.
3.2.3 Tampering attack
Encryption attacks not only involve the illegal acquirement of plaintexts, such as the deep differential attack and brute force attack, but also include the destruction of ciphertexts, such as tampering, forgery, and noise disturbance. Hence, we study the resilience to errors of the OFDM-like encoded sequence within the metasurface, in scenarios where tampering or defective pixels occur due to partial detachment of nanostructures or oxidation. White dots are assumed to be wrongly recognized with the error ratios from 0% to 25%, as shown in Fig. 11(a). To evaluate the general applicability of the error tolerance, we randomly select pixels to introduce errors.
Figure 11.Error tolerance analysis. (a) Recovered token display under the recognition errors occurring with different ratios. (b) BER performance of OFDM-like coding and the raw token.
In Fig. 11(a), it is observed that the token can be completely recovered within the error ratio equaling to 10%. Besides, as the error ratio increases to 20%, the recovered “dwelling” begins to experience misspelling but still remains within the range of single letter error. When one-fourth of the metasurface is tampered with or rendered unrecognizable, errors in the spelling of the letters “” and “” in the token begin to appear. More intuitively, Fig. 11(b) compares the corresponding bit error rate (BER) performance of and the direct recognition of string without OFDM correction. The results show that our OFDM BER always remains lower than the BER of direct recognition. This is because, by the modulation of each sub-token, the effective authentication information is dispersed across the orthogonal carriers, thereby mitigating the sharp recognition offset of the sub-token, indicating our OFDM-metasurface is robust against tampering attacks.
3.2.4 Numerical assessment
Except for direct confrontation, we also conducted numerical analysis on the SPI ciphertext, including the light intensity sequence and . Figures 12(a) and 12(b) show an intensity sequence and three-dimensional randomness view of three local sequences sampled from the sequence. It is observed that the broadcasted does not reveal any obvious characteristic and the kurtosis of sequence equals , showing that there is no obvious intensity outlier for Eve to analyze.
Figure 12.Numerical assessment of bucket signal
Figure 12(c) presents the histogram of . From the results, the pixel distribution of has been eliminated, and no statistical information is leaked. Simultaneously, the variance, chi-square, and flatness are adopted to quantitatively analyze the histogram. The variance of is 339.61, and flatness equals 0.0031, indicating the uniform alteration of pixels in the ciphertext. Also, the chi-square is calculated as 268.49 lower than the threshold , where the significant level is set as 0.05. Figure 12(d) shows the weak correlation of pixels in horizontal, vertical, and diagonal directions, and the quantitative correlation in the three directions are 0.00526, 0.00217, and 0.00283, respectively. The global entropy is calculated as 7.9977. Except for the global entropy, we also calculate the local Shannon entropy to test the indeterminacy of the regional area in . Thirty blocks are randomly divided in , and the size of each segmented block should be set as .39 Subsequently, the local Shannon entropy is derived as 7.9028, satisfying the effective interval ranging from to . Finally, the NPCR and UACI are calculated as 99.63% and 33.16%, respectively, approximating the ideal performance of 99.6094% and 33.4635%40 and thus indicating the desirable sensitivity. (The parameter comparison of ciphertext and other three plaintexts is shown in Table S1 in the Supplementary Material).
4 Discussion and Conclusion
For a cryptography, security and capacity are the most important concerns to be developed into multiuser framework. The limited two have been the inherent issues for SPI encryption due to the pattern-projection-depended principle in Eq. (1).1
To summarize, we have developed a multiuser SPI cryptography and authentication framework combined with OFDM-assisted key management. This approach allows multiple users to privately reconstruct different plaintexts, concurrently resisting multiple kinds of attacks and realizing authentication. The framework consists of four components, including a composite Fourier SPI encrypting method, key management, experimental decryption and authentication, and security assessment, recording the whole life of keys from generation to application. The realization of the proposed multiuser SPI framework, including security and capacity, is verified by simulation and numerical experiments. By the combination of direct key management and indirect image encryption, our work realizes the multiuser computational imaging encryption and authentication framework, facilitating its development toward more complicated application scenes.
5 Appendix: Fabrication and Attack
The main notations of this paper are listed as follows. The lowercase, uppercase, boldface lowercase, and boldface uppercase letter , , , and denote a scalar variable, constant, vector, and matrix, respectively. denotes the real-part operation, denotes the transpose of matrix , denotes position exchange, denotes the norm of vector , and denotes the inner product.
5.1 Sample Fabrication
The metasurface was fabricated by electron beam lithography (EBL). A layer of photoresist was spin-coated on a clean JGS1 substrate, followed by the sample bake. After the process above repeated once, the conductive adhesive AR-PC 5090.02 was spin-coated, and then the baked sample was exposed in LC-40 EBL mode with 140 pA beam current. The AR 600-55 developer and subsequent IPA fixer were used. A 50-nm-thick layer of aluminum was then deposited by electron beam evaporation, and the sample was soaked in acetone to peel off the metal layer.
5.2 Deep Differential Attack
Equation (4) demonstrates the instance process of a typical sort of SPI cryptography, which is likely to encrypt patterns as keys and then scramble (i.e., or by other process) the intensity.6,13,36 denotes the plaintext. denotes the original pattern set, and denotes the patterns encrypted by key , where represents each encrypted one. denotes noise, and , represents scrambling masks:
For differential analysis, the equivalent mask is first derived by reflexivity: , where denotes an all-zero matrix. Then, we artificially differentiate each pixel of to observe the degree of change in , representing the binary value of a pattern at the corresponding position. Mathematically, (i.e., Jacobian matrix) can be acquired:
Regardless of how complicated the cryptographer operates on patterns, we are only concerned with the containing all the information of both and . As long as and intensity are obtained, the plaintext can be retrieved by the classic SPI correlation.
When encryption algorithms are so complex that greatly deviates from (i.e., recovering keys by analyzing encrypting steps is not viable), deep learning is required to further mitigate the distortion by directly analyzing the key set (i.e., OFDM-assisted key management), shown in Fig. S7 in the Supplementary Material. For encryptions without a key-management platform, correct key sets are directly employed as labels to train the network for key compensation. Here, the network defined by a set of weights and biases with regularization is applied:
Xiaowei Li received his MS and PhD degrees in information and communications engineering from Pukyong National University, Busan, South Korea, in 2011 and 2014, respectively. From 2014 to 2015, he was a researcher at the College of Computer Engineering, Yonsei University, Seoul, South Korea. He is currently a professor at the School of Electronics and Information Engineering, Sichuan University, Chengdu, China. He authored or co-authored approximately 80 papers cited by Science Citation Index (SCI). As first author, he has published approximately 50 SCI papers, and the impact factor of half of the papers is greater than 3. His research interests include three-dimensional integral imaging, holography, optical encryption, and image watermarking.
Qiong-Hua Wang is a professor of optical engineering at the School of Instrumentation and Optoelectronic Engineering, Beihang University, Beijing, China. She was a professor at Sichuan University from 2004 to 2018. She was a post-doctoral research fellow at the School of Optics/CREOL, University of Central Florida, from 2001 to 2004. She worked at the University of Electronic Science and Technology of China (UESTC) from 1995 to 2001. She received BS, MS, and PhD degrees from UESTC in 1992, 1995, and 2001, respectively. She has published more than 300 papers cited by SCI and authored three books. She holds 5 U.S. patents and more than 150 Chinese patents. She is a fellow of the Society for Information Display and an associate editor of the Journal of the Society for Information Display, Journal of Information Display, and PhotoniX. Her research interests include display and imaging technologies.
Yiguang Liu was a research fellow, visiting professor, and senior research scholar at the National University of Singapore, Singapore; Imperial College London, London, UK; and Michigan State University, East Lansing, Michigan, USA, respectively. He was chosen into the MOE program New Century Excellent Talents in 2008 and chosen as a scientific and technical leader in Sichuan Province in 2010. He is currently the director of the Vision and Image Processing Laboratory and a professor at the School of Computer Science, Sichuan University, Chengdu, China, and a reviewer for the Mathematical Reviews of the American Mathematical Society. He has co-authored more than 100 international journal and conference papers and a chapter of the book entitled Computational Intelligence and Its Applications (Imperial College Press, 2011). His research interests include computer vision and image processing, computational imaging, and computational intelligence.
Biographies of the other authors are not available.
References
[3] B. Sun et al. 3D computational imaging with single-pixel detectors. Science, 340, 844-847(2013).
[6] Z. Zhang et al. Secured single-pixel broadcast imaging. Opt. Express, 26, 14578-14591(2018).
[11] S. Jiao et al. Visual cryptography in single-pixel imaging. Opt. Express, 28, 7301-7313(2020).
[29] X. Guo et al. Stokes meta-hologram toward optical cryptography. Nat. Commun., 13, 6687(2022).
[32] X. Yin et al. Photonic spin hall effect at metasurfaces. Science, 339, 1405-1407(2013).
[34] G. L. Stuber et al. Broadband MIMO-OFDM wireless communications. Proc. IEEE, 92, 271-294(2004).
[40] Y. Wu et al. NPCR and UACI randomness tests for image encryption. Cyber J.: Multidiscipl. J. Sci. Technol., J. Sel. Areas Telecommun., 3, 31-38(2011).
Set citation alerts for the article
Please enter your email address