scispace - formally typeset
Search or ask a question
Author

Jianzhong Li

Bio: Jianzhong Li is an academic researcher. The author has contributed to research in topics: Key space & Digital watermarking. The author has an hindex of 1, co-authored 1 publications receiving 26 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: Experimental results demonstrate that the proposed image watermarking is not only secure and invisible, but also robust against a variety of attacks.
Abstract: In this paper, a novel secure optimal image watermarking scheme using an encrypted gyrator transform computer generated hologram (CGH) in the contourlet domain is presented. A new encrypted CGH technique, which is based on the gyrator transform, the random phase mask, the three-step phase-shifting interferometry and the Fibonacci transform, has been proposed to produce a hologram of a watermark first. With the huge key space of the encrypted CGH, the security strength of the watermarking system is enhanced. To achieve better imperceptibility, an improved quantization embedding algorithm is proposed to embed the encrypted CGH into the low frequency sub-band of the contourlet-transformed host image. In order to obtain the highest possible robustness without losing the imperceptibility, particle swarm optimization algorithm is employed to search the optimal embedding parameter of the watermarking system. In comparison with other method, the proposed watermarking scheme offers better performances for both imperceptibility and robustness. Experimental results demonstrate that the proposed image watermarking is not only secure and invisible, but also robust against a variety of attacks.

29 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: The use of a structured phase mask enhances the key space for encryption and also overcomes the problem of axis alignment associated with an optical set-up and is likely to provide enhanced security in view of the increased number of encryption parameters.

117 citations

Journal ArticleDOI
TL;DR: This paper provides a comprehensive review of the research works related to optical image hiding and watermarking techniques conducted in the past decade with a summary of the state-of-the-art works.
Abstract: Information security is a critical issue in modern society and image watermarking can effectively prevent unauthorized information access. Optical image watermarking techniques generally have advantages of parallel high-speed processing and multi-dimensional capabilities compared to digital approaches. This paper provides a comprehensive review of the research works related to optical image hiding and watermarking techniques conducted in the past decade. The past research works have focused on two major aspects: various optical systems for image hiding, and the methods for embedding the optical system output into a host image. A summary of the state-of-the-art works is made from these two perspectives.

115 citations

Journal ArticleDOI
TL;DR: The DVFL provides much-desired parameter-rich phase masks which contribute to the enhanced security of the scheme in addition to overcoming the problem of axis alignment in the optical setup, and is examined for its robustness against occlusion and noise attacks.

52 citations

Journal ArticleDOI
TL;DR: A novel method of group multiple-image encoding and watermarking using coupled logistic maps and gyrator wavelet transform is presented and a high level of security can be achieved.
Abstract: A novel method of group multiple-image encoding and watermarking using coupled logistic maps and gyrator wavelet transform is presented. The proposed method employs three different groups of multiple images. The color images of each group are individually segregated into R, G, and B channels. Each channel is first permutated by using a sequence of chaotic pairs generated with a system of two symmetrically coupled identical logistic maps and then gyrator transformed. The gyrator spectrum of each channel is multiplied together and then modulated by a random phase function to obtain a corresponding multiplex channel. The encoded multiplex image is restituted through a concatenation of R, G, and B multiplex channels. The phase and amplitude functions of the first, second, and third groups of encoded multiplex images are generated. The host image is a single-level 2D discrete wavelet transformed to decompose into LL, HL, LH, and HH subbands. HL, LH, and HH subbands are then replaced with phase functions of the first, second, and third groups, respectively. Finally, the resultant image is an inverse single-level 2D discrete wavelet transformed to construct a watermarked image. The three groups of multiple images are protected not only by the encryption algorithm but also visually by the host image. Thus, a high level of security can be achieved. Each group includes group decryption keys, and each image of the group comprises individual decryption keys beside parameters of coupled logistic maps and gyrator transform. As a result, the key space is very large. The decryption system can be realized by using an optoelectronic device. The numerical simulation results confirm the validity and security of the proposed scheme.

40 citations

Journal ArticleDOI
Wenhui Xu1, HongFeng Xu1, Luo Yong1, Tuo Li, Yishi Shi1 
TL;DR: A novel optical encoding method based on single-shot ptychography, which can largely improve the embedding capacity that enables the multiple-watermarking for more transmitted information and higher security.
Abstract: A novel optical encoding method based on single-shot ptychography is proposed for the application of optical watermarking. For the inherent properties of single-shot ptychography, the watermark is encoded into a series of tiny diffraction spots just in one exposure. Those tiny spots have high imperceptibility and compressibility, which are quite suitable for the optical watermarking application. The security of the proposed watermarking is mainly supported by the strong imperceptibility, as well as the introduction of compression encoding and scrambling encoding. In addition, the diversity of the multi-pinhole array and the structural parameters can also be served as security keys. Both numerical simulation and optical experiment demonstrate the high security and the easy implementation of the single-shot-ptychography-based optical watermarking. Further, the compression encoding can largely improve the embedding capacity that enables the multiple-watermarking for more transmitted information and higher security.

40 citations