{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,15]],"date-time":"2025-01-15T17:40:36Z","timestamp":1736962836405,"version":"3.33.0"},"reference-count":45,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2024,2,4]],"date-time":"2024-02-04T00:00:00Z","timestamp":1707004800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Beijing Natural Science Foundation","award":["4222016"]},{"name":"National Defence Science and Technology Innovation Zone","award":["23-TQ09-41-TS-01-011"]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"Optical encryption based on single-pixel imaging (SPI) has made great advances with the introduction of deep learning. However, the use of deep neural networks usually requires a long training time, and the networks need to be retrained once the target scene changes. With this in mind, we propose an SPI encryption scheme based on an attention-inserted physics-driven neural network. Here, an attention module is used to encrypt the single-pixel measurement value sequences of two images, together with a sequence of cryptographic keys, into a one-dimensional ciphertext signal to complete image encryption. Then, the encrypted signal is fed into a physics-driven neural network for high-fidelity decoding (i.e., decryption). This scheme eliminates the need for pre-training the network and gives more freedom to spatial modulation. Both simulation and experimental results have demonstrated the feasibility and eavesdropping resistance of this scheme. Thus, it will lead SPI-based optical encryption closer to intelligent deep encryption.<\/jats:p>","DOI":"10.3390\/s24031012","type":"journal-article","created":{"date-parts":[[2024,2,5]],"date-time":"2024-02-05T08:28:29Z","timestamp":1707121709000},"page":"1012","source":"Crossref","is-referenced-by-count":2,"title":["Optical Encryption Using Attention-Inserted Physics-Driven Single-Pixel Imaging"],"prefix":"10.3390","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9481-2389","authenticated-orcid":false,"given":"Wen-Kai","family":"Yu","sequence":"first","affiliation":[{"name":"Center for Quantum Technology Research, Key Laboratory of Advanced Optoelectronic Quantum Architecture and Measurement of Ministry of Education, School of Physics, Beijing Institute of Technology, Beijing 100081, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3469-5296","authenticated-orcid":false,"given":"Shuo-Fei","family":"Wang","sequence":"additional","affiliation":[{"name":"Center for Quantum Technology Research, Key Laboratory of Advanced Optoelectronic Quantum Architecture and Measurement of Ministry of Education, School of Physics, Beijing Institute of Technology, Beijing 100081, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2589-1375","authenticated-orcid":false,"given":"Ke-Qian","family":"Shang","sequence":"additional","affiliation":[{"name":"Center for Quantum Technology Research, Key Laboratory of Advanced Optoelectronic Quantum Architecture and Measurement of Ministry of Education, School of Physics, Beijing Institute of Technology, Beijing 100081, China"}]}],"member":"1968","published-online":{"date-parts":[[2024,2,4]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"3814","DOI":"10.1364\/AO.49.003814","article-title":"Hybrid encoding method for hiding information by assembling double-random phase-encoding technique and binary encoding method","volume":"49","author":"Lin","year":"2010","journal-title":"Appl. Opt."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"2245","DOI":"10.1364\/OSAC.426537","article-title":"Double random phase encoding schemes with perfect forward secrecy for robust image cryptography","volume":"4","author":"Moon","year":"2021","journal-title":"OSA Contin."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"7255","DOI":"10.1364\/AO.463101","article-title":"Security-enhanced multiple-image encryption based on quick response codes and modified double random phase encoding in the fractional Fourier transform domain","volume":"61","author":"Wang","year":"2022","journal-title":"Appl. Opt."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Tian, P., and Su, R. (2022). A novel virtual optical image encryption scheme created by combining chaotic s-box with double random phase encoding. Sensors, 22.","DOI":"10.3390\/s22145325"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"26143","DOI":"10.1364\/OE.27.026143","article-title":"Machine-learning attacks on interference-based optical encryption: Experimental demonstration","volume":"27","author":"Zhou","year":"2019","journal-title":"Opt. Express"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"13418","DOI":"10.1364\/OE.17.013418","article-title":"Optical image encryption based on interference of polarized light","volume":"17","author":"Zhu","year":"2009","journal-title":"Opt. Express"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"8854","DOI":"10.1364\/AO.52.008854","article-title":"Multiple-image encryption using polarized light encoding and the optical interference principle in the Fresnel-transform domain","volume":"52","author":"Wang","year":"2013","journal-title":"Appl. Opt."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"7609","DOI":"10.1364\/AO.57.007609","article-title":"Multi-depth three-dimensional image encryption based on the phase retrieval algorithm in the Fresnel and fractional Fourier transform domains","volume":"57","author":"Piao","year":"2018","journal-title":"Appl. Opt."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"35096","DOI":"10.1364\/OE.27.035096","article-title":"Multiple-image optical encryption based on phase retrieval algorithm and fractional Talbot effect","volume":"27","author":"Wu","year":"2019","journal-title":"Opt. Express"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"7801","DOI":"10.1364\/AO.398459","article-title":"Optical multi-image encryption based on focal length multiplexing and multimode phase retrieval","volume":"59","author":"He","year":"2020","journal-title":"Appl. Opt."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"2774","DOI":"10.1364\/OL.42.002774","article-title":"Low photon count based digital holography for quadratic phase cryptography","volume":"42","author":"Muniraj","year":"2017","journal-title":"Opt. Lett."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1364\/OL.27.000321","article-title":"Optical retrieval of encrypted digital holograms for secure real-time display","volume":"27","author":"Matoba","year":"2002","journal-title":"Opt. Lett."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"22147","DOI":"10.1364\/OE.27.022147","article-title":"Secure storage and retrieval schemes for multiple encrypted digital holograms with orthogonal phase encoding multiplexing","volume":"27","author":"Kim","year":"2019","journal-title":"Opt. Express"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"061802(R)","DOI":"10.1103\/PhysRevA.78.061802","article-title":"Computational ghost imaging","volume":"78","author":"Shapiro","year":"2008","journal-title":"Phys. Rev. A"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"131110","DOI":"10.1063\/1.3238296","article-title":"Compressive ghost imaging","volume":"95","author":"Katz","year":"2009","journal-title":"Appl. Phys. Lett."},{"key":"ref_16","first-page":"38109","article-title":"High-resolution sub-sampling incoherent x-ray imaging with a micro-structured scintillator array","volume":"27","author":"He","year":"2019","journal-title":"Opt. Express"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1038\/s41377-023-01311-2","article-title":"Perovskite single-pixel detector for dual-color metasurface imaging recognition in complex environment","volume":"12","author":"Xiong","year":"2023","journal-title":"Light-Sci. Appl."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"054012","DOI":"10.1103\/PhysRevApplied.20.054012","article-title":"Ghost diffractive deep neural networks: Optical classifications using light\u2019s second-order coherence","volume":"20","author":"Ye","year":"2023","journal-title":"Phys. Rev. Appl."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"7102","DOI":"10.1364\/AO.463885","article-title":"Secret sharing scheme based on spread spectrum ghost imaging","volume":"61","author":"Liu","year":"2022","journal-title":"Appl. Opt."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"36144","DOI":"10.1364\/OE.467708","article-title":"Steganographic optical image encryption based on single-pixel imaging and an untrained neural network","volume":"30","author":"Lin","year":"2022","journal-title":"Opt. Express"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"7301","DOI":"10.1364\/OE.383240","article-title":"Visual cryptography in single-pixel imaging","volume":"28","author":"Jiao","year":"2020","journal-title":"Opt. Express"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"9744","DOI":"10.1364\/AO.404488","article-title":"Optical multiple-image compression-encryption via single-pixel Radon transform","volume":"59","author":"Wu","year":"2020","journal-title":"Appl. Opt."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"2402","DOI":"10.1364\/OE.478148","article-title":"Information security scheme using deep learning-assisted single-pixel imaging and orthogonal coding","volume":"31","author":"Wang","year":"2023","journal-title":"Opt. Express"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"128704","DOI":"10.1088\/1674-1056\/abc15f","article-title":"Super-resolution filtered ghost imaging with compressed sensing","volume":"29","author":"Meng","year":"2020","journal-title":"Chin. Phys. B"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"25013","DOI":"10.1364\/OE.497575","article-title":"Double filter iterative ghost imaging for high quality edge and image acquisition","volume":"31","author":"Zhou","year":"2023","journal-title":"Opt. Express"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"30505","DOI":"10.1364\/OE.501664","article-title":"Disturbance-free single-pixel imaging via complementary detection","volume":"31","author":"Gong","year":"2023","journal-title":"Opt. Express"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Yu, W.-K. (2019). Super sub-Nyquist single-pixel imaging by means of cake-cutting Hadamard basis sort. Sensors, 19.","DOI":"10.3390\/s19194122"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"064201","DOI":"10.1088\/1674-1056\/ac8e9a","article-title":"Complex-amplitude Fourier single-pixel imaging via coherent structured illumination","volume":"32","author":"Hou","year":"2023","journal-title":"Chin. Phys. B"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"6076","DOI":"10.1364\/OL.503492","article-title":"Autofocus Fourier single-pixel microscopy","volume":"48","author":"Deng","year":"2023","journal-title":"Opt. Lett."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"25134","DOI":"10.1364\/OE.397783","article-title":"Deep learning based projector defocus compensation in single-pixel imaging","volume":"28","author":"Rizvi","year":"2020","journal-title":"Opt. Express"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"37284","DOI":"10.1364\/OE.412597","article-title":"Denoising ghost imaging under a small sampling rate via deep learning for tracking and imaging moving objects","volume":"28","author":"Hu","year":"2020","journal-title":"Opt. Express"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"9945","DOI":"10.1364\/OE.481995","article-title":"Low sampling high quality image reconstruction and segmentation based on array network ghost imaging","volume":"31","author":"Liu","year":"2023","journal-title":"Opt. Express"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"2527","DOI":"10.1364\/OL.486078","article-title":"Image-free single-pixel object detection","volume":"48","author":"Peng","year":"2023","journal-title":"Opt. Lett."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"4480","DOI":"10.1364\/OL.499787","article-title":"Learning-based correction with Gaussian constraints for ghost imaging through dynamic scattering media","volume":"48","author":"Peng","year":"2023","journal-title":"Opt. Lett."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/s41377-021-00680-w","article-title":"Far-field super-resolution ghost imaging with a deep neural network constraint","volume":"11","author":"Wang","year":"2022","journal-title":"Light-Sci. Appl."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"1292","DOI":"10.1364\/BOE.448838","article-title":"Elimination of stripe artifacts in light sheet fluorescence microscopy using an attention-based residual neural network. Biomed","volume":"13","author":"Wei","year":"2022","journal-title":"Opt. Express"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"6122","DOI":"10.1364\/BOE.400816","article-title":"IA-net: Informative attention convolutional neural network for choroidal neovascularization segmentation in OCT images. Biomed","volume":"11","author":"Xi","year":"2020","journal-title":"Opt. Express"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"2726","DOI":"10.1364\/OL.458514","article-title":"Attention-based neural network for polarimetric image denoising","volume":"47","author":"Liu","year":"2022","journal-title":"Opt. Lett."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Li, Q., Meng, X., Yin, Y., and Wu, H. (2021). A multi-image encryption based on sinusoidal coding frequency multiplexing and deep learning. Sensors, 21.","DOI":"10.3390\/s21186178"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Perez, R.A., Vilardy, J.M., P\u00e9rez-Cabr\u00e9, E., Mill\u00e1n, M.S., and Torres, C.O. (2023). Nonlinear encryption for multiple images based on a joint transform correlator and the gyrator transform. Sensors, 23.","DOI":"10.3390\/s23031679"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Feng, W., Wang, Q., Liu, H., Ren, Y., Zhang, J., Zhang, S., Qian, K., and Wen, H. (2023). Exploiting newly designed fractional-order 3D Lorenz chaotic system and 2D discrete polynomial hyper-chaotic map for high-performance multi-image encryption. Fractal Fract., 7.","DOI":"10.3390\/fractalfract7120887"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Qian, K., Xiao, Y., Wei, Y., Liu, D., Wang, Q., and Feng, W. (2023). A robust memristor-enhanced polynomial hyper-chaotic map and its multi-channel image encryption application. Micromachines, 14.","DOI":"10.3390\/mi14112090"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"214413","DOI":"10.1109\/ACCESS.2020.3040542","article-title":"Multi-wavelet residual dense convolutional neural network for image denoising","volume":"8","author":"Wang","year":"2020","journal-title":"IEEE Access"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1109\/TIP.2003.819861","article-title":"Image quality assessment: From error visibility to structural similarity","volume":"13","author":"Wang","year":"2004","journal-title":"IEEE Trans. Image Process."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Li, H., Yu, S., Feng, W., Chen, Y., Zhang, J., Qin, Z., Zhu, Z., and Marcin, W. (2023). Exploiting dynamic vector-level operations and a 2D-enhanced logistic modular map for efficient chaotic image encryption. Entropy, 25.","DOI":"10.3390\/e25081147"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/24\/3\/1012\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,15]],"date-time":"2025-01-15T17:08:34Z","timestamp":1736960914000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/24\/3\/1012"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,4]]},"references-count":45,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2024,2]]}},"alternative-id":["s24031012"],"URL":"https:\/\/doi.org\/10.3390\/s24031012","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2024,2,4]]}}}