Single-pixel imaging (SPI) enables an invisible target to be imaged onto a photosensitive surface without a lens, emerging as a promising way for indirect optical encryption. However, due to its linear and broadcast imaging principles, SPI encryption has been confined to a single-user framework for the long term. We propose a multi-image SPI encryption method and combine it with orthogonal frequency division multiplexing-assisted key management, to achieve a multiuser SPI encryption and authentication framework. Multiple images are first encrypted as a composite intensity sequence containing the plaintexts and authentication information, simultaneously generating different sets of keys for users. Then, the SPI keys for encryption and authentication are asymmetrically isolated into independent frequency carriers and encapsulated into a Malus metasurface, so as to establish an individually private and content-independent channel for each user. Users can receive different plaintexts privately and verify the authenticity, eliminating the broadcast transparency of SPI encryption. The improved linear security is also verified by simulating attacks. By the combination of direct key management and indirect image encryption, our work achieves the encryption and authentication functionality under a multiuser computational imaging framework, facilitating its application in optical communication, imaging, and security. |
1.IntroductionWith the increasing demand for personal privacy and the growing scarcity of communication resources, multiuser encryption has become an important trend for the future development of optical cryptography. Among the optical cryptography methods, single-pixel imaging (SPI), as a typical type of indirect computational imaging technique, has revealed significant potential due to the non-visual and encryption-like imaging principle.1–4 Instead of depending on the direct encrypting quality, SPI encryption approaches rather are based on the correlation of a series of modulated patterns and an invisible target. The corresponding imaging principle can be described as where denotes the intensity value in the ’th detection, and and denote the spatial distribution of the plaintext and the ’th pattern projected, respectively. Since the series of patterns can be used to encrypt object specifics over non-line-of-sight range,5–7 various SPI encryption schemes have been developed to enhance the security, including spatial-multiplexed SPI encryption8 and algorithm-dependent image hiding.9 SPI encryption is also combined with other technologies, such as holography,10 visual encryption,11 and computer vision technologies,12 to expand the application schemes. By alternatively applying a photosensitive surface without a lens, human poses can be securely recovered in a sequence of modulated intensity.12 Also, by the combination of steganography and a Malus metasurface, the huge burden of transmitting patterns of SPI encryption can also be decreased.13 However, due to the linear imaging principle in Eq. (1) and broadcast behavior, the multiuser SPI framework has not been investigated well. Specifically, obvious linearity in the SPI ciphertext is caused by the convolutional process, therefore triggering the security vulnerability. Besides, receivers in different locations can only receive the same intensity sequence at one time.5,6 Thus, only the same plaintext can be recovered by users, limiting the channel transmitting capacity. It can be hard for the direct design on plaintext SPI encryption algorithms to solve these two issues based on Eq. (1).Fortunately, key management, playing as the upstream layer of plaintext encryption responsible for all the tasks of related keys,14–17 can remarkably promote the security of multiuser services.18–22 To protect the privacy in the internet of vehicles, certificateless-group-assisted,23 quantum-key-based,24 and artificial-intelligence-enabled18 key management methods are proposed. Encryption-based key management methods are also applied in other multiuser scenarios, such as elliptic-curve-cryptography-based key management in multi-sensor networks25 and Chebyshev chaotic map key management in blockchain authentication.26 Different from digital key management, optical key management requires an entity to carry keys, while the metasurface providing the information at the submillimeter level27–30 and efficiency for multiplexing degrees of freedom of light31–33 can decrease the exposure risk during physical key transmission. At the same time, orthogonal frequency division multiplexing (OFDM) is able to transmit parallel data streams on independent subcarriers while overlapping the sequential characteristic of signals,34 being viable for accommodating multiple cryptographical keys. Thus, in this paper, we provide a complete solution to multiuser SPI cryptography and authentication framework combined with OFDM-assisted key management. Within the framework, regional and global encryptions are first conducted to form a composite intensity sequence to be transmitted to different individuals, simultaneously generating the corresponding keys specially used by users. Then, keys are isolated into independent frequency points and asymmetrically encapsulated into a Malus metasurface by OFDM-assisted key management. By the key distribution of the metasurface in a polarized manner, users can eventually recover their designated SPI images and verify their authenticity. To verify the security of the multiuser SPI framework, five pioneering SPI encrypting works relying on direct plaintext encryption and our scheme are compared. The results show that the multiuser scheme can resist multiple types of attacks and can verify the authenticity even when one of the users is compromised to Eve. Our work facilitates the development of indirect computational imaging security into the multiuser framework, enhancing its application in secure optical communication, anticounterfeiting, and security. 2.Principle and Methodology2.1.Multiuser SPI Encryption and Authentication FrameworkFigure 1 shows the procedure of users. plaintexts with an authentication image are first encrypted and transmitted by the Fourier SPI encryption. While in key space, a pair of private key sets and dedicated to decryption and authentication, respectively, and a commonly used key set for all users are generated. Enabled by OFDM-like and RSA asymmetric coding, and are multiplexed and cross-encapsulated as , sealed with into the light envelope of a Malus metasurface. In the receiving end, two polarized channels of the metasurface are inversely extended into keys (i.e., three types of key sets) for users. Receiving the bucket signal, users can retrieve plaintexts privately using their own keys and further collaboratively verify the authenticity of the decrypted images. In the following sections, we will quantify this process, taking as a case study, to demonstrate the detailed mechanism of our method. 2.2.Composite Fourier SPI EncryptionAs shown in Fig. 2, the Fourier SPI encryption is composed of regional encryption, containing whitening and permutation, basically providing internal privacy among users, and global encryption, including diffusion and Fourier SPI, of all users for authentication and countering malicious attacks from Eve. In order to conduct the encryption, whitening, permutation, and diffusion keys , , and are generated in terms of chaos and will be further processed in terms of key management. For regional encryption, as shown in Fig. 3(a), plaintexts , , with the identical dimension of pixels (i.e., here ) are planarly concatenated into a triplex-grid image , in which are the private plaintexts for each user whereas the common is attached in case of counterfeiting for authentication of all users. Because the direct super-pixel permutation of plaintexts without any alteration of image pixel values can still reveal the content information and are affected by ciphertext analysis, as shown in Fig. 3(b), the integrated image should be whitened pixel-by-pixel in advance to cover the basic texture. Therefore, for each , we define nine chaotic masks , , independently corresponding to different initial conditions of chaos, including the type index of generation functions , the starting values of chaotic sequence , the sequence size , and the initial number to start count . The generation of the whitening masks by the four chaos conditions is shown in Fig. 4. The type of generation functions is independently chosen among the Bernoulli map, piecewise linear chaotic map (PWLCM), and Lorenz map. Then, we integrate the following generated masks into triplex-grid form and XOR it with : . Subsequently, the adjacent (i.e., here ) regular pixels in form a super-pixel, and super-pixels integrate the whole , with the coordinate index ranging from 0 to 575. Note that and . Afterward, we re-utilize the PWLCM chaos to generate the corresponding permutation matrix to scramble the index 0 to 575, equivalent to switching the position of each super-pixel within the entire : . For the of each user, the permutation key is noted as and , , constituting the whole . For global encryption, a series of masks , , are sequentially generated in terms of the initial chaos conditions . The rows and columns of are applied as the basic unit to finish rounds of diffusion specific to . In general, should be satisfied to achieve an effective avalanche effect against cryptanalysis, particularly differential analysis. Thus, two-round diffusion is used in our design, and an instance flowchart of diffusion is shown in Fig. 5. XOR is used in the first diffusion, and MOD calculation is used in the second round so that only one mask can be used to realize the effective diffusing performance, declining the workload of further key processing. Eventually, the diffused image is illuminated by Fourier structured light to be broadcasted to users. For the generation of structured light, four-step phase shifting is applied in SPI encryption. Four Fourier patterns are designed to be , , where and denote the two-dimensional (2D) Cartesian coordinates in the scene and spatial frequency distribution of images, respectively, while and denote the average image intensity and image contrast, respectively. After the illumination of each set of four-step phase shifted patterns, four intensities can be acquired by each user. Following this process, a corresponding Fourier coefficient of the target can be further obtained by .35 Finally, after collecting all the Fourier coefficients, users only have to operate inverse fast Fourier transform (IFFT) to recover the image without correlating with any pattern. The complete code demonstration of composite Fourier encryption can be found in Sec. S1 in the Supplementary Material. Different encrypting steps generate keys with different functions. According to the functions, we divide the keys as two groups for separate management. Regional encryption is privately used for each user to independently protect their own plaintext. Thus, , , form and , is treated as the access of the metasurface to . Global encryption is commonly used for all users countering external attacks from Eve. Thus, and are grouped as , also publicly used to retrieve the authentication image . Simultaneously, to verify the authentication image, we also generate a synonym (i.e., dwelling) from as an authentication key, namely token, for parallel OFDM-like modulation. 2.3.OFDM-Assisted Key ManagementAs shown in Fig. 6(a), after SPI encryption, key management is used to isolate and distribute corresponding keys to different users, addressing the contradiction between multiuser privacy and SPI broadcast transparency. Figure 6(b) shows the encapsulating flowchart of key management. The authenticating token generated from is first divided into eight parallel components, which are further isolated onto separate OFDM carriers, producing as the eight private keys for synergic authentication and a multiplexed ciphertext . Then, and are further cross-encapsulated by RSA to terminate the progressive dependency of key generation. Consequently, each user can use the asymmetric RSA pair to decrypt their keys coded in the OFDM sequence. Finally, nanobricks are used to modulate the polarization state of the cross-encapsulated keys pixel-by-pixel, forming a discrete and stable structure for key service. For OFDM-like coding, the complex Fourier bases in traditional OFDM algorithms are first replaced by trigonometric bases. Other modulating bases, such as Chebyshev polynomial and Hadamard sequences, are also considered as one of the encoding options (see Sec. S1 in the Supplementary Material) to enlarge the key space. In addition, to demodulate the coded sequence without distortion in user ends, the adjacent subcarriers are designed to secretly differ by one complete period in an OFDM symbol duration with a sampling rate . The symbol rate is regarded as symbol/s, equivalent to the bit rate. Moreover, to ensure separability when decrypting plaintexts, frequency interval among subcarriers should be greater than the , whereas to handle more users, is derived as unit 1 to be as less as possible. The modulating process of the token is shown in Fig. 7(a) and Fig. S1 in the Supplementary Material. The token is first compartmentalized into single letters as sub-tokens. Each sub-token (e.g., the initial “” corresponding to user 1) is then transferred into an ACSII character as we regulate the metasurface to be monochrome in view of the error tolerance of keys and possible errors triggered by manual recognition of grayscale pixels, noted as a binary vector , , (e.g., “” → “01000100”). Then, eight frequency indices denoted as are randomly initialized and assigned to eight users as the first-level keys. The subcarrier of ’th user is written as , and the orthogonality is expressed as Eq. (2), where and : Note that denotes the randomly chosen initial frequency. Based on this principle, each symbol of is separately modulated by the assigned subcarrier in terms of Eq. (3): where is an matrix. and are vectors in size and , respectively. From , the ’th row represents the sum of the ’th character of each user modulated by their corresponding carrier: . Thus, it can be seen that sub-tokens for all users are mixed into a unified temporal signal, characterized by extensive overlapping that precludes the disclosure of the individual key component, as shown in Fig. 7(b). However, in the frequency domain, allows for distinct separation of each user’s keys. Finally, the continuous matrix is reshaped into a one-dimensional (1D) sequence and transformed into the discrete binary form in terms of IEEE Standard 754 to be recorded in the metasurface.Symmetric encryption, such as OFDM-like coding, can trigger an extension of the trust chain, continuously requiring another cryptography to protect the keys in turn produced by the one before. Thereby, as a root of trust, OFDM-like coding needs to be further integrated with RSA asymmetric coding to terminate the progressive dependency. Through the process, ’th user produces a unique pair of keys, in which the public is broadcasted and the private is preserved. Receiving for each user, the host connects the private key set and in serial and encapsulates them as a whole plaintext to acquire the binary ciphertext . As a result, , which contains all information about and recorded in the private channel, whereas and are publicly used for members generally with a lower security requirement, is arranged serially to form the public channel expression of the metasurface, as shown in Fig. S2 in the Supplementary Material (see S3 in the Supplementary Material). Finally, a Malus metasurface is used to record the processed keys to provide information entities, integrating the 17 subchannels of keys into a whole as well. A rectangular aluminous nanobrick is designed to be etched on a top of glass substrate, forming a unit nanobrick cell, where , , , and . The size of the unit cell is optimized according to the relative polarized reflection efficiency (RPRE), as shown in Fig. 7(c), and the corresponding operating wavelength is set as . Simultaneously, the simulated reflectivity and transmissivity of the incident light polarized along the long-axis () are shown in Fig. 7(d) (for more optimization details, see Sec. S3 in the Supplementary Material). According to the Jones derivation, the orientation angle is selected among the four: 0, 45, 90, and 135 deg, as shown in Fig. 7(e). Specifically, the private channel of and public channel of and are set as , and , , respectively, where and denote the rotating angle of a polarizer and an analyzer, respectively. Note that as long as the metasurface can clearly display key information to achieve the security function of keys, the parameters of the nanobricks, including material or shape, are not strictly confined. Finally, the metasurface of with the size of is fabricated, as shown in Fig. 7(f). Each pixel is composed of a nanobrick array. 3.Results3.1.Experimental Decryption and AuthenticationThe optical experimental configurations of the multiuser SPI encryption and authentication framework with the metasurface are shown in Fig. 8. The setup of the multiuser SPI encryption framework and decryption mechanism is shown in Fig. 8(a). The laser beam is emitted by a light source operating at the wavelength of 625 nm. Then, the laser beam is reflected by a DMD (Amphenol V-7001 VIS), and the modulated patterns are expanded by an expanding lens. Subsequently, the patterns are projected onto the object plane and gathered by a bucket detector (Thorlabs DET100A2 320 to 1100 nm) equipped with a photodiode amplifier (Thorlabs PDA200C) and a data acquisition (DAQ) board (NI USB-6343). During the experiment, since two bucket detectors are owned only, four repeated experiments were conducted, where the two intensity detectors were separately positioned in different locations in each experiment to imitate the original eight users. For decryption and receiving the bucket signals, eight users first need to operate the IFFT to acquire . Then, each user accesses the metasurface to decode their keys. The experimental setup of acquiring keys by the metasurface is based on a BA310MET-T microscope, as shown in Fig. 8(b). First, they access the public channel of the metasurface and extract from for global decryption. Sequentially, for RSA decryption, the ’th user accesses the private channel to decode by , obtaining the for regional decryption and for OFDM demodulation. Note that when the ’th user accesses the private channel, all the actually have been exposed to him. However, because the ’th user only owns the unpublished , only the ciphertext can be decoded, whereas the other are still under protection of RSA. After acquiring and , the user eventually can recover of his own privately, as shown in Fig. 8(a), during which the decryption is symmetrically inverse to the regional encryption of the composite Fourier SPI encryption. For authentication, is first reconstructed in the public channel to retrieve the common . Implementing the decrypted by RSA decryption, users recover subcarriers afterward to demodulate , acquiring their secret sub-token by . During the calculation, the ’th symbol in corresponding to the ’th user can be represented by the inner product of the ’th row in and carrier : . After ACSII-to-character transforms, the eight letters are consociated in sequence, and it is evaluated whether the combined word matches , as shown in Fig. 9. The synergetic scheme is specially established for the multiuser scenario since a single letter can convey a multitude of implications, such as “” revealing “document,” “paddle,” and “wood.” Unless a sufficient number of users cooperate with others, the splitting letter can reveal little information. Therefore, the authenticating credibility (i.e., house element in ) can still be maintained even if one of the users is compromised to Eve. 3.2.Security Assessment by Confrontation and Numerical Analysis3.2.1.Deep differential attackThe essence of an encrypting scheme consists of confrontation. Thus, we develop a cracking model of SPI encryption, namely a deep differential attack (technical details are supplied in S5 in the Supplementary Material), to intuitively demonstrate the security and capacity of the proposed multiuser scheme. The security and capacity are assessed in terms of the external and internal attack, respectively (see Sec. S5.1 in the Supplementary Material). Five current works without key management, including single-user SPI-metasurface encryption,13 single-user SPI encryption,8,11,36 and multiuser SPI encryption,6 are also attacked for comparison. The numbers of encrypting steps are 3, 2, 1, 4, and 2, indicating different levels of attacking difficulty. Also, we carry on the confrontation on three different datasets including MINIST, USC-SIPI, and University-1652 to verify the security generalization of the multiuser SPI encryption framework. As shown in Fig. 10, the ciphertexts of the five current SPI encrypting schemes are approximately cracked. Intuitively, the sensitive profiles, particularly letters or foreground objects, can be roughly recognized though the recovered ones differ from the ground truths and legally decrypted versions. This inconsistency occurs mainly due to the different methods and depths of encryption, which means that the errors can gradually accumulate as the cryptanalysis progresses step by step. But for our method, the external attack turns out to be ineffective in seeking correlation between the SPI optical paths and key management, showing the effective security of the multiuser SPI cryptography framework. In addition, the imperceptible outcomes suggest that internal users also are unable to decipher the plaintexts of others. Thus, the independent encrypted transmission of each user and, consequently, the SPI encryption capacity under the multiuser scheme are available. Provided that the security and capacity of multiple users are satisfied, the multi-user SPI encryption and authentication framework is achieved. 3.2.2.Brute force attackFurther, a brute force attack is conducted for the SPI image encryption and key management. Technically, the brute force attack against OFDM-assisted key management refers to the attack against the authentication key and ciphertext key presented in the two meta-channels separately, whereas the attack against Fourier SPI encryption refers to the bucket signal . For the attack against OFDM-assisted key management, authentication key should be first considered. During the process, a set of candidates of OFDM modulation should be first determined, which is also the merit compared to the optical encryption inspired by code division multiplexing (CDM).5,37 Specifically, only one type of parameter (i.e., the index of orthogonal codes) pertains in CDM to encrypt plaintexts, whereas the type of the modulation bases, symbol modulating categories, , , and in OFDM, can supply more complex key space. For , a 1024-bit key is needed for RSA encryption, and thus the key space is roughly on the order of . For the brute force attack against SPI Fourier image encryption, the key length of chaos conditions of whitening mask refers to 64-8-8-8-bit. The generating conditions of and are presented in bits in the same way. Thus, in total, the key space of the key management algorithm and image encryption is shown in Table 1. The results show that both the key spaces are larger than the minimal requirement ,38 showing the ability to resist the brute force attack. Table 1Key space of Fourier SPI image encryption and key management.
3.2.3.Tampering attackEncryption attacks not only involve the illegal acquirement of plaintexts, such as the deep differential attack and brute force attack, but also include the destruction of ciphertexts, such as tampering, forgery, and noise disturbance. Hence, we study the resilience to errors of the OFDM-like encoded sequence within the metasurface, in scenarios where tampering or defective pixels occur due to partial detachment of nanostructures or oxidation. White dots are assumed to be wrongly recognized with the error ratios from 0% to 25%, as shown in Fig. 11(a). To evaluate the general applicability of the error tolerance, we randomly select pixels to introduce errors. In Fig. 11(a), it is observed that the token can be completely recovered within the error ratio equaling to 10%. Besides, as the error ratio increases to 20%, the recovered “dwelling” begins to experience misspelling but still remains within the range of single letter error. When one-fourth of the metasurface is tampered with or rendered unrecognizable, errors in the spelling of the letters “” and “” in the token begin to appear. More intuitively, Fig. 11(b) compares the corresponding bit error rate (BER) performance of and the direct recognition of string without OFDM correction. The results show that our OFDM BER always remains lower than the BER of direct recognition. This is because, by the modulation of each sub-token, the effective authentication information is dispersed across the orthogonal carriers, thereby mitigating the sharp recognition offset of the sub-token, indicating our OFDM-metasurface is robust against tampering attacks. 3.2.4.Numerical assessmentExcept for direct confrontation, we also conducted numerical analysis on the SPI ciphertext, including the light intensity sequence and . Figures 12(a) and 12(b) show an intensity sequence and three-dimensional randomness view of three local sequences sampled from the sequence. It is observed that the broadcasted does not reveal any obvious characteristic and the kurtosis of sequence equals , showing that there is no obvious intensity outlier for Eve to analyze. Figure 12(c) presents the histogram of . From the results, the pixel distribution of has been eliminated, and no statistical information is leaked. Simultaneously, the variance, chi-square, and flatness are adopted to quantitatively analyze the histogram. The variance of is 339.61, and flatness equals 0.0031, indicating the uniform alteration of pixels in the ciphertext. Also, the chi-square is calculated as 268.49 lower than the threshold , where the significant level is set as 0.05. Figure 12(d) shows the weak correlation of pixels in horizontal, vertical, and diagonal directions, and the quantitative correlation in the three directions are 0.00526, 0.00217, and 0.00283, respectively. The global entropy is calculated as 7.9977. Except for the global entropy, we also calculate the local Shannon entropy to test the indeterminacy of the regional area in . Thirty blocks are randomly divided in , and the size of each segmented block should be set as .39 Subsequently, the local Shannon entropy is derived as 7.9028, satisfying the effective interval ranging from to . Finally, the NPCR and UACI are calculated as 99.63% and 33.16%, respectively, approximating the ideal performance of 99.6094% and 33.4635%40 and thus indicating the desirable sensitivity. (The parameter comparison of ciphertext and other three plaintexts is shown in Table S1 in the Supplementary Material). 4.Discussion and ConclusionFor a cryptography, security and capacity are the most important concerns to be developed into multiuser framework. The limited two have been the inherent issues for SPI encryption due to the pattern-projection-depended principle in Eq. (1).1–11,36 It is worth noting that metasurfaces with (non-)orthogonal polarization pairs are first applied to enhance the overall security of an SPI cryptosystem and reduce the exposing risk of SPI patterns.13,41 However, the alternative patterns still need to be projected, so the vulnerability and limited capacity still exist. In contrast to our method, the capacity of the multiuser is expanded by eightfold. In fact, the number of users is not limited to eight. The proposed framework theoretically supports an arbitrary number of clients as long as the individual keys can be coded in advance. For security, a deep differential attack is developed based on the most threatening cryptanalysis mode, a chosen plaintext attack (CPA). If the proposed framework can resist CPA, the other three cryptanalysis modes, including a cipher-only attack, known plaintext attack, and chosen cipher attack, can also be resisted.42,43 To summarize, we have developed a multiuser SPI cryptography and authentication framework combined with OFDM-assisted key management. This approach allows multiple users to privately reconstruct different plaintexts, concurrently resisting multiple kinds of attacks and realizing authentication. The framework consists of four components, including a composite Fourier SPI encrypting method, key management, experimental decryption and authentication, and security assessment, recording the whole life of keys from generation to application. The realization of the proposed multiuser SPI framework, including security and capacity, is verified by simulation and numerical experiments. By the combination of direct key management and indirect image encryption, our work realizes the multiuser computational imaging encryption and authentication framework, facilitating its development toward more complicated application scenes. 5.Appendix: Fabrication and AttackThe main notations of this paper are listed as follows. The lowercase, uppercase, boldface lowercase, and boldface uppercase letter , , , and denote a scalar variable, constant, vector, and matrix, respectively. denotes the real-part operation, denotes the transpose of matrix , denotes position exchange, denotes the norm of vector , and denotes the inner product. 5.1.Sample FabricationThe metasurface was fabricated by electron beam lithography (EBL). A layer of photoresist was spin-coated on a clean JGS1 substrate, followed by the sample bake. After the process above repeated once, the conductive adhesive AR-PC 5090.02 was spin-coated, and then the baked sample was exposed in LC-40 EBL mode with 140 pA beam current. The AR 600-55 developer and subsequent IPA fixer were used. A 50-nm-thick layer of aluminum was then deposited by electron beam evaporation, and the sample was soaked in acetone to peel off the metal layer. 5.2.Deep Differential AttackEquation (4) demonstrates the instance process of a typical sort of SPI cryptography, which is likely to encrypt patterns as keys and then scramble (i.e., or by other process) the intensity.6,13,36 denotes the plaintext. denotes the original pattern set, and denotes the patterns encrypted by key , where represents each encrypted one. denotes noise, and , represents scrambling masks: For differential analysis, the equivalent mask is first derived by reflexivity: , where denotes an all-zero matrix. Then, we artificially differentiate each pixel of to observe the degree of change in , representing the binary value of a pattern at the corresponding position. Mathematically, (i.e., Jacobian matrix) can be acquired: Regardless of how complicated the cryptographer operates on patterns, we are only concerned with the containing all the information of both and . As long as and intensity are obtained, the plaintext can be retrieved by the classic SPI correlation. When encryption algorithms are so complex that greatly deviates from (i.e., recovering keys by analyzing encrypting steps is not viable), deep learning is required to further mitigate the distortion by directly analyzing the key set (i.e., OFDM-assisted key management), shown in Fig. S7 in the Supplementary Material. For encryptions without a key-management platform, correct key sets are directly employed as labels to train the network for key compensation. Here, the network defined by a set of weights and biases with regularization is applied: where represents the correlation among pixels and implies the optimized pattern. Note that we cannot directly obtain the key set (i.e., always in confidential state by oracle) or improve pseudorandom where is highly ill-posed. Thus, as shown in Fig. S6 in the Supplementary Material, a training method based on signal width expansion is studied. patterns are transformed into 1D pulse signals with the extended width being an on–off keying signal, which enables the network to be trained offline (i.e., polluted key sets can be simulated aforehand by Eve) and realize desired performance.Code and Data AvailabilityAll data needed to evaluate the conclusions in the paper are present in the paper and/or the Supplementary Materials. Additional data related to this paper are available from the corresponding author upon reasonable request. AcknowledgmentsThe work was supported by the National Key R&D Program of China (Grant No. 2021YFB3900300), National Natural Science Foundation of China (Grant Nos. 61860206007, 62275177, and 62371321), Ministry of Education Science and Technology Chunhui Project (Grant No. HZKY20220559), International S and T Cooperation Program of Sichuan Province (Grant No. 2023YFH0030), Sichuan Science and Technology Innovation Seeding Project (Grant No. 23-YCG034), Sichuan Science and Technology Program (Grant No. 2023YFG0334), and Chengdu Science and Technology Program (Grant No. 2022-GH02-00001-HZ). ReferencesM. P. Edgar, G. M. Gibson and M. J. Padgett,
“Principles and prospects for single-pixel imaging,”
Nat. Photonics, 13
(1), 13
–20 https://doi.org/10.1038/s41566-018-0300-7 NPAHBY 1749-4885
(2019).
Google Scholar
A.-X. Zhang et al.,
“Tabletop X-ray ghost imaging with ultra-low radiation,”
Optica, 5
(4), 374
–377 https://doi.org/10.1364/OPTICA.5.000374
(2018).
Google Scholar
B. Sun et al.,
“3D computational imaging with single-pixel detectors,”
Science, 340
(6134), 844
–847 https://doi.org/10.1126/science.1234454 SCIEAS 0036-8075
(2013).
Google Scholar
G.-Y. Wang et al.,
“A tri-channel liquid crystal device for single-pixel-imaging encryption,”
Appl. Phys. Lett., 123
(9), 091102 https://doi.org/10.1063/5.0166876 APPLAB 0003-6951
(2023).
Google Scholar
Y. Kang et al.,
“One-to-many optical information encryption transmission method based on temporal ghost imaging and code division multiple access,”
Photonics Res., 7
(12), 1370
–1380 https://doi.org/10.1364/PRJ.7.001370
(2019).
Google Scholar
Z. Zhang et al.,
“Secured single-pixel broadcast imaging,”
Opt. Express, 26
(11), 14578
–14591 https://doi.org/10.1364/OE.26.014578 OPEXFF 1094-4087
(2018).
Google Scholar
M. Tanha, R. Kheradmand and S. Ahmadi-Kandjani,
“Gray-scale and color optical encryption based on computational ghost imaging,”
Appl. Phys. Lett., 101
(10), 101108 https://doi.org/10.1063/1.4748875 APPLAB 0003-6951
(2012).
Google Scholar
S. Jiang et al.,
“Information security scheme based on computational temporal ghost imaging,”
Sci. Rep., 7
(1), 7676 https://doi.org/10.1038/s41598-017-07816-2
(2017).
Google Scholar
J. Xiong et al.,
“Algorithm-dependent computational ghost encryption and imaging,”
Phys. Rev. Appl., 18
(3), 034023 https://doi.org/10.1103/PhysRevApplied.18.034023 PRAHB2 2331-7019
(2022).
Google Scholar
Y. Xiao, L. Zhou and W. Chen,
“Secured single-pixel ghost holography,”
Opt. Lasers Eng., 128 106045 https://doi.org/10.1016/j.optlaseng.2020.106045 OLENDN 0143-8166
(2020).
Google Scholar
S. Jiao et al.,
“Visual cryptography in single-pixel imaging,”
Opt. Express, 28
(5), 7301
–7313 https://doi.org/10.1364/OE.383240 OPEXFF 1094-4087
(2020).
Google Scholar
A. Tsoy et al.,
“Image-free single-pixel keypoint detection for privacy preserving human pose estimation,”
Opt. Lett., 49
(3), 546
–549 https://doi.org/10.1364/OL.514213 OPLEDP 0146-9592
(2024).
Google Scholar
P. Zheng et al.,
“Metasurface-based key for computational imaging encryption,”
Sci. Adv., 7
(21), eabg0363 https://doi.org/10.1126/sciadv.abg0363
(2021).
Google Scholar
W. Zhang,
“A device-independent quantum key distribution system for distant users,”
Nature, 607
(7920), 687
–691 https://doi.org/10.1038/s41586-022-04891-y
(2022).
Google Scholar
Z. Qi et al.,
“A 15-user quantum secure direct communication network,”
Light: Sci. Appl., 10
(1), 183 https://doi.org/10.1038/s41377-021-00634-2
(2021).
Google Scholar
P. Bagga et al.,
“On the design of mutual authentication and key agreement protocol in internet of vehicles-enabled intelligent transportation system,”
IEEE Trans. Veh. Technol., 70
(2), 1736
–1751 https://doi.org/10.1109/TVT.2021.3050614
(2021).
Google Scholar
J.-P. Chen et al.,
“Quantum key distribution over 658 km fiber with distributed vibration sensing,”
Phys. Rev. Lett., 128
(18), 180502 https://doi.org/10.1103/PhysRevLett.128.180502 PRLTAO 0031-9007
(2022).
Google Scholar
S. S. Chaeikar, A. Jolfaei and N. Mohammad,
“Ai-enabled cryptographic key management model for secure communications in the internet of vehicles,”
IEEE Trans. Intell. Transp. Syst., 24
(4), 4589
–4598 https://doi.org/10.1109/TITS.2022.3200250
(2022).
Google Scholar
V. Scarani et al.,
“The security of practical quantum key distribution,”
Rev. Mod. Phys., 81
(3), 1301 https://doi.org/10.1103/RevModPhys.81.1301 RMPHAT 0034-6861
(2009).
Google Scholar
M. Wazid et al.,
“AKM-IoV: authenticated key management protocol in fog computing-based internet of vehicles deployment,”
IEEE Internet Things J., 6
(5), 8804
–8817 https://doi.org/10.1109/JIOT.2019.2923611
(2019).
Google Scholar
X. Zheng et al.,
“Heterogeneously integrated, superconducting silicon-photonic platform for measurement-device-independent quantum key distribution,”
Adv. Photonics, 3
(5), 055002 https://doi.org/10.1117/1.AP.3.5.055002
(2021).
Google Scholar
J. Wang et al.,
“Blockchain-based anonymous authentication with key management for smart grid edge computing infrastructure,”
IEEE Trans. Ind. Inf., 16
(3), 1984
–1992 https://doi.org/10.1109/TII.2019.2936278
(2019).
Google Scholar
H. Tan, W. Zheng and P. Vijayakumar,
“Secure and efficient authenticated key management scheme for UAV-assisted infrastructure-less IoVs,”
IEEE Trans. Intell. Transp. Syst., 24
(6), 6389
–6400 https://doi.org/10.1109/TITS.2023.3252082
(2023).
Google Scholar
Q. Shi et al.,
“QKBAKA: a quantum-key-based authentication and key agreement scheme for internet of vehicles,”
IEEE Internet Things J., 11
(7), 12292
–12306 https://doi.org/10.1109/JIOT.2023.3332947
(2024).
Google Scholar
X. Du et al.,
“Transactions papers a routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks,”
IEEE Trans. Wireless Commun., 8
(3), 1223
–1229 https://doi.org/10.1109/TWC.2009.060598
(2009).
Google Scholar
Y. Long et al.,
“Blockchain-based anonymous authentication and key management for internet of things with Chebyshev chaotic maps,”
IEEE Trans. Ind. Inf., 20
(5), 7883
–7893 https://doi.org/10.1109/TII.2024.3366975
(2024).
Google Scholar
M. Jeong et al.,
“Printable light-emitting metasurfaces with enhanced directional photoluminescence,”
Nano Lett., 24
(19), 5783
–5790 https://doi.org/10.1021/acs.nanolett.4c00871 NALEFD 1530-6984
(2024).
Google Scholar
X. Ding et al.,
“Metasurface holographic image projection based on mathematical properties of Fourier transform,”
PhotoniX, 3 16 https://doi.org/10.1186/s43074-020-00016-8
(2020).
Google Scholar
X. Guo et al.,
“Stokes meta-hologram toward optical cryptography,”
Nat. Commun., 13
(1), 6687 https://doi.org/10.1038/s41467-022-34542-9 NCAOBW 2041-1723
(2022).
Google Scholar
Z. Wang et al.,
“3D intelligent cloaked vehicle equipped with thousand-level reconfigurable full-polarization metasurfaces,”
Adv. Mater., 36 2400797 https://doi.org/10.1002/adma.202400797
(2024).
Google Scholar
Y. Cao et al.,
“Four-channel display and encryption by near-field reflection on nanoprinting metasurface,”
Nanophotonics, 11
(14), 3365
–3374 https://doi.org/10.1515/nanoph-2022-0216
(2022).
Google Scholar
X. Yin et al.,
“Photonic spin hall effect at metasurfaces,”
Science, 339
(6126), 1405
–1407 https://doi.org/10.1126/science.1231758 SCIEAS 0036-8075
(2013).
Google Scholar
E. Choi et al.,
“360° structured light with learned metasurfaces,”
Nat. Photonics, 18 848
–855 https://doi.org/10.1038/s41566-024-01450-x NPAHBY 1749-4885
(2024).
Google Scholar
G. L. Stuber et al.,
“Broadband MIMO-OFDM wireless communications,”
Proc. IEEE, 92
(2), 271
–294 https://doi.org/10.1109/JPROC.2003.821912 IEEPAD 0018-9219
(2004).
Google Scholar
Z. Zhang, X. Ma and J. Zhong,
“Single-pixel imaging by means of Fourier spectrum acquisition,”
Nat. Commun., 6
(1), 6225 https://doi.org/10.1038/ncomms7225 NCAOBW 2041-1723
(2015).
Google Scholar
S. Lin et al.,
“Steganographic optical image encryption based on single-pixel imaging and an untrained neural network,”
Opt. Express, 30
(20), 36144
–36154 https://doi.org/10.1364/OE.467708 OPEXFF 1094-4087
(2022).
Google Scholar
X. Li et al.,
“Code division multiplexing inspired dynamic metasurface holography,”
Adv. Funct. Mater., 31
(35), 2103326 https://doi.org/10.1002/adfm.202103326 AFMDC6 1616-301X
(2021).
Google Scholar
Z. Gu et al.,
“IEPSBP: a cost-efficient image encryption algorithm based on parallel chaotic system for green IoT,”
IEEE Trans. Green Commun. Networking, 6
(1), 89
–106 https://doi.org/10.1109/TGCN.2021.3095707
(2021).
Google Scholar
Y. Wu et al.,
“Local Shannon entropy measure with statistical tests for image randomness,”
Inf. Sci., 222 323
–342 https://doi.org/10.1016/j.ins.2012.07.049
(2013).
Google Scholar
Y. Wu et al.,
“NPCR and UACI randomness tests for image encryption,”
Cyber J.: Multidiscipl. J. Sci. Technol., J. Sel. Areas Telecommun., 3
(2), 31
–38
(2011).
Google Scholar
H.-C. Liu et al.,
“Single-pixel computational ghost imaging with helicity-dependent metasurface hologram,”
Sci. Adv., 3
(9), e1701477 https://doi.org/10.1126/sciadv.1701477
(2017).
Google Scholar
X. Wang, L. Teng and X. Qin,
“A novel colour image encryption algorithm based on chaos,”
Signal Process., 92
(4), 1101
–1108 https://doi.org/10.1016/j.sigpro.2011.10.023 SPRODR 0165-1684
(2012).
Google Scholar
S. Qi et al.,
“A principled design of image representation: towards forensic tasks,”
IEEE Trans. Pattern Anal. Mach. Intell., 45
(5), 5337
–5354 https://doi.org/10.1109/TPAMI.2022.3204971 ITPIDJ 0162-8828
(2022).
Google Scholar
BiographyXiaowei Li received his MS and PhD degrees in information and communications engineering from Pukyong National University, Busan, South Korea, in 2011 and 2014, respectively. From 2014 to 2015, he was a researcher at the College of Computer Engineering, Yonsei University, Seoul, South Korea. He is currently a professor at the School of Electronics and Information Engineering, Sichuan University, Chengdu, China. He authored or co-authored approximately 80 papers cited by Science Citation Index (SCI). As first author, he has published approximately 50 SCI papers, and the impact factor of half of the papers is greater than 3. His research interests include three-dimensional integral imaging, holography, optical encryption, and image watermarking. Qiong-Hua Wang is a professor of optical engineering at the School of Instrumentation and Optoelectronic Engineering, Beihang University, Beijing, China. She was a professor at Sichuan University from 2004 to 2018. She was a post-doctoral research fellow at the School of Optics/CREOL, University of Central Florida, from 2001 to 2004. She worked at the University of Electronic Science and Technology of China (UESTC) from 1995 to 2001. She received BS, MS, and PhD degrees from UESTC in 1992, 1995, and 2001, respectively. She has published more than 300 papers cited by SCI and authored three books. She holds 5 U.S. patents and more than 150 Chinese patents. She is a fellow of the Society for Information Display and an associate editor of the Journal of the Society for Information Display, Journal of Information Display, and PhotoniX. Her research interests include display and imaging technologies. Yiguang Liu was a research fellow, visiting professor, and senior research scholar at the National University of Singapore, Singapore; Imperial College London, London, UK; and Michigan State University, East Lansing, Michigan, USA, respectively. He was chosen into the MOE program New Century Excellent Talents in 2008 and chosen as a scientific and technical leader in Sichuan Province in 2010. He is currently the director of the Vision and Image Processing Laboratory and a professor at the School of Computer Science, Sichuan University, Chengdu, China, and a reviewer for the Mathematical Reviews of the American Mathematical Society. He has co-authored more than 100 international journal and conference papers and a chapter of the book entitled Computational Intelligence and Its Applications (Imperial College Press, 2011). His research interests include computer vision and image processing, computational imaging, and computational intelligence. |