OpEnCam: Lensless Optical Encryption Camera

IF 4.2 2区 计算机科学 Q2 ENGINEERING, ELECTRICAL & ELECTRONIC IEEE Transactions on Computational Imaging Pub Date : 2024-09-05 DOI:10.1109/TCI.2024.3451953
Salman S. Khan;Xiang Yu;Kaushik Mitra;Manmohan Chandraker;Francesco Pittaluga
{"title":"OpEnCam: Lensless Optical Encryption Camera","authors":"Salman S. Khan;Xiang Yu;Kaushik Mitra;Manmohan Chandraker;Francesco Pittaluga","doi":"10.1109/TCI.2024.3451953","DOIUrl":null,"url":null,"abstract":"Lensless cameras multiplex the incoming light before it is recorded by the sensor. This ability to multiplex the incoming light has led to the development of ultra-thin, high-speed, and single-shot 3D imagers. Recently, there have been various attempts at demonstrating another useful aspect of lensless cameras - their ability to preserve the privacy of a scene by capturing encrypted measurements. However, existing lensless camera designs suffer numerous inherent privacy vulnerabilities. To demonstrate this, we develop the first comprehensive attack model for encryption cameras, and propose \n<sc>OpEnCam</small>\n– a novel lensless optical \n<bold>en</b>\ncryption \n<bold>ca</b>\nmera design that overcomes these vulnerabilities. \n<sc>OpEnCam</small>\n encrypts the incoming light before capturing it using the modulating ability of optical masks. Recovery of the original scene from an \n<sc>OpEnCam</small>\n measurement is possible only if one has access to the camera's encryption key, defined by the unique optical elements of each camera. Our \n<sc>OpEnCam</small>\n design introduces two major improvements over existing lensless camera designs - (a) the use of two co-axially located optical masks, one stuck to the sensor and the other a few millimeters above the sensor and (b) the design of mask patterns, which are derived heuristically from signal processing ideas. We show, through experiments, that \n<sc>OpEnCam</small>\n is robust against a range of attack types while still maintaining the imaging capabilities of existing lensless cameras. We validate the efficacy of \n<sc>OpEnCam</small>\n using simulated and real data. Finally, we built and tested a prototype in the lab for proof-of-concept.","PeriodicalId":56022,"journal":{"name":"IEEE Transactions on Computational Imaging","volume":"10 ","pages":"1306-1316"},"PeriodicalIF":4.2000,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Computational Imaging","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10666814/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

Abstract

Lensless cameras multiplex the incoming light before it is recorded by the sensor. This ability to multiplex the incoming light has led to the development of ultra-thin, high-speed, and single-shot 3D imagers. Recently, there have been various attempts at demonstrating another useful aspect of lensless cameras - their ability to preserve the privacy of a scene by capturing encrypted measurements. However, existing lensless camera designs suffer numerous inherent privacy vulnerabilities. To demonstrate this, we develop the first comprehensive attack model for encryption cameras, and propose OpEnCam – a novel lensless optical en cryption ca mera design that overcomes these vulnerabilities. OpEnCam encrypts the incoming light before capturing it using the modulating ability of optical masks. Recovery of the original scene from an OpEnCam measurement is possible only if one has access to the camera's encryption key, defined by the unique optical elements of each camera. Our OpEnCam design introduces two major improvements over existing lensless camera designs - (a) the use of two co-axially located optical masks, one stuck to the sensor and the other a few millimeters above the sensor and (b) the design of mask patterns, which are derived heuristically from signal processing ideas. We show, through experiments, that OpEnCam is robust against a range of attack types while still maintaining the imaging capabilities of existing lensless cameras. We validate the efficacy of OpEnCam using simulated and real data. Finally, we built and tested a prototype in the lab for proof-of-concept.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
OPENCAM:无镜头光学加密摄像机
无透镜相机在传感器记录入射光之前,会对其进行多路复用。这种复用入射光的能力促进了超薄、高速和单次拍摄 3D 成像仪的发展。最近,人们尝试展示无镜头相机的另一个有用方面,即通过捕捉加密测量数据来保护场景隐私的能力。然而,现有的无镜头相机设计存在许多固有的隐私漏洞。为了证明这一点,我们开发了第一个针对加密摄像机的综合攻击模型,并提出了 OpEnCam--一种新型无镜头光学加密摄像机设计,它克服了这些漏洞。OpEnCam 利用光学掩膜的调制能力,在捕捉入射光之前对其进行加密。只有获得由每个摄像头的独特光学元件定义的摄像头加密密钥,才能从 OpEnCam 测量中恢复原始场景。与现有的无镜头相机设计相比,我们的 OpEnCam 设计有两大改进--(a) 使用两个同轴光学掩膜,一个贴在传感器上,另一个在传感器上方几毫米处;(b) 掩膜图案的设计是从信号处理思想中启发式得出的。我们通过实验证明,OpEnCam 能够抵御各种类型的攻击,同时仍能保持现有无镜头相机的成像能力。我们利用模拟和真实数据验证了 OpEnCam 的功效。最后,我们在实验室建立并测试了一个原型,以验证概念。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEEE Transactions on Computational Imaging
IEEE Transactions on Computational Imaging Mathematics-Computational Mathematics
CiteScore
8.20
自引率
7.40%
发文量
59
期刊介绍: The IEEE Transactions on Computational Imaging will publish articles where computation plays an integral role in the image formation process. Papers will cover all areas of computational imaging ranging from fundamental theoretical methods to the latest innovative computational imaging system designs. Topics of interest will include advanced algorithms and mathematical techniques, model-based data inversion, methods for image and signal recovery from sparse and incomplete data, techniques for non-traditional sensing of image data, methods for dynamic information acquisition and extraction from imaging sensors, software and hardware for efficient computation in imaging systems, and highly novel imaging system design.
期刊最新文献
IEEE Signal Processing Society Information List of Reviewers Ice-Tide: Implicit Cryo-ET Imaging and Deformation Estimation Joint Edge Optimization Deep Unfolding Network for Accelerated MRI Reconstruction FgC2F-UDiff: Frequency-Guided and Coarse-to-Fine Unified Diffusion Model for Multi-Modality Missing MRI Synthesis
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1