Chaotic Pattern Array for Single-Pixel Imaging

: Single-pixel imaging (SPI) is an emerging framework that can capture the image of a scene via a single-point detector at a considerably low cost. It measures the projection at the detector of the scene under view with certain patterns. One can reconstruct the image of the scene via post-processing the measurements modulated by the patterns. However, the most commonly-used random patterns are not always desirable in many applications, especially for real-time, resource-limited occasions, due to their high memory requirement and huge cost in software and hardware implementation. In this paper, a chaotic pattern array is proposed for the SPI architecture. Compared with random patterns, the proposed chaotic pattern array can not only promise to increase the capabilities of the SPI device, but can also reduce the memory cost and complexity of hardware implementation in the meantime. Moreover, convincing experiment results are given to illustrate that the proposed pattern array is suitable for single-pixel cameras, as well as other compressive imaging applications.


Introduction
Compressive sampling (CS) theory implies that one can reconstruct a signal of interest from only a small set of projections, which has brought a revolution in various fields [1][2][3][4][5][6][7].Motivated by CS theory, Duarte et al. proposed a novel single-pixel imaging (SPI) architecture, which is also known as a single-pixel camera, based on a single-point detector at a considerably low cost [8].On the surface, imaging via a single-pixel imaging device is counterproductive, as we know that an ordinary sensor-array-based camera (i.e., a CMOS or CCD (CMOS and CCD are complementary metal-oxide-semiconductor transistor and charge coupled device, respectively.)camera) in today's world can have millions of embedded pixels.
However, the SPI architecture can measure the images of interest while implementing hardware compression of the data without additional cost [9].Compared to CMOS or CCD cameras, the SPI camera has several outstanding advantages: (1) the single-point detector is typically sensitive to weak light intensity change [10]; hence, it is efficient; (2) using an SPI device has intrinsic hardware compression [11]; therefore, it just requires small memory; (3) the cost of building a single-pixel camera is much lower than that of an ordinary camera [12], so it is economical, as well.As a result, the SPI architecture is of interest for various applications, such as color imaging [13], Terahertz imaging [14], infrared imaging [15], hyperspectral imaging [16], and video acquisition [17].
From a hardware perspective, an SPI device is made up of a single-point detector and a spatial light modulator (SLM).More specifically, the single-point detector essentially uses certain patterns pre-loaded on the SLM hardware to modulate the image of a scene and then integrates the corresponding measurements.By post-processing these measurements, the image of the scene can be exactly restored with high probability.The methods of restoring images are conventional CS recovery algorithms, such as l 0 or l 1 norm minimization.In fact, there are two other acquisition and restoration strategies for the generalized single-pixel imaging, i.e., basis scan [18] and adaptive basis scan [19][20][21].The characteristics of these methods can be summarized in Table 1.Each strategy has its benefits, but also some drawbacks.The CS method is efficient because it only needs a few measurements at the expense of the high computational cost of the reconstruction.Basis scan benefits from fast inverse transform, but this method is impractical yet, as it requires a large number of measurements.Adaptive basis scan introduces adaptivity to overcome this drawback, but it cannot offer a perfect image reconstruction.Moreover, it still requires more measurements than the CS method, although this approach greatly reduces the measurement requirements compared to basis scan.Considering that the CS method is attractive because of its high efficiency and simplicity in practical applications, we mainly discuss the commonly-used SPI technique, i.e., the SPI with the CS method.It is widely agreed that one critical idea of the SPI architecture is to design the SLM patterns.In fact, there have been many different random SLM patterns for SPI over the years.Among them, the most common one is the random Bernoulli pattern whose elements obey the Bernoulli distribution with mean zero and probability 1  2 .To date, researchers have introduced four common hardware architectures to load random patterns, i.e., the digital micromirror device (DMD) (such a device was invented by Hornbeck in 1987, and Duarte et al. firstly introduced this device into the SPI camera) [8], liquid crystal display (LCD) [22], liquid crystal on silicon (LCS) [23], and metamaterial absorber (MMA) [14].Depending on the desired applications, the DMD is widely used in the SPI device, as it is easy to implement and can provide rapid refreshing rates, as well.Therefore, the DMD together with a random Bernoulli pattern is quite popular [9].In addition, many particularly useful strategies, such as pattern shifting [8] and pattern generalization [24], have been proposed to improve the performance of random SLM patterns.
Although random patterns are of extraordinary importance for the image modulation in the SPI device, they are not always desirable in many applications because of their high memory requirement and huge cost in software and hardware implementation.Promising approaches to solve these challenges can be found in [25][26][27] and the references therein.These proposed patterns have their benefits, but also some disadvantages.The theoretical guarantees of these deterministic patterns are much more rigorous than those of the random patterns.Moreover, only most of sparsifying signals, but not all general signals, can be exactly recovered using the deterministic approaches.In particular, Jie et al. [28] showed that a chaotic sensing matrix can lead to remarkable improvements of the restoration effect and advantages in hardware and storage in a single-pixel color imaging system.The ingenuity of the work is very appealing, but the method lacks some detailed theoretical perspective such that it may not be general and limits its application in the SPI architecture.
Motivated by the chaotic sensing matrix, a chaotic pattern array (CPA) is proposed for the SPI architecture from a theoretical viewpoint in this paper.Specifically, we first employ the chaotic bipolar sequence ({1, −1} elements) to build the CPA and then implement the generated construction for the single-pixel camera.In addition, we show that the proposed CPA is verified to satisfy CS theory via an argument together with Chernoff's inequality.Based on this work, the bipolar sequence can be generalized to all other chaotic sequences that are independent realizations of ±1 binarization elements.Compared with random patterns, the CPA is hardware-friendly, and it can save significant memory by only storing the seed.Because of these features, the proposed CPA with ±1 elements is convenient for any SLM hardware, such as the DMD.The experimental results show that our proposed CPA performs similarly to or better than its random counterparts.The CPA not only works in single-pixel cameras, but also has a promising application in other imaging techniques, such as ghost imaging.
The rest of the work is arranged as follows.In Section 2, we review the related work about the SPI architecture and CS theory.In Section 3, we develop the chaotic pattern array for the SPI architecture.In Section 4, simulation results are illustrated and analyzed to investigate the efficiency of the chaotic pattern array.Finally, we conclude the work with some remarks in Section 5.

Simple Modeling of the SPI Architecture
The simplest design of the SPI device can be sketched as in Figure 1.The object image under view is modulated by the predefined SLM pattern to obtain the sequential measurements (or modulated light rays), and then, these corresponding measurements are collected via the single-point detector, wherein the lens is used to focus the measurements.After that, we obtain the numerical data from the single-point detector through an analog-to-digital (A/D) converter.For simplicity and formal description, we here treat an image of interest as a one-dimensional column vector by vectorizing it.Let x ∈ R N×1 denote the image of a scene, where the size of the image is N = H × D. Assume that the predefined SLM pattern is represented by m k ∈ R 1×N and the collected measurement is denoted by y k .Therefore, mathematically, we have: where {m k } j and x j denote the jth element of m k and x, respectively.Equation (1) shows that the predefined SLM pattern m k is used to scan over the full object x and then obtain one measurement y k .Obviously, restoring the image of the scene x from one single measurement y k is absolutely impossible, and thus, sequential measurements with a set of SLM patterns should be implemented.Let M = [m 1 ; m 2 ; . . .; m S ] ∈ R S×N denote the sequence of S SLM patterns.Thus, the corresponding sequence of measurements y = [y 1 , y 2 , . . ., y S ] T ∈ R S×1 can be modeled by: Equation ( 2) implies that the SPI architecture needs to address the following two key points: • Modulation: how to design or select the predefined SLM patterns M?
• Reconstruction: With known y and M, how is the image of the scene x reconstructed?
To answer these issues, we have to review the mathematical tool behind this, i.e., CS theory, as the SPI technique is based on the CS framework.

Basics of CS Theory
The CS framework indicates that one can reconstruct a sparse signal from only a small set of projections, which offers a perfect theoretical framework for the SPI architecture.Assume that the image of a scene is sparse on a transform basis Ψ ∈ R N×N .Fourier, discrete cosine transform, and the wavelets basis are several common choices for Ψ.Mathematically, where α is the K-sparse coefficient vector, i.e., ||α|| l 0 ≤ K. Based on CS theory, we know that one can reconstruct the image of the scene x from only K-sparse coefficients.In order to better understand this, we need to make the following review.With a collection of vectors M ∈ R S×N (also called sensing matrix), the holy grail of CS is to obtain S N measurements of the image x, i.e., where Θ = M • Ψ ∈ R S×N is called the transform matrix.The ratio S N is the sampling rate, and we use to denote it.As there is a linear dimensionality reduction from R N×1 to R S×1 , it is vital to build the matrix M such that it seizes and possesses enough information to restore x.Certain properties of the collection matrix M, such as the mutual coherence [29] and the restricted isometry property (RIP) [30], have been proposed to measure M. Definition 1.The coherence of a matrix M ∈ R S×N , µ(M), is the maximum inner product, i.e., where m i and m j are any two columns of M.
We can prove that µ(M) ∈ [ where is also known as the Welch bound [31].In addition, it can be observed that the lower bound is close to 1 √ S when S N. Much research has extended the concept of coherence to certain structured sparsity models [32].The coherence is a commonly-used property to measure the matrix M, but it may lack an intuitive and visual explanation.Another common property is the RIP, which is an elegant geometrical description for the dimensionality reduction with distance preserving.
The RIP can guarantee that the distance between y = Mv and y = Mv is proportional to the distance between the two original signals v and v .This distance preserving ensures that any two sparse signals that are far apart from each other will not result in the same measurements y.Actually, one can connect the RIP and the coherence via the Geršgorin circle theorem, and we refer the reader to [33,34] and the references therein.
It is well known that an independent identically distributed (i.i.d) random matrix has the (K, )-RIP; thus, random SLM patterns are generally selected for the single-pixel camera.In particular, a random Bernoulli pattern with elements ±1 loaded on the hardware architecture is quite popular [9], as this pattern can easily modulate the pixels to +1 in phase or −1 out of phase via a reference.With the Johnson-Lindenstrauss lemma, Baraniuk et al. proposed an algorithmically-simple proof of the RIP for random SLM patterns [35].By combining the concentration inequalities, they introduced the following theorem.
Theorem 1 ([35]).If a matrix M ∈ R S×N meets the concentration inequalities and S ≥ (c 0 , where c 0 and c 1 , relying only on , are two constants. Provided that M meets the (K, )-RIP, then x can be restored from y via CS recovery algorithms.Strategies for CS recovery include the l 0 norm, l 1 norm, and greedy algorithms.For the SPI recovery, we need first to address that: where 0 ≤ p ≤ 1 and x l p denotes the l p norm of α ∈ R N×1 .After that, by virtue of: we can restore the image x from the measurements y.In addition, Li demonstrated that total variation (TV) minimization is also suitable for the SPI recovery, as it can offer efficient reconstruction performance in terms of recovery quality and speed [36].

Single-Pixel Imaging with the Chaotic Pattern Array
In this section, we introduce the modulation and reconstruction mechanisms using an SPI device with the chaotic pattern array.

Overall Framework
For a traditional SPI device, a random SLM pattern is commonly used to modulate the image of a scene.Then the modulated light rays, i.e., the corresponding measurements, are integrated via a single-point detector.As we know, random SLM patterns are of extraordinary importance to modulate the image of the scene in an SPI device.However, random patterns are difficult to load on an SLM hardware, and they also require huge memory cost because we need to store every element of the random patterns in both the modulation and reconstruction side for exact image recovery.To address these shortcomings, we introduce a chaotic pattern array (CPA), which is a simple construction of the desired patterns for the SPI architecture.
The sketch of an SPI device with the CPA can be schematized as in Figure 2. The image of a scene under view is modulated by a CPA pre-loaded on the SLM plane, and then, the single-point detector collects the modulated light rays focused by a lens.After analog-to-digital conversion, the collected measurements are sent via a radio frequency (RF) circuit.By post-processing these measurements, the image of the scene can be exactly restored.The generation of the CPA is shown in the lower half of Figure 2. In the next subsection, we focus on the construction of the CPA such that it meets the RIP.[37].In general, one generated chaotic pattern array (CPA) is used as a basis to generate illumination patterns to modulate the image.Moreover, the CPAs are suitable for us to flexibly select or switch CPA in certain compressive sampling (CS) applications.For example, if we want to change a CPA for some reason, then just choose another CPA from the CPAs.

Reviews for the Chaotic Bipolar Sequence
Chaos is a deterministic dynamical system with special properties.For example, a special case of the well-known Logistic chaotic system is: where z k ∈ (0, 1) and z 0 is a seed(It should be noted that there are some singularities (only one rational number is 0.5; the others are all irrational numbers, such as ) for Equation (9).Although these singularities will lead to the chaotic system meeting the degradation phenomenon and yielding a periodic chaotic sequence, we can obtain a sequence that meets the actual needs if we do not use the rational number 0.5 as the initial seed in practical applications.This will also be confirmed in later experiments.).For the special case, the invariant measure of Logistic chaotic system is , can be obtained via the recurrence of Equation ( 9).We introduce a threshold function (z) defined as: with its complementary function: Based on the threshold function (z), we can obtain a Logistic chaotic bipolar sequence . By virtue of the invariant measure of the Logistic system, the ensemble-average of { (τ k (z 0 ))} ∞ k=0 can be attained by: b−1 is the jth string, where q (j) k ∈ {1, −1}.Based on the ensemble-average technique, Kohda et al. investigated the statistical properties of bipolar sequences generated by the ergodic chaotic system with some symmetric properties [38].Since the Logistic chaotic bipolar sequence is a special case of their work, we have the following lemma.
where γ is the number of −1 s in {q More details about this lemma can be found in [38][39][40][41].This lemma indicates that { (z k )} ∞ k=0 is a sequence of i.i.d.binarization random variables.In fact, the i.i.d.property constitutes a good modulation performance for our proposed patterns.

Construction and Performance Analysis
Using { (z k )} ∞ k=0 , we can construct a chaotic pattern array that is arranged in a matrix M ∈ R S×N row by row, written as: is a scalar for normalization.It is worth noting that a seed z 0 determines a CPA, and different seeds will result in completely different CPAs.With a given z 0 and S, the CPA is constructed once and for all.Moreover, the time cost of generating a CPA is very low, mainly due to the following two aspects: (1) the binary sequence used to construct the CPA is generated by a quadratic iterative equation together with a hard threshold equation; hence, it does not require complex calculations; (2) the generated CPA only needs a simple row-by-row arrangement, so it can be implemented simply and quickly.Figure 3 gives four examples of chaotic pattern arrays ∈ R 20×50 with different seeds, where z 0 ∈ {0.17, 0.27, 0.67, 0.87}.It can be seen that the generated CPA is highly non-symmetric.Moreover, as shown in Figure 3, the densities of the four generated CPAs (the ratio of the total number of ones to the total number of elements) are 0.5045, 0.4925, 0.5075, and 0.4865, respectively, i.e., the number of −1's and the number of ones are almost equal.In other words, the validity of Lemma 1 is also verified from an experimental perspective.
Mathematically, M is a sub-Bernoulli random matrix, as { (z k )} ∞ k=0 are independent realizations of ±1 binarization elements.Achlioptas et al. [42] showed that a matrix with elements drawn independently from random variables satisfies the concentration inequalities.In fact, the concentration inequalities are useful and important tools in probability and analysis.Baraniuk et al. [35] used the concentration inequalities together with covering arguments to verify that random matrices have the RIP (see Theorem 1).Following their work, we can easily prove the RIP for our constructions.We now introduce the following lemma for CPAs.Lemma 2. Given a generated CPA M, for any vector v ∈ R N×1 , the variable M • v 2 l 2 is highly concentrated about v 2 l 2 , i.e., we have: where c(µ) = µ 2 4 − µ 3 6 is a positive constant.
Thanks to the moment conditions, the proof of this lemma can be derived using Chernoff inequalities.We give out this proof procedure in Appendix B. Lemma 2 shows that the proposed CPA meets the concentration inequalities with reasonable bounds on the constants.Based on Theorem 1, the following theorem can be obtained.

Theorem 2. With probability exceeding
, where c 2 and c 3 are two constants.
Theorem 2 theoretically guarantees that the proposed Logistic CPA satisfies CS theory; thus, it can also be used as an SLM pattern for the SPI architecture.Besides the Logistic system, we can employ other chaotic systems (e.g., the Chebyshev system) to generate chaotic bipolar sequences and use the generated sequences to construct CPAs for the SPI device.

Mechanism of the Chaotic Pattern Array
As illustrated in the lower half of Figure 2, the chaotic pattern array generator consists of a real-valued generator and a bipolar generator.Once we input an initial seed for the real-valued generator, it outputs a Logistic chaotic real-valued sequence.After that, we input the real-valued sequence into the bipolar generator.This generator converts the real-valued sequence to a bipolar one through a comparator.Finally, we re-arrange the bipolar sequence into a CPA row by row.Each row of the CPA is a pattern, which is used to scan over the full image of a scene and then obtain one measurement.With one generated CPA, we can modulate the image of the scene, i.e., the generated CPA is used as a basis to generate illumination patterns to modulate the image.
With a given z 0 and S, we can construct a CPA once and for all.In other words, we can store the CPA by only storing the seed z 0 .Moreover, the CPA with ±1 elements is convenient for any SLM hardware, such as the DMD.We give an example for which the CPA is loaded on a DMD.This hardware consists of thousands of tiny mirrors, which are arranged in a matrix ∈ R S×N with 768 ≤ S ≤ 1600 and 1024 ≤ N ≤ 2560 (The size mentioned here is only a classic value.In fact, it can be an arbitrary size.).The mirror pitch relying on the model ranged from 7-14 µm.We independently controlled each of these mirrors and set them into two states according to the CPA.That is, an element of one of the CPA corresponds to the on state and an element −1 to the off state.When the mirror is in the on state, the light is sent to the detector and then collected by this device.While the mirror is off state, the light is reflected in the opposite direction.
After the CPA is loaded on the SLM in an SPI device, we can obtain the measurements one by one.More specifically, using the predefined SLM pattern m 1 , we can obtain the measurement y 1 , then use m 2 to get y 2 , and after repeating the above step S times, we finally obtain S measurements y = {y 1 , y 2 , . . ., y S } T ∈ R S×1 .This completes the modulation procedure, and we obtain the corresponding measurements.
It is worth noting that in many applications, we hope to be able to switch the modulation mode flexibly.In these cases, random patterns are not available as they require a lot of memory.Actually, chaotic pattern arrays (CPAs) are especially suitable for these scenarios, because of the following four aspects: (1) each CPA in the CPAs can be easily loaded on SLM; (2) each CPA can modulate the image of the scene very well; (3) it can easily switch between different CPAs; (4) the CPAs will benefit memory cost automatically.There are two ways to generate CPAs.One is that we first used a seed to produce a long sequence and then filled a single CPA via the sequence row by row until the entire CPAs was filled.The other is that we first used different seeds to generate different CPAs and then integrated them into one complete CPAs.In what follows, we will give an interesting application of CPAs.
As mentioned before, an initial seed z 0 determines all the elements of the CPA.As distinctly illustrated in Figure 3, with a different seed, the generated CPA is completely different from the other one.In other words, if we want to change the modulation style of the SLM, we only need to change the seed to obtain the corresponding CPA.This property is quite suitable for encryption and privacy [43][44][45][46].Considering this property, we can construct CPAs for the single-pixel camera.Such a device with CPAs is well suited for these applications that require encryption and privacy, such as medical care and wireless body area networks.Moreover, we only need to store these seeds; thus, the CPAs can be stored with a small storage cost.

Numerical Experiments
In this section, some numerical experiments are performed to investigate the performance of the CPA.We first used different recovery algorithms to demonstrate that the CPA is well-suited for CS theory.Then, the comparisons between our proposed construction and existing random patterns were carried out.In addition, recovery time (RecTime), mean squared error (MSE), and peak signal-to-noise ratio (PSNR) were used to assess these patterns.The MSE and PSNR are respectively defined as: and: where x ∈ R H×D and x * denote the original image and the restored image, respectively.The software and hardware environments for the simulation were MATLAB 2017a and Intel(R) Core(TM) i5-7500 CPU@2.70GHz with RAM 16 GB memory, respectively.In the simulation, six standard testing images ∈ R 256×256 including "House", "Camera", "Baboon", "Mena", "Starfish", and "Straw", which are illustrated in Figure 4a-f, were the original signals of interest.All testing data were sparse in the well-known discrete cosine transform.In addition, we constructed a CPA ∈ R S×256 using { (z k )} ∞ k=0 with z 0 = 0.17.Note that we did not have to vectorize the testing images as we could process these images column by column.

CPA with Different Recovery Algorithms
Using eight generated CPAs ∈ R S×256 , the image "House" was modulated to get measurements of size S × 256 at different sampling rates, s, where S = [256 × ] and ∈ {0.1, 0.2, 0.3, 0.4, 0.5, 0.6, 0.7, 0.8}.For example, if the size of the generated CPA was 26 × 256, the sampling rate was 0.1.Based on these measurements ∈ R S×256 , we then respectively restored the image "House" via the Newton smoothed l 0 (NSl 0 ) algorithm [47].This algorithm is two orders of magnitude faster than linear programming methods, while providing similar reconstruction accuracy.Figure 5a-h illustrates the restored images corresponding to the sampling rates ranging from 0.1-0.8 with increments of 0.1.The corresponding MSEs, PSNRs, and recovery time for Figure 5a-h are shown in Table 2.The recovery errors in Figure 5 are very asymmetric between axes, because CS theory considers each pixel in an image to be equally "important" or equally "unimportant".If was greater than 0.4, the MSE was dramatically decreased, and the PSNR was rapidly improved.As observed in Figure 5 and Table 2, we know that the CPA can be used to modulate images for the SPI architecture.Moreover, we utilized different recovery algorithms (i.e., OMP, subspace pursuit (SP), gradient projection for sparse reconstruction (GPSR), NSl 0 , and TV minimization) to restore the image "House".The OMP and the SP stand for orthogonal matching pursuit algorithm [48] and subspace pursuit algorithm [49], respectively.The former is a typical greedy algorithm for sparse approximation, but it takes a long time to process the image signal.The later has low computational complexity and high reconstruction precision, which is at the same order as that of linear programming methods.The GPSR is the gradient projection for sparse reconstruction algorithm [50], which is suitable for solving convex non-smooth unconstrained optimization problems, especially in large-scale settings.The TV minimization denotes the total variation minimization algorithm, which is especially suitable for image reconstruction.With the aforementioned recovery algorithms, we obtained the corresponding PSNRs and RecTimes, which are plotted in Figure 6a,b, respectively.As illustrated in Figure 6, we know that the aforementioned algorithms can restore the image "House" from the measurements when we use the CPA to modulate the image "House".More specifically, the NSl 0 and TV minimization algorithm performed better than the other methods while using less recovery time.The OMP algorithm took a long time to restore the image "House", and it was proportional to the sampling rate.However, overall, it can be seen that the CPA was suitable for the SPI architecture with various CS recovery algorithms.

CPA vs. Different Modulation Patterns
In this part, three SLM modulation patterns ∈ R S×256 , i.e., random Gaussian pattern (RGP), random Bernoulli pattern (RBP), and Hadamard pattern (In fact, the original Hadamard matrix cannot be directly used as SLM modulation patterns for two reasons.The first is that it is a square matrix, so it cannot achieve compressive imaging.Second, it does not meet the CS matrix property very well.In the simulation, we first generated an original Hadamard matrix ∈ R 256×256 and then randomly selected S rows and randomly confused its column arrangement to form an underdetermined Hadamard matrix ∈ R S×256 , and finally, we used the generated matrix as the SLM modulation patterns.)(HMP), are considered to make a comparison.Compared to the CPA, these three patterns require a lot of memory for exact image reconstruction.More specifically, we can store the generated CPA by only storing the seed.However, the random patterns need to store each of their elements, i.e., the storage cost of RGP or RBP is O(S × N).The HMP requires to remember its row selection and column arrangement.
The images "House", "Camera", "Baboon", "Mena", "Starfish", and "Straw", shown in Figure 4a-f, were modulated by the proposed CPA and the other three SLM patterns.Using the NSl 0 algorithm, we obtained the corresponding MSEs, PSNRs, and recovery time, which are reported in Table 3.In particular, we compared the reconstruction of "House" using the proposed CPA, RGP, RBP, and HMP, which is shown in Figure 7.It shows that the proposed CPA has almost the same performance while saving roughly 5-35% reconstruction time, compared with the popular modulation patterns.From Table 3 and Figure 7, it can be seen that the recovery algorithms were getting better in reconstructing with increased sampling rate.For all cases, these patterns offered similar MSE and PSNR at the same sampling rate.However, the CPA took less time than the other three SLM patterns.This is because the proposed CPA is a totally deterministic binarization construction.Moreover, the CPA administrating ±1 as entries can accelerate image modulation and reconstruction.Overall, the proposed CPA performs better in most of the cases assessed.

Encryption Property of CPA
To figure out the effect of the seed z 0 , we constructed five CPAs using { (z k )} ∞ k=0 with various seeds, where z 0 ∈ {0.17, 0.37, 0.55, 0.77, 0.97}, and then employed these CPAs to modulate the image "House".Finally, the image "House" reconstruction was conducted via the NSl 0 algorithm.The resulting PSNRs and recovery time are respectively plotted in Figure 8a,b.As can be seen, the initial seed z 0 did not have a dramatic influence on the recovery performance.
We now focus on the encryption property of the CPA.As mentioned before, a seed z 0 determines a CPA, and different seeds will result in completely different CPAs.Thus, we can imagine the single-pixel camera with a CPA as an encryption system.In this scheme, we integrated compression and encryption into only one step using the CPA during the modulation procedure.More specifically, the image of a scene, x, was the original data, the measurements represented the encrypted information, and the CPA was the encrypted compression operator, where the seed z 0 denotes the security key (If the attacker accidentally finds a seed that creates the generalized inverse matrix of the original CPA, then cracking the encryption of the CPA is a breeze.However, the probability of the occurrence is extremely low, due to two reasons: (1) the original CPA is unknown; (2) the probability of a seed that can directly construct the generalized inverse matrix of the CPA is very low.).Note that the security key was only known by the sender and the authorized receiver.In fact, we can analyze the key space and the key sensitivity of the SPI with a CPA scheme.The key space T and the key sensitivity were determined by the seed z 0 .Specifically, the key space and the key sensitivity were 10 E 0 and 10 −E 0 , respectively, where E 0 denotes the decimal digits of z 0 .Theoretically, E 0 can take any large number so that the key space T will be infinite and the key sensitivity will tend to zero.However, E 0 cannot be too large in practice because of the limited precision of electronic devices.For our experimental setup, the maximum of E 0 of the Logistic system was 15, resulting in T = 10 15 , and the initiation sensitivity was 10 −15 .For example, we considered the image "Lena" ∈ R 256×256 as the original image of a scene, which is depicted in Figure 9a.Then, we generated a CPA ∈ R 128×256 with security key z 0 = 0.17 to modulate and encrypt the image "Lena".Using the NSl 0 algorithm, we restored the image "Lena" via CPAs ∈ R 128×256 with incorrect seeds (keys).Figure 9b,c illustrates the recovery images, which corresponds to the CPAs with z 0 = 0.171 and z 0 = 0.169, respectively.The PSNRs of Figure 9b,c were 2.518 dB and 3.146 dB, respectively, which imply that the original image of the scene cannot be restored by the CPA with an incorrect key. Figure 9d shows the restored image with the right key.The corresponding MSE and PSNR were 0.058 and 30.11dB, respectively, which indicates that the quality of the restored "Lena" is acceptable.Based on this advantage, the proposed CPAs are especially suitable for special CS applications, such as medical imaging and wireless body area networks.

Conclusions
Considering that random patterns are difficult to implement and require huge memory cost, we have proposed a chaotic pattern array for single-pixel imaging architecture in this study.The proposed pattern array was directly built by a chaotic bipolar sequence (elements −1 or one) based on a chaos system.With this simple construction, the proposed pattern array (CPA) was convenient for any SLM hardware, such as the DMD.Moreover, the CPA can save significant memory since it only needs to store the initial seed of chaotic sequence while the random patterns need to store each of their elements.The results obtained from numerical experiments showed that our chaotic pattern array performed similarly or superior to the conventional random ones.Meanwhile, it can save roughly 5-35% reconstruction time compared with other popular patterns.Moreover, our proposed pattern array is well-suited for those applications that require encryption and privacy.
In the future, we will apply the chaotic pattern array to adaptive basis scan and the hybrid method in a generalized single-pixel imaging device to further improve the performance.The main challenge is to investigate a fast and efficient prediction algorithm that can perfectly reconstruct the image of interest.

Figure 1 .
Figure 1.Optical setup of a single-pixel imaging (SPI) device with a transmissive spatial light modulator (SLM).

Figure 2 .
Figure 2. Sketch of an SPI device with the chaotic pattern array, where the left top framework is adapted from[37].In general, one generated chaotic pattern array (CPA) is used as a basis to generate illumination patterns to modulate the image.Moreover, the CPAs are suitable for us to flexibly select or switch CPA in certain compressive sampling (CS) applications.For example, if we want to change a CPA for some reason, then just choose another CPA from the CPAs.

Figure 5 .
Figure 5.The recovery images: (a-h) correspond to the sampling rate from 0.1-0.8.

Figure 9 .
Figure 9.An example for the encryption property of the CPA: (a) the original image "Lena", (b) recovery via the CPA with wrong key z 0 = 0.171; (c) recovery via the CPA with wrong key z 0 = 0.169; (d) recovery via the CPA with right key z 0 = 0.17.

Table 1 .
Comparison of the main characteristics of the three strategies.

Table 2 .
The recovery results for reconstructing "House".RecTime, recovery time.

Table 3 .
Comparison results of recovery using various modulation patterns.