Next Article in Journal
Effect of lateral Gate Design on the Performance of Junctionless Lateral Gate Transistors
Previous Article in Journal
A CMOS W-Band Amplifier with Tunable Neutralization Using a Cross-Coupled MOS–varactor Pair
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Chaotic Pattern Array for Single-Pixel Imaging

1
State Key Lab of Integrated Services Networks, Xidian University, Xi’an 710071, China
2
School of Information Technology and Electrical Engineering, The University of Queensland, Brisbane, QLD 4072, Australia
3
School of Information Technology and Electrical Engineering, Shanghai Jiao Tong University, Shanghai 200240, China
4
School of Control Science and Engineering, Shandong University, Jinan 250100, China
5
School of Automation Science and Engineering, South China University of Technology, Guangzhou 510641, China
*
Author to whom correspondence should be addressed.
Electronics 2019, 8(5), 536; https://doi.org/10.3390/electronics8050536
Submission received: 25 March 2019 / Revised: 7 May 2019 / Accepted: 8 May 2019 / Published: 13 May 2019
(This article belongs to the Section Circuit and Signal Processing)

Abstract

:
Single-pixel imaging (SPI) is an emerging framework that can capture the image of a scene via a single-point detector at a considerably low cost. It measures the projection at the detector of the scene under view with certain patterns. One can reconstruct the image of the scene via post-processing the measurements modulated by the patterns. However, the most commonly-used random patterns are not always desirable in many applications, especially for real-time, resource-limited occasions, due to their high memory requirement and huge cost in software and hardware implementation. In this paper, a chaotic pattern array is proposed for the SPI architecture. Compared with random patterns, the proposed chaotic pattern array can not only promise to increase the capabilities of the SPI device, but can also reduce the memory cost and complexity of hardware implementation in the meantime. Moreover, convincing experiment results are given to illustrate that the proposed pattern array is suitable for single-pixel cameras, as well as other compressive imaging applications.

Graphical Abstract

1. Introduction

Compressive sampling (CS) theory implies that one can reconstruct a signal of interest from only a small set of projections, which has brought a revolution in various fields [1,2,3,4,5,6,7]. Motivated by CS theory, Duarte et al. proposed a novel single-pixel imaging (SPI) architecture, which is also known as a single-pixel camera, based on a single-point detector at a considerably low cost [8]. On the surface, imaging via a single-pixel imaging device is counterproductive, as we know that an ordinary sensor-array-based camera (i.e., a CMOS or CCD (CMOS and CCD are complementary metal-oxide-semiconductor transistor and charge coupled device, respectively.) camera) in today’s world can have millions of embedded pixels.
However, the SPI architecture can measure the images of interest while implementing hardware compression of the data without additional cost [9]. Compared to CMOS or CCD cameras, the SPI camera has several outstanding advantages: (1) the single-point detector is typically sensitive to weak light intensity change [10]; hence, it is efficient; (2) using an SPI device has intrinsic hardware compression [11]; therefore, it just requires small memory; (3) the cost of building a single-pixel camera is much lower than that of an ordinary camera [12], so it is economical, as well. As a result, the SPI architecture is of interest for various applications, such as color imaging [13], Terahertz imaging [14], infrared imaging [15], hyperspectral imaging [16], and video acquisition [17].
From a hardware perspective, an SPI device is made up of a single-point detector and a spatial light modulator (SLM). More specifically, the single-point detector essentially uses certain patterns pre-loaded on the SLM hardware to modulate the image of a scene and then integrates the corresponding measurements. By post-processing these measurements, the image of the scene can be exactly restored with high probability. The methods of restoring images are conventional CS recovery algorithms, such as l 0 or l 1 norm minimization. In fact, there are two other acquisition and restoration strategies for the generalized single-pixel imaging, i.e., basis scan [18] and adaptive basis scan [19,20,21]. The characteristics of these methods can be summarized in Table 1. Each strategy has its benefits, but also some drawbacks. The CS method is efficient because it only needs a few measurements at the expense of the high computational cost of the reconstruction. Basis scan benefits from fast inverse transform, but this method is impractical yet, as it requires a large number of measurements. Adaptive basis scan introduces adaptivity to overcome this drawback, but it cannot offer a perfect image reconstruction. Moreover, it still requires more measurements than the CS method, although this approach greatly reduces the measurement requirements compared to basis scan. Considering that the CS method is attractive because of its high efficiency and simplicity in practical applications, we mainly discuss the commonly-used SPI technique, i.e., the SPI with the CS method.
It is widely agreed that one critical idea of the SPI architecture is to design the SLM patterns. In fact, there have been many different random SLM patterns for SPI over the years. Among them, the most common one is the random Bernoulli pattern whose elements obey the Bernoulli distribution with mean zero and probability 1 2 . To date, researchers have introduced four common hardware architectures to load random patterns, i.e., the digital micromirror device (DMD) (such a device was invented by Hornbeck in 1987, and Duarte et al. firstly introduced this device into the SPI camera) [8], liquid crystal display (LCD) [22], liquid crystal on silicon (LCS) [23], and metamaterial absorber (MMA) [14]. Depending on the desired applications, the DMD is widely used in the SPI device, as it is easy to implement and can provide rapid refreshing rates, as well. Therefore, the DMD together with a random Bernoulli pattern is quite popular [9]. In addition, many particularly useful strategies, such as pattern shifting [8] and pattern generalization [24], have been proposed to improve the performance of random SLM patterns.
Although random patterns are of extraordinary importance for the image modulation in the SPI device, they are not always desirable in many applications because of their high memory requirement and huge cost in software and hardware implementation. Promising approaches to solve these challenges can be found in [25,26,27] and the references therein. These proposed patterns have their benefits, but also some disadvantages. The theoretical guarantees of these deterministic patterns are much more rigorous than those of the random patterns. Moreover, only most of sparsifying signals, but not all general signals, can be exactly recovered using the deterministic approaches. In particular, Jie et al. [28] showed that a chaotic sensing matrix can lead to remarkable improvements of the restoration effect and advantages in hardware and storage in a single-pixel color imaging system. The ingenuity of the work is very appealing, but the method lacks some detailed theoretical perspective such that it may not be general and limits its application in the SPI architecture.
Motivated by the chaotic sensing matrix, a chaotic pattern array (CPA) is proposed for the SPI architecture from a theoretical viewpoint in this paper. Specifically, we first employ the chaotic bipolar sequence ( { 1 , 1 } elements) to build the CPA and then implement the generated construction for the single-pixel camera. In addition, we show that the proposed CPA is verified to satisfy CS theory via an argument together with Chernoff’s inequality. Based on this work, the bipolar sequence can be generalized to all other chaotic sequences that are independent realizations of ± 1 binarization elements. Compared with random patterns, the CPA is hardware-friendly, and it can save significant memory by only storing the seed. Because of these features, the proposed CPA with ± 1 elements is convenient for any SLM hardware, such as the DMD. The experimental results show that our proposed CPA performs similarly to or better than its random counterparts. The CPA not only works in single-pixel cameras, but also has a promising application in other imaging techniques, such as ghost imaging.
The rest of the work is arranged as follows. In Section 2, we review the related work about the SPI architecture and CS theory. In Section 3, we develop the chaotic pattern array for the SPI architecture. In Section 4, simulation results are illustrated and analyzed to investigate the efficiency of the chaotic pattern array. Finally, we conclude the work with some remarks in Section 5.

2. Related Work

2.1. Simple Modeling of the SPI Architecture

The simplest design of the SPI device can be sketched as in Figure 1. The object image under view is modulated by the predefined SLM pattern to obtain the sequential measurements (or modulated light rays), and then, these corresponding measurements are collected via the single-point detector, wherein the lens is used to focus the measurements. After that, we obtain the numerical data from the single-point detector through an analog-to-digital (A/D) converter.
For simplicity and formal description, we here treat an image of interest as a one-dimensional column vector by vectorizing it. Let x R N × 1 denote the image of a scene, where the size of the image is N = H × D . Assume that the predefined SLM pattern is represented by m k R 1 × N and the collected measurement is denoted by y k . Therefore, mathematically, we have:
y k = j = 1 N { m k } j · x j = < m k , x > w i t h j [ 1 , N ] ,
where { m k } j and x j denote the jth element of m k and x , respectively. Equation (1) shows that the predefined SLM pattern m k is used to scan over the full object x and then obtain one measurement y k .
Obviously, restoring the image of the scene x from one single measurement y k is absolutely impossible, and thus, sequential measurements with a set of SLM patterns should be implemented. Let M = [ m 1 ; m 2 ; ; m S ] R S × N denote the sequence of S SLM patterns. Thus, the corresponding sequence of measurements y = [ y 1 , y 2 , , y S ] T R S × 1 can be modeled by:
y = M · x .
Equation (2) implies that the SPI architecture needs to address the following two key points:
  • Modulation: how to design or select the predefined SLM patterns M ?
  • Reconstruction: With known y and M , how is the image of the scene x reconstructed?
To answer these issues, we have to review the mathematical tool behind this, i.e., CS theory, as the SPI technique is based on the CS framework.

2.2. Basics of CS Theory

The CS framework indicates that one can reconstruct a sparse signal from only a small set of projections, which offers a perfect theoretical framework for the SPI architecture. Assume that the image of a scene is sparse on a transform basis Ψ R N × N . Fourier, discrete cosine transform, and the wavelets basis are several common choices for Ψ . Mathematically,
x = Ψ · α ,
where α is the K-sparse coefficient vector, i.e., α l 0 K . Based on CS theory, we know that one can reconstruct the image of the scene x from only K-sparse coefficients. In order to better understand this, we need to make the following review.
With a collection of vectors M R S × N (also called sensing matrix), the holy grail of CS is to obtain S N measurements of the image x , i.e.,
y = M · x = M · Ψ · α = Θ · α ,
where Θ = M · Ψ R S × N is called the transform matrix. The ratio S N is the sampling rate, and we use ♮ to denote it. As there is a linear dimensionality reduction from R N × 1 to R S × 1 , it is vital to build the matrix M such that it seizes and possesses enough information to restore x . Certain properties of the collection matrix M , such as the mutual coherence [29] and the restricted isometry property (RIP) [30], have been proposed to measure M .
Definition 1.
The coherence of a matrix M R S × N , μ ( M ) , is the maximum inner product, i.e.,
μ ( M ) = max 1 i j N | m i , m j | m i 2 · m j 2 ,
where m i and m j are any two columns of M .
We can prove that μ ( M ) [ N S S ( N 1 ) , 1 ] , where N S S ( N 1 ) is also known as the Welch bound [31]. In addition, it can be observed that the lower bound is close to 1 S when S N . Much research has extended the concept of coherence to certain structured sparsity models [32]. The coherence is a commonly-used property to measure the matrix M , but it may lack an intuitive and visual explanation. Another common property is the RIP, which is an elegant geometrical description for the dimensionality reduction with distance preserving.
Definition 2.
A matrix M R S × N meets the (K,ϵ)-RIP if:
( 1 ϵ ) v l 2 2 M · v l 2 2 ( 1 + ϵ ) v l 2 2
holds for all v { v : v l 0 K } with some ϵ > 0 .
The RIP can guarantee that the distance between y = M v and y = M v is proportional to the distance between the two original signals v and v . This distance preserving ensures that any two sparse signals that are far apart from each other will not result in the same measurements y . Actually, one can connect the RIP and the coherence via the Geršgorin circle theorem, and we refer the reader to [33,34] and the references therein.
It is well known that an independent identically distributed (i.i.d) random matrix has the (K, ϵ )-RIP; thus, random SLM patterns are generally selected for the single-pixel camera. In particular, a random Bernoulli pattern with elements ± 1 loaded on the hardware architecture is quite popular [9], as this pattern can easily modulate the pixels to + 1 in phase or 1 out of phase via a reference. With the Johnson–Lindenstrauss lemma, Baraniuk et al. proposed an algorithmically-simple proof of the RIP for random SLM patterns [35]. By combining the concentration inequalities, they introduced the following theorem.
Theorem 1
([35]).If a matrix M R S × N meets the concentration inequalities and S ( c 0 · K · log ( N / K ) ) , then M meets the (K,ϵ)-RIP with probability 1 2 exp ( c 1 · S ) , where c 0 and c 1 , relying only on ϵ, are two constants.
Provided that M meets the (K, ϵ )-RIP, then x can be restored from y via CS recovery algorithms. Strategies for CS recovery include the l 0 norm, l 1 norm, and greedy algorithms. For the SPI recovery, we need first to address that:
α * = arg min α R N α l p such   that Θ α = y ,
where 0 p 1 and x l p denotes the l p norm of α R N × 1 . After that, by virtue of:
x * = Ψ · α * ,
we can restore the image x from the measurements y . In addition, Li demonstrated that total variation (TV) minimization is also suitable for the SPI recovery, as it can offer efficient reconstruction performance in terms of recovery quality and speed [36].

3. Single-Pixel Imaging with the Chaotic Pattern Array

In this section, we introduce the modulation and reconstruction mechanisms using an SPI device with the chaotic pattern array.

3.1. Overall Framework

For a traditional SPI device, a random SLM pattern is commonly used to modulate the image of a scene. Then the modulated light rays, i.e., the corresponding measurements, are integrated via a single-point detector. As we know, random SLM patterns are of extraordinary importance to modulate the image of the scene in an SPI device. However, random patterns are difficult to load on an SLM hardware, and they also require huge memory cost because we need to store every element of the random patterns in both the modulation and reconstruction side for exact image recovery. To address these shortcomings, we introduce a chaotic pattern array (CPA), which is a simple construction of the desired patterns for the SPI architecture.
The sketch of an SPI device with the CPA can be schematized as in Figure 2. The image of a scene under view is modulated by a CPA pre-loaded on the SLM plane, and then, the single-point detector collects the modulated light rays focused by a lens. After analog-to-digital conversion, the collected measurements are sent via a radio frequency (RF) circuit. By post-processing these measurements, the image of the scene can be exactly restored. The generation of the CPA is shown in the lower half of Figure 2. In the next subsection, we focus on the construction of the CPA such that it meets the RIP.

3.2. Construction of the Chaotic Pattern Array

3.2.1. Reviews for the Chaotic Bipolar Sequence

Chaos is a deterministic dynamical system with special properties. For example, a special case of the well-known Logistic chaotic system is:
z k + 1 = τ ( z k ) = 4 z k ( 1 z k ) , k = 0 , 1 , 2 , ,
where z k ( 0 , 1 ) and z 0 is a seed(It should be noted that there are some singularities (only one rational number is 0.5; the others are all irrational numbers, such as ( 2 ± 2 ) 4 ) for Equation (9). Although these singularities will lead to the chaotic system meeting the degradation phenomenon and yielding a periodic chaotic sequence, we can obtain a sequence that meets the actual needs if we do not use the rational number 0.5 as the initial seed in practical applications. This will also be confirmed in later experiments.). For the special case, the invariant measure of Logistic chaotic system is f * ( z ) d z = d z / ( π 1 z 2 ) . With a seed z 0 , a Logistic chaotic real-valued sequence { τ k ( z 0 ) } k = 0 , i.e., { z k } k = 0 , can be obtained via the recurrence of Equation (9).
We introduce a threshold function ( z ) defined as:
( z ) = + 1 if 0.5 z k < 1 1 if 0 < z k < 0.5 ,
with its complementary function:
¯ ( z ) = 1 ( z ) .
Based on the threshold function ( z ) , we can obtain a Logistic chaotic bipolar sequence { ( τ k ( z 0 ) ) } k = 0 , i.e., { ( z k ) } k = 0 . By virtue of the invariant measure of the Logistic system, the ensemble-average of { ( τ k ( z 0 ) ) } k = 0 can be attained by:
τ = [ 0 , 1 ] ( z ) · f * ( z ) d z = 1 2 .
Let Q b = Q 0 Q 1 Q b 1 be a binarization string, where Q k { 1 , 1 } ( k = 0 , 1 , , b 1 ) . Suppose that q b ( j ) = q 0 ( j ) q 1 ( j ) q b 1 ( j ) is the jth string, where q k ( j ) { 1 , 1 } . Based on the ensemble-average technique, Kohda et al. investigated the statistical properties of bipolar sequences generated by the ergodic chaotic system with some symmetric properties [38]. Since the Logistic chaotic bipolar sequence is a special case of their work, we have the following lemma.
Lemma 1.
The probability of q b ( j ) in an infinite Logistic chaotic binarization sequence { ( z k ) } k = 0 is:
j , P r o ( q b ( j ) ; ) = τ γ ( 1 τ ) b γ = 1 2 b ,
where γ is the number of 1 s in { q k ( j ) } k = 1 b 1 .
More details about this lemma can be found in [38,39,40,41]. This lemma indicates that { ( z k ) } k = 0 is a sequence of i.i.d. binarization random variables. In fact, the i.i.d. property constitutes a good modulation performance for our proposed patterns.

3.2.2. Construction and Performance Analysis

Using { ( z k ) } k = 0 , we can construct a chaotic pattern array that is arranged in a matrix M R S × N row by row, written as:
M = 1 S [ ( z 0 ) ( z 1 ) ( z N 1 ) ( z N ) ( z N + 1 ) ( z 2 N 1 ) ( z ( S 1 ) × N ) ( z ( S 1 ) × N + 1 ) ( z ( S × N 1 ) ) ] m 1 m 2 m S ,
where m k denotes the kth row vector of the CPA and 1 S is a scalar for normalization. It is worth noting that a seed z 0 determines a CPA, and different seeds will result in completely different CPAs. With a given z 0 and S, the CPA is constructed once and for all. Moreover, the time cost of generating a CPA is very low, mainly due to the following two aspects: (1) the binary sequence used to construct the CPA is generated by a quadratic iterative equation together with a hard threshold equation; hence, it does not require complex calculations; (2) the generated CPA only needs a simple row-by-row arrangement, so it can be implemented simply and quickly. Figure 3 gives four examples of chaotic pattern arrays R 20 × 50 with different seeds, where z 0 { 0.17 , 0.27 , 0.67 , 0.87 } . It can be seen that the generated CPA is highly non-symmetric. Moreover, as shown in Figure 3, the densities of the four generated CPAs (the ratio of the total number of ones to the total number of elements) are 0.5045, 0.4925, 0.5075, and 0.4865, respectively, i.e., the number of −1’s and the number of ones are almost equal. In other words, the validity of Lemma 1 is also verified from an experimental perspective.
Mathematically, M is a sub-Bernoulli random matrix, as { ( z k ) } k = 0 are independent realizations of ± 1 binarization elements. Achlioptas et al. [42] showed that a matrix with elements drawn independently from random variables satisfies the concentration inequalities. In fact, the concentration inequalities are useful and important tools in probability and analysis. Baraniuk et al. [35] used the concentration inequalities together with covering arguments to verify that random matrices have the RIP (see Theorem 1). Following their work, we can easily prove the RIP for our constructions. We now introduce the following lemma for CPAs.
Lemma 2.
Given a generated CPA M , for any vector v R N × 1 , the variable M · v l 2 2 is highly concentrated about v l 2 2 , i.e., we have:
μ ( 0 , 1 ) , P r o M · v l 2 2 v l 2 2 μ v l 2 2 2 exp ( S · c ( μ ) ) ,
where c ( μ ) = μ 2 4 μ 3 6 is a positive constant.
Thanks to the moment conditions, the proof of this lemma can be derived using Chernoff inequalities. We give out this proof procedure in Appendix B. Lemma 2 shows that the proposed CPA meets the concentration inequalities with reasonable bounds on the constants. Based on Theorem 1, the following theorem can be obtained.
Theorem 2.
With probability exceeding 1 2 exp ( c 2 · S ) , chaotic pattern array R S × N meets the (K,ϵ)-RIP if S ( c 3 · K · log ( N / K ) ) , where c 2 and c 3 are two constants.
Theorem 2 theoretically guarantees that the proposed Logistic CPA satisfies CS theory; thus, it can also be used as an SLM pattern for the SPI architecture. Besides the Logistic system, we can employ other chaotic systems (e.g., the Chebyshev system) to generate chaotic bipolar sequences and use the generated sequences to construct CPAs for the SPI device.

3.3. Mechanism of the Chaotic Pattern Array

As illustrated in the lower half of Figure 2, the chaotic pattern array generator consists of a real-valued generator and a bipolar generator. Once we input an initial seed for the real-valued generator, it outputs a Logistic chaotic real-valued sequence. After that, we input the real-valued sequence into the bipolar generator. This generator converts the real-valued sequence to a bipolar one through a comparator. Finally, we re-arrange the bipolar sequence into a CPA row by row. Each row of the CPA is a pattern, which is used to scan over the full image of a scene and then obtain one measurement. With one generated CPA, we can modulate the image of the scene, i.e., the generated CPA is used as a basis to generate illumination patterns to modulate the image.
With a given z 0 and S, we can construct a CPA once and for all. In other words, we can store the CPA by only storing the seed z 0 . Moreover, the CPA with ± 1 elements is convenient for any SLM hardware, such as the DMD. We give an example for which the CPA is loaded on a DMD. This hardware consists of thousands of tiny mirrors, which are arranged in a matrix R S × N with 768 S 1600 and 1024 N 2560 (The size mentioned here is only a classic value. In fact, it can be an arbitrary size.). The mirror pitch relying on the model ranged from 7–14 μm. We independently controlled each of these mirrors and set them into two states according to the CPA. That is, an element of one of the CPA corresponds to the on state and an element 1 to the off state. When the mirror is in the on state, the light is sent to the detector and then collected by this device. While the mirror is off state, the light is reflected in the opposite direction.
After the CPA is loaded on the SLM in an SPI device, we can obtain the measurements one by one. More specifically, using the predefined SLM pattern m 1 , we can obtain the measurement y 1 , then use m 2 to get y 2 , and after repeating the above step S times, we finally obtain S measurements y = { y 1 , y 2 , , y S } T R S × 1 . This completes the modulation procedure, and we obtain the corresponding measurements.
It is worth noting that in many applications, we hope to be able to switch the modulation mode flexibly. In these cases, random patterns are not available as they require a lot of memory. Actually, chaotic pattern arrays (CPAs) are especially suitable for these scenarios, because of the following four aspects: (1) each CPA in the CPAs can be easily loaded on SLM; (2) each CPA can modulate the image of the scene very well; (3) it can easily switch between different CPAs; (4) the CPAs will benefit memory cost automatically. There are two ways to generate CPAs. One is that we first used a seed to produce a long sequence and then filled a single CPA via the sequence row by row until the entire CPAs was filled. The other is that we first used different seeds to generate different CPAs and then integrated them into one complete CPAs. In what follows, we will give an interesting application of CPAs.
As mentioned before, an initial seed z 0 determines all the elements of the CPA. As distinctly illustrated in Figure 3, with a different seed, the generated CPA is completely different from the other one. In other words, if we want to change the modulation style of the SLM, we only need to change the seed to obtain the corresponding CPA. This property is quite suitable for encryption and privacy [43,44,45,46]. Considering this property, we can construct CPAs for the single-pixel camera. Such a device with CPAs is well suited for these applications that require encryption and privacy, such as medical care and wireless body area networks. Moreover, we only need to store these seeds; thus, the CPAs can be stored with a small storage cost.

4. Numerical Experiments

In this section, some numerical experiments are performed to investigate the performance of the CPA. We first used different recovery algorithms to demonstrate that the CPA is well-suited for CS theory. Then, the comparisons between our proposed construction and existing random patterns were carried out. In addition, recovery time (RecTime), mean squared error (MSE), and peak signal-to-noise ratio (PSNR) were used to assess these patterns. The MSE and PSNR are respectively defined as:
MSE = 1 H × D i = 1 H j = 1 D ( x i , j x i , j * ) 2 ,
and:
PSNR = 10 log 10 ( H 1 ) × ( D 1 ) MSE d B .
where x R H × D and x * denote the original image and the restored image, respectively. The software and hardware environments for the simulation were MATLAB 2017a and Intel(R) Core(TM) i5-7500 [email protected] GHz with RAM 16 GB memory, respectively.
In the simulation, six standard testing images R 256 × 256 including “House”, “Camera”, “Baboon”, “Mena”, “Starfish”, and “Straw”, which are illustrated in Figure 4a–f, were the original signals of interest. All testing data were sparse in the well-known discrete cosine transform. In addition, we constructed a CPA R S × 256 using { ( z k ) } k = 0 with z 0 = 0.17 . Note that we did not have to vectorize the testing images as we could process these images column by column.

4.1. CPA with Different Recovery Algorithms

Using eight generated CPAs R S × 256 , the image “House” was modulated to get measurements of size S × 256 at different sampling rates, ♮s, where S = [ 256 × ] and { 0.1 , 0.2 , 0.3 , 0.4 , 0.5 , 0.6 , 0.7 , 0.8 } . For example, if the size of the generated CPA was 26 × 256 , the sampling rate ♮ was 0.1. Based on these measurements R S × 256 , we then respectively restored the image “House” via the Newton smoothed l 0 (NS l 0 ) algorithm [47]. This algorithm is two orders of magnitude faster than linear programming methods, while providing similar reconstruction accuracy. Figure 5a–h illustrates the restored images corresponding to the sampling rates ranging from 0.1–0.8 with increments of 0.1. The corresponding MSEs, PSNRs, and recovery time for Figure 5a–h are shown in Table 2. The recovery errors in Figure 5 are very asymmetric between axes, because CS theory considers each pixel in an image to be equally “important” or equally “unimportant”. If ♮ was greater than 0.4, the MSE was dramatically decreased, and the PSNR was rapidly improved. As observed in Figure 5 and Table 2, we know that the CPA can be used to modulate images for the SPI architecture.
Moreover, we utilized different recovery algorithms (i.e., OMP, subspace pursuit (SP), gradient projection for sparse reconstruction (GPSR), NS l 0 , and TV minimization) to restore the image “House”. The OMP and the SP stand for orthogonal matching pursuit algorithm [48] and subspace pursuit algorithm [49], respectively. The former is a typical greedy algorithm for sparse approximation, but it takes a long time to process the image signal. The later has low computational complexity and high reconstruction precision, which is at the same order as that of linear programming methods. The GPSR is the gradient projection for sparse reconstruction algorithm [50], which is suitable for solving convex non-smooth unconstrained optimization problems, especially in large-scale settings. The TV minimization denotes the total variation minimization algorithm, which is especially suitable for image reconstruction. With the aforementioned recovery algorithms, we obtained the corresponding PSNRs and RecTimes, which are plotted in Figure 6a,b, respectively.
As illustrated in Figure 6, we know that the aforementioned algorithms can restore the image “House” from the measurements when we use the CPA to modulate the image “House”. More specifically, the NS l 0 and TV minimization algorithm performed better than the other methods while using less recovery time. The OMP algorithm took a long time to restore the image “House”, and it was proportional to the sampling rate. However, overall, it can be seen that the CPA was suitable for the SPI architecture with various CS recovery algorithms.

4.2. CPA vs. Different Modulation Patterns

In this part, three SLM modulation patterns R S × 256 , i.e., random Gaussian pattern (RGP), random Bernoulli pattern (RBP), and Hadamard pattern (In fact, the original Hadamard matrix cannot be directly used as SLM modulation patterns for two reasons. The first is that it is a square matrix, so it cannot achieve compressive imaging. Second, it does not meet the CS matrix property very well. In the simulation, we first generated an original Hadamard matrix R 256 × 256 and then randomly selected S rows and randomly confused its column arrangement to form an underdetermined Hadamard matrix R S × 256 , and finally, we used the generated matrix as the SLM modulation patterns.) (HMP), are considered to make a comparison. Compared to the CPA, these three patterns require a lot of memory for exact image reconstruction. More specifically, we can store the generated CPA by only storing the seed. However, the random patterns need to store each of their elements, i.e., the storage cost of RGP or RBP is O ( S × N ) . The HMP requires to remember its row selection and column arrangement.
The images “House”, “Camera”, “Baboon”, “Mena”, “Starfish”, and “Straw”, shown in Figure 4a–f, were modulated by the proposed CPA and the other three SLM patterns. Using the NS l 0 algorithm, we obtained the corresponding MSEs, PSNRs, and recovery time, which are reported in Table 3. In particular, we compared the reconstruction of “House” using the proposed CPA, RGP, RBP, and HMP, which is shown in Figure 7. It shows that the proposed CPA has almost the same performance while saving roughly 5–35% reconstruction time, compared with the popular modulation patterns. From Table 3 and Figure 7, it can be seen that the recovery algorithms were getting better in reconstructing with increased sampling rate. For all cases, these patterns offered similar MSE and PSNR at the same sampling rate. However, the CPA took less time than the other three SLM patterns. This is because the proposed CPA is a totally deterministic binarization construction. Moreover, the CPA administrating ± 1 as entries can accelerate image modulation and reconstruction. Overall, the proposed CPA performs better in most of the cases assessed.

4.3. Encryption Property of CPA

To figure out the effect of the seed z 0 , we constructed five CPAs using { ( z k ) } k = 0 with various seeds, where z 0 { 0.17 , 0.37 , 0.55 , 0.77 , 0.97 } , and then employed these CPAs to modulate the image “House”. Finally, the image “House” reconstruction was conducted via the NS l 0 algorithm. The resulting PSNRs and recovery time are respectively plotted in Figure 8a,b. As can be seen, the initial seed z 0 did not have a dramatic influence on the recovery performance.
We now focus on the encryption property of the CPA. As mentioned before, a seed z 0 determines a CPA, and different seeds will result in completely different CPAs. Thus, we can imagine the single-pixel camera with a CPA as an encryption system. In this scheme, we integrated compression and encryption into only one step using the CPA during the modulation procedure. More specifically, the image of a scene, x , was the original data, the measurements represented the encrypted information, and the CPA was the encrypted compression operator, where the seed z 0 denotes the security key (If the attacker accidentally finds a seed that creates the generalized inverse matrix of the original CPA, then cracking the encryption of the CPA is a breeze. However, the probability of the occurrence is extremely low, due to two reasons: (1) the original CPA is unknown; (2) the probability of a seed that can directly construct the generalized inverse matrix of the CPA is very low.). Note that the security key was only known by the sender and the authorized receiver. In fact, we can analyze the key space and the key sensitivity of the SPI with a CPA scheme. The key space T and the key sensitivity were determined by the seed z 0 . Specifically, the key space and the key sensitivity were 10 E 0 and 10 E 0 , respectively, where E 0 denotes the decimal digits of z 0 . Theoretically, E 0 can take any large number so that the key space T will be infinite and the key sensitivity will tend to zero. However, E 0 cannot be too large in practice because of the limited precision of electronic devices. For our experimental setup, the maximum of E 0 of the Logistic system was 15, resulting in T = 10 15 , and the initiation sensitivity was 10 15 .
For example, we considered the image “Lena” R 256 × 256 as the original image of a scene, which is depicted in Figure 9a. Then, we generated a CPA R 128 × 256 with security key z 0 = 0.17 to modulate and encrypt the image “Lena”. Using the NS l 0 algorithm, we restored the image “Lena” via CPAs R 128 × 256 with incorrect seeds (keys). Figure 9b,c illustrates the recovery images, which corresponds to the CPAs with z 0 = 0.171 and z 0 = 0.169 , respectively. The PSNRs of Figure 9b,c were 2.518 dB and 3.146 dB, respectively, which imply that the original image of the scene cannot be restored by the CPA with an incorrect key. Figure 9d shows the restored image with the right key. The corresponding MSE and PSNR were 0.058 and 30.11 dB, respectively, which indicates that the quality of the restored “Lena” is acceptable. Based on this advantage, the proposed CPAs are especially suitable for special CS applications, such as medical imaging and wireless body area networks.

5. Conclusions

Considering that random patterns are difficult to implement and require huge memory cost, we have proposed a chaotic pattern array for single-pixel imaging architecture in this study. The proposed pattern array was directly built by a chaotic bipolar sequence (elements 1 or one) based on a chaos system. With this simple construction, the proposed pattern array (CPA) was convenient for any SLM hardware, such as the DMD. Moreover, the CPA can save significant memory since it only needs to store the initial seed of chaotic sequence while the random patterns need to store each of their elements. The results obtained from numerical experiments showed that our chaotic pattern array performed similarly or superior to the conventional random ones. Meanwhile, it can save roughly 5–35% reconstruction time compared with other popular patterns. Moreover, our proposed pattern array is well-suited for those applications that require encryption and privacy.
In the future, we will apply the chaotic pattern array to adaptive basis scan and the hybrid method in a generalized single-pixel imaging device to further improve the performance. The main challenge is to investigate a fast and efficient prediction algorithm that can perfectly reconstruct the image of interest.

Author Contributions

Conceptualization, H.G. and S.X.; methodology, H.G., T.Z. and Z.Z.; validation, H.G. and Z.Z.; funding acquisition, H.G. and S.X.; writing, original draft: H.G.; writing, review and editing, S.X., J.L. and Y.G.

Funding

This work was supported by the National Natural Science Foundation of China under Grant 61372069, the SRF for ROCS, SEM under Grant JY0600090102, the “111” Project of China Grant B08038, and the Chongqing Municipal Education Commission under Grant KJ1501105.

Acknowledgments

We would like to thank the Editorial board and the anonymous reviewers.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. Lemma 3

In this Appendix A, we introduce a lemma for random matrices [42]. For all r [ 0 , 1 2 ) , it has:
E [ exp ( r · W 2 ) ] 1 ( 1 2 r ) , E [ W 4 ] 3 ,
where W = m k , v with v being any unit vector and m k being any row vector of a random matrix M .

Appendix B. Proof of Lemma 2

Proof. 
It is sufficient to prove Lemma 2 with the case v l 2 = 1 , as M is linear. Let v R N × 1 be a unit vector. Then, Equation (14) becomes:
P r o M · v l 2 2 1 μ 2 exp ( S · c ( μ ) ) .
Based on Chernoff’s inequality, for 0 < μ < 1 , we have:
P r o M · v l 2 2 1 μ ( E [ exp ( r M v l 2 2 S ) ] ) exp ( r ( 1 + μ ) S ) ( E [ exp ( r · W 2 ] ) S · exp ( r ( 1 + μ ) S ) ( 1 r + 3 r 2 2 ) S · exp ( r ( 1 μ ) S ) = exp ( c 4 ( μ ) · S ) ,
where the second last step is obtained by setting r = r o p t = 2 μ + 4 + 8 μ 5 μ 2 3 ( 1 μ ) , and in the last step, c 4 ( μ ) = r o p t ( 1 μ ) ( 1 r o p t + 3 r o p t 2 2 ) .
Using a similar inequality, we obtain:
P r o M · v l 2 2 1 + μ ( E [ exp ( r M v l 2 2 S ) ] ) exp ( r ( 1 + μ ) S ) ( E [ exp ( r · W 2 ] ) S · exp ( r ( 1 + μ ) S ) ( 1 1 2 r ) S · exp ( r ( 1 + μ ) S ) exp ( ( μ 2 4 μ 3 6 ) S ) = exp ( c 5 ( μ ) · S ) ,
where the second last step is got by setting r = μ 2 ( 1 + μ ) , and c 5 ( μ ) = μ 2 4 μ 3 6 . Note that c 5 ( μ ) is less than c 4 ( μ ) ; thus, we finally have:
P r o [ M · v l 2 2 1 μ ] 2 exp ( S · c ( μ ) ) ,
where c ( μ ) = c 5 ( μ ) = μ 2 4 μ 3 6 . This completes the proof.  □

References

  1. Candès, E.J.; Romberg, J.; Tao, T. Robust uncertainty principles: Exact signal reconstruction from highly incomplete frequency information. IEEE Trans. Inf. Theory 2006, 52, 489–509. [Google Scholar] [CrossRef]
  2. Peng, H.; Tian, Y.; Kurths, J.; Li, L.; Yang, Y.; Wang, D. Secure and energy-efficient data transmission system based on chaotic compressive sensing in body-to-body networks. IEEE Trans. Biomed. Circuits Syst. 2017, 11, 558–573. [Google Scholar] [CrossRef] [PubMed]
  3. Li, W.; Deng, W.; Yang, Q.; Migliore, M. A hybrid non-convex compressed sensing approach for array diagnosis using sparse promoting norm with perturbation technique. Electronics 2018, 7, 350. [Google Scholar] [CrossRef]
  4. Wan, L.T.; Kong, X.J.; Xia, F. Joint range-doppler-angle estimation for intelligent tracking of moving aerial targets. IEEE Internet Things J. 2018, 5, 1625–1636. [Google Scholar] [CrossRef]
  5. Gan, H.; Xiao, S.; Zhao, Y. A large class of chaotic sensing matrices for compressed sensing. Signal Process. 2018, 149, 193–203. [Google Scholar] [CrossRef]
  6. Chen, P.; Cao, Z.; Chen, Z.; Liu, L.; Feng, M. Compressed sensing-based DOA estimation with unknown mutual coupling effect. Electronics 2018, 7, 424. [Google Scholar] [CrossRef]
  7. Liu, L.; Zhang, X.; Chen, P. Compressed sensing-based DOA estimation with antenna phase errors. Electronics 2019, 8, 294. [Google Scholar] [CrossRef]
  8. Duarte, M.F.; Davenport, M.A.; Takhar, D.; Laska, J.N.; Sun, T.; Kelly, K.F.; Baraniuk, R.G. Single-pixel imaging via compressive sampling. IEEE Signal Process. Mag. 2008, 25, 83–91. [Google Scholar] [CrossRef] [Green Version]
  9. Rousset, F. Single-Pixel Imaging: Development and Applications of Adaptive Methods. Ph.D. Thesis, Université de Lyon, Politecnico di Milano, Lyon, France, 2017. [Google Scholar]
  10. Hadfield, R.H. Single-photon detectors for optical quantum information applications. Nat. Photonics 2009, 3, 696. [Google Scholar] [CrossRef]
  11. Becker, W. Fluorescence lifetime imaging-techniques and applications. J. Microsc. 2012, 247, 119–136. [Google Scholar] [CrossRef] [PubMed]
  12. Shin, J.; Bosworth, B.T.; Foster, M.A. Single-pixel imaging using compressed sensing and wavelength-dependent scattering. Opt. Lett. 2016, 41, 886–889. [Google Scholar] [CrossRef]
  13. Salvador-Balaguer, E.; Clemente, P.; Tajahuerce, E.; Pla, F.; Lancis, J. Full-color stereoscopic imaging with a single-pixel photodetector. J. Disp. Technol. 2016, 12, 417–422. [Google Scholar] [CrossRef]
  14. Watts, C.M.; Shrekenhamer, D.; Montoya, J.; Lipworth, G.; Hunt, J.; Sleasman, T.; Krishna, S.; Smith, D.R.; Padilla, W.J. Terahertz compressive imaging with metamaterial spatial light modulators. Nat. Photonics 2014, 8, 605. [Google Scholar] [CrossRef]
  15. Gibson, G.M.; Sun, B.; Edgar, M.P.; Phillips, D.B.; Hempler, N.; Maker, G.T.; Malcolm, G.P.; Padgett, M.J. Real-time imaging of methane gas leaks using a single-pixel camera. Opt. Express 2017, 25, 2998–3005. [Google Scholar] [CrossRef]
  16. Starling, D.J.; Storer, I.; Howland, G.A. Compressive sensing spectroscopy with a single pixel camera. Appl. Opt. 2016, 55, 5198–5202. [Google Scholar] [CrossRef]
  17. Baraniuk, R.G.; Goldstein, T.; Sankaranarayanan, A.C.; Studer, C.; Veeraraghavan, A.; Wakin, M.B. Compressive video sensing: Algorithms, architectures, and applications. IEEE Signal Process. Mag. 2017, 34, 52–66. [Google Scholar] [CrossRef]
  18. Zhang, Z.; Zhong, J. Three-dimensional single-pixel imaging with far fewer measurements than effective image pixels. Opt. Lett. 2016, 41, 2497–2500. [Google Scholar] [CrossRef]
  19. Radwell, N.; Mitchell, K.J.; Gibson, G.M.; Edgar, M.P.; Bowman, R.; Padgett, M.J. Single-pixel infrared and visible microscope. Optica 2014, 1, 285–289. [Google Scholar] [CrossRef] [Green Version]
  20. Lochocki, B.; Gambín, A.; Manzanera, S.; Irles, E.; Tajahuerce, E.; Lancis, J.; Artal, P. Single pixel camera ophthalmoscope. Optica 2016, 3, 1056–1059. [Google Scholar] [CrossRef]
  21. Rousset, F.; Ducros, N.; Farina, A.; Valentini, G.; D’Andrea, C.; Peyrin, F. Adaptive basis scan by wavelet prediction for single-pixel imaging. IEEE Trans. Comput. Imaging 2017, 3, 36–46. [Google Scholar] [CrossRef]
  22. Huang, G.; Jiang, H.; Matthews, K.; Wilford, P. Lensless imaging by compressive sensing. In Proceedings of the 2013 20th IEEE International Conference on Image Processing (ICIP), Melbourne, VIC, Australia, 15–18 September 2013; pp. 2101–2105. [Google Scholar]
  23. Clemente, P.; Durán, V.; Tajahuerce, E.; Andrés, P.; Climent, V.; Lancis, J. Compressive holography with a single-pixel detector. Opt. Lett. 2013, 38, 2524–2527. [Google Scholar] [CrossRef] [Green Version]
  24. Rousset, F.; Peyrin, F.; Ducros, N. A semi nonnegative matrix factorization technique for pattern generalization in single-pixel imaging. IEEE Trans. Comput. Imaging 2018, 4, 284–294. [Google Scholar] [CrossRef]
  25. Cai, Z.; Zhao, H.; Jia, M.; Wang, G.; Shen, J. An improved Hadamard measurement matrix based on Walsh code for compressive sensing. In Proceedings of the 2013 9th International Conference on Information, Communications Signal Processing, Tainan, Taiwan, 10–13 December 2013; pp. 1–4. [Google Scholar]
  26. Pastuszczak, A.; Szczygieł, B.; Mikołajczyk, M.; Kotyński, R. Efficient adaptation of complex-valued noiselet sensing matrices for compressed single-pixel imaging. Appl. Opt. 2016, 55, 5141–5148. [Google Scholar] [CrossRef]
  27. Gupta, P.S.; Choi, G.S. Programmable compressed sensing using simple deterministic sensing matrices. In Optoelectronic Imaging and Multimedia Technology V; International Society for Optics and Photonics: San Diego, CA, USA, 2018; Volume 10817, p. 108170C. [Google Scholar]
  28. Jia, T.; Chen, D.; Wang, J.; Xu, D. Single-pixel color imaging method with a compressive sensing measurement matrix. Appl. Sci. 2018, 8, 1293. [Google Scholar] [CrossRef]
  29. Donoho, D.L.; Huo, X. Uncertainty principles and ideal atomic decomposition. IEEE Trans. Inf. Theory 2001, 47, 2845–2862. [Google Scholar] [CrossRef] [Green Version]
  30. Donoho, D.L. Compressed sensing. IEEE Trans. Inf. Theory 2006, 52, 1289–1306. [Google Scholar] [CrossRef]
  31. Strohmer, T.; Heath, R.W., Jr. Grassmannian frames with applications to coding and communication. Appl. Comput. Harmon. Anal. 2003, 14, 257–275. [Google Scholar] [CrossRef] [Green Version]
  32. Boufounos, P.; Kutyniok, G.; Rauhut, H. Sparse recovery from combined fusion frame measurements. IEEE Trans. Inf. Theory 2011, 57, 3864–3876. [Google Scholar] [CrossRef]
  33. Geršgorin, S. Über die abgrenzung der eigenwerte einer matrix. Izv. Akad. Nauk SSSR Ser. Mat. 1931, 1, 749–755. [Google Scholar]
  34. Duarte, M.F.; Eldar, Y.C. Structured compressed sensing: From theory to applications. IEEE Trans. Signal Process. 2011, 59, 4053–4085. [Google Scholar] [CrossRef]
  35. Baraniuk, R.; Davenport, M.; De Vore, R.; Wakin, M. A simple proof of the restricted isometry property for random matrices. Constr. Approx. 2008, 28, 253–263. [Google Scholar] [CrossRef]
  36. Li, C. An Efficient Algorithm for Total Variation Regularization with Applications to the Single Pixel Camera and Compressive Sensing. Ph.D. Thesis, Rice University, Houston, TX, USA, 2010. [Google Scholar]
  37. Takhar, D.; Laska, J.N.; Wakin, M.B.; Duarte, M.F.; Baron, D.; Sarvotham, S.; Kelly, K.F.; Baraniuk, R.G. A new compressive imaging camera architecture using optical-domain compression. In Computational Imaging IV; International Society for Optics and Photonics: San Diego, CA, USA, 2006; Volume 6065, p. 606509. [Google Scholar]
  38. Kohda, T.; Tsuneda, A. Statistics of chaotic binary sequences. IEEE Trans. Inf. Theory 1997, 43, 104–112. [Google Scholar] [CrossRef]
  39. Kohda, T. Stream cipher systems using a chaotic sequence of i.i.d. random variables. Regul. Pept. 2001, 1240, 74–87. [Google Scholar]
  40. Gan, H.; Xiao, S.; Zhao, Y.; Xue, X. Construction of efficient and structural chaotic sensing matrix for compressive sensing. Signal Process. Image Commun. 2018, 68, 129–137. [Google Scholar] [CrossRef]
  41. Gan, H.; Xiao, S.; Zhang, T.; Liu, F. Bipolar measurement matrix using chaotic sequence. Commun. Nonlinear Sci. Numer. Simul. 2019, 72, 139–151. [Google Scholar] [CrossRef]
  42. Achlioptas, D. Database-friendly random projections. In Proceedings of the ACM Twentieth ACM Sigmod-Sigact-Sigart Symposium on Principles of Database Systems, Santa Barbara, CA, USA, 21–24 May 2001; pp. 274–281. [Google Scholar]
  43. Zhang, L.; Li, C.; Wong, K.; Shu, S.; Chen, G. Cryptanalyzing a chaos-based image encryption algorithm using alternate structure. J. Syst. Softw. 2012, 85, 2077–2085. [Google Scholar] [CrossRef]
  44. Zhang, L.; Wong, K.; Zhang, Y.; Zhou, J. Bi-level protected compressive sampling. IEEE Trans. Multimed. 2016, 18, 1720–1732. [Google Scholar] [CrossRef]
  45. Xie, D.; Peng, H.; Li, L.; Yang, Y. An efficient privacy-preserving scheme for secure network coding based on compressed sensing. AEU-Int. J. Electron. Commun. 2017, 79, 33–42. [Google Scholar] [CrossRef]
  46. Zhang, Y.; Xiang, Y.; Zhang, L. Concluding remarks and future research. In Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT; Springer: Berlin/Heidelberg, Germany, 2019; pp. 113–115. [Google Scholar]
  47. Mohimani, G.H.; Babaie-Zadeh, M.; Jutten, C. Fast sparse representation based on smoothed l0 norm. In Proceedings of the International Conference on Independent Component Analysis and Signal Separation, London, UK, 9–12 September 2007; Springer: Berlin/Heidelberg, Germany, 2007; pp. 389–396. [Google Scholar]
  48. Tropp, J.A.; Gilbert, A.C. Signal recovery from random measurements via orthogonal matching pursuit. IEEE Trans. Inf. Theory 2007, 53, 4655–4666. [Google Scholar] [CrossRef]
  49. Dai, W.; Milenkovic, O. Subspace pursuit for compressive sensing signal reconstruction. IEEE Trans. Inf. Theory 2009, 55, 2230–2249. [Google Scholar] [CrossRef]
  50. Figueiredo, M.A.; Nowak, R.D.; Wright, S.J. Gradient projection for sparse reconstruction: Application to compressed sensing and other inverse problems. IEEE J. Sel. Top. Signal Process. 2007, 1, 586–597. [Google Scholar] [CrossRef]
Figure 1. Optical setup of a single-pixel imaging (SPI) device with a transmissive spatial light modulator (SLM).
Figure 1. Optical setup of a single-pixel imaging (SPI) device with a transmissive spatial light modulator (SLM).
Electronics 08 00536 g001
Figure 2. Sketch of an SPI device with the chaotic pattern array, where the left top framework is adapted from [37]. In general, one generated chaotic pattern array (CPA) is used as a basis to generate illumination patterns to modulate the image. Moreover, the CPAs are suitable for us to flexibly select or switch CPA in certain compressive sampling (CS) applications. For example, if we want to change a CPA for some reason, then just choose another CPA from the CPAs.
Figure 2. Sketch of an SPI device with the chaotic pattern array, where the left top framework is adapted from [37]. In general, one generated chaotic pattern array (CPA) is used as a basis to generate illumination patterns to modulate the image. Moreover, the CPAs are suitable for us to flexibly select or switch CPA in certain compressive sampling (CS) applications. For example, if we want to change a CPA for some reason, then just choose another CPA from the CPAs.
Electronics 08 00536 g002
Figure 3. Examples of chaotic pattern arrays R 20 × 50 with different seeds: (a) z 0 = 0.17 , the density is 0.5045; (b) z 0 = 0.27 , the density is 0.4925; (c) z 0 = 0.67 , the density is 0.5075; (d) z 0 = 0.87 , the density is 0.4865.
Figure 3. Examples of chaotic pattern arrays R 20 × 50 with different seeds: (a) z 0 = 0.17 , the density is 0.5045; (b) z 0 = 0.27 , the density is 0.4925; (c) z 0 = 0.67 , the density is 0.5075; (d) z 0 = 0.87 , the density is 0.4865.
Electronics 08 00536 g003
Figure 4. Testing images: (a) “House”, (b) “Camera”, (c) “Baboon”, (d) “Mena”, (e) “Starfish”, (f) “Straw”.
Figure 4. Testing images: (a) “House”, (b) “Camera”, (c) “Baboon”, (d) “Mena”, (e) “Starfish”, (f) “Straw”.
Electronics 08 00536 g004
Figure 5. The recovery images: (ah) correspond to the sampling rate from 0.1–0.8.
Figure 5. The recovery images: (ah) correspond to the sampling rate from 0.1–0.8.
Electronics 08 00536 g005
Figure 6. Comparison curves for reconstructing “House” using CPA with different recovery algorithms: (a) PSNR (dB); (b) time cost (s).
Figure 6. Comparison curves for reconstructing “House” using CPA with different recovery algorithms: (a) PSNR (dB); (b) time cost (s).
Electronics 08 00536 g006
Figure 7. Comparison curves for reconstructing “House” using the proposed CPA, random Gaussian pattern (RGP), random Bernoulli pattern (RBP), and Hadamard pattern (HMP): (a) PSNR (dB); (b) time cost (s).
Figure 7. Comparison curves for reconstructing “House” using the proposed CPA, random Gaussian pattern (RGP), random Bernoulli pattern (RBP), and Hadamard pattern (HMP): (a) PSNR (dB); (b) time cost (s).
Electronics 08 00536 g007
Figure 8. Comparison curves for reconstructing “House” using CPAs with different seeds: (a) PSNR (dB); (b) time cost (s).
Figure 8. Comparison curves for reconstructing “House” using CPAs with different seeds: (a) PSNR (dB); (b) time cost (s).
Electronics 08 00536 g008
Figure 9. An example for the encryption property of the CPA: (a) the original image “Lena”, (b) recovery via the CPA with wrong key z 0 = 0.171 ; (c) recovery via the CPA with wrong key z 0 = 0.169 ; (d) recovery via the CPA with right key z 0 = 0.17 .
Figure 9. An example for the encryption property of the CPA: (a) the original image “Lena”, (b) recovery via the CPA with wrong key z 0 = 0.171 ; (c) recovery via the CPA with wrong key z 0 = 0.169 ; (d) recovery via the CPA with right key z 0 = 0.17 .
Electronics 08 00536 g009
Table 1. Comparison of the main characteristics of the three strategies.
Table 1. Comparison of the main characteristics of the three strategies.
ApproachSampling PatternsImage ReconstructionRequired Measurements
Compressive samplingSensing matrix l 0 / l 1 norm minimizationFew
Basis scanBasisInverse transformLarge
Adaptive basis scanBasisInverse transformFew
Table 2. The recovery results for reconstructing “House”. RecTime, recovery time.
Table 2. The recovery results for reconstructing “House”. RecTime, recovery time.
Sampling Rate ♮
0.10.20.30.40.50.60.70.8
MSE0.9230.6890.2150.0540.0380.0270.0200.014
PSNR (dB)4.8526.76217.8927.9931.3234.2036.9239.82
RecTime (s)0.0770.1960.2150.2760.2870.3230.3500.412
Table 3. Comparison results of recovery using various modulation patterns.
Table 3. Comparison results of recovery using various modulation patterns.
Modulation PatternSampling RateIndexImage
“House”“Camera”“Baboon”“Mena”“Starfish”“Straw”
CPA0.2MSE0.6890.6430.7140.5140.5540.731
PSNR (dB)6.7628.2617.27210.519.3545.083
RecTime (s)0.1960.2780.1900.2070.2280.237
0.4MSE0.0540.0830.1040.0660.1100.126
PSNR (dB)27.9924.7823.2927.7922.9819.89
RecTime (s)0.2510.3290.2870.3540.2820.362
0.6MSE0.0270.0490.0750.0390.0630.087
PSNR (dB)34.2029.4126.0132.4027.8123.08
RecTime (s)0.3230.4170.3780.3840.3910.415
0.8MSE0.0140.0240.0470.0190.0300.051
PSNR (dB)39.8235.7729.9438.2934.0027.64
RecTime (s)0.4120.4650.4070.5400.4310.526
RGP0.2MSE0.7690.6110.5320.6890.6430.808
PSNR (dB)6.1018.7299.4627.5198.2824.162
RecTime (s)0.2140.2520.2240.2130.2250.257
0.4MSE0.0780.1070.1060.0670.1140.128
PSNR (dB)25.4923.0323.1027.5622.7119.79
RecTime (s)0.2860.3420.3110.2960.3260.373
0.6MSE0.0280.0490.0750.0380.0640.091
PSNR (dB)34.0929.1326.0132.5427.5822.85
RecTime (s)0.3600.3970.3810.3620.3960.446
0.8MSE0.0140.0230.0460.0190.0310.052
PSNR (dB)39.6335.8530.1438.1233.9327.16
RecTime (s)0.4320.4690.4030.3960.4610.513
RBP0.2MSE0.7590.4760.7950.7390.7050.761
PSNR (dB)5.77110.636.3027.3047.2924.995
RecTime (s)0.2850.2520.2350.2470.2480.278
0.4MSE0.0570.0840.1070.0630.1120.128
PSNR (dB)27.4524.6423.0727.9922.8019.78
RecTime (s)0.3040.3340.3020.2840.3200.364
0.6MSE0.0270.0470.0750.0390.0640.089
PSNR (dB)34.2629.8026.0732.3327.6522.86
RecTime (s)0.3460.4130.3710.3560.3730.449
0.8MSE0.0130.0230.0470.0190.0300.050
PSNR (dB)40.0935.9729.8538.2334.0327.84
RecTime (s)0.4160.4900.4300.4390.4830.505
HMP0.2MSE0.4840.4340.8781.1200.8490.558
PSNR (dB)8.96410.904.9533.0905.2307.046
RecTime (s)0.2640.3200.3570.3740.3410.402
0.4MSE0.0540.0840.1050.0660.1090.126
PSNR (dB)28.0024.2923.1527.5022.9019.86
RecTime (s)0.3630.4050.4570.3600.3560.424
0.6MSE0.0270.0470.0750.0390.0640.088
PSNR (dB)34.2529.8025.9732.4527.3822.99
RecTime (s)0.4530.4130.4620.4190.4620.542
0.8MSE0.0140.0230.0470.0190.0310.050
PSNR (dB)38.8035.6029.7738.1733.7727.58
RecTime (s)0.5850.5240.6230.4390.5340.559

Share and Cite

MDPI and ACS Style

Gan, H.; Xiao, S.; Zhang, T.; Zhang, Z.; Li, J.; Gao, Y. Chaotic Pattern Array for Single-Pixel Imaging. Electronics 2019, 8, 536. https://doi.org/10.3390/electronics8050536

AMA Style

Gan H, Xiao S, Zhang T, Zhang Z, Li J, Gao Y. Chaotic Pattern Array for Single-Pixel Imaging. Electronics. 2019; 8(5):536. https://doi.org/10.3390/electronics8050536

Chicago/Turabian Style

Gan, Hongping, Song Xiao, Tao Zhang, Zhimin Zhang, Jie Li, and Yang Gao. 2019. "Chaotic Pattern Array for Single-Pixel Imaging" Electronics 8, no. 5: 536. https://doi.org/10.3390/electronics8050536

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop