Optical encryption scheme based on spread spectrum ghost imaging

被引:1
|
作者
Liu, Jin-Fen [1 ,2 ]
Dong, Yue [1 ]
Wang, Le [1 ]
Zhao, Sheng-Mei [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Inst Signal Proc & Transmiss, Nanjing, Peoples R China
[2] NanJing Tech Univ Pujiang Inst, Nanjing 211222, Peoples R China
基金
中国国家自然科学基金;
关键词
optical encryption; ghost imaging; spread spectrum; correlated imaging; QUANTUM CRYPTOGRAPHY;
D O I
10.1088/1674-1056/acbf27
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
An optical encryption (OE) scheme based on the spread spectrum ghost imaging (SSGI), named as SSGI-OE, is proposed to obtain a high security with a smaller key. In the scheme, the randomly selected row number of a Hadamard matrix of order N is used as the secure key, and shared with the authorized user, Bob, through a private channel. Each corresponding row vector of the order-N Hadamard matrix is then used as the direct sequence code to modulate a speckle pattern for the ghost imaging system, and an image is encrypted with the help of the SSGI. The measurement results from the bucket detector, named as ciphertext, are then transmitted to Bob through a public channel. The illuminating speckle patterns are also shared with Bob by the public channel. With the correct secure key, Bob could reconstruct the image with the aid of the SSGI system, whereas the unauthorized user, Eve, could not obtain any useful information of the encrypted image. The numerical simulations and experimental results show that the proposed scheme is feasible with a higher security and a smaller key. For the 32 x 32 pixels image, the number of bits sent from Alice to Bob by using SSGI-OE (M = 1024, N = 2048) scheme is only 0.0107 times over a computational ghost imaging optical encryption scheme. When the eavesdropping ratio (ER) is less than 40%, the eavesdropper cannot acquire any information of the encrypted image. The extreme circumstance for the proposed SSGI-OE scheme is also discussed, where the eavesdropper begins to extract the information when ER is up to 15%.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Optical encryption scheme based on ghost imaging with disordered speckles
    张玉东
    赵生妹
    Chinese Physics B, 2017, 26 (05) : 164 - 168
  • [2] Optical encryption scheme based on ghost imaging with disordered speckles
    Zhang, Yu-dong
    Zhao, Sheng-mei
    CHINESE PHYSICS B, 2017, 26 (05)
  • [3] Camouflaged Optical Encryption Based on Compressive Ghost Imaging
    Kang Yi
    Zhang Leihong
    Ye Hualong
    Zhao Mantong
    Kanwal, Saima
    Zhang Dawei
    OPTICS AND LASERS IN ENGINEERING, 2020, 134
  • [4] Optical encryption scheme with double secret keys based on computational ghost imaging
    Cao F.
    Zhao S.
    Guangxue Xuebao/Acta Optica Sinica, 2017, 37 (01):
  • [5] Optical encryption based on ghost imaging and public key cryptography
    Kang Yi
    Zhang Leihong
    Zhang Dawei
    OPTICS AND LASERS IN ENGINEERING, 2018, 111 : 58 - 64
  • [6] Optical Encryption Scheme with Multiple Users Based on Computational Ghost Imaging and Orthogonal Modulation
    Yuan, Sheng
    Liu, Xuemei
    Zhou, Xin
    Li, Zhongyang
    JOURNAL OF THE OPTICAL SOCIETY OF KOREA, 2016, 20 (04) : 476 - 480
  • [7] Optical encryption with selective computational ghost imaging
    Zafari, Mohammad
    Kheradmand, Reza
    Ahmadi-Kandjani, Sohrab
    JOURNAL OF OPTICS, 2014, 16 (10)
  • [8] Research on Camouflaged Encryption Scheme Based on Hadamard Matrix and Ghost Imaging Algorithm
    Zhang Leihong
    Wang Yang
    Ye Hualong
    Xu Runchu
    Zhang Dawei
    CURRENT OPTICS AND PHOTONICS, 2021, 5 (06) : 686 - 698
  • [9] Secure optical encryption based on ghost imaging with fractional Fourier transform
    Zhao, Shengmei
    Yu, Xiaodi
    Wang, Le
    Li, Wei
    Zheng, Baoyu
    OPTICS COMMUNICATIONS, 2020, 474
  • [10] Optical encryption based on the algorithm of compressive ghost imaging and phase-shifting digital holography
    Zhang Leihong
    Xiong Rui
    Zhang Dawei
    Chen Jian
    UKRAINIAN JOURNAL OF PHYSICAL OPTICS, 2018, 19 (03) : 179 - 190