Optical encryption scheme based on spread spectrum ghost imaging

被引:1
|
作者
Liu, Jin-Fen [1 ,2 ]
Dong, Yue [1 ]
Wang, Le [1 ]
Zhao, Sheng-Mei [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Inst Signal Proc & Transmiss, Nanjing, Peoples R China
[2] NanJing Tech Univ Pujiang Inst, Nanjing 211222, Peoples R China
基金
中国国家自然科学基金;
关键词
optical encryption; ghost imaging; spread spectrum; correlated imaging; QUANTUM CRYPTOGRAPHY;
D O I
10.1088/1674-1056/acbf27
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
An optical encryption (OE) scheme based on the spread spectrum ghost imaging (SSGI), named as SSGI-OE, is proposed to obtain a high security with a smaller key. In the scheme, the randomly selected row number of a Hadamard matrix of order N is used as the secure key, and shared with the authorized user, Bob, through a private channel. Each corresponding row vector of the order-N Hadamard matrix is then used as the direct sequence code to modulate a speckle pattern for the ghost imaging system, and an image is encrypted with the help of the SSGI. The measurement results from the bucket detector, named as ciphertext, are then transmitted to Bob through a public channel. The illuminating speckle patterns are also shared with Bob by the public channel. With the correct secure key, Bob could reconstruct the image with the aid of the SSGI system, whereas the unauthorized user, Eve, could not obtain any useful information of the encrypted image. The numerical simulations and experimental results show that the proposed scheme is feasible with a higher security and a smaller key. For the 32 x 32 pixels image, the number of bits sent from Alice to Bob by using SSGI-OE (M = 1024, N = 2048) scheme is only 0.0107 times over a computational ghost imaging optical encryption scheme. When the eavesdropping ratio (ER) is less than 40%, the eavesdropper cannot acquire any information of the encrypted image. The extreme circumstance for the proposed SSGI-OE scheme is also discussed, where the eavesdropper begins to extract the information when ER is up to 15%.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] Research on multi-image encryption method based on image scaling and ghost imaging
    Qiu, Guoqiao
    Zhang, Yiqiang
    Zhang, Leihong
    LASER PHYSICS, 2024, 34 (03)
  • [22] Mask-based denoising scheme for ghost imaging
    Zhou, Yang
    Guo, Shu-Xu
    Zhong, Fei
    Zhang, Tian
    CHINESE PHYSICS B, 2019, 28 (08)
  • [23] High-efficiency optical image authentication scheme based on ghost imaging and block processing
    Du, J.
    Xiong, Y.
    Quan, C.
    OPTICS COMMUNICATIONS, 2020, 460
  • [24] Mask-based denoising scheme for ghost imaging
    周阳
    郭树旭
    钟菲
    张天
    Chinese Physics B, 2019, 28 (08) : 152 - 159
  • [25] Study on the key technology of optical encryption based on compressive ghost imaging with double random-phase encoding
    Zhang, Leihong
    Pan, Zilan
    Liang, Dong
    Ma, Xiuhua
    Zhang, Dawei
    OPTICAL ENGINEERING, 2015, 54 (12)
  • [26] Information Security Scheme Based on Computational Temporal Ghost Imaging
    Jiang, Shan
    Wang, Yurong
    Long, Tao
    Meng, Xiangfeng
    Yang, Xiulun
    Shu, Rong
    Sun, Baoqing
    SCIENTIFIC REPORTS, 2017, 7
  • [27] Optical color-image encryption in the diffractive-imaging scheme
    Qin, Yi
    Wang, Zhipeng
    Pan, Qunna
    Gong, Qiong
    OPTICS AND LASERS IN ENGINEERING, 2016, 77 : 191 - 202
  • [28] Information Encryption in Ghost Imaging With Customized Data Container and XOR Operation
    Qin, Yi
    Zhang, Yingying
    IEEE PHOTONICS JOURNAL, 2017, 9 (02):
  • [29] Study of an encryption system based on compressive temporal ghost imaging with a chaotic laser
    Kang Yi
    Zhang Leihong
    Zhang Dawei
    OPTICS COMMUNICATIONS, 2018, 426 : 535 - 540
  • [30] Multiple-Image Encryption Based on Compressive Ghost Imaging and Coordinate Sampling
    Li, Xianye
    Meng, Xiangfeng
    Yang, Xiulun
    Yin, Yongkai
    Wang, Yurong
    Peng, Xiang
    He, Wenqi
    Dong, Guoyan
    Chen, Hongyi
    IEEE PHOTONICS JOURNAL, 2016, 8 (04):