Optical encryption scheme based on spread spectrum ghost imaging

被引:1
|
作者
Liu, Jin-Fen [1 ,2 ]
Dong, Yue [1 ]
Wang, Le [1 ]
Zhao, Sheng-Mei [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Inst Signal Proc & Transmiss, Nanjing, Peoples R China
[2] NanJing Tech Univ Pujiang Inst, Nanjing 211222, Peoples R China
基金
中国国家自然科学基金;
关键词
optical encryption; ghost imaging; spread spectrum; correlated imaging; QUANTUM CRYPTOGRAPHY;
D O I
10.1088/1674-1056/acbf27
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
An optical encryption (OE) scheme based on the spread spectrum ghost imaging (SSGI), named as SSGI-OE, is proposed to obtain a high security with a smaller key. In the scheme, the randomly selected row number of a Hadamard matrix of order N is used as the secure key, and shared with the authorized user, Bob, through a private channel. Each corresponding row vector of the order-N Hadamard matrix is then used as the direct sequence code to modulate a speckle pattern for the ghost imaging system, and an image is encrypted with the help of the SSGI. The measurement results from the bucket detector, named as ciphertext, are then transmitted to Bob through a public channel. The illuminating speckle patterns are also shared with Bob by the public channel. With the correct secure key, Bob could reconstruct the image with the aid of the SSGI system, whereas the unauthorized user, Eve, could not obtain any useful information of the encrypted image. The numerical simulations and experimental results show that the proposed scheme is feasible with a higher security and a smaller key. For the 32 x 32 pixels image, the number of bits sent from Alice to Bob by using SSGI-OE (M = 1024, N = 2048) scheme is only 0.0107 times over a computational ghost imaging optical encryption scheme. When the eavesdropping ratio (ER) is less than 40%, the eavesdropper cannot acquire any information of the encrypted image. The extreme circumstance for the proposed SSGI-OE scheme is also discussed, where the eavesdropper begins to extract the information when ER is up to 15%.
引用
收藏
页数:7
相关论文
共 50 条
  • [41] Secure optical fiber transmission via ghost imaging
    Rizvi, Saad
    Cao, Jie
    Hao, Qun
    2019 22ND IEEE INTERNATIONAL MULTI TOPIC CONFERENCE (INMIC), 2019, : 330 - 332
  • [42] Optical secure image verification system based on ghost imaging
    Wu, Jingjing
    Haobogedewude, Buyinggaridi
    Liu, Zhengjun
    Liu, Shutian
    OPTICS COMMUNICATIONS, 2017, 399 : 98 - 103
  • [43] Spread-Spectrum Based a New Secured Robust ImageWatermarking Scheme
    De, Supriyo
    Maity, Soumalya
    Bhaumik, Jaydeb
    Pal, Pabitra
    Giri, Debasis
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON NETWORK SECURITY AND BLOCKCHAIN TECHNOLOGY, ICNSBT 2024, 2025, 1158 : 73 - 87
  • [44] Ghost Imaging Using Optical Correlations
    Moreau, Paul-Antoine
    Toninelli, Ermes
    Gregory, Thomas
    Padgett, Miles J.
    LASER & PHOTONICS REVIEWS, 2018, 12 (01)
  • [45] Camouflaged encryption mechanism based on sparse decomposition of principal component orthogonal basis and ghost imaging
    Zhang Leihong
    Wang Yang
    Ye Hualong
    Xu Runchu
    Kang Yi
    Zhang Zhisheng
    Zhang Dawei
    Wang Kaimin
    OPTICAL ENGINEERING, 2021, 60 (01)
  • [46] Real single-channel color image encryption method based on computational ghost imaging
    Bai, Xing
    Li, Jinxi
    Yu, Zhan
    Yang, Zhongzhuo
    Wang, Yujie
    Chen, Xingyu
    Yuan, Sheng
    Zhou, Xin
    LASER PHYSICS LETTERS, 2022, 19 (12)
  • [47] Multiple-image encryption based on Toeplitz matrix ghost imaging and elliptic curve cryptography
    Zhixiang, Bian
    Leihong, Zhang
    Hualong, Ye
    Kaimin, Wang
    Dawei, Zhang
    LASER PHYSICS LETTERS, 2021, 18 (05)
  • [48] Multi-image encryption based on QR code and singular value decomposition ghost imaging
    Wang, Miao
    Yang, Xiulun
    Meng, Xiangfeng
    Wang, Yurong
    Yin, Yongkai
    Dong, Guoyan
    JOURNAL OF OPTICS-INDIA, 2022, 51 (04): : 841 - 850
  • [49] Hybrid cryptosystem based on plaintext related computational ghost imaging encryption and elliptic curve algorithm
    Tao, Yuanchun
    Yang, Xiulun
    Meng, Xiangfeng
    Wang, Yurong
    Yin, Yongkai
    Dong, Guoyan
    JOURNAL OF OPTICS, 2020, 22 (06)
  • [50] An enhanced multiplicative spread spectrum watermarking scheme
    Zhong, Jidong
    Huang, Shangteng
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2006, 16 (12) : 1491 - 1506