Optical encryption for multi-user based on computational ghost imaging with Hadamard modulation

被引:5
作者
Yuan, Sheng [1 ]
Han, Yakun [1 ]
Liu, Xuemei [1 ]
Li, Zhongyang [1 ]
Bing, Pibin [1 ]
Zhou, Xin [2 ]
机构
[1] North China Univ Water Resources & Elect Power, Dept Elect Engn, Zhengzhou 450046, Peoples R China
[2] Sichuan Univ, Dept Opto Elect Sci & Technol, Chengdu 610065, Peoples R China
来源
OPTIK | 2023年 / 273卷
基金
中国国家自然科学基金;
关键词
Computational ghost imaging; Optical encryption; Hadamard matrix; CHOSEN-PLAINTEXT ATTACK; CIPHERTEXT-ONLY ATTACK; PHASE; VULNERABILITY; SCHEME;
D O I
10.1016/j.ijleo.2022.170500
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
In multi-user applications, one of the thorny problems for a cryptographic algorithm is how to distribute the keys and reduce the amount of transmitted data without crosstalk and security risks. Based on Hadamard modulated Computational Ghost Imaging (CGI), we propose an optical encryption scheme for multi-user, in which a common ciphertext is public for all users and one user owns a unique key to index the row sequence of Hadamard basis for decryption. Therefore, the channel resources are saved because the ciphertext does not need to be transmitted. Compared with the conventional CGI-based random intensity modulation encryption, the scheme not only reduces the amount of transmitted key data but also enhances the quality of decrypted images, which benefits from the order of Hadamard basis rather than its distribution being taken as the key. Theoretical analysis and numerical simulations are conducted to prove the feasibility and property of the scheme.
引用
收藏
页数:12
相关论文
共 50 条
  • [21] Optical encryption based on ghost imaging and public key cryptography
    Kang Yi
    Zhang Leihong
    Zhang Dawei
    OPTICS AND LASERS IN ENGINEERING, 2018, 111 : 58 - 64
  • [22] Optical image hiding based on computational ghost imaging
    Wang, Le
    Zhao, Shengmei
    Cheng, Weiwen
    Gong, Longyan
    Chen, Hanwu
    OPTICS COMMUNICATIONS, 2016, 366 : 314 - 320
  • [23] Real single-channel color image encryption method based on computational ghost imaging
    Bai, Xing
    Li, Jinxi
    Yu, Zhan
    Yang, Zhongzhuo
    Wang, Yujie
    Chen, Xingyu
    Yuan, Sheng
    Zhou, Xin
    LASER PHYSICS LETTERS, 2022, 19 (12)
  • [24] Algorithm-Dependent Computational Ghost Encryption and Imaging
    Xiong, Jiahao
    Zheng, Peixia
    Gao, Zihan
    Liu, Hong-Chao
    PHYSICAL REVIEW APPLIED, 2022, 18 (03)
  • [25] An encryption method based on computational ghost imaging with chaotic mapping and DNA encoding
    Yang, Zhongzhuo
    Yuan, Sheng
    Li, Jinxi
    Bai, Xing
    Yu, Zhan
    Zhou, Xin
    JOURNAL OF OPTICS, 2022, 24 (06)
  • [26] Secure optical encryption based on ghost imaging with fractional Fourier transform
    Zhao, Shengmei
    Yu, Xiaodi
    Wang, Le
    Li, Wei
    Zheng, Baoyu
    OPTICS COMMUNICATIONS, 2020, 474
  • [27] Computational ghost image encryption method based on sparse speckles
    Li, Xinjia
    Liu, Yang
    Sun, Mingze
    Yu, Zhan
    Li, Yue
    Zhao, Dan
    Zhang, Jialin
    Zhou, Xin
    PHYSICA SCRIPTA, 2024, 99 (02)
  • [28] Imaging a periodic moving/state-changed object with Hadamard-based computational ghost imaging
    Guo, Hui
    Wang, Le
    Zhao, Sheng-Mei
    CHINESE PHYSICS B, 2022, 31 (08)
  • [29] Hadamard Ghost Imaging Based on Compressed Sensing Reconstruction Algorithm
    Li Chang
    Gao Chao
    Shao Jiaqi
    Wang Xiaoqian
    Yao Zhihai
    LASER & OPTOELECTRONICS PROGRESS, 2021, 58 (10)
  • [30] Multi-images encryption and watermarking with small number of keys via computational ghost imaging
    Guan, Qingtian
    Deng, Huaxia
    Liang, Wenbo
    Zhong, Xiang
    Ma, Mengchao
    OPTICS AND LASER TECHNOLOGY, 2024, 168