High performance optical encryption based on computational ghost imaging with QR code and compressive sensing technique

被引:121
|
作者
Zhao, Shengmei [1 ,2 ]
Wang, Le [1 ]
Liang, Wenqiang [1 ]
Cheng, Weiwen [1 ]
Gong, Longyan [1 ,3 ]
机构
[1] Nanjing Univ Posts & Telecommun, Inst Signal Proc & Transmiss, Nanjing 210003, Jiangsu, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Minist Educ, Key Lab Broadband Wireless Commun & Sensor Networ, Nanjing 210003, Jiangsu, Peoples R China
[3] Nanjing Univ Posts & Telecommun, Dept Appl Phys, Nanjing 210003, Jiangsu, Peoples R China
基金
中国国家自然科学基金; 高等学校博士学科点专项科研基金;
关键词
Optical encryption; Computational ghost imaging; Compressive sensing; QR code; TURBULENCE; QUALITY; PHASE;
D O I
10.1016/j.optcom.2015.04.063
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
In this paper, we propose a high performance optical encryption (OE) scheme based on computational ghost imaging (GI) with QR code and compressive sensing (CS) technique, named QR-CGI-OE scheme. N random phase screens, generated by Alice, is a secret key and be shared with its authorized user, Bob. The information is first encoded by Alice with QR code, and the QR-coded image is then encrypted with the aid of computational ghost imaging optical system. Here, measurement results from the GI optical system's bucket detector are the encrypted information and be transmitted to Bob. With the key, Bob decrypts the encrypted information to obtain the QR-coded image with GI and CS techniques, and further recovers the information by QR decoding. The experimental and numerical simulated results show that the authorized users can recover completely the original image, whereas the eavesdroppers can not acquire any information about the image even the eavesdropping ratio (ER) is up to 60% at the given measurement times. For the proposed scheme, the number of bits sent from Alice to Bob are reduced considerably and the robustness is enhanced significantly. Meantime, the measurement times in GI system is reduced and the quality of the reconstructed QR-coded image is improved. (C) 2015 Elsevier B.V. All rights reserved.
引用
收藏
页码:90 / 95
页数:6
相关论文
共 50 条
  • [31] Study of an encryption system based on compressive temporal ghost imaging with a chaotic laser
    Kang Yi
    Zhang Leihong
    Zhang Dawei
    OPTICS COMMUNICATIONS, 2018, 426 : 535 - 540
  • [32] Multiple-Image Encryption Based on Compressive Ghost Imaging and Coordinate Sampling
    Li, Xianye
    Meng, Xiangfeng
    Yang, Xiulun
    Yin, Yongkai
    Wang, Yurong
    Peng, Xiang
    He, Wenqi
    Dong, Guoyan
    Chen, Hongyi
    IEEE PHOTONICS JOURNAL, 2016, 8 (04):
  • [33] Optical encryption scheme based on spread spectrum ghost imaging
    Liu, Jin-Fen
    Dong, Yue
    Wang, Le
    Zhao, Sheng-Mei
    CHINESE PHYSICS B, 2023, 32 (07)
  • [34] Optical encryption based on ghost imaging and public key cryptography
    Kang Yi
    Zhang Leihong
    Zhang Dawei
    OPTICS AND LASERS IN ENGINEERING, 2018, 111 : 58 - 64
  • [35] High-performance compression and double cryptography based on compressive ghost imaging with the fast Fourier transform
    Zhang Leihong
    Pan Zilan
    Wu Luying
    Ma Xiuhua
    OPTICS AND LASERS IN ENGINEERING, 2016, 86 : 329 - 337
  • [36] Optical image encryption via photon-counting imaging and compressive sensing based ptychography
    Rawat, Nitin
    Hwang, In-Chul
    Shi, Yishi
    Lee, Byung-Geun
    JOURNAL OF OPTICS, 2015, 17 (06)
  • [37] Optical image encryption via high-quality computational ghost imaging using iterative phase retrieval
    Sui Liansheng
    Cheng Yin
    Li Bing
    Tian Ailing
    Asundi, Anand Krishna
    LASER PHYSICS LETTERS, 2018, 15 (07)
  • [38] Real single-channel color image encryption method based on computational ghost imaging
    Bai, Xing
    Li, Jinxi
    Yu, Zhan
    Yang, Zhongzhuo
    Wang, Yujie
    Chen, Xingyu
    Yuan, Sheng
    Zhou, Xin
    LASER PHYSICS LETTERS, 2022, 19 (12)
  • [39] Encryption of QR code and grayscale image in interference-based scheme with high quality retrieval and silhouette problem removal
    Qin, Yi
    Wang, Hongjuan
    Wang, Zhipeng
    Gong, Qiong
    Wang, Danchen
    OPTICS AND LASERS IN ENGINEERING, 2016, 84 : 62 - 73
  • [40] Hybrid cryptosystem based on plaintext related computational ghost imaging encryption and elliptic curve algorithm
    Tao, Yuanchun
    Yang, Xiulun
    Meng, Xiangfeng
    Wang, Yurong
    Yin, Yongkai
    Dong, Guoyan
    JOURNAL OF OPTICS, 2020, 22 (06)