Optical Encryption Scheme with Multiple Users Based on Computational Ghost Imaging and Orthogonal Modulation

被引:5
作者
Yuan, Sheng [1 ]
Liu, Xuemei [1 ]
Zhou, Xin [2 ]
Li, Zhongyang [1 ]
机构
[1] North China Univ Water Resources & Elect Power, Dept Informat Engn, Zhengzhou 450011, Peoples R China
[2] Sichuan Univ, Dept Optoelect Sci & Technol, Chengdu 610065, Peoples R China
基金
中国国家自然科学基金;
关键词
Optical encryption; Computational ghost imaging; Orthogonal modulation; RANDOM-PHASE KEYS; PLAINTEXT ATTACK; SECURITY; AUTHENTICATION; TRANSFORMS; SYSTEMS; IMAGES; DOMAIN; CODE;
D O I
10.3807/JOSK.2016.20.4.476
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
For the application of multiusers, the arrangement and distribution of the keys is a much concerning problem in a cryptosystem. In this paper, we propose an optical encryption scheme with multiple users based on computational ghost imaging (CGI) and orthogonal modulation. The CGI encrypts the secret image into an intensity vector rather than a complex-valued matrix. This will bring convenience for post-processing and transmission of the ciphertext. The orthogonal vectors are taken as the address codes to distinguish users and avoid cross-talk. Only the decryption key and the address code owned by an authorized user are matched, the secret image belonging to him/her could be extracted from the ciphertext. Therefore, there are two security levels in the encryption scheme. The feasibility and property are verified by numerical simulations.
引用
收藏
页码:476 / 480
页数:5
相关论文
共 38 条
[1]   Optical image compression and encryption methods [J].
Alfalou, A. ;
Brosseau, C. .
ADVANCES IN OPTICS AND PHOTONICS, 2009, 1 (03) :589-636
[2]   Two-photon coincidence imaging with a classical source [J].
Bennink, RS ;
Bentley, SJ ;
Boyd, RW .
PHYSICAL REVIEW LETTERS, 2002, 89 (11)
[3]   Ghost imaging with a single detector [J].
Bromberg, Yaron ;
Katz, Ori ;
Silberberg, Yaron .
PHYSICAL REVIEW A, 2009, 79 (05)
[4]   Vulnerability to chosen-cyphertext attacks of optical encryption schemes based on double random phase keys [J].
Carnicer, A ;
Montes-Usategui, M ;
Arcos, S ;
Juvells, I .
OPTICS LETTERS, 2005, 30 (13) :1644-1646
[5]   Grayscale object authentication based on ghost imaging using binary signals [J].
Chen, Wen ;
Chen, Xudong .
EPL, 2015, 110 (04)
[6]   Ghost imaging using labyrinth-like phase modulation patterns for high-efficiency and high-security optical encryption [J].
Chen, Wen ;
Chen, Xudong .
EPL, 2015, 109 (01)
[7]   Advances in optical security systems [J].
Chen, Wen ;
Javidi, Bahram ;
Chen, Xudong .
ADVANCES IN OPTICS AND PHOTONICS, 2014, 6 (02) :120-155
[8]   Ghost imaging for three-dimensional optical security [J].
Chen, Wen ;
Chen, Xudong .
APPLIED PHYSICS LETTERS, 2013, 103 (22)
[9]   Single-pixel digital ghost holography [J].
Clemente, Pere ;
Duran, Vicente ;
Tajahuerce, Enrique ;
Torres-Company, Victor ;
Lancis, Jesus .
PHYSICAL REVIEW A, 2012, 86 (04)
[10]   Optical encryption based on computational ghost imaging [J].
Clemente, Pere ;
Duran, Vicente ;
Torres-Company, Victor ;
Tajahuerce, Enrique ;
Lancis, Jesus .
OPTICS LETTERS, 2010, 35 (14) :2391-2393