Information encryption based on the customized data container under the framework of computational ghost imaging

被引:62
作者
Liansheng, Sui [1 ,2 ]
Cong, Du [1 ]
Minjie, Xu [1 ]
Ailing, Tian [3 ]
Anand, Asundi [4 ]
机构
[1] Xian Univ Technol, Sch Comp Sci & Engn, Xian 70048, Shaanxi, Peoples R China
[2] Shaanxi Key Lab Network Comp & Secur Technol, Xian 710048, Shaanxi, Peoples R China
[3] Xian Technol Univ, Shaanxi Prov Key Lab Thin Film Technol & Opt Test, Xian 710048, Shaanxi, Peoples R China
[4] Nanyang Technol Univ, Sch Mech & Aerosp Engn, Singapore 639798, Singapore
关键词
PHASE RETRIEVAL ALGORITHM; OPTICAL ENCRYPTION; QR CODE; AUTHENTICATION; DIFFRACTION; TRANSFORM; TRANSPORT; SCHEME; ATTACK; MASK;
D O I
10.1364/OE.27.016493
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
In this paper, a novel information encryption scheme has been proposed based on the customized data container, where the primary information can be recovered completely from the ciphertext encrypted with computational ghost imaging. From two aspects, the proposed scheme solves the serious issues caused by the inherent linearity and mechanism of computational ghost imaging. First, the primary information to be encrypted is transformed into the bits of information, which is used to control the formation of the customized data container. Then, the exclusive-OR (XOR) operation is performed on it with a randomly generated data container, and the XOR encoding result is scrambled based on the random sequence engendered with the logistic map so that the linearity of the cryptosystem is destroyed. Second, instead of using random phase-only masks, a number of phase masks retrieved from 2D patterns derived from the rows of the designed Hadamard matrix are used to record the measured intensities. The redundancy between these phase masks is low, which can reduce the number of the required phase-only masks greatly. Meanwhile, the conditions of the logistic map are considered as the secret keys, which can enhance the security level greatly due to their high sensitivity to tiny variation. The validity and feasibility of the proposed method have been demonstrated with a set of numerical simulations. (C) 2019 Optical Society of America under the terms of the OSA Open Access Publishing Agreement
引用
收藏
页码:16493 / 16506
页数:14
相关论文
共 58 条
[1]   Securing multiple information using wavelet transform and Yang-Gu mixture amplitude-phase retrieval algorithm [J].
Abuturab, Muhammad Rafiq .
OPTICS AND LASERS IN ENGINEERING, 2019, 118 :42-51
[2]   Asymmetric multiple information cryptosystem based on chaotic spiral phase mask and random spectrum decomposition [J].
Abuturab, Muhammad Rafiq .
OPTICS AND LASER TECHNOLOGY, 2018, 98 :298-308
[3]   Optical image compression and encryption methods [J].
Alfalou, A. ;
Brosseau, C. .
ADVANCES IN OPTICS AND PHOTONICS, 2009, 1 (03) :589-636
[4]   Recent Advances in Optical Image Processing [J].
Alfalou, Ayman ;
Brosseau, Christian .
PROGRESS IN OPTICS, VOL 60, 2015, 60 :119-262
[5]   Experimental analysis of a joint free space cryptosystem [J].
Barrera Ramirez, John Fredy ;
Jaramillo Osorio, Alexis ;
Velez Zea, Alejandro ;
Torroba, Roberto .
OPTICS AND LASERS IN ENGINEERING, 2016, 83 :126-130
[6]   Optical hyperspectral image encryption based on improved Chirikov mapping and gyrator transform [J].
Chen, Hang ;
Tanougast, Camel ;
Liu, Zhengjun ;
Blondel, Walter ;
Hao, Boya .
OPTICS AND LASERS IN ENGINEERING, 2018, 107 :62-70
[7]   Gyrator transform based double random phase encoding with sparse representation for information authentication [J].
Chen, Jun-xin ;
Zhu, Zhi-liang ;
Fu, Chong ;
Yu, Hai ;
Zhang, Li-bo .
OPTICS AND LASER TECHNOLOGY, 2015, 70 :50-58
[8]   Optical image conversion and encryption by diffraction, phase retrieval algorithm and incoherent superposition [J].
Chen, Linfei ;
Chang, Guojun ;
He, Bingyu ;
Mao, Haidan ;
Zhao, Daomu .
OPTICS AND LASERS IN ENGINEERING, 2017, 88 :221-232
[9]   Correlated-Photon Secured Imaging by Iterative Phase Retrieval Using Axially-Varying Distances [J].
Chen, Wen .
IEEE PHOTONICS TECHNOLOGY LETTERS, 2016, 28 (18) :1932-1935
[10]   Grayscale object authentication based on ghost imaging using binary signals [J].
Chen, Wen ;
Chen, Xudong .
EPL, 2015, 110 (04)