Information Encryption in Ghost Imaging With Customized Data Container and XOR Operation

被引:40
|
作者
Qin, Yi [1 ]
Zhang, Yingying [2 ]
机构
[1] Nanyang Normal Univ, Coll Mech & Elect Engn, Nanyang 473061, Peoples R China
[2] Nanyang Normal Univ, Coll Phys & Elect Engn, Nanyang 473061, Peoples R China
来源
IEEE PHOTONICS JOURNAL | 2017年 / 9卷 / 02期
基金
中国国家自然科学基金;
关键词
Optical encryption; ghost imaging; exclusive-OR (XOR) operation; OPTICAL ENCRYPTION; QR CODE; AUTHENTICATION; COMPRESSION; RETRIEVAL;
D O I
10.1109/JPHOT.2017.2690314
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The conventional ghost-imaging-based encryption (GIE) scheme has low-quality decrypted images and unsatisfied security. In this paper, we propose to cope with these issues using customized data container and exclusive-OR (XOR) operation. The proposal constitutes two security levels. The first level includes transforming the primary information into a binary signal (i.e., bit stream) under the ASCII standard and XORing it with the key bit stream. In the second step, the result in the first level is codified into an elaborate data container, which is then sent to the GIE scheme. The proposed approach not only possesses high security but ensures lossless recovery of the primary information as well. Its validity and feasibility have been supported by a series of numerical results.
引用
收藏
页数:8
相关论文
共 50 条
  • [21] High performance optical encryption based on computational ghost imaging with QR code and compressive sensing technique
    Zhao, Shengmei
    Wang, Le
    Liang, Wenqiang
    Cheng, Weiwen
    Gong, Longyan
    OPTICS COMMUNICATIONS, 2015, 353 : 90 - 95
  • [22] Study of an encryption system based on compressive temporal ghost imaging with a chaotic laser
    Kang Yi
    Zhang Leihong
    Zhang Dawei
    OPTICS COMMUNICATIONS, 2018, 426 : 535 - 540
  • [23] On Ghost Imaging Studies for Information Optical Imaging
    Hu, Chenyu
    Han, Shensheng
    APPLIED SCIENCES-BASEL, 2022, 12 (21):
  • [24] Optical encryption scheme with double secret keys based on computational ghost imaging
    Cao F.
    Zhao S.
    Guangxue Xuebao/Acta Optica Sinica, 2017, 37 (01):
  • [25] Optical encryption for multi-user based on computational ghost imaging with Hadamard modulation
    Yuan, Sheng
    Han, Yakun
    Liu, Xuemei
    Li, Zhongyang
    Bing, Pibin
    Zhou, Xin
    OPTIK, 2023, 273
  • [26] Optical image encryption and authentication scheme with computational ghost imaging
    Guo, Zhe
    Chen, Su-Hua
    Zhou, Ling
    Gong, Li-Hua
    APPLIED MATHEMATICAL MODELLING, 2024, 131 : 49 - 66
  • [27] Optical image authentication and encryption scheme with computational ghost imaging
    Hu, Jie-Long
    Chen, Ming-Xuan
    Zhou, Shun
    Zhou, Nan-Run
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2024, 361 (17):
  • [28] Forgery attack on optical encryption based on computational ghost imaging
    Yuan, Sheng
    Wang, Lanjie
    Liu, Xuemei
    Zhou, Xin
    OPTICS LETTERS, 2020, 45 (14) : 3913 - 3916
  • [29] Optical image encryption with high efficiency based on variable-distance ghost imaging
    Du, Jiahui
    Xiong, Yi
    Wu, Chuhan
    Quan, Chenggen
    OPTIK, 2022, 252
  • [30] Information Security Scheme Based on Computational Temporal Ghost Imaging
    Jiang, Shan
    Wang, Yurong
    Long, Tao
    Meng, Xiangfeng
    Yang, Xiulun
    Shu, Rong
    Sun, Baoqing
    SCIENTIFIC REPORTS, 2017, 7