Information Encryption in Ghost Imaging With Customized Data Container and XOR Operation

被引:40
作者
Qin, Yi [1 ]
Zhang, Yingying [2 ]
机构
[1] Nanyang Normal Univ, Coll Mech & Elect Engn, Nanyang 473061, Peoples R China
[2] Nanyang Normal Univ, Coll Phys & Elect Engn, Nanyang 473061, Peoples R China
来源
IEEE PHOTONICS JOURNAL | 2017年 / 9卷 / 02期
基金
中国国家自然科学基金;
关键词
Optical encryption; ghost imaging; exclusive-OR (XOR) operation; OPTICAL ENCRYPTION; QR CODE; AUTHENTICATION; COMPRESSION; RETRIEVAL;
D O I
10.1109/JPHOT.2017.2690314
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The conventional ghost-imaging-based encryption (GIE) scheme has low-quality decrypted images and unsatisfied security. In this paper, we propose to cope with these issues using customized data container and exclusive-OR (XOR) operation. The proposal constitutes two security levels. The first level includes transforming the primary information into a binary signal (i.e., bit stream) under the ASCII standard and XORing it with the key bit stream. In the second step, the result in the first level is codified into an elaborate data container, which is then sent to the GIE scheme. The proposed approach not only possesses high security but ensures lossless recovery of the primary information as well. Its validity and feasibility have been supported by a series of numerical results.
引用
收藏
页数:8
相关论文
共 50 条
  • [31] Secure patients data transmission using XOR ciphering encryption and ECG steganography
    Patel, Shaheen S.
    Sankpal, S. V.
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 1311 - 1315
  • [32] Real single-channel color image encryption method based on computational ghost imaging
    Bai, Xing
    Li, Jinxi
    Yu, Zhan
    Yang, Zhongzhuo
    Wang, Yujie
    Chen, Xingyu
    Yuan, Sheng
    Zhou, Xin
    LASER PHYSICS LETTERS, 2022, 19 (12)
  • [33] Hybrid cryptosystem based on plaintext related computational ghost imaging encryption and elliptic curve algorithm
    Tao, Yuanchun
    Yang, Xiulun
    Meng, Xiangfeng
    Wang, Yurong
    Yin, Yongkai
    Dong, Guoyan
    JOURNAL OF OPTICS, 2020, 22 (06)
  • [34] Research on Double Encryption of Ghost Imaging by SegNet Deep Neural Network
    Ye, Hualong
    Guo, Daidou
    IEEE PHOTONICS TECHNOLOGY LETTERS, 2024, 36 (10) : 669 - 672
  • [35] One-to-many optical information encryption transmission method based on temporal ghost imaging and code division multiple access
    Kang, Yi
    Zhang, Leihong
    Ye, Hualong
    Zhao, Mantong
    Kanwal, Saima
    Bai, Chunyan
    Zhang, Dawei
    PHOTONICS RESEARCH, 2019, 7 (12) : 1370 - 1380
  • [36] Research on Camouflaged Encryption Scheme Based on Hadamard Matrix and Ghost Imaging Algorithm
    Zhang Leihong
    Wang Yang
    Ye Hualong
    Xu Runchu
    Zhang Dawei
    CURRENT OPTICS AND PHOTONICS, 2021, 5 (06) : 686 - 698
  • [37] Multiple-Image Encryption Based on Compressive Ghost Imaging and Coordinate Sampling
    Li, Xianye
    Meng, Xiangfeng
    Yang, Xiulun
    Yin, Yongkai
    Wang, Yurong
    Peng, Xiang
    He, Wenqi
    Dong, Guoyan
    Chen, Hongyi
    IEEE PHOTONICS JOURNAL, 2016, 8 (04):
  • [38] A crosstalk-free multiple-image encryption scheme based on computational ghost imaging with binarized detection
    Bai, Xing
    Yuan, Sheng
    Yu, Zhan
    Wang, Yujie
    Chen, Xingyu
    Liu, Yang
    Sun, Mingze
    Li, Xinjia
    Zhou, Xin
    LASER PHYSICS, 2024, 34 (08)
  • [39] Optical image encryption via high-quality computational ghost imaging using iterative phase retrieval
    Sui Liansheng
    Cheng Yin
    Li Bing
    Tian Ailing
    Asundi, Anand Krishna
    LASER PHYSICS LETTERS, 2018, 15 (07)
  • [40] Study on the key technology of optical encryption based on compressive ghost imaging with double random-phase encoding
    Zhang, Leihong
    Pan, Zilan
    Liang, Dong
    Ma, Xiuhua
    Zhang, Dawei
    OPTICAL ENGINEERING, 2015, 54 (12)