Information Encryption in Ghost Imaging With Customized Data Container and XOR Operation

被引:40
作者
Qin, Yi [1 ]
Zhang, Yingying [2 ]
机构
[1] Nanyang Normal Univ, Coll Mech & Elect Engn, Nanyang 473061, Peoples R China
[2] Nanyang Normal Univ, Coll Phys & Elect Engn, Nanyang 473061, Peoples R China
来源
IEEE PHOTONICS JOURNAL | 2017年 / 9卷 / 02期
基金
中国国家自然科学基金;
关键词
Optical encryption; ghost imaging; exclusive-OR (XOR) operation; OPTICAL ENCRYPTION; QR CODE; AUTHENTICATION; COMPRESSION; RETRIEVAL;
D O I
10.1109/JPHOT.2017.2690314
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The conventional ghost-imaging-based encryption (GIE) scheme has low-quality decrypted images and unsatisfied security. In this paper, we propose to cope with these issues using customized data container and exclusive-OR (XOR) operation. The proposal constitutes two security levels. The first level includes transforming the primary information into a binary signal (i.e., bit stream) under the ASCII standard and XORing it with the key bit stream. In the second step, the result in the first level is codified into an elaborate data container, which is then sent to the GIE scheme. The proposed approach not only possesses high security but ensures lossless recovery of the primary information as well. Its validity and feasibility have been supported by a series of numerical results.
引用
收藏
页数:8
相关论文
共 50 条
  • [41] Research on multiple-image encryption mechanism based on Radon transform and ghost imaging
    Zhang Leihong
    Wang Yang
    Zhang Dawei
    OPTICS COMMUNICATIONS, 2022, 504
  • [42] Multiple-Image Encryption Mechanism Based on Ghost Imaging and Public Key Cryptography
    Zhang, Leihong
    Yuan, Xiao
    Wang, Kaimin
    Zhang, Dawei
    IEEE PHOTONICS JOURNAL, 2019, 11 (04):
  • [43] Robust binarized data analysis with computational ghost imaging
    Liu, Jiang-Tao
    Zhang, Yuan
    Cai, Xunming
    Huang, Jinbao
    Luo, Kun
    Li, Hongxu
    Zhang, Dejian
    Wu, Zhenhua
    OPTIK, 2023, 272
  • [44] Ghost Imaging by a Proportional Parameter to Filter Bucket Data
    Tao, Min
    Gong, Xiaobin
    Guan, Jian
    Song, Junfeng
    Song, Zhixin
    Li, Xueyan
    Guo, Shuxu
    Chen, Jian
    Yu, Siyao
    Gao, Fengli
    APPLIED SCIENCES-BASEL, 2021, 11 (01): : 1 - 9
  • [45] Using Ghost Imaging Technique to Retrieve Information of Occluded Object
    Meng Chen
    Wang Xiaoqian
    Gao Chao
    Gou Lidan
    Chen Peng
    Yao Zhihai
    LASER & OPTOELECTRONICS PROGRESS, 2021, 58 (10)
  • [46] Optical encryption in spatially-incoherent light using two LC SLMs for both information input and encryption element imaging
    Bondareva, Alyona P.
    Cheremkhin, Pavel A.
    Evtikhiev, Nikolay N.
    Krasnov, Vitaly V.
    Rodin, Vladislav G.
    Starikov, Sergey N.
    ELECTRO-OPTICAL AND INFRARED SYSTEMS: TECHNOLOGY AND APPLICATIONS XI, 2014, 9249
  • [47] Research on Multiple-image Encryption Scheme Based on Fourier Transform and Ghost Imaging Algorithm
    Zhang Leihong
    Yuan Xiao
    Zhang Dawei
    Chen Jian
    CURRENT OPTICS AND PHOTONICS, 2018, 2 (04) : 315 - 323
  • [48] Optical image encryption based on singular value decomposition ghost imaging and fractional chaotic mapping
    Liu, Qin
    Liang, Ye
    Liu, Fu
    Yang, Xiulun
    Meng, Xiangfeng
    OPTICS AND LASERS IN ENGINEERING, 2025, 186
  • [49] Multi-image encryption based on QR code and singular value decomposition ghost imaging
    Miao Wang
    Xiulun Yang
    Xiangfeng Meng
    Yurong Wang
    Yongkai Yin
    Guoyan Dong
    Journal of Optics, 2022, 51 : 841 - 850
  • [50] Camouflaged encryption mechanism based on sparse decomposition of principal component orthogonal basis and ghost imaging
    Zhang Leihong
    Wang Yang
    Ye Hualong
    Xu Runchu
    Kang Yi
    Zhang Zhisheng
    Zhang Dawei
    Wang Kaimin
    OPTICAL ENGINEERING, 2021, 60 (01)