An encryption method based on computational ghost imaging with chaotic mapping and DNA encoding

被引:10
作者
Yang, Zhongzhuo [1 ]
Yuan, Sheng [2 ]
Li, Jinxi [1 ]
Bai, Xing [1 ]
Yu, Zhan [1 ]
Zhou, Xin [1 ]
机构
[1] Sichuan Univ, Dept Optoelect Sci & Technol, Chengdu 610065, Peoples R China
[2] North China Univ Water Resources & Elect Power, Dept Informat & Engn, Zhengzhou 450011, Henan, Peoples R China
基金
中国国家自然科学基金;
关键词
computational ghost imaging; chaotic mapping; DNA encoding; compressed sensing;
D O I
10.1088/2040-8986/ac6597
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
An encryption method based on computational ghost imaging (CGI) with chaotic mapping and DNA encoding is proposed. To reduce the amount of keys in the CGI-based encryption system, the chaotic mapping algorithm is used to generate the random sequence as the speckle measurement matrix of CGI system. The measurement data of the bucket detector is subjected to block and DNA operations, which introduce the nonlinear characteristics in the encryption process. The problem of linear vulnerability of the encryption system has been greatly improved. Numerical simulation results show that, compared with the traditional CGI-based encryption method, the proposed method greatly reduces the amount of keys, increases the key space and enhances the security of the system.
引用
收藏
页数:10
相关论文
共 24 条
  • [1] Two-photon coincidence imaging with a classical source
    Bennink, RS
    Bentley, SJ
    Boyd, RW
    [J]. PHYSICAL REVIEW LETTERS, 2002, 89 (11)
  • [2] Ghost imaging with a single detector
    Bromberg, Yaron
    Katz, Ori
    Silberberg, Yaron
    [J]. PHYSICAL REVIEW A, 2009, 79 (05):
  • [3] Ghost imaging using labyrinth-like phase modulation patterns for high-efficiency and high-security optical encryption
    Chen, Wen
    Chen, Xudong
    [J]. EPL, 2015, 109 (01)
  • [4] Ghost imaging for three-dimensional optical security
    Chen, Wen
    Chen, Xudong
    [J]. APPLIED PHYSICS LETTERS, 2013, 103 (22)
  • [5] Optical encryption based on computational ghost imaging
    Clemente, Pere
    Duran, Vicente
    Torres-Company, Victor
    Tajahuerce, Enrique
    Lancis, Jesus
    [J]. OPTICS LETTERS, 2010, 35 (14) : 2391 - 2393
  • [6] Stable and secure image transmission based on temporal ghost imaging
    Huang, Xianwei
    Bai, Yanfeng
    Fu, Xiaquan
    [J]. JOURNAL OF OPTICS, 2019, 21 (05)
  • [7] Known-Plaintext Attack and Ciphertext-Only Attack for Encrypted Single-Pixel Imaging
    Jiao, Shuming
    Gao, Yang
    Lei, Ting
    Xie, Zhenwei
    Yuan, Xiaocong
    [J]. IEEE ACCESS, 2019, 7 : 119557 - 119565
  • [9] Quadratic polar coordinate transform technique for the demodulation of circular carrier interferogram
    Li, Jin-Peng
    Song, Le
    Chen, Lei
    Li, Bo
    Han, Zhi-Gang
    Gu, Chen-Feng
    [J]. OPTICS COMMUNICATIONS, 2015, 336 : 166 - 172
  • [10] Compressive optical image encryption with two-step-only quadrature phase-shifting digital holography
    Li, Jun
    Li, Hongbing
    Li, Jiaosheng
    Pan, Yangyang
    Li, Rong
    [J]. OPTICS COMMUNICATIONS, 2015, 344 : 166 - 171