Optical encryption scheme based on spread spectrum ghost imaging

被引:1
|
作者
Liu, Jin-Fen [1 ,2 ]
Dong, Yue [1 ]
Wang, Le [1 ]
Zhao, Sheng-Mei [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Inst Signal Proc & Transmiss, Nanjing, Peoples R China
[2] NanJing Tech Univ Pujiang Inst, Nanjing 211222, Peoples R China
基金
中国国家自然科学基金;
关键词
optical encryption; ghost imaging; spread spectrum; correlated imaging; QUANTUM CRYPTOGRAPHY;
D O I
10.1088/1674-1056/acbf27
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
An optical encryption (OE) scheme based on the spread spectrum ghost imaging (SSGI), named as SSGI-OE, is proposed to obtain a high security with a smaller key. In the scheme, the randomly selected row number of a Hadamard matrix of order N is used as the secure key, and shared with the authorized user, Bob, through a private channel. Each corresponding row vector of the order-N Hadamard matrix is then used as the direct sequence code to modulate a speckle pattern for the ghost imaging system, and an image is encrypted with the help of the SSGI. The measurement results from the bucket detector, named as ciphertext, are then transmitted to Bob through a public channel. The illuminating speckle patterns are also shared with Bob by the public channel. With the correct secure key, Bob could reconstruct the image with the aid of the SSGI system, whereas the unauthorized user, Eve, could not obtain any useful information of the encrypted image. The numerical simulations and experimental results show that the proposed scheme is feasible with a higher security and a smaller key. For the 32 x 32 pixels image, the number of bits sent from Alice to Bob by using SSGI-OE (M = 1024, N = 2048) scheme is only 0.0107 times over a computational ghost imaging optical encryption scheme. When the eavesdropping ratio (ER) is less than 40%, the eavesdropper cannot acquire any information of the encrypted image. The extreme circumstance for the proposed SSGI-OE scheme is also discussed, where the eavesdropper begins to extract the information when ER is up to 15%.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Optical encryption scheme based on spread spectrum ghost imaging
    刘进芬
    董玥
    王乐
    赵生妹
    Chinese Physics B, 2023, 32 (07) : 435 - 441
  • [2] Secret sharing scheme based on spread spectrum ghost imaging
    Liu, Jinfen
    Wang, Le
    Zhao, Shengmei
    APPLIED OPTICS, 2022, 61 (24) : 7102 - 7107
  • [3] Optical encryption scheme based on ghost imaging with disordered speckles
    Zhang, Yu-dong
    Zhao, Sheng-mei
    CHINESE PHYSICS B, 2017, 26 (05)
  • [4] Optical encryption scheme based on ghost imaging with disordered speckles
    张玉东
    赵生妹
    Chinese Physics B, 2017, 26 (05) : 164 - 168
  • [5] Optical encryption scheme with double secret keys based on computational ghost imaging
    Cao F.
    Zhao S.
    Guangxue Xuebao/Acta Optica Sinica, 2017, 37 (01):
  • [6] Optical image authentication and encryption scheme with computational ghost imaging
    Hu, Jie-Long
    Chen, Ming-Xuan
    Zhou, Shun
    Zhou, Nan-Run
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2024, 361 (17):
  • [7] Optical image encryption and authentication scheme with computational ghost imaging
    Guo, Zhe
    Chen, Su-Hua
    Zhou, Ling
    Gong, Li-Hua
    APPLIED MATHEMATICAL MODELLING, 2024, 131 : 49 - 66
  • [8] Optical encryption based on computational ghost imaging
    Clemente, Pere
    Duran, Vicente
    Torres-Company, Victor
    Tajahuerce, Enrique
    Lancis, Jesus
    OPTICS LETTERS, 2010, 35 (14) : 2391 - 2393
  • [9] Hybrid encryption scheme based on temporal ghost imaging
    Kang Yi
    Zhang Leihong
    Ye Hualong
    Zhang Dawei
    APPLIED PHYSICS B-LASERS AND OPTICS, 2021, 127 (08):
  • [10] Hybrid encryption scheme based on temporal ghost imaging
    Kang Yi
    Zhang Leihong
    Ye Hualong
    Zhang Dawei
    Applied Physics B, 2021, 127