Optical encryption scheme based on spread spectrum ghost imaging

被引:1
|
作者
Liu, Jin-Fen [1 ,2 ]
Dong, Yue [1 ]
Wang, Le [1 ]
Zhao, Sheng-Mei [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Inst Signal Proc & Transmiss, Nanjing, Peoples R China
[2] NanJing Tech Univ Pujiang Inst, Nanjing 211222, Peoples R China
基金
中国国家自然科学基金;
关键词
optical encryption; ghost imaging; spread spectrum; correlated imaging; QUANTUM CRYPTOGRAPHY;
D O I
10.1088/1674-1056/acbf27
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
An optical encryption (OE) scheme based on the spread spectrum ghost imaging (SSGI), named as SSGI-OE, is proposed to obtain a high security with a smaller key. In the scheme, the randomly selected row number of a Hadamard matrix of order N is used as the secure key, and shared with the authorized user, Bob, through a private channel. Each corresponding row vector of the order-N Hadamard matrix is then used as the direct sequence code to modulate a speckle pattern for the ghost imaging system, and an image is encrypted with the help of the SSGI. The measurement results from the bucket detector, named as ciphertext, are then transmitted to Bob through a public channel. The illuminating speckle patterns are also shared with Bob by the public channel. With the correct secure key, Bob could reconstruct the image with the aid of the SSGI system, whereas the unauthorized user, Eve, could not obtain any useful information of the encrypted image. The numerical simulations and experimental results show that the proposed scheme is feasible with a higher security and a smaller key. For the 32 x 32 pixels image, the number of bits sent from Alice to Bob by using SSGI-OE (M = 1024, N = 2048) scheme is only 0.0107 times over a computational ghost imaging optical encryption scheme. When the eavesdropping ratio (ER) is less than 40%, the eavesdropper cannot acquire any information of the encrypted image. The extreme circumstance for the proposed SSGI-OE scheme is also discussed, where the eavesdropper begins to extract the information when ER is up to 15%.
引用
收藏
页数:7
相关论文
共 50 条
  • [41] Optical encryption for visible light communication based on temporal ghost imaging with a micro-LED
    Wang, Yupeng
    Chen, Honglan
    Jiang, Wenjie
    Li, Xianye
    Chen, Xinwei
    Meng, Xiangfeng
    Tian, Pengfei
    Sun, Baoqing
    Optics and Lasers in Engineering, 2020, 134
  • [42] Optical encryption based on the algorithm of compressive ghost imaging and phase-shifting digital holography
    Zhang Leihong
    Xiong Rui
    Zhang Dawei
    Chen Jian
    UKRAINIAN JOURNAL OF PHYSICAL OPTICS, 2018, 19 (03) : 179 - 190
  • [43] Optical encryption for visible light communication based on temporal ghost imaging with a micro-LED
    Wang, Yupeng
    Chen, Honglan
    Jiang, Wenjie
    Li, Xianye
    Chen, Xinwei
    Meng, Xiangfeng
    Tian, Pengfei
    Sun, Baoqing
    OPTICS AND LASERS IN ENGINEERING, 2020, 134
  • [44] Study on an optical encryption algorithm based on compressive ghost imaging and super-resolution reconstruction
    Zhan, Wenjie
    Zhang, Leihong
    Zeng, Xi
    Chen, Jian
    Zhang, Dawei
    LASER PHYSICS, 2018, 28 (12)
  • [45] Multibiosignal chaotic encryption scheme based on spread spectrum and global diffusion process for e-health
    Murillo-Escobar, M. A.
    Cruz-Hernandez, C.
    Cardoza-Avendano, L.
    Murillo-Escobar, D.
    Lopez-Gutierrez, R. M.
    BIOMEDICAL SIGNAL PROCESSING AND CONTROL, 2022, 78
  • [46] An optical watermarking scheme with two-layer framework based on computational ghost imaging
    Sui Liansheng
    Cheng Yin
    Ailing, Tian
    Asundi, Anand Krishna
    OPTICS AND LASERS IN ENGINEERING, 2018, 107 : 38 - 45
  • [47] Ghost imaging-based optical multilevel authentication scheme using visual cryptography
    Kang, Yi
    Kanwal, Saima
    Pu, Shengli
    Liu, Baolin
    Zhang, Dawei
    OPTICS COMMUNICATIONS, 2023, 526
  • [48] Multiple-image encryption based on computational ghost imaging
    Wu, Jingjing
    Xie, Zhenwei
    Liu, Zhengjun
    Liu, Wei
    Zhang, Yan
    Liu, Shutian
    OPTICS COMMUNICATIONS, 2016, 359 : 38 - 43
  • [49] Computational ghost imaging encryption based on fingerprint phase mask
    Zhu, Jinan
    Yang, Xiulun
    Meng, Xiangfeng
    Wang, Yurong
    Yin, Yongkai
    Sun, Xiaowen
    Dong, Guoyan
    OPTICS COMMUNICATIONS, 2018, 420 : 34 - 39
  • [50] Research on multiple-image encryption scheme based on joint power spectral division multiplexing and ghost imaging
    Wang, Yang
    Zhang, Leihong
    Zhang, Dawei
    Wang, Kaimin
    LASER PHYSICS, 2021, 31 (05)