Optical encryption for multi-user based on computational ghost imaging with Hadamard modulation

被引:5
|
作者
Yuan, Sheng [1 ]
Han, Yakun [1 ]
Liu, Xuemei [1 ]
Li, Zhongyang [1 ]
Bing, Pibin [1 ]
Zhou, Xin [2 ]
机构
[1] North China Univ Water Resources & Elect Power, Dept Elect Engn, Zhengzhou 450046, Peoples R China
[2] Sichuan Univ, Dept Opto Elect Sci & Technol, Chengdu 610065, Peoples R China
来源
OPTIK | 2023年 / 273卷
基金
中国国家自然科学基金;
关键词
Computational ghost imaging; Optical encryption; Hadamard matrix; CHOSEN-PLAINTEXT ATTACK; CIPHERTEXT-ONLY ATTACK; PHASE; VULNERABILITY; SCHEME;
D O I
10.1016/j.ijleo.2022.170500
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
In multi-user applications, one of the thorny problems for a cryptographic algorithm is how to distribute the keys and reduce the amount of transmitted data without crosstalk and security risks. Based on Hadamard modulated Computational Ghost Imaging (CGI), we propose an optical encryption scheme for multi-user, in which a common ciphertext is public for all users and one user owns a unique key to index the row sequence of Hadamard basis for decryption. Therefore, the channel resources are saved because the ciphertext does not need to be transmitted. Compared with the conventional CGI-based random intensity modulation encryption, the scheme not only reduces the amount of transmitted key data but also enhances the quality of decrypted images, which benefits from the order of Hadamard basis rather than its distribution being taken as the key. Theoretical analysis and numerical simulations are conducted to prove the feasibility and property of the scheme.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Optical encryption based on computational ghost imaging
    Clemente, Pere
    Duran, Vicente
    Torres-Company, Victor
    Tajahuerce, Enrique
    Lancis, Jesus
    OPTICS LETTERS, 2010, 35 (14) : 2391 - 2393
  • [2] Optical Encryption Scheme with Multiple Users Based on Computational Ghost Imaging and Orthogonal Modulation
    Yuan, Sheng
    Liu, Xuemei
    Zhou, Xin
    Li, Zhongyang
    JOURNAL OF THE OPTICAL SOCIETY OF KOREA, 2016, 20 (04) : 476 - 480
  • [3] Computational Spectral-Domain Ghost Imaging Based on Hadamard Modulation
    Zhao, Jianing
    Tang, Zhenzhou
    Shao, Kunlin
    Pan, Shilong
    2020 INTERNATIONAL TOPICAL MEETING ON MICROWAVE PHOTONICS (MWP 2020), 2020, : 253 - 255
  • [4] Forgery attack on optical encryption based on computational ghost imaging
    Yuan, Sheng
    Wang, Lanjie
    Liu, Xuemei
    Zhou, Xin
    OPTICS LETTERS, 2020, 45 (14) : 3913 - 3916
  • [5] Optical encryption with selective computational ghost imaging
    Zafari, Mohammad
    Kheradmand, Reza
    Ahmadi-Kandjani, Sohrab
    JOURNAL OF OPTICS, 2014, 16 (10)
  • [6] Multi-user visible light communication based on computational temporal ghost imaging and code division multiple access with wide field of view and encryption
    Sun, Di
    Jin, Zuxin
    Shen, Daqi
    Fang, Zhilai
    Cui, Xugao
    Tian, Pengfei
    OPTICS COMMUNICATIONS, 2024, 564
  • [7] An optical image encryption based on computational ghost imaging with sparse reconstruction
    Sui, Liansheng
    Pang, Zhi
    Cheng, Ying
    Cheng, Yin
    Xiao, Zhaolin
    Tian, Ailing
    Qian, Kemao
    Anand, Asundi
    OPTICS AND LASERS IN ENGINEERING, 2021, 143 (143)
  • [8] Optical encryption scheme with double secret keys based on computational ghost imaging
    Cao F.
    Zhao S.
    Guangxue Xuebao/Acta Optica Sinica, 2017, 37 (01):
  • [9] Gray-scale and color optical encryption based on computational ghost imaging
    Tanha, Mehrdad
    Kheradmand, Reza
    Ahmadi-Kandjani, Sohrab
    APPLIED PHYSICS LETTERS, 2012, 101 (10)
  • [10] Multi-user Attribute Based Searchable Encryption
    Kaushik, Kulvaibhav
    Varadharajan, Vijayaraghavan
    Nallusamy, Rajarathnam
    2013 IEEE 14TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT (MDM 2013), VOL 2, 2013, : 200 - 205